last executing test programs: 1.145222364s ago: executing program 1 (id=3571): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$TCSETA(r1, 0x5451, 0x0) 945.85244ms ago: executing program 1 (id=3574): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) sendmmsg$nfc_llcp(r1, 0x0, 0x0, 0x10) 836.758064ms ago: executing program 1 (id=3575): pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0xb82e336200000000) r1 = ioctl$TIOCGPTPEER(r0, 0x5450, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x5451, 0x0) 697.050541ms ago: executing program 1 (id=3576): r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$TIOCGPTPEER(r0, 0x5450, 0x0) write$FUSE_DIRENTPLUS(r1, 0x0, 0x0) 476.24361ms ago: executing program 1 (id=3578): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$TCSETA(r1, 0x5451, 0x0) 476.09863ms ago: executing program 0 (id=3580): pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x10080) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r0, 0x5452, &(0x7f00000001c0)={{0x0, 0xfd}}) 346.648406ms ago: executing program 0 (id=3582): pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0xb82e336200000000) r1 = ioctl$TIOCGPTPEER(r0, 0x5450, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x5451, 0x0) 346.515246ms ago: executing program 1 (id=3583): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x11000) write$sequencer(r0, &(0x7f0000000000)=[@n={0x1, 0x6, @generic=0x9, 0x2}], 0x4) 214.994993ms ago: executing program 0 (id=3584): r0 = open(&(0x7f0000000140)='.\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='hugetlb.2MB.failcnt\x00', 0x657, 0xfeffffff) ioctl$TCSETAW(r1, 0x5450, 0x0) 146.654652ms ago: executing program 0 (id=3585): r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$TIOCGPTPEER(r0, 0x5450, 0x0) write$FUSE_DIRENTPLUS(r1, 0x0, 0x0) 66.244362ms ago: executing program 0 (id=3586): r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = fcntl$getown(r0, 0x9) sched_getaffinity(r1, 0x8, &(0x7f00000001c0)) 0s ago: executing program 0 (id=3587): r0 = socket$nl_generic(0x10, 0x3, 0x10) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) sendmsg$NL80211_CMD_GET_PROTOCOL_FEATURES(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40090d0}, 0x4000000) kernel console output (not intermixed with test programs): [ 47.602415][ T29] audit: type=1400 audit(47.510:56): avc: denied { read write } for pid=3095 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 47.614446][ T29] audit: type=1400 audit(47.530:57): avc: denied { open } for pid=3095 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:47822' (ED25519) to the list of known hosts. [ 60.322649][ T29] audit: type=1400 audit(60.230:58): avc: denied { name_bind } for pid=3098 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 62.822741][ T29] audit: type=1400 audit(62.720:59): avc: denied { execute } for pid=3099 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 62.928695][ T29] audit: type=1400 audit(62.820:60): avc: denied { execute_no_trans } for pid=3099 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 65.840037][ T29] audit: type=1400 audit(65.750:61): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 65.843946][ T29] audit: type=1400 audit(65.760:62): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 65.854379][ T3099] cgroup: Unknown subsys name 'net' [ 65.863384][ T29] audit: type=1400 audit(65.770:63): avc: denied { unmount } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 66.009579][ T3099] cgroup: Unknown subsys name 'cpuset' [ 66.015618][ T3099] cgroup: Unknown subsys name 'hugetlb' [ 66.016705][ T3099] cgroup: Unknown subsys name 'rlimit' [ 66.206119][ T29] audit: type=1400 audit(66.120:64): avc: denied { setattr } for pid=3099 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 66.208196][ T29] audit: type=1400 audit(66.120:65): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 66.209949][ T29] audit: type=1400 audit(66.120:66): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 66.368905][ T3101] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 66.371761][ T29] audit: type=1400 audit(66.280:67): avc: denied { relabelto } for pid=3101 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 66.382594][ T29] audit: type=1400 audit(66.290:68): avc: denied { write } for pid=3101 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 66.412775][ T29] audit: type=1400 audit(66.320:69): avc: denied { read } for pid=3099 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 66.415595][ T29] audit: type=1400 audit(66.330:70): avc: denied { open } for pid=3099 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 73.095645][ T3099] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 75.040451][ T29] audit: type=1400 audit(74.950:71): avc: denied { execmem } for pid=3102 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 75.100756][ T29] audit: type=1400 audit(75.010:72): avc: denied { read } for pid=3104 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 75.103423][ T29] audit: type=1400 audit(75.010:73): avc: denied { open } for pid=3104 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 75.117736][ T29] audit: type=1400 audit(75.030:74): avc: denied { mounton } for pid=3104 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 75.143501][ T29] audit: type=1400 audit(75.060:75): avc: denied { module_request } for pid=3105 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 75.228788][ T29] audit: type=1400 audit(75.140:76): avc: denied { sys_module } for pid=3104 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 75.716006][ T29] audit: type=1400 audit(75.630:77): avc: denied { ioctl } for pid=3105 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 76.470416][ T3105] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 76.476794][ T3105] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 76.541506][ T3104] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 76.548075][ T3104] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 77.131696][ T3105] hsr_slave_0: entered promiscuous mode [ 77.137101][ T3105] hsr_slave_1: entered promiscuous mode [ 77.367705][ T3104] hsr_slave_0: entered promiscuous mode [ 77.369448][ T3104] hsr_slave_1: entered promiscuous mode [ 77.380102][ T3104] debugfs: 'hsr0' already exists in 'hsr' [ 77.383841][ T3104] Cannot create hsr debugfs directory [ 77.459343][ T29] audit: type=1400 audit(77.370:78): avc: denied { create } for pid=3105 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 77.460886][ T29] audit: type=1400 audit(77.370:79): avc: denied { write } for pid=3105 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 77.462909][ T29] audit: type=1400 audit(77.370:80): avc: denied { read } for pid=3105 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 77.474700][ T3105] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 77.489311][ T3105] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 77.501107][ T3105] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 77.524991][ T3105] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 77.779343][ T3104] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 77.790667][ T3104] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 77.804128][ T3104] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 77.811556][ T3104] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 78.320345][ T3105] 8021q: adding VLAN 0 to HW filter on device bond0 [ 78.557949][ T3104] 8021q: adding VLAN 0 to HW filter on device bond0 [ 80.977906][ T3104] veth0_vlan: entered promiscuous mode [ 80.994727][ T3104] veth1_vlan: entered promiscuous mode [ 81.043304][ T3104] veth0_macvtap: entered promiscuous mode [ 81.058480][ T3104] veth1_macvtap: entered promiscuous mode [ 81.114960][ T1321] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.116693][ T1321] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.124440][ T2740] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.126019][ T2740] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.191735][ T29] audit: type=1400 audit(81.100:81): avc: denied { mount } for pid=3104 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 81.215649][ T29] audit: type=1400 audit(81.130:82): avc: denied { mounton } for pid=3104 comm="syz-executor" path="/syzkaller.4g2xzV/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 81.224675][ T29] audit: type=1400 audit(81.130:83): avc: denied { mount } for pid=3104 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 81.233754][ T29] audit: type=1400 audit(81.150:84): avc: denied { mounton } for pid=3104 comm="syz-executor" path="/syzkaller.4g2xzV/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 81.239546][ T29] audit: type=1400 audit(81.150:85): avc: denied { mounton } for pid=3104 comm="syz-executor" path="/syzkaller.4g2xzV/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2370 