last executing test programs: 732.931437ms ago: executing program 0 (id=4945): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0), 0x2082, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f00000000c0)={0x0, 'veth0_vlan\x00', {0x3}, 0x5}) 581.169796ms ago: executing program 0 (id=4948): r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000024c0), 0x40101, 0x0) r1 = dup(r0) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS_OLD(r1, 0xc1004111, 0x0) 500.109547ms ago: executing program 0 (id=4951): socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000020c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$FS_IOC_GETFLAGS(r1, 0x5421, &(0x7f0000000040)) 483.323229ms ago: executing program 1 (id=4952): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TUNGETVNETLE(r1, 0x5452, &(0x7f0000000180)) 401.351599ms ago: executing program 0 (id=4953): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockname(r0, &(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, &(0x7f00000081c0)=0x80) ioctl$TIOCSSOFTCAR(r1, 0x5421, &(0x7f0000000040)) 401.168649ms ago: executing program 1 (id=4954): r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) r1 = openat$cgroup_pressure(r0, &(0x7f0000000040)='cpu.pressure\x00', 0xe0, 0x0) ioctl$TIOCSLCKTRMIOS(r1, 0x5452, &(0x7f00000000c0)) 311.650071ms ago: executing program 0 (id=4955): r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) 292.230273ms ago: executing program 1 (id=4959): capset(&(0x7f0000000180)={0x20071026}, &(0x7f0000000040)={0x0, 0x5b0a}) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000980)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000940)={&(0x7f0000000880)={0x14, 0x0, 0x829, 0x70bd26, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x4004890}, 0x20040000) 231.312981ms ago: executing program 0 (id=4956): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='fdinfo\x00') exit(0xffff) open_tree(r0, &(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x801) 159.16828ms ago: executing program 1 (id=4957): r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000180)='.pending_reads\x00', 0x20042, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$TIOCSWINSZ(r0, 0x5452, &(0x7f00000002c0)) 98.904747ms ago: executing program 1 (id=4958): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup(r0) sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x14, 0x0, 0x1, 0x70bd29, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4008000}, 0x4000) 0s ago: executing program 1 (id=4960): r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000001340)={0xffffffffffffffff}) sendmsg$NL80211_CMD_LEAVE_MESH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) kernel console output (not intermixed with test programs): [ 47.423115][ T29] audit: type=1400 audit(47.330:56): avc: denied { read write } for pid=3086 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 47.426413][ T29] audit: type=1400 audit(47.330:57): avc: denied { open } for pid=3086 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:30372' (ED25519) to the list of known hosts. [ 63.818940][ T29] audit: type=1400 audit(63.700:58): avc: denied { name_bind } for pid=3089 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 65.721212][ T29] audit: type=1400 audit(65.630:59): avc: denied { execute } for pid=3090 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 65.750426][ T29] audit: type=1400 audit(65.660:60): avc: denied { execute_no_trans } for pid=3090 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 68.415443][ T29] audit: type=1400 audit(68.320:61): avc: denied { mounton } for pid=3090 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 68.420925][ T29] audit: type=1400 audit(68.330:62): avc: denied { mount } for pid=3090 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 68.439760][ T3090] cgroup: Unknown subsys name 'net' [ 68.450617][ T29] audit: type=1400 audit(68.360:63): avc: denied { unmount } for pid=3090 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 68.614547][ T3090] cgroup: Unknown subsys name 'cpuset' [ 68.620247][ T3090] cgroup: Unknown subsys name 'hugetlb' [ 68.621205][ T3090] cgroup: Unknown subsys name 'rlimit' [ 68.887803][ T29] audit: type=1400 audit(68.790:64): avc: denied { setattr } for pid=3090 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 68.891379][ T29] audit: type=1400 audit(68.800:65): avc: denied { mounton } for pid=3090 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 68.894236][ T29] audit: type=1400 audit(68.800:66): avc: denied { mount } for pid=3090 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 69.093087][ T3092] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 69.097389][ T29] audit: type=1400 audit(69.000:67): avc: denied { relabelto } for pid=3092 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 69.105790][ T29] audit: type=1400 audit(69.010:68): avc: denied { write } for pid=3092 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 69.145354][ T29] audit: type=1400 audit(69.050:69): avc: denied { read } for pid=3090 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 69.149095][ T29] audit: type=1400 audit(69.050:70): avc: denied { open } for pid=3090 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 75.932772][ T3090] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 77.935327][ T29] audit: type=1400 audit(77.840:71): avc: denied { execmem } for pid=3093 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 78.004022][ T29] audit: type=1400 audit(77.910:72): avc: denied { read } for pid=3095 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 78.006760][ T29] audit: type=1400 audit(77.910:73): avc: denied { open } for pid=3095 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 78.011786][ T29] audit: type=1400 audit(77.920:74): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 78.046894][ T29] audit: type=1400 audit(77.950:75): avc: denied { module_request } for pid=3095 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 78.049703][ T29] audit: type=1400 audit(77.950:76): avc: denied { module_request } for pid=3096 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 78.131227][ T29] audit: type=1400 audit(78.040:77): avc: denied { sys_module } for pid=3095 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 78.812779][ T29] audit: type=1400 audit(78.720:78): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 79.960083][ T3095] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 79.985209][ T3095] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 79.990818][ T3096] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 79.997170][ T3096] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 80.889513][ T3096] hsr_slave_0: entered promiscuous mode [ 80.893868][ T3096] hsr_slave_1: entered promiscuous mode [ 80.911319][ T3095] hsr_slave_0: entered promiscuous mode [ 80.913217][ T3095] hsr_slave_1: entered promiscuous mode [ 80.915990][ T3095] debugfs: 'hsr0' already exists in 'hsr' [ 80.916583][ T3095] Cannot create hsr debugfs directory [ 81.423899][ T29] audit: type=1400 audit(81.330:79): avc: denied { create } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 81.431844][ T29] audit: type=1400 audit(81.330:80): avc: denied { write } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 81.443855][ T3096] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 81.461006][ T3096] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 81.481660][ T3096] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 81.498036][ T3096] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 81.567323][ T3095] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 81.587583][ T3095] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 81.607363][ T3095] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 81.622124][ T3095] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 82.412463][ T3096] 8021q: adding VLAN 0 to HW filter on device bond0 [ 82.434899][ T3095] 8021q: adding VLAN 0 to HW filter on device bond0 [ 85.271099][ T3095] veth0_vlan: entered promiscuous mode [ 85.296360][ T3095] veth1_vlan: entered promiscuous mode [ 85.361376][ T3095] veth0_macvtap: entered promiscuous mode [ 85.386760][ T3096] veth0_vlan: entered promiscuous mode [ 85.393995][ T3095] veth1_macvtap: entered promiscuous mode [ 85.421355][ T3096] veth1_vlan: entered promiscuous mode [ 85.506548][ T139] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.507188][ T139] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.507369][ T139] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.507454][ T139] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.535533][ T3096] veth0_macvtap: entered promiscuous mode [ 85.546077][ T3096] veth1_macvtap: entered promiscuous mode [ 85.665237][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 85.665753][ T29] audit: type=1400 audit(85.570:82): avc: denied { mount } for pid=3095 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 85.674352][ T29] audit: type=1400 audit(85.580:83): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/syzkaller.K84smj/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 85.686971][ T29] audit: type=1400 audit(85.590:84): avc: denied { mount } for pid=3095 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 85.697616][ T29] audit: type=1400 audit(85.600:85): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/syzkaller.K84smj/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 85.708159][ T29] audit: type=1400 audit(85.610:86): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/syzkaller.K84smj/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=1001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 