last executing test programs: 1.267618248s ago: executing program 0 (id=3442): r0 = openat$selinux_commit_pending_bools(0xffffff9c, &(0x7f0000000200), 0x1, 0x0) ioctl$BTRFS_IOC_DEFRAG_RANGE(r0, 0x5451, 0x0) 1.17722684s ago: executing program 1 (id=3444): r0 = socket$inet6(0xa, 0x2, 0x0) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x8880) 968.013907ms ago: executing program 1 (id=3445): r0 = socket$unix(0x1, 0x2, 0x0) ioctl$KDFONTOP_GET(r0, 0x5451, 0x0) 928.319912ms ago: executing program 0 (id=3450): socketpair(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setflags(r0, 0x2, 0x0) 720.080948ms ago: executing program 0 (id=3447): r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet6(r0, &(0x7f0000000000)={0x10, 0x0, 0x7, @loopback}, 0x1c) 629.12343ms ago: executing program 1 (id=3448): r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) ioctl$BTRFS_IOC_QGROUP_CREATE(r0, 0x5450, 0x0) 422.941797ms ago: executing program 1 (id=3449): r0 = landlock_create_ruleset(&(0x7f0000000040)={0x54b}, 0x8, 0x0) fcntl$notify(r0, 0x402, 0x0) 407.302428ms ago: executing program 0 (id=3454): r0 = openat2(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x42040}, 0x18) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0x5450, 0x0) 211.478323ms ago: executing program 0 (id=3451): r0 = open(&(0x7f0000000140)='.\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x5450, 0x0) 137.985633ms ago: executing program 1 (id=3452): r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) ioctl$BTRFS_IOC_WAIT_SYNC(r0, 0x5450, 0x0) 257.44µs ago: executing program 0 (id=3453): pipe(&(0x7f0000000000)={0xffffffffffffffff}) read$usbmon(r0, &(0x7f0000000140)=""/56, 0x38) 0s ago: executing program 1 (id=3455): pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) kernel console output (not intermixed with test programs): [ 47.168788][ T29] audit: type=1400 audit(47.090:56): avc: denied { read write } for pid=3090 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 47.171358][ T29] audit: type=1400 audit(47.090:57): avc: denied { open } for pid=3090 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:62118' (ED25519) to the list of known hosts. [ 61.229512][ T29] audit: type=1400 audit(61.150:58): avc: denied { name_bind } for pid=3093 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 63.860713][ T29] audit: type=1400 audit(63.780:59): avc: denied { execute } for pid=3094 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 63.949871][ T29] audit: type=1400 audit(63.870:60): avc: denied { execute_no_trans } for pid=3094 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 67.302270][ T29] audit: type=1400 audit(67.230:61): avc: denied { mounton } for pid=3094 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 67.309207][ T29] audit: type=1400 audit(67.230:62): avc: denied { mount } for pid=3094 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 67.325791][ T3094] cgroup: Unknown subsys name 'net' [ 67.333884][ T29] audit: type=1400 audit(67.260:63): avc: denied { unmount } for pid=3094 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 67.475187][ T3094] cgroup: Unknown subsys name 'cpuset' [ 67.479448][ T3094] cgroup: Unknown subsys name 'hugetlb' [ 67.482806][ T3094] cgroup: Unknown subsys name 'rlimit' [ 67.662595][ T29] audit: type=1400 audit(67.590:64): avc: denied { setattr } for pid=3094 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 67.665527][ T29] audit: type=1400 audit(67.590:65): avc: denied { mounton } for pid=3094 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 67.667820][ T29] audit: type=1400 audit(67.590:66): avc: denied { mount } for pid=3094 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 67.872404][ T3096] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 67.875143][ T29] audit: type=1400 audit(67.800:67): avc: denied { relabelto } for pid=3096 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 67.879035][ T29] audit: type=1400 audit(67.800:68): avc: denied { write } for pid=3096 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 67.917296][ T29] audit: type=1400 audit(67.840:69): avc: denied { read } for pid=3094 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 67.919104][ T29] audit: type=1400 audit(67.840:70): avc: denied { open } for pid=3094 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 75.677137][ T3094] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 77.639093][ T29] audit: type=1400 audit(77.560:71): avc: denied { execmem } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 77.708319][ T29] audit: type=1400 audit(77.630:72): avc: denied { read } for pid=3099 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 77.709915][ T29] audit: type=1400 audit(77.630:73): avc: denied { open } for pid=3099 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 77.720816][ T29] audit: type=1400 audit(77.640:74): avc: denied { mounton } for pid=3100 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 77.733891][ T29] audit: type=1400 audit(77.660:75): avc: denied { module_request } for pid=3100 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 77.778866][ T29] audit: type=1400 audit(77.700:76): avc: denied { sys_module } for pid=3100 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 78.416999][ T29] audit: type=1400 audit(78.340:77): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 79.425921][ T3100] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 79.435668][ T3100] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 79.571788][ T3099] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 79.578741][ T3099] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 80.216719][ T3100] hsr_slave_0: entered promiscuous mode [ 80.219530][ T3100] hsr_slave_1: entered promiscuous mode [ 80.298326][ T3099] hsr_slave_0: entered promiscuous mode [ 80.299720][ T3099] hsr_slave_1: entered promiscuous mode [ 80.313071][ T3099] debugfs: 'hsr0' already exists in 'hsr' [ 80.315488][ T3099] Cannot create hsr debugfs directory [ 80.682837][ T29] audit: type=1400 audit(80.610:78): avc: denied { create } for pid=3100 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 80.685380][ T29] audit: type=1400 audit(80.610:79): avc: denied { write } for pid=3100 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 80.687825][ T29] audit: type=1400 audit(80.610:80): avc: denied { read } for pid=3100 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 80.695797][ T3100] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 80.724969][ T3100] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 80.733332][ T3100] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 80.753952][ T3100] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 80.832379][ T3099] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 80.841946][ T3099] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 80.857744][ T3099] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 80.865975][ T3099] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 81.514356][ T3099] 8021q: adding VLAN 0 to HW filter on device bond0 [ 81.539409][ T3100] 8021q: adding VLAN 0 to HW filter on device bond0 [ 84.188459][ T3099] veth0_vlan: entered promiscuous mode [ 84.216256][ T3099] veth1_vlan: entered promiscuous mode [ 84.266279][ T3100] veth0_vlan: entered promiscuous mode [ 84.287275][ T3100] veth1_vlan: entered promiscuous mode [ 84.323573][ T3099] veth0_macvtap: entered promiscuous mode [ 84.336280][ T3099] veth1_macvtap: entered promiscuous mode [ 84.377618][ T3100] veth0_macvtap: entered promiscuous mode [ 84.406165][ T3100] veth1_macvtap: entered promiscuous mode [ 84.451109][ T1374] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.451763][ T1374] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.451887][ T1374] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.451952][ T1374] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.590349][ T29] audit: type=1400 audit(84.510:81): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 84.598534][ T1374] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.601969][ T1374] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.602227][ T1374] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.602411][ T1374] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.606688][ T29] audit: type=1400 audit(84.530:82): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/syzkaller.6n5RLY/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 84.613972][ T29] audit: type=1400 audit(84.540:83): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 84.622035][ T29] audit: type=1400 audit(84.550:84): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/syzkaller.6n5RLY/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 84.625695][ T29] audit: type=1400 audit(84.550:85): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/syzkaller.6n5RLY/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3073 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 84.641886][ T29] audit: type=1400 audit(84.570:86): avc: denied { unmount } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 84.651059][ T29] audit: type=1400 audit(84.570:87): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 84.651324][ T29] audit: type=1400 audit(84.570:88): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="gadgetfs" ino=3074 