last executing test programs: 702.166419ms ago: executing program 1 (id=4662): r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000080), 0x8, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_FD(r0, 0x5450, 0x0) 610.722091ms ago: executing program 1 (id=4663): r0 = socket(0xa, 0x1, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000002f00)={0x0, 0x0, &(0x7f0000002ec0)={&(0x7f0000000140)={{0x14}, [], {0x14}}, 0x28}}, 0x400c084) 551.796869ms ago: executing program 1 (id=4665): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_LOGICAL_INO(r0, 0x5450, 0x0) 460.91025ms ago: executing program 0 (id=4666): r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/profiling', 0x141b82, 0x180) write$P9_RCREATE(r0, &(0x7f0000000080)={0x18, 0x73, 0x1, {{0x10, 0x1, 0x4}, 0x101}}, 0x18) 460.778681ms ago: executing program 1 (id=4667): r0 = epoll_create1(0x0) ioctl$TIOCL_SETVESABLANK(r0, 0x5450, 0x0) 371.455572ms ago: executing program 0 (id=4668): r0 = open(&(0x7f0000000380)='./file0\x00', 0xa2441, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x5450, 0x0) 261.951606ms ago: executing program 0 (id=4669): r0 = inotify_init() ioctl$AUTOFS_IOC_SETTIMEOUT(r0, 0x5451, 0x0) 261.839056ms ago: executing program 1 (id=4670): pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80) ioctl$NBD_SET_SIZE(r0, 0x5761, 0xfffffff3) 193.140385ms ago: executing program 1 (id=4674): r0 = syz_usb_connect$rtl8150(0x0, 0x3f, &(0x7f0000001d40)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xbda, 0x8150, 0x0, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d}}]}}, 0x0) syz_usb_disconnect(r0) 192.987425ms ago: executing program 0 (id=4671): r0 = landlock_create_ruleset(&(0x7f0000000040)={0xa0c0, 0x3, 0x3}, 0x18, 0x0) ioctl$F2FS_IOC_FLUSH_DEVICE(r0, 0x5451, 0x0) 80.690639ms ago: executing program 0 (id=4672): r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETAF(r0, 0x5450, 0x0) 0s ago: executing program 0 (id=4673): r0 = openat$yama_ptrace_scope(0xffffff9c, &(0x7f0000000200), 0x2, 0x0) write$P9_RLINK(r0, 0x0, 0x0) kernel console output (not intermixed with test programs): [ 45.069388][ T29] audit: type=1400 audit(45.000:56): avc: denied { read write } for pid=3084 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 45.086852][ T29] audit: type=1400 audit(45.020:57): avc: denied { open } for pid=3084 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:10472' (ED25519) to the list of known hosts. [ 63.844811][ T29] audit: type=1400 audit(63.770:58): avc: denied { name_bind } for pid=3092 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 66.064615][ T29] audit: type=1400 audit(65.990:59): avc: denied { execute } for pid=3093 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 66.068340][ T29] audit: type=1400 audit(66.000:60): avc: denied { execute_no_trans } for pid=3093 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 68.962477][ T29] audit: type=1400 audit(68.890:61): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 68.968143][ T29] audit: type=1400 audit(68.900:62): avc: denied { mount } for pid=3093 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 68.984865][ T3093] cgroup: Unknown subsys name 'net' [ 68.993328][ T29] audit: type=1400 audit(68.920:63): avc: denied { unmount } for pid=3093 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 69.210922][ T3093] cgroup: Unknown subsys name 'cpuset' [ 69.219081][ T3093] cgroup: Unknown subsys name 'hugetlb' [ 69.219887][ T3093] cgroup: Unknown subsys name 'rlimit' [ 69.418553][ T29] audit: type=1400 audit(69.350:64): avc: denied { setattr } for pid=3093 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 69.421941][ T29] audit: type=1400 audit(69.350:65): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 69.425978][ T29] audit: type=1400 audit(69.360:66): avc: denied { mount } for pid=3093 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 69.648728][ T3095] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 69.652859][ T29] audit: type=1400 audit(69.580:67): avc: denied { relabelto } for pid=3095 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 69.660342][ T29] audit: type=1400 audit(69.590:68): avc: denied { write } for pid=3095 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 69.702258][ T29] audit: type=1400 audit(69.630:69): avc: denied { read } for pid=3093 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 69.706928][ T29] audit: type=1400 audit(69.640:70): avc: denied { open } for pid=3093 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 78.018748][ T3093] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 80.047574][ T29] audit: type=1400 audit(79.980:71): avc: denied { execmem } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 80.111497][ T29] audit: type=1400 audit(80.040:72): avc: denied { read } for pid=3098 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 80.116113][ T29] audit: type=1400 audit(80.040:73): avc: denied { open } for pid=3098 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 80.127303][ T29] audit: type=1400 audit(80.060:74): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 80.161871][ T29] audit: type=1400 audit(80.090:75): avc: denied { module_request } for pid=3099 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 80.163549][ T29] audit: type=1400 audit(80.090:76): avc: denied { module_request } for pid=3098 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 80.240401][ T29] audit: type=1400 audit(80.170:77): avc: denied { sys_module } for pid=3098 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 