last executing test programs: 4.600608082s ago: executing program 0 (id=2290): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='freezer.state\x00', 0x275a, 0x0) r1 = open$dir(&(0x7f00000000c0)='.\x00', 0x0, 0x0) r2 = openat$cgroup_freezer_state(r1, &(0x7f0000000140), 0x2, 0x0) sendfile(r2, r0, 0x0, 0x0) 4.497872109s ago: executing program 0 (id=2291): r0 = openat$vsock(0xffffff9c, &(0x7f0000000000), 0x200000, 0x0) close_range(r0, r0, 0x0) openat$mixer(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000200)={0x1}) 4.418233101s ago: executing program 0 (id=2292): r0 = openat$procfs(0xffffff9c, &(0x7f0000000000)='/proc/asound/timers\x00', 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x0, 0x0, 0x70bd27, 0x25dfdbfb, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}}, 0x30}, 0x1, 0x0, 0x0, 0x8081}, 0x8040) 4.060433157s ago: executing program 0 (id=2297): r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000100), 0x80, 0x0) close(r0) openat$sequencer(0xffffff9c, &(0x7f0000000100), 0x28983, 0x0) ioctl$DRM_IOCTL_SET_SAREA_CTX(r0, 0x4008641c, 0x0) 3.939960846s ago: executing program 0 (id=2294): r0 = socket(0x29, 0x2, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[], 0x33fe0}}, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x1, 0x0, 0x0, 0x4000000}, 0x40810) sendmsg$xdp(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40890}, 0x7c0c30f3ca4e9a6b) 648.308497ms ago: executing program 0 (id=2322): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) sendto$l2tp6(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r1, 0x0, 0x0) 520.200258ms ago: executing program 1 (id=2319): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) sendmsg$IPVS_CMD_NEW_DEST(r2, &(0x7f0000001a00)={0x0, 0x0, &(0x7f00000019c0)={&(0x7f0000001840)={0x14, 0x0, 0x200, 0x70bd28, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x20000810) 410.532034ms ago: executing program 1 (id=2320): r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x30b542, 0x0) close(r0) r1 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x14, r1, 0x200, 0x70bd2a, 0x25dfdbfb, {{}, {@void, @void}}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x808) 300.972942ms ago: executing program 1 (id=2321): r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x88000, 0x0) r1 = openat$cgroup_pressure(r0, &(0x7f0000000040)='memory.pressure\x00', 0xe0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$BTRFS_IOC_DEFRAG(r1, 0x5451, 0x0) 211.634686ms ago: executing program 1 (id=2323): r0 = openat$vsock(0xffffff9c, &(0x7f0000000000), 0x1a3100, 0x0) sendmsg$ETHTOOL_MSG_CHANNELS_GET(r0, 0x0, 0x11) syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) ioctl$int_in(r0, 0x5421, &(0x7f0000000780)=0x9) 78.932197ms ago: executing program 1 (id=2324): r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x0, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f0000000000)='devices.deny\x00', 0x63, 0x0) r2 = dup(r1) setsockopt$inet_pktinfo(r2, 0x0, 0x8, 0x0, 0x0) 0s ago: executing program 1 (id=2325): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto(r0, 0x0, 0x0, 0x20044844, &(0x7f00000001c0)=@in6={0xa, 0xffff, 0x0, @local, 0x1}, 0x80) r1 = fcntl$dupfd(r0, 0x406, r0) write$USERIO_CMD_REGISTER(r1, 0x0, 0x0) kernel console output (not intermixed with test programs): [ 48.682376][ T29] audit: type=1400 audit(48.610:56): avc: denied { read write } for pid=3084 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 48.724698][ T29] audit: type=1400 audit(48.640:57): avc: denied { open } for pid=3084 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:33994' (ED25519) to the list of known hosts. [ 64.676966][ T29] audit: type=1400 audit(64.610:58): avc: denied { name_bind } for pid=3087 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 66.824482][ T29] audit: type=1400 audit(66.750:59): avc: denied { execute } for pid=3088 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 66.834447][ T29] audit: type=1400 audit(66.770:60): avc: denied { execute_no_trans } for pid=3088 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 70.117172][ T29] audit: type=1400 audit(70.050:61): avc: denied { mounton } for pid=3088 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 70.124283][ T29] audit: type=1400 audit(70.050:62): avc: denied { mount } for pid=3088 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 70.144839][ T3088] cgroup: Unknown subsys name 'net' [ 70.154959][ T29] audit: type=1400 audit(70.090:63): avc: denied { unmount } for pid=3088 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 70.332709][ T3088] cgroup: Unknown subsys name 'cpuset' [ 70.339802][ T3088] cgroup: Unknown subsys name 'hugetlb' [ 70.344562][ T3088] cgroup: Unknown subsys name 'rlimit' [ 70.597346][ T29] audit: type=1400 audit(70.530:64): avc: denied { setattr } for pid=3088 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 70.599386][ T29] audit: type=1400 audit(70.530:65): avc: denied { mounton } for pid=3088 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 70.601412][ T29] audit: type=1400 audit(70.530:66): avc: denied { mount } for pid=3088 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 70.802284][ T3090] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 70.806049][ T29] audit: type=1400 audit(70.740:67): avc: denied { relabelto } for pid=3090 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 70.810036][ T29] audit: type=1400 audit(70.740:68): avc: denied { write } for pid=3090 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 70.850725][ T29] audit: type=1400 audit(70.780:69): avc: denied { read } for pid=3088 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 70.852493][ T29] audit: type=1400 audit(70.780:70): avc: denied { open } for pid=3088 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 79.177010][ T3088] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 81.297711][ T29] audit: type=1400 audit(81.230:71): avc: denied { execmem } for pid=3091 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 81.366110][ T29] audit: type=1400 audit(81.300:72): avc: denied { read } for pid=3093 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 81.374724][ T29] audit: type=1400 audit(81.310:73): avc: denied { open } for pid=3093 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 81.381002][ T29] audit: type=1400 audit(81.310:74): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 81.409613][ T29] audit: type=1400 audit(81.340:75): avc: denied { module_request } for pid=3093 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 81.496133][ T29] audit: type=1400 audit(81.430:76): avc: denied { sys_module } for pid=3093 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 82.184474][ T29] audit: type=1400 audit(82.120:77): avc: denied { ioctl } for pid=3093 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 83.476101][ T3094] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 83.483831][ T3093] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 83.491817][ T3094] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 83.499043][ T3093] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 84.480338][ T3094] hsr_slave_0: entered promiscuous mode [ 84.484710][ T3094] hsr_slave_1: entered promiscuous mode [ 84.513657][ T3093] hsr_slave_0: entered promiscuous mode [ 84.516593][ T3093] hsr_slave_1: entered promiscuous mode [ 84.519663][ T3093] debugfs: 'hsr0' already exists in 'hsr' [ 84.521081][ T3093] Cannot create hsr debugfs directory [ 84.926426][ T29] audit: type=1400 audit(84.850:78): avc: denied { create } for pid=3094 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 84.931260][ T29] audit: type=1400 audit(84.860:79): avc: denied { write } for pid=3094 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 84.932801][ T29] audit: type=1400 audit(84.860:80): avc: denied { read } for pid=3094 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 84.952769][ T3094] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 84.972623][ T3094] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 84.978186][ T3094] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 84.985165][ T3094] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 85.051477][ T3093] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 85.058271][ T3093] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 85.063358][ T3093] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 85.077337][ T3093] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 85.628857][ T3093] 8021q: adding VLAN 0 to HW filter on device bond0 [ 85.871554][ T3094] 8021q: adding VLAN 0 to HW filter on device bond0 [ 88.012476][ T3093] veth0_vlan: entered promiscuous mode [ 88.049737][ T3093] veth1_vlan: entered promiscuous mode [ 88.115490][ T3093] veth0_macvtap: entered promiscuous mode [ 88.127356][ T3093] veth1_macvtap: entered promiscuous mode [ 88.204616][ T108] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.205317][ T108] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.205435][ T108] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.205538][ T108] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.372406][ T29] audit: type=1400 audit(88.300:81): avc: denied { mount } for pid=3093 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 88.391974][ T29] audit: type=1400 audit(88.320:82): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/syzkaller.g3Rzlx/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 88.405846][ T29] audit: type=1400 audit(88.340:83): avc: denied { mount } for pid=3093 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 88.418849][ T29] audit: type=1400 audit(88.350:84): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/syzkaller.g3Rzlx/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 88.426096][ T29] audit: type=1400 audit(88.350:85): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/syzkaller.g3Rzlx/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=1858 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 88.449694][ T29] audit: type=1400 audit(88.380:86): avc: denied { unmount } for pid=3093 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 88.462322][ T29] audit: type=1400 audit(88.390:87): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 88.471174][ T29] audit: type=1400 audit(88.400:88): avc: denied { mount } for pid=3093 comm="syz-executor" name="/" dev="gadgetfs" ino=1859 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 88.478089][ T29] audit: type=1400 audit(88.410:89): avc: denied { mount } for pid=3093 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 88.481092][ T29] audit: type=1400 audit(88.410:90): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 88.546469][ T3093] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 89.236222][ T3094] veth0_vlan: entered promiscuous mode [ 89.255033][ T3094] veth1_vlan: entered promiscuous mode [ 89.348749][ T3094] veth0_macvtap: entered promiscuous mode [ 89.368367][ T3094] veth1_macvtap: entered promiscuous mode [ 89.450816][ T1231] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.451238][ T1231] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.453527][ T1231] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.453874][ T1231] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 90.116284][ T3706] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3706 comm=syz.1.2 [ 90.691813][ T3718] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=3718 comm=syz.0.8 [ 93.864287][ T29] kauditd_printk_skb: 12 callbacks suppressed [ 93.867978][ T29] audit: type=1400 audit(93.790:103): avc: denied { ioctl } for pid=3795 comm="syz.1.46" path="socket:[2685]" dev="sockfs" ino=2685 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 93.869802][ T29] audit: type=1400 audit(93.800:104): avc: denied { bind } for pid=3795 comm="syz.1.46" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 98.255462][ T3857] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3857 comm=syz.1.72 [ 98.439019][ T3861] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3861 comm=syz.1.74 [ 98.784521][ T29] audit: type=1400 audit(98.720:105): avc: denied { create } for pid=3866 comm="syz.1.77" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 98.790153][ T29] audit: type=1400 audit(98.720:106): avc: denied { write } for pid=3866 comm="syz.1.77" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 99.136526][ T29] audit: type=1400 audit(99.070:107): avc: denied { create } for pid=3874 comm="syz.1.81" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 99.146319][ T29] audit: type=1400 audit(99.080:108): avc: denied { bind } for pid=3874 comm="syz.1.81" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 99.150511][ T29] audit: type=1400 audit(99.080:109): avc: denied { accept } for pid=3874 comm="syz.1.81" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 99.152386][ T29] audit: type=1400 audit(99.080:110): avc: denied { write } for pid=3874 comm="syz.1.81" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 99.215455][ T29] audit: type=1400 audit(99.150:111): avc: denied { bpf } for pid=3876 comm="syz.1.82" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 99.281099][ T29] audit: type=1400 audit(99.210:112): avc: denied { setopt } for pid=3878 comm="syz.1.83" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 99.892696][ T29] audit: type=1400 audit(99.820:113): avc: denied { append } for pid=3892 comm="syz.1.90" name="001" dev="devtmpfs" ino=689 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 100.741231][ T29] audit: type=1400 audit(100.670:114): avc: denied { remount } for pid=3912 comm="syz.0.100" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 100.774899][ T29] audit: type=1400 audit(100.700:115): avc: denied { unmount } for pid=3093 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 101.906029][ T29] audit: type=1400 audit(101.840:116): avc: denied { create } for pid=3939 comm="syz.1.112" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 105.120773][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 105.121925][ T29] audit: type=1400 audit(105.050:118): avc: denied { read } for pid=3960 comm="syz.1.122" path="socket:[2967]" dev="sockfs" ino=2967 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 105.581393][ T3974] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 105.581522][ T29] audit: type=1400 audit(105.510:119): avc: denied { create } for pid=3972 comm="syz.0.128" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 105.597244][ T29] audit: type=1400 audit(105.530:120): avc: denied { read write } for pid=3972 comm="syz.0.128" path="socket:[3393]" dev="sockfs" ino=3393 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 106.495436][ T29] audit: type=1400 audit(106.430:121): avc: denied { unmount } for pid=3093 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 106.812762][ T29] audit: type=1400 audit(106.740:122): avc: denied { ioctl } for pid=4015 comm="syz.0.150" path="socket:[3467]" dev="sockfs" ino=3467 ioctlcmd=0x3302 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 107.024411][ T29] audit: type=1400 audit(106.960:123): avc: denied { create } for pid=4022 comm="syz.0.153" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 107.028116][ T29] audit: type=1400 audit(106.960:124): avc: denied { ioctl } for pid=4022 comm="syz.0.153" path="socket:[4108]" dev="sockfs" ino=4108 ioctlcmd=0x5411 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 107.759069][ T4039] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4039 comm=syz.0.161 [ 108.353642][ T29] audit: type=1400 audit(108.280:125): avc: denied { write } for pid=4056 comm="syz.0.170" name="ipv6_route" dev="proc" ino=4026532713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 108.369441][ T4057] raw_sendmsg: syz.0.170 forgot to set AF_INET. Fix it! [ 108.510994][ T29] audit: type=1400 audit(108.440:126): avc: denied { nlmsg_tty_audit } for pid=4062 comm="syz.1.173" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 110.539095][ T4096] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4096 comm=syz.0.189 [ 110.652063][ T4098] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4098 comm=syz.0.190 [ 110.850011][ T29] audit: type=1400 audit(110.780:127): avc: denied { allowed } for pid=4101 comm="syz.0.192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 110.870602][ T29] audit: type=1400 audit(110.800:128): avc: denied { create } for pid=4101 comm="syz.0.192" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 111.505125][ T29] audit: type=1400 audit(111.440:129): avc: denied { create } for pid=4115 comm="syz.1.199" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 111.511434][ T29] audit: type=1400 audit(111.440:130): avc: denied { connect } for pid=4115 comm="syz.1.199" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 111.517040][ T29] audit: type=1400 audit(111.450:131): avc: denied { shutdown } for pid=4115 comm="syz.1.199" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 111.524216][ T29] audit: type=1400 audit(111.450:132): avc: denied { write } for pid=4115 comm="syz.1.199" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 112.508820][ T29] audit: type=1400 audit(112.440:133): avc: denied { setopt } for pid=4142 comm="syz.0.212" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 112.838484][ T29] audit: type=1400 audit(112.770:134): avc: denied { map } for pid=4154 comm="syz.1.218" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4370 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 112.839133][ T29] audit: type=1400 audit(112.770:135): avc: denied { read write } for pid=4154 comm="syz.1.218" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4370 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 113.015054][ T4163] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5132 sclass=netlink_route_socket pid=4163 comm=syz.1.222 [ 115.773239][ C1] hrtimer: interrupt took 915616 ns [ 116.859445][ T29] audit: type=1400 audit(116.790:136): avc: denied { read } for pid=4213 comm="syz.1.246" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 116.867250][ T29] audit: type=1400 audit(116.800:137): avc: denied { open } for pid=4213 comm="syz.1.246" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 117.061601][ T4218] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4218 comm=syz.1.248 [ 117.570446][ T29] audit: type=1400 audit(117.500:138): avc: denied { map_create } for pid=4231 comm="syz.0.255" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 117.578310][ T29] audit: type=1400 audit(117.510:139): avc: denied { map_read map_write } for pid=4231 comm="syz.0.255" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 117.584334][ T29] audit: type=1400 audit(117.520:140): avc: denied { prog_load } for pid=4231 comm="syz.0.255" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 117.587528][ T29] audit: type=1400 audit(117.520:141): avc: denied { perfmon } for pid=4231 comm="syz.0.255" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 117.627284][ T29] audit: type=1400 audit(117.560:142): avc: denied { prog_run } for pid=4231 comm="syz.0.255" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 120.864264][ T29] audit: type=1400 audit(120.790:143): avc: denied { name_bind } for pid=4259 comm="syz.0.268" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 120.866446][ T29] audit: type=1400 audit(120.790:144): avc: denied { node_bind } for pid=4259 comm="syz.0.268" saddr=::ffff:172.20.20.13 src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 121.719624][ T29] audit: type=1400 audit(121.650:145): avc: denied { write } for pid=4270 comm="syz.1.273" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 122.127469][ T29] audit: type=1400 audit(122.030:146): avc: denied { create } for pid=4273 comm="syz.1.276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 122.147220][ T29] audit: type=1400 audit(122.080:147): avc: denied { write } for pid=4273 comm="syz.1.276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 122.149939][ T29] audit: type=1400 audit(122.080:148): avc: denied { nlmsg_write } for pid=4273 comm="syz.1.276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 126.373560][ T4329] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=263 sclass=netlink_route_socket pid=4329 comm=syz.0.302 [ 126.961926][ T29] audit: type=1400 audit(126.890:149): avc: denied { create } for pid=4332 comm="syz.1.305" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 127.043559][ T29] audit: type=1400 audit(126.970:150): avc: denied { write } for pid=4332 comm="syz.1.305" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 127.618443][ T4342] ======================================================= [ 127.618443][ T4342] WARNING: The mand mount option has been deprecated and [ 127.618443][ T4342] and is ignored by this kernel. Remove the mand [ 127.618443][ T4342] option from the mount to silence this warning. [ 127.618443][ T4342] ======================================================= [ 127.621074][ T4341] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4341 comm=syz.0.308 [ 127.624354][ T29] audit: type=1400 audit(127.560:151): avc: denied { mount } for pid=4340 comm="syz.1.309" name="/" dev="ramfs" ino=4681 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 127.653582][ T29] audit: type=1400 audit(127.580:152): avc: denied { unmount } for pid=3094 