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 84.661396][ T29] audit: type=1400 audit(84.580:89): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 84.663400][ T29] audit: type=1400 audit(84.590:90): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 84.738176][ T3099] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 85.681800][ T3724] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3724 comm=syz.0.9 [ 86.007330][ T3737] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=3737 comm=syz.1.16 [ 86.879581][ T3777] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3777 comm=syz.1.36 [ 89.551354][ T9] usb 1-1: new full-speed USB device number 2 using dummy_hcd [ 89.726358][ T29] kauditd_printk_skb: 12 callbacks suppressed [ 89.729036][ T29] audit: type=1400 audit(89.650:103): avc: denied { create } for pid=3885 comm="syz.1.89" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 89.746166][ T9] usb 1-1: unable to get BOS descriptor or descriptor too short [ 89.751519][ T9] usb 1-1: not running at top speed; connect to a high speed hub [ 89.759160][ T9] usb 1-1: config 1 has an invalid interface number: 2 but max is 1 [ 89.759449][ T9] usb 1-1: config 1 has an invalid interface number: 57 but max is 1 [ 89.759799][ T9] usb 1-1: config 1 has no interface number 0 [ 89.759873][ T9] usb 1-1: config 1 has no interface number 1 [ 89.760427][ T9] usb 1-1: config 1 interface 2 altsetting 8 endpoint 0x5 has invalid maxpacket 1023, setting to 64 [ 89.760777][ T9] usb 1-1: config 1 interface 2 has no altsetting 0 [ 89.760842][ T9] usb 1-1: config 1 interface 57 has no altsetting 0 [ 89.774456][ T9] usb 1-1: New USB device found, idVendor=1514, idProduct=2008, bcdDevice=57.90 [ 89.774712][ T9] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 89.774984][ T9] usb 1-1: Product: syz [ 89.775034][ T9] usb 1-1: Manufacturer: syz [ 89.775061][ T9] usb 1-1: SerialNumber: syz [ 89.778439][ T29] audit: type=1400 audit(89.700:104): avc: denied { ioctl } for pid=3885 comm="syz.1.89" path="socket:[3390]" dev="sockfs" ino=3390 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 90.022047][ T9] ftdi_sio 1-1:1.2: FTDI USB Serial Device converter detected [ 90.024496][ T9] ftdi_sio ttyUSB0: unknown device type: 0x5790 [ 90.038288][ T9] usb 1-1: USB disconnect, device number 2 [ 90.043340][ T9] ftdi_sio 1-1:1.2: device disconnected [ 90.262515][ T29] audit: type=1400 audit(90.190:105): avc: denied { append } for pid=3911 comm="syz.0.95" name="zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 90.542424][ T29] audit: type=1400 audit(90.460:106): avc: denied { allowed } for pid=3922 comm="syz.1.100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 90.554976][ T29] audit: type=1400 audit(90.480:107): avc: denied { create } for pid=3922 comm="syz.1.100" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 91.298592][ T29] audit: type=1400 audit(91.220:108): avc: denied { create } for pid=3956 comm="syz.0.117" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 91.308117][ T29] audit: type=1400 audit(91.230:109): avc: denied { write } for pid=3956 comm="syz.0.117" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 91.731395][ T29] audit: type=1400 audit(91.660:110): avc: denied { create } for pid=3975 comm="syz.0.127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 91.737810][ T29] audit: type=1400 audit(91.660:111): avc: denied { write } for pid=3975 comm="syz.0.127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 93.326106][ T4059] SELinux: Context system_u:object_r:updpwd_exec_t:s0 is not valid (left unmapped). [ 93.329329][ T29] audit: type=1400 audit(93.250:112): avc: denied { relabelto } for pid=4056 comm="syz.0.167" name="rfkill" dev="devtmpfs" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:updpwd_exec_t:s0" [ 94.514402][ T4136] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 96.270981][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 96.272188][ T29] audit: type=1400 audit(96.190:117): avc: denied { read } for pid=4233 comm="syz.1.254" name="rfkill" dev="devtmpfs" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:updpwd_exec_t:s0" [ 96.274449][ T29] audit: type=1400 audit(96.190:118): avc: denied { open } for pid=4233 comm="syz.1.254" path="/dev/rfkill" dev="devtmpfs" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:updpwd_exec_t:s0" [ 96.944370][ T29] audit: type=1400 audit(96.870:119): avc: denied { create } for pid=4273 comm="syz.1.275" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 96.954061][ T29] audit: type=1400 audit(96.880:120): avc: denied { getopt } for pid=4273 comm="syz.1.275" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 97.205950][ T29] audit: type=1400 audit(97.130:121): avc: denied { create } for pid=4283 comm="syz.0.280" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 98.274412][ T4329] Zero length message leads to an empty skb [ 98.328950][ T29] audit: type=1400 audit(98.250:122): avc: denied { create } for pid=4332 comm="syz.1.305" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 98.332743][ T29] audit: type=1400 audit(98.260:123): avc: denied { ioctl } for pid=4332 comm="syz.1.305" path="socket:[4360]" dev="sockfs" ino=4360 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 98.419703][ T29] audit: type=1400 audit(98.340:124): avc: denied { create } for pid=4336 comm="syz.0.307" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 98.425445][ T29] audit: type=1400 audit(98.350:125): avc: denied { write } for pid=4336 comm="syz.0.307" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 98.909192][ T29] audit: type=1400 audit(98.830:126): avc: denied { create } for pid=4357 comm="syz.0.317" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 99.648525][ T4393] SELinux: Context system_u:object_r:audisp_var_run_t:s0 is not valid (left unmapped). [ 101.331367][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 101.332404][ T29] audit: type=1400 audit(101.240:130): avc: denied { associate } for pid=4468 comm="syz.0.376" name="pfkey" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 101.883672][ T4497] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 101.891942][ T29] audit: type=1400 audit(101.810:131): avc: denied { getopt } for pid=4494 comm="syz.1.385" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 102.393231][ T29] audit: type=1400 audit(102.320:132): avc: denied { connect } for pid=4518 comm="syz.1.398" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 102.838499][ T29] audit: type=1400 audit(102.760:133): avc: denied { create } for pid=4542 comm="syz.1.409" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 102.845394][ T29] audit: type=1400 audit(102.770:134): avc: denied { lock } for pid=4542 comm="syz.1.409" path="socket:[5552]" dev="sockfs" ino=5552 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 103.378199][ T29] audit: type=1400 audit(103.300:135): avc: denied { prog_load } for pid=4569 comm="syz.1.423" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 103.385948][ T29] audit: type=1400 audit(103.310:136): avc: denied { perfmon } for pid=4569 comm="syz.1.423" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 103.417909][ T29] audit: type=1400 audit(103.340:137): avc: denied { prog_run } for pid=4569 comm="syz.1.423" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 103.657679][ T4574] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4574 comm=syz.0.424 [ 104.861887][ T29] audit: type=1400 audit(104.790:138): avc: denied { ioctl } for pid=4586 comm="syz.0.431" path="socket:[4769]" dev="sockfs" ino=4769 ioctlcmd=0x4b60 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 109.157211][ T4634] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4634 comm=syz.1.453 [ 119.620733][ T23] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 119.771139][ T23] usb 1-1: Using ep0 maxpacket: 16 [ 119.779431][ T23] usb 1-1: unable to get BOS descriptor or descriptor too short [ 119.786444][ T23] usb 1-1: config 1 interface 0 altsetting 2 bulk endpoint 0x1 has invalid maxpacket 16 [ 119.786803][ T23] usb 1-1: config 1 interface 0 altsetting 2 has 2 endpoint descriptors, different from the interface descriptor's value: 1 [ 119.787146][ T23] usb 1-1: config 1 interface 0 has no altsetting 0 [ 119.802372][ T23] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 119.802721][ T23] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 119.802995][ T23] usb 1-1: Product: syz [ 119.803043][ T23] usb 1-1: Manufacturer: syz [ 119.803069][ T23] usb 1-1: SerialNumber: syz [ 119.810242][ T4858] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 120.244573][ T23] usb 1-1: USB disconnect, device number 3 [ 121.508512][ T29] audit: type=1400 audit(121.430:139): avc: denied { execute } for pid=4937 comm="syz.1.600" name="file0" dev="tmpfs" ino=1577 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 122.727945][ T4996] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4996 comm=syz.0.627 [ 123.215353][ T5018] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=5018 comm=syz.0.637 [ 123.851278][ T10] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 124.044316][ T10] usb 1-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 124.045730][ T10] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 124.050988][ T10] usb 1-1: Product: syz [ 124.051689][ T10] usb 