80.921311][ T29] audit: type=1400 audit(80.850:78): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 82.042237][ T3098] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 82.067445][ T3098] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 82.089053][ T3099] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 82.097453][ T3099] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 82.991966][ T3099] hsr_slave_0: entered promiscuous mode [ 82.995835][ T3099] hsr_slave_1: entered promiscuous mode [ 83.007851][ T3098] hsr_slave_0: entered promiscuous mode [ 83.009687][ T3098] hsr_slave_1: entered promiscuous mode [ 83.011014][ T3098] debugfs: 'hsr0' already exists in 'hsr' [ 83.011540][ T3098] Cannot create hsr debugfs directory [ 83.517059][ T29] audit: type=1400 audit(83.450:79): avc: denied { create } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 83.522164][ T29] audit: type=1400 audit(83.450:80): avc: denied { write } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 83.540080][ T3099] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 83.562699][ T3099] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 83.596267][ T3099] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 83.608541][ T3099] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 83.623020][ T3098] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 83.662546][ T3098] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 83.681698][ T3098] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 83.690845][ T3098] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 84.296533][ T3099] 8021q: adding VLAN 0 to HW filter on device bond0 [ 84.366375][ T3098] 8021q: adding VLAN 0 to HW filter on device bond0 [ 87.068252][ T3099] veth0_vlan: entered promiscuous mode [ 87.083379][ T3099] veth1_vlan: entered promiscuous mode [ 87.168567][ T3099] veth0_macvtap: entered promiscuous mode [ 87.180468][ T3099] veth1_macvtap: entered promiscuous mode [ 87.189027][ T3098] veth0_vlan: entered promiscuous mode [ 87.222975][ T3098] veth1_vlan: entered promiscuous mode [ 87.292411][ T12] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.293223][ T12] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.293361][ T12] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.293437][ T12] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.404271][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 87.405179][ T29] audit: type=1400 audit(87.320:82): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 87.409023][ T3098] veth0_macvtap: entered promiscuous mode [ 87.426904][ T29] audit: type=1400 audit(87.360:83): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/syzkaller.OKHtSD/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 87.431384][ T29] audit: type=1400 audit(87.360:84): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 87.439186][ T3098] veth1_macvtap: entered promiscuous mode [ 87.454688][ T29] audit: type=1400 audit(87.380:85): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/syzkaller.OKHtSD/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 87.458558][ T29] audit: type=1400 audit(87.390:86): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/syzkaller.OKHtSD/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=891 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 87.488404][ T29] audit: type=1400 audit(87.420:87): avc: denied { unmount } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 87.500893][ T29] audit: type=1400 audit(87.430:88): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 87.502654][ T29] audit: type=1400 audit(87.430:89): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="gadgetfs" ino=892 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 87.520747][ T29] audit: type=1400 audit(87.450:90): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 87.522466][ T29] audit: type=1400 audit(87.450:91): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 87.533079][ T2167] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.533475][ T2167] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.533649][ T2167] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.538283][ T2167] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.651924][ T3099] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 93.705301][ T3919] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3919 comm=syz.0.105 [ 95.206515][ T3985] mmap: syz.1.139 (3985) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 97.476986][ T29] kauditd_printk_skb: 8 callbacks suppressed [ 97.478744][ T29] audit: type=1400 audit(97.410:100): avc: granted { setsecparam } for pid=4071 comm="syz.0.182" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 98.348857][ T29] audit: type=1400 audit(98.280:101): avc: denied { write } for pid=4105 comm="syz.0.198" name="if_inet6" dev="proc" ino=4026532747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 98.650857][ T4118] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4118 comm=syz.0.204 [ 101.405418][ T29] audit: type=1400 audit(101.340:102): avc: denied { setopt } for pid=4234 comm="syz.1.262" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 103.955138][ T29] audit: type=1400 audit(103.890:103): avc: denied { append } for pid=4340 comm="syz.0.315" name="001" dev="devtmpfs" ino=689 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 105.869412][ T4423] capability: warning: `syz.0.355' uses 32-bit capabilities (legacy support in use) [ 106.056658][ T4432] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4432 