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 129.534421][ T4354] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4354 comm=syz.0.315 [ 130.385433][ T29] audit: type=1400 audit(130.320:153): avc: denied { ioctl } for pid=4364 comm="syz.0.321" path="socket:[5136]" dev="sockfs" ino=5136 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 132.802865][ T4407] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4407 comm=syz.0.341 [ 133.335084][ T4421] wg0: entered promiscuous mode [ 133.336527][ T4421] wg0: entered allmulticast mode [ 134.846419][ T29] audit: type=1400 audit(134.780:154): avc: denied { setopt } for pid=4477 comm="syz.1.376" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 135.345873][ T4496] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1017 sclass=netlink_route_socket pid=4496 comm=syz.0.383 [ 139.791237][ T29] audit: type=1400 audit(139.720:155): avc: denied { create } for pid=4540 comm="syz.1.405" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 139.806882][ T29] audit: type=1400 audit(139.740:156): avc: denied { read } for pid=4540 comm="syz.1.405" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 143.126379][ T4584] Zero length message leads to an empty skb [ 143.353640][ T29] audit: type=1400 audit(143.280:157): avc: denied { setopt } for pid=4589 comm="syz.0.428" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 145.818248][ T4619] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4619 comm=syz.0.442 [ 146.036559][ T4623] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4623 comm=syz.0.444 [ 149.432045][ T4658] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4658 comm=syz.0.461 [ 149.685415][ T29] audit: type=1400 audit(149.620:158): avc: denied { ioctl } for pid=4667 comm="syz.1.466" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=5797 ioctlcmd=0x1272 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 150.479757][ T4700] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=782 sclass=netlink_route_socket pid=4700 comm=syz.0.481 [ 150.710451][ T4711] SELinux: syz.0.486 (4711) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 151.308059][ T4726] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4726 comm=syz.1.494 [ 151.680013][ T29] audit: type=1400 audit(151.610:159): avc: denied { create } for pid=4737 comm="syz.1.498" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 151.695709][ T29] audit: type=1400 audit(151.630:160): avc: denied { write } for pid=4737 comm="syz.1.498" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 156.361697][ T29] audit: type=1400 audit(156.290:161): avc: denied { ioctl } for pid=4779 comm="syz.1.518" path="socket:[6331]" dev="sockfs" ino=6331 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 156.375970][ T4782] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4782 comm=syz.0.519 [ 156.666621][ T4794] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1544 sclass=netlink_route_socket pid=4794 comm=syz.1.525 [ 156.845132][ T4800] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5132 sclass=netlink_route_socket pid=4800 comm=syz.0.528 [ 156.950627][ T4804] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4804 comm=syz.0.530 [ 157.398331][ T29] audit: type=1400 audit(157.330:162): avc: denied { setopt } for pid=4822 comm="syz.1.540" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 157.948595][ T4854] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4854 comm=syz.1.555 [ 160.929291][ T29] audit: type=1400 audit(160.860:163): avc: denied { read } for pid=4886 comm="syz.1.572" path="socket:[7213]" dev="sockfs" ino=7213 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 161.185087][ T4894] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2051 sclass=netlink_route_socket pid=4894 comm=syz.0.575 [ 161.440838][ T4901] netlink: 240 bytes leftover after parsing attributes in process `syz.1.572'. [ 162.736992][ T4932] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1793 sclass=netlink_route_socket pid=4932 comm=syz.1.593 [ 165.958271][ T4971] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=627 sclass=netlink_audit_socket pid=4971 comm=syz.0.612 [ 166.251844][ T29] audit: type=1400 audit(166.180:164): avc: denied { ioctl } for pid=4980 comm="syz.1.617" path="socket:[6708]" dev="sockfs" ino=6708 ioctlcmd=0x5203 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 166.769387][ T29] audit: type=1400 audit(166.700:165): avc: denied { map } for pid=5004 comm="syz.0.629" path="/dev/fb0" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 166.772204][ T29] audit: type=1400 audit(166.700:166): avc: denied { execute } for pid=5004 comm="syz.0.629" path="/dev/fb0" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 167.171557][ T5020] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=2570 sclass=netlink_tcpdiag_socket pid=5020 comm=syz.1.637 [ 167.578337][ T5037] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5037 comm=syz.1.645 [ 167.999670][ T29] audit: type=1400 audit(167.930:167): avc: denied { execute } for pid=5060 comm="syz.0.653" path="/325/cpu.stat" dev="tmpfs" ino=1675 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 168.008709][ T29] audit: type=1400 audit(167.940:168): avc: denied { getopt } for pid=5060 comm="syz.0.653" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 168.308119][ T29] audit: type=1400 audit(168.240:169): avc: denied { compute_member } for pid=5073 comm="syz.0.659" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 168.771500][ T5092] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5092 comm=syz.1.668 [ 169.092072][ T5102] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=1795 sclass=netlink_tcpdiag_socket pid=5102 comm=syz.1.673 [ 169.619916][ T5125] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5125 comm=syz.0.684 [ 169.825940][ T5133] wg0: entered promiscuous mode [ 169.826583][ T5133] wg0: entered allmulticast mode [ 170.806190][ T29] audit: type=1400 audit(170.740:170): avc: denied { watch_mount } for pid=5169 comm="syz.1.706" path="pipe:[874]" dev="pipefs" ino=874 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 172.079851][ T5198] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5198 comm=syz.1.719 [ 172.932615][ T5222] misc userio: Can't change port type on an already running userio instance [ 173.974942][ T3695] atkbd serio2: keyboard reset failed on [ 174.642396][ T5258] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5258 comm=syz.0.748 [ 175.001697][ T5272] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5272 comm=syz.1.755 [ 175.755582][ T29] audit: type=1400 audit(175.690:171): avc: denied { getopt } for pid=5301 comm="syz.1.771" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 175.966263][ T5311] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5311 comm=syz.1.775 [ 176.065560][ T5316] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5316 comm=syz.0.776 [ 176.467315][ T5328] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1017 sclass=netlink_route_socket pid=5328 comm=syz.0.783 [ 180.554785][ T29] audit: type=1400 audit(180.490:172): avc: denied { create } for pid=5351 