1-1: Manufacturer: syz [ 124.053467][ T10] usb 1-1: SerialNumber: syz [ 133.603150][ T4618] usb 1-1: USB disconnect, device number 4 [ 133.921110][ T4618] usb 2-1: new full-speed USB device number 2 using dummy_hcd [ 134.078628][ T4618] usb 2-1: unable to get BOS descriptor or descriptor too short [ 134.084327][ T4618] usb 2-1: not running at top speed; connect to a high speed hub [ 134.092602][ T4618] usb 2-1: config 1 has an invalid interface number: 2 but max is 1 [ 134.092890][ T4618] usb 2-1: config 1 has an invalid interface number: 57 but max is 1 [ 134.093201][ T4618] usb 2-1: config 1 has no interface number 0 [ 134.093253][ T4618] usb 2-1: config 1 has no interface number 1 [ 134.093313][ T4618] usb 2-1: config 1 interface 2 altsetting 8 endpoint 0x5 has invalid maxpacket 1023, setting to 64 [ 134.093372][ T4618] usb 2-1: config 1 interface 2 has no altsetting 0 [ 134.093441][ T4618] usb 2-1: config 1 interface 57 has no altsetting 0 [ 134.108160][ T4618] usb 2-1: New USB device found, idVendor=1514, idProduct=2008, bcdDevice=57.90 [ 134.108365][ T4618] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 134.108496][ T4618] usb 2-1: Product: syz [ 134.108580][ T4618] usb 2-1: Manufacturer: syz [ 134.108660][ T4618] usb 2-1: SerialNumber: syz [ 134.328574][ T4618] ftdi_sio 2-1:1.2: FTDI USB Serial Device converter detected [ 134.334471][ T4618] ftdi_sio ttyUSB0: unknown device type: 0x5790 [ 134.371467][ T4618] usb 2-1: USB disconnect, device number 2 [ 134.373732][ T4618] ftdi_sio 2-1:1.2: device disconnected [ 141.406524][ T29] audit: type=1400 audit(141.330:140): avc: denied { read } for pid=5364 comm="syz.0.795" name="card1" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:audisp_var_run_t:s0" [ 141.407762][ T29] audit: type=1400 audit(141.330:141): avc: denied { open } for pid=5364 comm="syz.0.795" path="/dev/dri/card1" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:audisp_var_run_t:s0" [ 144.989085][ T29] audit: type=1400 audit(144.910:142): avc: denied { accept } for pid=5532 comm="syz.0.879" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 [ 145.684640][ T29] audit: type=1400 audit(145.610:143): avc: denied { setattr } for pid=5563 comm="syz.0.895" name="" dev="pipefs" ino=8355 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 146.074713][ T29] audit: type=1400 audit(146.000:144): avc: denied { ioctl } for pid=5577 comm="syz.1.902" path="socket:[8379]" dev="sockfs" ino=8379 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 147.385119][ T29] audit: type=1400 audit(147.310:145): avc: denied { ioctl } for pid=5627 comm="syz.0.924" path="socket:[8463]" dev="sockfs" ino=8463 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 148.223908][ T29] audit: type=1400 audit(148.150:146): avc: denied { ioctl } for pid=5663 comm="syz.1.944" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=8524 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 149.566045][ T5722] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5722 comm=syz.1.971 [ 151.822320][ T29] audit: type=1400 audit(151.750:147): avc: denied { create } for pid=5816 comm="syz.0.1021" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 151.826001][ T29] audit: type=1400 audit(151.750:148): avc: denied { write } for pid=5816 comm="syz.0.1021" path="socket:[9661]" dev="sockfs" ino=9661 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 152.618079][ T29] audit: type=1400 audit(152.540:149): avc: denied { lock } for pid=5850 comm="syz.1.1035" path="socket:[8789]" dev="sockfs" ino=8789 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 153.345436][ T5893] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5893 comm=syz.0.1055 [ 153.681581][ T29] audit: type=1400 audit(153.610:150): avc: denied { create } for pid=5912 comm="syz.1.1065" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 153.686433][ T29] audit: type=1400 audit(153.610:151): avc: denied { setopt } for pid=5912 comm="syz.1.1065" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 154.473090][ T29] audit: type=1400 audit(154.400:152): avc: denied { create } for pid=5951 comm="syz.1.1084" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 156.261023][ T29] audit: type=1400 audit(156.180:153): avc: denied { write } for pid=6004 comm="syz.1.1109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 158.234358][ T29] audit: type=1400 audit(158.160:154): avc: denied { write } for pid=6093 comm="syz.1.1153" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 158.411598][ T29] audit: type=1400 audit(158.340:155): avc: denied { setopt } for pid=6100 comm="syz.1.1156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 159.165797][ T6138] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=6138 comm=syz.1.1174 [ 159.583916][ T6157] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6157 comm=syz.1.1184 [ 161.063650][ T6226] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=9 sclass=netlink_route_socket pid=6226 comm=syz.1.1218 [ 161.351348][ T44] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 161.511076][ T44] usb 1-1: Using ep0 maxpacket: 8 [ 161.518648][ T44] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 161.519339][ T44] usb 1-1: config 0 has 0 interfaces, different from the descriptor's value: 1 [ 161.529722][ T44] usb 1-1: New USB device found, idVendor=04a5, idProduct=3003, bcdDevice=44.b2 [ 161.531307][ T44] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 161.531380][ T44] usb 1-1: Product: syz [ 161.531411][ T44] usb 1-1: Manufacturer: syz [ 161.531444][ T44] usb 1-1: SerialNumber: syz [ 161.542542][ T44] usb 1-1: config 0 descriptor?? [ 161.754470][ C1] raw-gadget.0 gadget.0: ignoring, device is not running [ 161.769354][ T44] usb 1-1: USB disconnect, device number 5 [ 162.566482][ T29] audit: type=1400 audit(162.490:156): avc: denied { lock } for pid=6288 comm="syz.1.1245" path="socket:[10586]" dev="sockfs" ino=10586 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 162.836350][ T29] audit: type=1400 audit(162.760:157): avc: denied { ioctl } for pid=6299 comm="syz.1.1249" path="socket:[11389]" dev="sockfs" ino=11389 ioctlcmd=0x5566 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 165.318868][ T29] audit: type=1400 audit(165.240:158): avc: denied { setopt } for pid=6408 comm="syz.1.1304" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 166.299862][ T6451] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5121 sclass=netlink_audit_socket pid=6451 comm=syz.1.1323 [ 166.771963][ T29] audit: type=1400 audit(166.700:159): avc: denied { ioctl } for pid=6468 comm="syz.0.1333" path="socket:[10878]" dev="sockfs" ino=10878 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 167.591069][ T44] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 167.751646][ T44] usb 2-1: Using ep0 maxpacket: 8 [ 167.760822][ T44] usb 2-1: config 0 interface 0 altsetting 128 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 167.761296][ T44] usb 2-1: config 0 interface 0 altsetting 128 endpoint 0x81 has invalid wMaxPacketSize 0 [ 167.761516][ T44] usb 2-1: config 0 interface 0 has no altsetting 0 [ 167.761617][ T44] usb 2-1: New USB device found, idVendor=044e, idProduct=121e, bcdDevice= 0.00 [ 167.761659][ T44] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 167.767785][ T44] usb 2-1: config 0 descriptor?? [ 168.190692][ T44] usbhid 2-1:0.0: can't add hid device: -71 [ 168.192567][ T44] usbhid 2-1:0.0: probe with driver usbhid failed with error -71 [ 168.211435][ T44] usb 2-1: USB disconnect, device number 3 [ 175.981144][ T6876] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=6876 comm=syz.1.1527 [ 176.146836][ T29] audit: type=1400 audit(176.070:160): avc: denied { map_create } for pid=6881 comm="syz.0.1530" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 176.150003][ T29] audit: type=1400 audit(176.070:161): avc: denied { map_read map_write } for pid=6881 comm="syz.0.1530" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 176.262379][ T29] audit: type=1400 audit(176.190:162): avc: denied { ioctl } for pid=6885 comm="syz.0.1532" path="socket:[13374]" dev="sockfs" ino=13374 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 178.943742][ T7003] comedi comedi0: Minor 3 could not be opened [ 179.582378][ T7034] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7034 comm=syz.0.1603 [ 181.174376][ T7116] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7116 comm=syz.1.1644 [ 183.783102][ T29] audit: type=1400 audit(183.710:163): avc: granted { setsecparam } for pid=7228 comm="syz.1.1702" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 183.959283][ T7239] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7239 comm=syz.0.1705 [ 186.891140][ T3059] usb 2-1: new high-speed USB device number 4 using dummy_hcd [ 187.041197][ T3059] usb 2-1: Using ep0 maxpacket: 8 [ 187.047158][ T3059] usb 2-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 187.048721][ T3059] usb 2-1: config 0 has 0 interfaces, different from the descriptor's value: 1 [ 187.059603][ T3059] usb 2-1: New USB device found, idVendor=04a5, idProduct=3003, bcdDevice=44.b2 [ 187.059891][ T3059] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 187.060408][ T3059] usb 2-1: Product: syz [ 187.060458][ T3059] usb 2-1: Manufacturer: syz [ 187.060530][ T3059] usb 2-1: SerialNumber: syz [ 187.064551][ T3059] usb 2-1: config 0 descriptor?? [ 187.290701][ T3059] usb 2-1: USB disconnect, device number 4 [ 189.055276][ T7398] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1541 sclass=netlink_route_socket pid=7398 comm=syz.0.1779 [ 189.285973][ T7402] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1019 sclass=netlink_route_socket pid=7402 comm=syz.0.1782 [ 189.516534][ T7406] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=7406 comm=syz.0.1784 [ 193.769351][ T29] audit: type=1400 audit(193.690:164): avc: denied { create } for pid=7478 comm="syz.0.1819" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 193.784620][ T29] audit: type=1400 audit(193.710:165): avc: denied { write } for pid=7478 comm="syz.0.1819" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 196.371556][ T29] audit: type=1400 audit(196.300:166): avc: denied { ioctl } for pid=7511 comm="syz.0.1836" path="socket:[15472]" dev="sockfs" ino=15472 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 198.121678][ T29] audit: type=1400 audit(198.030:167): avc: denied { setattr } for pid=7536 comm="syz.1.1849" name="UDP-Lite" dev="sockfs" ino=15525 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 198.498056][ T29] audit: type=1400 audit(198.420:168): avc: denied { map } for pid=7545 comm="syz.0.1852" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=15538 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 198.499024][ T29] audit: type=1400 audit(198.420:169): avc: denied { read write } for pid=7545 comm="syz.0.1852" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=15538 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 200.841437][ T1470] usb 2-1: new high-speed USB device number 5 using dummy_hcd [ 201.001015][ T1470] usb 2-1: Using ep0 maxpacket: 16 [ 201.007820][ T1470] usb 2-1: unable to get BOS descriptor or descriptor too short [ 201.014602][ T1470] usb 2-1: config 1 interface 0 altsetting 2 bulk endpoint 0x1 has invalid maxpacket 16 [ 201.014881][ T1470] usb 2-1: config 1 interface 0 altsetting 2 has 2 endpoint descriptors, different from the interface descriptor's value: 1 [ 201.015169][ T1470] usb 2-1: config 1 interface 0 has no altsetting 0 [ 201.029239][ T1470] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 201.029528][ T1470] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 201.029814][ T1470] usb 2-1: Product: syz [ 201.029863][ T1470] usb 2-1: Manufacturer: syz [ 201.029892][ T1470] usb 2-1: SerialNumber: syz [ 201.041313][ T7653] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 201.468754][ T1470] usb 2-1: USB disconnect, device number 5 [ 201.529956][ T29] audit: type=1400 audit(201.450:170): avc: denied { lock } for pid=7666 comm="syz.0.1909" path="socket:[14754]" dev="sockfs" ino=14754 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 201.828968][ T7682] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7682 comm=syz.0.1912 [ 202.868372][ T29] audit: type=1400 audit(202.790:171): avc: denied { setopt } for pid=7726 comm="syz.0.1935" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 205.889060][ T29] audit: type=1400 audit(205.810:172): avc: denied { validate_trans } for pid=7866 comm="syz.0.2005" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 206.539422][ T29] audit: type=1400 audit(206.460:173): avc: denied { unmount } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 206.644685][ T7903] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=7903 comm=syz.1.2023 [ 208.961071][ T1470] usb 2-1: new high-speed USB device number 6 using dummy_hcd [ 209.130977][ T1470] usb 2-1: Using ep0 maxpacket: 32 [ 209.136773][ T1470] usb 2-1: config 0 has no interfaces? [ 209.137137][ T1470] usb 2-1: New USB device found, idVendor=03f0, idProduct=6c17, bcdDevice= 0.40 [ 209.137191][ T1470] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 209.140047][ T1470] usb 2-1: config 0 descriptor?? [ 209.363657][ T3059] usb 2-1: USB disconnect, device number 6 [ 209.765001][ T29] audit: type=1400 audit(209.690:174): avc: denied { ioctl } for pid=8035 comm="syz.1.2084" path="socket:[15338]" dev="sockfs" ino=15338 ioctlcmd=0x8904 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 210.523616][ T8068] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=8068 comm=syz.0.2100 [ 211.297446][ T29] audit: type=1400 audit(211.220:175): avc: granted { setsecparam } for pid=8101 comm="syz.0.2114" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 213.385025][ T8211] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1541 sclass=netlink_route_socket pid=8211 comm=syz.1.2171 [ 218.752900][ T8395] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8395 comm=syz.1.2263 [ 219.269660][ T29] audit: type=1400 audit(219.190:176): avc: denied { ioctl } for pid=8428 comm="syz.1.2280" path="time:[4026531834]" dev="nsfs" ino=4026531834 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 220.691201][ T41] usb 1-1: new high-speed USB device number 6 using dummy_hcd [ 220.841725][ T41] usb 1-1: Using ep0 maxpacket: 8 [ 220.851143][ T41] usb 1-1: config 0 interface 0 altsetting 128 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 220.851505][ T41] usb 1-1: config 0 interface 0 altsetting 128 endpoint 0x81 has invalid wMaxPacketSize 0 [ 220.851685][ T41] usb 1-1: config 0 interface 0 has no altsetting 0 [ 220.851780][ T41] usb 1-1: New USB device found, idVendor=044e, idProduct=121e, bcdDevice= 0.00 [ 220.851819][ T41] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 220.855941][ T41] usb 1-1: config 0 descriptor?? [ 221.276200][ T41] usbhid 1-1:0.0: can't add hid device: -71 [ 221.276686][ T41] usbhid 1-1:0.0: probe with driver usbhid failed with error -71 [ 221.287176][ T41] usb 1-1: USB disconnect, device number 6 [ 222.125835][ T29] audit: type=1400 audit(222.050:177): avc: denied { node_bind } for pid=8543 comm="syz.0.2330" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 225.152402][ T8644] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=17 sclass=netlink_tcpdiag_socket pid=8644 comm=syz.1.2379 [ 225.271738][ T8648] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8648 comm=syz.1.2382 [ 227.952363][ T29] audit: type=1400 audit(227.880:178): avc: denied { ioctl } for pid=8762 comm="syz.0.2442" path="socket:[18641]" dev="sockfs" ino=18641 ioctlcmd=0x8919 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 228.446249][ T8782] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2306 sclass=netlink_route_socket pid=8782 comm=syz.1.2446 [ 230.721046][ T44] usb 1-1: new high-speed USB device number 7 using dummy_hcd [ 230.815852][ T29] audit: type=1400 audit(230.740:179): avc: granted { setsecparam } for pid=8885 comm="syz.1.2493" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 230.881915][ T44] usb 1-1: Using ep0 maxpacket: 32 [ 230.897672][ T44] usb 1-1: config 0 has no interfaces? [ 230.898021][ T44] usb 1-1: New USB device found, idVendor=03f0, idProduct=6c17, bcdDevice= 0.40 [ 230.898286][ T44] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 230.911544][ T44] usb 1-1: config 0 descriptor?? [ 231.149003][ T44] usb 1-1: USB disconnect, device number 7 [ 233.090902][ T41] usb 1-1: new high-speed USB device number 8 using dummy_hcd [ 233.258568][ T41] usb 1-1: unable to get BOS descriptor or descriptor too short [ 233.263631][ T41] usb 1-1: config 6 has an invalid interface number: 202 but max is 0 [ 233.263914][ T41] usb 1-1: config 6 has no interface number 0 [ 233.264300][ T41] usb 1-1: config 6 interface 202 has no altsetting 0 [ 233.276362][ T41] usb 1-1: New USB device found, idVendor=1199, idProduct=6834, bcdDevice=9f.c5 [ 233.276629][ T41] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 233.276874][ T41] usb 1-1: Product: syz [ 233.277051][ T41] usb 1-1: Manufacturer: syz [ 233.277097][ T41] usb 1-1: SerialNumber: syz [ 233.511219][ T41] sierra 1-1:6.202: Sierra USB modem converter detected [ 233.525164][ T41] usb 1-1: Sierra USB modem converter now attached to ttyUSB0 [ 233.538004][ T41] usb 1-1: USB disconnect, device number 8 [ 233.550869][ T41] sierra ttyUSB0: Sierra USB modem converter now disconnected from ttyUSB0 [ 233.554235][ T41] sierra 1-1:6.202: device disconnected [ 234.948710][ T9063] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9063 comm=syz.1.2567 [ 237.508234][ T9188] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=9188 comm=syz.0.2629 [ 239.494153][ T9200] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1548 sclass=netlink_route_socket pid=9200 comm=syz.0.2634 [ 247.629350][ T29] audit: type=1400 audit(247.550:180): avc: denied { load_policy } for pid=9368 comm="syz.1.2716" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 247.912997][ T29] audit: type=1400 audit(247.840:181): avc: denied { ioctl } for pid=9387 comm="syz.1.2727" path="/dev/dri/card1" dev="devtmpfs" ino=615 ioctlcmd=0x640b scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:audisp_var_run_t:s0" [ 248.079956][ T9399] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9399 comm=syz.0.2735 [ 248.228756][ T29] audit: type=1400 audit(248.150:182): avc: denied { lock } for pid=9407 comm="syz.0.2737" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 251.256272][ T9596] SELinux: Context system_u:object_r:getty_log_t:s0 is not valid (left unmapped). [ 251.258860][ T29] audit: type=1400 audit(251.180:183): avc: