syzkaller syzkaller login: [ 18.001470][ T24] kauditd_printk_skb: 31 callbacks suppressed [ 18.001482][ T24] audit: type=1400 audit(1771794124.590:59): avc: denied { transition } for pid=231 comm="sshd-session" path="/bin/sh" dev="sda1" ino=90 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 18.013528][ T24] audit: type=1400 audit(1771794124.590:60): avc: denied { noatsecure } for pid=231 comm="sshd-session" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 18.021608][ T24] audit: type=1400 audit(1771794124.600:61): avc: denied { write } for pid=231 comm="sh" path="pipe:[14364]" dev="pipefs" ino=14364 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 18.043978][ T24] audit: type=1400 audit(1771794124.600:62): avc: denied { rlimitinh } for pid=231 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 18.063543][ T24] audit: type=1400 audit(1771794124.600:63): avc: denied { siginh } for pid=231 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.1.190' (ED25519) to the list of known hosts. 2026/02/22 21:05:15 parsed 1 programs [ 209.353751][ T24] audit: type=1400 audit(1771794315.940:64): avc: denied { node_bind } for pid=275 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 209.375060][ T24] audit: type=1400 audit(1771794315.940:65): avc: denied { create } for pid=275 comm="syz-execprog" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 209.394904][ T24] audit: type=1400 audit(1771794315.940:66): avc: denied { module_request } for pid=275 comm="syz-execprog" kmod="net-pf-2-proto-262-type-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 210.295030][ T24] audit: type=1400 audit(1771794316.880:67): avc: denied { mounton } for pid=281 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 210.298714][ T281] cgroup: Unknown subsys name 'net' [ 210.318237][ T24] audit: type=1400 audit(1771794316.880:68): avc: denied { mount } for pid=281 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 210.346444][ T24] audit: type=1400 audit(1771794316.910:69): avc: denied { unmount } for pid=281 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 210.347627][ T281] cgroup: Unknown subsys name 'devices' [ 210.548668][ T281] cgroup: Unknown subsys name 'hugetlb' [ 210.554321][ T281] cgroup: Unknown subsys name 'rlimit' [ 210.764299][ T24] audit: type=1400 audit(1771794317.350:70): avc: denied { setattr } for pid=281 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 210.787694][ T24] audit: type=1400 audit(1771794317.350:71): avc: denied { create } for pid=281 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 210.808119][ T24] audit: type=1400 audit(1771794317.350:72): avc: denied { write } for pid=281 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 210.828541][ T24] audit: type=1400 audit(1771794317.350:73): avc: denied { read } for pid=281 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 210.845948][ T285] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 210.880072][ T281] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 211.310766][ T288] request_module fs-gadgetfs succeeded, but still no fs? [ 211.322209][ T288] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 211.548972][ T301] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.556030][ T301] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.563657][ T301] device bridge_slave_0 entered promiscuous mode [ 211.571392][ T301] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.578451][ T301] bridge0: port 2(bridge_slave_1) entered disabled state [ 211.585856][ T301] device bridge_slave_1 entered promiscuous mode [ 211.624982][ T301] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.632071][ T301] bridge0: port 2(bridge_slave_1) entered forwarding state [ 211.639575][ T301] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.646645][ T301] bridge0: port 1(bridge_slave_0) entered forwarding state [ 211.665719][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 211.673947][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.681506][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 211.691624][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 211.699894][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.706978][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 211.715611][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 211.724022][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.731220][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 211.743834][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 211.753155][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 211.766532][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 211.779313][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 211.787811][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 211.795440][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 211.803726][ T301] device veth0_vlan entered promiscuous mode [ 211.814240][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 211.824227][ T301] device veth1_macvtap entered promiscuous mode [ 211.833201][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 211.844303][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 2026/02/22 21:05:19 executed programs: 0 [ 212.589125][ T352] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.596537][ T352] bridge0: port 1(bridge_slave_0) entered disabled state [ 212.604137][ T352] device bridge_slave_0 entered promiscuous mode [ 212.612110][ T352] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.619237][ T352] bridge0: port 2(bridge_slave_1) entered disabled state [ 212.626791][ T352] device bridge_slave_1 entered promiscuous mode [ 212.671645][ T352] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.678724][ T352] bridge0: port 2(bridge_slave_1) entered forwarding state [ 212.686087][ T352] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.693340][ T352] bridge0: port 1(bridge_slave_0) entered forwarding state [ 212.714834][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 212.722488][ T306] bridge0: port 1(bridge_slave_0) entered disabled state [ 212.730235][ T306] bridge0: port 2(bridge_slave_1) entered disabled state [ 212.738827][ T9] device bridge_slave_1 left promiscuous mode [ 212.745060][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 212.752676][ T9] device bridge_slave_0 left promiscuous mode [ 212.759002][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 212.767454][ T9] device veth1_macvtap left promiscuous mode [ 212.773484][ T9] device veth0_vlan left promiscuous mode [ 212.882212][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 212.890476][ T306] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.897585][ T306] bridge0: port 1(bridge_slave_0) entered forwarding state [ 212.906322][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 212.914734][ T306] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.921958][ T306] bridge0: port 2(bridge_slave_1) entered forwarding state [ 212.934550][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 212.943986][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 212.958355][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 212.969806][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 212.978198][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 212.985639][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 212.994404][ T352] device veth0_vlan entered promiscuous mode [ 213.004401][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 213.013823][ T352] device veth1_macvtap entered promiscuous mode [ 213.023293][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 213.041685][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 313.066725][ C1] rcu: INFO: rcu_preempt self-detected stall on CPU [ 313.073996][ C1] rcu: 1-....: (1 GPs behind) idle=cbe/1/0x4000000000000000 softirq=1755/1761 fqs=4994 last_accelerate: ddb5/04c6 dyntick_enabled: 1 [ 313.087822][ C1] (t=10001 jiffies g=809 q=298) [ 313.092890][ C1] NMI backtrace for cpu 1 [ 313.097223][ C1] CPU: 1 PID: 374 Comm: syz.2.17 Not tainted syzkaller #0 [ 313.104317][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 313.114371][ C1] Call Trace: [ 313.117675][ C1] [ 313.120651][ C1] __dump_stack+0x21/0x24 [ 313.124987][ C1] dump_stack_lvl+0x1a7/0x208 [ 313.129664][ C1] ? show_regs_print_info+0x18/0x18 [ 313.134867][ C1] ? _raw_spin_lock_irqsave+0xc2/0x130 [ 313.140328][ C1] ? _raw_spin_lock+0xf0/0xf0 [ 313.144998][ C1] ? printk+0xda/0x130 [ 313.149088][ C1] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 313.155159][ C1] dump_stack+0x15/0x1c [ 313.159311][ C1] nmi_trigger_cpumask_backtrace+0x27f/0x2c0 [ 313.165289][ C1] arch_trigger_cpumask_backtrace+0x10/0x20 [ 313.171202][ C1] rcu_dump_cpu_stacks+0x19c/0x2c0 [ 313.176314][ C1] rcu_sched_clock_irq+0xf88/0x1880 [ 313.181610][ C1] ? rcutree_dead_cpu+0x310/0x310 [ 313.186719][ C1] ? hrtimer_run_queues+0x166/0x430 [ 313.191916][ C1] update_process_times+0x198/0x200 [ 313.197103][ C1] tick_sched_timer+0x17c/0x240 [ 313.201941][ C1] ? tick_setup_sched_timer+0x450/0x450 [ 313.207499][ C1] __hrtimer_run_queues+0x380/0x970 [ 313.212985][ C1] ? hrtimer_interrupt+0xdc0/0xdc0 [ 313.218108][ C1] ? ktime_get_update_offsets_now+0x293/0x2b0 [ 313.224167][ C1] hrtimer_interrupt+0x3a6/0xdc0 [ 313.229099][ C1] __sysvec_apic_timer_interrupt+0xfa/0x3f0 [ 313.235104][ C1] asm_call_irq_on_stack+0xf/0x20 [ 313.240201][ C1] [ 313.243137][ C1] sysvec_apic_timer_interrupt+0x85/0xe0 [ 313.248777][ C1] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 313.254778][ C1] RIP: 0010:qdisc_tree_reduce_backlog+0x87/0x340 [ 313.261108][ C1] Code: af 86 e8 5c 22 b2 fd 4d 85 e4 0f 84 a2 02 00 00 41 83 fc ff 0f 84 91 02 00 00 49 8d 5f 10 48 89 d8 48 c1 e8 03 42 0f b6 04 30 <84> c0 0f 85 f0 01 00 00 8b 1b 89 de 83 e6 40 31 ff e8 13 21 b2 fd [ 313.281834][ C1] RSP: 0018:ffffc90003a46f28 EFLAGS: 00000a06 [ 313.288173][ C1] RAX: 0000000000000000 