85.723811][ T58] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.725753][ T58] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.726014][ T58] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.726140][ T58] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.734738][ T29] audit: type=1400 audit(85.640:87): avc: denied { unmount } for pid=3095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 85.742694][ T29] audit: type=1400 audit(85.650:88): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 85.747339][ T29] audit: type=1400 audit(85.650:89): avc: denied { mount } for pid=3095 comm="syz-executor" name="/" dev="gadgetfs" ino=1002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 85.757523][ T29] audit: type=1400 audit(85.660:90): avc: denied { mount } for pid=3095 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 85.762733][ T29] audit: type=1400 audit(85.670:91): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 85.876810][ T3095] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 87.820735][ T3744] capability: warning: `syz.1.21' uses 32-bit capabilities (legacy support in use) [ 91.132696][ T29] kauditd_printk_skb: 13 callbacks suppressed [ 91.136125][ T29] audit: type=1400 audit(91.040:105): avc: denied { create } for pid=3837 comm="syz.1.67" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 91.136578][ T29] audit: type=1400 audit(91.040:106): avc: denied { ioctl } for pid=3837 comm="syz.1.67" path="socket:[3288]" dev="sockfs" ino=3288 ioctlcmd=0x5320 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 91.234915][ T3843] SELinux: Context system_u:object_r:login_exec_t:s0 is not valid (left unmapped). [ 91.237778][ T29] audit: type=1400 audit(91.140:107): avc: denied { relabelto } for pid=3842 comm="syz.0.68" name="rdma_cm" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:login_exec_t:s0" [ 91.245964][ T29] audit: type=1400 audit(91.140:108): avc: denied { associate } for pid=3842 comm="syz.0.68" name="rdma_cm" dev="devtmpfs" ino=707 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 srawcon="system_u:object_r:login_exec_t:s0" [ 91.419739][ T29] audit: type=1400 audit(91.330:109): avc: denied { append } for pid=3849 comm="syz.0.73" name="loop-control" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 91.744912][ T29] audit: type=1400 audit(91.650:110): avc: denied { allowed } for pid=3862 comm="syz.0.79" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 91.755652][ T29] audit: type=1400 audit(91.660:111): avc: denied { create } for pid=3862 comm="syz.0.79" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 91.761040][ T29] audit: type=1400 audit(91.670:112): avc: denied { map } for pid=3862 comm="syz.0.79" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3330 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 91.761423][ T29] audit: type=1400 audit(91.670:113): avc: denied { read write } for pid=3862 comm="syz.0.79" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3330 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 91.796175][ T29] audit: type=1400 audit(91.700:114): avc: denied { getattr } for pid=3862 comm="syz.0.79" name="[io_uring]" dev="anon_inodefs" ino=3330 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 92.040713][ T3872] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3872 comm=syz.0.84 [ 94.914277][ T3949] capability: warning: `syz.1.121' uses deprecated v2 capabilities in a way that may be insecure [ 95.623023][ T3982] Zero length message leads to an empty skb [ 96.389005][ T4017] usb usb1: usbfs: process 4017 (syz.1.154) did not claim interface 22 before use [ 96.511832][ T29] kauditd_printk_skb: 8 callbacks suppressed [ 96.514907][ T29] audit: type=1400 audit(96.420:123): avc: denied { create } for pid=4021 comm="syz.0.157" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 96.521785][ T29] audit: type=1400 audit(96.430:124): avc: denied { getopt } for pid=4021 comm="syz.0.157" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 96.524898][ T29] audit: type=1400 audit(96.430:125): avc: denied { write } for pid=4022 comm="syz.1.158" path="socket:[2932]" dev="sockfs" ino=2932 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sock_file permissive=1 [ 96.723519][ T4032] veth1_macvtap: left promiscuous mode [ 97.123286][ T29] audit: type=1400 audit(97.030:126): avc: denied { setopt } for pid=4050 comm="syz.0.171" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 97.296447][ T29] audit: type=1400 audit(97.200:127): avc: denied { create } for pid=4057 comm="syz.1.175" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 97.305753][ T29] audit: type=1400 audit(97.210:128): avc: denied { ioctl } for pid=4057 comm="syz.1.175" path="socket:[3003]" dev="sockfs" ino=3003 ioctlcmd=0x5530 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 97.573975][ T29] audit: type=1400 audit(97.480:129): avc: denied { write } for pid=4070 comm="syz.1.181" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 99.410825][ T4111] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 99.421603][ T29] audit: type=1400 audit(99.330:130): avc: denied { write } for pid=4106 comm="syz.1.199" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 99.639268][ T41] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 99.798950][ T41] usb 1-1: Using ep0 maxpacket: 32 [ 99.822617][ T41] usb 1-1: config index 0 descriptor too short (expected 12790, got 36) [ 99.823002][ T41] usb 1-1: config 54 has an invalid descriptor of length 133, skipping remainder of the config [ 99.825240][ T41] usb 1-1: config 54 has 0 interfaces, different from the descriptor's value: 17 [ 99.825726][ T41] usb 1-1: New USB device found, idVendor=03f0, idProduct=8c17, bcdDevice= 0.40 [ 99.825785][ T41] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 100.068706][ T41] usb 1-1: string descriptor 0 read error: -71 [ 100.072661][ T29] audit: type=1400 audit(99.980:131): avc: denied { write } for pid=4127 comm="syz.1.207" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 100.085293][ T41] usb 1-1: USB disconnect, device number 2 [ 100.548987][ T23] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 100.698925][ T23] usb 1-1: Using ep0 maxpacket: 32 [ 100.706506][ T23] usb 1-1: config index 0 descriptor too short (expected 12790, got 36) [ 100.709475][ T23] usb 1-1: config 54 has an invalid descriptor of length 133, skipping remainder of the config [ 100.709761][ T23] usb 1-1: config 54 has 0 interfaces, different from the descriptor's value: 17 [ 100.710007][ T23] usb 1-1: New USB device found, idVendor=03f0, idProduct=8c17, bcdDevice= 0.40 [ 100.710072][ T23] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 100.930420][ T23] usb 1-1: string descriptor 0 read error: -71 [ 100.937013][ T23] usb 1-1: USB disconnect, device number 3 [ 101.100768][ T29] audit: type=1400 audit(101.010:132): avc: denied { read } for pid=4155 comm="syz.0.213" path="socket:[3762]" dev="sockfs" ino=3762 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 103.021328][ T29] audit: type=1400 audit(102.930:133): avc: denied { create } for pid=4197 comm="syz.0.232" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 105.716299][ T29] audit: type=1400 audit(105.620:134): avc: denied { ioctl } for pid=4206 comm="syz.0.236" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=4241 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 105.920026][ T29] audit: type=1400 audit(105.830:135): avc: denied { prog_load } for pid=4212 comm="syz.0.239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 105.922004][ T29] audit: type=1400 audit(105.830:136): avc: denied { bpf } for pid=4212 comm="syz.0.239" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 105.926668][ T29] audit: type=1400 audit(105.830:137): avc: denied { perfmon } for pid=4212 comm="syz.0.239" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 105.955479][ T29] audit: type=1400 audit(105.860:138): avc: denied { prog_run } for pid=4212 comm="syz.0.239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 106.133482][ T29] audit: type=1400 audit(106.040:139): avc: denied { setopt } for pid=4220 comm="syz.1.243" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 106.311232][ T29] audit: type=1400 audit(106.220:140): avc: denied { create } for pid=4222 comm="syz.0.244" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 106.326272][ T29] audit: type=1400 audit(106.230:141): avc: denied { connect } for pid=4222 comm="syz.0.244" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 106.839405][ T29] audit: type=1400 audit(106.740:142): avc: denied { ioctl } for pid=4222 comm="syz.0.244" path="socket:[3881]" dev="sockfs" ino=3881 ioctlcmd=0x8918 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 109.170945][ T29] audit: type=1400 audit(109.080:143): avc: denied { setopt } for pid=4242 comm="syz.1.253" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 113.110794][ T29] audit: type=1400 audit(113.020:144): avc: denied { getopt } for pid=4282 comm="syz.1.272" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 113.646923][ T29] audit: type=1400 audit(113.550:145): avc: denied { remount } for pid=4293 comm="syz.0.277" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 113.664937][ T29] audit: type=1400 audit(113.570:146): avc: denied { unmount } for pid=3095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 113.861355][ T29] audit: type=1400 audit(113.770:147): avc: denied { write } for pid=4301 comm="syz.0.281" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 113.867551][ T29] audit: type=1400 audit(113.770:148): avc: denied { read } for pid=4301 comm="syz.0.281" path="socket:[4033]" dev="sockfs" ino=4033 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 114.277310][ T29] audit: type=1400 audit(114.180:149): avc: denied { append } for pid=4320 comm="syz.0.290" name="nullb0" dev="devtmpfs" ino=654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 114.632104][ T29] audit: type=1400 audit(114.540:150): avc: denied { mount } for pid=4333 comm="syz.0.297" name="/" dev="tracefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 114.636938][ T29] audit: type=1400 audit(114.540:151): avc: denied { remount } for pid=4333 comm="syz.0.297" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 114.652549][ T29] audit: type=1400 audit(114.560:152): avc: denied { unmount } for pid=3095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 114.709083][ T4337] lo: entered promiscuous mode [ 114.709528][ T4337] lo: entered allmulticast mode [ 114.710912][ T4337] tunl0: entered promiscuous mode [ 114.711061][ T4337] tunl0: entered allmulticast mode [ 114.711759][ T4337] gre0: entered promiscuous mode [ 114.711809][ T4337] gre0: entered allmulticast mode [ 114.712591][ T4337] gretap0: entered promiscuous mode [ 114.712637][ T4337] gretap0: entered allmulticast mode [ 114.715522][ T4337] erspan0: entered promiscuous mode [ 114.722161][ T4337] erspan0: entered allmulticast mode [ 114.727885][ T4337] ip_vti0: entered promiscuous mode [ 114.728682][ T4337] ip_vti0: entered allmulticast mode [ 114.732218][ T4337] ip6_vti0: entered promiscuous mode [ 114.732682][ T4337] ip6_vti0: entered allmulticast mode [ 114.733936][ T4337] sit0: entered promiscuous mode [ 114.734226][ T4337] sit0: entered allmulticast mode [ 114.735403][ T4337] ip6tnl0: entered promiscuous mode [ 114.735680][ T4337] ip6tnl0: entered allmulticast mode [ 114.745403][ T4337] ip6gre0: entered promiscuous mode [ 114.745881][ T4337] ip6gre0: entered allmulticast mode [ 114.751962][ T4337] syz_tun: entered promiscuous mode [ 114.754095][ T4337] syz_tun: entered allmulticast mode [ 114.770910][ T4337] ip6gretap0: entered promiscuous mode [ 114.771296][ T4337] ip6gretap0: entered allmulticast mode [ 114.776455][ T4337] vcan0: entered promiscuous mode [ 114.779584][ T4337] vcan0: entered allmulticast mode [ 114.782781][ T4337] bond0: entered promiscuous mode [ 114.783262][ T4337] bond_slave_0: entered promiscuous mode [ 114.783655][ T4337] bond_slave_1: entered promiscuous mode [ 114.783909][ T4337] bond0: entered allmulticast mode [ 114.784062][ T4337] bond_slave_0: entered allmulticast mode [ 114.784170][ T4337] bond_slave_1: entered allmulticast mode [ 114.786043][ T4337] dummy0: entered promiscuous mode [ 114.786385][ T4337] dummy0: entered allmulticast mode [ 114.787414][ T4337] nlmon0: entered promiscuous mode [ 114.787680][ T4337] nlmon0: entered allmulticast mode [ 114.800724][ T4337] vxcan0: entered promiscuous mode [ 114.801769][ T4337] vxcan0: entered allmulticast mode [ 114.805322][ T4337] vxcan1: entered promiscuous mode [ 114.817893][ T4337] vxcan1: entered allmulticast mode [ 114.820893][ T4337] veth0: entered promiscuous mode [ 114.821844][ T4337] veth0: entered allmulticast mode [ 114.824341][ T4337] veth1: entered promiscuous mode [ 114.825551][ T4337] veth1: entered allmulticast mode [ 114.827719][ T4337] wg0: entered promiscuous mode [ 114.829299][ T4337] wg0: entered allmulticast mode [ 114.831166][ T4337] wg1: entered promiscuous mode [ 114.831962][ T4337] wg1: entered allmulticast mode [ 114.833670][ T4337] wg2: entered promiscuous mode [ 114.834420][ T4337] wg2: entered allmulticast mode [ 114.836128][ T4337] veth0_to_bridge: entered promiscuous mode [ 114.837453][ T4337] veth0_to_bridge: entered allmulticast mode [ 114.842186][ T4337] bridge_slave_0: entered promiscuous mode [ 114.844583][ T4337] bridge_slave_0: entered allmulticast mode [ 114.849203][ T4337] veth1_to_bridge: entered promiscuous mode [ 114.850105][ T4337] veth1_to_bridge: entered allmulticast mode [ 114.852362][ T4337] bridge_slave_1: entered promiscuous mode [ 114.853153][ T4337] bridge_slave_1: entered allmulticast mode [ 114.855250][ T4337] veth0_to_bond: entered promiscuous mode [ 114.856066][ T4337] veth0_to_bond: entered allmulticast mode [ 114.866068][ T4337] bond0: (slave bond_slave_0): Releasing backup interface [ 114.875868][ T4337] veth1_to_bond: entered promiscuous mode [ 114.876724][ T4337] veth1_to_bond: entered allmulticast mode [ 114.889018][ T4337] bond0: (slave bond_slave_1): Releasing backup interface [ 114.896144][ T4337] veth0_to_team: entered promiscuous mode [ 114.897215][ T4337] veth0_to_team: entered allmulticast mode [ 114.902336][ T4337] team_slave_0: entered promiscuous mode [ 114.903327][ T4337] team_slave_0: entered allmulticast mode [ 114.905309][ T4337] veth1_to_team: entered promiscuous mode [ 114.909828][ T4337] veth1_to_team: entered allmulticast mode [ 114.912106][ T4337] team_slave_1: entered promiscuous mode [ 114.912946][ T4337] team_slave_1: entered allmulticast mode [ 114.915153][ T4337] veth0_to_batadv: entered promiscuous mode [ 114.915891][ T4337] veth0_to_batadv: entered allmulticast mode [ 114.918029][ T4337] batadv_slave_0: entered promiscuous mode [ 114.919996][ T4337] batadv_slave_0: entered allmulticast mode [ 114.922206][ T4337] veth1_to_batadv: entered promiscuous mode [ 114.924853][ T4337] veth1_to_batadv: entered allmulticast mode [ 114.929854][ T4337] batadv_slave_1: entered promiscuous mode [ 114.932515][ T4337] batadv_slave_1: entered allmulticast mode [ 114.935036][ T4337] xfrm0: entered promiscuous mode [ 114.935803][ T4337] xfrm0: entered allmulticast mode [ 114.937499][ T4337] veth0_to_hsr: entered promiscuous mode [ 114.939517][ T4337] veth0_to_hsr: entered allmulticast mode [ 114.942526][ T4337] hsr_slave_0: entered allmulticast mode [ 114.944584][ T4337] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 115.487655][ T4353] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5123 sclass=netlink_audit_socket pid=4353 comm=syz.1.306 [ 116.286322][ T29] audit: type=1400 audit(116.190:153): avc: denied { create } for pid=4374 comm="syz.1.317" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 119.076829][ T29] audit: type=1400 audit(118.980:154): avc: denied { read } for pid=4432 comm="syz.0.344" path="socket:[4581]" dev="sockfs" ino=4581 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 119.877996][ T29] audit: type=1400 audit(119.780:155): avc: denied { setattr } for pid=4450 comm="syz.0.353" name="" dev="pipefs" ino=4615 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 121.423002][ T29] audit: type=1400 audit(121.330:156): avc: denied { accept } for pid=4508 comm="syz.0.382" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 124.243268][ T29] audit: type=1400 audit(124.150:157): avc: denied { write } for pid=4586 comm="syz.1.421" name="arp" dev="proc" ino=4026532677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 128.470909][ T29] audit: type=1400 audit(128.380:158): avc: denied { lock } for pid=4609 comm="syz.0.432" path="/dev/dlm-monitor" dev="devtmpfs" ino=86 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 129.661837][ T4622] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=4622 comm=syz.0.438 [ 129.669169][ T29] audit: type=1400 audit(129.570:159): avc: denied { write } for pid=4621 comm="syz.0.438" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 134.451404][ T4726] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 134.620379][ T29] audit: type=1400 audit(134.530:160): avc: denied { connect } for pid=4729 comm="syz.0.489" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 136.921272][ T29] audit: type=1400 audit(136.830:161): avc: denied { create } for pid=4797 comm="syz.1.523" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 136.929166][ T29] audit: type=1400 audit(136.830:162): avc: denied { write } for pid=4797 comm="syz.1.523" path="socket:[5932]" dev="sockfs" ino=5932 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 137.106445][ T4806] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4806 comm=syz.1.527 [ 137.274699][ T29] audit: type=1400 audit(137.180:163): avc: denied { ioctl } for pid=4815 comm="syz.1.530" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 137.346641][ T4819] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4819 comm=syz.0.531 [ 146.737252][ T29] audit: type=1400 audit(146.640:164): avc: denied { watch } for pid=4947 comm="syz.0.594" path="/317" dev="tmpfs" ino=1635 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 150.636445][ T5006] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5006 comm=syz.1.622 [ 156.834077][ T29] audit: type=1400 audit(156.740:165): avc: denied { nlmsg_read } for pid=5089 comm="syz.0.663" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 162.052283][ T5120] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5120 comm=syz.1.676 [ 162.605517][ T5141] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5123 sclass=netlink_audit_socket pid=5141 comm=syz.0.686 [ 162.997517][ T5155] lo: entered promiscuous mode [ 163.001366][ T5155] lo: entered allmulticast mode [ 163.003721][ T5155] tunl0: entered promiscuous mode [ 163.005833][ T5155] tunl0: entered allmulticast mode [ 163.007259][ T5155] gre0: entered promiscuous mode [ 163.007557][ T5155] gre0: entered allmulticast mode [ 163.014658][ T5155] gretap0: entered promiscuous mode [ 163.015025][ T5155] gretap0: entered allmulticast mode [ 163.021785][ T5155] erspan0: entered promiscuous mode [ 163.022145][ T5155] erspan0: entered allmulticast mode [ 163.024875][ T5155] ip_vti0: entered promiscuous