comm=syz.1.360 [ 106.767097][ T29] audit: type=1400 audit(106.700:104): avc: denied { accept } for pid=4463 comm="syz.0.376" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 109.872795][ T4601] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4601 comm=syz.0.444 [ 109.955377][ T29] audit: type=1400 audit(109.890:105): avc: denied { lock } for pid=4604 comm="syz.0.446" path="socket:[5359]" dev="sockfs" ino=5359 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=udp_socket permissive=1 [ 110.690973][ T29] audit: type=1400 audit(110.620:106): avc: denied { write } for pid=4636 comm="syz.0.462" name="binder1" dev="binder" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 110.693479][ T29] audit: type=1400 audit(110.620:107): avc: denied { open } for pid=4636 comm="syz.0.462" path="/dev/binderfs/binder1" dev="binder" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 110.701234][ T29] audit: type=1400 audit(110.630:108): avc: denied { ioctl } for pid=4636 comm="syz.0.462" path="/dev/binderfs/binder1" dev="binder" ino=8 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 110.806315][ T29] audit: type=1400 audit(110.740:109): avc: denied { setattr } for pid=4640 comm="syz.0.464" name="" dev="pipefs" ino=5414 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 111.240350][ T4661] Zero length message leads to an empty skb [ 112.161347][ T4709] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4709 comm=syz.0.498 [ 115.096659][ T4855] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4855 comm=syz.1.570 [ 124.181221][ T29] audit: type=1400 audit(124.110:110): avc: denied { create } for pid=5208 comm="syz.1.746" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 124.189172][ T29] audit: type=1400 audit(124.120:111): avc: denied { write } for pid=5208 comm="syz.1.746" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 125.580161][ T5269] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5269 comm=syz.0.774 [ 125.821715][ T29] audit: type=1400 audit(125.750:112): avc: denied { audit_write } for pid=5278 comm="syz.1.780" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 126.592257][ T5311] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5311 comm=syz.1.796 [ 126.860455][ T5324] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5324 comm=syz.0.802 [ 126.942060][ T29] audit: type=1400 audit(126.870:113): avc: denied { unmount } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 128.192049][ T29] audit: type=1400 audit(128.120:114): avc: denied { create } for pid=5390 comm="syz.1.836" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 128.199118][ T29] audit: type=1400 audit(128.130:115): avc: denied { setopt } for pid=5390 comm="syz.1.836" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 132.429104][ T29] audit: type=1400 audit(132.360:116): avc: denied { name_bind } for pid=5513 comm="syz.0.897" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 132.429684][ T29] audit: type=1400 audit(132.360:117): avc: denied { node_bind } for pid=5513 comm="syz.0.897" saddr=172.20.20.170 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 132.797298][ T29] audit: type=1400 audit(132.730:118): avc: denied { nlmsg_write } for pid=5533 comm="syz.0.906" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 133.549440][ T5577] capability: warning: `syz.0.928' uses deprecated v2 capabilities in a way that may be insecure [ 133.724661][ T29] audit: type=1400 audit(133.650:119): avc: denied { write } for pid=5584 comm="syz.1.932" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 134.552498][ T29] audit: type=1400 audit(134.480:120): avc: denied { bpf } for pid=5623 comm="syz.0.951" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 135.626250][ T5675] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 136.184188][ T5709] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5709 comm=syz.1.994 [ 136.286809][ T5717] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5717 comm=syz.0.998 [ 136.503399][ T29] audit: type=1400 audit(136.430:121): avc: denied { setattr } for pid=5729 comm="syz.1.1005" name="nbd1" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 136.537378][ T29] audit: type=1400 audit(136.470:122): avc: denied { append } for pid=5732 comm="syz.0.1006" name="nbd0" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 137.347670][ T5777] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=5777 comm=syz.0.1028 [ 138.337166][ T29] audit: type=1400 audit(138.270:123): avc: denied { getopt } for pid=5821 comm="syz.0.1050" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 141.309737][ T29] audit: type=1400 audit(141.230:124): avc: denied { create } for pid=5971 comm="syz.0.1124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 149.158477][ T6189] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6189 comm=syz.1.1232 [ 149.467416][ T29] audit: type=1400 audit(149.400:125): avc: denied { ioctl } for pid=6199 comm="syz.0.1237" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 149.523493][ T29] audit: type=1400 audit(149.450:126): avc: denied { create } for pid=6201 comm="syz.1.1238" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 149.545445][ T29] audit: type=1400 audit(149.480:127): avc: denied { write } for pid=6201 comm="syz.1.1238" path="socket:[10096]" dev="sockfs" ino=10096 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 153.305659][ T6368] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 153.855302][ T6391] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6391 comm=syz.1.1333 [ 154.325462][ T29] audit: type=1400 audit(154.260:128): avc: denied { ioctl } for pid=6408 comm="syz.1.1341" path="socket:[11482]" dev="sockfs" ino=11482 ioctlcmd=0x894c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 155.958754][ T29] audit: type=1400 audit(155.890:129): avc: denied { create } for pid=6482 comm="syz.1.1379" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 158.252069][ T29] audit: type=1400 audit(158.180:130): avc: denied { create } for pid=6574 comm="syz.1.1425" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 158.260173][ T29] audit: type=1400 audit(158.190:131): avc: denied { ioctl } for pid=6574 comm="syz.1.1425" path="socket:[12463]" dev="sockfs" ino=12463 ioctlcmd=0x8902 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 164.469779][ T29] audit: type=1400 audit(164.400:132): avc: denied { create } for pid=6732 comm="syz.0.1502" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 165.970916][ T29] audit: type=1400 audit(165.900:133): avc: denied { setopt } for pid=6805 comm="syz.1.1539" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 166.786099][ T6824] veth0_macvtap: left promiscuous mode [ 166.793236][ T6824] macvtap0: entered allmulticast mode [ 167.324416][ T29] audit: type=1400 audit(167.250:134): avc: denied { create } for pid=6833 comm="syz.1.1553" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 167.329614][ T29] audit: type=1400 audit(167.260:135): avc: denied { setopt } for pid=6833 comm="syz.1.1553" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 167.553079][ T29] audit: type=1400 audit(167.480:136): avc: denied { create } for pid=6839 comm="syz.0.1556" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 167.566641][ T29] audit: type=1400 audit(167.500:137): avc: denied { ioctl } for pid=6839 comm="syz.0.1556" path="socket:[12221]" dev="sockfs" ino=12221 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 167.656962][ T29] audit: type=1400 audit(167.590:138): avc: denied { ioctl } for pid=6841 comm="syz.1.1557" path="socket:[12871]" dev="sockfs" ino=12871 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 172.415172][ T6849] vmalloc_node_range for size 536875008 failed: Address range restricted to 0xdf800000 - 0xff800000 [ 172.416644][ T6849] syz.0.1560: vmalloc error: size 536870912, vm_struct allocation failed, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=/,mems_allowed=0 [ 172.425340][ T6849] CPU: 0 UID: 0 PID: 6849 Comm: syz.0.1560 Not tainted syzkaller #0 PREEMPT [ 172.425676][ T6849] Hardware name: ARM-Versatile Express [ 172.425952][ T6849] Call trace: [ 172.426179][ T6849] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 172.427215][ T6849] r7:ffffffff r6:822b166c r5:60000113 r4:82295754 [ 172.427306][ T6849] [<80201b58>] (show_stack) from [<8021ee24>] (dump_stack_lvl+0x70/0x7c) [ 172.427364][ T6849] [<8021edb4>] (dump_stack_lvl) from [<8021ee48>] (dump_stack+0x18/0x1c) [ 172.427415][ T6849] r5:8581bc00 r4:00000000 [ 172.427431][ T6849] [<8021ee30>] (dump_stack) from [<80509bdc>] (warn_alloc+0xd8/0x180) [ 172.427479][ T6849] [<80509b04>] (warn_alloc) from [<804f80e0>] (__vmalloc_node_range_noprof+0xc0/0x654) [ 172.427533][ T6849] r3:20000000 r2:822b166c [ 172.427557][ T6849] r6:00000dc0 r5:822b16a4 r4:ff800000 [ 172.427573][ T6849] [<804f8020>] (__vmalloc_node_range_noprof) from [<8051b360>] (__kvmalloc_node_noprof+0x294/0x700) [ 172.427648][ T6849] r10:ea90dd58 r9:85b72000 r8:8581bc00 r7:00000000 r6:000002a8 r5:00000400 [ 172.427674][ T6849] r4:20000000 [ 172.427691][ T6849] [<8051b0cc>] (__kvmalloc_node_noprof) from [<8176c86c>] (xt_alloc_entry_offsets+0x28/0x34) [ 172.427757][ T6849] r10:ea90dd58 r9:85b72000 r8:00000000 r7:00000000 r6:000002a8 r5:85b72040 [ 172.427793][ T6849] r4:08000000 [ 172.427809][ T6849] [<8176c844>] (xt_alloc_entry_offsets) from [<818fb1d4>] (translate_table+0x70/0x78c) [ 172.427859][ T6849] [<818fb164>] (translate_table) from [<818fc3b0>] (do_replace+0xe8/0x5d0) [ 172.427914][ T6849] r10:b5403587 r9:85b72040 r8:00000000 r7:20000b60 r6:000002a8 r5:85b72000 [ 172.427942][ T6849] r4:85988f80 [ 172.427959][ T6849] [<818fc2c8>] (do_replace) from [<818fc9cc>] (do_ip6t_set_ctl+0x134/0x2a0) [ 172.428014][ T6849] r10:00000126 r9:8581bc00 r8:00000308 r7:854abb80 r6:ea90de00 r5:85096300 [ 172.428033][ T6849] r4:00000040 [ 172.428048][ T6849] [<818fc898>] (do_ip6t_set_ctl) from [<816f4f10>] (nf_setsockopt+0x60/0x7c) [ 172.428107][ T6849] r10:00000126 r9:8581bc00 r8:00000308 r7:854abb80 r6:85096300 r5:818fc898 [ 172.428130][ T6849] r4:829f4e78 [ 172.428146][ T6849] [<816f4eb4>] (nf_setsockopt) from [<818b286c>] (ipv6_setsockopt+0x9c/0xbc) [ 172.428196][ T6849] r6:00000308 r5:85096300 r4:00000040 [ 172.428212][ T6849] [<818b27d4>] (ipv6_setsockopt) from [<817a3b28>] (tcp_setsockopt+0x3c/0x58) [ 172.428267][ T6849] r6:00000040 r5:00000029 r4:818b27d0 [ 172.428283][ T6849] [<817a3af0>] (tcp_setsockopt) from [<8159a0b4>] (sock_common_setsockopt+0x38/0x40) [ 172.428378][ T6849] r4:817a3aec [ 172.428395][ T6849] [<8159a080>] (sock_common_setsockopt) from [<815958f0>] (do_sock_setsockopt+0x70/0xc8) [ 172.428472][ T6849] r4:8159a07c [ 172.428488][ T6849] [<81595880>] (do_sock_setsockopt) from [<81598d4c>] (__sys_setsockopt+0x7c/0xc4) [ 172.428545][ T6849] r8:00000000 r7:85866cc0 r6:85866cc1 r5:00000040 r4:00000029 [ 172.428563][ T6849] [<81598cd0>] (__sys_setsockopt) from [<81598db0>] (sys_setsockopt+0x1c/0x24) [ 172.428657][ T6849] r8:8020029c r7:00000126 r6:00316318 r5:00000000 r4:00000308 [ 172.428673][ T6849] [<81598d94>] (sys_setsockopt) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 