last executing test programs: 887.64077ms ago: executing program 0 (id=3685): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$TUNGETSNDBUF(r2, 0x8902, &(0x7f0000000080)) 761.958226ms ago: executing program 1 (id=3686): r0 = openat$selinux_avc_hash_stats(0xffffff9c, &(0x7f0000000240), 0x0, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) sendmsg$TIPC_NL_SOCK_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x0, 0x40004c0}, 0x20000000) 671.986437ms ago: executing program 0 (id=3687): r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/meminfo\x00', 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x2, 0x0, &(0x7f00000000c0)) 671.754647ms ago: executing program 1 (id=3688): r0 = openat$full(0xffffff9c, &(0x7f0000000000), 0x218000, 0x0) close(r0) memfd_create(&(0x7f0000000140)='\x00\xb40\x87\xcd\xcd#c\t!\".\x89\xb1\xf2(\x96\x00D\xdb4\xaa\x9dk\xac\xb1\xd6vP7]DM*\xb5\x05\xd7\x13\x1e\xe3\\\v\xa7\x14\x00n\'\xcb\xae\xfdR\x12\xb1', 0x0) write$P9_RWALK(r0, 0x0, 0x0) 492.541889ms ago: executing program 0 (id=3689): r0 = openat$pfkey(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) sendmsg$AUDIT_SIGNAL_INFO(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x4000004}, 0x884) 492.305489ms ago: executing program 1 (id=3690): r0 = openat$zero(0xffffff9c, &(0x7f0000000100), 0x280040, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x0, 0x4, 0x70bd27, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x10) 359.699626ms ago: executing program 1 (id=3691): r0 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000040), 0x42b02, 0x0) r1 = openat$mixer(0xffffff9c, &(0x7f0000000040), 0x28040, 0x0) r2 = dup2(r0, r1) ioctl$SNDCTL_DSP_SETFMT(r2, 0xc0045005, &(0x7f0000000140)=0xbbbe) 354.087056ms ago: executing program 0 (id=3692): socketpair(0x1, 0x805, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f00000013c0), r1) dup2(r1, r0) sendmsg$NL80211_CMD_NEW_KEY(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x4008080}, 0x4008000) 162.127621ms ago: executing program 1 (id=3693): r0 = openat$selinux_mls(0xffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) sendmsg$NL80211_CMD_GET_MPATH(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={0x0}, 0x1, 0x0, 0x0, 0x2}, 0x800) 161.93365ms ago: executing program 0 (id=3694): r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='.\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x0, 0x4000800}, 0x40000) 30.557106ms ago: executing program 1 (id=3695): r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000040), 0x622483, 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KDGETMODE(r0, 0x5451, 0x0) 0s ago: executing program 0 (id=3696): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) sendto$l2tp6(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x20) sendmsg$NL80211_CMD_UPDATE_OWE_INFO(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x1098}, 0x1, 0x0, 0x0, 0x2c004090}, 0x8801) kernel console output (not intermixed with test programs): [ 47.931076][ T29] audit: type=1400 audit(47.850:56): avc: denied { read write } for pid=3087 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 47.931589][ T29] audit: type=1400 audit(47.850:57): avc: denied { open } for pid=3087 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:65495' (ED25519) to the list of known hosts. [ 62.054191][ T29] audit: type=1400 audit(61.970:58): avc: denied { name_bind } for pid=3090 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 64.289006][ T29] audit: type=1400 audit(64.200:59): avc: denied { execute } for pid=3091 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 64.316142][ T29] audit: type=1400 audit(64.230:60): avc: denied { execute_no_trans } for pid=3091 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 68.385939][ T29] audit: type=1400 audit(68.300:61): avc: denied { mounton } for pid=3091 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 68.390111][ T29] audit: type=1400 audit(68.310:62): avc: denied { mount } for pid=3091 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 68.408791][ T3091] cgroup: Unknown subsys name 'net' [ 68.417443][ T29] audit: type=1400 audit(68.340:63): avc: denied { unmount } for pid=3091 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 68.553351][ T3091] cgroup: Unknown subsys name 'cpuset' [ 68.559763][ T3091] cgroup: Unknown subsys name 'hugetlb' [ 68.560659][ T3091] cgroup: Unknown subsys name 'rlimit' [ 68.756597][ T29] audit: type=1400 audit(68.680:64): avc: denied { setattr } for pid=3091 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 68.758651][ T29] audit: type=1400 audit(68.680:65): avc: denied { mounton } for pid=3091 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 68.762456][ T29] audit: type=1400 audit(68.680:66): avc: denied { mount } for pid=3091 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 68.959422][ T3093] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 68.963023][ T29] audit: type=1400 audit(68.880:67): avc: denied { relabelto } for pid=3093 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 68.970794][ T29] audit: type=1400 audit(68.890:68): avc: denied { write } for pid=3093 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 69.008030][ T29] audit: type=1400 audit(68.930:69): avc: denied { read } for pid=3091 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 69.016186][ T29] audit: type=1400 audit(68.930:70): avc: denied { open } for pid=3091 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 75.418333][ T3091] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 77.424416][ T29] audit: type=1400 audit(77.340:71): avc: denied { execmem } for pid=3094 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 77.492806][ T29] audit: type=1400 audit(77.410:72): avc: denied { read } for pid=3096 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 77.495750][ T29] audit: type=1400 audit(77.410:73): avc: denied { open } for pid=3096 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 77.499795][ T29] audit: type=1400 audit(77.420:74): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 77.525862][ T29] audit: type=1400 audit(77.450:75): avc: denied { module_request } for pid=3096 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 77.611731][ T29] audit: type=1400 audit(77.530:76): avc: denied { sys_module } for pid=3097 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 78.220847][ T29] audit: type=1400 audit(78.140:77): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 79.095577][ T3096] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 79.101653][ T3096] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 79.277702][ T3097] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 79.283324][ T3097] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 79.979204][ T3096] hsr_slave_0: entered promiscuous mode [ 79.982237][ T3096] hsr_slave_1: entered promiscuous mode [ 80.072140][ T3097] hsr_slave_0: entered promiscuous mode [ 80.073643][ T3097] hsr_slave_1: entered promiscuous mode [ 80.074373][ T3097] debugfs: 'hsr0' already exists in 'hsr' [ 80.081727][ T3097] Cannot create hsr debugfs directory [ 80.472614][ T29] audit: type=1400 audit(80.390:78): avc: denied { create } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 80.476984][ T29] audit: type=1400 audit(80.400:79): avc: denied { write } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 80.479532][ T29] audit: type=1400 audit(80.400:80): avc: denied { read } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 80.488674][ T3096] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 80.501055][ T3096] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 80.511412][ T3096] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 80.517070][ T3096] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 80.612679][ T3097] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 80.621816][ T3097] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 80.636846][ T3097] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 80.643772][ T3097] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 81.327203][ T3096] 8021q: adding VLAN 0 to HW filter on device bond0 [ 81.437849][ T3097] 8021q: adding VLAN 0 to HW filter on device bond0 [ 84.135791][ T3096] veth0_vlan: entered promiscuous mode [ 84.168991][ T3096] veth1_vlan: entered promiscuous mode [ 84.221855][ T3097] veth0_vlan: entered promiscuous mode [ 84.260781][ T3096] veth0_macvtap: entered promiscuous mode [ 84.271088][ T3097] veth1_vlan: entered promiscuous mode [ 84.279601][ T3096] veth1_macvtap: entered promiscuous mode [ 84.384139][ T31] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.389837][ T31] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.390293][ T31] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.390666][ T31] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.426159][ T3097] veth0_macvtap: entered promiscuous mode [ 84.438728][ T3097] veth1_macvtap: entered promiscuous mode [ 84.559981][ T29] audit: type=1400 audit(84.480:81): avc: denied { mount } for pid=3096 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 84.571573][ T29] audit: type=1400 audit(84.490:82): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/syzkaller.ILdt9z/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 84.580581][ T29] audit: type=1400 audit(84.500:83): avc: denied { mount } for pid=3096 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 84.594348][ T29] audit: type=1400 audit(84.510:84): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/syzkaller.ILdt9z/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 84.599889][ T29] audit: type=1400 audit(84.520:85): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/syzkaller.ILdt9z/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3095 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 84.614324][ T2146] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.619608][ T2146] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.620816][ T2146] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.621880][ T2146] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.631308][ T29] audit: type=1400 audit(84.550:86): avc: denied { unmount } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 84.639752][ T29] audit: type=1400 audit(84.560:87): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 84.643284][ T29] audit: type=1400 audit(84.560:88): avc: denied { mount } for pid=3096 comm="syz-executor" name="/" dev="gadgetfs" ino=2330 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 84.667039][ T29] audit: type=1400 audit(84.590:89): avc: denied { mount } for pid=3096 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 84.678107][ T29] audit: type=1400 audit(84.600:90): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 84.792157][ T3096] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 87.132580][ T3727] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3727 comm=syz.1.12 [ 89.665963][ T29] kauditd_printk_skb: 10 callbacks suppressed [ 89.668179][ T29] audit: type=1400 audit(89.580:101): avc: denied { create } for pid=3767 comm="syz.0.31" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 89.837768][ T29] audit: type=1400 audit(89.760:102): avc: denied { map_create } for pid=3771 comm="syz.0.33" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 89.839776][ T29] audit: type=1400 audit(89.760:103): avc: denied { bpf } for pid=3771 comm="syz.0.33" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 89.842187][ T29] audit: type=1400 audit(89.760:104): avc: denied { map_read map_write } for pid=3771 comm="syz.0.33" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 89.849849][ T29] audit: type=1400 audit(89.770:105): avc: denied { prog_load } for pid=3771 comm="syz.0.33" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 89.858962][ T29] audit: type=1400 audit(89.780:106): avc: denied { perfmon } for pid=3771 comm="syz.0.33" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 89.897619][ T29] audit: type=1400 audit(89.820:107): avc: denied { prog_run } for pid=3771 comm="syz.0.33" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 90.658387][ T29] audit: type=1400 audit(90.580:108): avc: denied { create } for pid=3778 comm="syz.0.37" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 90.662700][ T29] audit: type=1400 audit(90.580:109): avc: denied { write } for pid=3778 comm="syz.0.37" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 90.861428][ T3782] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3782 comm=syz.1.38 [ 91.685249][ T29] audit: type=1400 audit(91.600:110): avc: denied { append } for pid=3793 comm="syz.0.44" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 93.330742][ T3818] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3818 comm=syz.1.56 [ 95.249330][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 95.251434][ T29] audit: type=1400 audit(95.170:112): avc: denied { create } for pid=3835 comm="syz.1.65" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 95.265295][ T29] audit: type=1400 audit(95.180:113): avc: denied { ioctl } for pid=3835 comm="syz.1.65" path="socket:[2671]" dev="sockfs" ino=2671 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 96.642757][ T29] audit: type=1400 audit(96.560:114): avc: denied { audit_write } for pid=3843 comm="syz.1.69" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 100.583706][ T29] audit: type=1400 audit(100.500:115): avc: denied { create } for pid=3873 comm="syz.0.83" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 100.592406][ T29] audit: type=1400 audit(100.510:116): avc: denied { allowed } for pid=3873 comm="syz.0.83" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 100.601807][ T29] audit: type=1400 audit(100.520:117): avc: denied { create } for pid=3873 comm="syz.0.83" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 100.606683][ T29] audit: type=1400 audit(100.530:118): avc: denied { map } for pid=3873 comm="syz.0.83" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2777 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 100.610504][ T29] audit: type=1400 audit(100.530:119): avc: denied { read write } for pid=3873 comm="syz.0.83" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2777 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 100.632176][ T29] audit: type=1400 audit(100.550:120): avc: denied { write } for pid=3873 comm="syz.0.83" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 101.107193][ T29] audit: type=1400 audit(101.030:121): avc: denied { mounton } for pid=3883 comm="syz.0.88" path="/47/file0" dev="tmpfs" ino=260 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 101.113839][ T29] audit: type=1400 audit(101.030:122): avc: denied { remount } for pid=3883 comm="syz.0.88" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 101.148581][ T29] audit: type=1400 audit(101.070:123): avc: denied { unmount } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 101.611778][ T29] audit: type=1400 audit(101.530:124): avc: denied { getopt } for pid=3891 comm="syz.1.92" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 101.779836][ T3896] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=3896 comm=syz.1.94 [ 102.039636][ T3903] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3903 comm=syz.1.97 [ 103.244400][ T3933] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=3933 comm=syz.1.112 [ 103.473625][ T3939] Zero length message leads to an empty skb [ 104.667430][ T3979] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3979 comm=syz.1.135 [ 106.115713][ T29] kauditd_printk_skb: 10 callbacks suppressed [ 106.117870][ T29] audit: type=1400 audit(106.040:135): avc: denied { ioctl } for pid=4008 comm="syz.0.149" path="socket:[3043]" dev="sockfs" ino=3043 