mode [ 163.025212][ T5155] ip_vti0: entered allmulticast mode [ 163.026347][ T5155] ip6_vti0: entered promiscuous mode [ 163.026629][ T5155] ip6_vti0: entered allmulticast mode [ 163.027806][ T5155] sit0: entered promiscuous mode [ 163.028043][ T5155] sit0: entered allmulticast mode [ 163.036235][ T5155] ip6tnl0: entered promiscuous mode [ 163.040376][ T5155] ip6tnl0: entered allmulticast mode [ 163.043662][ T5155] ip6gre0: entered promiscuous mode [ 163.046082][ T5155] ip6gre0: entered allmulticast mode [ 163.049834][ T5155] syz_tun: entered promiscuous mode [ 163.050683][ T5155] syz_tun: entered allmulticast mode [ 163.052831][ T5155] ip6gretap0: entered promiscuous mode [ 163.053949][ T5155] ip6gretap0: entered allmulticast mode [ 163.056167][ T5155] vcan0: entered promiscuous mode [ 163.056937][ T5155] vcan0: entered allmulticast mode [ 163.059700][ T5155] bond0: entered promiscuous mode [ 163.060975][ T5155] bond_slave_0: entered promiscuous mode [ 163.062489][ T5155] bond_slave_1: entered promiscuous mode [ 163.063610][ T5155] bond0: entered allmulticast mode [ 163.064413][ T5155] bond_slave_0: entered allmulticast mode [ 163.065173][ T5155] bond_slave_1: entered allmulticast mode [ 163.067727][ T5155] dummy0: entered promiscuous mode [ 163.069388][ T5155] dummy0: entered allmulticast mode [ 163.071393][ T5155] nlmon0: entered promiscuous mode [ 163.071672][ T5155] nlmon0: entered allmulticast mode [ 163.073449][ T5155] vxcan0: entered promiscuous mode [ 163.073710][ T5155] vxcan0: entered allmulticast mode [ 163.074813][ T5155] vxcan1: entered promiscuous mode [ 163.075034][ T5155] vxcan1: entered allmulticast mode [ 163.076106][ T5155] veth0: entered promiscuous mode [ 163.076163][ T5155] veth0: entered allmulticast mode [ 163.077244][ T5155] veth1: entered promiscuous mode [ 163.077503][ T5155] veth1: entered allmulticast mode [ 163.079929][ T5155] wg0: entered promiscuous mode [ 163.080179][ T5155] wg0: entered allmulticast mode [ 163.081910][ T5155] wg1: entered promiscuous mode [ 163.082205][ T5155] wg1: entered allmulticast mode [ 163.083341][ T5155] wg2: entered promiscuous mode [ 163.083741][ T5155] wg2: entered allmulticast mode [ 163.084840][ T5155] veth0_to_bridge: entered promiscuous mode [ 163.085152][ T5155] veth0_to_bridge: entered allmulticast mode [ 163.086479][ T5155] bridge_slave_0: entered promiscuous mode [ 163.086921][ T5155] bridge_slave_0: entered allmulticast mode [ 163.089220][ T5155] veth1_to_bridge: entered promiscuous mode [ 163.089510][ T5155] veth1_to_bridge: entered allmulticast mode [ 163.090889][ T5155] bridge_slave_1: entered promiscuous mode [ 163.091141][ T5155] bridge_slave_1: entered allmulticast mode [ 163.092373][ T5155] veth0_to_bond: entered promiscuous mode [ 163.092625][ T5155] veth0_to_bond: entered allmulticast mode [ 163.096236][ T5155] bond0: (slave bond_slave_0): Releasing backup interface [ 163.104623][ T5155] veth1_to_bond: entered promiscuous mode [ 163.104893][ T5155] veth1_to_bond: entered allmulticast mode [ 163.111758][ T5155] bond0: (slave bond_slave_1): Releasing backup interface [ 163.117321][ T5155] veth0_to_team: entered promiscuous mode [ 163.117611][ T5155] veth0_to_team: entered allmulticast mode [ 163.122382][ T5155] team_slave_0: entered promiscuous mode [ 163.122772][ T5155] team_slave_0: entered allmulticast mode [ 163.124192][ T5155] veth1_to_team: entered promiscuous mode [ 163.124470][ T5155] veth1_to_team: entered allmulticast mode [ 163.125852][ T5155] team_slave_1: entered promiscuous mode [ 163.126111][ T5155] team_slave_1: entered allmulticast mode [ 163.127466][ T5155] veth0_to_batadv: entered promiscuous mode [ 163.127683][ T5155] veth0_to_batadv: entered allmulticast mode [ 163.141490][ T5155] batadv_slave_0: entered promiscuous mode [ 163.141784][ T5155] batadv_slave_0: entered allmulticast mode [ 163.143076][ T5155] veth1_to_batadv: entered promiscuous mode [ 163.143288][ T5155] veth1_to_batadv: entered allmulticast mode [ 163.144523][ T5155] batadv_slave_1: entered promiscuous mode [ 163.144733][ T5155] batadv_slave_1: entered allmulticast mode [ 163.145998][ T5155] xfrm0: entered promiscuous mode [ 163.146057][ T5155] xfrm0: entered allmulticast mode [ 163.146781][ T5155] veth0_to_hsr: entered promiscuous mode [ 163.146821][ T5155] veth0_to_hsr: entered allmulticast mode [ 163.147652][ T5155] hsr_slave_0: entered allmulticast mode [ 163.159434][ T5155] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 166.615616][ T29] audit: type=1400 audit(166.520:166): avc: denied { setopt } for pid=5195 comm="syz.1.715" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 166.621263][ T29] audit: type=1400 audit(166.530:167): avc: denied { write } for pid=5195 comm="syz.1.715" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 166.698916][ T29] audit: type=1400 audit(166.600:168): avc: denied { create } for pid=5199 comm="syz.0.718" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 166.702521][ T29] audit: type=1400 audit(166.610:169): avc: denied { setopt } for pid=5199 comm="syz.0.718" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 168.636607][ T29] audit: type=1400 audit(168.540:170): avc: denied { map_read map_write } for pid=5254 comm="syz.1.744" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 168.812551][ T29] audit: type=1400 audit(168.720:171): avc: denied { setopt } for pid=5261 comm="syz.0.747" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 169.214947][ T29] audit: type=1400 audit(169.120:172): avc: denied { ioctl } for pid=5279 comm="syz.1.756" path="socket:[7728]" dev="sockfs" ino=7728 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 169.363946][ T29] audit: type=1400 audit(169.270:173): avc: denied { ioctl } for pid=5287 comm="syz.1.760" path="socket:[7745]" dev="sockfs" ino=7745 ioctlcmd=0x8901 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sock_file permissive=1 [ 170.281088][ T5326] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5326 comm=syz.0.779 [ 171.160287][ T29] audit: type=1400 audit(171.070:174): avc: denied { bind } for pid=5362 comm="syz.0.797" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 171.162266][ T29] audit: type=1400 audit(171.070:175): avc: denied { accept } for pid=5362 comm="syz.0.797" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 173.528990][ T5453] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=5453 comm=syz.1.842 [ 173.804910][ T5465] netlink: 7784 bytes leftover after parsing attributes in process `syz.1.848'. [ 174.112671][ T5478] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=5478 comm=syz.1.853 [ 174.323239][ T5486] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5486 comm=syz.1.858 [ 174.335224][ T29] audit: type=1400 audit(174.240:176): avc: denied { create } for pid=5484 comm="syz.0.857" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=netlink_socket permissive=1 [ 176.029995][ T29] audit: type=1400 audit(175.940:177): avc: denied { mounton } for pid=5554 comm="syz.1.892" path="/441/file0" dev="tmpfs" ino=2259 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 176.038063][ T5556] ======================================================= [ 176.038063][ T5556] WARNING: The mand mount option has been deprecated and [ 176.038063][ T5556] and is ignored by this kernel. Remove the mand [ 176.038063][ T5556] option from the mount to silence this warning. [ 176.038063][ T5556] ======================================================= [ 178.059341][ T29] audit: type=1400 audit(177.960:178): avc: denied { create } for pid=5626 comm="syz.1.927" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 178.079955][ T29] audit: type=1400 audit(177.990:179): avc: denied { connect } for pid=5626 comm="syz.1.927" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 180.311172][ T29] audit: type=1400 audit(180.220:180): avc: denied { execute } for pid=5697 comm="syz.0.963" path="/481/file0" dev="tmpfs" ino=2483 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 180.315828][ T29] audit: type=1804 audit(180.220:181): pid=5698 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz.0.963" name="/newroot/481/file0" dev="tmpfs" ino=2483 res=1 errno=0 [ 180.722486][ T3701] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 180.723000][ T3701] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 180.725410][ T3701] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 180.725797][ T3701] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 180.726098][ T3701] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 180.726209][ T3701] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 180.726297][ T3701] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 180.726431][ T3701] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 180.726519][ T3701] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 180.726648][ T3701] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 180.759547][ T3701] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz1] on syz1 [ 181.055445][ T29] audit: type=1400 audit(180.960:182): avc: denied { write } for pid=5730 comm="syz.0.977" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 185.135081][ T5796] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5796 comm=syz.1.1004 [ 186.944589][ T5873] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5873 comm=syz.0.1042 [ 187.839132][ T5912] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=5912 comm=syz.0.1059 [ 195.406959][ T29] audit: type=1400 audit(195.310:183): avc: denied { ioctl } for pid=6019 comm="syz.1.1112" path="socket:[9938]" dev="sockfs" ino=9938 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 