comm="syz.1.795" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 180.884516][ T5368] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1546 sclass=netlink_route_socket pid=5368 comm=syz.0.800 [ 181.387185][ T5389] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5389 comm=syz.1.810 [ 181.492713][ T29] audit: type=1400 audit(181.420:173): avc: denied { bind } for pid=5392 comm="syz.0.813" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 181.496504][ T29] audit: type=1400 audit(181.430:174): avc: denied { node_bind } for pid=5392 comm="syz.0.813" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 181.700419][ T5404] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=5404 comm=syz.1.817 [ 182.624001][ T5439] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5439 comm=syz.1.833 [ 182.878550][ T29] audit: type=1400 audit(182.810:175): avc: denied { write } for pid=5442 comm="syz.1.835" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 184.561393][ T5478] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5478 comm=syz.0.854 [ 185.044406][ T5503] capability: warning: `syz.1.865' uses 32-bit capabilities (legacy support in use) [ 185.260248][ T5514] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5514 comm=syz.0.871 [ 185.330051][ T29] audit: type=1400 audit(185.260:176): avc: denied { getopt } for pid=5516 comm="syz.0.872" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 185.426302][ T29] audit: type=1400 audit(185.360:177): avc: denied { create } for pid=5519 comm="syz.1.873" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 185.920630][ T5540] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5540 comm=syz.0.883 [ 187.238442][ T5556] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5556 comm=syz.0.894 [ 188.896785][ T5573] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5573 comm=syz.0.898 [ 189.842714][ T29] audit: type=1400 audit(189.770:178): avc: denied { audit_write } for pid=5584 comm="syz.1.904" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 191.234696][ T5604] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65381 sclass=netlink_route_socket pid=5604 comm=syz.1.913 [ 191.525324][ T29] audit: type=1400 audit(191.460:179): avc: denied { bind } for pid=5609 comm="syz.1.916" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 198.163906][ T5707] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=5707 comm=syz.0.962 [ 199.360931][ T5758] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=5758 comm=syz.1.987 [ 200.063737][ T5777] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5777 comm=syz.1.997 [ 203.706248][ T5871] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=5132 sclass=netlink_tcpdiag_socket pid=5871 comm=syz.1.1040 [ 204.541188][ T5891] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5891 comm=syz.0.1049 [ 204.728460][ T5895] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5124 sclass=netlink_audit_socket pid=5895 comm=syz.0.1052 [ 205.559177][ T5925] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1017 sclass=netlink_route_socket pid=5925 comm=syz.1.1066 [ 207.220046][ T5966] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1794 sclass=netlink_route_socket pid=5966 comm=syz.1.1086 [ 207.276161][ T5968] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5968 comm=syz.1.1087 [ 210.664009][ T6008] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1546 sclass=netlink_route_socket pid=6008 comm=syz.1.1106 [ 210.669952][ T6009] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6009 comm=syz.0.1107 [ 216.676410][ T29] audit: type=1400 audit(216.610:180): avc: denied { remount } for pid=6168 comm="syz.0.1184" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 218.180900][ T29] audit: type=1400 audit(218.110:181): avc: denied { read } for pid=6223 comm="syz.1.1211" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 220.537812][ T6278] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5136 sclass=netlink_route_socket pid=6278 comm=syz.0.1238 [ 220.615578][ T6280] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6280 comm=syz.0.1239 [ 220.787648][ T6287] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6287 comm=syz.0.1242 [ 220.972518][ T29] audit: type=1400 audit(220.900:182): avc: denied { mounton } for pid=6292 comm="syz.0.1245" path="/617/file0" dev="tmpfs" ino=3166 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 221.025831][ T29] audit: type=1400 audit(220.960:183): avc: denied { nlmsg_read } for pid=6294 comm="syz.1.1246" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 221.217046][ T6303] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6303 comm=syz.1.1249 [ 221.427074][ T6311] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6311 comm=syz.1.1253 [ 224.012370][ T6376] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=6376 comm=syz.1.1285 [ 225.928216][ T6428] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=257 sclass=netlink_audit_socket pid=6428 comm=syz.0.1311 [ 226.759050][ T29] audit: type=1400 audit(226.690:184): avc: denied { getopt } for pid=6436 comm="syz.0.1315" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 228.135414][ T29] audit: type=1400 audit(228.070:185): avc: denied { ioctl } for pid=6448 comm="syz.0.1321" path="/dev/binderfs/binder0" dev="binder" ino=4 ioctlcmd=0x5404 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 228.135538][ T6450] binder: 6448:6450 ioctl 403c5404 0 returned -22 [ 228.240891][ T29] audit: type=1400 audit(228.170:186): avc: denied { ioctl } for pid=6453 comm="syz.1.1324" path="socket:[11097]" dev="sockfs" ino=11097 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 229.020908][ T29] audit: type=1400 audit(228.950:187): avc: denied { nlmsg_write } for pid=6483 comm="syz.1.1338" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 231.140559][ T6531] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6531 comm=syz.0.1363 [ 233.612484][ T6560] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=22 sclass=netlink_audit_socket pid=6560 comm=syz.0.1375 [ 236.529348][ T6585] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=1000 sclass=netlink_tcpdiag_socket pid=6585 comm=syz.1.1387 [ 238.031332][ T29] audit: type=1400 audit(237.960:188): avc: denied { mount } for pid=6624 comm="syz.0.1409" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 238.886976][ T29] audit: type=1400 audit(238.820:189): avc: denied { accept } for pid=6663 comm="syz.1.1424" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 246.329428][ T6863] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6863 comm=syz.1.1520 [ 247.315289][ T6903] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6903 comm=syz.1.1540 [ 247.498166][ T6915] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6915 comm=syz.1.1546 [ 248.458059][ T6947] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5136 sclass=netlink_route_socket pid=6947 comm=syz.1.1558 [ 248.755633][ T6955] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6955 comm=syz.0.1566 [ 248.932433][ T6963] sock: sock_set_timeout: `syz.0.1570' (pid 6963) tries to set negative timeout [ 252.743927][ T7048] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7048 comm=syz.0.1610 [ 254.002598][ T7096] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7096 comm=syz.0.1633 ALSA lib confmisc.c:855:(parse_card) cannot find card '0' ALSA lib conf.c:5180:(_snd_config_evaluate) function snd_func_card_inum returned error: No such file or directory ALSA lib confmisc.c:422:(snd_func_concat) error evaluating strings ALSA lib conf.c:5180:(_snd_config_evaluate) function snd_func_concat returned error: No such file or directory ALSA lib confmisc.c:1334:(snd_func_refer) error evaluating name ALSA lib conf.c:5180:(_snd_config_evaluate) function snd_func_refer returned error: No such file or directory ALSA lib conf.c:5703:(snd_config_expand) Evaluate error: No such file or directory ALSA lib pcm.c:2666:(snd_pcm_open_noupdate) Unknown PCM default alsa: Could not initialize DAC alsa: Failed to open `default': alsa: Reason: No such file or directory ALSA lib confmisc.c:855:(parse_card) cannot find card '0' ALSA lib conf.c:5180:(_snd_config_evaluate) function snd_func_card_inum returned error: No such file or directory ALSA lib confmisc.c:422:(snd_func_concat) error evaluating strings ALSA lib conf.c:5180:(_snd_config_evaluate) function snd_func_concat returned error: No such file or directory ALSA lib confmisc.c:1334:(snd_func_refer) error evaluating name ALSA lib conf.c:5180:(_snd_config_evaluate) function snd_func_refer returned error: No such file or directory ALSA lib conf.c:5703:(snd_config_expand) Evaluate error: No such file or directory ALSA lib pcm.c:2666:(snd_pcm_open_noupdate) Unknown PCM default alsa: Could not initialize DAC alsa: Failed to open `default': alsa: Reason: No such file or directory audio: Could not create a backend for voice `lm4549.out' [ 258.190949][ T7232] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7232 comm=syz.0.1699 [ 259.410081][ T29] audit: type=1400 audit(259.340:190): avc: denied { map } for pid=7275 comm="syz.0.1722" path="socket:[15513]" dev="sockfs" ino=15513 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 259.411230][ T29] audit: type=1400 audit(259.340:191): avc: denied { read } for pid=7275 comm="syz.0.1722" path="socket:[15513]" dev="sockfs" ino=15513 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 262.625474][ T7297] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7297 comm=syz.0.1735 [ 264.948421][ T29] audit: type=1400 audit(264.880:192): avc: denied { connect } for pid=7371 comm="syz.0.1768" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 264.955033][ T29] audit: type=1400 audit(264.890:193): avc: denied { ioctl } for pid=7371 comm="syz.0.1768" path="socket:[15041]" dev="sockfs" ino=15041 ioctlcmd=0x581f scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 265.910145][ T7406] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=36 sclass=netlink_audit_socket pid=7406 comm=syz.0.1785 [ 268.506945][ T7419] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=1000 sclass=netlink_tcpdiag_socket pid=7419 comm=syz.0.1789 [ 269.006484][ T7435] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7435 comm=syz.0.1799 [ 269.865973][ T29] audit: type=1400 audit(269.800:194): avc: denied { unmount } for pid=3093 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 278.251058][ T7653] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7653 comm=syz.0.1903 [ 278.383405][ T29] audit: type=1400 audit(278.310:195): avc: denied { ioctl } for pid=7656 comm="syz.0.1908" path="socket:[16166]" dev="sockfs" ino=16166 ioctlcmd=0x4b44 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 279.729382][ T7701] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=5136 sclass=netlink_tcpdiag_socket pid=7701 comm=syz.0.1927 [ 283.730424][ T7783] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1539 sclass=netlink_audit_socket pid=7783 comm=syz.1.1966 [ 283.875729][ T7788] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7788 comm=syz.0.1968 [ 284.166938][ T29] audit: type=1400 audit(284.100:196): avc: denied { write } for pid=7799 comm="syz.0.1974" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 285.198809][ T29] audit: type=1400 audit(285.130:197): avc: denied { append } for pid=7840 comm="syz.1.1996" name="nullb0" dev="devtmpfs" ino=654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 295.325433][ T29] audit: type=1400 audit(295.260:198): avc: denied { create } for pid=7976 comm="syz.1.2061" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 295.328632][ T29] audit: type=1400 audit(295.260:199): avc: denied { write } for pid=7976 comm="syz.1.2061" path="socket:[17706]" dev="sockfs" ino=17706 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 296.788838][ T29] audit: type=1400 audit(296.720:200): avc: denied { block_suspend } for pid=8023 comm="syz.1.2084" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 297.993986][ T8047] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8047 comm=syz.1.2093 [ 298.104129][ T8049] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5121 sclass=netlink_route_socket pid=8049 comm=syz.0.2094 [ 298.384471][ T8054] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8054 comm=syz.1.2097 [ 302.851559][ T8105] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=1011 sclass=netlink_xfrm_socket pid=8105 comm=syz.1.2119 [ 309.134197][ T8160] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8160 comm=syz.0.2146 [ 310.982520][ T29] audit: type=1400 audit(310.910:201): avc: denied { read } for pid=8228 comm="syz.1.2180" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 314.578362][ T29] audit: type=1400 audit(314.510:202): avc: denied { mount } for pid=8275 comm="syz.1.2203" name="/" dev="tracefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 314.582434][ T29] audit: type=1400 audit(314.510:203): avc: denied { mounton } for pid=8275 comm="syz.1.2203" path="/1092/file0" dev="tracefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=dir permissive=1 [ 314.592428][ T29] audit: type=1400 audit(314.520:204): avc: denied { unmount } for pid=3094 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 314.949739][ T29] audit: type=1400 audit(314.880:205): avc: denied { setopt } for pid=8292 comm="syz.1.2211" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 315.934122][ T8329] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8329 comm=syz.0.2229 [ 316.248093][ T8339] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8339 comm=syz.1.2234 [ 316.339421][ T29] audit: type=1400 audit(316.270:206): avc: denied { create } for pid=8340 comm="syz.1.2235" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 317.800986][ T29] audit: type=1400 audit(317.730:207): avc: denied { getopt } for pid=8362 comm="syz.0.2246" laddr=::1 lport=5 faddr=::1 fport=20004 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 318.249381][ T29] audit: type=1400 audit(318.180:208): avc: denied { setopt } for pid=8370 comm="syz.0.2249" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 324.461110][ T8447] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8447 comm=syz.0.2286 [ 326.437106][ T29] audit: type=1400 audit(326.370:209): avc: denied { ioctl } for pid=8485 comm="syz.1.2305" path="socket:[19303]" dev="sockfs" ino=19303 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 326.545620][ T8488] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8488 comm=syz.1.2306 [ 328.916677][ T8516] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8516 comm=syz.1.2319 [ 726.203518][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 430s! [swapper/0:0] [ 726.203824][ C0] Modules linked in: [ 726.205061][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G L syzkaller #0 PREEMPT [ 726.205366][ C0] Tainted: [L]=SOFTLOCKUP [ 726.205414][ C0] Hardware name: ARM-Versatile Express [ 726.205638][ C0] PC is at _raw_spin_lock+0x40/0x58 [ 726.206739][ C0] LR is at _raw_spin_lock+0x18/0x58 [ 726.206794][ C0] pc : [<81abbef4>] lr : [<81abbecc>] psr: 80000013 [ 726.206845][ C0] sp : 82801e28 ip : 82801e28 fp : 82801e3c [ 726.206883][ C0] r10: 00000000 r9 : 840be440 r8 : 840e4288 [ 726.206923][ C0] r7 : 840be568 r6 : 00000001 r5 : 00000004 r4 : 840be568 [ 726.206962][ C0] r3 : 00005625 r2 : 00005627 r1 : 00000000 r0 : 00000001 [ 726.207088][ C0] Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 726.207169][ C0] Control: 30c5387d Table: 84c86280 DAC: fffffffd [ 726.207294][ C0] Call trace: [ 726.207588][ C0] [<81abbeb4>] (_raw_spin_lock) from [<809c7a2c>] (gpio_mmio_set+0x44/0x80) [ 726.207942][ C0] r5:00000004 r4:840be440 [ 726.208042][ C0] [<809c79e8>] (gpio_mmio_set) from [<809b81e8>] (gpiochip_set+0x1c/0x44) [ 726.208140][ C0] r7:00000001 r6:00000000 r5:00000002 r4:84210028 [ 726.208160][ C0] [<809b81cc>] (gpiochip_set) from [<809baab0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 726.208211][ C0] [<809baa38>] (gpiod_set_raw_value_commit) from [<809bc350>] (gpiod_set_value_nocheck+0x44/0x58) [ 726.208300][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:83369f18 r5:00000001 [ 726.208330][ C0] r4:84210028 [ 726.208349][ C0] [<809bc30c>] (gpiod_set_value_nocheck) from [<809bc3a0>] (gpiod_set_value+0x3c/0x88) [ 726.208397][ C0] [<809bc364>] (gpiod_set_value) from [<809ccb3c>] (gpio_led_set+0x5c/0x60) [ 726.208450][ C0] r5:000000ff r4:832f8224 [ 726.208466][ C0] [<809ccae0>] (gpio_led_set) from [<809ca464>] (led_set_brightness+0x84/0x90) [ 726.208516][ C0] r5:000000ff r4:832f8224 [ 726.208534][ C0] [<809ca3e0>] (led_set_brightness) from [<809cbfe4>] (led_trigger_event+0x40/0x58) [ 726.208581][ C0] r5:000000ff r4:832f8224 [ 726.208597][ C0] [<809cbfa4>] (led_trigger_event) from [<809cd640>] (ledtrig_cpu+0xac/0xf4) [ 726.208653][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 726.208670][ C0] [<809cd594>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 726.208742][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 726.208761][ C0] [<80227a24>] (arch_cpu_idle_exit) from [<802b168c>] (do_idle+0x5c/0x2d8) [ 726.208821][ C0] [<802b1630>] (do_idle) from [<802b1c38>] (cpu_startup_entry+0x30/0x34) [ 726.208892][ C0] r10:8281aff4 r9:8280c680 r8:823bec64 r7:00000000 r6:deffc06c r5:828222e8 [ 726.208913][ C0] r4:000000ed [ 726.208932][ C0] [<802b1c08>] (cpu_startup_entry) from [<81aaf37c>] (kernel_init+0x0/0x138) [ 726.208990][ C0] [<81aaf29c>] (rest_init) from [<8260145c>] (start_kernel+0x844/0x860) [ 726.209114][ C0] [<82600c18>] (start_kernel) from [<00000000>] (0x0) [ 726.209826][ C0] Sending NMI from CPU 0 to CPUs 1: [ 726.210613][ C1] NMI backtrace for cpu 1 [ 726.210835][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G L syzkaller #0 PREEMPT [ 726.210924][ C1] Tainted: [L]=SOFTLOCKUP [ 726.210946][ C1] Hardware name: ARM-Versatile Express [ 726.210974][ C1] PC is at _raw_spin_lock+0x40/0x58 [ 726.211065][ C1] LR is at _raw_spin_lock+0x18/0x58 [ 726.211104][ C1] pc : [<81abbef4>] lr : [<81abbecc>] psr: 80000113 [ 726.211133][ C1] sp : df805d68 ip : df805d68 fp : df805d7c [ 726.211156][ C1] r10: 81c05450 r9 : 840be440 r8 : 840e4288 [ 726.211179][ C1] r7 : 840be568 r6 : 00000000 r5 : 00000001 r4 : 840be568 [ 726.211210][ C1] r3 : 00005625 r2 : 00005626 r1 : 00000000 r0 : 00000001 [ 726.211238][ C1] Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 726.211280][ C1] Control: 30c5387d Table: 85630180 DAC: 00000000 [ 726.211304][ C1] Call trace: frame pointer underflow [ 726.211424][ C1] [<81abbeb4>] (_raw_spin_lock) from [<809c7a2c>] (gpio_mmio_set+0x44/0x80) [ 726.211520][ C1] r5:00000001 r4:840be440 [ 726.211547][ C1] [<809c79e8>] (gpio_mmio_set) from [<809b81e8>] (gpiochip_set+0x1c/0x44) [ 726.211619][ C1] r7:00000000 r6:00000000 r5:00000000 r4:84210000 [ 726.211673][ C1] [<809b81cc>] (gpiochip_set) from [<809baab0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 726.211735][ C1] [<809baa38>] (gpiod_set_raw_value_commit) from [<809bc350>] (gpiod_set_value_nocheck+0x44/0x58) [ 726.211812][ C1] r10:81c05450 r9:df805ebc r8:00000102 r7:00000ba3 r6:00000009 r5:00000000 [ 726.211840][ C1] r4:84210000 [ 726.211872][ C1] [<809bc30c>] (gpiod_set_value_nocheck) from [<809bc3a0>] (gpiod_set_value+0x3c/0x88) [ 726.211930][ C1] [<809bc364>] (gpiod_set_value) from [<809ccb3c>] (gpio_led_set+0x5c/0x60) [ 726.211988][ C1] r5:832f8044 r4:832f8044 [ 726.212005][ C1] [<809ccae0>] (gpio_led_set) from [<809ca3d4>] (led_set_brightness_nosleep+0x38/0x44) [ 726.212069][ C1] r5:832f8044 r4:84941fcc [ 726.212092][ C1] [<809ca39c>] (led_set_brightness_nosleep) from [<809cd438>] (led_heartbeat_function+0x84/0x144) [ 726.212152][ C1] [<809cd3b4>] (led_heartbeat_function) from [<80327070>] (call_timer_fn+0x30/0x220) [ 726.212223][ C1] r7:00000ba3 r6:809cd3b4 r5:84941fcc r4:83216000 [ 726.212246][ C1] [<80327040>] (call_timer_fn) from [<80327524>] (__run_timers+0x2c4/0x3f8) [ 726.212320][ C1] r9:df805ebc r8:00000ba3 r7:00000000 r6:809cd3b4 r5:dddd9f00 r4:84941fcc [ 726.212345][ C1] [<80327260>] (__run_timers) from [<803276c0>] (run_timer_base+0x68/0x78) [ 726.212424][ C1] r10:83216000 r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 [ 726.212452][ C1] r4:dddd9f00 [ 726.212472][ C1] [<80327658>] (run_timer_base) from [<803276ec>] (run_timer_softirq+0x1c/0x34) [ 726.212535][ C1] r4:82804084 [ 726.212555][ C1] [<803276d0>] (run_timer_softirq) from [<8025b65c>] (handle_softirqs+0x140/0x458) [ 726.212620][ C1] [<8025b51c>] (handle_softirqs) from [<8025bad0>] (__irq_exit_rcu+0x110/0x1d0) [ 726.212698][ C1] r10:00000000 r9:83216000 r8:00000000 r7:df865e08 r6:82443f98 r5:8247f0cc [ 726.212726][ C1] r4:83216000 [ 726.212744][ C1] [<8025b9c0>] (__irq_exit_rcu) from [<8025be48>] (irq_exit+0x10/0x18) [ 726.212807][ C1] r5:8247f0cc r4:826c3a9c [ 726.212885][ C1] [<8025be38>] (irq_exit) from [<81aad964>] (generic_handle_arch_irq+0x7c/0x80) [ 726.212975][ C1] [<81aad8e8>] (generic_handle_arch_irq) from [<81a7d904>] (call_with_stack+0x1c/0x20) [ 726.213056][ C1] r9:83216000 r8:840e4288 r7:df865e3c r6:ffffffff r5:60000013 r4:809c822c [ 726.213079][ C1] [<81a7d8e8>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc) [ 726.213240][ C1] Exception stack(0xdf865e08 to 0xdf865e50) [ 726.213449][ C1] 5e00: e00ed008 00000009 00005625 00000000 e00ed008 00000009 [ 726.213515][ C1] 5e20: 00000001 840be568 840e4288 840be440 00000000 df865e6c df865e58 df865e58 [ 726.213549][ C1] 5e40: 809c8228 809c822c 60000013 ffffffff [ 726.213632][ C1] [<809c820c>] (gpio_mmio_write32) from [<809c7a4c>] (gpio_mmio_set+0x64/0x80) [ 726.213715][ C1] r5:00000008 r4:840be440 [ 726.213738][ C1] [<809c79e8>] (gpio_mmio_set) from [<809b81e8>] (gpiochip_set+0x1c/0x44) [ 726.213816][ C1] r7:00000001 r6:00000000 r5:00000003 r4:8421003c [ 726.213838][ C1] [<809b81cc>] (gpiochip_set) from [<809baab0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 726.213918][ C1] [<809baa38>] (gpiod_set_raw_value_commit) from [<809bc350>] (gpiod_set_value_nocheck+0x44/0x58) [ 726.213994][ C1] r10:00000000 r9:00000000 r8:00000001 r7:ddde24c0 r6:83369f58 r5:00000001 [ 726.214019][ C1] r4:8421003c [ 726.214037][ C1] [<809bc30c>] (gpiod_set_value_nocheck) from [<809bc3a0>] (gpiod_set_value+0x3c/0x88) [ 726.214095][ C1] [<809bc364>] (gpiod_set_value) from [<809ccb3c>] (gpio_led_set+0x5c/0x60) [ 726.214160][ C1] r5:000000ff r4:832f8314 [ 726.214182][ C1] [<809ccae0>] (gpio_led_set) from [<809ca464>] (led_set_brightness+0x84/0x90) [ 726.214246][ C1] r5:000000ff r4:832f8314 [ 726.214268][ C1] [<809ca3e0>] (led_set_brightness) from [<809cbfe4>] (led_trigger_event+0x40/0x58) [ 726.214332][ C1] r5:000000ff r4:832f8314 [ 726.214353][ C1] [<809cbfa4>] (led_trigger_event) from [<809cd640>] (ledtrig_cpu+0xac/0xf4) [ 726.214424][ C1] r7:ddde24c0 r6:00000002 r5:82b15cd8 r4:000000fe [ 726.214446][ C1] [<809cd594>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 726.214524][ C1] r9:00000000 r8:00000001 r7:8280c710 r6:83216000 r5:8280c6d0 r4:00000001 [ 726.214550][ C1] [<80227a24>] (arch_cpu_idle_exit) from [<802b168c>] (do_idle+0x5c/0x2d8) [ 726.214621][ C1] [<802b1630>] (do_idle) from [<802b1c38>] (cpu_startup_entry+0x30/0x34) [ 726.214754][ C1] r10:00000000 r9:414fc0f0 r8:80003000 r7:82a7b4a4 r6:83216000 r5:00000001 [ 726.214784][ C1] r4:00000092 [ 726.214805][ C1] [<802b1c08>] (cpu_startup_entry) from [<8022f360>] (secondary_start_kernel+0x128/0x194) [ 726.214888][ C1] [<8022f238>] (secondary_start_kernel) from [<80220094>] (__enable_mmu+0x0/0xc) [ 726.214969][ C1] r7:82a7b4a4 r6:30c0387d r5:00000000 r4:830b7bc0 [ 726.215988][ C0] Kernel panic - not syncing: softlockup: hung tasks [ 726.252119][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G L syzkaller #0 PREEMPT [ 726.252480][ C0] Tainted: [L]=SOFTLOCKUP [ 726.252638][ C0] Hardware name: ARM-Versatile Express [ 726.252947][ C0] Call trace: [ 726.253228][ C0] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 726.253553][ C0] r7:822965a4 r6:8281b500 r5:00000000 r4:82295754 [ 726.253774][ C0] [<80201b58>] (show_stack) from [<8021ee08>] (dump_stack_lvl+0x54/0x7c) [ 726.254078][ C0] [<8021edb4>] (dump_stack_lvl) from [<8021ee48>] (dump_stack+0x18/0x1c) [ 726.254372][ C0] r5:00000000 r4:82a7bd14 [ 726.254527][ C0] [<8021ee30>] (dump_stack) from [<80202648>] (vpanic+0xe0/0x2e8) [ 726.254840][ C0] [<80202568>] (vpanic) from [<80202884>] (trace_suspend_resume+0x0/0xd8) [ 726.255195][ C0] r7:82ac27f8 [ 726.255335][ C0] [<80202850>] (panic) from [<80383fcc>] (watchdog_timer_fn+0x2dc/0x350) [ 726.255643][ C0] r3:00000001 r2:00004000 r1:82a7bd1c r0:822965a4 [ 726.255853][ C0] [<80383cf0>] (watchdog_timer_fn) from [<80329c64>] (__hrtimer_run_queues+0x1c4/0x454) [ 726.256201][ C0] r10:8281b500 r9:00000000 r8:dddc7130 r7:80383cf0 r6:dddc7000 r5:dddc7040 [ 726.256458][ C0] r4:dddc75d8 [ 726.256595][ C0] [<80329aa0>] (__hrtimer_run_queues) from [<8032b268>] (hrtimer_interrupt+0x148/0x2bc) [ 726.256959][ C0] r10:1154a090 r9:dddc7180 r8:dddc7130 r7:000000a9 r6:00000003 r5:20000193 [ 726.257226][ C0] r4:dddc7000 [ 726.257371][ C0] [<8032b120>] (hrtimer_interrupt) from [<813408e0>] (arch_timer_handler_virt+0x30/0x38) [ 726.257723][ C0] r10:81d0fc78 r9:8309e400 r8:00000000 r7:00000000 r6:00000000 r5:82498528 [ 726.257974][ C0] r4:8309de40 [ 726.258131][ C0] [<813408b0>] (arch_timer_handler_virt) from [<802efab4>] (handle_percpu_devid_irq+0x128/0x34c) [ 726.258471][ C0] [<802ef98c>] (handle_percpu_devid_irq) from [<802e8c44>] (handle_irq_desc+0x74/0x84) [ 726.258856][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:df80a00c r6:826c2388 r5:df80a000 [ 726.259124][ C0] r4:8280cc44 [ 726.259262][ C0] [<802e8bd0>] (handle_irq_desc) from [<802e8cc0>] (generic_handle_domain_irq+0x18/0x1c) [ 726.259586][ C0] [<802e8ca8>] (generic_handle_domain_irq) from [<802012c8>] (gic_handle_irq+0x68/0x7c) [ 726.259905][ C0] [<80201260>] (gic_handle_irq) from [<81aad948>] (generic_handle_arch_irq+0x60/0x80) [ 726.260245][ C0] r7:82801dd8 r6:82443f98 r5:8247f0cc r4:826c3a9c [ 726.260448][ C0] [<81aad8e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 726.260753][ C0] Exception stack(0x82801dd8 to 0x82801e20) [ 726.260961][ C0] 1dc0: 00000001 00000000 [ 726.261239][ C0] 1de0: 00005627 00005625 840be568 00000004 00000001 840be568 840e4288 840be440 [ 726.261503][ C0] 1e00: 00000000 82801e3c 82801e28 82801e28 81abbecc 81abbef4 80000013 ffffffff [ 726.261775][ C0] r9:8281b500 r8:840e4288 r7:82801e0c r6:ffffffff r5:80000013 r4:81abbef4 [ 726.262034][ C0] [<81abbeb4>] (_raw_spin_lock) from [<809c7a2c>] (gpio_mmio_set+0x44/0x80) [ 726.262367][ C0] r5:00000004 r4:840be440 [ 726.262520][ C0] [<809c79e8>] (gpio_mmio_set) from [<809b81e8>] (gpiochip_set+0x1c/0x44) [ 726.263071][ C0] r7:00000001 r6:00000000 r5:00000002 r4:84210028 [ 726.263269][ C0] [<809b81cc>] (gpiochip_set) from [<809baab0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 726.263581][ C0] [<809baa38>] (gpiod_set_raw_value_commit) from [<809bc350>] (gpiod_set_value_nocheck+0x44/0x58) [ 726.263921][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:83369f18 r5:00000001 [ 726.264175][ C0] r4:84210028 [ 726.264325][ C0] [<809bc30c>] (gpiod_set_value_nocheck) from [<809bc3a0>] (gpiod_set_value+0x3c/0x88) [ 726.264654][ C0] [<809bc364>] (gpiod_set_value) from [<809ccb3c>] (gpio_led_set+0x5c/0x60) [ 726.264959][ C0] r5:000000ff r4:832f8224 [ 726.265148][ C0] [<809ccae0>] (gpio_led_set) from [<809ca464>] (led_set_brightness+0x84/0x90) [ 726.265451][ C0] r5:000000ff r4:832f8224 [ 726.265611][ C0] [<809ca3e0>] (led_set_brightness) from [<809cbfe4>] (led_trigger_event+0x40/0x58) [ 726.265965][ C0] r5:000000ff r4:832f8224 [ 726.266142][ C0] [<809cbfa4>] (led_trigger_event) from [<809cd640>] (ledtrig_cpu+0xac/0xf4) [ 726.266473][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 726.266717][ C0] [<809cd594>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 726.267094][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 726.267371][ C0] [<80227a24>] (arch_cpu_idle_exit) from [<802b168c>] (do_idle+0x5c/0x2d8) [ 726.267699][ C0] [<802b1630>] (do_idle) from [<802b1c38>] (cpu_startup_entry+0x30/0x34) [ 726.268027][ C0] r10:8281aff4 r9:8280c680 r8:823bec64 r7:00000000 r6:deffc06c r5:828222e8 [ 726.268293][ C0] r4:000000ed [ 726.268432][ C0] [<802b1c08>] (cpu_startup_entry) from [<81aaf37c>] (kernel_init+0x0/0x138) [ 726.268739][ C0] [<81aaf29c>] (rest_init) from [<8260145c>] (start_kernel+0x844/0x860) [ 726.269054][ C0] [<82600c18>] (start_kernel) from [<00000000>] (0x0) [ 726.271994][ C0] Rebooting in 86400 seconds..