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 81.264530][ T29] audit: type=1400 audit(81.170:86): avc: denied { unmount } for pid=3104 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 81.269724][ T29] audit: type=1400 audit(81.180:87): avc: denied { mounton } for pid=3104 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 81.281323][ T3105] veth0_vlan: entered promiscuous mode [ 81.281793][ T29] audit: type=1400 audit(81.190:88): avc: denied { mount } for pid=3104 comm="syz-executor" name="/" dev="gadgetfs" ino=2371 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 81.293669][ T29] audit: type=1400 audit(81.200:89): avc: denied { mount } for pid=3104 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 81.296759][ T29] audit: type=1400 audit(81.210:90): avc: denied { mounton } for pid=3104 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 81.326955][ T3105] veth1_vlan: entered promiscuous mode [ 81.389355][ T3104] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 81.433623][ T3105] veth0_macvtap: entered promiscuous mode [ 81.450141][ T3105] veth1_macvtap: entered promiscuous mode [ 81.564112][ T1390] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.566033][ T1390] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.567592][ T1390] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.567874][ T1390] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.443669][ T3840] ======================================================= [ 86.443669][ T3840] WARNING: The mand mount option has been deprecated and [ 86.443669][ T3840] and is ignored by this kernel. Remove the mand [ 86.443669][ T3840] option from the mount to silence this warning. [ 86.443669][ T3840] ======================================================= [ 86.447820][ T29] kauditd_printk_skb: 21 callbacks suppressed [ 86.448479][ T29] audit: type=1400 audit(86.350:112): avc: denied { mount } for pid=3838 comm="syz.0.62" name="/" dev="tracefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 86.449409][ T29] audit: type=1400 audit(86.360:113): avc: denied { remount } for pid=3838 comm="syz.0.62" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 86.455639][ T29] audit: type=1400 audit(86.370:114): avc: denied { unmount } for pid=3104 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 86.777176][ T29] audit: type=1400 audit(86.690:115): avc: denied { unmount } for pid=3104 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 86.905054][ T29] audit: type=1400 audit(86.820:116): avc: denied { create } for pid=3863 comm="syz.1.74" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 86.910251][ T29] audit: type=1400 audit(86.820:117): avc: denied { setopt } for pid=3863 comm="syz.1.74" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 87.189294][ T29] audit: type=1400 audit(87.100:118): avc: denied { ioctl } for pid=3873 comm="syz.0.78" path="socket:[3353]" dev="sockfs" ino=3353 ioctlcmd=0x55cb scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 87.339890][ T3878] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3878 comm=syz.1.80 [ 87.395474][ T29] audit: type=1400 audit(87.310:119): avc: denied { create } for pid=3879 comm="syz.0.81" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 87.405375][ T29] audit: type=1400 audit(87.320:120): avc: denied { write } for pid=3879 comm="syz.0.81" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 87.956662][ T3904] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3904 comm=syz.0.92 [ 88.041079][ T29] audit: type=1400 audit(87.950:121): avc: denied { create } for pid=3905 comm="syz.0.95" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 89.186152][ T3950] capability: warning: `syz.0.116' uses deprecated v2 capabilities in a way that may be insecure [ 93.278224][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 93.279422][ T29] audit: type=1400 audit(93.190:126): avc: denied { prog_load } for pid=3995 comm="syz.0.138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 93.281709][ T29] audit: type=1400 audit(93.190:127): avc: denied { bpf } for pid=3995 comm="syz.0.138" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 93.417556][ T3998] Zero length message leads to an empty skb [ 95.027929][ T4041] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4041 comm=syz.1.160 [ 96.452528][ T29] audit: type=1400 audit(96.360:128): avc: denied { write } for pid=4093 comm="syz.0.185" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 101.714430][ T29] audit: type=1400 audit(101.630:129): avc: denied { ioctl } for pid=4118 comm="syz.1.196" path="socket:[3787]" dev="sockfs" ino=3787 ioctlcmd=0x550d scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 101.857047][ T29] audit: type=1400 audit(101.770:130): avc: denied { create } for pid=4124 comm="syz.0.200" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 101.864690][ T29] audit: type=1400 audit(101.780:131): avc: denied { write } for pid=4124 comm="syz.0.200" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 101.957173][ T29] audit: type=1400 audit(101.870:132): avc: denied { ioctl } for pid=4128 comm="syz.0.202" path="socket:[3062]" dev="sockfs" ino=3062 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sock_file permissive=1 [ 103.059141][ T29] audit: type=1400 audit(102.970:133): avc: denied { map_create } for pid=4173 comm="syz.0.223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 103.067207][ T29] audit: type=1400 audit(102.980:134): avc: denied { map_read map_write } for pid=4173 comm="syz.0.223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 108.894426][ T29] audit: type=1400 audit(108.810:135): avc: denied { create } for pid=4240 comm="syz.1.256" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 108.905726][ T29] audit: type=1400 audit(108.820:136): avc: denied { lock } for pid=4240 comm="syz.1.256" path="socket:[4310]" dev="sockfs" ino=4310 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 108.993069][ T29] audit: type=1400 audit(108.900:137): avc: denied { ioctl } for pid=4244 comm="syz.1.258" path="socket:[4317]" dev="sockfs" ino=4317 ioctlcmd=0x4b6b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 109.177430][ T29] audit: type=1400 audit(109.090:138): avc: denied { create } for pid=4252 comm="syz.0.262" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 109.182746][ T29] audit: type=1400 audit(109.100:139): avc: denied { shutdown } for pid=4252 comm="syz.0.262" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 109.324363][ T4259] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 109.330035][ T29] audit: type=1400 audit(109.240:140): avc: denied { connect } for pid=4258 comm="syz.1.265" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 109.338476][ T29] audit: type=1400 audit(109.250:141): avc: denied { write } for pid=4258 comm="syz.1.265" path="socket:[4344]" dev="sockfs" ino=4344 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 109.449829][ T29] audit: type=1400 audit(109.360:142): avc: denied { setopt } for pid=4263 comm="syz.1.267" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 109.937490][ T29] audit: type=1400 audit(109.850:143): avc: denied { map } for pid=4281 comm="syz.1.276" path="socket:[4385]" dev="sockfs" ino=4385 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 110.246714][ T29] audit: type=1400 audit(110.160:144): avc: denied { ioctl } for pid=4297 comm="syz.1.283" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 116.112811][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 116.113249][ T29] audit: type=1400 audit(116.020:146): avc: denied { write } for pid=4369 comm="syz.1.317" name="arp" dev="proc" ino=4026532665 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 116.476055][ T29] audit: type=1400 audit(116.390:147): avc: denied { nlmsg_read } for pid=4387 comm="syz.0.326" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 116.625079][ T29] audit: type=1400 audit(116.540:148): avc: denied { mounton } for pid=4393 comm="syz.0.329" path="/171/file0" dev="tmpfs" ino=900 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 116.629469][ T29] audit: type=1400 audit(116.540:149): avc: denied { mount } for pid=4393 comm="syz.0.329" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 117.625280][ T29] audit: type=1400 audit(117.540:150): avc: denied { unmount } for pid=3104 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 122.876985][ T29] audit: type=1400 audit(122.790:151): avc: denied { remount } for pid=4489 comm="syz.0.376" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 126.440031][ T4540] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4540 comm=syz.0.400 [ 126.512485][ T4543] SELinux: Context #! ./file0 is not valid (left unmapped). [ 126.735756][ T29] audit: type=1400 audit(126.640:152): avc: denied { create } for pid=4553 comm="syz.1.408" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 