172.428796][ T6849] Exception stack(0xea90dfa8 to 0xea90dff0) [ 172.428975][ T6849] dfa0: 00000308 00000000 00000003 00000029 00000040 20000b00 [ 172.429026][ T6849] dfc0: 00000308 00000000 00316318 00000126 00300000 00000000 00006364 76fbc0bc [ 172.429053][ T6849] dfe0: 76fbbec0 76fbbeb0 0001929c 00132320 [ 172.430025][ T6849] Mem-Info: [ 172.430632][ T6849] active_anon:1264 inactive_anon:0 isolated_anon:0 [ 172.430632][ T6849] active_file:6144 inactive_file:35319 isolated_file:0 [ 172.430632][ T6849] unevictable:768 dirty:9 writeback:0 [ 172.430632][ T6849] slab_reclaimable:1064 slab_unreclaimable:5338 [ 172.430632][ T6849] mapped:2344 shmem:777 pagetables:358 [ 172.430632][ T6849] sec_pagetables:0 bounce:0 [ 172.430632][ T6849] kernel_misc_reclaimable:0 [ 172.430632][ T6849] free:436054 free_pcp:999 free_cma:4032 [ 172.431101][ T6849] Node 0 active_anon:5056kB inactive_anon:0kB active_file:24576kB inactive_file:141276kB unevictable:3072kB isolated(anon):0kB isolated(file):0kB mapped:9376kB dirty:36kB writeback:0kB shmem:3108kB kernel_stack:1552kB pagetables:1432kB sec_pagetables:0kB all_unreclaimable? no Balloon:0kB [ 172.431666][ T6849] Normal free:1381200kB boost:0kB min:4772kB low:6196kB high:7620kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:992kB unevictable:0kB writepending:24kB zspages:0kB present:1556480kB managed:1426900kB mlocked:0kB bounce:0kB free_pcp:3996kB local_pcp:3016kB free_cma:0kB [ 172.434570][ T6849] lowmem_reserve[]: 0 4224 4224 [ 172.437678][ T6849] Normal: 6*4kB (ME) 5*8kB (ME) 5*16kB (UM) 4*32kB (UM) 3*64kB (M) 3*128kB (UME) 4*256kB (UM) 6*512kB (UM) 6*1024kB (UME) 3*2048kB (ME) 333*4096kB (M) = 1381200kB [ 172.439451][ T6849] 42241 total pagecache pages [ 172.439508][ T6849] 0 pages in swap cache [ 172.439538][ T6849] Free swap = 124996kB [ 172.439567][ T6849] Total swap = 124996kB [ 172.439671][ T6849] 524288 pages RAM [ 172.439700][ T6849] 135168 pages HighMem/MovableOnly [ 172.439724][ T6849] 32395 pages reserved [ 172.439752][ T6849] 4096 pages cma reserved [ 173.989360][ T6928] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6928 comm=syz.0.1598 [ 179.346988][ T7154] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7154 comm=syz.1.1712 [ 179.969583][ T7179] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7179 comm=syz.1.1723 [ 180.181932][ T7189] syz.0.1730(7189): Attempt to set a LOCK_MAND lock via flock(2). This support has been removed and the request ignored. [ 181.843080][ T29] audit: type=1400 audit(181.770:139): avc: denied { read } for pid=7255 comm="syz.1.1764" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 181.852366][ T7257] binder: 7255:7257 ioctl c00c620f 20000080 returned -22 [ 183.076220][ T29] audit: type=1400 audit(183.010:140): avc: denied { create } for pid=7302 comm="syz.1.1790" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 183.085180][ T29] audit: type=1400 audit(183.020:141): avc: denied { setopt } for pid=7302 comm="syz.1.1790" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 183.854639][ T29] audit: type=1400 audit(183.780:142): avc: denied { setattr } for pid=7331 comm="syz.0.1801" name="pfkey" dev="proc" ino=4026532783 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 184.614258][ T29] audit: type=1400 audit(184.540:143): avc: denied { create } for pid=7365 comm="syz.1.1818" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 186.135075][ T29] audit: type=1400 audit(186.060:144): avc: denied { create } for pid=7428 comm="syz.1.1850" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 190.697961][ T7623] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7623 comm=syz.1.1945 [ 192.395553][ T29] audit: type=1400 audit(192.330:145): avc: denied { ioctl } for pid=7694 comm="syz.1.1982" path="socket:[15217]" dev="sockfs" ino=15217 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 193.034585][ T7721] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2576 sclass=netlink_route_socket pid=7721 comm=syz.1.1995 [ 193.072691][ T29] audit: type=1400 audit(193.000:146): avc: denied { allowed } for pid=7722 comm="syz.0.1996" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 193.085385][ T29] audit: type=1400 audit(193.020:147): avc: denied { create } for pid=7722 comm="syz.0.1996" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 193.091410][ T29] audit: type=1400 audit(193.020:148): avc: denied { lock } for pid=7722 comm="syz.0.1996" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=15254 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 193.550829][ T29] audit: type=1400 audit(193.480:149): avc: denied { ioctl } for pid=7741 comm="syz.0.2006" path="socket:[15287]" dev="sockfs" ino=15287 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 194.542982][ T29] audit: type=1400 audit(194.470:150): avc: denied { ioctl } for pid=7784 comm="syz.0.2027" path="socket:[15948]" dev="sockfs" ino=15948 ioctlcmd=0x891a scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 194.823073][ T7796] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=259 sclass=netlink_route_socket pid=7796 comm=syz.0.2033 [ 195.515179][ T29] audit: type=1400 audit(195.440:151): avc: denied { lock } for pid=7824 comm="syz.0.2047" path="/dev/userfaultfd" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 197.611440][ T7889] vmalloc_node_range for size 536875008 failed: Address range restricted to 0xdf800000 - 0xff800000 [ 197.612714][ T7889] syz.1.2079: vmalloc error: size 536870912, vm_struct allocation