196.074858][ T29] audit: type=1400 audit(195.980:184): avc: denied { shutdown } for pid=6037 comm="syz.1.1121" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 201.980547][ T29] audit: type=1400 audit(201.880:185): avc: denied { setopt } for pid=6124 comm="syz.0.1163" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 202.713089][ T29] audit: type=1400 audit(202.620:186): avc: denied { setopt } for pid=6151 comm="syz.0.1176" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 208.745091][ T29] audit: type=1400 audit(208.650:187): avc: denied { bind } for pid=6299 comm="syz.0.1248" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 208.751217][ T29] audit: type=1400 audit(208.660:188): avc: denied { write } for pid=6299 comm="syz.0.1248" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 208.853592][ T29] audit: type=1400 audit(208.760:189): avc: denied { getopt } for pid=6304 comm="syz.0.1251" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 210.604178][ T29] audit: type=1400 audit(210.510:190): avc: denied { setopt } for pid=6393 comm="syz.0.1295" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 210.656493][ T29] audit: type=1400 audit(210.560:191): avc: denied { read } for pid=6397 comm="syz.0.1297" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 210.736587][ T29] audit: type=1400 audit(210.640:192): avc: denied { read } for pid=6400 comm="syz.1.1298" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 210.738713][ T29] audit: type=1400 audit(210.640:193): avc: denied { open } for pid=6400 comm="syz.1.1298" path="/dev/binderfs/binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 210.747306][ T29] audit: type=1400 audit(210.650:194): avc: denied { ioctl } for pid=6400 comm="syz.1.1298" path="/dev/binderfs/binder-control" dev="binder" ino=2 ioctlcmd=0x6618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 213.523126][ T29] audit: type=1400 audit(213.430:195): avc: denied { getopt } for pid=6517 comm="syz.0.1355" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 221.136837][ T6716] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6716 comm=syz.1.1448 [ 229.583931][ T6799] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 247.814100][ T6996] netlink: 7784 bytes leftover after parsing attributes in process `syz.0.1589'. [ 248.290283][ T7014] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7014 comm=syz.0.1598 [ 248.875843][ T7044] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=7044 comm=syz.1.1609 [ 252.664243][ T7141] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7141 comm=syz.1.1656 [ 256.681918][ T4288] hid_parser_main: 199 callbacks suppressed [ 256.682262][ T4288] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 256.682588][ T4288] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 256.682864][ T4288] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 256.683139][ T4288] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 256.683425][ T4288] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 256.683728][ T4288] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 256.684007][ T4288] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 256.684401][ T4288] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 256.684841][ T4288] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 256.685152][ T4288] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 256.705060][ T4288] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz1] on syz1 [ 260.248793][ T29] audit: type=1804 audit(260.150:196): pid=7247 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz.1.1708" name="/newroot/851/file0" dev="tmpfs" ino=4357 res=1 errno=0 [ 260.804020][ T7273] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7273 comm=syz.1.1717 [ 262.202760][ T7319] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=7319 comm=syz.1.1742 [ 295.913873][ T7863] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=7863 comm=syz.1.2004 [ 300.166022][ T29] audit: type=1400 audit(300.070:197): avc: denied { connect } for pid=7982 comm="syz.0.2064" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 302.380780][ T29] audit: type=1400 audit(302.290:198): avc: denied { mount } for pid=8026 comm="syz.0.2085" name="/" dev="pstore" ino=1679 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:pstore_t tclass=filesystem permissive=1 [ 302.402779][ T29] audit: type=1400 audit(302.310:199): avc: denied { unmount } for pid=3095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:pstore_t tclass=filesystem permissive=1 [ 302.670358][ T8038] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=514 sclass=netlink_route_socket pid=8038 comm=syz.0.2089 [ 306.539968][ T29] audit: type=1400 audit(306.450:200): avc: denied { ioctl } for pid=8107 comm="syz.0.2121" path="socket:[17110]" dev="sockfs" ino=17110 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 308.243158][ T29] audit: type=1400 audit(308.150:201): avc: denied { getopt } for pid=8150 comm="syz.0.2139" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 309.223559][ T8178] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=514 sclass=netlink_route_socket pid=8178 comm=syz.1.2152 [ 315.437203][ T29] audit: type=1400 audit(315.340:202): avc: denied { nlmsg_write } for pid=8221 comm="syz.0.2173" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 316.504386][ T29] audit: type=1400 audit(316.410:203): avc: denied { map } for pid=8241 comm="syz.0.2183" path="/dev/nullb0" dev="devtmpfs" ino=654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 326.882331][ T29] audit: type=1400 audit(326.790:204): avc: denied { setopt } for pid=8448 comm="syz.1.2283" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 326.960246][ T8451] netlink: 'syz.1.2284': attribute type 29 has an invalid length. [ 326.960641][ T8451] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2284'. [ 327.297281][ T8459] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8459 comm=syz.1.2288 [ 329.388676][ T8480] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8480 comm=syz.0.2302 [ 332.485554][ T8603] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=8603 comm=syz.0.2359 [ 335.567796][ T8708] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=8708 comm=syz.1.2410 [ 337.131657][ T4226] hid_parser_main: 199 callbacks suppressed [ 337.133841][ T4226] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 337.134845][ T4226] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 337.137746][ T4226] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 337.140150][ T4226] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 337.143745][ T4226] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 337.144724][ T4226] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 337.146474][ T4226] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 337.147903][ T4226] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 337.150024][ T4226] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 337.152345][ T4226] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 337.180129][ T4226] hid-generic 0000:0000:0000.0003: hidraw0: HID v0.00 Device [syz1] on syz1 [ 337.807905][ T29] audit: type=1804 audit(337.710:205): pid=8812 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz.0.2456" name="/newroot/1239/file0" dev="tmpfs" ino=6349 res=1 errno=0 [ 338.646020][ T8849] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8849 comm=syz.0.2473 [ 343.185630][ T29] audit: type=1400 audit(343.090:206): avc: denied { lock } for pid=8919 comm="syz.0.2507" path="socket:[20524]" dev="sockfs" ino=20524 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 343.321863][ T8925] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8925 comm=syz.0.2514 [ 343.951253][ T8948] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8948 comm=syz.1.2521 [ 354.380592][ T29] audit: type=1400 audit(354.290:207): avc: denied { nlmsg_write } for pid=9240 comm="syz.1.2666" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 354.385954][ T9241] netlink: 48 bytes leftover after parsing attributes in process `syz.1.2666'. [ 354.402237][ T29] audit: type=1400 audit(354.310:208): avc: denied { read } for pid=9240 comm="syz.1.2666" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 354.599704][ T29] audit: type=1400 audit(354.510:209): avc: denied { read } for pid=9247 comm="syz.1.2669" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 380.579401][ T9796] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=9796 comm=syz.1.2928 [ 381.185016][ T29] audit: type=1400 audit(381.090:210): avc: denied { create } for pid=9818 comm="syz.0.2940" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 381.192706][ T29] audit: type=1400 audit(381.100:211): avc: denied { write } for pid=9818 comm="syz.0.2940" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 381.966987][ T29] audit: type=1400 audit(381.870:212): avc: denied { read } for pid=9841 comm="syz.1.2951" path="socket:[22173]" dev="sockfs" ino=22173 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 387.305374][ T29] audit: type=1400 audit(387.210:213): avc: denied { bind } for pid=9974 comm="syz.0.3017" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 391.615697][T10032] netlink: 'syz.0.3042': attribute type 29 has an invalid length. [ 391.617185][T10032] netlink: 8 bytes leftover after parsing attributes in process `syz.0.3042'. [ 392.584889][T10064] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10064 comm=syz.1.3061 [ 399.637487][T10240] SELinux: Context system_u:object_r:ssh_exec_t:s0 is not valid (left unmapped). [ 399.643093][ T29] audit: type=1400 