last executing test programs: 500.421196ms ago: executing program 0 (id=2036): creat(&(0x7f0000000080)='./file0\x00', 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) lsetxattr$trusted_overlay_nlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) 500.195187ms ago: executing program 1 (id=2037): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup2(r0, r0) sendmmsg(r1, 0x0, 0x0, 0x8000) 397.911149ms ago: executing program 0 (id=2038): r0 = openat$selinux_policy(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = fsopen(&(0x7f0000000040)='ramfs\x00', 0x0) fsconfig$FSCONFIG_SET_PATH(r1, 0x3, &(0x7f00000000c0)='4.\x00', &(0x7f0000000140)='./file0\x00', r0) 397.5938ms ago: executing program 1 (id=2039): r0 = openat$sequencer(0xffffff9c, &(0x7f00000000c0), 0x202, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_TIMER_IOCTL_STATUS32(r1, 0x80585414, 0x0) 309.351691ms ago: executing program 0 (id=2040): mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2000009) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_buf(r0, 0x6, 0x24, 0x0, &(0x7f0000000000)) 309.091961ms ago: executing program 1 (id=2041): openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0x5451, 0x0) 230.391771ms ago: executing program 0 (id=2042): unshare(0x62040200) r0 = socket$igmp(0x2, 0x3, 0x2) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000100)={{0x2, 0x4e1f, @remote}, {0x304}, 0x2a, {0x2, 0x4e25, @empty}}) 230.156631ms ago: executing program 1 (id=2043): r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x40000) ioctl$EVIOCSFF(r0, 0x40044591, 0x0) ioctl$EVIOCSABS0(r0, 0x401845c0, 0x0) 151.227051ms ago: executing program 1 (id=2044): r0 = openat$tun(0xffffff9c, &(0x7f0000000300), 0x880, 0x0) r1 = dup(r0) ioctl$EVIOCGBITKEY(r1, 0x80404521, 0x0) 69.419562ms ago: executing program 0 (id=2045): r0 = inotify_init() socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x5421, &(0x7f0000000080)={'rose0\x00'}) 69.207182ms ago: executing program 1 (id=2046): r0 = socket(0x29, 0x2, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[], 0x33fe0}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x20000008}, 0x80) 0s ago: executing program 0 (id=2047): r0 = openat$selinux_enforce(0xffffff9c, &(0x7f0000000100), 0x20100, 0x0) syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff) ioctl$PIO_FONTRESET(r0, 0x5452, 0x20000000) kernel console output (not intermixed with test programs): [ 48.221563][ T29] audit: type=1400 audit(48.110:56): avc: denied { read write } for pid=3086 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 48.223585][ T29] audit: type=1400 audit(48.130:57): avc: denied { open } for pid=3086 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:49783' (ED25519) to the list of known hosts. [ 61.690238][ T29] audit: type=1400 audit(61.590:58): avc: denied { name_bind } for pid=3089 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 63.692554][ T29] audit: type=1400 audit(63.600:59): avc: denied { execute } for pid=3090 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 63.713621][ T29] audit: type=1400 audit(63.610:60): avc: denied { execute_no_trans } for pid=3090 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 67.129810][ T29] audit: type=1400 audit(67.040:61): avc: denied { mounton } for pid=3090 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 67.133634][ T29] audit: type=1400 audit(67.040:62): avc: denied { mount } for pid=3090 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 67.145732][ T3090] cgroup: Unknown subsys name 'net' [ 67.154241][ T29] audit: type=1400 audit(67.060:63): avc: denied { unmount } for pid=3090 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 67.313059][ T3090] cgroup: Unknown subsys name 'cpuset' [ 67.320620][ T3090] cgroup: Unknown subsys name 'hugetlb' [ 67.321524][ T3090] cgroup: Unknown subsys name 'rlimit' [ 67.531468][ T29] audit: type=1400 audit(67.440:64): avc: denied { setattr } for pid=3090 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 67.533445][ T29] audit: type=1400 audit(67.440:65): avc: denied { mounton } for pid=3090 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 67.535853][ T29] audit: type=1400 audit(67.440:66): avc: denied { mount } for pid=3090 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 67.742901][ T3092] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 67.746233][ T29] audit: type=1400 audit(67.650:67): avc: denied { relabelto } for pid=3092 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 67.751162][ T29] audit: type=1400 audit(67.660:68): avc: denied { write } for pid=3092 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 67.783488][ T29] audit: type=1400 audit(67.690:69): avc: denied { read } for pid=3090 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 67.784039][ T29] audit: type=1400 audit(67.690:70): avc: denied { open } for pid=3090 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 75.505950][ T3090] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 77.068589][ T29] audit: type=1400 audit(76.980:71): avc: denied { execmem } for pid=3093 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 77.133612][ T29] audit: type=1400 audit(77.040:72): avc: denied { read } for pid=3095 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 77.147835][ T29] audit: type=1400 audit(77.060:73): avc: denied { open } for pid=3095 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 77.154070][ T29] audit: type=1400 audit(77.060:74): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 77.177989][ T29] audit: type=1400 audit(77.090:75): avc: denied { module_request } for pid=3095 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 77.179601][ T29] audit: type=1400 audit(77.090:76): avc: denied { module_request } for pid=3096 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 77.252327][ T29] audit: type=1400 audit(77.160:77): avc: denied { sys_module } for pid=3095 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 77.702341][ T29] audit: type=1400 audit(77.610:78): avc: denied { ioctl } for pid=3095 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 78.555595][ T3095] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 78.564182][ T3095] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 78.830397][ T3096] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 78.840019][ T3096] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 79.441652][ T3095] hsr_slave_0: entered promiscuous mode [ 79.445317][ T3095] hsr_slave_1: entered promiscuous mode [ 79.788361][ T3096] hsr_slave_0: entered promiscuous mode [ 79.791569][ T3096] hsr_slave_1: entered promiscuous mode [ 79.799579][ T3096] debugfs: 'hsr0' already exists in 'hsr' [ 79.801082][ T3096] Cannot create hsr debugfs directory [ 79.893940][ T29] audit: type=1400 audit(79.800:79): avc: denied { create } for pid=3095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 79.895749][ T29] audit: type=1400 audit(79.800:80): avc: denied { write } for pid=3095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 79.903342][ T3095] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 79.918716][ T3095] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 79.926218][ T3095] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 79.939265][ T3095] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 80.232998][ T3096] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 80.260217][ T3096] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 80.279494][ T3096] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 80.293198][ T3096] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 80.793748][ T3095] 8021q: adding VLAN 0 to HW filter on device bond0 [ 81.111758][ T3096] 8021q: adding VLAN 0 to HW filter on device bond0 [ 83.512799][ T3095] veth0_vlan: entered promiscuous mode [ 83.523810][ T3095] veth1_vlan: entered promiscuous mode [ 83.565738][ T3095] veth0_macvtap: entered promiscuous mode [ 83.573470][ T3095] veth1_macvtap: entered promiscuous mode [ 83.647802][ T2602] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.648426][ T2602] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.648524][ T2602] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.648597][ T2602] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.796988][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 83.797827][ T29] audit: type=1400 audit(83.700:82): avc: denied { mount } for pid=3095 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 83.809692][ T3096] veth0_vlan: entered promiscuous mode [ 83.815345][ T29] audit: type=1400 audit(83.720:83): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/syzkaller.WSHehr/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 83.821591][ T29] audit: type=1400 audit(83.730:84): avc: denied { mount } for pid=3095 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 83.832426][ T29] audit: type=1400 audit(83.740:85): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/syzkaller.WSHehr/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 83.835423][ T29] audit: type=1400 audit(83.740:86): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/syzkaller.WSHehr/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3078 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 83.842129][ T3096] veth1_vlan: entered promiscuous mode [ 83.849489][ T29] audit: type=1400 audit(83.760:87): avc: denied { unmount } for pid=3095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 83.854198][ T29] audit: type=1400 audit(83.760:88): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 83.857641][ T29] audit: type=1400 audit(83.770:89): avc: denied { mount } for pid=3095 comm="syz-executor" name="/" dev="gadgetfs" ino=3079 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 83.862713][ T29] audit: type=1400 audit(83.770:90): avc: denied { mount } for pid=3095 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 83.866850][ T29] audit: type=1400 audit(83.770:91): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 83.918371][ T3095] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 83.963681][ T3096] veth0_macvtap: entered promiscuous mode [ 83.997649][ T3096] veth1_macvtap: entered promiscuous mode [ 84.093097][ T105] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.094020][ T105] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.094206][ T105] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.094293][ T105] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.041682][ T3730] netlink: 'syz.1.13': attribute type 29 has an invalid length. [ 85.052037][ T3730] netlink: 'syz.1.13': attribute type 29 has an invalid length. [ 87.149577][ T3805] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 87.155352][ T3805] capability: warning: `syz.0.50' uses deprecated v2 capabilities in a way that may be insecure [ 89.012622][ T29] kauditd_printk_skb: 14 callbacks suppressed [ 89.013537][ T29] audit: type=1400 audit(88.920:106): avc: denied { create } for pid=3816 comm="syz.1.59" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 89.097564][ T29] audit: type=1400 audit(89.000:107): avc: denied { create } for pid=3818 comm="syz.1.56" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 89.170518][ T3823] capability: warning: `syz.1.58' uses 32-bit capabilities (legacy support in use) [ 89.425043][ T29] audit: type=1400 audit(89.330:108): avc: denied { setopt } for pid=3830 comm="syz.0.63" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 89.779045][ T29] audit: type=1400 audit(89.690:109): avc: denied { mount } for pid=3844 comm="syz.0.70" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 89.783433][ T29] audit: type=1400 audit(89.690:110): avc: denied { remount } for pid=3844 comm="syz.0.70" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 89.798261][ T29] audit: type=1400 audit(89.710:111): avc: denied { unmount } for pid=3095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 89.951698][ T29] audit: type=1400 audit(89.860:112): avc: denied { create } for pid=3851 comm="syz.0.74" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 89.959894][ T29] audit: type=1400 audit(89.870:113): avc: denied { ioctl } for pid=3851 comm="syz.0.74" path="socket:[3370]" dev="sockfs" ino=3370 ioctlcmd=0x4b69 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 90.162444][ T29] audit: type=1400 audit(90.070:114): avc: denied { create } for pid=3860 comm="syz.1.78" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 90.171867][ T29] audit: type=1400 audit(90.080:115): avc: denied { ioctl } for pid=3860 comm="syz.1.78" path="socket:[2606]" dev="sockfs" ino=2606 ioctlcmd=0x550e scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 91.194755][ T3895] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 