last executing test programs: 4.140772585s ago: executing program 0 (id=2420): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto(r0, 0x0, 0x0, 0x20044844, &(0x7f0000000000)=@in6={0xa, 0x0, 0x10000, @local, 0x1}, 0x80) r1 = fcntl$dupfd(r0, 0x406, r0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x40000) 3.063283012s ago: executing program 0 (id=2422): r0 = socket$xdp(0x2c, 0x3, 0x0) r1 = openat$rfkill(0xffffff9c, &(0x7f0000000180), 0x0, 0x0) r2 = dup2(r0, r1) getsockopt$XDP_STATISTICS(r2, 0x11b, 0x7, &(0x7f0000000ac0), &(0x7f0000000b00)=0x30) 3.060588602s ago: executing program 1 (id=2423): pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) close(r0) socket$unix(0x1, 0x1, 0x0) sendmsg$NLBL_MGMT_C_REMOVEDEF(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) 2.909500421s ago: executing program 0 (id=2424): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) dup3(r0, r1, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x8, &(0x7f0000000080)={'ipvs\x00'}, &(0x7f0000000000)=0x1e) 2.909316441s ago: executing program 1 (id=2425): r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000000), 0x200041, 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) ioctl$FITHAW(r0, 0x5450) 2.772745358s ago: executing program 1 (id=2426): r0 = timerfd_create(0x0, 0x0) close(r0) creat(&(0x7f0000001c40)='./file0\x00', 0x0) write$P9_RLOPEN(r0, 0x0, 0x0) 2.772526398s ago: executing program 0 (id=2427): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) sendto$l2tp6(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x20) sendmsg$NL80211_CMD_DEL_KEY(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x0, 0x10800}, 0x20000880) 240.615609ms ago: executing program 0 (id=2428): r0 = socket$inet6(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) dup3(r1, r0, 0x0) pwrite64(r0, 0x0, 0x0, 0x0) 221.848762ms ago: executing program 1 (id=2432): r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000000), 0x200041, 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) ioctl$FITHAW(r0, 0x5450) 98.938048ms ago: executing program 0 (id=2429): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) sendto$l2tp6(r1, 0x0, 0x0, 0x2400c900, &(0x7f00000002c0)={0xa, 0x0, 0x1, @remote, 0x3, 0x3}, 0x20) sendmsg$AUDIT_GET_FEATURE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x44000}, 0x20040884) 98.811288ms ago: executing program 1 (id=2430): r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x3a1100, 0x0) close(r0) socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$sock(r0, 0x0, 0x0, 0x4020) 0s ago: executing program 1 (id=2431): r0 = socket$xdp(0x2c, 0x3, 0x0) r1 = openat$rfkill(0xffffff9c, &(0x7f0000000180), 0x0, 0x0) r2 = dup2(r0, r1) getsockopt$XDP_STATISTICS(r2, 0x11b, 0x7, &(0x7f0000000ac0), &(0x7f0000000b00)=0x30) kernel console output (not intermixed with test programs): [ 53.319218][ T29] audit: type=1400 audit(53.220:56): avc: denied { read write } for pid=3087 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 53.328240][ T29] audit: type=1400 audit(53.230:57): avc: denied { open } for pid=3087 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:54378' (ED25519) to the list of known hosts. [ 68.992193][ T29] audit: type=1400 audit(68.890:58): avc: denied { name_bind } for pid=3090 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 70.449674][ T29] audit: type=1400 audit(70.340:59): avc: denied { execute } for pid=3091 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 70.495191][ T29] audit: type=1400 audit(70.400:60): avc: denied { execute_no_trans } for pid=3091 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 75.205885][ T29] audit: type=1400 audit(75.110:61): avc: denied { mounton } for pid=3091 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 75.213463][ T29] audit: type=1400 audit(75.120:62): avc: denied { mount } for pid=3091 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 75.233652][ T3091] cgroup: Unknown subsys name 'net' [ 75.243959][ T29] audit: type=1400 audit(75.150:63): avc: denied { unmount } for pid=3091 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 75.402297][ T3091] cgroup: Unknown subsys name 'cpuset' [ 75.408547][ T3091] cgroup: Unknown subsys name 'hugetlb' [ 75.411591][ T3091] cgroup: Unknown subsys name 'rlimit' [ 75.647021][ T29] audit: type=1400 audit(75.550:64): avc: denied { setattr } for pid=3091 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 75.649427][ T29] audit: type=1400 audit(75.550:65): avc: denied { mounton } for pid=3091 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 75.652769][ T29] audit: type=1400 audit(75.550:66): avc: denied { mount } for pid=3091 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 75.869340][ T3093] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 75.875730][ T29] audit: type=1400 audit(75.780:67): avc: denied { relabelto } for pid=3093 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 75.883275][ T29] audit: type=1400 audit(75.780:68): avc: denied { write } for pid=3093 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 75.916537][ T29] audit: type=1400 audit(75.820:69): avc: denied { read } for pid=3091 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 75.921122][ T29] audit: type=1400 audit(75.820:70): avc: denied { open } for pid=3091 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 83.733472][ T3091] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 85.910950][ T29] audit: type=1400 audit(85.810:71): avc: denied { execmem } for pid=3094 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 85.988714][ T29] audit: type=1400 audit(85.890:72): avc: denied { read } for pid=3096 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 85.995413][ T29] audit: type=1400 audit(85.890:73): avc: denied { open } for pid=3096 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 85.999484][ T29] audit: type=1400 