126.736785][ T29] audit: type=1400 audit(126.650:153): avc: denied { write } for pid=4553 comm="syz.1.408" path="socket:[4873]" dev="sockfs" ino=4873 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 126.897259][ T29] audit: type=1400 audit(126.810:154): avc: denied { setopt } for pid=4560 comm="syz.1.411" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 127.797063][ T29] audit: type=1400 audit(127.710:155): avc: denied { create } for pid=4579 comm="syz.1.421" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 127.808448][ T29] audit: type=1400 audit(127.720:156): avc: denied { write } for pid=4579 comm="syz.1.421" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 128.788708][ T29] audit: type=1400 audit(128.700:157): avc: denied { read } for pid=4616 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 128.807122][ T29] audit: type=1400 audit(128.720:158): avc: denied { read write } for pid=3104 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 128.808316][ T29] audit: type=1400 audit(128.720:159): avc: denied { open } for pid=3104 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 128.809243][ T29] audit: type=1400 audit(128.720:160): avc: denied { ioctl } for pid=3104 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 129.095950][ T29] audit: type=1400 audit(129.010:161): avc: denied { create } for pid=4630 comm="syz.0.443" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 129.101259][ T29] audit: type=1400 audit(129.010:162): avc: denied { ioctl } for pid=4630 comm="syz.0.443" path="socket:[5640]" dev="sockfs" ino=5640 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 129.115196][ T29] audit: type=1400 audit(129.020:163): avc: denied { write } for pid=4630 comm="syz.0.443" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 129.207445][ T29] audit: type=1400 audit(129.120:164): avc: denied { write } for pid=4634 comm="syz.0.446" name="vhost-net" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 129.207789][ T29] audit: type=1400 audit(129.120:165): avc: denied { open } for pid=4634 comm="syz.0.446" path="/dev/vhost-net" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 129.217386][ T29] audit: type=1400 audit(129.130:166): avc: denied { ioctl } for pid=4634 comm="syz.0.446" path="/dev/vhost-net" dev="devtmpfs" ino=709 ioctlcmd=0x620e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 132.662343][ T4678] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4678 comm=syz.0.465 [ 133.130279][ T4696] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4696 comm=syz.1.472 [ 134.016244][ T29] kauditd_printk_skb: 16 callbacks suppressed [ 134.018812][ T29] audit: type=1400 audit(133.930:183): avc: denied { create } for pid=4731 comm="syz.0.492" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 134.027220][ T29] audit: type=1400 audit(133.940:184): avc: denied { write } for pid=4731 comm="syz.0.492" path="socket:[5819]" dev="sockfs" ino=5819 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 134.083067][ T29] audit: type=1400 audit(133.990:185): avc: denied { module_request } for pid=4735 comm="syz.0.494" kmod="net-pf-16-proto-16-family-batadv" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 134.146020][ T29] audit: type=1400 audit(134.060:186): avc: denied { read } for pid=4735 comm="syz.0.494" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 134.344279][ T29] audit: type=1400 audit(134.260:187): avc: denied { read } for pid=4748 comm="syz.1.501" dev="nsfs" ino=4026532654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 134.344690][ T29] audit: type=1400 audit(134.260:188): avc: denied { open } for pid=4748 comm="syz.1.501" path="net:[4026532654]" dev="nsfs" ino=4026532654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 134.347322][ T29] audit: type=1400 audit(134.260:189): avc: denied { create } for pid=4748 comm="syz.1.501" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 134.351673][ T29] audit: type=1400 audit(134.260:190): avc: denied { ioctl } for pid=4748 comm="syz.1.501" path="socket:[6186]" dev="sockfs" ino=6186 ioctlcmd=0x5000 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 134.648825][ T29] audit: type=1400 audit(134.560:191): avc: denied { write } for pid=4762 comm="syz.1.510" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 137.566002][ T4778] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1548 sclass=netlink_audit_socket pid=4778 comm=syz.1.513 [ 138.053625][ T29] audit: type=1400 audit(137.970:192): avc: denied { append } for pid=4799 comm="syz.0.525" name="dsp" dev="devtmpfs" ino=725 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 140.418959][ T4862] capability: warning: `syz.0.555' uses 32-bit capabilities (legacy support in use) [ 140.704971][ T29] kauditd_printk_skb: 7 callbacks suppressed [ 140.708695][ T29] audit: type=1400 audit(140.620:200): avc: denied { create } for pid=4865 comm="syz.0.557" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 143.118587][ T29] audit: type=1400 audit(143.030:201): avc: denied { allowed } for pid=4877 comm="syz.0.562" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 143.439884][ T29] audit: type=1400 audit(143.350:202): avc: denied { create } for pid=4879 comm="syz.0.563" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 143.625622][ T29] audit: type=1400 audit(143.540:203): avc: denied { write } for pid=4879 comm="syz.0.563" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 144.925657][ T29] audit: type=1400 audit(144.840:204): avc: denied { ioctl } for pid=4888 comm="syz.0.567" path="socket:[6378]" dev="sockfs" ino=6378 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sock_file permissive=1 [ 147.420933][ T29] audit: type=1400 audit(147.330:205): avc: denied { write } for pid=4921 comm="syz.1.583" path="socket:[6421]" dev="sockfs" ino=6421 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 148.064517][ T29] audit: type=1400 audit(147.980:206): avc: denied { ioctl } for pid=4929 comm="syz.1.587" path="socket:[7216]" dev="sockfs" ino=7216 ioctlcmd=0x3b71 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 148.529191][ T29] audit: type=1400 audit(148.440:207): avc: denied { read } for pid=4939 comm="syz.1.592" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 148.529629][ T29] audit: type=1400 audit(148.440:208): avc: denied { open } for pid=4939 comm="syz.1.592" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 148.542624][ T29] audit: type=1400 audit(148.450:209): avc: denied { ioctl } for pid=4939 comm="syz.1.592" path="/dev/binderfs/binder0" dev="binder" ino=7 ioctlcmd=0x620b scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 148.544223][ T4940] binder: 4939:4940 ioctl c018620b 0 returned -14 [ 149.210591][ T29] audit: type=1400 audit(149.120:210): avc: denied { create } for pid=4957 comm="syz.0.601" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 149.381041][ T29] audit: type=1400 audit(149.290:211): avc: denied { execmem } for pid=4961 comm="syz.0.603" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 149.398013][ T29] audit: type=1400 audit(149.310:212): avc: denied { getopt } for pid=4961 comm="syz.0.603" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 154.135077][ T29] audit: type=1400 audit(154.050:213): avc: denied { setopt } for pid=5061 comm="syz.0.642" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 154.215182][ T29] audit: type=1400 audit(154.130:214): avc: denied { create } for pid=5063 comm="syz.0.643" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 154.232503][ T29] audit: type=1400 audit(154.140:215): avc: denied { create } for pid=5063 comm="syz.0.643" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 154.578529][ T29] audit: type=1400 audit(154.490:216): avc: denied { create } for pid=5071 comm="syz.0.647" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 155.773501][ T45] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 156.262903][ T29] audit: type=1400 audit(156.170:217): avc: denied { map } for pid=5111 comm="syz.0.664" path="/proc/sys/net/ipv4/tcp_rmem" dev="proc" ino=3444 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_net_t tclass=file permissive=1 [ 156.463315][ T29] audit: type=1400 audit(156.370:218): avc: denied { create } for pid=5120 comm="syz.0.668" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 156.538059][ T5124] mmap: syz.1.669 (5124) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 156.767166][ T29] audit: type=1400 audit(156.680:219): avc: denied { create } for pid=5129 comm="syz.0.672" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 156.778090][ T29] audit: type=1400 audit(156.690:220): avc: denied { setopt } for pid=5129 comm="syz.0.672" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 158.266884][ T29] audit: type=1400 audit(158.180:221): avc: denied { create } for pid=5154 comm="syz.1.684" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 