96.801321][ T29] kauditd_printk_skb: 8 callbacks suppressed [ 96.802535][ T29] audit: type=1400 audit(96.710:124): avc: denied { create } for pid=3947 comm="syz.1.117" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 96.808969][ T29] audit: type=1400 audit(96.720:125): avc: denied { ioctl } for pid=3947 comm="syz.1.117" path="socket:[2748]" dev="sockfs" ino=2748 ioctlcmd=0x4b72 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 97.209596][ T29] audit: type=1400 audit(97.120:126): avc: denied { create } for pid=3971 comm="syz.0.129" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 97.217786][ T29] audit: type=1400 audit(97.130:127): avc: denied { ioctl } for pid=3971 comm="syz.0.129" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=3553 ioctlcmd=0x7004 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 97.842616][ T4005] Zero length message leads to an empty skb [ 98.157500][ T29] audit: type=1400 audit(98.060:128): avc: denied { getopt } for pid=4016 comm="syz.1.150" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 99.133384][ T29] audit: type=1400 audit(99.040:129): avc: denied { create } for pid=4050 comm="syz.0.167" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 99.143815][ T29] audit: type=1400 audit(99.050:130): avc: denied { write } for pid=4050 comm="syz.0.167" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 99.583967][ T29] audit: type=1400 audit(99.490:131): avc: denied { write } for pid=4067 comm="syz.1.175" name="arp" dev="proc" ino=4026532759 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 99.702034][ T29] audit: type=1400 audit(99.610:132): avc: denied { write } for pid=4071 comm="syz.0.177" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 103.981648][ T29] audit: type=1400 audit(103.890:133): avc: denied { write } for pid=4189 comm="syz.0.233" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 104.143445][ T29] audit: type=1400 audit(104.050:134): avc: denied { accept } for pid=4198 comm="syz.1.238" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 104.550725][ T29] audit: type=1400 audit(104.460:135): avc: denied { map_create } for pid=4219 comm="syz.1.249" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 104.557331][ T29] audit: type=1400 audit(104.460:136): avc: denied { bpf } for pid=4219 comm="syz.1.249" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 104.561191][ T29] audit: type=1400 audit(104.470:137): avc: denied { map_read map_write } for pid=4219 comm="syz.1.249" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 105.837397][ T29] audit: type=1400 audit(105.750:138): avc: denied { nlmsg_write } for pid=4253 comm="syz.1.266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 106.428140][ T29] audit: type=1400 audit(106.330:139): avc: denied { create } for pid=4282 comm="syz.1.279" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 106.433571][ T29] audit: type=1400 audit(106.340:140): avc: denied { connect } for pid=4282 comm="syz.1.279" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 106.477988][ T29] audit: type=1400 audit(106.390:141): avc: denied { read } for pid=4284 comm="syz.0.280" path="socket:[5142]" dev="sockfs" ino=5142 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 106.938059][ T29] audit: type=1400 audit(106.850:142): avc: denied { setopt } for pid=4282 comm="syz.1.279" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 113.123382][ T29] audit: type=1400 audit(113.030:143): avc: denied { read } for pid=4358 comm="syz.1.317" path="socket:[4448]" dev="sockfs" ino=4448 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 116.480620][ T29] audit: type=1400 audit(116.390:144): avc: denied { write } for pid=4449 comm="syz.1.361" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 116.938795][ T29] audit: type=1400 audit(116.850:145): avc: denied { setopt } for pid=4467 comm="syz.0.369" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 120.843595][ T4550] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4550 comm=syz.0.408 [ 121.245862][ T29] audit: type=1400 audit(121.150:146): avc: denied { write } for pid=4565 comm="syz.0.417" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 121.421706][ T29] audit: type=1400 audit(121.330:147): avc: denied { audit_write } for pid=4571 comm="syz.0.420" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 121.937268][ T29] audit: type=1400 audit(121.840:148): avc: denied { map } for pid=4584 comm="syz.0.426" path="/dev/fb1" dev="devtmpfs" ino=763 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 130.354164][ T4669] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1544 sclass=netlink_audit_socket pid=4669 comm=syz.0.471 [ 131.133014][ T29] audit: type=1400 audit(131.040:149): avc: denied { ioctl } for pid=4699 comm="syz.1.483" path="socket:[5873]" dev="sockfs" ino=5873 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 132.668795][ T29] audit: type=1400 audit(132.580:150): avc: denied { prog_load } for pid=4747 comm="syz.0.506" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 132.671543][ T29] audit: type=1400 audit(132.580:151): avc: denied { perfmon } for pid=4747 comm="syz.0.506" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 132.743240][ T29] audit: type=1400 audit(132.650:152): avc: denied { prog_run } for pid=4747 comm="syz.0.506" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 134.489904][ T29] audit: type=1400 audit(134.400:153): avc: denied { ioctl } for pid=4772 comm="syz.0.519" path="socket:[6007]" dev="sockfs" ino=6007 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sock_file permissive=1 [ 134.817970][ T29] audit: type=1400 audit(134.730:154): avc: denied { write } for pid=4776 comm="syz.1.521" path="socket:[6147]" dev="sockfs" ino=6147 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sock_file permissive=1 [ 150.080223][ T5008] raw_sendmsg: syz.0.630 forgot to set AF_INET. Fix it! [ 151.064258][ T29] audit: type=1400 audit(150.970:155): avc: denied { map } for pid=5037 comm="syz.0.645" path="socket:[6509]" dev="sockfs" ino=6509 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 156.866914][ T29] audit: type=1400 audit(156.770:156): avc: denied { connect } for pid=5182 comm="syz.1.716" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 157.844714][ T29] audit: type=1400 audit(157.750:157): avc: denied { setattr } for pid=5203 comm="syz.1.726" name="" dev="pipefs" ino=737 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 159.942272][ T29] audit: type=1400 audit(159.850:158): avc: denied { create } for pid=5264 comm="syz.1.754" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 159.952325][ T29] audit: type=1400 audit(159.860:159): avc: denied { write } for pid=5264 comm="syz.1.754" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 159.958136][ T5265] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=5265 comm=syz.1.754 [ 160.367222][ T5281] usb usb1: usbfs: process 5281 (syz.1.765) did not claim interface 22 before use [ 165.229084][ T5381] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=5381 comm=syz.0.808 [ 165.741097][ T29] audit: type=1400 audit(165.650:160): avc: denied { setopt } for pid=5410 comm="syz.1.825" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 165.751622][ T29] audit: type=1400 audit(165.660:161): avc: denied { write } for pid=5410 comm="syz.1.825" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 166.930168][ T29] audit: type=1400 audit(166.840:162): avc: denied { getopt } for pid=5460 comm="syz.1.849" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 176.290044][ T29] audit: type=1400 audit(176.200:163): avc: denied { create } for pid=5595 comm="syz.0.914" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 177.310387][ T5628] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5628 comm=syz.1.930 [ 179.645408][ T29] audit: type=1400 audit(179.550:164): avc: denied { read } for pid=5720 comm="syz.1.975" path="socket:[8830]" dev="sockfs" ino=8830 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 179.918611][ T29] audit: type=1400 audit(179.830:165): avc: denied { create } for pid=5734 comm="syz.0.982" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 179.923096][ T29] audit: type=1400 audit(179.830:166): avc: denied { setopt } for pid=5734 comm="syz.0.982" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 179.930776][ T29] audit: type=1400 audit(179.840:167): avc: denied { read } for pid=5734 comm="syz.0.982" path="socket:[9595]" dev="sockfs" ino=9595 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 180.573065][ T5766] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5766 comm=syz.0.997 [ 181.456998][ T29] audit: type=1400 audit(181.360:168): avc: denied { create } for pid=5807 comm="syz.1.1016" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 181.471756][ T29] audit: type=1400 audit(181.380:169): avc: denied { connect } for pid=5807 comm="syz.1.1016" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 191.223869][ T5921] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5921 comm=syz.1.1071 [ 191.625583][ T29] audit: type=1400 audit(191.530:170): avc: denied { getopt } for pid=5936 comm="syz.0.1078" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 193.982676][ T29] audit: type=1400 audit(193.890:171): avc: denied { listen } for pid=5989 comm="syz.0.1104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 211.509449][ T29] audit: type=1400 audit(211.420:172): avc: denied { block_suspend } for pid=6237 comm="syz.0.1223" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 212.172684][ T6268] usb usb1: usbfs: process 6268 (syz.0.1235) did not claim interface 22 before use [ 212.610934][ T29] audit: type=1400 audit(212.520:173): avc: denied { write } for pid=6279 comm="syz.1.1241" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 212.613510][ T29] audit: type=1400 audit(212.520:174): avc: denied { getopt } for pid=6279 comm="syz.1.1241" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 212.768234][ T29] audit: type=1400 audit(212.680:175): avc: denied { ioctl } for pid=6271 comm="syz.0.1237" path="socket:[11464]" dev="sockfs" ino=11464 ioctlcmd=0x8918 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 214.863941][ T29] audit: type=1400 audit(214.770:176): avc: denied { allowed } for pid=6289 comm="syz.0.1245" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 215.759450][ T29] audit: type=1400 audit(215.670:177): avc: denied { write } for pid=6314 comm="syz.0.1256" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 216.498308][ T29] audit: type=1400 audit(216.410:178): avc: denied { write } for pid=6347 comm="syz.0.1274" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 217.069938][ T6366] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6366 comm=syz.1.1282 [ 218.541869][ T6398] loop1: detected capacity change from 0 to 7 [ 220.055391][ T6438] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6438 comm=syz.1.1316 [ 220.384425][ T6458] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=6458 comm=syz.0.1327 [ 220.653530][ T29] audit: type=1400 audit(220.560:179): avc: denied { write } for pid=6470 comm="syz.1.1333" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 220.661944][ T29] audit: type=1400 audit(220.570:180): avc: denied { ioctl } for pid=6470 comm="syz.1.1333" path="socket:[11130]" dev="sockfs" ino=11130 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 221.463494][ T3702] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 221.465394][ T3702] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 221.469265][ T3702] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 221.470580][ T3702] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 221.471713][ T3702] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 221.472937][ T3702] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 221.474002][ T3702] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 221.475223][ T3702] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 221.476265][ T3702] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 221.478257][ T3702] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 221.489176][ T3702] hid-generic 0000:0000:0000.0001: hidraw0: HID v8.00 Device [syz0] on syz0 [ 221.695445][ T29] audit: type=1400 audit(221.600:181): avc: denied { bind } for pid=6519 comm="syz.0.1354" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 221.865861][ T6528] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6528 comm=syz.0.1358 [ 222.919157][ T29] audit: type=1400 audit(222.830:182): avc: denied { create } for pid=6566 comm="syz.1.1377" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 223.407684][ T29] audit: type=1400 audit(223.320:183): avc: denied { setopt } for pid=6579 comm="syz.1.1383" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 225.274916][ T6586] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=6586 comm=syz.1.1387 [ 231.797002][ T6656] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6656 comm=syz.0.1420 [ 232.091655][ T6670] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6670 comm=syz.1.1428 [ 233.904039][ T6738] nvme_fabrics: missing parameter 'transport=%s' [ 233.906913][ T6738] nvme_fabrics: missing parameter 'nqn=%s' [ 234.561974][ T29] audit: type=1400 audit(234.470:184): avc: denied { wake_alarm } for pid=6758 comm="syz.0.1469" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 236.937302][ T6777] loop1: detected capacity change from 0 to 7 [ 237.930972][ T6785] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=6785 comm=syz.0.1480 [ 240.220827][ T6824] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=6824 comm=syz.1.1498 [ 243.405729][ T6860] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6860 comm=syz.0.1520 [ 243.681901][ T1752] hid_parser_main: 33 callbacks suppressed [ 243.682926][ T1752] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 243.683846][ T1752] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 243.684811][ T1752] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 243.686863][ T1752] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 243.689129][ T1752] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 243.690010][ T1752] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 243.690884][ T1752] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 243.691742][ T1752] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 243.692682][ T1752] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 243.693641][ T1752] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 243.710925][ T1752] hid-generic 0000:0000:0000.0002: hidraw0: HID v8.00 Device [syz0] on syz0 [ 243.841709][ T6884] nvme_fabrics: missing parameter 'transport=%s' [ 243.841907][ T6884] nvme_fabrics: missing parameter 'nqn=%s' [ 247.381029][ T6939] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6939 comm=syz.0.1552 [ 251.162165][ T29] audit: type=1400 audit(251.070:185): avc: denied { setopt } for pid=7003 comm="syz.1.1584" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 251.558838][ T7029] SELinux: Context system_u:object_r:ssh_exec_t:s0 is not valid (left unmapped). [ 251.560949][ T29] audit: type=1400 audit(251.470:186): avc: denied { relabelto } for pid=7027 comm="syz.1.1596" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:ssh_exec_t:s0" [ 251.563314][ T29] audit: type=1400 audit(251.470:187): avc: denied { associate } for pid=7027 comm="syz.1.1596" name="/" dev="tmpfs" ino=1 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:ssh_exec_t:s0" [ 251.645662][ T29] audit: type=1400 audit(251.550:188): avc: denied { write } for pid=7032 comm="syz.0.1598" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 251.650191][ T29] audit: type=1400 audit(251.560:189): avc: denied { read } for pid=7032 comm="syz.0.1598" lport=47207 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 251.691379][ T29] audit: type=1400 audit(251.600:190): avc: denied { execute } for pid=7034 comm="syz.1.1599" name="file0" dev="tmpfs" ino=4074 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 252.339168][ T7070] SELinux: Context system_u:object_r:ksm_device_t:s0 is not valid (left unmapped). [ 252.341378][ T29] audit: type=1400 audit(252.250:191): avc: denied { relabelto } for pid=7068 comm="syz.0.1612" name="sequencer2" dev="devtmpfs" ino=722 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:ksm_device_t:s0" [ 252.344713][ T29] audit: type=1400 audit(252.250:192): avc: denied { associate } for pid=7068 comm="syz.0.1612" name="sequencer2" dev="devtmpfs" ino=722 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 srawcon="system_u:object_r:ksm_device_t:s0" [ 252.802405][ T29] audit: type=1400 audit(252.710:193): avc: denied { ioctl } for pid=7093 comm="syz.1.1622" path="socket:[13710]" dev="sockfs" ino=13710 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 255.902989][ T29] audit: type=1400 audit(255.810:194): avc: denied { setopt } for pid=7120 comm="syz.0.1635" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 261.700801][ T29] audit: type=1400 audit(261.610:195): avc: denied { associate } for pid=7218 comm="syz.1.1680" name="pfkey" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 261.923234][ T29] audit: type=1400 audit(261.830:196): avc: denied { mount } for pid=7228 comm="syz.0.1684" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 261.944409][ T29] audit: type=1400 audit(261.850:197): avc: denied { unmount } for pid=3095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 264.513059][ T29] audit: type=1400 audit(264.420:198): avc: denied { mount } for pid=7293 comm="syz.1.1717" name="/" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 264.520380][ T29] audit: type=1400 audit(264.430:199): avc: denied { remount } for pid=7293 comm="syz.1.1717" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 264.537089][ T29] audit: type=1400 audit(264.440:200): avc: denied { unmount } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 265.289933][ T29] audit: type=1400 audit(265.200:201): avc: denied { setopt } for pid=7323 comm="syz.0.1732" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 265.465981][ T29] audit: type=1400 audit(265.370:202): avc: denied { ioctl } for pid=7329 comm="syz.0.1735" path="socket:[14676]" dev="sockfs" ino=14676 ioctlcmd=0x894c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 265.978264][ T29] audit: type=1400 audit(265.890:203): avc: denied { connect } for pid=7341 comm="syz.0.1741" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 270.041644][ T29] audit: type=1400 audit(269.950:204): avc: denied { mount } for pid=7406 comm="syz.1.1772" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 270.053898][ T29] audit: type=1400 audit(269.960:205): avc: denied { unmount } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 270.477747][ T7417] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7417 comm=syz.1.1775 [ 272.113798][ T7452] binfmt_misc: register: failed to install interpreter file ./file1 [ 277.749826][ T7591] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=1024 