audit(85.900:74): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 86.025150][ T29] audit: type=1400 audit(85.930:75): avc: denied { module_request } for pid=3096 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 86.073232][ T29] audit: type=1400 audit(85.980:76): avc: denied { sys_module } for pid=3096 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 86.497615][ T29] audit: type=1400 audit(86.400:77): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 87.488260][ T3096] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 87.497226][ T3096] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 88.286171][ T3096] hsr_slave_0: entered promiscuous mode [ 88.292458][ T3096] hsr_slave_1: entered promiscuous mode [ 88.618215][ T29] audit: type=1400 audit(88.520:78): avc: denied { create } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 88.621940][ T29] audit: type=1400 audit(88.520:79): avc: denied { write } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 88.625472][ T29] audit: type=1400 audit(88.520:80): avc: denied { read } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 88.634236][ T3096] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 88.646650][ T3096] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 88.657015][ T3096] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 88.666100][ T3096] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 89.368700][ T3096] 8021q: adding VLAN 0 to HW filter on device bond0 [ 91.994022][ T3096] veth0_vlan: entered promiscuous mode [ 92.013313][ T3096] veth1_vlan: entered promiscuous mode [ 92.079526][ T3096] veth0_macvtap: entered promiscuous mode [ 92.094055][ T3096] veth1_macvtap: entered promiscuous mode [ 92.142603][ T1989] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 92.143693][ T1989] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 92.146510][ T1989] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 92.147098][ T1989] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 92.210795][ T29] audit: type=1400 audit(92.110:81): avc: denied { mount } for pid=3096 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 92.213816][ T29] audit: type=1400 audit(92.120:82): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/syzkaller.Yt0KKr/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 92.221311][ T29] audit: type=1400 audit(92.130:83): avc: denied { mount } for pid=3096 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 92.226744][ T29] audit: type=1400 audit(92.130:84): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/syzkaller.Yt0KKr/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 92.230691][ T29] audit: type=1400 audit(92.140:85): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/syzkaller.Yt0KKr/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=1823 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 92.241799][ T29] audit: type=1400 audit(92.150:86): avc: denied { unmount } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 92.246912][ T29] audit: type=1400 audit(92.150:87): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 92.248484][ T29] audit: type=1400 audit(92.150:88): avc: denied { mount } for pid=3096 comm="syz-executor" name="/" dev="gadgetfs" ino=1824 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 92.262506][ T29] audit: type=1400 audit(92.170:89): avc: denied { mount } for pid=3096 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 92.264403][ T29] audit: type=1400 audit(92.170:90): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 92.307906][ T3096] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 93.241603][ T3410] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3410 comm=syz.0.5 [ 96.557553][ T3441] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 96.564524][ T3441] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 97.475011][ T3441] hsr_slave_0: entered promiscuous mode [ 97.479091][ T3441] hsr_slave_1: entered promiscuous mode [ 97.482647][ T3441] debugfs: 'hsr0' already exists in 'hsr' [ 97.484230][ T3441] Cannot create hsr debugfs directory [ 97.723308][ T3441] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 97.731156][ T3441] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 97.737604][ T3441] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 97.744495][ T3441] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 98.525876][ T3441] 8021q: adding VLAN 0 to HW filter on device bond0 [ 101.254890][ T3441] veth0_vlan: entered promiscuous mode [ 101.275646][ T3441] veth1_vlan: entered promiscuous mode [ 101.316179][ T3441] veth0_macvtap: entered promiscuous mode [ 101.325831][ T3441] veth1_macvtap: entered promiscuous mode [ 101.384230][ T1989] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 101.386423][ T1989] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 101.391561][ T1989] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 101.393572][ T1989] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 105.948642][ T29] kauditd_printk_skb: 13 callbacks suppressed [ 105.954609][ T29] audit: type=1400 audit(105.850:104): avc: denied { create } for pid=3757 comm="syz.1.25" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 105.957288][ T29] audit: type=1400 audit(105.860:105): avc: denied { write } for pid=3757 comm="syz.1.25" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 106.169624][ T29] audit: type=1400 audit(106.070:106): avc: denied { create } for pid=3765 comm="syz.1.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 106.179262][ T29] audit: type=1400 audit(106.080:107): avc: denied { bind } for pid=3765 comm="syz.1.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 106.193712][ T29] audit: type=1400 audit(106.100:108): avc: denied { accept } for pid=3765 comm="syz.1.