denied { relabelto } for pid=9594 comm="syz.0.2829" name="dsp" dev="devtmpfs" ino=725 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:getty_log_t:s0" [ 251.259252][ T29] audit: type=1400 audit(251.180:184): avc: denied { associate } for pid=9594 comm="syz.0.2829" name="dsp" dev="devtmpfs" ino=725 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 srawcon="system_u:object_r:getty_log_t:s0" [ 252.051149][ T41] usb 1-1: new high-speed USB device number 9 using dummy_hcd [ 252.200790][ T41] usb 1-1: Using ep0 maxpacket: 8 [ 252.208259][ T41] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 252.211185][ T41] usb 1-1: New USB device found, idVendor=07c0, idProduct=1512, bcdDevice=30.22 [ 252.211420][ T41] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 252.216923][ T41] usb 1-1: config 0 descriptor?? [ 252.641019][ T41] iowarrior 1-1:0.0: IOWarrior product=0x1512, serial= interface=0 now attached to iowarrior0 [ 252.645050][ T41] usb 1-1: USB disconnect, device number 9 [ 254.488677][ T29] audit: type=1400 audit(254.410:185): avc: denied { lock } for pid=9666 comm="syz.1.2856" path="socket:[21926]" dev="sockfs" ino=21926 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 255.081324][ T9693] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=9693 comm=syz.0.2873 [ 255.588382][ T29] audit: type=1400 audit(255.510:186): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 255.588641][ T29] audit: type=1400 audit(255.510:187): avc: denied { open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 255.588701][ T29] audit: type=1400 audit(255.510:188): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 255.653406][ T29] audit: type=1400 audit(255.580:189): avc: denied { read } for pid=9713 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 255.744194][ T29] audit: type=1400 audit(255.670:190): avc: denied { create } for pid=9715 comm="syz.0.2878" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 255.756016][ T29] audit: type=1400 audit(255.680:191): avc: denied { write } for pid=9715 comm="syz.0.2878" path="socket:[21127]" dev="sockfs" ino=21127 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 255.809685][ T29] audit: type=1400 audit(255.730:192): avc: denied { module_request } for pid=9717 comm="syz.1.2879" kmod="bridge" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 256.316373][ T29] audit: type=1400 audit(256.240:193): avc: denied { create } for pid=9737 comm="syz.1.2892" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 256.327806][ T29] audit: type=1400 audit(256.250:194): avc: denied { write } for pid=9737 comm="syz.1.2892" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 256.778771][ T9759] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9759 comm=syz.0.2898 [ 257.511211][ T41] usb 2-1: new high-speed USB device number 7 using dummy_hcd [ 257.671854][ T41] usb 2-1: unable to get BOS descriptor or descriptor too short [ 257.677788][ T41] usb 2-1: config 6 has an invalid interface number: 202 but max is 0 [ 257.683240][ T41] usb 2-1: config 6 has no interface number 0 [ 257.686738][ T41] usb 2-1: config 6 interface 202 has no altsetting 0 [ 257.704020][ T41] usb 2-1: New USB device found, idVendor=1199, idProduct=6834, bcdDevice=9f.c5 [ 257.705568][ T41] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 257.709795][ T41] usb 2-1: Product: syz [ 257.712745][ T41] usb 2-1: Manufacturer: syz [ 257.714991][ T41] usb 2-1: SerialNumber: syz [ 257.936060][ T41] sierra 2-1:6.202: Sierra USB modem converter detected [ 257.942911][ T41] usb 2-1: Sierra USB modem converter now attached to ttyUSB0 [ 257.945345][ T41] usb 2-1: USB disconnect, device number 7 [ 257.951493][ T41] sierra ttyUSB0: Sierra USB modem converter now disconnected from ttyUSB0 [ 257.953275][ T41] sierra 2-1:6.202: device disconnected [ 258.930780][ T9869] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9869 comm=syz.0.2942 [ 260.577596][ T29] kauditd_printk_skb: 11 callbacks suppressed [ 260.578634][ T29] audit: type=1400 audit(260.500:206): avc: denied { ioctl } for pid=9938 comm="syz.0.2980" path="socket:[21478]" dev="sockfs" ino=21478 ioctlcmd=0x8901 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 260.679833][ T29] audit: type=1400 audit(260.600:207): avc: denied { prog_load } for pid=9943 comm="syz.1.2982" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 260.682997][ T29] audit: type=1400 audit(260.610:208): avc: denied { bpf } for pid=9943 comm="syz.1.2982" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 260.684470][ T29] audit: type=1400 audit(260.610:209): avc: denied { perfmon } for pid=9943 comm="syz.1.2982" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 260.695313][ T29] audit: type=1400 audit(260.620:210): avc: denied { prog_run } for pid=9943 comm="syz.1.2982" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 262.268327][ T29] audit: type=1400 audit(262.180:211): avc: denied { sys_module } for pid=9962 comm="syz.1.2991" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 263.447627][ T29] audit: type=1400 audit(263.370:212): avc: denied { setattr } for pid=9968 comm="syz.0.2997" name="rdma_cm" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 267.569195][ T29] audit: type=1400 audit(267.490:213): avc: denied { create } for pid=10030 comm="syz.1.3024" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 267.688167][ T29] audit: type=1400 audit(267.610:214): avc: denied { name_bind } for pid=10035 comm="syz.1.3026" src=4867 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 268.374690][ T29] audit: type=1400 audit(268.300:215): avc: granted { setsecparam } for pid=10062 comm="syz.0.3041" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 268.755448][T10081] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10081 comm=syz.0.3049 [ 269.072713][ T29] audit: type=1400 audit(268.990:216): avc: denied { create } for pid=10094 comm="syz.1.3056" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 269.081629][ T29] audit: type=1400 audit(269.000:217): avc: denied { ioctl } for pid=10094 comm="syz.1.3056" path="socket:[22732]" dev="sockfs" ino=22732 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 269.147104][ T29] audit: type=1400 audit(269.070:218): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 269.158846][ T29] audit: type=1400 audit(269.080:219): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 269.159317][ T29] audit: type=1400 audit(269.080:220): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 269.228358][ T29] audit: type=1400 audit(269.150:221): avc: denied { read } for pid=10096 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 269.323557][ T29] audit: type=1400 audit(269.240:222): avc: denied { read } for pid=10098 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 272.573866][ T29] kauditd_printk_skb: 107 callbacks suppressed [ 272.579914][ T29] audit: type=1400 audit(272.490:330): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 272.581167][ T29] audit: type=1400 audit(272.500:331): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 272.624940][ T29] audit: type=1400 audit(272.550:332): avc: denied { read } for pid=10148 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 272.716026][ T29] audit: type=1400 audit(272.640:333): avc: denied { read } for pid=10150 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 272.771157][ T29] audit: type=1400 audit(272.690:334): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 272.778973][ T29] audit: type=1400 audit(272.700:335): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 272.788419][ T29] audit: type=1400 audit(272.710:336): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 272.807433][ T29] audit: type=1400 audit(272.730:337): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 272.807837][ T29] audit: type=1400 audit(272.730:338): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 272.813309][ T29] audit: type=1400 audit(272.740:339): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 277.602362][ T29] kauditd_printk_skb: 168 callbacks suppressed [ 277.603516][ T29] audit: type=1400 audit(277.530:508): avc: denied { read } for pid=10232 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 277.622249][ T29] audit: type=1400 audit(277.550:509): avc: denied { read } for pid=10233 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 277.686128][ T29] audit: type=1400 audit(277.610:510): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 277.692947][ T29] audit: type=1400 audit(277.620:511): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 277.698392][ T29] audit: type=1400 audit(277.620:512): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 277.726735][ T29] audit: type=1400 audit(277.650:513): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 277.728704][ T29] audit: type=1400 audit(277.650:514): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 277.731782][ T29] audit: type=1400 audit(277.660:515): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 277.789129][ T29] audit: type=1400 audit(277.710:516): avc: denied { read } for pid=10236 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 277.809466][ T29] audit: type=1400 audit(277.730:517): avc: denied { create } for pid=10236 comm="syz.1.3127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 