failed, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=/,mems_allowed=0 [ 197.615964][ T7889] CPU: 1 UID: 0 PID: 7889 Comm: syz.1.2079 Not tainted syzkaller #0 PREEMPT [ 197.616044][ T7889] Hardware name: ARM-Versatile Express [ 197.616076][ T7889] Call trace: [ 197.616150][ T7889] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 197.616269][ T7889] r7:ffffffff r6:822b166c r5:60000013 r4:82295754 [ 197.616292][ T7889] [<80201b58>] (show_stack) from [<8021ee24>] (dump_stack_lvl+0x70/0x7c) [ 197.616349][ T7889] [<8021edb4>] (dump_stack_lvl) from [<8021ee48>] (dump_stack+0x18/0x1c) [ 197.616405][ T7889] r5:8581a400 r4:00000000 [ 197.616422][ T7889] [<8021ee30>] (dump_stack) from [<80509bdc>] (warn_alloc+0xd8/0x180) [ 197.616476][ T7889] [<80509b04>] (warn_alloc) from [<804f80e0>] (__vmalloc_node_range_noprof+0xc0/0x654) [ 197.616532][ T7889] r3:20000000 r2:822b166c [ 197.616556][ T7889] r6:00000dc0 r5:822b16a4 r4:ff800000 [ 197.616575][ T7889] [<804f8020>] (__vmalloc_node_range_noprof) from [<8051b360>] (__kvmalloc_node_noprof+0x294/0x700) [ 197.616641][ T7889] r10:edabdd58 r9:85b72400 r8:8581a400 r7:00000000 r6:000002a8 r5:00000400 [ 197.616663][ T7889] r4:20000000 [ 197.616682][ T7889] [<8051b0cc>] (__kvmalloc_node_noprof) from [<8176c86c>] (xt_alloc_entry_offsets+0x28/0x34) [ 197.616748][ T7889] r10:edabdd58 r9:85b72400 r8:00000000 r7:00000000 r6:000002a8 r5:85b72440 [ 197.616771][ T7889] r4:08000000 [ 197.616788][ T7889] [<8176c844>] (xt_alloc_entry_offsets) from [<818fb1d4>] (translate_table+0x70/0x78c) [ 197.616846][ T7889] [<818fb164>] (translate_table) from [<818fc3b0>] (do_replace+0xe8/0x5d0) [ 197.616904][ T7889] r10:b5403587 r9:85b72440 r8:00000000 r7:20000b60 r6:000002a8 r5:85b72400 [ 197.616932][ T7889] r4:85988000 [ 197.616949][ T7889] [<818fc2c8>] (do_replace) from [<818fc9cc>] (do_ip6t_set_ctl+0x134/0x2a0) [ 197.617005][ T7889] r10:00000126 r9:8581a400 r8:00000308 r7:854ab680 r6:edabde00 r5:850939c0 [ 197.617027][ T7889] r4:00000040 [ 197.617044][ T7889] [<818fc898>] (do_ip6t_set_ctl) from [<816f4f10>] (nf_setsockopt+0x60/0x7c) [ 197.617106][ T7889] r10:00000126 r9:8581a400 r8:00000308 r7:854ab680 r6:850939c0 r5:818fc898 [ 197.617126][ T7889] r4:829f4e78 [ 197.617143][ T7889] [<816f4eb4>] (nf_setsockopt) from [<818b286c>] (ipv6_setsockopt+0x9c/0xbc) [ 197.617199][ T7889] r6:00000308 r5:850939c0 r4:00000040 [ 197.617219][ T7889] [<818b27d4>] (ipv6_setsockopt) from [<817a3b28>] (tcp_setsockopt+0x3c/0x58) [ 197.617279][ T7889] r6:00000040 r5:00000029 r4:818b27d0 [ 197.617298][ T7889] [<817a3af0>] (tcp_setsockopt) from [<8159a0b4>] (sock_common_setsockopt+0x38/0x40) [ 197.617360][ T7889] r4:817a3aec [ 197.617379][ T7889] [<8159a080>] (sock_common_setsockopt) from [<815958f0>] (do_sock_setsockopt+0x70/0xc8) [ 197.617435][ T7889] r4:8159a07c [ 197.617453][ T7889] [<81595880>] (do_sock_setsockopt) from [<81598d4c>] (__sys_setsockopt+0x7c/0xc4) [ 197.617541][ T7889] r8:00000000 r7:858663c0 r6:858663c1 r5:00000040 r4:00000029 [ 197.617563][ T7889] [<81598cd0>] (__sys_setsockopt) from [<81598db0>] (sys_setsockopt+0x1c/0x24) [ 197.617628][ T7889] r8:8020029c r7:00000126 r6:00316318 r5:00000000 r4:00000308 [ 197.617646][ T7889] [<81598d94>] (sys_setsockopt) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 197.617693][ T7889] Exception stack(0xedabdfa8 to 0xedabdff0) [ 197.617735][ T7889] dfa0: 00000308 00000000 00000003 00000029 00000040 20000b00 [ 197.617771][ T7889] dfc0: 00000308 00000000 00316318 00000126 00300000 00000000 00006364 76f300bc [ 197.617800][ T7889] dfe0: 76f2fec0 76f2feb0 0001929c 00132320 [ 197.645260][ T7889] Mem-Info: [ 197.646172][ T7889] active_anon:1249 inactive_anon:0 isolated_anon:0 [ 197.646172][ T7889] active_file:6144 inactive_file:35329 isolated_file:0 [ 197.646172][ T7889] unevictable:768 dirty:13 writeback:0 [ 197.646172][ T7889] slab_reclaimable:1066 slab_unreclaimable:5352 [ 197.646172][ T7889] mapped:2323 shmem:777 pagetables:352 [ 197.646172][ T7889] sec_pagetables:0 bounce:0 [ 197.646172][ T7889] kernel_misc_reclaimable:0 [ 197.646172][ T7889] free:436034 free_pcp:987 free_cma:4032 [ 197.652103][ T7889] Node 0 active_anon:4996kB inactive_anon:0kB active_file:24576kB inactive_file:141316kB unevictable:3072kB isolated(anon):0kB isolated(file):0kB mapped:9292kB dirty:52kB writeback:0kB shmem:3108kB kernel_stack:1544kB pagetables:1408kB sec_pagetables:0kB all_unreclaimable? no Balloon:0kB [ 197.655423][ T7889] Normal free:1381200kB boost:0kB min:4772kB low:6196kB high:7620kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:1032kB unevictable:0kB writepending:20kB zspages:0kB present:1556480kB managed:1426900kB mlocked:0kB bounce:0kB free_pcp:3948kB local_pcp:1160kB free_cma:0kB [ 197.658061][ T7889] lowmem_reserve[]: 0 4224 4224 [ 197.660502][ T7889] Normal: 6*4kB (ME) 5*8kB (ME) 5*16kB (UM) 4*32kB (UM) 3*64kB (M) 3*128kB (UME) 4*256kB (UM) 6*512kB (UM) 6*1024kB (UME) 3*2048kB (ME) 333*4096kB (M) = 1381200kB [ 197.671378][ T7889] 42250 total pagecache pages [ 197.672067][ T7889] 0 pages in swap cache [ 197.672748][ T7889] Free swap = 124996kB [ 197.673415][ T7889] Total swap = 124996kB [ 197.674554][ T7889] 524288 pages RAM [ 197.674899][ T7889] 135168 pages HighMem/MovableOnly [ 197.675763][ T7889] 32395 pages reserved [ 197.677217][ T7889] 4096 pages cma reserved [ 199.560806][ T29] audit: type=1400 audit(199.490:152): avc: denied { create } for pid=7965 comm="syz.1.2117" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 201.226606][ T29] audit: type=1400 audit(201.160:153): avc: denied { create } for pid=8044 