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 106.199773][ T29] audit: type=1400 audit(106.100:109): avc: denied { read } for pid=3765 comm="syz.1.28" path="socket:[2000]" dev="sockfs" ino=2000 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 106.393062][ T29] audit: type=1400 audit(106.300:110): avc: denied { create } for pid=3769 comm="syz.1.31" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 106.399818][ T29] audit: type=1400 audit(106.300:111): avc: denied { ioctl } for pid=3769 comm="syz.1.31" path="socket:[2638]" dev="sockfs" ino=2638 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 106.409367][ T29] audit: type=1400 audit(106.310:112): avc: denied { bind } for pid=3769 comm="syz.1.31" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 106.414205][ T29] audit: type=1400 audit(106.320:113): avc: denied { write } for pid=3769 comm="syz.1.31" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 108.937275][ T3782] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1551 sclass=netlink_audit_socket pid=3782 comm=syz.1.37 [ 109.546183][ T3795] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 111.174331][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 111.178996][ T29] audit: type=1400 audit(111.080:118): avc: denied { create } for pid=3833 comm="syz.0.62" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 111.185868][ T29] audit: type=1400 audit(111.090:119): avc: denied { write } for pid=3833 comm="syz.0.62" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 117.641898][ T3911] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=152 sclass=netlink_route_socket pid=3911 comm=syz.1.100 [ 122.041581][ T4018] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4018 comm=syz.0.153 [ 122.112131][ T29] audit: type=1400 audit(122.020:120): avc: denied { append } for pid=4019 comm="syz.0.154" name="vcsu" dev="devtmpfs" ino=14 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 122.127331][ T29] audit: type=1400 audit(122.030:121): avc: denied { write } for pid=4019 comm="syz.0.154" name="fib_triestat" dev="proc" ino=4026532662 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 122.131545][ T29] audit: type=1400 audit(122.030:122): avc: denied { map } for pid=4019 comm="syz.0.154" path="/proc/202/net/fib_triestat" dev="proc" ino=4026532662 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 122.131679][ T29] audit: type=1400 audit(122.030:123): avc: denied { execute } for pid=4019 comm="syz.0.154" path="/proc/202/net/fib_triestat" dev="proc" ino=4026532662 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 122.435915][ T29] audit: type=1400 audit(122.340:124): avc: denied { ioctl } for pid=4025 comm="syz.0.157" path="socket:[3522]" dev="sockfs" ino=3522 ioctlcmd=0x8917 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 123.725146][ T29] audit: type=1400 audit(123.630:125): avc: denied { getopt } for pid=4046 comm="syz.0.166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 127.552540][ T29] audit: type=1400 audit(127.460:126): avc: denied { create } for pid=4082 comm="syz.1.184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 127.555048][ T29] audit: type=1400 audit(127.460:127): avc: denied { write } for pid=4082 comm="syz.1.184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 128.141578][ T29] audit: type=1400 audit(128.050:128): avc: denied { allowed } for pid=4098 comm="syz.1.192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 128.152604][ T29] audit: type=1400 audit(128.060:129): avc: denied { create } for pid=4098 comm="syz.1.192" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 128.155039][ T29] audit: type=1400 audit(128.060:130): avc: denied { map } for pid=4098 comm="syz.1.192" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4247 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 128.157051][ T29] audit: type=1400 audit(128.060:131): avc: denied { read write } for pid=4098 comm="syz.1.192" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4247 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 130.411874][ T4149] Zero length message leads to an empty skb [ 131.064232][ T4165] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4165 comm=syz.1.224 [ 134.859052][ T4178] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4178 comm=syz.1.232 [ 135.068798][ T4186] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4186 comm=syz.1.236 [ 135.870652][ T29] audit: type=1400 audit(135.770:132): avc: denied { unmount } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 136.291785][ T4232] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4232 comm=syz.0.257 [ 136.527342][ T29] audit: type=1400 audit(136.430:133): avc: denied { unmount } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 137.138005][ T4260] netlink: 4 bytes leftover after parsing attributes in process `syz.0.271'. [ 138.370592][ T29] audit: type=1400 audit(138.270:134): avc: denied { getopt } for pid=4276 comm="syz.1.278" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 139.401759][ T29] audit: type=1400 audit(139.310:135): avc: denied { setopt } for pid=4315 comm="syz.0.297" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 139.964740][ T4334] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1543 sclass=netlink_audit_socket pid=4334 comm=syz.1.305 [ 146.352452][ T4377] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4377 comm=syz.1.326 [ 146.445140][ T29] audit: type=1400 audit(146.350:136): avc: denied { ioctl } for pid=4379 comm="syz.1.328" path="socket:[4691]" dev="sockfs" ino=4691 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 146.853654][ T4398] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=263 sclass=netlink_audit_socket pid=4398 comm=syz.0.335 [ 151.104648][ T29] audit: type=1400 audit(151.010:137): avc: denied { watch watch_reads } for pid=4449 comm="syz.0.363" path="/203" dev="tmpfs" ino=1051 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 