audit(399.550:214): avc: denied { relabelto } for pid=10239 comm="syz.1.3146" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:ssh_exec_t:s0" [ 399.644108][ T29] audit: type=1400 audit(399.550:215): avc: denied { associate } for pid=10239 comm="syz.1.3146" name="/" dev="tmpfs" ino=1 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:ssh_exec_t:s0" [ 400.251146][ T29] audit: type=1400 audit(400.160:216): avc: denied { map } for pid=10263 comm="syz.1.3159" path="/dev/audio" dev="devtmpfs" ino=726 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 401.916304][T10313] 8021q: VLANs not supported on sit0 [ 404.224767][ T3701] hid_parser_main: 199 callbacks suppressed [ 404.226481][ T3701] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 404.227450][ T3701] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 404.229339][ T3701] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 404.230257][ T3701] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 404.231215][ T3701] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 404.232330][ T3701] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 404.233357][ T3701] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 404.234371][ T3701] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 404.235256][ T3701] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 404.236499][ T3701] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 404.254169][ T3701] hid-generic 0000:0000:0000.0004: hidraw0: HID v0.00 Device [syz1] on syz1 [ 419.475605][ T29] audit: type=1400 audit(419.380:217): avc: denied { map } for pid=10757 comm="syz.1.3395" path="socket:[25901]" dev="sockfs" ino=25901 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 419.577067][T10762] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=10762 comm=syz.1.3396 [ 420.125342][T10785] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=1545 sclass=netlink_tcpdiag_socket pid=10785 comm=syz.1.3407 [ 420.197203][ T29] audit: type=1400 audit(420.100:218): avc: denied { setopt } for pid=10786 comm="syz.0.3408" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 420.715110][ T29] audit: type=1400 audit(420.620:219): avc: denied { relabelfrom } for pid=10802 comm="syz.1.3416" name="NETLINK" dev="sockfs" ino=25980 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 420.722196][ T29] audit: type=1400 audit(420.630:220): avc: denied { relabelto } for pid=10802 comm="syz.1.3416" name="NETLINK" dev="sockfs" ino=25980 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=netlink_netfilter_socket permissive=1 [ 420.896809][T10806] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=10806 comm=syz.0.3412 [ 421.423539][ T29] audit: type=1400 audit(421.330:221): avc: denied { create } for pid=10819 comm="syz.1.3424" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 421.454655][ T29] audit: type=1400 audit(421.360:222): avc: denied { write } for pid=10819 comm="syz.1.3424" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 421.566909][ T29] audit: type=1400 audit(421.470:223): avc: denied { bind } for pid=10825 comm="syz.0.3427" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 421.984934][ T29] audit: type=1400 audit(421.890:224): avc: denied { mount } for pid=10841 comm="syz.0.3435" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 421.993027][ T29] audit: type=1400 audit(421.900:225): avc: denied { remount } for pid=10841 comm="syz.0.3435" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 422.006156][ T29] audit: type=1400 audit(421.910:226): avc: denied { unmount } for pid=3095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 424.030815][T10926] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=10926 comm=syz.0.3476 [ 428.183487][T11012] netlink: 48 bytes leftover after parsing attributes in process `syz.0.3518'. [ 433.612411][T11123] netlink: 'syz.1.3573': attribute type 29 has an invalid length. [ 433.620666][T11123] netlink: 8 bytes leftover after parsing attributes in process `syz.1.3573'. [ 438.309882][T11192] syz.0.3606 uses obsolete (PF_INET,SOCK_PACKET) [ 438.316786][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 438.321624][ T29] audit: type=1400 audit(438.220:230): avc: denied { write } for pid=11190 comm="syz.0.3606" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 441.528548][ C1] hrtimer: interrupt took 455984 ns [ 442.905966][ T29] audit: type=1400 audit(442.810:231): avc: denied { listen } for pid=11231 comm="syz.1.3625" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 464.483564][ T29] audit: type=1400 audit(464.390:232): avc: denied { audit_write } for pid=11777 comm="syz.0.3889" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 466.494408][ T29] audit: type=1400 audit(466.400:233): avc: denied { bind } for pid=11847 comm="syz.1.3923" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 467.476554][ T29] audit: type=1400 audit(467.380:234): avc: denied { mount } for pid=11887 comm="syz.0.3943" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 467.494026][ T29] audit: type=1400 audit(467.400:235): avc: denied { unmount } for pid=3095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 470.525857][ T29] audit: type=1400 audit(470.430:236): avc: denied { connect } for pid=11913 comm="syz.1.3956" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 474.611396][ T29] audit: type=1400 audit(474.520:237): avc: denied { map } for pid=12034 comm="syz.0.4015" path="pipe:[30211]" dev="pipefs" ino=30211 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 474.612816][ T29] audit: type=1400 audit(474.520:238): avc: denied { execute } for pid=12034 comm="syz.0.4015" path="pipe:[30211]" dev="pipefs" ino=30211 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 477.710342][ T29] audit: type=1400 audit(477.620:239): avc: denied { ioctl } for pid=12081 comm="syz.1.4038" path="socket:[30268]" dev="sockfs" ino=30268 ioctlcmd=0x8902 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 488.654841][T12368] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=1545 sclass=netlink_tcpdiag_socket pid=12368 comm=syz.0.4177 [ 489.033449][T12380] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=12380 comm=syz.0.4183 [ 491.922951][T12450] 8021q: VLANs not supported on sit0 [ 502.532550][ T29] audit: type=1400 audit(502.440:240): avc: denied { setopt } for pid=12641 comm="syz.1.4312" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 504.920317][ T29] audit: type=1400 audit(504.830:241): avc: denied { lock } for pid=12707 comm="syz.0.4342" path="socket:[32407]" dev="sockfs" ino=32407 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 505.161398][ T29] audit: type=1400 audit(505.070:242): avc: denied { ioctl } for pid=12716 comm="syz.0.4348" path="socket:[32428]" dev="sockfs" ino=32428 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 518.036156][T12957] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1545 sclass=netlink_route_socket pid=12957 comm=syz.0.4462 [ 519.510972][ T29] audit: type=1400 audit(519.420:243): avc: denied { unlink } for pid=3095 comm="syz-executor" name="file5" dev="tmpfs" ino=11360 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 526.693520][T13144] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=13144 comm=syz.0.4551 [ 527.088875][T13152] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=13152 comm=syz.0.4555 [ 541.708928][ T29] audit: type=1400 audit(541.610:244): avc: denied { ioctl } for pid=13272 comm="syz.1.4614" path="socket:[34461]" dev="sockfs" ino=34461 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 544.302791][ T4421] hid_parser_main: 199 callbacks suppressed [ 544.304959][ T4421] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 544.305478][ T4421] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 544.305758][ T4421] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 544.305875][ T4421] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 544.305968][ T4421] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 544.306076][ T4421] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 544.306172][ T4421] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 544.306266][ T4421] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 544.306374][ T4421] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 544.306465][ T4421] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 544.380363][ T4421] hid-generic 0000:0000:0000.0005: hidraw0: HID v0.00 Device [syz0] on syz0 [ 549.394125][ T29] audit: type=1400 audit(549.300:245): avc: denied { setopt } for pid=13470 comm="syz.1.4708" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 549.399128][ T29] audit: type=1400 audit(549.300:246): avc: denied { connect } for pid=13470 comm="syz.1.4708" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 549.679577][ T29] audit: type=1400 audit(549.590:247): avc: denied { bind } for pid=13484 comm="syz.0.4714" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 550.477071][ T29] audit: type=1400 audit(550.380:248): avc: denied { audit_read } for pid=13519 comm="syz.0.4731" capability=37 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 551.911227][ T29] audit: type=1400 audit(551.820:249): avc: denied { lock } for pid=13574 comm="syz.0.4759" path="socket:[36034]" dev="sockfs" ino=36034 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 554.032214][T13652] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=13652 comm=syz.1.4797 [ 559.387776][T13778] comedi: valid board names for 8255 driver are: [ 559.389843][T13778] 8255 [ 559.392499][T13778] comedi: valid board names for vmk80xx driver are: [ 559.394801][T13778] vmk80xx [ 559.396226][T13778] comedi: valid board names for usbduxsigma driver are: [ 559.397707][T13778] usbduxsigma [ 559.399486][T13778] comedi: valid board names for usbduxfast driver are: [ 559.401217][T13778] usbduxfast [ 559.402608][T13778] comedi: valid board names for usbdux driver are: [ 559.404078][T13778] usbdux [ 559.406345][T13778] comedi: valid board names for ni6501 driver are: [ 559.407862][T13778] ni6501 [ 559.409270][T13778] comedi: valid board names for dt9812 driver are: [ 559.410934][T13778] dt9812 [ 559.411705][T13778] comedi: valid board names for ni_labpc_cs driver are: [ 559.413377][T13778] ni_labpc_cs [ 559.414029][T13778] comedi: valid board names for ni_daq_700 driver are: [ 559.414843][T13778] ni_daq_700 [ 559.416736][T13778] comedi: valid board names for labpc_pci driver are: [ 559.420102][T13778] labpc_pci [ 559.421338][T13778] comedi: valid board names for adl_pci9118 driver are: [ 559.422144][T13778] pci9118dg [ 559.422758][T13778] pci9118hg [ 559.424969][T13778] pci9118hr [ 559.425659][T13778] comedi: valid board names for 8255_pci driver are: [ 559.426415][T13778] 8255_pci [ 559.426993][T13778] comedi: valid board names for comedi_parport driver are: [ 559.427853][T13778] comedi_parport [ 559.429699][T13778] comedi: valid board names for comedi_test driver are: [ 559.433348][T13778] comedi_test [ 559.434192][T13778] comedi: valid board names for comedi_bond driver are: [ 559.435185][T13778] comedi_bond [ 560.717718][ T29] audit: type=1400 audit(560.620:250): avc: denied { nlmsg_tty_audit } for pid=13811 comm="syz.0.4874" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 564.424003][T13879] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=13879 comm=syz.1.4906 [ 564.736626][ T29] audit: type=1400 audit(564.640:251): avc: denied { sqpoll } for pid=13891 comm="syz.0.4913" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 568.995700][T13965] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=1538 sclass=netlink_tcpdiag_socket pid=13965 comm=syz.1.4949 [ 990.288678][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 430s! [swapper/0:0] [ 990.288932][ C0] Modules linked in: [ 990.290010][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G L syzkaller #0 PREEMPT [ 990.290274][ C0] Tainted: [L]=SOFTLOCKUP [ 990.290338][ C0] Hardware name: ARM-Versatile Express [ 990.290553][ C0] PC is at _raw_spin_unlock_irq+0x28/0x54 [ 990.291261][ C0] LR is at tmigr_handle_remote_up+0x180/0x4b0 [ 990.291337][ C0] pc : [<81abb2fc>] lr : [<80346d0c>] psr: 60000113 [ 990.291385][ C0] sp : 82801be0 ip : 82801bf0 fp : 82801bec [ 990.291424][ C0] r10: 00000001 r9 : 8280c9a4 r8 : 00000001 [ 990.291466][ C0] r7 : ddddb4a0 r6 : 82801cb8 r5 : 830bf3b0 r4 : 830bf380 [ 990.291512][ C0] r3 : 00008d5e r2 : ffffffff r1 : 00000000 r0 : 830bf380 [ 990.291630][ C0] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 990.291701][ C0] Control: 30c5387d Table: 85122240 DAC: fffffffd [ 990.291808][ C0] Call trace: [ 990.292063][ C0] [<81abb2d4>] (_raw_spin_unlock_irq) from [<80346d0c>] (tmigr_handle_remote_up+0x180/0x4b0) [ 990.292420][ C0] [<80346b8c>] (tmigr_handle_remote_up) from [<803450a4>] (__walk_groups_from+0x3c/0xe4) [ 990.292548][ C0] r10:8281b500 r9:8280c820 r8:80346b8c r7:82801cb8 r6:830bf380 r5:00000002 [ 990.292602][ C0] r4:830bf380 [ 990.292627][ C0] [<80345068>] (__walk_groups_from) from [<8034743c>] (tmigr_handle_remote+0xe8/0x108) [ 990.292711][ C0] r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 r4:dddc7488 [ 990.292732][ C0] [<80347354>] (tmigr_handle_remote) from [<80327600>] (run_timer_softirq+0x30/0x34) [ 990.292801][ C0] r4:82804084 [ 990.292822][ C0] [<803275d0>] (run_timer_softirq) from [<8025b55c>] (handle_softirqs+0x140/0x458) [ 990.292885][ C0] [<8025b41c>] (handle_softirqs) from [<8025b9d0>] (__irq_exit_rcu+0x110/0x1d0) [ 990.292961][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:82801dd8 r6:82443ee0 r5:8247f014 [ 990.292985][ C0] r4:8281b500 [ 990.293002][ C0] [<8025b8c0>] (__irq_exit_rcu) from [<8025bd48>] (irq_exit+0x10/0x18) [ 990.293062][ C0] r5:8247f014 r4:826c3a9c [ 990.293080][ C0] [<8025bd38>] (irq_exit) from [<81aacf24>] (generic_handle_arch_irq+0x7c/0x80) [ 990.293175][ C0] [<81aacea8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 990.293311][ C0] Exception stack(0x82801dd8 to 0x82801e20) [ 990.293514][ C0] 1dc0: 00000001 00000000 [ 990.293576][ C0] 1de0: 0000a742 0000a740 8414ad68 00000004 00000001 8414ad68 83f25e88 8414ac40 [ 990.293615][ C0] 1e00: 00000000 82801e3c 82801e28 82801e28 81abb48c 81abb4b4 80000013 ffffffff [ 990.293689][ C0] r9:8281b500 r8:83f25e88 r7:82801e0c r6:ffffffff r5:80000013 r4:81abb4b4 [ 990.293713][ C0] [<81abb474>] (_raw_spin_lock) from [<809c74b8>] (gpio_mmio_set+0x44/0x80) [ 990.293784][ C0] r5:00000004 r4:8414ac40 [ 990.293802][ C0] [<809c7474>] (gpio_mmio_set) from [<809b7c74>] (gpiochip_set+0x1c/0x44) [ 990.293872][ C0] r7:00000001 r6:00000000 r5:00000002 r4:841d6628 [ 990.293893][ C0] [<809b7c58>] (gpiochip_set) from [<809ba53c>] (gpiod_set_raw_value_commit+0x78/0x218) [ 990.293946][ C0] [<809ba4c4>] (gpiod_set_raw_value_commit) from [<809bbddc>] (gpiod_set_value_nocheck+0x44/0x58) [ 990.294011][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:839004d8 r5:00000001 [ 990.294030][ C0] r4:841d6628 [ 990.294046][ C0] [<809bbd98>] (gpiod_set_value_nocheck) from [<809bbe2c>] (gpiod_set_value+0x3c/0x88) [ 990.294094][ C0] [<809bbdf0>] (gpiod_set_value) from [<809cc5c8>] (gpio_led_set+0x5c/0x60) [ 990.294148][ C0] r5:000000ff r4:844e1224 [ 990.294165][ C0] [<809cc56c>] (gpio_led_set) from [<809c9ef0>] (led_set_brightness+0x84/0x90) [ 990.294221][ C0] r5:000000ff r4:844e1224 [ 990.294239][ C0] [<809c9e6c>] (led_set_brightness) from [<809cba70>] (led_trigger_event+0x40/0x58) [ 990.294296][ C0] r5:000000ff r4:844e1224 [ 990.294312][ C0] [<809cba30>] (led_trigger_event) from [<809cd0cc>] (ledtrig_cpu+0xac/0xf4) [ 990.294391][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 990.294411][ C0] [<809cd020>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 990.294476][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 990.294496][ C0] [<80227a24>] (arch_cpu_idle_exit) from [<802b158c>] (do_idle+0x5c/0x2d8) [ 990.294560][ C0] [<802b1530>] (do_idle) from [<802b1b38>] (cpu_startup_entry+0x30/0x34) [ 990.294636][ C0] r10:8281aff4 r9:8280c680 r8:823beae8 r7:00000000 r6:deffc06c r5:828222e8 [ 990.294659][ C0] r4:000000ed [ 990.294674][ C0] [<802b1b08>] (cpu_startup_entry) from [<81aae93c>] (kernel_init+0x0/0x138) [ 990.294747][ C0] [<81aae85c>] (rest_init) from [<8260145c>] (start_kernel+0x844/0x860) [ 990.294855][ C0] [<82600c18>] (start_kernel) from [<00000000>] (0x0) [ 990.295552][ C0] Sending NMI from CPU 0 to CPUs 1: [ 990.296233][ C1] NMI backtrace for cpu 1 [ 990.296449][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G L syzkaller #0 PREEMPT [ 990.296513][ C1] Tainted: [L]=SOFTLOCKUP [ 990.296535][ C1] Hardware name: ARM-Versatile Express [ 990.296556][ C1] PC is at _raw_spin_lock+0x40/0x58 [ 990.296628][ C1] LR is at _raw_spin_lock+0x18/0x58 [ 990.296659][ C1] pc : [<81abb4b4>] lr : [<81abb48c>] psr: 80000113 [ 990.296682][ C1] sp : df805d68 ip : df805d68 fp : df805d7c [ 990.296702][ C1] r10: 81c05450 r9 : 8414ac40 r8 : 83f25e88 [ 990.296732][ C1] r7 : 8414ad68 r6 : 00000001 r5 : 00000001 r4 : 8414ad68 [ 990.296754][ C1] r3 : 0000a740 r2 : 0000a741 r1 : 00000000 r0 : 00000001 [ 990.296779][ C1] Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 990.296812][ C1] Control: 30c5387d Table: 85ef4e80 DAC: 00000000 [ 990.296830][ C1] Call trace: frame pointer underflow [ 990.296913][ C1] [<81abb474>] (_raw_spin_lock) from [<809c74b8>] (gpio_mmio_set+0x44/0x80) [ 990.296989][ C1] r5:00000001 r4:8414ac40 [ 990.297006][ C1] [<809c7474>] (gpio_mmio_set) from [<809b7c74>] (gpiochip_set+0x1c/0x44) [ 990.297072][ C1] r7:00000001 r6:00000000 r5:00000000 r4:841d6600 [ 990.297088][ C1] [<809b7c58>] (gpiochip_set) from [<809ba53c>] (gpiod_set_raw_value_commit+0x78/0x218) [ 990.297164][ C1] [<809ba4c4>] (gpiod_set_raw_value_commit) from [<809bbddc>] (gpiod_set_value_nocheck+0x44/0x58) [ 990.297229][ C1] r10:81c05450 r9:df805ebc r8:00000102 r7:0000697e r6:00000007 r5:00000001 [ 990.297249][ C1] r4:841d6600 [ 990.297264][ C1] [<809bbd98>] (gpiod_set_value_nocheck) from [<809bbe2c>] (gpiod_set_value+0x3c/0x88) [ 990.297312][ C1] [<809bbdf0>] (gpiod_set_value) from [<809cc5c8>] (gpio_led_set+0x5c/0x60) [ 990.297360][ C1] r5:844e1044 r4:844e1044 [ 990.297375][ C1] [<809cc56c>] (gpio_led_set) from [<809c9e60>] (led_set_brightness_nosleep+0x38/0x44) [ 990.297426][ C1] r5:844e1044 r4:8382958c [ 990.297441][ C1] [<809c9e28>] (led_set_brightness_nosleep) from [<809ccec4>] (led_heartbeat_function+0x84/0x144) [ 990.297488][ C1] [<809cce40>] (led_heartbeat_function) from [<80326f70>] (call_timer_fn+0x30/0x220) [ 990.297558][ C1] r7:0000697e r6:809cce40 r5:8382958c r4:83216000 [ 990.297575][ C1] [<80326f40>] (call_timer_fn) from [<80327424>] (__run_timers+0x2c4/0x3f8) [ 990.297638][ C1] r9:df805ebc r8:0000697e r7:00000000 r6:809cce40 r5:dddd9f00 r4:8382958c [ 990.297656][ C1] [<80327160>] (__run_timers) from [<803275c0>] (run_timer_base+0x68/0x78) [ 990.297719][ C1] r10:83216000 r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 [ 990.297736][ C1] r4:dddd9f00 [ 990.297751][ C1] [<80327558>] (run_timer_base) from [<803275ec>] (run_timer_softirq+0x1c/0x34) [ 990.297802][ C1] r4:82804084 [ 990.297816][ C1] [<803275d0>] (run_timer_softirq) from [<8025b55c>] (handle_softirqs+0x140/0x458) [ 990.297881][ C1] [<8025b41c>] (handle_softirqs) from [<8025b9d0>] (__irq_exit_rcu+0x110/0x1d0) [ 990.297946][ C1] r10:00000000 