158.271772][ T29] audit: type=1400 audit(158.180:222): avc: denied { write } for pid=5154 comm="syz.1.684" name="file0" dev="tmpfs" ino=1709 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 159.707209][ T5194] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5194 comm=syz.0.703 [ 160.160523][ T5213] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=5213 comm=syz.0.713 [ 160.657818][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 160.659161][ T29] audit: type=1400 audit(160.570:226): avc: denied { create } for pid=5231 comm="syz.1.722" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 160.668133][ T29] audit: type=1400 audit(160.580:227): avc: denied { ioctl } for pid=5231 comm="syz.1.722" path="socket:[6822]" dev="sockfs" ino=6822 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 161.163728][ T5245] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5245 comm=syz.1.728 [ 161.258287][ T5247] lo: entered promiscuous mode [ 161.261733][ T5247] lo: entered allmulticast mode [ 161.266150][ T5247] tunl0: entered promiscuous mode [ 161.267920][ T5247] tunl0: entered allmulticast mode [ 161.270603][ T5247] gre0: entered promiscuous mode [ 161.273089][ T5247] gre0: entered allmulticast mode [ 161.275565][ T5247] gretap0: entered promiscuous mode [ 161.276788][ T5247] gretap0: entered allmulticast mode [ 161.278736][ T5247] erspan0: entered promiscuous mode [ 161.279531][ T5247] erspan0: entered allmulticast mode [ 161.281363][ T5247] ip_vti0: entered promiscuous mode [ 161.282902][ T5247] ip_vti0: entered allmulticast mode [ 161.285347][ T5247] ip6_vti0: entered promiscuous mode [ 161.288058][ T5247] ip6_vti0: entered allmulticast mode [ 161.289839][ T5247] sit0: entered promiscuous mode [ 161.291000][ T5247] sit0: entered allmulticast mode [ 161.293558][ T5247] ip6tnl0: entered promiscuous mode [ 161.295148][ T5247] ip6tnl0: entered allmulticast mode [ 161.297391][ T5247] ip6gre0: entered promiscuous mode [ 161.298992][ T5247] ip6gre0: entered allmulticast mode [ 161.304564][ T5247] syz_tun: entered promiscuous mode [ 161.305581][ T5247] syz_tun: entered allmulticast mode [ 161.307852][ T5247] ip6gretap0: entered promiscuous mode [ 161.311537][ T5247] ip6gretap0: entered allmulticast mode [ 161.314904][ T5247] vcan0: entered promiscuous mode [ 161.315092][ T5247] vcan0: entered allmulticast mode [ 161.316308][ T5247] bond0: entered promiscuous mode [ 161.316637][ T5247] bond_slave_0: entered promiscuous mode [ 161.317117][ T5247] bond_slave_1: entered promiscuous mode [ 161.317579][ T5247] bond0: entered allmulticast mode [ 161.317854][ T5247] bond_slave_0: entered allmulticast mode [ 161.318108][ T5247] bond_slave_1: entered allmulticast mode [ 161.319707][ T5247] dummy0: entered promiscuous mode [ 161.319910][ T5247] dummy0: entered allmulticast mode [ 161.321046][ T5247] nlmon0: entered promiscuous mode [ 161.321212][ T5247] nlmon0: entered allmulticast mode [ 161.331213][ T5247] vxcan0: entered promiscuous mode [ 161.333904][ T5247] vxcan0: entered allmulticast mode [ 161.335861][ T5247] vxcan1: entered promiscuous mode [ 161.337133][ T5247] vxcan1: entered allmulticast mode [ 161.338832][ T5247] veth0: entered promiscuous mode [ 161.339660][ T5247] veth0: entered allmulticast mode [ 161.340437][ T29] audit: type=1400 audit(161.250:228): avc: denied { write } for pid=5248 comm="syz.0.729" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 161.348049][ T5247] veth1: entered promiscuous mode [ 161.351262][ T5247] veth1: entered allmulticast mode [ 161.354159][ T5247] wg0: entered promiscuous mode [ 161.355084][ T5247] wg0: entered allmulticast mode [ 161.356738][ T5247] wg1: entered promiscuous mode [ 161.357533][ T5247] wg1: entered allmulticast mode [ 161.359040][ T5247] wg2: entered promiscuous mode [ 161.359896][ T5247] wg2: entered allmulticast mode [ 161.361681][ T5247] veth0_to_bridge: entered promiscuous mode [ 161.362987][ T5247] veth0_to_bridge: entered allmulticast mode [ 161.365096][ T5247] bridge_slave_0: entered promiscuous mode [ 161.365869][ T5247] bridge_slave_0: entered allmulticast mode [ 161.367700][ T5247] veth1_to_bridge: entered promiscuous mode [ 161.368534][ T5247] veth1_to_bridge: entered allmulticast mode [ 161.370543][ T5247] bridge_slave_1: entered promiscuous mode [ 161.371488][ T5247] bridge_slave_1: entered allmulticast mode [ 161.374336][ T5247] veth0_to_bond: entered promiscuous mode [ 161.375241][ T5247] veth0_to_bond: entered allmulticast mode [ 161.388384][ T5247] bond0: (slave bond_slave_0): Releasing backup interface [ 161.400367][ T5247] veth1_to_bond: entered promiscuous mode [ 161.401364][ T5247] veth1_to_bond: entered allmulticast mode [ 161.414650][ T5247] bond0: (slave bond_slave_1): Releasing backup interface [ 161.437992][ T5247] veth0_to_team: entered promiscuous mode [ 161.438900][ T5247] veth0_to_team: entered allmulticast mode [ 161.441306][ T5247] team_slave_0: entered promiscuous mode [ 161.443168][ T5247] team_slave_0: entered allmulticast mode [ 161.446829][ T5247] veth1_to_team: entered promiscuous mode [ 161.447803][ T5247] veth1_to_team: entered allmulticast mode [ 161.449902][ T5247] team_slave_1: entered promiscuous mode [ 161.450920][ T5247] team_slave_1: entered allmulticast mode [ 161.453595][ T5247] veth0_to_batadv: entered promiscuous mode [ 161.454540][ T5247] veth0_to_batadv: entered allmulticast mode [ 161.457676][ T5247] batadv_slave_0: entered promiscuous mode [ 161.458612][ T5247] batadv_slave_0: entered allmulticast mode [ 161.460826][ T5247] veth1_to_batadv: entered promiscuous mode [ 161.461778][ T5247] veth1_to_batadv: entered allmulticast mode [ 161.464365][ T5247] batadv_slave_1: entered promiscuous mode [ 161.465390][ T5247] batadv_slave_1: entered allmulticast mode [ 161.468409][ T5247] xfrm0: entered promiscuous mode [ 161.469206][ T5247] xfrm0: entered allmulticast mode [ 161.470802][ T5247] veth0_to_hsr: entered promiscuous mode [ 161.471686][ T5247] veth0_to_hsr: entered allmulticast mode [ 161.474821][ T5247] hsr_slave_0: entered allmulticast mode [ 161.477005][ T5247] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 161.515929][ T29] audit: type=1400 audit(161.430:229): avc: denied { create } for pid=5250 comm="syz.0.731" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 161.829249][ T5267] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5267 comm=syz.1.738 [ 162.320952][ T5288] SELinux: syz.0.749 (5288) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 164.244687][ T29] audit: type=1400 audit(164.160:230): avc: denied { ioctl } for pid=5299 comm="syz.1.755" path="socket:[7827]" dev="sockfs" ino=7827 ioctlcmd=0x89fa scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 165.881717][ T29] audit: type=1400 audit(165.790:231): avc: denied { read } for pid=5305 comm="syz.1.758" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 169.220214][ T29] audit: type=1400 audit(169.130:232): avc: denied { mounton } for pid=5319 comm="syz.0.764" path="/383/file0" dev="tmpfs" ino=1985 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 169.235305][ T29] audit: type=1400 audit(169.150:233): avc: denied { remount } for pid=5319 comm="syz.0.764" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 169.265808][ T29] audit: type=1400 audit(169.180:234): avc: denied { unmount } for pid=3104 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 172.345203][ T29] audit: type=1400 audit(172.260:235): avc: denied { write } for pid=5342 comm="syz.0.775" name="arp" dev="proc" ino=4026532756 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 172.522991][ T29] audit: type=1400 audit(172.440:236): avc: denied { read } for pid=5356 comm="syz.1.778" path="socket:[7078]" dev="sockfs" ino=7078 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 172.588080][ T29] audit: type=1400 audit(172.500:237): avc: denied { write } for pid=5359 comm="syz.1.780" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 172.825479][ T29] audit: type=1400 audit(172.740:238): avc: denied { mount } for pid=5373 comm="syz.1.787" name="/" dev="selinuxfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=filesystem permissive=1 [ 175.159465][ T29] audit: type=1400 audit(175.070:239): avc: denied { create } for pid=5459 comm="syz.0.829" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 175.617172][ T29] audit: type=1400 audit(175.530:240): avc: denied { map } for pid=5471 comm="syz.0.835" path="/dev/fb1" dev="devtmpfs" ino=763 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 177.527407][ T29] audit: type=1400 audit(177.440:241): avc: denied { map } for pid=5504 comm="syz.1.851" path="/dev/nullb0" dev="devtmpfs" ino=654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 177.530887][ T29] audit: type=1400 audit(177.440:242): avc: denied { execute } for pid=5504 