151.546767][ T29] audit: type=1400 audit(151.450:138): avc: denied { audit_write } for pid=4459 comm="syz.0.368" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 152.598175][ T4488] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4488 comm=syz.1.385 [ 153.814097][ T4523] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4523 comm=syz.0.402 [ 154.692713][ T29] audit: type=1400 audit(154.600:139): avc: denied { create } for pid=4549 comm="syz.0.411" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 154.704588][ T29] audit: type=1400 audit(154.610:140): avc: denied { write } for pid=4549 comm="syz.0.411" path="socket:[5552]" dev="sockfs" ino=5552 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 156.351635][ T4600] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4600 comm=syz.1.440 [ 156.459602][ T29] audit: type=1400 audit(156.360:141): avc: denied { getopt } for pid=4601 comm="syz.0.437" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 157.532931][ T4637] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4637 comm=syz.1.454 [ 157.999420][ T4653] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1541 sclass=netlink_route_socket pid=4653 comm=syz.1.466 [ 163.056093][ T29] audit: type=1400 audit(162.960:142): avc: denied { create } for pid=4690 comm="syz.1.479" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 163.077162][ T29] audit: type=1400 audit(162.980:143): avc: denied { write } for pid=4690 comm="syz.1.479" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 166.276212][ T29] audit: type=1400 audit(166.180:144): avc: denied { bind } for pid=4744 comm="syz.1.509" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 166.776112][ T4755] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4755 comm=syz.0.512 [ 168.464179][ T4778] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4778 comm=syz.1.524 [ 168.644164][ T29] audit: type=1400 audit(168.550:145): avc: denied { mount } for pid=4781 comm="syz.1.530" name="/" dev="ramfs" ino=6393 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 169.691494][ T29] audit: type=1400 audit(169.590:146): avc: denied { write } for pid=4810 comm="syz.0.539" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 169.850663][ T4816] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4816 comm=syz.1.542 [ 169.987198][ T4823] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4823 comm=syz.1.546 [ 170.063056][ T4827] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5129 sclass=netlink_route_socket pid=4827 comm=syz.1.547 [ 170.616037][ T4843] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4843 comm=syz.0.556 [ 171.222552][ T29] audit: type=1400 audit(171.130:147): avc: denied { write } for pid=4857 comm="syz.1.568" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 171.961039][ T29] audit: type=1400 audit(171.860:148): avc: denied { read } for pid=4884 comm="syz.1.581" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 172.925150][ T4907] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1018 sclass=netlink_route_socket pid=4907 comm=syz.1.587 [ 176.233926][ T4979] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4979 comm=syz.0.623 [ 176.871456][ T4993] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4993 comm=syz.0.631 [ 177.583560][ T5015] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5015 comm=syz.0.641 [ 177.795595][ T5021] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5021 comm=syz.1.648 [ 182.086185][ T29] audit: type=1400 audit(181.990:149): avc: denied { create } for pid=5120 comm="syz.0.693" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 182.100517][ T29] audit: type=1400 audit(182.000:150): avc: denied { connect } for pid=5120 comm="syz.0.693" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 182.104423][ T29] audit: type=1400 audit(182.010:151): avc: denied { shutdown } for pid=5120 comm="syz.0.693" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 182.111761][ T29] audit: type=1400 audit(182.010:152): avc: denied { write } for pid=5120 comm="syz.0.693" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 183.352692][ T29] audit: type=1400 audit(183.260:153): avc: denied { create } for pid=5150 comm="syz.0.709" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 183.365987][ T29] audit: type=1400 audit(183.260:154): avc: denied { setopt } for pid=5150 comm="syz.0.709" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 183.366507][ T29] audit: type=1400 audit(183.270:155): avc: denied { ioctl } for pid=5150 comm="syz.0.709" path="socket:[7688]" dev="sockfs" ino=7688 ioctlcmd=0x89e0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 183.424551][ T5153] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2581 sclass=netlink_route_socket pid=5153 comm=syz.1.713 [ 183.899738][ T29] audit: type=1400 audit(183.800:156): avc: denied { map_create } for pid=5166 comm="syz.1.720" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 183.905972][ T29] audit: type=1400 audit(183.810:157): avc: denied { perfmon } for pid=5166 comm="syz.1.720" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 183.908634][ T29] audit: type=1400 audit(183.810:158): avc: denied { map_read map_write } for pid=5166 comm="syz.1.720" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 202.335684][ T5445] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2581 sclass=netlink_route_socket pid=5445 comm=syz.0.852 [ 208.297326][ T5627] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1548 sclass=netlink_audit_socket pid=5627 comm=syz.0.941 [ 210.581270][ T5707] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5707 comm=syz.1.982 [ 212.252364][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 212.254205][ T29] audit: type=1400 audit(212.160:160): avc: denied { setopt } for pid=5726 comm="syz.0.992" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 