281.882438][T10306] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10306 comm=syz.0.3164 [ 282.623287][ T29] kauditd_printk_skb: 177 callbacks suppressed [ 282.624366][ T29] audit: type=1400 audit(282.550:695): avc: denied { read } for pid=10318 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 282.646755][ T29] audit: type=1400 audit(282.570:696): avc: denied { create } for pid=10318 comm="syz.0.3166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 282.653533][ T29] audit: type=1400 audit(282.580:697): avc: denied { ioctl } for pid=10318 comm="syz.0.3166" path="socket:[23112]" dev="sockfs" ino=23112 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 282.733485][ T29] audit: type=1400 audit(282.660:698): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 282.736090][ T29] audit: type=1400 audit(282.660:699): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 282.748386][ T29] audit: type=1400 audit(282.670:700): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 282.776131][ T29] audit: type=1400 audit(282.700:701): avc: denied { read } for pid=10320 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 282.853332][ T29] audit: type=1400 audit(282.780:702): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 282.858229][ T29] audit: type=1400 audit(282.780:703): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 282.865642][ T29] audit: type=1400 audit(282.790:704): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 287.702145][ T29] kauditd_printk_skb: 192 callbacks suppressed [ 287.703309][ T29] audit: type=1400 audit(287.630:897): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 287.708404][ T29] audit: type=1400 audit(287.630:898): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 287.719566][ T29] audit: type=1400 audit(287.640:899): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 287.793054][ T29] audit: type=1400 audit(287.720:900): avc: denied { read } for pid=10412 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 287.889229][ T29] audit: type=1400 audit(287.810:901): avc: denied { read } for pid=10414 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 287.895398][ T29] audit: type=1400 audit(287.820:902): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 287.921976][ T29] audit: type=1400 audit(287.850:903): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 287.928615][ T29] audit: type=1400 audit(287.850:904): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 288.000416][ T29] audit: type=1400 audit(287.910:905): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 288.002077][ T29] audit: type=1400 audit(287.920:906): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 292.779726][ T29] kauditd_printk_skb: 188 callbacks suppressed [ 292.790814][ T29] audit: type=1400 audit(292.700:1095): avc: denied { read } for pid=10500 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 292.834379][ T29] audit: type=1400 audit(292.760:1096): avc: denied { read } for pid=10501 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 292.885535][ T29] audit: type=1400 audit(292.810:1097): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 292.888437][ T29] audit: type=1400 audit(292.810:1098): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 292.897468][ T29] audit: type=1400 audit(292.820:1099): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 292.972156][ T29] audit: type=1400 audit(292.900:1100): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 292.975362][ T29] audit: type=1400 audit(292.900:1101): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 292.983918][ T29] audit: type=1400 audit(292.910:1102): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 293.002142][ T29] audit: type=1400 audit(292.930:1103): avc: denied { read } for pid=10504 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 293.090798][ T29] audit: type=1400 audit(293.010:1104): avc: denied { read } for pid=10506 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 295.768127][T10555] random: crng reseeded on system resumption [ 297.813896][ T29] kauditd_printk_skb: 226 callbacks suppressed [ 297.814108][ T29] audit: type=1400 audit(297.740:1331): avc: denied { read } for pid=10602 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 297.827049][ T29] audit: type=1400 audit(297.750:1332): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 297.831536][ T29] audit: type=1400 audit(297.760:1333): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 297.833126][ T29] audit: type=1400 audit(297.760:1334): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 297.922878][ T29] audit: type=1400 audit(297.850:1335): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 297.925980][ T29] audit: type=1400 audit(297.850:1336): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 297.929177][ T29] audit: type=1400 audit(297.850:1337): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 297.978989][ T29] audit: type=1400 audit(297.900:1338): avc: denied { read } for pid=10604 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 297.994468][ T29] audit: type=1400 audit(297.920:1339): avc: denied { create } for pid=10604 comm="syz.1.3308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 297.998809][ T29] audit: type=1400 audit(297.920:1340): avc: denied { getopt } for pid=10604 comm="syz.1.3308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 301.148014][T10652] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10652 comm=syz.0.3331 [ 302.875764][ T29] kauditd_printk_skb: 161 callbacks suppressed [ 302.878533][ T29] audit: type=1400 audit(302.800:1502): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 302.896560][ T29] audit: type=1400 audit(302.820:1503): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 302.899141][ T29] audit: type=1400 audit(302.820:1504): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 302.947902][ T29] audit: type=1400 audit(302.870:1505): avc: denied { read } for pid=10681 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 302.980463][ T29] audit: type=1400 audit(302.900:1506): avc: denied { read write } for pid=10681 comm="syz.0.3347" name="zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 302.986299][ T29] audit: type=1400 audit(302.910:1507): avc: denied { read write open } for pid=10681 comm="syz.0.3347" path="/dev/zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 302.994663][ T29] audit: type=1400 audit(302.920:1508): avc: denied { map } for pid=10681 comm="syz.0.3347" path="/dev/zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 302.997071][ T29] audit: type=1400 audit(302.920:1509): avc: denied { read } for pid=10681 comm="syz.0.3347" path="/dev/zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 303.088112][ T29] audit: type=1400 audit(303.010:1510): avc: denied { read } for pid=10683 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 303.096197][ T29] audit: type=1400 audit(303.020:1511): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 304.876863][T10720] SELinux: Context system_u:object_r:var_lock_t:s0 is not valid (left unmapped). [ 306.949731][T10761] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=10761 comm=syz.0.3385 [ 307.888131][ T29] kauditd_printk_skb: 198 callbacks suppressed [ 307.900696][ T29] audit: type=1400 audit(307.810:1710): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 307.901074][ T29] audit: type=1400 audit(307.820:1711): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 307.955801][ T29] audit: type=1400 audit(307.880:1712): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 307.963162][ T29] audit: type=1400 audit(307.880:1713): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 307.963539][ T29] audit: type=1400 audit(307.890:1714): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 308.069962][ T29] audit: type=1400 audit(307.990:1715): avc: denied { read } for pid=10776 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 308.099938][ T29] audit: type=1400 audit(308.020:1716): avc: denied { read } for pid=10777 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 308.100728][ T29] audit: type=1400 audit(308.020:1717): avc: denied { create } for pid=10776 comm="syz.1.3393" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 308.117671][ T29] audit: type=1400 audit(308.040:1718): avc: denied { write } for pid=10776 comm="syz.1.3393" path="socket:[24856]" dev="sockfs" ino=24856 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 308.123268][ T29] audit: type=1400 audit(308.050:1719): avc: denied { write } for pid=10776 comm="syz.1.3393" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 312.942475][ T29] kauditd_printk_skb: 217 callbacks suppressed [ 312.944384][ T29] audit: type=1400 audit(312.870:1937): avc: denied { read } for pid=10876 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 312.958216][ T29] audit: type=1400 audit(312.880:1938): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 312.979772][ T29] audit: type=1400 audit(312.900:1939): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 312.990735][ T29] audit: type=1400 audit(312.910:1940): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 313.044368][ T29] audit: type=1400 audit(312.970:1941): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 313.053784][ T29] audit: type=1400 audit(312.980:1942): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 