ioctlcmd=0x8901 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 106.284145][ T4017] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4017 comm=syz.0.153 [ 107.365692][ T29] audit: type=1400 audit(107.270:136): avc: denied { nlmsg_write } for pid=4043 comm="syz.1.166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 107.745979][ T29] audit: type=1400 audit(107.660:137): avc: denied { append } for pid=4058 comm="syz.0.173" name="nbd0" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 108.893361][ T4088] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4088 comm=syz.0.187 [ 110.159067][ T29] audit: type=1400 audit(110.080:138): avc: denied { getopt } for pid=4098 comm="syz.1.192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 113.062596][ T29] audit: type=1400 audit(112.980:139): avc: denied { create } for pid=4149 comm="syz.0.216" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 113.982038][ T29] audit: type=1400 audit(113.900:140): avc: denied { setopt } for pid=4171 comm="syz.1.227" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 114.259316][ T29] audit: type=1400 audit(114.180:141): avc: denied { setattr } for pid=4178 comm="syz.1.230" name="" dev="pipefs" ino=3646 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 114.445713][ T4183] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4183 comm=syz.1.232 [ 117.027417][ T4241] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1547 sclass=netlink_audit_socket pid=4241 comm=syz.1.261 [ 117.372715][ T29] audit: type=1400 audit(117.290:142): avc: denied { create } for pid=4250 comm="syz.1.266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 118.439348][ T29] audit: type=1400 audit(118.360:143): avc: denied { getopt } for pid=4282 comm="syz.1.282" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 118.542202][ T29] audit: type=1400 audit(118.460:144): avc: denied { lock } for pid=4284 comm="syz.0.283" path="socket:[3835]" dev="sockfs" ino=3835 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 118.553652][ T29] audit: type=1400 audit(118.470:145): avc: denied { ioctl } for pid=4284 comm="syz.0.283" path="socket:[3835]" dev="sockfs" ino=3835 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 118.718157][ T4291] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4291 comm=syz.1.285 [ 118.985185][ T4298] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5121 sclass=netlink_route_socket pid=4298 comm=syz.1.290 [ 119.705904][ T4319] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=525 sclass=netlink_route_socket pid=4319 comm=syz.0.299 [ 120.232806][ T4335] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4335 comm=syz.1.308 [ 121.398675][ T4364] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4364 comm=syz.0.322 [ 121.595014][ T29] audit: type=1400 audit(121.510:146): avc: denied { ioctl } for pid=4369 comm="syz.0.325" path="socket:[4005]" dev="sockfs" ino=4005 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 123.246731][ T4381] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5136 sclass=netlink_audit_socket pid=4381 comm=syz.1.330 [ 123.690991][ T29] audit: type=1400 audit(123.610:147): avc: denied { create } for pid=4390 comm="syz.1.335" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 123.697593][ T29] audit: type=1400 audit(123.620:148): avc: denied { ioctl } for pid=4390 comm="syz.1.335" path="socket:[4876]" dev="sockfs" ino=4876 ioctlcmd=0x703 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 124.120507][ T29] audit: type=1400 audit(124.040:149): avc: denied { associate } for pid=4400 comm="syz.1.340" name="pfkey" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 125.642956][ T4429] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1548 sclass=netlink_audit_socket pid=4429 comm=syz.0.351 [ 127.222548][ T4465] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=637 sclass=netlink_route_socket pid=4465 comm=syz.0.368 [ 127.705408][ T29] audit: type=1400 audit(127.620:150): avc: denied { create } for pid=4478 comm="syz.0.376" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 127.709108][ T29] audit: type=1400 audit(127.630:151): avc: denied { write } for pid=4478 comm="syz.0.376" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 127.832128][ T4483] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=4483 comm=syz.1.379 [ 127.983943][ T29] audit: type=1400 audit(127.900:152): avc: denied { create } for pid=4488 comm="syz.0.380" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 127.988394][ T29] audit: type=1400 audit(127.910:153): avc: denied { ioctl } for pid=4488 comm="syz.0.380" path="socket:[6167]" dev="sockfs" ino=6167 ioctlcmd=0x890b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 130.418822][ T29] audit: type=1400 audit(130.340:154): avc: denied { connect } for pid=4547 comm="syz.0.410" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 130.983780][ T4565] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=4565 comm=syz.1.419 [ 133.062997][ T29] audit: type=1400 audit(132.980:155): avc: denied { ioctl } for pid=4616 comm="syz.1.444" path="socket:[6503]" dev="sockfs" ino=6503 ioctlcmd=0x5522 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 133.661061][ T4631] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 134.688860][ T29] audit: type=1400 audit(134.610:156): avc: denied { setopt } for pid=4653 comm="syz.1.462" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 138.111659][ T4682] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4682 comm=syz.0.473 [ 138.702747][ T4698] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=4698 comm=syz.0.482 [ 138.859805][ T4702] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4702 comm=syz.0.485 [ 140.306002][ T4740] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4740 comm=syz.0.507 [ 143.976784][ T4785] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4785 comm=syz.1.527 [ 160.476437][ T4916] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5136 sclass=netlink_audit_socket pid=4916 comm=syz.0.588 [ 162.413397][ T4959] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4959 comm=syz.0.609 [ 168.518000][ T4994] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5125 sclass=netlink_route_socket pid=4994 comm=syz.1.624 [ 177.074454][ T29] audit: type=1400 audit(176.990:157): avc: denied { ioctl } for pid=5045 comm="syz.0.650" path="socket:[7394]" dev="sockfs" ino=7394 ioctlcmd=0x9366 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 177.253003][ T5052] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5052 comm=syz.1.653 [ 178.966196][ T29] audit: type=1400 audit(178.890:158): avc: denied { setopt } for pid=5090 comm="syz.1.672" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 189.740571][ T5248] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5248 comm=syz.0.744 [ 191.155935][ T29] audit: type=1400 audit(191.080:159): avc: denied { write } for pid=5293 comm="syz.0.768" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 203.951331][ T5483] capability: warning: `syz.0.861' uses 32-bit capabilities (legacy support in use) [ 204.031729][ T29] audit: type=1400 audit(203.950:160): avc: denied { setopt } for pid=5484 comm="syz.1.862" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 210.319982][ T29] audit: type=1400 audit(210.240:161): avc: denied { getopt } for pid=5569 comm="syz.1.903" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 216.324029][ T29] audit: type=1400 audit(216.240:162): avc: denied { map } for pid=5621 comm="syz.0.929" path="socket:[9614]" dev="sockfs" ino=9614 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 216.644883][ T29] audit: type=1400 audit(216.560:163): avc: denied { lock } for pid=5634 comm="syz.1.936" path="socket:[8812]" dev="sockfs" ino=8812 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 217.671250][ T29] audit: type=1400 audit(217.590:164): avc: denied { lock } for pid=5674 comm="syz.1.956" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 218.622607][ T29] audit: type=1400 audit(218.540:165): avc: denied { setopt } for pid=5707 comm="syz.1.968" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 223.061778][ T5778] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5778 comm=syz.0.1004 [ 223.217707][ T29] audit: type=1400 audit(223.140:166): avc: denied { write } for pid=5781 comm="syz.0.1006" name="ip_mr_cache" dev="proc" ino=4026532677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 224.029688][ T29] audit: type=1400 audit(223.950:167): avc: denied { read } for pid=5783 comm="syz.0.1011" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 224.638729][ T5800] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5800 comm=syz.1.1015 [ 225.370407][ T5809] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5809 comm=syz.1.1023 [ 225.535784][ T5814] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5814 comm=syz.0.1020 [ 225.547743][ T29] audit: type=1400 audit(225.470:168): avc: denied { remount } for pid=5811 comm="syz.1.1021" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 225.575666][ T29] audit: type=1400 audit(225.490:169): avc: denied { unmount } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 229.000992][ T29] audit: type=1400 audit(228.920:170): avc: denied { bind } for pid=5882 comm="syz.1.1054" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 229.006642][ T29] audit: type=1400 audit(228.920:171): avc: denied { name_bind } for pid=5882 comm="syz.1.1054" src=63485 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 229.007803][ T29] audit: type=1400 audit(228.930:172): avc: denied { node_bind } for pid=5882 comm="syz.1.1054" saddr=224.0.0.1 src=63485 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 229.155239][ T29] audit: type=1400 audit(229.070:173): avc: denied { mount } for pid=5884 comm="syz.0.1055" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 231.861860][ T5900] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5131 sclass=netlink_audit_socket pid=5900 comm=syz.0.1066 [ 236.668950][ T29] audit: type=1400 audit(236.590:174): avc: denied { read } for pid=5934 comm="syz.0.1078" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 238.739882][ T5956] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5121 sclass=netlink_route_socket pid=5956 comm=syz.0.1088 [ 240.297168][ T29] audit: type=1400 audit(240.220:175): avc: denied { read append } for pid=5973 comm="syz.0.1097" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 240.300176][ T29] audit: type=1400 audit(240.220:176): avc: denied { open } for pid=5973 comm="syz.0.1097" path="/dev/binderfs/binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 245.688119][ T29] audit: type=1400 audit(245.610:177): avc: denied { write } for pid=6018 comm="syz.0.1117" path="socket:[10384]" dev="sockfs" ino=10384 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 247.257545][ T29] audit: type=1400 audit(247.180:178): avc: denied { getopt } for pid=6034 comm="syz.1.1125" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 251.016675][ T6079] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=6079 comm=syz.1.1147 [ 253.186005][ T29] audit: type=1400 audit(253.110:179): avc: denied { getopt } for pid=6108 comm="syz.0.1162" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 253.550574][ T29] audit: type=1400 audit(253.470:180): avc: denied { block_suspend } for pid=6118 comm="syz.1.1167" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 253.847028][ T29] audit: type=1400 audit(253.770:181): avc: denied { nlmsg_read } for pid=6128 comm="syz.0.1170" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 254.179982][ T29] audit: type=1400 audit(254.100:182): avc: denied { ioctl } for pid=6136 comm="syz.1.1174" path="socket:[10567]" dev="sockfs" ino=10567 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 255.057249][ T6165] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1540 sclass=netlink_route_socket pid=6165 comm=syz.0.1188 [ 255.393431][ T6174] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6174 comm=syz.1.1193 [ 256.070271][ T6196] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6196 comm=syz.1.1204 [ 256.500833][ T29] audit: type=1400 audit(256.420:183): avc: denied { compute_member } for pid=6206 comm="syz.1.1209" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 256.761072][ T6215] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6215 comm=syz.1.1213 [ 257.185827][ T6227] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65525 sclass=netlink_route_socket pid=6227 comm=syz.1.1218 [ 257.580877][ T6239] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6239 comm=syz.0.1224 [ 259.342199][ T6290] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6290 comm=syz.1.1250 [ 259.508396][ T29] audit: type=1400 audit(259.430:184): avc: denied { connect } for pid=6293 comm="syz.1.1252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 264.356873][ T6364] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6364 comm=syz.1.1285 [ 264.668975][ T6372] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=6372 comm=syz.1.1287 [ 264.928714][ T6378] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6378 comm=syz.1.1292 [ 266.589074][ T6418] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6418 comm=syz.0.1311 [ 266.682179][ T6420] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=6420 comm=syz.0.1313 [ 267.970068][ T6454] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6454 comm=syz.0.1327 [ 272.089925][ T6504] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6504 comm=syz.0.1352 [ 273.403047][ T29] audit: type=1400 audit(273.320:185): avc: denied { setopt } for pid=6544 comm="syz.1.1374" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 273.895810][ T6560] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6560 comm=syz.0.1381 [ 274.365776][ T29] audit: type=1400 audit(274.280:186): avc: denied { connect } for pid=6573 comm="syz.1.1388" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 284.387070][ T6625] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6625 comm=syz.1.1411 [ 284.487447][ T29] audit: type=1400 audit(284.410:187): avc: denied { ioctl } for pid=6627 comm="syz.1.1414" path="socket:[13526]" dev="sockfs" ino=13526 ioctlcmd=0xaf77 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 284.751783][ T6637] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6637 comm=syz.0.1417 [ 285.204415][ T6653] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6653 comm=syz.1.1426 [ 290.404461][ T6745] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6745 comm=syz.1.1471 [ 290.458579][ T6746] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5137 sclass=netlink_route_socket pid=6746 comm=syz.0.1470 [ 291.288279][ T6770] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=2306 sclass=netlink_tcpdiag_socket pid=6770 comm=syz.1.1483 [ 291.429494][ T6774] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6774 comm=syz.1.1485 [ 292.160381][ T29] audit: type=1400 audit(292.080:188): avc: denied { create } for pid=6794 comm="syz.1.1496" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 292.172098][ T29] audit: type=1400 audit(292.090:189): avc: denied { setopt } for pid=6794 comm="syz.1.1496" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 293.123977][ T29] audit: type=1400 audit(293.040:190): avc: denied { name_bind } for pid=6819 comm="syz.0.1508" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 293.124412][ T29] audit: type=1400 audit(293.040:191): avc: denied { node_bind } for pid=6819 comm="syz.0.1508" saddr=172.20.20.170 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 295.700910][ T6835] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6835 comm=syz.1.1515 [ 296.060650][ T29] audit: type=1400 