comm="syz.1.851" path="/dev/nullb0" dev="devtmpfs" ino=654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 179.050012][ T29] audit: type=1400 audit(178.960:243): avc: denied { create } for pid=5546 comm="syz.0.872" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 179.065146][ T29] audit: type=1400 audit(178.980:244): avc: denied { ioctl } for pid=5546 comm="syz.0.872" path="socket:[9222]" dev="sockfs" ino=9222 ioctlcmd=0x5404 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 179.246550][ T29] audit: type=1400 audit(179.160:245): avc: denied { ioctl } for pid=5550 comm="syz.0.874" path="socket:[9236]" dev="sockfs" ino=9236 ioctlcmd=0x8953 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 180.674737][ T29] audit: type=1400 audit(180.590:246): avc: denied { ioctl } for pid=5583 comm="syz.0.890" path="socket:[9340]" dev="sockfs" ino=9340 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 180.968767][ T29] audit: type=1400 audit(180.880:247): avc: denied { ioctl } for pid=5590 comm="syz.0.893" path="socket:[9342]" dev="sockfs" ino=9342 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 180.970823][ T29] audit: type=1400 audit(180.880:248): avc: denied { bind } for pid=5590 comm="syz.0.893" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 181.531481][ T29] audit: type=1400 audit(181.440:249): avc: denied { setopt } for pid=5611 comm="syz.0.903" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 182.935418][ T5652] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1545 sclass=netlink_route_socket pid=5652 comm=syz.1.922 [ 184.531030][ T29] audit: type=1400 audit(184.440:250): avc: denied { write } for pid=5701 comm="syz.0.946" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 186.478136][ T29] audit: type=1400 audit(186.390:251): avc: denied { map_create } for pid=5775 comm="syz.0.983" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 186.479956][ T29] audit: type=1400 audit(186.390:252): avc: denied { map_read map_write } for pid=5775 comm="syz.0.983" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 202.027962][ T6060] binder: 6058:6060 ioctl c018620b 0 returned -14 [ 204.456634][ T29] audit: type=1400 audit(204.370:253): avc: denied { write } for pid=6086 comm="syz.1.1137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 211.935028][ T6207] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6207 comm=syz.1.1185 [ 212.357409][ T6222] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=6222 comm=syz.1.1193 [ 218.880024][ T29] audit: type=1400 audit(218.790:254): avc: denied { connect } for pid=6361 comm="syz.1.1260" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 219.384576][ T29] audit: type=1400 audit(219.300:255): avc: denied { setattr } for pid=6361 comm="syz.1.1260" path="socket:[11681]" dev="sockfs" ino=11681 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 221.916358][ T6388] lo: entered promiscuous mode [ 221.917911][ T6388] lo: entered allmulticast mode [ 221.927503][ T6388] tunl0: entered promiscuous mode [ 221.928926][ T6388] tunl0: entered allmulticast mode [ 221.935069][ T6388] gre0: entered promiscuous mode [ 221.937965][ T6388] gre0: entered allmulticast mode [ 221.943672][ T6388] gretap0: entered promiscuous mode [ 221.944694][ T6388] gretap0: entered allmulticast mode [ 221.948455][ T6388] erspan0: entered promiscuous mode [ 221.951340][ T6388] erspan0: entered allmulticast mode [ 221.957493][ T6388] ip_vti0: entered promiscuous mode [ 221.959626][ T6388] ip_vti0: entered allmulticast mode [ 221.963824][ T6388] ip6_vti0: entered promiscuous mode [ 221.965673][ T6388] ip6_vti0: entered allmulticast mode [ 221.968424][ T6388] sit0: entered promiscuous mode [ 221.970202][ T6388] sit0: entered allmulticast mode [ 221.975108][ T6388] ip6tnl0: entered promiscuous mode [ 221.977727][ T6388] ip6tnl0: entered allmulticast mode [ 221.980728][ T6388] ip6gre0: entered promiscuous mode [ 221.983235][ T6388] ip6gre0: entered allmulticast mode [ 221.986066][ T6388] syz_tun: entered promiscuous mode [ 221.988915][ T6388] syz_tun: entered allmulticast mode [ 221.995377][ T6388] ip6gretap0: entered promiscuous mode [ 221.996332][ T6388] ip6gretap0: entered allmulticast mode [ 222.001125][ T6388] vcan0: entered promiscuous mode [ 222.014384][ T6388] vcan0: entered allmulticast mode [ 222.016640][ T6388] bond0: entered promiscuous mode [ 222.017021][ T6388] bond_slave_0: entered promiscuous mode [ 222.017447][ T6388] bond_slave_1: entered promiscuous mode [ 222.017657][ T6388] bond0: entered allmulticast mode [ 222.017687][ T6388] bond_slave_0: entered allmulticast mode [ 222.017711][ T6388] bond_slave_1: entered allmulticast mode [ 222.019190][ T6388] dummy0: entered promiscuous mode [ 222.019487][ T6388] dummy0: entered allmulticast mode [ 222.020485][ T6388] nlmon0: entered promiscuous mode [ 222.020721][ T6388] nlmon0: entered allmulticast mode [ 222.021646][ T6388] vxcan0: entered promiscuous mode [ 222.021719][ T6388] vxcan0: entered allmulticast mode [ 222.023204][ T6388] vxcan1: entered promiscuous mode [ 222.023261][ T6388] vxcan1: entered allmulticast mode [ 222.023842][ T6388] veth0: entered promiscuous mode [ 222.023876][ T6388] veth0: entered allmulticast mode [ 222.024897][ T6388] veth1: entered promiscuous mode [ 222.024952][ T6388] veth1: entered allmulticast mode [ 222.025786][ T6388] wg0: entered promiscuous mode [ 222.025826][ T6388] wg0: entered allmulticast mode [ 222.026496][ T6388] wg1: entered promiscuous mode [ 222.026534][ T6388] wg1: entered allmulticast mode [ 222.027163][ T6388] wg2: entered promiscuous mode [ 222.027220][ T6388] wg2: entered allmulticast mode [ 222.027810][ T6388] veth0_to_bridge: entered promiscuous mode [ 222.027845][ T6388] veth0_to_bridge: entered allmulticast mode [ 222.028671][ T6388] bridge_slave_0: entered promiscuous mode [ 222.029010][ T6388] bridge_slave_0: entered allmulticast mode [ 222.030231][ T6388] veth1_to_bridge: entered promiscuous mode [ 222.030498][ T6388] veth1_to_bridge: entered allmulticast mode [ 222.031760][ T6388] bridge_slave_1: entered promiscuous mode [ 222.033687][ T6388] bridge_slave_1: entered allmulticast mode [ 222.035061][ T6388] veth0_to_bond: entered promiscuous mode [ 222.035309][ T6388] veth0_to_bond: entered allmulticast mode [ 222.039045][ T6388] bond0: (slave bond_slave_0): Releasing backup interface [ 222.049889][ T6388] veth1_to_bond: entered promiscuous mode [ 222.050299][ T6388] veth1_to_bond: entered allmulticast mode [ 222.071097][ T6388] bond0: (slave bond_slave_1): Releasing backup interface [ 222.091128][ T6388] veth0_to_team: entered promiscuous mode [ 222.091437][ T6388] veth0_to_team: entered allmulticast mode [ 222.097461][ T6388] team_slave_0: entered promiscuous mode [ 222.097767][ T6388] team_slave_0: entered allmulticast mode [ 222.099471][ T6388] veth1_to_team: entered promiscuous mode [ 222.099689][ T6388] veth1_to_team: entered allmulticast mode [ 222.107115][ T6388] team_slave_1: entered promiscuous mode [ 222.107368][ T6388] team_slave_1: entered allmulticast mode [ 222.110329][ T6388] veth0_to_batadv: entered promiscuous mode [ 222.110547][ T6388] veth0_to_batadv: entered allmulticast mode [ 222.117542][ T6388] batadv_slave_0: entered promiscuous mode [ 222.117789][ T6388] batadv_slave_0: entered allmulticast mode [ 222.119158][ T6388] veth1_to_batadv: entered promiscuous mode [ 222.122543][ T6388] veth1_to_batadv: entered allmulticast mode [ 222.124126][ T6388] batadv_slave_1: entered promiscuous mode [ 222.124177][ T6388] batadv_slave_1: entered allmulticast mode [ 222.128505][ T6388] xfrm0: entered promiscuous mode [ 222.128715][ T6388] xfrm0: entered allmulticast mode [ 222.129700][ T6388] veth0_to_hsr: entered promiscuous mode [ 222.129852][ T6388] veth0_to_hsr: entered allmulticast mode [ 222.131114][ T6388] hsr_slave_0: entered allmulticast mode [ 222.144520][ T6388] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 222.567688][ T6406] SELinux: syz.1.1279 (6406) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 237.011031][ T6579] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1545 sclass=netlink_route_socket pid=6579 comm=syz.0.1365 [ 238.302900][ T6629] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6629 comm=syz.1.1389 [ 241.015826][ T29] audit: type=1400 audit(240.930:256): avc: denied { ioctl } for pid=6642 comm="syz.0.1397" path="socket:[11171]" dev="sockfs" ino=11171 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 241.487862][ T29] audit: type=1400 audit(241.400:257): avc: denied { ioctl } for pid=6660 comm="syz.1.1406" path="mnt:[4026532648]" dev="nsfs" ino=4026532648 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 241.638231][ T6668] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6668 comm=syz.0.1409 [ 244.187561][ T6774] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6774 comm=syz.0.1461 [ 