sclass=netlink_tcpdiag_socket pid=7591 comm=syz.1.1860 [ 280.880632][ T29] audit: type=1400 audit(280.790:206): avc: denied { connect } for pid=7616 comm="syz.1.1873" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 280.884177][ T29] audit: type=1400 audit(280.790:207): avc: denied { shutdown } for pid=7616 comm="syz.1.1873" laddr=127.0.0.1 lport=33913 faddr=127.0.0.1 fport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 285.480165][ T29] audit: type=1400 audit(285.390:208): avc: denied { read write } for pid=7683 comm="syz.0.1905" name="sequencer2" dev="devtmpfs" ino=722 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:ksm_device_t:s0" [ 285.486779][ T29] audit: type=1400 audit(285.390:209): avc: denied { open } for pid=7683 comm="syz.0.1905" path="/dev/sequencer2" dev="devtmpfs" ino=722 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:ksm_device_t:s0" [ 285.489440][ T29] audit: type=1400 audit(285.400:210): avc: denied { ioctl } for pid=7683 comm="syz.0.1905" path="/dev/sequencer2" dev="devtmpfs" ino=722 ioctlcmd=0x54d7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:ksm_device_t:s0" [ 288.256209][ T29] audit: type=1400 audit(288.160:211): avc: denied { write } for pid=7719 comm="syz.1.1922" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 288.834161][ T29] audit: type=1400 audit(288.740:212): avc: denied { mount } for pid=7736 comm="syz.0.1930" name="/" dev="securityfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=filesystem permissive=1 [ 288.840518][ T29] audit: type=1400 audit(288.750:213): avc: denied { remount } for pid=7736 comm="syz.0.1930" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=filesystem permissive=1 [ 288.860526][ T29] audit: type=1400 audit(288.770:214): avc: denied { unmount } for pid=3095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=filesystem permissive=1 [ 289.770150][ T7775] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7775 comm=syz.0.1948 [ 291.771687][ T29] audit: type=1400 audit(291.680:215): avc: denied { unlink } for pid=3096 comm="syz-executor" name="file5" dev="tmpfs" ino=5294 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 292.571251][ T29] audit: type=1400 audit(292.480:216): avc: denied { ioctl } for pid=7841 comm="syz.1.1983" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 297.772834][ T7937] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=7937 comm=syz.1.2027 [ 726.306762][ C1] watchdog: BUG: soft lockup - CPU#1 stuck for 430s! [swapper/1:0] [ 726.306972][ C1] Modules linked in: [ 726.307625][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G L syzkaller #0 PREEMPT [ 726.307803][ C1] Tainted: [L]=SOFTLOCKUP [ 726.307831][ C1] Hardware name: ARM-Versatile Express [ 726.308039][ C1] PC is at _raw_spin_lock+0x40/0x58 [ 726.308817][ C1] LR is at _raw_spin_lock+0x18/0x58 [ 726.308883][ C1] pc : [<81abbef4>] lr : [<81abbecc>] psr: 80000113 [ 726.308927][ C1] sp : df805d68 ip : df805d68 fp : df805d7c [ 726.308964][ C1] r10: 81c05450 r9 : 83ecf640 r8 : 8412aa88 [ 726.309006][ C1] r7 : 83ecf768 r6 : 00000000 r5 : 00000001 r4 : 83ecf768 [ 726.309049][ C1] r3 : 0000812d r2 : 0000812e r1 : 00000000 r0 : 00000001 [ 726.309174][ C1] Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 726.309256][ C1] Control: 30c5387d Table: 85c4e300 DAC: 00000000 [ 726.309358][ C1] Call trace: frame pointer underflow [ 726.309661][ C1] [<81abbeb4>] (_raw_spin_lock) from [<809c7a2c>] (gpio_mmio_set+0x44/0x80) [ 726.309996][ C1] r5:00000001 r4:83ecf640 [ 726.310092][ C1] [<809c79e8>] (gpio_mmio_set) from [<809b81e8>] (gpiochip_set+0x1c/0x44) [ 726.310151][ C1] r7:00000000 r6:00000000 r5:00000000 r4:83f59300 [ 726.310161][ C1] [<809b81cc>] (gpiochip_set) from [<809baab0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 726.310190][ C1] [<809baa38>] (gpiod_set_raw_value_commit) from [<809bc350>] (gpiod_set_value_nocheck+0x44/0x58) [ 726.310239][ C1] r10:81c05450 r9:df805ebc r8:00000102 r7:00000049 r6:00000009 r5:00000000 [ 726.310258][ C1] r4:83f59300 [ 726.310267][ C1] [<809bc30c>] (gpiod_set_value_nocheck) from [<809bc3a0>] (gpiod_set_value+0x3c/0x88) [ 726.310293][ C1] [<809bc364>] (gpiod_set_value) from [<809ccb3c>] (gpio_led_set+0x5c/0x60) [ 726.310322][ C1] r5:832f4844 r4:832f4844 [ 726.310331][ C1] [<809ccae0>] (gpio_led_set) from [<809ca3d4>] (led_set_brightness_nosleep+0x38/0x44) [ 726.310357][ C1] r5:832f4844 r4:833e118c [ 726.310366][ C1] [<809ca39c>] (led_set_brightness_nosleep) from [<809cd438>] (led_heartbeat_function+0x84/0x144) [ 726.310392][ C1] [<809cd3b4>] (led_heartbeat_function) from [<80327070>] (call_timer_fn+0x30/0x220) [ 726.310428][ C1] r7:00000049 r6:809cd3b4 r5:833e118c r4:83216000 [ 726.310438][ C1] [<80327040>] (call_timer_fn) from [<80327524>] (__run_timers+0x2c4/0x3f8) [ 726.310472][ C1] r9:df805ebc r8:00000049 r7:00000000 r6:809cd3b4 r5:dddd9f00 r4:833e118c [ 726.310482][ C1] [<80327260>] (__run_timers) from [<803276c0>] (run_timer_base+0x68/0x78) [ 726.310517][ C1] r10:83216000 r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 [ 726.310528][ C1] r4:dddd9f00 [ 726.310535][ C1] [<80327658>] (run_timer_base) from [<803276ec>] (run_timer_softirq+0x1c/0x34) [ 726.310563][ C1] r4:82804084 [ 726.310570][ C1] [<803276d0>] (run_timer_softirq) from [<8025b65c>] (handle_softirqs+0x140/0x458) [ 726.310600][ C1] [<8025b51c>] (handle_softirqs) from [<8025bad0>] (__irq_exit_rcu+0x110/0x1d0) [ 726.310634][ C1] r10:00000000 r9:83216000 r8:00000000 r7:df865e20 r6:82443f98 r5:8247f0cc [ 726.310645][ C1] r4:83216000 [ 726.310653][ C1] [<8025b9c0>] (__irq_exit_rcu) from [<8025be48>] (irq_exit+0x10/0x18) [ 726.310682][ C1] r5:8247f0cc r4:826c3a9c [ 726.310690][ C1] [<8025be38>] (irq_exit) from [<81aad964>] (generic_handle_arch_irq+0x7c/0x80) [ 726.310726][ C1] [<81aad8e8>] (generic_handle_arch_irq) from [<81a7d904>] (call_with_stack+0x1c/0x20) [ 726.310761][ C1] r9:83216000 r8:8412aa88 r7:df865e54 r6:ffffffff r5:20000013 r4:809c820c [ 726.310771][ C1] [<81a7d8e8>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc) [ 726.310845][ C1] Exception stack(0xdf865e20 to 0xdf865e68) [ 726.310965][ C1] 5e20: dff61008 00000009 0000812d 809c820c 83ecf640 00000008 00000001 83ecf768 [ 726.310995][ C1] 5e40: 8412aa88 83ecf640 00000000 df865e8c df865e58 df865e70 809c7a4c 809c820c [ 726.311007][ C1] 5e60: 20000013 ffffffff [ 726.311068][ C1] [<809c79e8>] (gpio_mmio_set) from [<809b81e8>] (gpiochip_set+0x1c/0x44) [ 726.311124][ C1] r7:00000001 r6:00000000 r5:00000003 r4:83f5933c [ 726.311137][ C1] [<809b81cc>] (gpiochip_set) from [<809baab0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 726.311165][ C1] [<809baa38>] (gpiod_set_raw_value_commit) from [<809bc350>] (gpiod_set_value_nocheck+0x44/0x58) [ 726.311199][ C1] r10:00000000 r9:00000000 r8:00000001 r7:ddde24c0 r6:833e1e98 r5:00000001 [ 726.311211][ C1] r4:83f5933c [ 726.311218][ C1] [<809bc30c>] (gpiod_set_value_nocheck) from [<809bc3a0>] (gpiod_set_value+0x3c/0x88) [ 726.311243][ C1] [<809bc364>] (gpiod_set_value) from [<809ccb3c>] (gpio_led_set+0x5c/0x60) [ 726.311286][ C1] r5:000000ff r4:832f4b14 [ 726.311298][ C1] [<809ccae0>] (gpio_led_set) from [<809ca464>] (led_set_brightness+0x84/0x90) [ 726.311327][ C1] r5:000000ff r4:832f4b14 [ 726.311336][ C1] [<809ca3e0>] (led_set_brightness) from [<809cbfe4>] (led_trigger_event+0x40/0x58) [ 726.311362][ C1] r5:000000ff r4:832f4b14 [ 726.311372][ C1] [<809cbfa4>] (led_trigger_event) from [<809cd640>] (ledtrig_cpu+0xac/0xf4) [ 726.311404][ C1] r7:ddde24c0 r6:00000002 r5:82b15cd8 r4:000000fe [ 726.311413][ C1] [<809cd594>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 726.311447][ C1] r9:00000000 r8:00000001 r7:8280c710 r6:83216000 r5:8280c6d0 r4:00000001 [ 726.311456][ C1] [<80227a24>] (arch_cpu_idle_exit) from [<802b168c>] (do_idle+0x5c/0x2d8) [ 726.311486][ C1] [<802b1630>] (do_idle) from [<802b1c38>] (cpu_startup_entry+0x30/0x34) [ 726.311522][ C1] r10:00000000 r9:414fc0f0 r8:80003000 r7:82a7b4a4 r6:83216000 r5:00000001 [ 726.311533][ C1] r4:00000092 [ 726.311540][ C1] [<802b1c08>] (cpu_startup_entry) from [<8022f360>] (secondary_start_kernel+0x128/0x194) [ 726.311573][ C1] [<8022f238>] (secondary_start_kernel) from [<80220094>] (__enable_mmu+0x0/0xc) [ 726.311609][ C1] r7:82a7b4a4 r6:30c0387d r5:00000000 r4:830b7bc0 [ 726.311809][ C1] Sending NMI from CPU 1 to CPUs 0: [ 726.312239][ C0] NMI backtrace for cpu 0 [ 726.312340][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G L syzkaller #0 PREEMPT [ 726.312380][ C0] Tainted: [L]=SOFTLOCKUP [ 726.312390][ C0] Hardware name: ARM-Versatile Express [ 726.312401][ C0] PC is at _raw_spin_lock+0x40/0x58 [ 726.312432][ C0] LR is at _raw_spin_lock+0x18/0x58 [ 726.312448][ C0] pc : [<81abbef4>] lr : [<81abbecc>] psr: 80000013 [ 726.312458][ C0] sp : 82801e28 ip : 82801e28 fp : 82801e3c [ 726.312468][ C0] r10: 00000000 r9 : 83ecf640 r8 : 8412aa88 [ 726.312478][ C0] r7 : 83ecf768 r6 : 00000001 r5 : 00000004 r4 : 83ecf768 [ 726.312489][ C0] r3 : 0000812d r2 : 0000812f r1 : 00000000 r0 : 00000001 [ 726.312501][ C0] Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 726.312522][ C0] Control: 30c5387d Table: 84642080 DAC: fffffffd [ 726.312532][ C0] Call trace: [ 726.312553][ C0] [<81abbeb4>] (_raw_spin_lock) from [<809c7a2c>] (gpio_mmio_set+0x44/0x80) [ 726.312592][ C0] r5:00000004 r4:83ecf640 [ 726.312601][ C0] [<809c79e8>] (gpio_mmio_set) from [<809b81e8>] (gpiochip_set+0x1c/0x44) [ 726.312637][ C0] r7:00000001 r6:00000000 r5:00000002 r4:83f59328 [ 726.312645][ C0] [<809b81cc>] (gpiochip_set) from [<809baab0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 726.312673][ C0] [<809baa38>] (gpiod_set_raw_value_commit) from [<809bc350>] (gpiod_set_value_nocheck+0x44/0x58) [ 726.312706][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:833e1e58 r5:00000001 [ 726.312755][ C0] r4:83f59328 [ 726.312779][ C0] [<809bc30c>] (gpiod_set_value_nocheck) from [<809bc3a0>] (gpiod_set_value+0x3c/0x88) [ 726.312808][ C0] [<809bc364>] (gpiod_set_value) from [<809ccb3c>] (gpio_led_set+0x5c/0x60) [ 726.312837][ C0] r5:000000ff r4:832f4a24 [ 726.312845][ C0] [<809ccae0>] (gpio_led_set) from [<809ca464>] (led_set_brightness+0x84/0x90) [ 726.312894][ C0] r5:000000ff r4:832f4a24 [ 726.312910][ C0] [<809ca3e0>] (led_set_brightness) from [<809cbfe4>] (led_trigger_event+0x40/0x58) [ 726.312939][ C0] r5:000000ff r4:832f4a24 [ 726.312948][ C0] [<809cbfa4>] (led_trigger_event) from [<809cd640>] (ledtrig_cpu+0xac/0xf4) [ 726.312979][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 726.312988][ C0] [<809cd594>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 726.313024][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 726.313035][ C0] [<80227a24>] (arch_cpu_idle_exit) from [<802b168c>] (do_idle+0x5c/0x2d8) [ 726.313065][ C0] [<802b1630>] (do_idle) from [<802b1c38>] (cpu_startup_entry+0x30/0x34) [ 726.313110][ C0] r10:8281aff4 r9:8280c680 r8:823bec64 r7:00000000 r6:deffc06c r5:828222e8 [ 726.313135][ C0] r4:000000ed [ 726.313153][ C0] [<802b1c08>] (cpu_startup_entry) from [<81aaf37c>] (kernel_init+0x0/0x138) [ 726.313211][ C0] [<81aaf29c>] (rest_init) from [<8260145c>] (start_kernel+0x844/0x860) [ 726.313274][ C0] [<82600c18>] (start_kernel) from [<00000000>] (0x0) [ 726.314567][ C1] Kernel panic - not syncing: softlockup: hung tasks [ 726.339782][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G L syzkaller #0 PREEMPT [ 726.340139][ C1] Tainted: [L]=SOFTLOCKUP [ 726.340291][ C1] Hardware name: ARM-Versatile Express [ 726.340493][ C1] Call trace: frame pointer underflow [ 726.340855][ C1] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 726.341180][ C1] r7:822965a4 r6:83216000 r5:00000000 r4:82295754 [ 726.341393][ C1] [<80201b58>] (show_stack) from [<8021ee08>] (dump_stack_lvl+0x54/0x7c) [ 726.341684][ C1] [<8021edb4>] (dump_stack_lvl) from [<8021ee48>] (dump_stack+0x18/0x1c) [ 726.341975][ C1] r5:00000000 r4:82a7bd14 [ 726.342136][ C1] [<8021ee30>] (dump_stack) from [<80202648>] (vpanic+0xe0/0x2e8) [ 726.342407][ C1] [<80202568>] (vpanic) from [<80202884>] (trace_suspend_resume+0x0/0xd8) [ 726.342747][ C1] r7:82ac27f8 [ 726.342888][ C1] [<80202850>] (panic) from [<80383fcc>] (watchdog_timer_fn+0x2dc/0x350) [ 726.343188][ C1] r3:00000001 r2:00004000 r1:82a7bd1c r0:822965a4 [ 726.343396][ C1] [<80383cf0>] (watchdog_timer_fn) from [<80329c64>] (__hrtimer_run_queues+0x1c4/0x454) [ 726.343714][ C1] r10:83216000 r9:00000000 r8:ddddb130 r7:80383cf0 r6:ddddb000 r5:ddddb040 [ 726.343971][ C1] r4:ddddb5d8 [ 726.344113][ C1] [<80329aa0>] (__hrtimer_run_queues) from [<8032b268>] (hrtimer_interrupt+0x148/0x2bc) [ 726.344438][ C1] r10:1618b2e0 r9:ddddb180 r8:ddddb130 r7:000000a9 r6:00000003 r5:20000193 [ 726.345017][ C1] r4:ddddb000 [ 726.345240][ C1] [<8032b120>] (hrtimer_interrupt) from [<813408e0>] (arch_timer_handler_virt+0x30/0x38) [ 726.345577][ C1] r10:81d0fc78 r9:8309e400 r8:00000000 r7:00000001 r6:00000001 r5:82498528 [ 726.345813][ C1] r4:8309de40 [ 726.345933][ C1] [<813408b0>] (arch_timer_handler_virt) from [<802efab4>] (handle_percpu_devid_irq+0x128/0x34c) [ 726.346290][ C1] [<802ef98c>] (handle_percpu_devid_irq) from [<802e8c44>] (handle_irq_desc+0x74/0x84) [ 726.346630][ C1] r10:81c05450 r9:83216000 r8:00000000 r7:df80a00c r6:826c2388 r5:df80a000 [ 726.346875][ C1] r4:8280cc44 [ 726.347000][ C1] [<802e8bd0>] (handle_irq_desc) from [<802e8cc0>] (generic_handle_domain_irq+0x18/0x1c) [ 726.347306][ C1] [<802e8ca8>] (generic_handle_domain_irq) from [<802012c8>] (gic_handle_irq+0x68/0x7c) [ 726.347598][ C1] [<80201260>] (gic_handle_irq) from [<81aad948>] (generic_handle_arch_irq+0x60/0x80) [ 726.347901][ C1] r7:df805d18 r6:82443f98 r5:8247f0cc r4:826c3a9c [ 726.348086][ C1] [<81aad8e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 726.348366][ C1] Exception stack(0xdf805d18 to 0xdf805d60) [ 726.348551][ C1] 5d00: 00000001 00000000 [ 726.348831][ C1] 5d20: 0000812e 0000812d 83ecf768 00000001 00000000 83ecf768 8412aa88 83ecf640 [ 726.349083][ C1] 5d40: 81c05450 df805d7c df805d68 df805d68 81abbecc 81abbef4 80000113 ffffffff [ 726.349343][ C1] r9:83216000 r8:8412aa88 r7:df805d4c r6:ffffffff r5:80000113 r4:81abbef4 [ 726.349565][ C1] [<81abbeb4>] (_raw_spin_lock) from [<809c7a2c>] (gpio_mmio_set+0x44/0x80) [ 726.349847][ C1] r5:00000001 r4:83ecf640 [ 726.349993][ C1] [<809c79e8>] (gpio_mmio_set) from [<809b81e8>] (gpiochip_set+0x1c/0x44) [ 726.350259][ C1] r7:00000000 r6:00000000 r5:00000000 r4:83f59300 [ 726.350425][ C1] [<809b81cc>] (gpiochip_set) from [<809baab0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 726.350685][ C1] [<809baa38>] (gpiod_set_raw_value_commit) from [<809bc350>] (gpiod_set_value_nocheck+0x44/0x58) [ 726.351009][ C1] r10:81c05450 r9:df805ebc r8:00000102 r7:00000049 r6:00000009 r5:00000000 [ 726.351245][ C1] r4:83f59300 [ 726.351369][ C1] [<809bc30c>] (gpiod_set_value_nocheck) from [<809bc3a0>] (gpiod_set_value+0x3c/0x88) [ 726.351651][ C1] [<809bc364>] (gpiod_set_value) from [<809ccb3c>] (gpio_led_set+0x5c/0x60) [ 726.351918][ C1] r5:832f4844 r4:832f4844 [ 726.352053][ C1] [<809ccae0>] (gpio_led_set) from [<809ca3d4>] (led_set_brightness_nosleep+0x38/0x44) [ 726.352339][ C1] r5:832f4844 r4:833e118c [ 726.352484][ C1] [<809ca39c>] (led_set_brightness_nosleep) from [<809cd438>] (led_heartbeat_function+0x84/0x144) [ 726.352812][ C1] [<809cd3b4>] (led_heartbeat_function) from [<80327070>] (call_timer_fn+0x30/0x220) [ 726.353113][ C1] r7:00000049 r6:809cd3b4 r5:833e118c r4:83216000 [ 726.353307][ C1] [<80327040>] (call_timer_fn) from [<80327524>] (__run_timers+0x2c4/0x3f8) [ 726.353590][ C1] r9:df805ebc r8:00000049 r7:00000000 r6:809cd3b4 r5:dddd9f00 r4:833e118c [ 726.353847][ C1] [<80327260>] (__run_timers) from [<803276c0>] (run_timer_base+0x68/0x78) [ 726.354136][ C1] r10:83216000 r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 [ 726.354367][ C1] r4:dddd9f00 [ 726.354489][ C1] [<80327658>] (run_timer_base) from [<803276ec>] (run_timer_softirq+0x1c/0x34) [ 726.354767][ C1] r4:82804084 [ 726.354901][ C1] [<803276d0>] (run_timer_softirq) from [<8025b65c>] (handle_softirqs+0x140/0x458) [ 726.355195][ C1] [<8025b51c>] (handle_softirqs) from [<8025bad0>] (__irq_exit_rcu+0x110/0x1d0) [ 726.355483][ C1] r10:00000000 r9:83216000 r8:00000000 r7:df865e20 r6:82443f98 r5:8247f0cc [ 726.355711][ C1] r4:83216000 [ 726.355834][ C1] [<8025b9c0>] (__irq_exit_rcu) from [<8025be48>] (irq_exit+0x10/0x18) [ 726.356100][ C1] r5:8247f0cc r4:826c3a9c [ 726.356262][ C1] [<8025be38>] (irq_exit) from [<81aad964>] (generic_handle_arch_irq+0x7c/0x80) [ 726.356545][ C1] [<81aad8e8>] (generic_handle_arch_irq) from [<81a7d904>] (call_with_stack+0x1c/0x20) [ 726.356883][ C1] r9:83216000 r8:8412aa88 r7:df865e54 r6:ffffffff r5:20000013 r4:809c820c [ 726.357200][ C1] [<81a7d8e8>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc) [ 726.357461][ C1] Exception stack(0xdf865e20 to 0xdf865e68) [ 726.357659][ C1] 5e20: dff61008 00000009 0000812d 809c820c 83ecf640 00000008 00000001 83ecf768 [ 726.357911][ C1] 5e40: 8412aa88 83ecf640 00000000 df865e8c df865e58 df865e70 809c7a4c 809c820c [ 726.358157][ C1] 5e60: 20000013 ffffffff [ 726.358301][ C1] [<809c79e8>] (gpio_mmio_set) from [<809b81e8>] (gpiochip_set+0x1c/0x44) [ 726.358577][ C1] r7:00000001 r6:00000000 r5:00000003 r4:83f5933c [ 726.358763][ C1] [<809b81cc>] (gpiochip_set) from [<809baab0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 726.359044][ C1] [<809baa38>] (gpiod_set_raw_value_commit) from [<809bc350>] (gpiod_set_value_nocheck+0x44/0x58) [ 726.359372][ C1] r10:00000000 r9:00000000 r8:00000001 r7:ddde24c0 r6:833e1e98 r5:00000001 [ 726.359666][ C1] r4:83f5933c [ 726.359786][ C1] [<809bc30c>] (gpiod_set_value_nocheck) from [<809bc3a0>] (gpiod_set_value+0x3c/0x88) [ 726.360062][ C1] [<809bc364>] (gpiod_set_value) from [<809ccb3c>] (gpio_led_set+0x5c/0x60) [ 726.360372][ C1] r5:000000ff r4:832f4b14 [ 726.360528][ C1] [<809ccae0>] (gpio_led_set) from [<809ca464>] (led_set_brightness+0x84/0x90) [ 726.360871][ C1] r5:000000ff r4:832f4b14 [ 726.361036][ C1] [<809ca3e0>] (led_set_brightness) from [<809cbfe4>] (led_trigger_event+0x40/0x58) [ 726.361753][ C1] r5:000000ff r4:832f4b14 [ 726.362012][ C1] [<809cbfa4>] (led_trigger_event) from [<809cd640>] (ledtrig_cpu+0xac/0xf4) [ 726.362338][ C1] r7:ddde24c0 r6:00000002 r5:82b15cd8 r4:000000fe [ 726.362539][ C1] [<809cd594>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 726.362853][ C1] r9:00000000 r8:00000001 r7:8280c710 r6:83216000 r5:8280c6d0 r4:00000001 [ 726.363107][ C1] [<80227a24>] (arch_cpu_idle_exit) from [<802b168c>] (do_idle+0x5c/0x2d8) [ 726.363427][ C1] [<802b1630>] (do_idle) from [<802b1c38>] (cpu_startup_entry+0x30/0x34) [ 726.363734][ C1] r10:00000000 r9:414fc0f0 r8:80003000 r7:82a7b4a4 r6:83216000 r5:00000001 [ 726.363997][ C1] r4:00000092 [ 726.364139][ C1] [<802b1c08>] (cpu_startup_entry) from [<8022f360>] (secondary_start_kernel+0x128/0x194) [ 726.364459][ C1] [<8022f238>] (secondary_start_kernel) from [<80220094>] (__enable_mmu+0x0/0xc) [ 726.364801][ C1] r7:82a7b4a4 r6:30c0387d r5:00000000 r4:830b7bc0 [ 726.366913][ C1] Rebooting in 86400 seconds..