audit(295.980:192): avc: denied { watch watch_reads } for pid=6844 comm="syz.1.1521" path="pipe:[577]" dev="pipefs" ino=577 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 296.220540][ T6850] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6850 comm=syz.1.1523 [ 304.287275][ T29] audit: type=1400 audit(304.210:193): avc: denied { create } for pid=6970 comm="syz.1.1586" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 304.308905][ T29] audit: type=1400 audit(304.220:194): avc: denied { ioctl } for pid=6970 comm="syz.1.1586" path="socket:[14158]" dev="sockfs" ino=14158 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 304.309428][ T29] audit: type=1400 audit(304.230:195): avc: denied { bind } for pid=6970 comm="syz.1.1586" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 304.377750][ T6972] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=2306 sclass=netlink_tcpdiag_socket pid=6972 comm=syz.0.1581 [ 305.006014][ T6990] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 305.018358][ T29] audit: type=1400 audit(304.940:196): avc: denied { read } for pid=6989 comm="syz.0.1592" lport=20004 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 306.245257][ T7027] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1550 sclass=netlink_audit_socket pid=7027 comm=syz.1.1608 [ 309.037565][ T29] audit: type=1400 audit(308.960:197): avc: denied { unmount } for pid=7072 comm="syz.0.1631" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 312.075958][ T7168] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7168 comm=syz.1.1679 [ 312.109931][ T29] audit: type=1400 audit(312.030:198): avc: denied { write } for pid=7166 comm="syz.0.1678" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 315.623009][ T7213] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7213 comm=syz.1.1701 [ 320.096259][ T7248] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7248 comm=syz.0.1717 [ 322.483551][ T29] audit: type=1400 audit(322.400:199): avc: denied { create } for pid=7306 comm="syz.0.1746" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 322.516492][ T29] audit: type=1400 audit(322.440:200): avc: denied { write } for pid=7306 comm="syz.0.1746" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 322.530990][ T29] audit: type=1400 audit(322.450:201): avc: denied { ioctl } for pid=7306 comm="syz.0.1746" path="socket:[14827]" dev="sockfs" ino=14827 ioctlcmd=0x8915 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 325.879798][ T7405] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7405 comm=syz.0.1798 [ 326.123822][ T29] audit: type=1400 audit(326.040:202): avc: denied { getopt } for pid=7410 comm="syz.1.1799" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 327.074115][ T7440] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7440 comm=syz.0.1812 [ 327.636581][ T7460] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7460 comm=syz.1.1823 [ 328.254318][ T7479] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7479 comm=syz.0.1830 [ 328.400415][ T7483] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7483 comm=syz.1.1832 [ 329.077026][ T7503] block nbd1: NBD_DISCONNECT [ 330.687631][ T7548] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7548 comm=syz.0.1865 [ 331.246940][ T7566] block nbd0: NBD_DISCONNECT [ 332.575984][ T7605] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5137 sclass=netlink_route_socket pid=7605 comm=syz.1.1891 [ 333.738281][ T29] audit: type=1400 audit(333.660:203): avc: denied { write } for pid=7633 comm="syz.1.1907" path="socket:[15359]" dev="sockfs" ino=15359 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 340.007417][ T7724] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7724 comm=syz.0.1950 [ 345.429352][ T7794] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7794 comm=syz.1.1984 [ 351.568442][ T29] audit: type=1400 audit(351.490:204): avc: denied { create } for pid=7867 comm="syz.1.2019" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 351.576905][ T29] audit: type=1400 audit(351.500:205): avc: denied { getopt } for pid=7867 comm="syz.1.2019" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 351.889373][ T7872] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7872 comm=syz.1.2021 [ 361.697789][ T29] audit: type=1400 audit(361.620:206): avc: denied { read } for pid=7955 comm="syz.0.2062" path="socket:[17003]" dev="sockfs" ino=17003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 361.776096][ T7959] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7959 comm=syz.1.2064 [ 362.249214][ T7971] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7971 comm=syz.0.2069 [ 363.860418][ T8020] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8020 comm=syz.0.2093 [ 371.313945][ T8191] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8191 comm=syz.1.2176 [ 378.271900][ T8268] misc userio: Invalid payload size [ 378.276280][ T8268] misc userio: Invalid payload size [ 384.595602][ T29] audit: type=1400 audit(384.500:207): avc: denied { sqpoll } for pid=8295 comm="syz.1.2228" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 384.829682][ T29] audit: type=1400 audit(384.750:208): avc: denied { create } for pid=8302 comm="syz.0.2230" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 384.833969][ T29] audit: type=1400 audit(384.750:209): avc: denied { write } for pid=8302 comm="syz.0.2230" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 385.150852][ T8315] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8315 comm=syz.1.2236 [ 385.354117][ T8321] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8321 comm=syz.1.2240 [ 397.299233][ T8407] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8407 comm=syz.0.2273 [ 397.598889][ T29] audit: type=1400 audit(397.520:210): avc: denied { mounton } for pid=8412 comm="syz.0.2276" path="/1088/file0" dev="tmpfs" ino=5573 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=fifo_file permissive=1 [ 397.612774][ T29] audit: type=1400 audit(397.530:211): avc: denied { mounton } for pid=8412 comm="syz.0.2276" path="/1088/file0" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=file permissive=1 [ 398.086377][ T8425] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8425 comm=syz.1.2281 [ 398.731738][ T8441] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8441 comm=syz.0.2288 [ 405.834301][ T8509] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8509 comm=syz.1.2320 [ 406.084047][ T29] audit: type=1400 audit(406.000:212): avc: denied { mounton } for pid=8516 comm="syz.1.2324" path="/1213/file0" dev="tmpfs" ino=6242 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=sock_file permissive=1 [ 409.017671][ T8570] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8570 comm=syz.1.2348 [ 411.853687][ T8590] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8590 comm=syz.1.2362 [ 412.583814][ T8616] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8616 comm=syz.0.2370 [ 425.406638][ T8820] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=5126 sclass=netlink_tcpdiag_socket pid=8820 comm=syz.1.2469 [ 432.382118][ T8988] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8988 comm=syz.1.2550 [ 433.532425][ T9006] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9006 comm=syz.0.2559 [ 433.951285][ T9010] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9010 comm=syz.1.2560 [ 434.283681][ T9014] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=521 sclass=netlink_audit_socket pid=9014 comm=syz.1.2562 [ 435.491311][ T9031] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=9031 comm=syz.1.2571 [ 436.463819][ T29] audit: type=1400 audit(436.380:213): avc: denied { ioctl } for pid=9042 comm="syz.0.2577" path="socket:[21925]" dev="sockfs" ino=21925 ioctlcmd=0x8904 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 438.262454][ T29] audit: type=1400 audit(438.180:214): avc: denied { lock } for pid=9059 comm="syz.0.2585" path="socket:[21956]" dev="sockfs" ino=21956 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 441.243026][ T9101] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=519 sclass=netlink_route_socket pid=9101 comm=syz.1.2606 [ 441.511574][ T9110] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=42 sclass=netlink_audit_socket pid=9110 comm=syz.0.2608 [ 442.791866][ T9143] input: syz0 as /devices/virtual/input/input3 [ 443.899498][ T9169] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9169 comm=syz.1.2637 [ 445.826191][ T29] audit: type=1400 audit(445.740:215): avc: denied { setopt } for pid=9215 comm="syz.1.2660" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 447.015898][ T9246] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9246 comm=syz.1.2675 [ 449.038017][ T9270] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2583 sclass=netlink_route_socket pid=9270 comm=syz.0.2686 [ 453.362678][ T9311] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9311 comm=syz.0.2705 [ 454.246259][ T29] audit: type=1400 audit(454.170:216): avc: denied { read } for pid=9321 comm="syz.0.2710" path="socket:[21324]" dev="sockfs" ino=21324 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 462.962968][ T9411] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5129 sclass=netlink_route_socket pid=9411 comm=syz.1.2755 [ 465.527458][ T9487] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9487 comm=syz.0.2792 [ 468.355463][ T9533] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=9533 comm=syz.0.2813 [ 468.956731][ T9561] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9561 comm=syz.1.2827 [ 470.778845][ T9617] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2050 sclass=netlink_route_socket pid=9617 comm=syz.0.2855 [ 470.898116][ T29] audit: type=1400 audit(470.820:217): avc: denied { getattr } for pid=9618 comm="syz.1.2856" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 471.548623][ T9639] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9639 comm=syz.1.2864 [ 476.172802][ T9703] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2051 sclass=netlink_route_socket pid=9703 comm=syz.0.2898 [ 481.625596][ T9783] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9783 comm=syz.1.2936 [ 483.773913][ T9841] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9841 comm=syz.0.2964 [ 490.905401][ T29] audit: type=1400 audit(490.820:218): avc: denied { read } for pid=9967 comm="syz.0.3025" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 491.407426][ T29] audit: type=1400 audit(491.330:219): avc: denied { ioctl } for pid=9967 comm="syz.0.3025" path="socket:[23369]" dev="sockfs" ino=23369 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 494.232490][ T9997] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9997 comm=syz.0.3039 [ 496.782950][ T29] audit: type=1400 audit(496.700:220): avc: denied { watch watch_reads } for pid=10037 comm="syz.0.3058" path="/1418" dev="tmpfs" ino=7260 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 505.469116][T10137] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=10137 comm=syz.1.3106 [ 505.698661][T10143] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10143 comm=syz.0.3109 [ 507.955723][T10178] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=272 sclass=netlink_route_socket pid=10178 comm=syz.1.3126 [ 507.976481][T10178] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10178 comm=syz.1.3126 [ 511.228437][T10214] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=10214 comm=syz.0.3143 [ 514.007183][ T29] audit: type=1400 audit(513.930:221): avc: denied { map } for pid=10288 comm="syz.1.3182" path="/dev/nbd1" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 517.988945][T10364] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10364 comm=syz.0.3217 [ 522.637062][ T29] audit: type=1400 audit(522.550:222): avc: denied { ioctl } for pid=10429 comm="syz.1.3248" path="ipc:[4026532651]" dev="nsfs" ino=4026532651 ioctlcmd=0x545e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 523.266751][T10452] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=10452 comm=syz.1.3259 [ 524.026691][T10472] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10472 comm=syz.0.3268 [ 530.477053][T10520] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=10520 comm=syz.1.3290 [ 530.478341][T10520] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=10520 comm=syz.1.3290 [ 530.823638][T10532] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10532 comm=syz.1.3296 [ 532.835881][T10558] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10558 comm=syz.0.3308 [ 532.914018][ T29] audit: type=1400 audit(532.830:223): avc: denied { map } for pid=10560 comm="syz.1.3311" path="/dev/fb0" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 532.917819][ T29] audit: type=1400 audit(532.830:224): avc: denied { execute } for pid=10560 comm="syz.1.3311" path="/dev/fb0" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 533.005580][T10564] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=10564 comm=syz.0.3310 [ 533.340408][T10573] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=10573 comm=syz.1.3316 [ 534.003611][T10592] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10592 comm=syz.0.3326 [ 539.141217][T10662] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=627 sclass=netlink_route_socket pid=10662 comm=syz.1.3359 [ 543.559383][T10738] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5131 sclass=netlink_route_socket pid=10738 comm=syz.1.3395 [ 544.833075][T10777] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1550 sclass=netlink_audit_socket pid=10777 comm=syz.1.3414 [ 546.049967][T10813] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10813 comm=syz.1.3435 [ 546.777113][T10837] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=10837 comm=syz.0.3443 [ 549.251362][ T29] audit: type=1400 audit(549.170:225): avc: denied { execute } for pid=10921 comm="syz.1.3485" path=2F6D656D66643A0B656DDA9952406DFCFE9B232AFF202864656C6574656429 dev="tmpfs" ino=1046 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 550.316052][ T29] audit: type=1400 audit(550.240:226): avc: denied { write } for pid=10956 comm="syz.1.3502" name="cgroup.subtree_control" dev="cgroup2" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 550.320259][ T29] audit: type=1400 audit(550.240:227): avc: denied { open } for pid=10956 comm="syz.1.3502" path="" dev="cgroup2" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 553.459175][ T29] audit: type=1400 audit(553.380:228): avc: denied { setopt } for pid=11025 comm="syz.0.3536" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 555.579477][ T2875] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 555.736104][ T2875] usb 2-1: Using ep0 maxpacket: 32 [ 555.752632][ T2875] usb 2-1: config 0 has an invalid interface number: 67 but max is 0 [ 555.753685][ T2875] usb 2-1: config 0 has no interface number 0 [ 555.764167][ T2875] usb 2-1: New USB device found, idVendor=0424, idProduct=9901, bcdDevice=c2.57 [ 555.775836][ T2875] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 555.777101][ T2875] usb 2-1: Product: syz [ 555.777890][ T2875] usb 2-1: Manufacturer: syz [ 555.778593][ T2875] usb 2-1: SerialNumber: syz [ 555.788808][ T2875] usb 2-1: config 0 descriptor?? [ 555.801504][ T2875] smsc95xx v2.0.0 [ 556.221035][ T2875] smsc95xx 2-1:0.67 (unnamed net_device) (uninitialized): Failed to read reg index 0x00000030: -32 [ 556.223648][ T2875] smsc95xx 2-1:0.67 (unnamed net_device) (uninitialized): Error reading E2P_CMD [ 556.228353][ C1] raw-gadget.0 gadget.1: ignoring, device is not running [ 556.230472][ T2875] smsc95xx 2-1:0.67 (unnamed net_device) (uninitialized): Failed to write reg index 0x00000014: -32 [ 556.233447][ T2875] smsc95xx 2-1:0.67: probe with driver smsc95xx