244.278098][ T6777] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6777 comm=syz.1.1467 [ 247.648378][ T6905] binder: 6903:6905 ioctl c018620b 0 returned -14 [ 251.158664][ T6953] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1550'. [ 251.168419][ T6953] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1550'. [ 251.810281][ T29] audit: type=1400 audit(251.720:258): avc: denied { associate } for pid=6970 comm="syz.0.1559" name="pfkey" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 251.979946][ T29] audit: type=1400 audit(251.890:259): avc: denied { mount } for pid=6974 comm="syz.0.1561" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 252.000042][ T29] audit: type=1400 audit(251.910:260): avc: denied { unmount } for pid=3104 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 252.240953][ T6981] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=514 sclass=netlink_route_socket pid=6981 comm=syz.0.1564 [ 257.743126][ T7085] netlink: 44 bytes leftover after parsing attributes in process `syz.1.1610'. [ 257.824330][ T7089] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=1538 sclass=netlink_tcpdiag_socket pid=7089 comm=syz.0.1612 [ 258.175740][ T7105] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=514 sclass=netlink_route_socket pid=7105 comm=syz.1.1619 [ 259.550560][ T29] audit: type=1400 audit(259.460:261): avc: denied { create } for pid=7158 comm="syz.1.1646" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 259.559848][ T29] audit: type=1400 audit(259.470:262): avc: denied { connect } for pid=7158 comm="syz.1.1646" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 260.653935][ T29] audit: type=1400 audit(260.570:263): avc: denied { create } for pid=7173 comm="syz.0.1653" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 263.866644][ T7243] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2 sclass=netlink_route_socket pid=7243 comm=syz.1.1687 [ 264.643128][ T7281] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2 sclass=netlink_route_socket pid=7281 comm=syz.0.1703 [ 265.078966][ T7301] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 266.404599][ T29] audit: type=1400 audit(266.320:264): avc: denied { getopt } for pid=7352 comm="syz.1.1741" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 266.625860][ T29] audit: type=1400 audit(266.540:265): avc: denied { getopt } for pid=7360 comm="syz.0.1744" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 266.680718][ T29] audit: type=1400 audit(266.590:266): avc: denied { audit_read } for pid=7363 comm="syz.1.1745" capability=37 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 271.545583][ T29] audit: type=1400 audit(271.460:267): avc: denied { getopt } for pid=7471 comm="syz.0.1799" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 272.198620][ T29] audit: type=1400 audit(272.110:268): avc: denied { recv } for pid=3099 comm="syz-executor" saddr=127.0.0.1 src=50450 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 272.243582][ T29] audit: type=1400 audit(272.160:269): avc: denied { recv } for pid=45 comm="kworker/1:1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50450 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 281.552937][ T29] audit: type=1400 audit(281.460:270): avc: denied { execute } for pid=7518 comm="syz.0.1822" name="file0" dev="tmpfs" ino=4802 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 285.112988][ T11] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 285.263003][ T11] usb 1-1: Using ep0 maxpacket: 32 [ 285.306909][ T11] usb 1-1: config 0 has an invalid interface number: 51 but max is 0 [ 285.307421][ T11] usb 1-1: config 0 has no interface number 0 [ 285.348499][ T11] usb 1-1: New USB device found, idVendor=061d, idProduct=c150, bcdDevice=ce.6f [ 285.348837][ T11] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 285.349201][ T11] usb 1-1: Product: syz [ 285.349253][ T11] usb 1-1: Manufacturer: syz [ 285.349326][ T11] usb 1-1: SerialNumber: syz [ 285.413742][ T11] usb 1-1: config 0 descriptor?? [ 285.456550][ T11] quatech2 1-1:0.51: Quatech 2nd gen USB to Serial Driver converter detected [ 285.686077][ T11] usb 1-1: Quatech 2nd gen USB to Serial Driver converter now attached to ttyUSB0 [ 285.723948][ T11] usb 1-1: Quatech 2nd gen USB to Serial Driver converter now attached to ttyUSB1 [ 286.105350][ C0] usb 1-1: qt2_read_bulk_callback - non-zero urb status: -71 [ 286.153761][ T23] usb 1-1: USB disconnect, device number 2 [ 286.188711][ T23] quatech-serial ttyUSB0: Quatech 2nd gen USB to Serial Driver converter now disconnected from ttyUSB0 [ 286.196911][ T23] quatech-serial ttyUSB1: Quatech 2nd gen USB to Serial Driver converter now disconnected from ttyUSB1 [ 286.200024][ T23] quatech2 1-1:0.51: device disconnected [ 293.893848][ T29] audit: type=1400 audit(293.810:271): avc: denied { mount } for pid=7706 comm="syz.0.1899" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 297.939084][ T29] audit: type=1400 audit(297.850:272): avc: denied { watch } for pid=7760 comm="syz.1.1925" path="/927" dev="tmpfs" ino=4735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 301.929532][ T29] audit: type=1400 audit(301.840:273): avc: denied { create } for pid=7818 comm="syz.1.1952" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 301.948331][ T29] audit: type=1400 audit(301.860:274): avc: denied { write } for pid=7818 comm="syz.1.1952" name="file0" dev="tmpfs" ino=4815 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 301.970235][ T29] audit: type=1400 audit(301.880:275): avc: denied { unlink } for pid=3105 comm="syz-executor" name="file0" dev="tmpfs" ino=4815 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 302.153319][ T29] audit: type=1400 audit(302.070:276): avc: denied { write } for pid=7826 comm="syz.1.1957" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 302.157414][ T29] audit: type=1400 audit(302.070:277): avc: denied { read } for pid=7826 comm="syz.1.1957" path="socket:[16082]" dev="sockfs" ino=16082 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 302.433456][ T29] audit: type=1400 audit(302.350:278): avc: denied { nlmsg_tty_audit } for pid=7838 comm="syz.1.1963" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 302.523999][ T29] audit: type=1400 audit(302.440:279): avc: denied { read } for pid=7841 comm="syz.0.1964" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 304.340224][ T7922] faux_driver vkms: [drm] Unknown color mode 6144; guessing buffer size. [ 306.966718][ T29] audit: type=1400 audit(306.880:280): avc: denied { lock } for pid=7956 comm="syz.0.2020" path="socket:[15359]" dev="sockfs" ino=15359 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 307.161588][ T29] audit: type=1400 audit(307.070:281): avc: denied { lock } for pid=7963 comm="syz.0.2024" path="socket:[16397]" dev="sockfs" ino=16397 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=udp_socket permissive=1 [ 315.479247][ T29] audit: type=1400 audit(315.390:282): avc: denied { create } for pid=8089 comm="syz.1.2086" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 315.490283][ T29] audit: type=1400 audit(315.400:283): avc: denied { write } for pid=8089 comm="syz.1.2086" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 315.861045][ T29] audit: type=1400 audit(315.770:284): avc: denied { map } for pid=8106 comm="syz.0.2094" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=17600 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 315.872966][ T29] audit: type=1400 audit(315.770:285): avc: denied { read write } for pid=8106 comm="syz.0.2094" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=17600 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 315.879436][ T29] audit: type=1400 audit(315.790:286): avc: denied { getattr } for pid=8106 comm="syz.0.2094" name="[io_uring]" dev="anon_inodefs" ino=17600 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 319.605610][ T8175] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8175 comm=syz.0.2126 [ 322.916564][ T29] audit: type=1400 audit(322.830:287): avc: denied { ioctl } for pid=8244 comm="syz.1.2159" path="socket:[17822]" dev="sockfs" ino=17822 ioctlcmd=0x4b66 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 324.315541][ T29] audit: type=1400 audit(324.230:288): avc: denied { ioctl } for pid=8274 comm="syz.0.2173" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=17832 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 325.951240][ T29] audit: type=1400 audit(325.860:289): avc: denied { write } for pid=8313 comm="syz.0.2192" path="socket:[17039]" dev="sockfs" ino=17039 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 328.345838][ T29] audit: type=1400 audit(328.260:290): avc: denied { remount } for pid=8389 comm="syz.1.2230" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=filesystem permissive=1 [ 328.364484][ T29] audit: type=1400 