212.541880][ T29] audit: type=1400 audit(212.450:161): avc: denied { append } for pid=5736 comm="syz.0.996" name="pfkey" dev="proc" ino=4026532716 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 213.235481][ T5767] random: crng reseeded on system resumption [ 213.352339][ T29] audit: type=1400 audit(213.260:162): avc: denied { create } for pid=5770 comm="syz.0.1010" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 213.774928][ T5785] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5785 comm=syz.1.1019 [ 214.926069][ T5815] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5815 comm=syz.1.1034 [ 215.979742][ T5855] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5855 comm=syz.0.1054 [ 218.145375][ T5897] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=18 sclass=netlink_audit_socket pid=5897 comm=syz.0.1074 [ 219.627073][ T5916] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5916 comm=syz.0.1084 [ 223.103211][ T5991] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5991 comm=syz.0.1120 [ 223.565187][ T29] audit: type=1400 audit(223.470:163): avc: denied { execute } for pid=6007 comm="syz.0.1129" path="/602/freezer.parent_freezing" dev="tmpfs" ino=3092 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 223.852442][ T29] audit: type=1400 audit(223.760:164): avc: denied { create } for pid=6014 comm="syz.1.1132" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 223.858248][ T29] audit: type=1400 audit(223.760:165): avc: denied { write } for pid=6014 comm="syz.1.1132" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 228.499915][ T6057] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1551 sclass=netlink_audit_socket pid=6057 comm=syz.1.1153 [ 230.045010][ T6095] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1541 sclass=netlink_route_socket pid=6095 comm=syz.0.1172 [ 230.492964][ T6112] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6112 comm=syz.1.1181 [ 230.758778][ T6121] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6121 comm=syz.0.1185 [ 231.675568][ T6158] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6158 comm=syz.1.1203 [ 231.790901][ T6162] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6162 comm=syz.1.1205 [ 232.453471][ T6190] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=6190 comm=syz.1.1219 [ 233.237333][ T6224] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=6224 comm=syz.0.1236 [ 236.516623][ T6313] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=263 sclass=netlink_audit_socket pid=6313 comm=syz.0.1280 [ 237.304541][ T6342] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6342 comm=syz.0.1294 [ 237.821705][ T6361] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6361 comm=syz.0.1303 [ 238.468705][ T6386] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=6386 comm=syz.1.1316 [ 238.717148][ T6395] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5129 sclass=netlink_route_socket pid=6395 comm=syz.1.1321 [ 243.052746][ T6503] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1373'. [ 243.642715][ T6516] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6516 comm=syz.1.1379 [ 244.167082][ T6534] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6534 comm=syz.0.1387 [ 244.499106][ T6547] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6547 comm=syz.1.1394 [ 247.276505][ T6639] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=6639 comm=syz.1.1439 [ 249.851821][ T6725] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=152 sclass=netlink_route_socket pid=6725 comm=syz.0.1482 [ 251.985595][ T29] audit: type=1400 audit(251.890:166): avc: denied { setopt } for pid=6770 comm="syz.0.1508" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 252.359718][ T29] audit: type=1400 audit(252.260:167): avc: denied { name_bind } for pid=6784 comm="syz.0.1515" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 252.779039][ T6799] ======================================================= [ 252.779039][ T6799] WARNING: The mand mount option has been deprecated and [ 252.779039][ T6799] and is ignored by this kernel. Remove the mand [ 252.779039][ T6799] option from the mount to silence this warning. [ 252.779039][ T6799] ======================================================= [ 252.783964][ T29] audit: type=1400 audit(252.680:168): avc: denied { remount } for pid=6798 comm="syz.0.1519" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 253.451740][ T29] audit: type=1400 audit(253.360:169): avc: denied { setopt } for pid=6824 comm="syz.1.1531" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 253.709763][ T6837] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6837 comm=syz.0.1536 [ 256.439816][ T6854] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6854 comm=syz.1.1542 [ 259.842108][ T6895] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6895 comm=syz.1.1564 [ 267.856666][ T7050] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7050 comm=syz.0.1640 [ 270.399088][ T7103] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1543 sclass=netlink_audit_socket pid=7103 comm=syz.0.1665 [ 276.595766][ T7231] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7231 comm=syz.1.1728 [ 280.992751][ T7251] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7251 comm=syz.1.1738 [ 283.043122][ T7315] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1018 sclass=netlink_route_socket pid=7315 comm=syz.0.1769 [ 288.291757][ T7382] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7382 comm=syz.1.1801 [ 289.816852][ T7434] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=262 sclass=netlink_audit_socket pid=7434 comm=syz.1.1827 [ 295.896128][ T7564] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65381 sclass=netlink_audit_socket pid=7564 comm=syz.0.1890 [ 308.426065][ T29] audit: type=1400 audit(308.330:170): avc: denied { setattr } for pid=7781 comm="syz.0.1998" name="" dev="pipefs" ino=17742 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 313.086045][ T7833] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7833 comm=syz.1.2024 [ 319.248404][ T29] audit: type=1400 audit(319.150:171): avc: denied { node_bind } for pid=7889 comm="syz.0.2050" saddr=fe88::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 319.315708][ T7892] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=2051 sclass=netlink_audit_socket pid=7892 comm=syz.1.2051 [ 326.313344][ T7922] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7922 comm=syz.0.2064 [ 329.665168][ T7961] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=2051 sclass=netlink_audit_socket pid=7961 comm=syz.0.2084 [ 330.047136][ T7976] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=2051 sclass=netlink_audit_socket pid=7976 comm=syz.0.2091 [ 330.372960][ T29] audit: type=1400 audit(330.280:172): avc: denied { sqpoll } for pid=7987 comm="syz.0.2098" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 330.779329][ T8005] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 330.793615][ T29] audit: type=1400 audit(330.700:173): avc: denied { write } for pid=8003 comm="syz.1.2105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 330.974292][ T29] audit: type=1400 audit(330.880:174): avc: denied { getopt } for pid=8011 comm="syz.1.2109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 331.269017][ T8022] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8022 comm=syz.1.2114 [ 331.386685][ T8026] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8026 comm=syz.1.2116 [ 332.774059][ T8063] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1538 sclass=netlink_audit_socket pid=8063 comm=syz.0.2134 [ 332.876596][ T29] audit: type=1400 audit(332.780:175): avc: denied { create } for pid=8064 comm="syz.0.2135" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 332.888309][ T29] audit: type=1400 audit(332.790:176): avc: denied { getopt } for pid=8064 comm="syz.0.2135" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 338.156726][ T8106] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8106 comm=syz.0.2153 [ 338.676080][ T8123] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8123 comm=syz.1.2161 [ 338.699368][ T8124] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8124 comm=syz.0.2166 [ 339.918332][ T8160] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1538 sclass=netlink_audit_socket pid=8160 comm=syz.1.2180 [ 341.314832][ T8208] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8208 comm=syz.1.2205 [ 341.539186][ T8216] capability: warning: `syz.1.2209' uses 32-bit capabilities (legacy support in use) [ 342.610563][ T29] audit: type=1400 audit(342.510:177): avc: denied { setopt } for pid=8233 comm="syz.1.2218" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 342.873548][ T29] audit: type=1400 audit(342.780:178): avc: denied { ioctl } for pid=8236 comm="syz.0.2219" path="socket:[18591]" dev="sockfs" ino=18591 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 351.045419][ T8331] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1542 sclass=netlink_route_socket pid=8331 comm=syz.1.2264 [ 351.708225][ T8351] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1542 sclass=netlink_route_socket pid=8351 comm=syz.0.2272 [ 351.992515][ T8363] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1542 sclass=netlink_route_socket pid=8363 comm=syz.1.2280 [ 358.275811][ T8559] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8559 comm=syz.0.2374 [ 361.420586][ T8595] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8595 comm=syz.1.2390 [ 792.310425][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 430s! [swapper/0:0] [ 792.310703][ C0] Modules linked in: [ 792.311775][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G L syzkaller #0 PREEMPT [ 792.312057][ C0] Tainted: [L]=SOFTLOCKUP [ 792.312107][ C0] Hardware name: ARM-Versatile Express [ 792.312346][ C0] PC is at _raw_spin_lock+0x40/0x58 [ 792.313084][ C0] LR is at _raw_spin_lock+0x18/0x58 [ 792.313138][ C0] pc : [<81abbef4>] lr : [<81abbecc>] psr: 80000013 [ 792.313190][ C0] sp : 82801e28 ip : 82801e28 fp : 82801e3c [ 792.313227][ C0] r10: 00000000 r9 : 83e6f640 r8 : 838eca88 [ 792.313269][ C0] r7 : 83e6f768 r6 : 00000001 r5 : 00000004 r4 : 83e6f768 [ 792.313315][ C0] r3 : 0000bc16 r2 : 0000bc18 r1 : 00000000 r0 : 00000001 [ 792.313493][ C0] Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 792.313575][ C0] Control: 30c5387d Table: 84cfcc40 DAC: fffffffd [ 792.313679][ C0] Call trace: [ 792.313942][ C0] [<81abbeb4>] (_raw_spin_lock) from [<809c7a2c>] (gpio_mmio_set+0x44/0x80) [ 792.314278][ C0] r5:00000004 r4:83e6f640 [ 792.314377][ C0] [<809c79e8>] (gpio_mmio_set) from [<809b81e8>] (gpiochip_set+0x1c/0x44) [ 792.314462][ C0] r7:00000001 r6:00000000 r5:00000002 r4:83e21628 [ 792.314482][ C0] [<809b81cc>] (gpiochip_set) from [<809baab0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 792.314537][ C0] [<809baa38>] (gpiod_set_raw_value_commit) from [<809bc350>] (gpiod_set_value_nocheck+0x44/0x58) [ 792.314621][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:839c6e18 r5:00000001 [ 792.314657][ C0] r4:83e21628 [ 792.314677][ C0] [<809bc30c>] (gpiod_set_value_nocheck) from [<809bc3a0>] (gpiod_set_value+0x3c/0x88) [ 792.314728][ C0] [<809bc364>] (gpiod_set_value) from [<809ccb3c>] (gpio_led_set+0x5c/0x60) [ 792.314786][ C0] r5:000000ff r4:845b1224 [ 792.314804][ C0] [<809ccae0>] (gpio_led_set) from [<809ca464>] (led_set_brightness+0x84/0x90) [ 792.314858][ C0] r5:000000ff r4:845b1224 [ 792.314876][ C0] [<809ca3e0>] (led_set_brightness) from [<809cbfe4>] (led_trigger_event+0x40/0x58) [ 792.314930][ C0] r5:000000ff r4:845b1224 [ 792.314948][ C0] [<809cbfa4>] (led_trigger_event) from [<809cd640>] (ledtrig_cpu+0xac/0xf4) [ 