failed with error -32 [ 556.245506][ T2875] usb 2-1: USB disconnect, device number 2 [ 558.733013][T11129] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=11129 comm=syz.0.3577 [ 558.733375][T11129] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=11129 comm=syz.0.3577 [ 561.817804][T11216] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1015 sclass=netlink_route_socket pid=11216 comm=syz.0.3621 [ 562.502913][T11223] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11223 comm=syz.1.3624 [ 566.451563][T11268] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=11268 comm=syz.0.3646 [ 567.379139][T11293] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11293 comm=syz.0.3658 [ 569.272915][T11326] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=11326 comm=syz.0.3674 [ 990.315269][ C1] watchdog: BUG: soft lockup - CPU#1 stuck for 430s! [swapper/1:0] [ 990.315611][ C1] Modules linked in: [ 990.316807][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G L syzkaller #0 PREEMPT [ 990.317356][ C1] Tainted: [L]=SOFTLOCKUP [ 990.317429][ C1] Hardware name: ARM-Versatile Express [ 990.317699][ C1] PC is at _raw_spin_lock+0x40/0x58 [ 990.318508][ C1] LR is at _raw_spin_lock+0x18/0x58 [ 990.318565][ C1] pc : [<81abbef4>] lr : [<81abbecc>] psr: 80000113 [ 990.318614][ C1] sp : df805d68 ip : df805d68 fp : df805d7c [ 990.318656][ C1] r10: 81c05450 r9 : 8425fa40 r8 : 8402b288 [ 990.318701][ C1] r7 : 8425fb68 r6 : 00000000 r5 : 00000001 r4 : 8425fb68 [ 990.318748][ C1] r3 : 0000ffb4 r2 : 0000ffb5 r1 : 00000000 r0 : 00000001 [ 990.318873][ C1] Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 990.318960][ C1] Control: 30c5387d Table: 84b7b000 DAC: 00000000 [ 990.319070][ C1] Call trace: frame pointer underflow [ 990.319413][ C1] [<81abbeb4>] (_raw_spin_lock) from [<809c7a2c>] (gpio_mmio_set+0x44/0x80) [ 990.319772][ C1] r5:00000001 r4:8425fa40 [ 990.319877][ C1] [<809c79e8>] (gpio_mmio_set) from [<809b81e8>] (gpiochip_set+0x1c/0x44) [ 990.319968][ C1] r7:00000000 r6:00000000 r5:00000000 r4:8407fc00 [ 990.319990][ C1] [<809b81cc>] (gpiochip_set) from [<809baab0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 990.320054][ C1] [<809baa38>] (gpiod_set_raw_value_commit) from [<809bc350>] (gpiod_set_value_nocheck+0x44/0x58) [ 990.320138][ C1] r10:81c05450 r9:df805ebc r8:00000102 r7:00006a79 r6:00000008 r5:00000000 [ 990.320178][ C1] r4:8407fc00 [ 990.320248][ C1] [<809bc30c>] (gpiod_set_value_nocheck) from [<809bc3a0>] (gpiod_set_value+0x3c/0x88) [ 990.320318][ C1] [<809bc364>] (gpiod_set_value) from [<809ccb3c>] (gpio_led_set+0x5c/0x60) [ 990.320389][ C1] r5:832fd844 r4:832fd844 [ 990.320411][ C1] [<809ccae0>] (gpio_led_set) from [<809ca3d4>] (led_set_brightness_nosleep+0x38/0x44) [ 990.320471][ C1] r5:832fd844 r4:84a8010c [ 990.320492][ C1] [<809ca39c>] (led_set_brightness_nosleep) from [<809cd438>] (led_heartbeat_function+0x84/0x144) [ 990.320547][ C1] [<809cd3b4>] (led_heartbeat_function) from [<80327070>] (call_timer_fn+0x30/0x220) [ 990.320627][ C1] r7:00006a79 r6:809cd3b4 r5:84a8010c r4:83216000 [ 990.320652][ C1] [<80327040>] (call_timer_fn) from [<80327524>] (__run_timers+0x2c4/0x3f8) [ 990.320733][ C1] r9:df805ebc r8:00006a79 r7:00000000 r6:809cd3b4 r5:dddd9f00 r4:84a8010c [ 990.320755][ C1] [<80327260>] (__run_timers) from [<803276c0>] (run_timer_base+0x68/0x78) [ 990.320826][ C1] r10:83216000 r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 [ 990.320849][ C1] r4:dddd9f00 [ 990.320867][ C1] [<80327658>] (run_timer_base) from [<803276ec>] (run_timer_softirq+0x1c/0x34) [ 990.320923][ C1] r4:82804084 [ 990.320940][ C1] [<803276d0>] (run_timer_softirq) from [<8025b65c>] (handle_softirqs+0x140/0x458) [ 990.321005][ C1] [<8025b51c>] (handle_softirqs) from [<8025bad0>] (__irq_exit_rcu+0x110/0x1d0) [ 990.321084][ C1] r10:00000000 r9:83216000 r8:00000000 r7:df865e08 r6:82443f98 r5:8247f0cc [ 990.321107][ C1] r4:83216000 [ 990.321125][ C1] [<8025b9c0>] (__irq_exit_rcu) from [<8025be48>] (irq_exit+0x10/0x18) [ 990.321195][ C1] r5:8247f0cc r4:826c3a9c [ 990.321216][ C1] [<8025be38>] (irq_exit) from [<81aad964>] (generic_handle_arch_irq+0x7c/0x80) [ 990.321287][ C1] [<81aad8e8>] (generic_handle_arch_irq) from [<81a7d904>] (call_with_stack+0x1c/0x20) [ 990.321378][ C1] r9:83216000 r8:8402b288 r7:df865e3c r6:ffffffff r5:60000013 r4:809c822c [ 990.321401][ C1] [<81a7d8e8>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc) [ 990.321552][ C1] Exception stack(0xdf865e08 to 0xdf865e50) [ 990.321758][ C1] 5e00: e015f008 0000000d 0000ffb4 00000000 e015f008 0000000d [ 990.321827][ C1] 5e20: 00000001 8425fb68 8402b288 8425fa40 00000000 df865e6c df865e58 df865e58 [ 990.321861][ C1] 5e40: 809c8228 809c822c 60000013 ffffffff [ 990.321926][ C1] [<809c820c>] (gpio_mmio_write32) from [<809c7a4c>] (gpio_mmio_set+0x64/0x80) [ 990.322009][ C1] r5:00000008 r4:8425fa40 [ 990.322034][ C1] [<809c79e8>] (gpio_mmio_set) from [<809b81e8>] (gpiochip_set+0x1c/0x44) [ 990.322116][ C1] r7:00000001 r6:00000000 r5:00000003 r4:8407fc3c [ 990.322140][ C1] [<809b81cc>] (gpiochip_set) from [<809baab0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 990.322208][ C1] [<809baa38>] (gpiod_set_raw_value_commit) from [<809bc350>] (gpiod_set_value_nocheck+0x44/0x58) [ 990.322291][ C1] r10:00000000 r9:00000000 r8:00000001 r7:ddde24c0 r6:8391b5d8 r5:00000001 [ 990.322317][ C1] r4:8407fc3c [ 990.322336][ C1] [<809bc30c>] (gpiod_set_value_nocheck) from [<809bc3a0>] (gpiod_set_value+0x3c/0x88) [ 990.322415][ C1] [<809bc364>] (gpiod_set_value) from [<809ccb3c>] (gpio_led_set+0x5c/0x60) [ 990.322478][ C1] r5:000000ff r4:832fdb14 [ 990.322497][ C1] [<809ccae0>] (gpio_led_set) from [<809ca464>] (led_set_brightness+0x84/0x90) [ 990.322559][ C1] r5:000000ff r4:832fdb14 [ 990.322580][ C1] [<809ca3e0>] (led_set_brightness) from [<809cbfe4>] (led_trigger_event+0x40/0x58) [ 990.322640][ C1] r5:000000ff r4:832fdb14 [ 990.322657][ C1] [<809cbfa4>] (led_trigger_event) from [<809cd640>] (ledtrig_cpu+0xac/0xf4) [ 990.322721][ C1] r7:ddde24c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 990.322743][ C1] [<809cd594>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 990.322827][ C1] r9:00000000 r8:00000001 r7:8280c710 r6:83216000 r5:8280c6d0 r4:00000001 [ 990.322852][ C1] [<80227a24>] (arch_cpu_idle_exit) from [<802b168c>] (do_idle+0x5c/0x2d8) [ 990.322920][ C1] [<802b1630>] (do_idle) from [<802b1c38>] (cpu_startup_entry+0x30/0x34) [ 990.323000][ C1] r10:00000000 r9:414fc0f0 r8:80003000 r7:82a7b4a4 r6:83216000 r5:00000001 [ 990.323023][ C1] r4:00000092 [ 990.323040][ C1] [<802b1c08>] (cpu_startup_entry) from [<8022f360>] (secondary_start_kernel+0x128/0x194) [ 990.323107][ C1] [<8022f238>] (secondary_start_kernel) from [<80220094>] (__enable_mmu+0x0/0xc) [ 990.323191][ C1] r7:82a7b4a4 r6:30c0387d r5:00000000 r4:830b7bc0 [ 990.323558][ C1] Sending NMI from CPU 1 to CPUs 0: [ 990.324407][ C0] NMI backtrace for cpu 0 [ 990.324542][ C0] CPU: 0 UID: 0 PID: 4026 Comm: syz.0.157 Tainted: G L syzkaller #0 PREEMPT [ 990.324604][ C0] Tainted: [L]=SOFTLOCKUP [ 990.324617][ C0] Hardware name: ARM-Versatile Express [ 990.324631][ C0] PC is at 0x194ac [ 990.324949][ C0] LR is at 0x194ac [ 990.324962][ C0] pc : [<000194ac>] lr : [<000194ac>] psr: 20000010 [ 990.324976][ C0] sp : 20003750 ip : 20003750 fp : 76f490bc [ 990.324987][ C0] r10: 00006364 r9 : 00000000 r8 : 00300000 [ 990.324998][ C0] r7 : 00000000 r6 : 00000000 r5 : 00000000 r4 : 00000000 [ 990.325010][ C0] r3 : 00000000 r2 : 000001e4 r1 : 00000004 r0 : ffffffff [ 990.325022][ C0] Flags: nzCv IRQs on FIQs on Mode USER_32 ISA ARM Segment user [ 990.325044][ C0] Control: 30c5387d Table: 85b76a00 DAC: fffffffd [ 990.325055][ C0] Call trace: invalid frame pointer 0x76f490bc [ 990.326803][ C1] Kernel panic - not syncing: softlockup: hung tasks [ 990.357461][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G L syzkaller #0 PREEMPT [ 990.357884][ C1] Tainted: [L]=SOFTLOCKUP [ 990.358079][ C1] Hardware name: ARM-Versatile Express [ 990.358333][ C1] Call trace: frame pointer underflow [ 990.358730][ C1] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 990.359114][ C1] r7:822965a4 r6:83216000 r5:00000000 r4:82295754 [ 990.359532][ C1] [<80201b58>] (show_stack) from [<8021ee08>] (dump_stack_lvl+0x54/0x7c) [ 990.359887][ C1] [<8021edb4>] (dump_stack_lvl) from [<8021ee48>] (dump_stack+0x18/0x1c) [ 990.360287][ C1] r5:00000000 r4:82a7bd14 [ 990.360495][ C1] [<8021ee30>] (dump_stack) from [<80202648>] (vpanic+0xe0/0x2e8) [ 990.360885][ C1] [<80202568>] (vpanic) from [<80202884>] (trace_suspend_resume+0x0/0xd8) [ 990.361214][ C1] r7:82ac27f8 [ 990.361391][ C1] [<80202850>] (panic) from [<80383fcc>] (watchdog_timer_fn+0x2dc/0x350) [ 990.361795][ C1] r3:00000001 r2:00004000 r1:82a7bd1c r0:822965a4 [ 990.362099][ C1] [<80383cf0>] (watchdog_timer_fn) from [<80329c64>] (__hrtimer_run_queues+0x1c4/0x454) [ 990.362665][ C1] r10:83216000 r9:00000000 r8:ddddb130 r7:80383cf0 r6:ddddb000 r5:ddddb040 [ 990.363042][ C1] r4:ddddb5d8 [ 990.363271][ C1] [<80329aa0>] (__hrtimer_run_queues) from [<8032b268>] (hrtimer_interrupt+0x148/0x2bc) [ 990.363703][ C1] r10:8eec0fa0 r9:ddddb180 r8:ddddb130 r7:000000e6 r6:00000003 r5:20000193 [ 990.364127][ C1] r4:ddddb000 [ 990.364397][ C1] [<8032b120>] (hrtimer_interrupt) from [<813408e0>] (arch_timer_handler_virt+0x30/0x38) [ 990.365369][ C1] r10:81d0fc78 r9:8309e400 r8:00000000 r7:00000001 r6:00000001 r5:82498528 [ 990.365801][ C1] r4:8309de40 [ 990.365993][ C1] [<813408b0>] (arch_timer_handler_virt) from [<802efab4>] (handle_percpu_devid_irq+0x128/0x34c) [ 990.366456][ C1] [<802ef98c>] (handle_percpu_devid_irq) from [<802e8c44>] (handle_irq_desc+0x74/0x84) [ 990.367010][ C1] r10:81c05450 r9:83216000 r8:00000000 r7:df80a00c r6:826c2388 r5:df80a000 [ 990.367298][ C1] r4:8280cc44 [ 990.367478][ C1] [<802e8bd0>] (handle_irq_desc) from [<802e8cc0>] (generic_handle_domain_irq+0x18/0x1c) [ 990.368054][ C1] [<802e8ca8>] (generic_handle_domain_irq) from [<802012c8>] (gic_handle_irq+0x68/0x7c) [ 990.368742][ C1] [<80201260>] (gic_handle_irq) from [<81aad948>] (generic_handle_arch_irq+0x60/0x80) [ 990.369272][ C1] r7:df805d18 r6:82443f98 r5:8247f0cc r4:826c3a9c [ 990.369576][ C1] [<81aad8e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 990.369986][ C1] Exception stack(0xdf805d18 to 0xdf805d60) [ 990.370244][ C1] 5d00: 00000001 00000000 [ 990.370637][ C1] 5d20: 0000ffb5 0000ffb4 8425fb68 00000001 00000000 8425fb68 8402b288 8425fa40 [ 990.371059][ C1] 5d40: 81c05450 df805d7c df805d68 df805d68 81abbecc 81abbef4 80000113 ffffffff [ 990.371426][ C1] r9:83216000 r8:8402b288 r7:df805d4c r6:ffffffff r5:80000113 r4:81abbef4 [ 990.371754][ C1] [<81abbeb4>] (_raw_spin_lock) from [<809c7a2c>] (gpio_mmio_set+0x44/0x80) [ 990.372286][ C1] r5:00000001 r4:8425fa40 [ 990.372515][ C1] [<809c79e8>] (gpio_mmio_set) from [<809b81e8>] (gpiochip_set+0x1c/0x44) [ 990.372873][ C1] r7:00000000 r6:00000000 r5:00000000 r4:8407fc00 [ 990.373126][ C1] [<809b81cc>] (gpiochip_set) from [<809baab0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 990.373523][ C1] [<809baa38>] (gpiod_set_raw_value_commit) from [<809bc350>] (gpiod_set_value_nocheck+0x44/0x58) [ 990.373937][ C1] r10:81c05450 r9:df805ebc r8:00000102 r7:00006a79 r6:00000008 r5:00000000 [ 990.374252][ C1] r4:8407fc00 [ 990.374431][ C1] [<809bc30c>] (gpiod_set_value_nocheck) from [<809bc3a0>] (gpiod_set_value+0x3c/0x88) [ 990.375074][ C1] [<809bc364>] (gpiod_set_value) from [<809ccb3c>] (gpio_led_set+0x5c/0x60) [ 990.375653][ C1] r5:832fd844 r4:832fd844 [ 990.375862][ C1] [<809ccae0>] (gpio_led_set) from [<809ca3d4>] (led_set_brightness_nosleep+0x38/0x44) [ 990.376486][ C1] r5:832fd844 r4:84a8010c [ 990.376690][ C1] [<809ca39c>] (led_set_brightness_nosleep) from [<809cd438>] (led_heartbeat_function+0x84/0x144) [ 990.377207][ C1] [<809cd3b4>] (led_heartbeat_function) from [<80327070>] (call_timer_fn+0x30/0x220) [ 990.377623][ C1] r7:00006a79 r6:809cd3b4 r5:84a8010c r4:83216000 [ 990.377922][ C1] [<80327040>] (call_timer_fn) from [<80327524>] (__run_timers+0x2c4/0x3f8) [ 990.378434][ C1] r9:df805ebc r8:00006a79 r7:00000000 r6:809cd3b4 r5:dddd9f00 r4:84a8010c [ 990.378819][ C1] [<80327260>] (__run_timers) from [<803276c0>] (run_timer_base+0x68/0x78) [ 990.379299][ C1] r10:83216000 r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 [ 990.379725][ C1] r4:dddd9f00 [ 990.379907][ C1] [<80327658>] (run_timer_base) from [<803276ec>] (run_timer_softirq+0x1c/0x34) [ 990.380306][ C1] r4:82804084 [ 990.380487][ C1] [<803276d0>] (run_timer_softirq) from [<8025b65c>] (handle_softirqs+0x140/0x458) [ 990.380908][ C1] [<8025b51c>] (handle_softirqs) from [<8025bad0>] (__irq_exit_rcu+0x110/0x1d0) [ 990.381326][ C1] r10:00000000 r9:83216000 r8:00000000 r7:df865e08 r6:82443f98 r5:8247f0cc [ 990.381645][ C1] r4:83216000 [ 990.381852][ C1] [<8025b9c0>] (__irq_exit_rcu) from [<8025be48>] (irq_exit+0x10/0x18) [ 990.382283][ C1] r5:8247f0cc r4:826c3a9c [ 990.382544][ C1] [<8025be38>] (irq_exit) from [<81aad964>] (generic_handle_arch_irq+0x7c/0x80) [ 990.383015][ C1] [<81aad8e8>] (generic_handle_arch_irq) from [<81a7d904>] (call_with_stack+0x1c/0x20) [ 990.383538][ C1] r9:83216000 r8:8402b288 r7:df865e3c r6:ffffffff r5:60000013 r4:809c822c [ 990.383943][ C1] [<81a7d8e8>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc) [ 990.386785][ C1] Exception stack(0xdf865e08 to 0xdf865e50) [ 990.387119][ C1] 5e00: e015f008 0000000d 0000ffb4 00000000 e015f008 0000000d [ 990.387679][ C1] 5e20: 00000001 8425fb68 8402b288 8425fa40 00000000 df865e6c df865e58 df865e58 [ 990.388072][ C1] 5e40: 809c8228 809c822c 60000013 ffffffff [ 990.388427][ C1] [<809c820c>] (gpio_mmio_write32) from [<809c7a4c>] (gpio_mmio_set+0x64/0x80) [ 990.388882][ C1] r5:00000008 r4:8425fa40 [ 990.389121][ C1] [<809c79e8>] (gpio_mmio_set) from [<809b81e8>] (gpiochip_set+0x1c/0x44) [ 990.389508][ C1] r7:00000001 r6:00000000 r5:00000003 r4:8407fc3c [ 990.389811][ C1] [<809b81cc>] (gpiochip_set) from [<809baab0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 990.390203][ C1] [<809baa38>] (gpiod_set_raw_value_commit) from [<809bc350>] (gpiod_set_value_nocheck+0x44/0x58) [ 990.390660][ C1] r10:00000000 r9:00000000 r8:00000001 r7:ddde24c0 r6:8391b5d8 r5:00000001 [ 990.390987][ C1] r4:8407fc3c [ 990.391156][ C1] [<809bc30c>] (gpiod_set_value_nocheck) from [<809bc3a0>] (gpiod_set_value+0x3c/0x88) [ 990.391776][ C1] [<809bc364>] (gpiod_set_value) from [<809ccb3c>] (gpio_led_set+0x5c/0x60) [ 990.392253][ C1] r5:000000ff r4:832fdb14 [ 990.392528][ C1] [<809ccae0>] (gpio_led_set) from [<809ca464>] (led_set_brightness+0x84/0x90) [ 990.392887][ C1] r5:000000ff r4:832fdb14 [ 990.393101][ C1] [<809ca3e0>] (led_set_brightness) from [<809cbfe4>] (led_trigger_event+0x40/0x58) [ 990.393488][ C1] r5:000000ff r4:832fdb14 [ 990.393796][ C1] [<809cbfa4>] (led_trigger_event) from [<809cd640>] (ledtrig_cpu+0xac/0xf4) [ 990.394169][ C1] r7:ddde24c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 990.394446][ C1] [<809cd594>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 990.395093][ C1] r9:00000000 r8:00000001 r7:8280c710 r6:83216000 r5:8280c6d0 r4:00000001 [ 990.395606][ C1] [<80227a24>] (arch_cpu_idle_exit) from [<802b168c>] (do_idle+0x5c/0x2d8) [ 990.396012][ C1] [<802b1630>] (do_idle) from [<802b1c38>] (cpu_startup_entry+0x30/0x34) [ 990.396466][ C1] r10:00000000 r9:414fc0f0 r8:80003000 r7:82a7b4a4 r6:83216000 r5:00000001 [ 990.396868][ C1] r4:00000092 [ 990.397035][ C1] [<802b1c08>] (cpu_startup_entry) from [<8022f360>] (secondary_start_kernel+0x128/0x194) [ 990.397486][ C1] [<8022f238>] (secondary_start_kernel) from [<80220094>] (__enable_mmu+0x0/0xc) [ 990.397968][ C1] r7:82a7b4a4 r6:30c0387d r5:00000000 r4:830b7bc0 [ 990.400499][ C1] Rebooting in 86400 seconds..