audit(328.280:291): avc: denied { unmount } for pid=3105 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=filesystem permissive=1 [ 328.870600][ T8403] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8403 comm=syz.1.2236 [ 329.285988][ T29] audit: type=1400 audit(329.200:292): avc: denied { getopt } for pid=8412 comm="syz.1.2241" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 330.284829][ T8445] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=8445 comm=syz.0.2257 [ 332.585145][ T29] audit: type=1400 audit(332.500:293): avc: denied { setopt } for pid=8494 comm="syz.1.2281" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 345.157086][ T29] audit: type=1400 audit(345.070:294): avc: denied { getopt } for pid=8679 comm="syz.0.2370" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 345.390548][ T29] audit: type=1400 audit(345.300:295): avc: denied { getopt } for pid=8685 comm="syz.0.2373" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 347.895677][ T29] audit: type=1400 audit(347.810:296): avc: denied { ioctl } for pid=8700 comm="syz.0.2380" path="socket:[19599]" dev="sockfs" ino=19599 ioctlcmd=0x8918 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 354.820640][ T29] audit: type=1400 audit(354.730:297): avc: denied { nlmsg_read } for pid=8775 comm="syz.1.2414" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 355.105861][ T29] audit: type=1400 audit(355.020:298): avc: denied { write } for pid=8779 comm="syz.1.2416" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 355.105901][ T8780] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=8780 comm=syz.1.2416 [ 355.791310][ T29] audit: type=1400 audit(355.700:299): avc: denied { setopt } for pid=8769 comm="syz.0.2413" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 356.245006][ T8805] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8805 comm=syz.1.2428 [ 359.499576][ T29] audit: type=1400 audit(359.410:300): avc: denied { ioctl } for pid=8909 comm="syz.1.2480" path="socket:[19968]" dev="sockfs" ino=19968 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 365.969087][ T29] audit: type=1400 audit(365.880:301): avc: denied { setopt } for pid=9011 comm="syz.1.2528" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 370.844404][ T9085] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=9085 comm=syz.1.2562 [ 370.995328][ T29] audit: type=1400 audit(370.910:302): avc: denied { mounton } for pid=9089 comm="syz.0.2566" path="/dev/binderfs" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 371.259968][ T9098] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=9098 comm=syz.0.2569 [ 374.170530][ T9110] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=9110 comm=syz.1.2575 [ 379.655574][ T9273] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9273 comm=syz.1.2656 [ 399.857324][ T9543] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=9543 comm=syz.1.2785 [ 400.434383][ T9564] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=9564 comm=syz.0.2796 [ 404.112411][ C1] hrtimer: interrupt took 6784096 ns [ 434.608166][ T9973] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9973 comm=syz.0.2991 [ 438.599984][T10057] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=10057 comm=syz.0.3033 [ 468.485261][T10464] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=1024 sclass=netlink_tcpdiag_socket pid=10464 comm=syz.0.3234 [ 472.921313][T10524] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=1024 sclass=netlink_tcpdiag_socket pid=10524 comm=syz.1.3264 [ 476.844113][ T29] audit: type=1400 audit(476.760:303): avc: denied { bind } for pid=10590 comm="syz.1.3297" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 477.370706][T10607] input input6: cannot allocate more than FF_MAX_EFFECTS effects [ 492.310064][ T29] audit: type=1400 audit(492.220:304): avc: denied { getopt } for pid=10908 comm="syz.1.3453" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 500.150437][ T29] audit: type=1400 audit(500.060:305): avc: denied { getopt } for pid=11079 comm="syz.0.3535" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 924.282218][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 430s! [syz.1.2218:8366] [ 924.282415][ C0] Modules linked in: [ 924.283177][ C0] CPU: 0 UID: 0 PID: 8366 Comm: syz.1.2218 Tainted: G L syzkaller #0 PREEMPT [ 924.283338][ C0] Tainted: [L]=SOFTLOCKUP [ 924.283363][ C0] Hardware name: ARM-Versatile Express [ 924.283494][ C0] PC is at _raw_spin_unlock_irq+0x28/0x54 [ 924.284152][ C0] LR is at tmigr_handle_remote_up+0x268/0x4b0 [ 924.284183][ C0] pc : [<81a8bc8c>] lr : [<803460dc>] psr: 60000113 [ 924.284203][ C0] sp : df801e08 ip : df801e18 fp : df801e14 [ 924.284219][ C0] r10: 00000001 r9 : 00000075 r8 : 493e6700 [ 924.284239][ C0] r7 : ddddb488 r6 : df801ee0 r5 : 830bf3b0 r4 : 830bf380 [ 924.284259][ C0] r3 : 0000ff71 r2 : 00000101 r1 : 830bf3b0 r0 : ddddb488 [ 924.284329][ C0] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 924.284370][ C0] Control: 30c5387d Table: 85994580 DAC: fffffffd [ 924.284430][ C0] Call trace: frame pointer underflow [ 924.284595][ C0] [<81a8bc64>] (_raw_spin_unlock_irq) from [<803460dc>] (tmigr_handle_remote_up+0x268/0x4b0) [ 924.284793][ C0] [<80345e74>] (tmigr_handle_remote_up) from [<8034438c>] (__walk_groups_from+0x3c/0xe4) [ 924.284852][ C0] r10:8330bc00 r9:8280c820 r8:80345e74 r7:df801ee0 r6:830bf380 r5:00000002 [ 924.284871][ C0] r4:830bf380 [ 924.284882][ C0] [<80344350>] (__walk_groups_from) from [<80346724>] (tmigr_handle_remote+0xe8/0x108) [ 924.284915][ C0] r9:82804d80 r8:00000100 r7:00000001 r6:00000002 r5:00000002 r4:dddc7488 [ 924.284924][ C0] [<8034663c>] (tmigr_handle_remote) from [<803268f8>] (run_timer_softirq+0x30/0x34) [ 924.284951][ C0] r4:82804084 [ 924.284958][ C0] [<803268c8>] (run_timer_softirq) from [<8025aeb8>] (handle_softirqs+0x140/0x458) [ 924.284984][ C0] [<8025ad78>] (handle_softirqs) from [<8025b32c>] (__irq_exit_rcu+0x110/0x1d0) [ 924.285021][ C0] r10:00006364 r9:00000000 r8:00000000 r7:ec6cdfb0 r6:82442b28 r5:8247dd4c [ 924.285032][ C0] r4:8330bc00 [ 924.285039][ C0] [<8025b21c>] (__irq_exit_rcu) from [<8025b6a4>] (irq_exit+0x10/0x18) [ 924.285065][ C0] r5:8247dd4c r4:826c2a9c [ 924.285072][ C0] [<8025b694>] (irq_exit) from [<81a7d8c4>] (generic_handle_arch_irq+0x7c/0x80) [ 924.285097][ C0] [<81a7d848>] (generic_handle_arch_irq) from [<81a4d9a4>] (call_with_stack+0x1c/0x20) [ 924.285131][ C0] r9:00000000 r8:826b8044 r7:8330bc00 r6:ffffffff r5:20000010 r4:000194ac [ 924.285143][ C0] [<81a4d988>] (call_with_stack) from [<80200f68>] (__irq_usr+0x88/0xa0) [ 924.285211][ C0] Exception stack(0xec6cdfb0 to 0xec6cdff8) [ 924.285312][ C0] dfa0: ffffffff 00000004 000001e4 00000000 [ 924.285338][ C0] dfc0: 00000000 00000000 00000000 00000000 00300000 00000000 00006364 76f3c0bc [ 924.285353][ C0] dfe0: 20001550 20001550 000194ac 000194ac 20000010 ffffffff [ 924.285568][ C0] Sending NMI from CPU 0 to CPUs 1: [ 924.286172][ C1] NMI backtrace for cpu 1 [ 924.286424][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G L syzkaller #0 PREEMPT [ 924.286503][ C1] Tainted: [L]=SOFTLOCKUP [ 924.286532][ C1] Hardware name: ARM-Versatile Express [ 924.286556][ C1] PC is at _raw_spin_lock+0x40/0x58 [ 924.286631][ C1] LR is at _raw_spin_lock+0x18/0x58 [ 924.286677][ C1] pc : [<81a8be44>] lr : [<81a8be1c>] psr: 80000113 [ 924.286715][ C1] sp : df805d68 ip : df805d68 fp : df805d7c [ 924.286746][ C1] r10: 81c05450 r9 : 84077440 r8 : 840a7288 [ 924.286766][ C1] r7 : 84077568 r6 : 00000001 r5 : 00000001 r4 : 84077568 [ 924.286786][ C1] r3 : 0000bc03 r2 : 0000bc04 r1 : 00000000 r0 : 00000001 [ 924.286811][ C1] Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 924.286888][ C1] Control: 30c5387d Table: 85164100 DAC: 00000000 [ 924.286911][ C1] Call trace: frame pointer underflow [ 924.286969][ C1] [<81a8be04>] (_raw_spin_lock) from [<809c4ab0>] (gpio_mmio_set+0x44/0x80) [ 924.287074][ C1] r5:00000001 r4:84077440 [ 924.287110][ C1] [<809c4a6c>] (gpio_mmio_set) from [<809b543c>] (gpiochip_set+0x1c/0x44) [ 924.287182][ C1] r7:00000001 r6:00000000 r5:00000000 r4:84109300 [ 924.287200][ C1] [<809b5420>] (gpiochip_set) from [<809b7c54>] (gpiod_set_raw_value_commit+0x78/0x218) [ 924.287254][ C1] [<809b7bdc>] (gpiod_set_raw_value_commit) from [<809b94f4>] (gpiod_set_value_nocheck+0x44/0x58) [ 924.287326][ C1] r10:81c05450 r9:df805ebc r8:00000102 r7:00004f94 r6:00000007 r5:00000001 [ 924.287347][ C1] r4:84109300 [ 924.287364][ C1] [<809b94b0>] (gpiod_set_value_nocheck) from [<809b9544>] (gpiod_set_value+0x3c/0x88) [ 924.287413][ C1] [<809b9508>] (gpiod_set_value) from [<809c9bac>] (gpio_led_set+0x5c/0x60) [ 924.287470][ C1] r5:832f0044 r4:832f0044 [ 924.287486][ C1] [<809c9b50>] (gpio_led_set) from [<809c7458>] (led_set_brightness_nosleep+0x38/0x44) [ 924.287536][ C1] r5:832f0044 r4:830d2d4c [ 924.287551][ C1] [<809c7420>] (led_set_brightness_nosleep) from [<809ca4a8>] (led_heartbeat_function+0x84/0x144) [ 924.287599][ C1] [<809ca424>] (led_heartbeat_function) from [<80326268>] (call_timer_fn+0x30/0x220) [ 924.287661][ C1] r7:00004f94 r6:809ca424 r5:830d2d4c r4:83216000 [ 924.287679][ C1] [<80326238>] (call_timer_fn) from [<8032671c>] (__run_timers+0x2c4/0x3f8) [ 924.287754][ C1] r9:df805ebc r8:00004f94 r7:00000000 r6:809ca424 r5:dddd9f00 r4:830d2d4c [ 924.287775][ C1] [<80326458>] (__run_timers) from [<803268b8>] (run_timer_base+0x68/0x78) [ 924.287863][ C1] r10:83216000 r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 [ 924.287885][ C1] r4:dddd9f00 [ 924.287902][ C1] [<80326850>] (run_timer_base) from [<803268e4>] (run_timer_softirq+0x1c/0x34) [ 924.287963][ C1] r4:82804084 [ 924.287980][ C1] [<803268c8>] (run_timer_softirq) from [<8025aeb8>] (handle_softirqs+0x140/0x458) [ 924.288058][ C1] [<8025ad78>] (handle_softirqs) from [<8025b32c>] (__irq_exit_rcu+0x110/0x1d0) [ 924.288126][ C1] r10:00000000 r9:83216000 r8:00000000 r7:df865df8 r6:82442b28 r5:8247dd4c [ 924.288146][ C1] r4:83216000 [ 924.288162][ C1] [<8025b21c>] (__irq_exit_rcu) from [<8025b6a4>] (irq_exit+0x10/0x18) [ 924.288222][ C1] r5:8247dd4c r4:826c2a9c [ 924.288240][ C1] [<8025b694>] (irq_exit) from [<81a7d8c4>] (generic_handle_arch_irq+0x7c/0x80) [ 924.288306][ C1] [<81a7d848>] (generic_handle_arch_irq) from [<81a4d9a4>] (call_with_stack+0x1c/0x20) [ 924.288380][ C1] r9:83216000 r8:840a7288 r7:df865e2c r6:ffffffff r5:60000013 r4:80234eac [ 924.288413][ C1] [<81a4d988>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc) [ 924.288471][ C1] Exception stack(0xdf865df8 to 0xdf865e40) [ 924.288506][ C1] 5de0: e020f008 0000000c [ 924.288538][ C1] 5e00: 0000bc03 00000000 e020f008 0000000c 00000001 84077568 840a7288 84077440 [ 924.288567][ C1] 5e20: 00000000 df865e54 df865e58 df865e48 809c52ac 80234eac 60000013 ffffffff [ 924.288586][ C1] [<80234e88>] (arm_heavy_mb) from [<809c52ac>] (gpio_mmio_write32+0x1c/0x24) [ 924.288639][ C1] [<809c5290>] (gpio_mmio_write32) from [<809c4ad0>] (gpio_mmio_set+0x64/0x80) [ 924.288713][ C1] r5:00000008 r4:84077440 [ 924.288744][ C1] [<809c4a6c>] (gpio_mmio_set) from [<809b543c>] (gpiochip_set+0x1c/0x44) [ 924.288827][ C1] r7:00000001 r6:00000000 r5:00000003 r4:8410933c [ 924.288857][ C1] [<809b5420>] (gpiochip_set) from [<809b7c54>] (gpiod_set_raw_value_commit+0x78/0x218) [ 924.288914][ C1] [<809b7bdc>] (gpiod_set_raw_value_commit) from [<809b94f4>] (gpiod_set_value_nocheck+0x44/0x58) [ 924.288985][ C1] r10:00000000 r9:00000000 r8:00000001 r7:ddde24c0 r6:833d9558 r5:00000001 [ 924.289020][ C1] r4:8410933c [ 924.289037][ C1] [<809b94b0>] (gpiod_set_value_nocheck) from [<809b9544>] (gpiod_set_value+0x3c/0x88) [ 924.289084][ C1] [<809b9508>] (gpiod_set_value) from [<809c9bac>] (gpio_led_set+0x5c/0x60) [ 924.289152][ C1] r5:000000ff r4:832f0314 [ 924.289182][ C1] [<809c9b50>] (gpio_led_set) from [<809c74e8>] (led_set_brightness+0x84/0x90) [ 924.289237][ C1] r5:000000ff r4:832f0314 [ 924.289257][ C1] [<809c7464>] (led_set_brightness) from [<809c9054>] (led_trigger_event+0x40/0x58) [ 924.289313][ C1] r5:000000ff r4:832f0314 [ 924.289330][ C1] [<809c9014>] (led_trigger_event) from [<809ca6b0>] (ledtrig_cpu+0xac/0xf4) [ 924.289399][ C1] r7:ddde24c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 924.289419][ C1] [<809ca604>] (ledtrig_cpu) from [<80227758>] (arch_cpu_idle_exit+0x14/0x18) [ 924.289484][ C1] r9:00000000 r8:00000001 r7:8280c710 r6:83216000 r5:8280c6d0 r4:00000001 [ 924.289504][ C1] [<80227744>] (arch_cpu_idle_exit) from [<802b0e84>] (do_idle+0x5c/0x2d8) [ 924.289557][ C1] [<802b0e28>] (do_idle) from [<802b1430>] (cpu_startup_entry+0x30/0x34) [ 924.289629][ C1] r10:00000000 r9:414fc0f0 r8:80003000 r7:82a7b4a4 r6:83216000 r5:00000001 [ 924.289653][ C1] r4:00000092 [ 924.289672][ C1] [<802b1400>] (cpu_startup_entry) from [<8022f04c>] (secondary_start_kernel+0x128/0x180) [ 924.289737][ C1] [<8022ef24>] (secondary_start_kernel) from [<80220094>] (__enable_mmu+0x0/0xc) [ 924.289808][ C1] r7:82a7b4a4 r6:30c0387d r5:00000000 r4:830b7bc0 [ 924.291328][ C0] Kernel panic - not syncing: softlockup: hung tasks [ 924.312456][ C0] CPU: 0 UID: 0 PID: 8366 Comm: syz.1.2218 Tainted: G L syzkaller #0 PREEMPT [ 924.312695][ C0] Tainted: [L]=SOFTLOCKUP [ 924.312784][ C0] Hardware name: ARM-Versatile Express [ 924.312938][ C0] Call trace: frame pointer underflow [ 924.313176][ C0] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 924.313396][ C0] r7:82295294 r6:8330bc00 r5:00000000 r4:82294458 [ 924.313517][ C0] [<80201b08>] (show_stack) from [<8021ec54>] (dump_stack_lvl+0x54/0x7c) [ 924.313681][ C0] [<8021ec00>] (dump_stack_lvl) from [<8021ec94>] (dump_stack+0x18/0x1c) [ 924.313849][ C0] r5:00000000 r4:82a7bd14 [ 924.313941][ C0] [<8021ec7c>] (dump_stack) from [<802025f8>] (vpanic+0xe0/0x2e8) [ 924.314103][ C0] [<80202518>] (vpanic) from [<80202834>] (trace_suspend_resume+0x0/0xd8) [ 924.314258][ C0] r7:82ac27f0 [ 924.314323][ C0] [<80202800>] (panic) from [<8038317c>] (watchdog_timer_fn+0x2bc/0x330) [ 924.314483][ C0] r3:00000001 r2:00004000 r1:82a7bd1c r0:82295294 [ 924.314593][ C0] [<80382ec0>] (watchdog_timer_fn) from [<80328e5c>] (__hrtimer_run_queues+0x1c4/0x454) [ 924.314768][ C0] r10:8330bc00 r9:00000000 r8:dddc7130 r7:80382ec0 r6:dddc7000 r5:dddc7040 [ 924.314993][ C0] r4:dddc75d8 [ 924.315079][ C0] [<80328c98>] (__hrtimer_run_queues) from [<8032a460>] (hrtimer_interrupt+0x148/0x2bc) [ 924.315261][ C0] r10:2e9f0440 r9:dddc7180 r8:dddc7130 r7:000000d7 r6:00000003 r5:20000193 [ 924.315403][ C0] r4:dddc7000 [ 924.315474][ C0] [<8032a318>] (hrtimer_interrupt) from [<8131e118>] (arch_timer_handler_virt+0x30/0x38) [ 924.315655][ C0] r10:81d0f874 r9:8309e400 r8:00000000 r7:00000000 r6:00000000 r5:82497528 [ 924.315791][ C0] r4:8309de40 [ 924.315859][ C0] [<8131e0e8>] (arch_timer_handler_virt) from [<802ef008>] (handle_percpu_devid_irq+0x128/0x34c) [ 924.316051][ C0] [<802eeee0>] (handle_percpu_devid_irq) from [<802e81ac>] (handle_irq_desc+0x74/0x84) [ 924.316295][ C0] r10:00000001 r9:8330bc00 r8:00000000 r7:df80a00c r6:826c1388 r5:df80a000 [ 924.316444][ C0] r4:8280cc44 [ 924.316517][ C0] [<802e8138>] (handle_irq_desc) from [<802e8228>] (generic_handle_domain_irq+0x18/0x1c) [ 924.316727][ C0] [<802e8210>] (generic_handle_domain_irq) from [<802012c8>] (gic_handle_irq+0x68/0x7c) [ 924.316912][ C0] [<80201260>] (gic_handle_irq) from [<81a7d8a8>] (generic_handle_arch_irq+0x60/0x80) [ 924.317103][ C0] r7:df801db8 r6:82442b28 r5:8247dd4c r4:826c2a9c [ 924.317212][ C0] [<81a7d848>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 924.317374][ C0] Exception stack(0xdf801db8 to 0xdf801e00) [ 924.317485][ C0] 1da0: ddddb488 830bf3b0 [ 924.317632][ C0] 1dc0: 00000101 0000ff71 830bf380 830bf3b0 df801ee0 ddddb488 493e6700 00000075 [ 924.317779][ C0] 1de0: 00000001 df801e14 df801e18 df801e08 803460dc 81a8bc8c 60000113 ffffffff [ 924.317928][ C0] r9:8330bc00 r8:493e6700 r7:df801dec r6:ffffffff r5:60000113 r4:81a8bc8c [ 924.318071][ C0] [<81a8bc64>] (_raw_spin_unlock_irq) from [<803460dc>] (tmigr_handle_remote_up+0x268/0x4b0) [ 924.318246][ C0] [<80345e74>] (tmigr_handle_remote_up) from [<8034438c>] (__walk_groups_from+0x3c/0xe4) [ 924.318433][ C0] r10:8330bc00 r9:8280c820 r8:80345e74 r7:df801ee0 r6:830bf380 r5:00000002 [ 924.318579][ C0] r4:830bf380 [ 924.318651][ C0] [<80344350>] (__walk_groups_from) from [<80346724>] (tmigr_handle_remote+0xe8/0x108) [ 924.318892][ C0] r9:82804d80 r8:00000100 r7:00000001 r6:00000002 r5:00000002 r4:dddc7488 [ 924.319060][ C0] [<8034663c>] (tmigr_handle_remote) from [<803268f8>] (run_timer_softirq+0x30/0x34) [ 924.319273][ C0] r4:82804084 [ 924.319367][ C0] [<803268c8>] (run_timer_softirq) from [<8025aeb8>] (handle_softirqs+0x140/0x458) [ 924.319533][ C0] [<8025ad78>] (handle_softirqs) from [<8025b32c>] (__irq_exit_rcu+0x110/0x1d0) [ 924.319699][ C0] r10:00006364 r9:00000000 r8:00000000 r7:ec6cdfb0 r6:82442b28 r5:8247dd4c [ 924.319861][ C0] r4:8330bc00 [ 924.319933][ C0] [<8025b21c>] (__irq_exit_rcu) from [<8025b6a4>] (irq_exit+0x10/0x18) [ 924.320100][ C0] r5:8247dd4c r4:826c2a9c [ 924.320201][ C0] [<8025b694>] (irq_exit) from [<81a7d8c4>] (generic_handle_arch_irq+0x7c/0x80) [ 924.320431][ C0] [<81a7d848>] (generic_handle_arch_irq) from [<81a4d9a4>] (call_with_stack+0x1c/0x20) [ 924.320626][ C0] r9:00000000 r8:826b8044 r7:8330bc00 r6:ffffffff r5:20000010 r4:000194ac [ 924.320766][ C0] [<81a4d988>] (call_with_stack) from [<80200f68>] (__irq_usr+0x88/0xa0) [ 924.320923][ C0] Exception stack(0xec6cdfb0 to 0xec6cdff8) [ 924.321044][ C0] dfa0: ffffffff 00000004 000001e4 00000000 [ 924.321199][ C0] dfc0: 00000000 00000000 00000000 00000000 00300000 00000000 00006364 76f3c0bc [ 924.321352][ C0] dfe0: 20001550 20001550 000194ac 000194ac 20000010 ffffffff [ 924.323606][ C0] Rebooting in 86400 seconds..