792.315007][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 792.315026][ C0] [<809cd594>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 792.315099][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 792.315119][ C0] [<80227a24>] (arch_cpu_idle_exit) from [<802b168c>] (do_idle+0x5c/0x2d8) [ 792.315186][ C0] [<802b1630>] (do_idle) from [<802b1c38>] (cpu_startup_entry+0x30/0x34) [ 792.315257][ C0] r10:8281aff4 r9:8280c680 r8:823bec64 r7:00000000 r6:deffc06c r5:828222e8 [ 792.315278][ C0] r4:000000ed [ 792.315295][ C0] [<802b1c08>] (cpu_startup_entry) from [<81aaf37c>] (kernel_init+0x0/0x138) [ 792.315360][ C0] [<81aaf29c>] (rest_init) from [<8260145c>] (start_kernel+0x844/0x860) [ 792.315457][ C0] [<82600c18>] (start_kernel) from [<00000000>] (0x0) [ 792.316152][ C0] Sending NMI from CPU 0 to CPUs 1: [ 792.316876][ C1] NMI backtrace for cpu 1 [ 792.317027][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G L syzkaller #0 PREEMPT [ 792.317087][ C1] Tainted: [L]=SOFTLOCKUP [ 792.317104][ C1] Hardware name: ARM-Versatile Express [ 792.317127][ C1] PC is at _raw_spin_lock+0x40/0x58 [ 792.317208][ C1] LR is at _raw_spin_lock+0x18/0x58 [ 792.317239][ C1] pc : [<81abbef4>] lr : [<81abbecc>] psr: 80000113 [ 792.317261][ C1] sp : df805d68 ip : df805d68 fp : df805d7c [ 792.317281][ C1] r10: 81c05450 r9 : 83e6f640 r8 : 838eca88 [ 792.317301][ C1] r7 : 83e6f768 r6 : 00000001 r5 : 00000001 r4 : 83e6f768 [ 792.317322][ C1] r3 : 0000bc16 r2 : 0000bc17 r1 : 00000000 r0 : 00000001 [ 792.317345][ C1] Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 792.317381][ C1] Control: 30c5387d Table: 85fdc180 DAC: 00000000 [ 792.317400][ C1] Call trace: frame pointer underflow [ 792.317483][ C1] [<81abbeb4>] (_raw_spin_lock) from [<809c7a2c>] (gpio_mmio_set+0x44/0x80) [ 792.317559][ C1] r5:00000001 r4:83e6f640 [ 792.317579][ C1] [<809c79e8>] (gpio_mmio_set) from [<809b81e8>] (gpiochip_set+0x1c/0x44) [ 792.317646][ C1] r7:00000001 r6:00000000 r5:00000000 r4:83e21600 [ 792.317662][ C1] [<809b81cc>] (gpiochip_set) from [<809baab0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 792.317715][ C1] [<809baa38>] (gpiod_set_raw_value_commit) from [<809bc350>] (gpiod_set_value_nocheck+0x44/0x58) [ 792.317810][ C1] r10:81c05450 r9:df805ebc r8:00000102 r7:00001b1f r6:00000007 r5:00000001 [ 792.317833][ C1] r4:83e21600 [ 792.317851][ C1] [<809bc30c>] (gpiod_set_value_nocheck) from [<809bc3a0>] (gpiod_set_value+0x3c/0x88) [ 792.317900][ C1] [<809bc364>] (gpiod_set_value) from [<809ccb3c>] (gpio_led_set+0x5c/0x60) [ 792.317955][ C1] r5:845b1044 r4:845b1044 [ 792.317972][ C1] [<809ccae0>] (gpio_led_set) from [<809ca3d4>] (led_set_brightness_nosleep+0x38/0x44) [ 792.318026][ C1] r5:845b1044 r4:839c6d4c [ 792.318044][ C1] [<809ca39c>] (led_set_brightness_nosleep) from [<809cd438>] (led_heartbeat_function+0x84/0x144) [ 792.318093][ C1] [<809cd3b4>] (led_heartbeat_function) from [<80327070>] (call_timer_fn+0x30/0x220) [ 792.318157][ C1] r7:00001b1f r6:809cd3b4 r5:839c6d4c r4:83216000 [ 792.318183][ C1] [<80327040>] (call_timer_fn) from [<80327524>] (__run_timers+0x2c4/0x3f8) [ 792.318246][ C1] r9:df805ebc r8:00001b1f r7:00000000 r6:809cd3b4 r5:dddd9f00 r4:839c6d4c [ 792.318265][ C1] [<80327260>] (__run_timers) from [<803276c0>] (run_timer_base+0x68/0x78) [ 792.318328][ C1] r10:83216000 r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 [ 792.318347][ C1] r4:dddd9f00 [ 792.318362][ C1] [<80327658>] (run_timer_base) from [<803276ec>] (run_timer_softirq+0x1c/0x34) [ 792.318410][ C1] r4:82804084 [ 792.318424][ C1] [<803276d0>] (run_timer_softirq) from [<8025b65c>] (handle_softirqs+0x140/0x458) [ 792.318480][ C1] [<8025b51c>] (handle_softirqs) from [<8025bad0>] (__irq_exit_rcu+0x110/0x1d0) [ 792.318545][ C1] r10:00000000 r9:83216000 r8:00000000 r7:df865e08 r6:82443f98 r5:8247f0cc [ 792.318563][ C1] r4:83216000 [ 792.318578][ C1] [<8025b9c0>] (__irq_exit_rcu) from [<8025be48>] (irq_exit+0x10/0x18) [ 792.318632][ C1] r5:8247f0cc r4:826c3a9c [ 792.318647][ C1] [<8025be38>] (irq_exit) from [<81aad964>] (generic_handle_arch_irq+0x7c/0x80) [ 792.318704][ C1] [<81aad8e8>] (generic_handle_arch_irq) from [<81a7d904>] (call_with_stack+0x1c/0x20) [ 792.318769][ C1] r9:83216000 r8:838eca88 r7:df865e3c r6:ffffffff r5:60000013 r4:809c822c [ 792.318787][ C1] [<81a7d8e8>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc) [ 792.318917][ C1] Exception stack(0xdf865e08 to 0xdf865e50) [ 792.319085][ C1] 5e00: e0283008 00000008 0000bc16 00000000 e0283008 00000008 [ 792.319134][ C1] 5e20: 00000001 83e6f768 838eca88 83e6f640 00000000 df865e6c df865e58 df865e58 [ 792.319169][ C1] 5e40: 809c8228 809c822c 60000013 ffffffff [ 792.319223][ C1] [<809c820c>] (gpio_mmio_write32) from [<809c7a4c>] (gpio_mmio_set+0x64/0x80) [ 792.319287][ C1] r5:00000008 r4:83e6f640 [ 792.319306][ C1] [<809c79e8>] (gpio_mmio_set) from [<809b81e8>] (gpiochip_set+0x1c/0x44) [ 792.319373][ C1] r7:00000001 r6:00000000 r5:00000003 r4:83e2163c [ 792.319390][ C1] [<809b81cc>] (gpiochip_set) from [<809baab0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 792.319440][ C1] [<809baa38>] (gpiod_set_raw_value_commit) from [<809bc350>] (gpiod_set_value_nocheck+0x44/0x58) [ 792.319503][ C1] r10:00000000 r9:00000000 r8:00000001 r7:ddde24c0 r6:839c6e58 r5:00000001 [ 792.319522][ C1] r4:83e2163c [ 792.319536][ C1] [<809bc30c>] (gpiod_set_value_nocheck) from [<809bc3a0>] (gpiod_set_value+0x3c/0x88) [ 792.319582][ C1] [<809bc364>] (gpiod_set_value) from [<809ccb3c>] (gpio_led_set+0x5c/0x60) [ 792.319633][ C1] r5:000000ff r4:845b1314 [ 792.319651][ C1] [<809ccae0>] (gpio_led_set) from [<809ca464>] (led_set_brightness+0x84/0x90) [ 792.319703][ C1] r5:000000ff r4:845b1314 [ 792.319720][ C1] [<809ca3e0>] (led_set_brightness) from [<809cbfe4>] (led_trigger_event+0x40/0x58) [ 792.319767][ C1] r5:000000ff r4:845b1314 [ 792.319784][ C1] [<809cbfa4>] (led_trigger_event) from [<809cd640>] (ledtrig_cpu+0xac/0xf4) [ 792.319841][ C1] r7:ddde24c0 r6:00000002 r5:82b15cd8 r4:000000fe [ 792.319859][ C1] [<809cd594>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 792.319924][ C1] r9:00000000 r8:00000001 r7:8280c710 r6:83216000 r5:8280c6d0 r4:00000001 [ 792.319944][ C1] [<80227a24>] (arch_cpu_idle_exit) from [<802b168c>] (do_idle+0x5c/0x2d8) [ 792.319998][ C1] [<802b1630>] (do_idle) from [<802b1c38>] (cpu_startup_entry+0x30/0x34) [ 792.320064][ C1] r10:00000000 r9:414fc0f0 r8:80003000 r7:82a7b4a4 r6:83216000 r5:00000001 [ 792.320086][ C1] r4:00000092 [ 792.320100][ C1] [<802b1c08>] (cpu_startup_entry) from [<8022f360>] (secondary_start_kernel+0x128/0x194) [ 792.320159][ C1] [<8022f238>] (secondary_start_kernel) from [<80220094>] (__enable_mmu+0x0/0xc) [ 792.320233][ C1] r7:82a7b4a4 r6:30c0387d r5:00000000 r4:830b7bc0 [ 792.321289][ C0] Kernel panic - not syncing: softlockup: hung tasks [ 792.362334][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G L syzkaller #0 PREEMPT [ 792.362821][ C0] Tainted: [L]=SOFTLOCKUP [ 792.363052][ C0] Hardware name: ARM-Versatile Express [ 792.363381][ C0] Call trace: [ 792.363716][ C0] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 792.364183][ C0] r7:822965a4 r6:8281b500 r5:00000000 r4:82295754 [ 792.364476][ C0] [<80201b58>] (show_stack) from [<8021ee08>] (dump_stack_lvl+0x54/0x7c) [ 792.365027][ C0] [<8021edb4>] (dump_stack_lvl) from [<8021ee48>] (dump_stack+0x18/0x1c) [ 792.365447][ C0] r5:00000000 r4:82a7bd14 [ 792.365662][ C0] [<8021ee30>] (dump_stack) from [<80202648>] (vpanic+0xe0/0x2e8) [ 792.366325][ C0] [<80202568>] (vpanic) from [<80202884>] (trace_suspend_resume+0x0/0xd8) [ 792.366893][ C0] r7:82ac27f8 [ 792.367094][ C0] [<80202850>] (panic) from [<80383fcc>] (watchdog_timer_fn+0x2dc/0x350) [ 792.367526][ C0] r3:00000001 r2:00004000 r1:82a7bd1c r0:822965a4 [ 792.367827][ C0] [<80383cf0>] (watchdog_timer_fn) from [<80329c64>] (__hrtimer_run_queues+0x1c4/0x454) [ 792.368320][ C0] r10:8281b500 r9:00000000 r8:dddc7130 r7:80383cf0 r6:dddc7000 r5:dddc7040 [ 792.368697][ C0] r4:dddc75d8 [ 792.368914][ C0] [<80329aa0>] (__hrtimer_run_queues) from [<8032b268>] (hrtimer_interrupt+0x148/0x2bc) [ 792.369399][ C0] r10:74013180 r9:dddc7180 r8:dddc7130 r7:000000b8 r6:00000003 r5:20000193 [ 792.369780][ C0] r4:dddc7000 [ 792.370169][ C0] [<8032b120>] (hrtimer_interrupt) from [<813408e0>] (arch_timer_handler_virt+0x30/0x38) [ 792.370772][ C0] r10:81d0fc78 r9:8309e400 r8:00000000 r7:00000000 r6:00000000 r5:82498528 [ 792.371229][ C0] r4:8309de40 [ 792.371437][ C0] [<813408b0>] (arch_timer_handler_virt) from [<802efab4>] (handle_percpu_devid_irq+0x128/0x34c) [ 792.371964][ C0] [<802ef98c>] (handle_percpu_devid_irq) from [<802e8c44>] (handle_irq_desc+0x74/0x84) [ 792.372397][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:df80a00c r6:826c2388 r5:df80a000 [ 792.372760][ C0] r4:8280cc44 [ 792.372984][ C0] [<802e8bd0>] (handle_irq_desc) from [<802e8cc0>] (generic_handle_domain_irq+0x18/0x1c) [ 792.373418][ C0] [<802e8ca8>] (generic_handle_domain_irq) from [<802012c8>] (gic_handle_irq+0x68/0x7c) [ 792.373864][ C0] [<80201260>] (gic_handle_irq) from [<81aad948>] (generic_handle_arch_irq+0x60/0x80) [ 792.374361][ C0] r7:82801dd8 r6:82443f98 r5:8247f0cc r4:826c3a9c [ 792.374701][ C0] [<81aad8e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 792.375195][ C0] Exception stack(0x82801dd8 to 0x82801e20) [ 792.375503][ C0] 1dc0: 00000001 00000000 [ 792.375901][ C0] 1de0: 0000bc18 0000bc16 83e6f768 00000004 00000001 83e6f768 838eca88 83e6f640 [ 792.376301][ C0] 1e00: 00000000 82801e3c 82801e28 82801e28 81abbecc 81abbef4 80000013 ffffffff [ 792.376695][ C0] r9:8281b500 r8:838eca88 r7:82801e0c r6:ffffffff r5:80000013 r4:81abbef4 [ 792.377077][ C0] [<81abbeb4>] (_raw_spin_lock) from [<809c7a2c>] (gpio_mmio_set+0x44/0x80) [ 792.377512][ C0] r5:00000004 r4:83e6f640 [ 792.377713][ C0] [<809c79e8>] (gpio_mmio_set) from [<809b81e8>] (gpiochip_set+0x1c/0x44) [ 792.378208][ C0] r7:00000001 r6:00000000 r5:00000002 r4:83e21628 [ 792.378482][ C0] [<809b81cc>] (gpiochip_set) from [<809baab0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 792.378944][ C0] [<809baa38>] (gpiod_set_raw_value_commit) from [<809bc350>] (gpiod_set_value_nocheck+0x44/0x58) [ 792.379456][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:839c6e18 r5:00000001 [ 792.379824][ C0] r4:83e21628 [ 792.380259][ C0] [<809bc30c>] (gpiod_set_value_nocheck) from [<809bc3a0>] (gpiod_set_value+0x3c/0x88) [ 792.380862][ C0] [<809bc364>] (gpiod_set_value) from [<809ccb3c>] (gpio_led_set+0x5c/0x60) [ 792.381280][ C0] r5:000000ff r4:845b1224 [ 792.381495][ C0] [<809ccae0>] (gpio_led_set) from [<809ca464>] (led_set_brightness+0x84/0x90) [ 792.381913][ C0] r5:000000ff r4:845b1224 [ 792.382138][ C0] [<809ca3e0>] (led_set_brightness) from [<809cbfe4>] (led_trigger_event+0x40/0x58) [ 792.382573][ C0] r5:000000ff r4:845b1224 [ 792.382817][ C0] [<809cbfa4>] (led_trigger_event) from [<809cd640>] (ledtrig_cpu+0xac/0xf4) [ 792.383300][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 792.383626][ C0] [<809cd594>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 792.384127][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 792.384533][ C0] [<80227a24>] (arch_cpu_idle_exit) from [<802b168c>] (do_idle+0x5c/0x2d8) [ 792.384975][ C0] [<802b1630>] (do_idle) from [<802b1c38>] (cpu_startup_entry+0x30/0x34) [ 792.385502][ C0] r10:8281aff4 r9:8280c680 r8:823bec64 r7:00000000 r6:deffc06c r5:828222e8 [ 792.385944][ C0] r4:000000ed [ 792.386165][ C0] [<802b1c08>] (cpu_startup_entry) from [<81aaf37c>] (kernel_init+0x0/0x138) [ 792.386567][ C0] [<81aaf29c>] (rest_init) from [<8260145c>] (start_kernel+0x844/0x860) [ 792.386992][ C0] [<82600c18>] (start_kernel) from [<00000000>] (0x0) [ 792.391023][ C0] Rebooting in 86400 seconds..