313.070691][ T29] audit: type=1400 audit(312.990:1943): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 313.162110][ T29] audit: type=1400 audit(313.090:1944): avc: denied { read } for pid=10878 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 313.199108][ T29] audit: type=1400 audit(313.120:1945): avc: denied { read } for pid=10879 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 313.288321][ T29] audit: type=1400 audit(313.210:1946): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 726.240925][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 430s! [swapper/0:0] [ 726.241203][ C0] Modules linked in: [ 726.241954][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted syzkaller #0 PREEMPT [ 726.242108][ C0] Hardware name: ARM-Versatile Express [ 726.242358][ C0] PC is at _raw_spin_lock+0x40/0x58 [ 726.243130][ C0] LR is at _raw_spin_lock+0x18/0x58 [ 726.243206][ C0] pc : [<81abbef4>] lr : [<81abbecc>] psr: 80000113 [ 726.243255][ C0] sp : 82801b58 ip : 82801b58 fp : 82801b6c [ 726.243295][ C0] r10: 81c05450 r9 : 843aaa40 r8 : 83ee0a88 [ 726.243336][ C0] r7 : 843aab68 r6 : 00000000 r5 : 00000001 r4 : 843aab68 [ 726.243381][ C0] r3 : 0000dbbb r2 : 0000dbbc r1 : 00000000 r0 : 00000001 [ 726.243496][ C0] Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 726.243577][ C0] Control: 30c5387d Table: 84e4b640 DAC: fffffffd [ 726.243691][ C0] Call trace: [ 726.244036][ C0] [<81abbeb4>] (_raw_spin_lock) from [<809c7a2c>] (gpio_mmio_set+0x44/0x80) [ 726.244412][ C0] r5:00000001 r4:843aaa40 [ 726.244519][ C0] [<809c79e8>] (gpio_mmio_set) from [<809b81e8>] (gpiochip_set+0x1c/0x44) [ 726.244609][ C0] r7:00000000 r6:00000000 r5:00000000 r4:842a3780 [ 726.244635][ C0] [<809b81cc>] (gpiochip_set) from [<809baab0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 726.244702][ C0] [<809baa38>] (gpiod_set_raw_value_commit) from [<809bc350>] (gpiod_set_value_nocheck+0x44/0x58) [ 726.244796][ C0] r10:81c05450 r9:82801cac r8:00000102 r7:000005f7 r6:00000024 r5:00000000 [ 726.244831][ C0] r4:842a3780 [ 726.244853][ C0] [<809bc30c>] (gpiod_set_value_nocheck) from [<809bc3a0>] (gpiod_set_value+0x3c/0x88) [ 726.244909][ C0] [<809bc364>] (gpiod_set_value) from [<809ccb3c>] (gpio_led_set+0x5c/0x60) [ 726.244973][ C0] r5:830fd844 r4:830fd844 [ 726.244998][ C0] [<809ccae0>] (gpio_led_set) from [<809ca3d4>] (led_set_brightness_nosleep+0x38/0x44) [ 726.245063][ C0] r5:830fd844 r4:84b3600c [ 726.245086][ C0] [<809ca39c>] (led_set_brightness_nosleep) from [<809cd438>] (led_heartbeat_function+0x84/0x144) [ 726.245147][ C0] [<809cd3b4>] (led_heartbeat_function) from [<80327070>] (call_timer_fn+0x30/0x220) [ 726.245243][ C0] r7:000005f7 r6:809cd3b4 r5:84b3600c r4:8281b500 [ 726.245269][ C0] [<80327040>] (call_timer_fn) from [<80327524>] (__run_timers+0x2c4/0x3f8) [ 726.245351][ C0] r9:82801cac r8:000005f7 r7:00000000 r6:809cd3b4 r5:dddc5f00 r4:84b3600c [ 726.245380][ C0] [<80327260>] (__run_timers) from [<803276c0>] (run_timer_base+0x68/0x78) [ 726.245471][ C0] r10:8281b500 r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 [ 726.245500][ C0] r4:dddc5f00 [ 726.245523][ C0] [<80327658>] (run_timer_base) from [<803276ec>] (run_timer_softirq+0x1c/0x34) [ 726.245594][ C0] r4:82804084 [ 726.245619][ C0] [<803276d0>] (run_timer_softirq) from [<8025b65c>] (handle_softirqs+0x140/0x458) [ 726.245691][ C0] [<8025b51c>] (handle_softirqs) from [<8025bad0>] (__irq_exit_rcu+0x110/0x1d0) [ 726.245771][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:82801df0 r6:82443f98 r5:8247f0cc [ 726.245801][ C0] r4:8281b500 [ 726.245823][ C0] [<8025b9c0>] (__irq_exit_rcu) from [<8025be48>] (irq_exit+0x10/0x18) [ 726.245889][ C0] r5:8247f0cc r4:826c3a9c [ 726.245912][ C0] [<8025be38>] (irq_exit) from [<81aad964>] (generic_handle_arch_irq+0x7c/0x80) [ 726.245985][ C0] [<81aad8e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 726.246137][ C0] Exception stack(0x82801df0 to 0x82801e38) [ 726.246342][ C0] 1de0: e0363008 00000005 0000dbbb 809c820c [ 726.246411][ C0] 1e00: 843aaa40 00000004 00000001 843aab68 83ee0a88 843aaa40 00000000 82801e5c [ 726.246454][ C0] 1e20: 82801e28 82801e40 809c7a4c 809c820c 20000013 ffffffff [ 726.246584][ C0] r9:8281b500 r8:83ee0a88 r7:82801e24 r6:ffffffff r5:20000013 r4:809c820c [ 726.246619][ C0] [<809c79e8>] (gpio_mmio_set) from [<809b81e8>] (gpiochip_set+0x1c/0x44) [ 726.246708][ C0] r7:00000001 r6:00000000 r5:00000002 r4:842a37a8 [ 726.246734][ C0] [<809b81cc>] (gpiochip_set) from [<809baab0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 726.246859][ C0] [<809baa38>] (gpiod_set_raw_value_commit) from [<809bc350>] (gpiod_set_value_nocheck+0x44/0x58) [ 726.246949][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:83884998 r5:00000001 [ 726.246981][ C0] r4:842a37a8 [ 726.247006][ C0] [<809bc30c>] (gpiod_set_value_nocheck) from [<809bc3a0>] (gpiod_set_value+0x3c/0x88) [ 726.247072][ C0] [<809bc364>] (gpiod_set_value) from [<809ccb3c>] (gpio_led_set+0x5c/0x60) [ 726.247139][ C0] r5:000000ff r4:830fda24 [ 726.247175][ C0] [<809ccae0>] (gpio_led_set) from [<809ca464>] (led_set_brightness+0x84/0x90) [ 726.247242][ C0] r5:000000ff r4:830fda24 [ 726.247266][ C0] [<809ca3e0>] (led_set_brightness) from [<809cbfe4>] (led_trigger_event+0x40/0x58) [ 726.247331][ C0] r5:000000ff r4:830fda24 [ 726.247355][ C0] [<809cbfa4>] (led_trigger_event) from [<809cd640>] (ledtrig_cpu+0xac/0xf4) [ 726.247429][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000000fe [ 726.247452][ C0] [<809cd594>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 726.247529][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 726.247555][ C0] [<80227a24>] (arch_cpu_idle_exit) from [<802b168c>] (do_idle+0x5c/0x2d8) [ 726.247627][ C0] [<802b1630>] (do_idle) from [<802b1c38>] (cpu_startup_entry+0x30/0x34) [ 726.247707][ C0] r10:8281aff4 r9:8280c680 r8:823bec64 r7:00000000 r6:deffc06c r5:828222e8 [ 726.247734][ C0] r4:000000ed [ 726.247753][ C0] [<802b1c08>] (cpu_startup_entry) from [<81aaf37c>] (kernel_init+0x0/0x138) [ 726.247825][ C0] [<81aaf29c>] (rest_init) from [<8260145c>] (start_kernel+0x844/0x860) [ 726.247938][ C0] [<82600c18>] (start_kernel) from [<00000000>] (0x0) [ 726.248721][ C0] Sending NMI from CPU 0 to CPUs 1: [ 726.249476][ C1] NMI backtrace for cpu 1 [ 726.249633][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Not tainted syzkaller #0 PREEMPT [ 726.249695][ C1] Hardware name: ARM-Versatile Express [ 726.249723][ C1] PC is at _raw_spin_unlock_irq+0x28/0x54 [ 726.249804][ C1] LR is at tmigr_handle_remote_up+0x268/0x4b0 [ 726.249855][ C1] pc : [<81abbd3c>] lr : [<80346ef4>] psr: 60000113 [ 726.249883][ C1] sp : df805e08 ip : df805e18 fp : df805e14 [ 726.249907][ C1] r10: 00000002 r9 : 00000049 r8 : 678e6d80 [ 726.249928][ C1] r7 : dddc7488 r6 : df805ee0 r5 : 830bf3b0 r4 : 830bf380 [ 726.249951][ C1] r3 : 0000ecdd r2 : 00000103 r1 : 830bf3b0 r0 : dddc7488 [ 726.249974][ C1] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 726.250014][ C1] Control: 30c5387d Table: 85966240 DAC: 00000000 [ 726.250035][ C1] Call trace: frame pointer underflow [ 726.250137][ C1] [<81abbd14>] (_raw_spin_unlock_irq) from [<80346ef4>] (tmigr_handle_remote_up+0x268/0x4b0) [ 726.250221][ C1] [<80346c8c>] (tmigr_handle_remote_up) from [<803451a4>] (__walk_groups_from+0x3c/0xe4) [ 726.250304][ C1] r10:83216000 r9:8280c820 r8:80346c8c r7:df805ee0 r6:830bf380 r5:00000002 [ 726.250333][ C1] r4:830bf380 [ 726.250351][ C1] [<80345168>] (__walk_groups_from) from [<8034753c>] (tmigr_handle_remote+0xe8/0x108) [ 726.250441][ C1] r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 r4:ddddb488 [ 726.250464][ C1] [<80347454>] (tmigr_handle_remote) from [<80327700>] (run_timer_softirq+0x30/0x34) [ 726.250532][ C1] r4:82804084 [ 726.250552][ C1] [<803276d0>] (run_timer_softirq) from [<8025b65c>] (handle_softirqs+0x140/0x458) [ 726.250617][ C1] [<8025b51c>] (handle_softirqs) from [<8025bad0>] (__irq_exit_rcu+0x110/0x1d0) [ 726.250691][ C1] r10:00000000 r9:83216000 r8:00000000 r7:df865e08 r6:82443f98 r5:8247f0cc [ 726.250714][ C1] r4:83216000 [ 726.250732][ C1] [<8025b9c0>] (__irq_exit_rcu) from [<8025be48>] (irq_exit+0x10/0x18) [ 726.250794][ C1] r5:8247f0cc r4:826c3a9c [ 726.250815][ C1] [<8025be38>] (irq_exit) from [<81aad964>] (generic_handle_arch_irq+0x7c/0x80) [ 726.250877][ C1] [<81aad8e8>] (generic_handle_arch_irq) from [<81a7d904>] (call_with_stack+0x1c/0x20) [ 726.250952][ C1] r9:83216000 r8:83ee0a88 r7:df865e3c r6:ffffffff r5:80000013 r4:81abbef4 [ 726.250973][ C1] [<81a7d8e8>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc) [ 726.251025][ C1] Exception stack(0xdf865e08 to 0xdf865e50) [ 726.251074][ C1] 5e00: 00000001 00000000 0000dbbd 0000dbbb 843aab68 00000008 [ 726.251113][ C1] 5e20: 00000001 843aab68 83ee0a88 843aaa40 00000000 df865e6c df865e58 df865e58 [ 726.251142][ C1] 5e40: 81abbecc 81abbef4 80000013 ffffffff [ 726.251195][ C1] [<81abbeb4>] (_raw_spin_lock) from [<809c7a2c>] (gpio_mmio_set+0x44/0x80) [ 726.251279][ C1] r5:00000008 r4:843aaa40 [ 726.251303][ C1] [<809c79e8>] (gpio_mmio_set) from [<809b81e8>] (gpiochip_set+0x1c/0x44) [ 726.251381][ C1] r7:00000001 r6:00000000 r5:00000003 r4:842a37bc [ 726.251404][ C1] [<809b81cc>] (gpiochip_set) from [<809baab0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 726.251470][ C1] [<809baa38>] (gpiod_set_raw_value_commit) from [<809bc350>] (gpiod_set_value_nocheck+0x44/0x58) [ 726.251540][ C1] r10:00000000 r9:00000000 r8:00000001 r7:ddde24c0 r6:838849d8 r5:00000001 [ 726.251567][ C1] r4:842a37bc [ 726.251586][ C1] [<809bc30c>] (gpiod_set_value_nocheck) from [<809bc3a0>] (gpiod_set_value+0x3c/0x88) [ 726.251637][ C1] [<809bc364>] (gpiod_set_value) from [<809ccb3c>] (gpio_led_set+0x5c/0x60) [ 726.251696][ C1] r5:000000ff r4:830fdb14 [ 726.251719][ C1] [<809ccae0>] (gpio_led_set) from [<809ca464>] (led_set_brightness+0x84/0x90) [ 726.251778][ C1] r5:000000ff r4:830fdb14 [ 726.251799][ C1] [<809ca3e0>] (led_set_brightness) from [<809cbfe4>] (led_trigger_event+0x40/0x58) [ 726.251861][ C1] r5:000000ff r4:830fdb14 [ 726.251883][ C1] [<809cbfa4>] (led_trigger_event) from [<809cd640>] (ledtrig_cpu+0xac/0xf4) [ 726.251950][ C1] r7:ddde24c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 726.251971][ C1] [<809cd594>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 726.252077][ C1] r9:00000000 r8:00000001 r7:8280c710 r6:83216000 r5:8280c6d0 r4:00000001 [ 726.252103][ C1] [<80227a24>] (arch_cpu_idle_exit) from [<802b168c>] (do_idle+0x5c/0x2d8) [ 726.252169][ C1] [<802b1630>] (do_idle) from [<802b1c38>] (cpu_startup_entry+0x30/0x34) [ 726.252246][ C1] r10:00000000 r9:414fc0f0 r8:80003000 r7:82a7b4a4 r6:83216000 r5:00000001 [ 726.252273][ C1] r4:00000092 [ 726.252292][ C1] [<802b1c08>] (cpu_startup_entry) from [<8022f360>] (secondary_start_kernel+0x128/0x194) [ 726.252357][ C1] [<8022f238>] (secondary_start_kernel) from [<80220094>] (__enable_mmu+0x0/0xc) [ 726.252434][ C1] r7:82a7b4a4 r6:30c0387d r5:00000000 r4:830b7bc0 [ 726.253987][ C0] Kernel panic - not syncing: softlockup: hung tasks [ 726.285468][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G L syzkaller #0 PREEMPT [ 726.285872][ C0] Tainted: [L]=SOFTLOCKUP [ 726.286031][ C0] Hardware name: ARM-Versatile Express [ 726.286238][ C0] Call trace: [ 726.286492][ C0] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 726.286821][ C0] r7:822965a4 r6:8281b500 r5:00000000 r4:82295754 [ 726.287019][ C0] [<80201b58>] (show_stack) from [<8021ee08>] (dump_stack_lvl+0x54/0x7c) [ 726.287272][ C0] [<8021edb4>] (dump_stack_lvl) from [<8021ee48>] (dump_stack+0x18/0x1c) [ 726.287529][ C0] r5:00000000 r4:82a7bd14 [ 726.287669][ C0] [<8021ee30>] (dump_stack) from [<80202648>] (vpanic+0xe0/0x2e8) [ 726.287936][ C0] [<80202568>] (vpanic) from [<80202884>] (trace_suspend_resume+0x0/0xd8) [ 726.288273][ C0] r7:82ac27f8 [ 726.288410][ C0] [<80202850>] (panic) from [<80383fcc>] (watchdog_timer_fn+0x2dc/0x350) [ 726.288704][ C0] r3:00000001 r2:00004000 r1:82a7bd1c r0:822965a4 [ 726.288917][ C0] [<80383cf0>] (watchdog_timer_fn) from [<80329c64>] (__hrtimer_run_queues+0x1c4/0x454) [ 726.289313][ C0] r10:8281b500 r9:00000000 r8:dddc7130 r7:80383cf0 r6:dddc7000 r5:dddc7040 [ 726.289560][ C0] r4:dddc75d8 [ 726.289684][ C0] [<80329aa0>] (__hrtimer_run_queues) from [<8032b268>] (hrtimer_interrupt+0x148/0x2bc) [ 726.290069][ C0] r10:1323a430 r9:dddc7180 r8:dddc7130 r7:000000a9 r6:00000003 r5:20000193 [ 726.290444][ C0] r4:dddc7000 [ 726.290611][ C0] [<8032b120>] (hrtimer_interrupt) from [<813408e0>] (arch_timer_handler_virt+0x30/0x38) [ 726.290943][ C0] r10:81d0fc78 r9:8309e400 r8:00000000 r7:00000000 r6:00000000 r5:82498528 [ 726.291228][ C0] r4:8309de40 [ 726.291395][ C0] [<813408b0>] (arch_timer_handler_virt) from [<802efab4>] (handle_percpu_devid_irq+0x128/0x34c) [ 726.291782][ C0] [<802ef98c>] (handle_percpu_devid_irq) from [<802e8c44>] (handle_irq_desc+0x74/0x84) [ 726.292219][ C0] r10:81c05450 r9:8281b500 r8:00000000 r7:df80a00c r6:826c2388 r5:df80a000 [ 726.292519][ C0] r4:8280cc44 [ 726.292688][ C0] [<802e8bd0>] (handle_irq_desc) from [<802e8cc0>] (generic_handle_domain_irq+0x18/0x1c) [ 726.293066][ C0] [<802e8ca8>] (generic_handle_domain_irq) from [<802012c8>] (gic_handle_irq+0x68/0x7c) [ 726.293478][ C0] [<80201260>] (gic_handle_irq) from [<81aad948>] (generic_handle_arch_irq+0x60/0x80) [ 726.293808][ C0] r7:82801b08 r6:82443f98 r5:8247f0cc r4:826c3a9c [ 726.293986][ C0] [<81aad8e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 726.294298][ C0] Exception stack(0x82801b08 to 0x82801b50) [ 726.294506][ C0] 1b00: 00000001 00000000 0000dbbc 0000dbbb 843aab68 00000001 [ 726.294772][ C0] 1b20: 00000000 843aab68 83ee0a88 843aaa40 81c05450 82801b6c 82801b58 82801b58 [ 726.295021][ C0] 1b40: 81abbecc 81abbef4 80000113 ffffffff [ 726.295236][ C0] r9:8281b500 r8:83ee0a88 r7:82801b3c r6:ffffffff r5:80000113 r4:81abbef4 [ 726.295453][ C0] [<81abbeb4>] (_raw_spin_lock) from [<809c7a2c>] (gpio_mmio_set+0x44/0x80) [ 726.295730][ C0] r5:00000001 r4:843aaa40 [ 726.295899][ C0] [<809c79e8>] (gpio_mmio_set) from [<809b81e8>] (gpiochip_set+0x1c/0x44) [ 726.296313][ C0] r7:00000000 r6:00000000 r5:00000000 r4:842a3780 [ 726.296622][ C0] [<809b81cc>] (gpiochip_set) from [<809baab0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 726.297275][ C0] [<809baa38>] (gpiod_set_raw_value_commit) from [<809bc350>] (gpiod_set_value_nocheck+0x44/0x58) [ 726.297631][ C0] r10:81c05450 r9:82801cac r8:00000102 r7:000005f7 r6:00000024 r5:00000000 [ 726.297871][ C0] r4:842a3780 [ 726.298010][ C0] [<809bc30c>] (gpiod_set_value_nocheck) from [<809bc3a0>] (gpiod_set_value+0x3c/0x88) [ 726.298381][ C0] [<809bc364>] (gpiod_set_value) from [<809ccb3c>] (gpio_led_set+0x5c/0x60) [ 726.298690][ C0] r5:830fd844 r4:830fd844 [ 726.298909][ C0] [<809ccae0>] (gpio_led_set) from [<809ca3d4>] (led_set_brightness_nosleep+0x38/0x44) [ 726.299243][ C0] r5:830fd844 r4:84b3600c [ 726.299409][ C0] [<809ca39c>] (led_set_brightness_nosleep) from [<809cd438>] (led_heartbeat_function+0x84/0x144) [ 726.299747][ C0] [<809cd3b4>] (led_heartbeat_function) from [<80327070>] (call_timer_fn+0x30/0x220) [ 726.300302][ C0] r7:000005f7 r6:809cd3b4 r5:84b3600c r4:8281b500 [ 726.300558][ C0] [<80327040>] (call_timer_fn) from [<80327524>] (__run_timers+0x2c4/0x3f8) [ 726.300914][ C0] r9:82801cac r8:000005f7 r7:00000000 r6:809cd3b4 r5:dddc5f00 r4:84b3600c [ 726.301194][ C0] [<80327260>] (__run_timers) from [<803276c0>] (run_timer_base+0x68/0x78) [ 726.301546][ C0] r10:8281b500 r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 [ 726.301855][ C0] r4:dddc5f00 [ 726.302020][ C0] [<80327658>] (run_timer_base) from [<803276ec>] (run_timer_softirq+0x1c/0x34) [ 726.302395][ C0] r4:82804084 [ 726.302572][ C0] [<803276d0>] (run_timer_softirq) from [<8025b65c>] (handle_softirqs+0x140/0x458) [ 726.302951][ C0] [<8025b51c>] (handle_softirqs) from [<8025bad0>] (__irq_exit_rcu+0x110/0x1d0) [ 726.303285][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:82801df0 r6:82443f98 r5:8247f0cc [ 726.303497][ C0] r4:8281b500 [ 726.303626][ C0] [<8025b9c0>] (__irq_exit_rcu) from [<8025be48>] (irq_exit+0x10/0x18) [ 726.303904][ C0] r5:8247f0cc r4:826c3a9c [ 726.304089][ C0] [<8025be38>] (irq_exit) from [<81aad964>] (generic_handle_arch_irq+0x7c/0x80) [ 726.304367][ C0] [<81aad8e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 726.304626][ C0] Exception stack(0x82801df0 to 0x82801e38) [ 726.304799][ C0] 1de0: e0363008 00000005 0000dbbb 809c820c [ 726.305030][ C0] 1e00: 843aaa40 00000004 00000001 843aab68 83ee0a88 843aaa40 00000000 82801e5c [ 726.305256][ C0] 1e20: 82801e28 82801e40 809c7a4c 809c820c 20000013 ffffffff [ 726.305459][ C0] r9:8281b500 r8:83ee0a88 r7:82801e24 r6:ffffffff r5:20000013 r4:809c820c [ 726.305660][ C0] [<809c79e8>] (gpio_mmio_set) from [<809b81e8>] (gpiochip_set+0x1c/0x44) [ 726.305942][ C0] r7:00000001 r6:00000000 r5:00000002 r4:842a37a8 [ 726.306129][ C0] [<809b81cc>] (gpiochip_set) from [<809baab0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 726.306447][ C0] [<809baa38>] (gpiod_set_raw_value_commit) from [<809bc350>] (gpiod_set_value_nocheck+0x44/0x58) [ 726.306790][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:83884998 r5:00000001 [ 726.307038][ C0] r4:842a37a8 [ 726.307174][ C0] [<809bc30c>] (gpiod_set_value_nocheck) from [<809bc3a0>] (gpiod_set_value+0x3c/0x88) [ 726.307490][ C0] [<809bc364>] (gpiod_set_value) from [<809ccb3c>] (gpio_led_set+0x5c/0x60) [ 726.307786][ C0] r5:000000ff r4:830fda24 [ 726.307945][ C0] [<809ccae0>] (gpio_led_set) from [<809ca464>] (led_set_brightness+0x84/0x90) [ 726.308300][ C0] r5:000000ff r4:830fda24 [ 726.308459][ C0] [<809ca3e0>] (led_set_brightness) from [<809cbfe4>] (led_trigger_event+0x40/0x58) [ 726.308764][ C0] r5:000000ff r4:830fda24 [ 726.308919][ C0] [<809cbfa4>] (led_trigger_event) from [<809cd640>] (ledtrig_cpu+0xac/0xf4) [ 726.309222][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000000fe [ 726.309415][ C0] [<809cd594>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 726.309709][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 726.309951][ C0] [<80227a24>] (arch_cpu_idle_exit) from [<802b168c>] (do_idle+0x5c/0x2d8) [ 726.310442][ C0] [<802b1630>] (do_idle) from [<802b1c38>] (cpu_startup_entry+0x30/0x34) [ 726.310828][ C0] r10:8281aff4 r9:8280c680 r8:823bec64 r7:00000000 r6:deffc06c r5:828222e8 [ 726.311065][ C0] r4:000000ed [ 726.311201][ C0] [<802b1c08>] (cpu_startup_entry) from [<81aaf37c>] (kernel_init+0x0/0x138) [ 726.311553][ C0] [<81aaf29c>] (rest_init) from [<8260145c>] (start_kernel+0x844/0x860) [ 726.311888][ C0] [<82600c18>] (start_kernel) from [<00000000>] (0x0) [ 726.314534][ C0] Rebooting in 86400 seconds..