RBX: ffff888110d1dc10 RCX: 0000000000000005 [ 313.296153][ C1] RDX: ffffffff83b298b4 RSI: ffffffff86af3120 RDI: 00000000fffffff1 [ 313.304124][ C1] RBP: ffffc90003a46f70 R08: ffff888110c7a780 R09: 0000000000000002 [ 313.312172][ C1] R10: 00000000ffffffff R11: 0000000000000000 R12: 00000000fffffff1 [ 313.320139][ C1] R13: ffff888110d1dccc R14: dffffc0000000000 R15: ffff888110d1dc00 [ 313.328427][ C1] ? qdisc_tree_reduce_backlog+0x64/0x340 [ 313.334165][ C1] ? qdisc_tree_reduce_backlog+0x64/0x340 [ 313.339905][ C1] fq_change+0xbdb/0x1100 [ 313.344327][ C1] ? fq_destroy+0x60/0x60 [ 313.348672][ C1] fq_init+0x3e3/0x5d0 [ 313.352736][ C1] ? qdisc_peek_dequeued+0x230/0x230 [ 313.358041][ C1] qdisc_create+0x848/0x1220 [ 313.362728][ C1] ? qdisc_notify+0x350/0x350 [ 313.367409][ C1] ? __nla_parse+0x42/0x60 [ 313.372032][ C1] tc_modify_qdisc+0x8a1/0x1490 [ 313.376989][ C1] ? qdisc_offload_graft_helper+0x280/0x280 [ 313.382875][ C1] ? cap_capable+0x19c/0x220 [ 313.387472][ C1] ? ns_capable+0x8c/0xf0 [ 313.391963][ C1] ? netlink_net_capable+0x125/0x160 [ 313.397267][ C1] ? qdisc_offload_graft_helper+0x280/0x280 [ 313.403346][ C1] rtnetlink_rcv_msg+0xa31/0xcc0 [ 313.408288][ C1] ? rtnetlink_bind+0x80/0x80 [ 313.412953][ C1] ? arch_stack_walk+0xee/0x140 [ 313.417986][ C1] ? stack_trace_save+0xa6/0xf0 [ 313.422821][ C1] ? stack_trace_snprint+0xf0/0xf0 [ 313.427933][ C1] ? avc_has_perm+0x168/0x3d0 [ 313.432597][ C1] ? memcpy+0x56/0x70 [ 313.436573][ C1] ? avc_has_perm+0x27f/0x3d0 [ 313.441239][ C1] ? __kasan_slab_alloc+0xbd/0xf0 [ 313.446254][ C1] ? slab_post_alloc_hook+0x5d/0x2f0 [ 313.451715][ C1] ? avc_has_perm_noaudit+0x260/0x260 [ 313.457077][ C1] ? selinux_nlmsg_lookup+0x3de/0x4a0 [ 313.462437][ C1] netlink_rcv_skb+0x1f5/0x440 [ 313.467190][ C1] ? rtnetlink_bind+0x80/0x80 [ 313.471887][ C1] ? netlink_ack+0xb70/0xb70 [ 313.476643][ C1] ? __netlink_lookup+0x387/0x3b0 [ 313.481697][ C1] rtnetlink_rcv+0x1c/0x20 [ 313.486194][ C1] netlink_unicast+0x876/0xa40 [ 313.491073][ C1] netlink_sendmsg+0x89c/0xb50 [ 313.495859][ C1] ? netlink_getsockopt+0x530/0x530 [ 313.501049][ C1] ? get_futex_key+0x718/0xc70 [ 313.505941][ C1] ? security_socket_sendmsg+0x82/0xa0 [ 313.511488][ C1] ? netlink_getsockopt+0x530/0x530 [ 313.516685][ C1] ____sys_sendmsg+0x5b7/0x8f0 [ 313.521446][ C1] ? __sys_sendmsg_sock+0x40/0x40 [ 313.526464][ C1] ? import_iovec+0x7c/0xb0 [ 313.530955][ C1] ___sys_sendmsg+0x236/0x2e0 [ 313.535625][ C1] ? __sys_sendmsg+0x280/0x280 [ 313.540389][ C1] ? alloc_file+0x82/0x540 [ 313.544799][ C1] ? __kasan_check_read+0x11/0x20 [ 313.550035][ C1] ? __fdget+0x15b/0x230 [ 313.554373][ C1] __x64_sys_sendmsg+0x1f9/0x2c0 [ 313.559311][ C1] ? ___sys_sendmsg+0x2e0/0x2e0 [ 313.564172][ C1] ? debug_smp_processor_id+0x17/0x20 [ 313.569620][ C1] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 313.575676][ C1] ? exit_to_user_mode_prepare+0x2f/0xa0 [ 313.581388][ C1] do_syscall_64+0x31/0x40 [ 313.585799][ C1] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 313.591685][ C1] RIP: 0033:0x7f77a92cf629 [ 313.596157][ C1] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 313.615774][ C1] RSP: 002b:00007ffd8eab81e8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 313.624190][ C1] RAX: ffffffffffffffda RBX: 00007f77a9548fa0 RCX: 00007f77a92cf629 [ 313.632271][ C1] RDX: 0000000020040080 RSI: 0000200000001200 RDI: 0000000000000005 [ 313.640444][ C1] RBP: 00007f77a9365b39 R08: 0000000000000000 R09: 0000000000000000 [ 313.648501][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 313.656485][ C1] R13: 00007f77a9548fac R14: 00007f77a9548fa0 R15: 00007f77a9548fa0 [ 316.206989][ T373] rcu: INFO: rcu_preempt detected expedited stalls on CPUs/tasks: { 1-... } 10314 jiffies s: 1073 root: 0x2/. [ 316.219677][ T373] rcu: blocking rcu_node structures: [ 316.225202][ T373] Task dump for CPU 1: [ 316.229721][ T373] task:syz.2.17 state:R running task stack: 0 pid: 374 ppid: 352 flags:0x0000000c [ 316.241055][ T373] Call Trace: [ 316.244596][ T373] ? kvm_sched_clock_read+0x18/0x40 [ 316.249898][ T373] ? kvm_sched_clock_read+0x18/0x40 [ 316.255302][ T373] ? sched_clock+0x3a/0x40 [ 316.259942][ T373] ? sched_clock_cpu+0x1b/0x3d0 [ 316.265253][ T373] ? sched_clock+0x3a/0x40 [ 316.269794][ T373] ? debug_smp_processor_id+0x17/0x20 [ 316.275204][ T373] ? __irq_exit_rcu+0x40/0x150 [ 316.280000][ T373] ? __irq_exit_rcu+0x40/0x150 [ 316.285036][ T373] ? irq_exit_rcu+0x9/0x10 [ 316.290410][ T373] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 316.296616][ T373] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 316.303180][ T373] ? qdisc_lookup+0x67/0x4e0 [ 316.308103][ T373] ? qdisc_lookup+0x30f/0x4e0 [ 316.312810][ T373] ? qdisc_tree_reduce_backlog+0x1ef/0x340 [ 316.318798][ T373] ? fq_change+0xbdb/0x1100 [ 316.323425][ T373] ? fq_destroy+0x60/0x60 [ 316.327884][ T373] ? fq_init+0x3e3/0x5d0 [ 316.332148][ T373] ? qdisc_peek_dequeued+0x230/0x230 [ 316.337718][ T373] ? qdisc_create+0x848/0x1220 [ 316.343372][ T373] ? qdisc_notify+0x350/0x350 [ 316.348658][ T373] ? __nla_parse+0x42/0x60 [ 316.353441][ T373] ? tc_modify_qdisc+0x8a1/0x1490 [ 316.358814][ T373] ? qdisc_offload_graft_helper+0x280/0x280 [ 316.365186][ T373] ? cap_capable+0x19c/0x220 [ 316.370026][ T373] ? ns_capable+0x8c/0xf0 [ 316.374601][ T373] ? netlink_net_capable+0x125/0x160 [ 316.380192][ T373] ? qdisc_offload_graft_helper+0x280/0x280 [ 316.386314][ T373] ? rtnetlink_rcv_msg+0xa31/0xcc0 [ 316.391637][ T373] ? rtnetlink_bind+0x80/0x80 [ 316.396331][ T373] ? arch_stack_walk+0xee/0x140 [ 316.401220][ T373] ? stack_trace_save+0xa6/0xf0 [ 316.406077][ T373] ? stack_trace_snprint+0xf0/0xf0 [ 316.411394][ T373] ? avc_has_perm+0x168/0x3d0 [ 316.416079][ T373] ? memcpy+0x56/0x70 [ 316.420261][ T373] ? avc_has_perm+0x27f/0x3d0 [ 316.425380][ T373] ? __kasan_slab_alloc+0xbd/0xf0 [ 316.431009][ T373] ? slab_post_alloc_hook+0x5d/0x2f0 [ 316.436413][ T373] ? avc_has_perm_noaudit+0x260/0x260 [ 316.442126][ T373] ? selinux_nlmsg_lookup+0x3de/0x4a0 [ 316.447551][ T373] ? netlink_rcv_skb+0x1f5/0x440 [ 316.452525][ T373] ? rtnetlink_bind+0x80/0x80 [ 316.457345][ T373] ? netlink_ack+0xb70/0xb70 [ 316.462311][ T373] ? __netlink_lookup+0x387/0x3b0 [ 316.467563][ T373] ? rtnetlink_rcv+0x1c/0x20 [ 316.472359][ T373] ? netlink_unicast+0x876/0xa40 [ 316.477346][ T373] ? netlink_sendmsg+0x89c/0xb50 [ 316.482308][ T373] ? netlink_getsockopt+0x530/0x530 [ 316.487633][ T373] ? get_futex_key+0x718/0xc70 [ 316.492414][ T373] ? security_socket_sendmsg+0x82/0xa0 [ 316.498070][ T373] ? netlink_getsockopt+0x530/0x530 [ 316.503291][ T373] ? ____sys_sendmsg+0x5b7/0x8f0 [ 316.508266][ T373] ? __sys_sendmsg_sock+0x40/0x40 [ 316.513308][ T373] ? import_iovec+0x7c/0xb0 [ 316.518274][ T373] ? ___sys_sendmsg+0x236/0x2e0 [ 316.523144][ T373] ? __sys_sendmsg+0x280/0x280 [ 316.528149][ T373] ? alloc_file+0x82/0x540 [ 316.532865][ T373] ? __kasan_check_read+0x11/0x20 [ 316.537946][ T373] ? __fdget+0x15b/0x230 [ 316.542210][ T373] ? __x64_sys_sendmsg+0x1f9/0x2c0 [ 316.547442][ T373] ? ___sys_sendmsg+0x2e0/0x2e0 [ 316.552311][ T373] ? debug_smp_processor_id+0x17/0x20 [ 316.557810][ T373] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 316.564597][ T373] ? exit_to_user_mode_prepare+0x2f/0xa0 [ 316.570271][ T373] ? do_syscall_64+0x31/0x40 [ 316.574891][ T373] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 463.072338][ C1] watchdog: BUG: soft lockup - CPU#1 stuck for 123s! [syz.2.17:374] [ 463.080553][ C1] Modules linked in: [ 463.084701][ C1] CPU: 1 PID: 374 Comm: syz.2.17 Not tainted syzkaller #0 [ 463.091980][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 463.102544][ C1] RIP: 0010:__sanitizer_cov_trace_const_cmp4+0x30/0x90 [ 463.109384][ C1] Code: 45 08 65 48 8b 15 70 b3 9d 7e 65 8b 0d 75 b3 9d 7e f7 c1 00 01 ff 00 74 11 f7 c1 00 01 00 00 74 5b 83 ba dc 0a 00 00 00 74 52 <8b> 8a b8 0a 00 00 83 f9 03 75 47 48 8b 8a c0 0a 00 00 44 8b 8a bc [ 463.129210][ C1] RSP: 0018:ffffc90003a46f18 EFLAGS: 00000246 [ 463.135292][ C1] RAX: ffffffff83b29977 RBX: dffffc0000000000 RCX: 0000000000000201 [ 463.143460][ C1] RDX: ffff888110c7a780 RSI: 0000000000000000 RDI: 0000000000000000 [ 463.151511][ C1] RBP: ffffc90003a46f18 R08: ffff888110c7a780 R09: 0000000000000002 [ 463.159478][ C1] R10: 00000000ffffffff R11: 0000000000000000 R12: 00000000fffffff1 [ 463.167463][ C1] R13: ffff888110d1dc00 R14: ffff888110d1f000 R15: ffff888110d1dc40 [ 463.175423][ C1] FS: 000055558a23f500(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 463.184338][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 463.190925][ C1] CR2: 00007f77a931cd40 CR3: 000000010ff67000 CR4: 00000000003506a0 [ 463.198910][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 463.206875][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 463.214841][ C1] Call Trace: [ 463.218124][ C1] qdisc_tree_reduce_backlog+0x127/0x340 [ 463.223750][ C1] fq_change+0xbdb/0x1100 [ 463.228076][ C1] ? fq_destroy+0x60/0x60 [ 463.232484][ C1] fq_init+0x3e3/0x5d0 [ 463.236648][ C1] ? qdisc_peek_dequeued+0x230/0x230 [ 463.242360][ C1] qdisc_create+0x848/0x1220 [ 463.246941][ C1] ? qdisc_notify+0x350/0x350 [ 463.251717][ C1] ? __nla_parse+0x42/0x60 [ 463.256212][ C1] tc_modify_qdisc+0x8a1/0x1490 [ 463.261056][ C1] ? qdisc_offload_graft_helper+0x280/0x280 [ 463.266956][ C1] ? cap_capable+0x19c/0x220 [ 463.271537][ C1] ? ns_capable+0x8c/0xf0 [ 463.276060][ C1] ? netlink_net_capable+0x125/0x160 [ 463.281446][ C1] ? qdisc_offload_graft_helper+0x280/0x280 [ 463.287353][ C1] rtnetlink_rcv_msg+0xa31/0xcc0 [ 463.292288][ C1] ? rtnetlink_bind+0x80/0x80 [ 463.296972][ C1] ? arch_stack_walk+0xee/0x140 [ 463.301829][ C1] ? stack_trace_save+0xa6/0xf0 [ 463.306784][ C1] ? stack_trace_snprint+0xf0/0xf0 [ 463.311909][ C1] ? avc_has_perm+0x168/0x3d0 [ 463.316585][ C1] ? memcpy+0x56/0x70 [ 463.320685][ C1] ? avc_has_perm+0x27f/0x3d0 [ 463.325453][ C1] ? __kasan_slab_alloc+0xbd/0xf0 [ 463.330487][ C1] ? slab_post_alloc_hook+0x5d/0x2f0 [ 463.335766][ C1] ? avc_has_perm_noaudit+0x260/0x260 [ 463.341126][ C1] ? selinux_nlmsg_lookup+0x3de/0x4a0 [ 463.346490][ C1] netlink_rcv_skb+0x1f5/0x440 [ 463.351248][ C1] ? rtnetlink_bind+0x80/0x80 [ 463.356014][ C1] ? netlink_ack+0xb70/0xb70 [ 463.360594][ C1] ? __netlink_lookup+0x387/0x3b0 [ 463.365909][ C1] rtnetlink_rcv+0x1c/0x20 [ 463.370328][ C1] netlink_unicast+0x876/0xa40 [ 463.375087][ C1] netlink_sendmsg+0x89c/0xb50 [ 463.379929][ C1] ? netlink_getsockopt+0x530/0x530 [ 463.385118][ C1] ? get_futex_key+0x718/0xc70 [ 463.389883][ C1] ? security_socket_sendmsg+0x82/0xa0 [ 463.395336][ C1] ? netlink_getsockopt+0x530/0x530 [ 463.400809][ C1] ____sys_sendmsg+0x5b7/0x8f0 [ 463.405937][ C1] ? __sys_sendmsg_sock+0x40/0x40 [ 463.410957][ C1] ? import_iovec+0x7c/0xb0 [ 463.415557][ C1] ___sys_sendmsg+0x236/0x2e0 [ 463.420258][ C1] ? __sys_sendmsg+0x280/0x280 [ 463.425018][ C1] ? alloc_file+0x82/0x540 [ 463.429440][ C1] ? __kasan_check_read+0x11/0x20 [ 463.434457][ C1] ? __fdget+0x15b/0x230 [ 463.438808][ C1] __x64_sys_sendmsg+0x1f9/0x2c0 [ 463.443740][ C1] ? ___sys_sendmsg+0x2e0/0x2e0 [ 463.448580][ C1] ? debug_smp_processor_id+0x17/0x20 [ 463.453973][ C1] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 463.460034][ C1] ? exit_to_user_mode_prepare+0x2f/0xa0 [ 463.465654][ C1] do_syscall_64+0x31/0x40 [ 463.470065][ C1] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 463.475948][ C1] RIP: 0033:0x7f77a92cf629 [ 463.480415][ C1] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 463.500099][ C1] RSP: 002b:00007ffd8eab81e8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 463.508605][ C1] RAX: ffffffffffffffda RBX: 00007f77a9548fa0 RCX: 00007f77a92cf629 [ 463.516582][ C1] RDX: 0000000020040080 RSI: 0000200000001200 RDI: 0000000000000005 [ 463.524555][ C1] RBP: 00007f77a9365b39 R08: 0000000000000000 R09: 0000000000000000 [ 463.532545][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 463.540509][ C1] R13: 00007f77a9548fac R14: 00007f77a9548fa0 R15: 00007f77a9548fa0 [ 463.548478][ C1] Sending NMI from CPU 1 to CPUs 0: [ 463.553816][ C0] NMI backtrace for cpu 0 skipped: idling at default_idle+0x12/0x20 [ 463.565507][ T24] kauditd_printk_skb: 31 callbacks suppressed [ 463.565520][ T24] audit: type=1400 audit(1771794570.150:105): avc: denied { read } for pid=76 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 463.601268][ T24] audit: type=1400 audit(1771794570.180:106): avc: denied { search } for pid=76 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 463.623111][ T24] audit: type=1400 audit(1771794570.180:107): avc: denied { write } for pid=76 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 463.644990][ T24] audit: type=1400 audit(1771794570.180:108): avc: denied { add_name } for pid=76 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 463.665720][ T24] audit: type=1400 audit(1771794570.180:109): avc: denied { create } for pid=76 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 463.686475][ T24] audit: type=1400 audit(1771794570.190:110): avc: denied { append open } for pid=76 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 463.709501][ T24] audit: type=1400 audit(1771794570.190:111): avc: denied { getattr } for pid=76 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1