r9:83216000 r8:00000000 r7:df865e08 r6:82443ee0 r5:8247f014 [ 990.297963][ C1] r4:83216000 [ 990.297978][ C1] [<8025b8c0>] (__irq_exit_rcu) from [<8025bd48>] (irq_exit+0x10/0x18) [ 990.298032][ C1] r5:8247f014 r4:826c3a9c [ 990.298045][ C1] [<8025bd38>] (irq_exit) from [<81aacf24>] (generic_handle_arch_irq+0x7c/0x80) [ 990.298129][ C1] [<81aacea8>] (generic_handle_arch_irq) from [<81a7cec4>] (call_with_stack+0x1c/0x20) [ 990.298197][ C1] r9:83216000 r8:83f25e88 r7:df865e3c r6:ffffffff r5:60000013 r4:809c7cb8 [ 990.298214][ C1] [<81a7cea8>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc) [ 990.298263][ C1] Exception stack(0xdf865e08 to 0xdf865e50) [ 990.298302][ C1] 5e00: e01ae008 00000008 0000a740 00000000 e01ae008 00000008 [ 990.298335][ C1] 5e20: 00000001 8414ad68 83f25e88 8414ac40 00000000 df865e6c df865e58 df865e58 [ 990.298360][ C1] 5e40: 809c7cb4 809c7cb8 60000013 ffffffff [ 990.298378][ C1] [<809c7c98>] (gpio_mmio_write32) from [<809c74d8>] (gpio_mmio_set+0x64/0x80) [ 990.298437][ C1] r5:00000008 r4:8414ac40 [ 990.298452][ C1] [<809c7474>] (gpio_mmio_set) from [<809b7c74>] (gpiochip_set+0x1c/0x44) [ 990.298517][ C1] r7:00000001 r6:00000000 r5:00000003 r4:841d663c [ 990.298542][ C1] [<809b7c58>] (gpiochip_set) from [<809ba53c>] (gpiod_set_raw_value_commit+0x78/0x218) [ 990.298594][ C1] [<809ba4c4>] (gpiod_set_raw_value_commit) from [<809bbddc>] (gpiod_set_value_nocheck+0x44/0x58) [ 990.298653][ C1] r10:00000000 r9:00000000 r8:00000001 r7:ddde24c0 r6:83900518 r5:00000001 [ 990.298671][ C1] r4:841d663c [ 990.298684][ C1] [<809bbd98>] (gpiod_set_value_nocheck) from [<809bbe2c>] (gpiod_set_value+0x3c/0x88) [ 990.298727][ C1] [<809bbdf0>] (gpiod_set_value) from [<809cc5c8>] (gpio_led_set+0x5c/0x60) [ 990.298776][ C1] r5:000000ff r4:844e1314 [ 990.298791][ C1] [<809cc56c>] (gpio_led_set) from [<809c9ef0>] (led_set_brightness+0x84/0x90) [ 990.298840][ C1] r5:000000ff r4:844e1314 [ 990.298853][ C1] [<809c9e6c>] (led_set_brightness) from [<809cba70>] (led_trigger_event+0x40/0x58) [ 990.298900][ C1] r5:000000ff r4:844e1314 [ 990.298916][ C1] [<809cba30>] (led_trigger_event) from [<809cd0cc>] (ledtrig_cpu+0xac/0xf4) [ 990.298970][ C1] r7:ddde24c0 r6:00000002 r5:82b15cd8 r4:000000fe [ 990.298985][ C1] [<809cd020>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 990.299048][ C1] r9:00000000 r8:00000001 r7:8280c710 r6:83216000 r5:8280c6d0 r4:00000001 [ 990.299064][ C1] [<80227a24>] (arch_cpu_idle_exit) from [<802b158c>] (do_idle+0x5c/0x2d8) [ 990.299119][ C1] [<802b1530>] (do_idle) from [<802b1b38>] (cpu_startup_entry+0x30/0x34) [ 990.299184][ C1] r10:00000000 r9:414fc0f0 r8:80003000 r7:82a7b4a4 r6:83216000 r5:00000001 [ 990.299201][ C1] r4:00000092 [ 990.299216][ C1] [<802b1b08>] (cpu_startup_entry) from [<8022f360>] (secondary_start_kernel+0x128/0x194) [ 990.299273][ C1] [<8022f238>] (secondary_start_kernel) from [<80220094>] (__enable_mmu+0x0/0xc) [ 990.299340][ C1] r7:82a7b4a4 r6:30c0387d r5:00000000 r4:830b7bc0 [ 990.300674][ C0] Kernel panic - not syncing: softlockup: hung tasks [ 990.334075][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G L syzkaller #0 PREEMPT [ 990.334490][ C0] Tainted: [L]=SOFTLOCKUP [ 990.334678][ C0] Hardware name: ARM-Versatile Express [ 990.334923][ C0] Call trace: [ 990.335203][ C0] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 990.335581][ C0] r7:82296534 r6:8281b500 r5:00000000 r4:822956e4 [ 990.335827][ C0] [<80201b58>] (show_stack) from [<8021ee08>] (dump_stack_lvl+0x54/0x7c) [ 990.336161][ C0] [<8021edb4>] (dump_stack_lvl) from [<8021ee48>] (dump_stack+0x18/0x1c) [ 990.336537][ C0] r5:00000000 r4:82a7bd14 [ 990.336719][ C0] [<8021ee30>] (dump_stack) from [<80202648>] (vpanic+0xe0/0x2e8) [ 990.337042][ C0] [<80202568>] (vpanic) from [<80202884>] (trace_suspend_resume+0x0/0xd8) [ 990.337430][ C0] r7:82ac27f8 [ 990.337584][ C0] [<80202850>] (panic) from [<80383f14>] (watchdog_timer_fn+0x2dc/0x350) [ 990.337938][ C0] r3:00000001 r2:00004000 r1:82a7bd1c r0:82296534 [ 990.338211][ C0] [<80383c38>] (watchdog_timer_fn) from [<80329b64>] (__hrtimer_run_queues+0x1c4/0x454) [ 990.338597][ C0] r10:8281b500 r9:00000000 r8:dddc7130 r7:80383c38 r6:dddc7000 r5:dddc7040 [ 990.338962][ C0] r4:dddc75d8 [ 990.339120][ C0] [<803299a0>] (__hrtimer_run_queues) from [<8032b168>] (hrtimer_interrupt+0x148/0x2bc) [ 990.339520][ C0] r10:8c87f160 r9:dddc7180 r8:dddc7130 r7:000000e6 r6:00000003 r5:20000193 [ 990.339815][ C0] r4:dddc7000 [ 990.339968][ C0] [<8032b020>] (hrtimer_interrupt) from [<8133fea0>] (arch_timer_handler_virt+0x30/0x38) [ 990.340384][ C0] r10:81d0fc78 r9:8309e400 r8:00000000 r7:00000000 r6:00000000 r5:82498528 [ 990.340668][ C0] r4:8309de40 [ 990.340819][ C0] [<8133fe70>] (arch_timer_handler_virt) from [<802ef9b4>] (handle_percpu_devid_irq+0x128/0x34c) [ 990.341233][ C0] [<802ef88c>] (handle_percpu_devid_irq) from [<802e8b44>] (handle_irq_desc+0x74/0x84) [ 990.341638][ C0] r10:00000001 r9:8281b500 r8:00000000 r7:df80a00c r6:826c2388 r5:df80a000 [ 990.341935][ C0] r4:8280cc44 [ 990.342076][ C0] [<802e8ad0>] (handle_irq_desc) from [<802e8bc0>] (generic_handle_domain_irq+0x18/0x1c) [ 990.342463][ C0] [<802e8ba8>] (generic_handle_domain_irq) from [<802012c8>] (gic_handle_irq+0x68/0x7c) [ 990.342839][ C0] [<80201260>] (gic_handle_irq) from [<81aacf08>] (generic_handle_arch_irq+0x60/0x80) [ 990.343209][ C0] r7:82801b90 r6:82443ee0 r5:8247f014 r4:826c3a9c [ 990.343460][ C0] [<81aacea8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 990.343827][ C0] Exception stack(0x82801b90 to 0x82801bd8) [ 990.344081][ C0] 1b80: 830bf380 00000000 ffffffff 00008d5e [ 990.344411][ C0] 1ba0: 830bf380 830bf3b0 82801cb8 ddddb4a0 00000001 8280c9a4 00000001 82801bec [ 990.344723][ C0] 1bc0: 82801bf0 82801be0 80346d0c 81abb2fc 60000113 ffffffff [ 990.344986][ C0] r9:8281b500 r8:00000001 r7:82801bc4 r6:ffffffff r5:60000113 r4:81abb2fc [ 990.345290][ C0] [<81abb2d4>] (_raw_spin_unlock_irq) from [<80346d0c>] (tmigr_handle_remote_up+0x180/0x4b0) [ 990.345687][ C0] [<80346b8c>] (tmigr_handle_remote_up) from [<803450a4>] (__walk_groups_from+0x3c/0xe4) [ 990.346073][ C0] r10:8281b500 r9:8280c820 r8:80346b8c r7:82801cb8 r6:830bf380 r5:00000002 [ 990.346363][ C0] r4:830bf380 [ 990.346513][ C0] [<80345068>] (__walk_groups_from) from [<8034743c>] (tmigr_handle_remote+0xe8/0x108) [ 990.346897][ C0] r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 r4:dddc7488 [ 990.347173][ C0] [<80347354>] (tmigr_handle_remote) from [<80327600>] (run_timer_softirq+0x30/0x34) [ 990.347552][ C0] r4:82804084 [ 990.347708][ C0] [<803275d0>] (run_timer_softirq) from [<8025b55c>] (handle_softirqs+0x140/0x458) [ 990.348061][ C0] [<8025b41c>] (handle_softirqs) from [<8025b9d0>] (__irq_exit_rcu+0x110/0x1d0) [ 990.348420][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:82801dd8 r6:82443ee0 r5:8247f014 [ 990.348707][ C0] r4:8281b500 [ 990.348855][ C0] [<8025b8c0>] (__irq_exit_rcu) from [<8025bd48>] (irq_exit+0x10/0x18) [ 990.349210][ C0] r5:8247f014 r4:826c3a9c [ 990.349398][ C0] [<8025bd38>] (irq_exit) from [<81aacf24>] (generic_handle_arch_irq+0x7c/0x80) [ 990.349744][ C0] [<81aacea8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 990.350072][ C0] Exception stack(0x82801dd8 to 0x82801e20) [ 990.350303][ C0] 1dc0: 00000001 00000000 [ 990.351010][ C0] 1de0: 0000a742 0000a740 8414ad68 00000004 00000001 8414ad68 83f25e88 8414ac40 [ 990.351384][ C0] 1e00: 00000000 82801e3c 82801e28 82801e28 81abb48c 81abb4b4 80000013 ffffffff [ 990.352086][ C0] r9:8281b500 r8:83f25e88 r7:82801e0c r6:ffffffff r5:80000013 r4:81abb4b4 [ 990.352577][ C0] [<81abb474>] (_raw_spin_lock) from [<809c74b8>] (gpio_mmio_set+0x44/0x80) [ 990.353104][ C0] r5:00000004 r4:8414ac40 [ 990.353343][ C0] [<809c7474>] (gpio_mmio_set) from [<809b7c74>] (gpiochip_set+0x1c/0x44) [ 990.353720][ C0] r7:00000001 r6:00000000 r5:00000002 r4:841d6628 [ 990.353980][ C0] [<809b7c58>] (gpiochip_set) from [<809ba53c>] (gpiod_set_raw_value_commit+0x78/0x218) [ 990.354420][ C0] [<809ba4c4>] (gpiod_set_raw_value_commit) from [<809bbddc>] (gpiod_set_value_nocheck+0x44/0x58) [ 990.354848][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:839004d8 r5:00000001 [ 990.355201][ C0] r4:841d6628 [ 990.355377][ C0] [<809bbd98>] (gpiod_set_value_nocheck) from [<809bbe2c>] (gpiod_set_value+0x3c/0x88) [ 990.355773][ C0] [<809bbdf0>] (gpiod_set_value) from [<809cc5c8>] (gpio_led_set+0x5c/0x60) [ 990.356155][ C0] r5:000000ff r4:844e1224 [ 990.356358][ C0] [<809cc56c>] (gpio_led_set) from [<809c9ef0>] (led_set_brightness+0x84/0x90) [ 990.356730][ C0] r5:000000ff r4:844e1224 [ 990.356917][ C0] [<809c9e6c>] (led_set_brightness) from [<809cba70>] (led_trigger_event+0x40/0x58) [ 990.357331][ C0] r5:000000ff r4:844e1224 [ 990.357519][ C0] [<809cba30>] (led_trigger_event) from [<809cd0cc>] (ledtrig_cpu+0xac/0xf4) [ 990.357888][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 990.358159][ C0] [<809cd020>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 990.358528][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 990.358810][ C0] [<80227a24>] (arch_cpu_idle_exit) from [<802b158c>] (do_idle+0x5c/0x2d8) [ 990.359154][ C0] [<802b1530>] (do_idle) from [<802b1b38>] (cpu_startup_entry+0x30/0x34) [ 990.359522][ C0] r10:8281aff4 r9:8280c680 r8:823beae8 r7:00000000 r6:deffc06c r5:828222e8 [ 990.359829][ C0] r4:000000ed [ 990.359977][ C0] [<802b1b08>] (cpu_startup_entry) from [<81aae93c>] (kernel_init+0x0/0x138) [ 990.360355][ C0] [<81aae85c>] (rest_init) from [<8260145c>] (start_kernel+0x844/0x860) [ 990.360704][ C0] [<82600c18>] (start_kernel) from [<00000000>] (0x0) [ 990.363383][ C0] Rebooting in 86400 seconds..