comm="syz.1.2156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 201.232790][ T29] audit: type=1400 audit(201.160:154): avc: denied { ioctl } for pid=8044 comm="syz.1.2156" path="socket:[17435]" dev="sockfs" ino=17435 ioctlcmd=0x54ce scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 201.545312][ T29] audit: type=1400 audit(201.480:155): avc: denied { setcheckreqprot } for pid=8058 comm="syz.1.2162" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 201.945451][ T29] audit: type=1400 audit(201.880:156): avc: denied { write } for pid=8080 comm="syz.0.2177" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 203.089962][ T29] audit: type=1400 audit(203.020:157): avc: denied { create } for pid=8132 comm="syz.0.2202" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 203.100648][ T29] audit: type=1400 audit(203.030:158): avc: denied { ioctl } for pid=8132 comm="syz.0.2202" path="socket:[17581]" dev="sockfs" ino=17581 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 203.197560][ T29] audit: type=1400 audit(203.130:159): avc: denied { nlmsg_tty_audit } for pid=8135 comm="syz.0.2199" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 203.641994][ T29] audit: type=1400 audit(203.570:160): avc: denied { getopt } for pid=8155 comm="syz.0.2210" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 204.805619][ T29] audit: type=1400 audit(204.730:161): avc: denied { getopt } for pid=8205 comm="syz.1.2235" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 206.246762][ T8267] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=8267 comm=syz.0.2268 [ 209.683713][ T8409] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8409 comm=syz.0.2335 [ 212.694677][ T29] audit: type=1400 audit(212.620:162): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 212.695808][ T29] audit: type=1400 audit(212.630:163): avc: denied { open } for pid=3098 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 212.696843][ T29] audit: type=1400 audit(212.630:164): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 212.750101][ T29] audit: type=1400 audit(212.680:165): avc: denied { read } for pid=8540 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 212.935866][ T29] audit: type=1400 audit(212.870:166): avc: denied { create } for pid=8548 comm="syz.0.2405" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 212.951090][ T29] audit: type=1400 audit(212.880:167): avc: denied { write } for pid=8548 comm="syz.0.2405" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 213.196951][ T29] audit: type=1400 audit(213.130:168): avc: denied { create } for pid=8558 comm="syz.0.2410" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 213.326056][ T29] audit: type=1400 audit(213.260:169): avc: denied { allowed } for pid=8563 comm="syz.1.2412" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 213.336817][ T29] audit: type=1400 audit(213.260:170): avc: denied { create } for pid=8563 comm="syz.1.2412" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 213.345892][ T29] audit: type=1400 audit(213.270:171): avc: denied { lock } for pid=8563 comm="syz.1.2412" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=18665 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 213.646002][ T8578] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1280 sclass=netlink_route_socket pid=8578 comm=syz.1.2418 [ 217.077224][ T8727] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2561 sclass=netlink_route_socket pid=8727 comm=syz.0.2493 [ 217.715239][ T29] kauditd_printk_skb: 21 callbacks suppressed [ 217.720630][ T29] audit: type=1400 audit(217.650:193): avc: denied { create } for pid=8756 comm="syz.1.2508" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 217.727836][ T29] audit: type=1400 audit(217.660:194): avc: denied { getopt } for pid=8756 comm="syz.1.2508" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 218.091068][ T8771] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8771 comm=syz.0.2515 [ 218.991089][ T29] audit: type=1400 audit(218.920:195): avc: denied { create } for pid=8808 comm="syz.1.2534" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 219.001102][ T29] audit: type=1400 audit(218.930:196): avc: denied { write } for pid=8808 comm="syz.1.2534" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 220.090173][ T29] audit: type=1400 audit(220.020:197): avc: denied { lock } for pid=8856 comm="syz.1.2559" path="/dev/userfaultfd" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 220.866656][ T29] audit: type=1400 audit(220.800:198): avc: denied { create } for pid=8886 comm="syz.1.2571" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 220.873418][ T29] audit: type=1400 audit(220.800:199): avc: denied { ioctl } for pid=8886 comm="syz.1.2571" path="socket:[19901]" dev="sockfs" ino=19901 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 222.153414][ T8909] vmalloc_node_range for size 536875008 failed: Address range restricted to 0xdf800000 - 0xff800000 [ 222.154330][ T8909] syz.1.2584: vmalloc error: size 536870912, vm_struct allocation failed, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=/,mems_allowed=0 [ 222.154886][ T8909] CPU: 0 UID: 0 PID: 8909 Comm: syz.1.2584 Not tainted syzkaller #0 PREEMPT [ 222.154989][ T8909] Hardware name: ARM-Versatile Express [ 222.155024][ T8909] Call trace: [ 222.155081][ T8909] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 222.155190][ T8909] r7:ffffffff r6:822b166c r5:60000013 r4:82295754 [ 222.155213][ T8909] [<80201b58>] (show_stack) from [<8021ee24>] (dump_stack_lvl+0x70/0x7c) [ 222.155268][ T8909] [<8021edb4>] (dump_stack_lvl) from [<8021ee48>] (dump_stack+0x18/0x1c) [ 222.155322][ T8909] r5:8581ec00 r4:00000000 [ 222.155358][ T8909] [<8021ee30>] (dump_stack) from [<80509bdc>] (warn_alloc+0xd8/0x180) [ 222.155414][ T8909] [<80509b04>] (warn_alloc) from [<804f80e0>] (__vmalloc_node_range_noprof+0xc0/0x654) [ 222.155470][ T8909] r3:20000000 r2:822b166c [ 222.155493][ T8909] r6:00000dc0 r5:822b16a4 r4:ff800000 [ 222.155509][ T8909] [<804f8020>] (__vmalloc_node_range_noprof) from [<8051b360>] (__kvmalloc_node_noprof+0x294/0x700) [ 222.155576][ T8909] r10:edc4dd58 r9:85b71800 r8:8581ec00 r7:00000000 r6:000002a8 r5:00000400 [ 222.155597][ T8909] r4:20000000 [ 222.155615][ T8909] [<8051b0cc>] (__kvmalloc_node_noprof) from [<8176c86c>] (xt_alloc_entry_offsets+0x28/0x34) [ 222.155687][ T8909] r10:edc4dd58 r9:85b71800 r8:00000000 r7:00000000 r6:000002a8 r5:85b71840 [ 222.155709][ T8909] r4:08000000 [ 222.155726][ T8909] [<8176c844>] (xt_alloc_entry_offsets) from [<818fb1d4>] (translate_table+0x70/0x78c) [ 222.155784][ T8909] [<818fb164>] (translate_table) from [<818fc3b0>] (do_replace+0xe8/0x5d0) [ 222.155845][ T8909] r10:b5403587 r9:85b71840 r8:00000000 r7:20000b60 r6:000002a8 r5:85b71800 [ 222.155865][ T8909] r4:85988000 [ 222.155880][ T8909] [<818fc2c8>] (do_replace) from [<818fc9cc>] (do_ip6t_set_ctl+0x134/0x2a0) [ 222.155953][ T8909] r10:00000126 r9:8581ec00 r8:00000308 r7:854aa280 r6:edc4de00 r5:85094a40 [ 222.155975][ T8909] r4:00000040 [ 222.155992][ T8909] [<818fc898>] (do_ip6t_set_ctl) from [<816f4f10>] (nf_setsockopt+0x60/0x7c) [ 222.156063][ T8909] r10:00000126 r9:8581ec00 r8:00000308 r7:854aa280 r6:85094a40 r5:818fc898 [ 222.156085][ T8909] r4:829f4e78 [ 222.156102][ T8909] [<816f4eb4>] (nf_setsockopt) from [<818b286c>] (ipv6_setsockopt+0x9c/0xbc) [ 222.156163][ T8909] r6:00000308 r5:85094a40 r4:00000040 [ 222.156182][ T8909] [<818b27d4>] (ipv6_setsockopt) from [<817a3b28>] (tcp_setsockopt+0x3c/0x58) [ 222.156247][ T8909] r6:00000040 r5:00000029 r4:818b27d0 [ 222.156264][ T8909] [<817a3af0>] (tcp_setsockopt) from [<8159a0b4>] (sock_common_setsockopt+0x38/0x40) [ 222.156330][ T8909] r4:817a3aec [ 222.156347][ T8909] [<8159a080>] (sock_common_setsockopt) from [<815958f0>] (do_sock_setsockopt+0x70/0xc8) [ 222.156408][ T8909] r4:8159a07c [ 222.156449][ T8909] [<81595880>] (do_sock_setsockopt) from [<81598d4c>] (__sys_setsockopt+0x7c/0xc4) [ 222.156522][ T8909] r8:00000000 r7:85866c00 r6:85866c01 r5:00000040 r4:00000029 [ 222.156543][ T8909] [<81598cd0>] (__sys_setsockopt) from [<81598db0>] (sys_setsockopt+0x1c/0x24) [ 222.156612][ T8909] r8:8020029c r7:00000126 r6:00316318 r5:00000000 r4:00000308 [ 222.156631][ T8909] [<81598d94>] (sys_setsockopt) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 222.156684][ T8909] Exception stack(0xedc4dfa8 to 0xedc4dff0) [ 222.156728][ T8909] dfa0: 00000308 00000000 00000003 00000029 00000040 20000b00 [ 222.156766][ T8909] dfc0: 00000308 00000000 00316318 00000126 00300000 00000000 00006364 76f300bc [ 222.156793][ T8909] dfe0: 76f2fec0 76f2feb0 0001929c 00132320 [ 222.156823][ T8909] Mem-Info: [ 222.156864][ T8909] active_anon:1250 inactive_anon:0 isolated_anon:0 [ 222.156864][ T8909] active_file:6144 inactive_file:35339 isolated_file:0 [ 222.156864][ T8909] unevictable:768 dirty:16 writeback:0 [ 222.156864][ T8909] slab_reclaimable:1066 slab_unreclaimable:5365 [ 222.156864][ T8909] mapped:2323 shmem:777 pagetables:350 [ 222.156864][ T8909] sec_pagetables:0 bounce:0 [ 222.156864][ T8909] kernel_misc_reclaimable:0 [ 222.156864][ T8909] free:435865 free_pcp:1128 free_cma:4032 [ 222.156954][ T8909] Node 0 active_anon:5000kB inactive_anon:0kB active_file:24576kB inactive_file:141356kB unevictable:3072kB isolated(anon):0kB isolated(file):0kB mapped:9292kB dirty:64kB writeback:0kB shmem:3108kB kernel_stack:1552kB pagetables:1400kB sec_pagetables:0kB all_unreclaimable? no Balloon:0kB [ 222.157027][ T8909] Normal free:1380484kB boost:0kB min:4772kB low:6196kB high:7620kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:1072kB unevictable:0kB writepending:24kB zspages:0kB present:1556480kB managed:1426900kB mlocked:0kB bounce:0kB free_pcp:4512kB local_pcp:2980kB free_cma:0kB [ 222.157104][ T8909] lowmem_reserve[]: 0 4224 4224 [ 222.157178][ T8909] Normal: 7*4kB (UME) 5*8kB (ME) 4*16kB (M) 4*32kB (UM) 4*64kB (UM) 3*128kB (UME) 3*256kB (M) 5*512kB (M) 6*1024kB (UME) 3*2048kB (ME) 333*4096kB (M) = 1380484kB [ 222.157545][ T8909] 42260 total pagecache pages [ 222.157567][ T8909] 0 pages in swap cache [ 222.157584][ T8909] Free swap = 124996kB [ 222.157601][ T8909] Total swap = 124996kB [ 222.157620][ T8909] 524288 pages RAM [ 222.157633][ T8909] 135168 pages HighMem/MovableOnly [ 222.157647][ T8909] 32395 pages reserved [ 222.157664][ T8909] 4096 pages cma reserved [ 222.406629][ T29] audit: type=1400 audit(222.340:200): avc: denied { bpf } for pid=8916 comm="syz.0.2587" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 222.652899][ T29] audit: type=1400 audit(222.580:201): avc: denied { setopt } for pid=8926 comm="syz.0.2593" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 223.033365][ T29] audit: type=1400 audit(222.960:202): avc: denied { append } for pid=8940 comm="syz.1.2600" name="ubi_ctrl" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 223.729795][ T29] audit: type=1400 audit(223.660:203): avc: denied { create } for pid=8966 comm="syz.1.2617" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 224.532893][ T29] audit: type=1400 audit(224.460:204): avc: denied { write } for pid=8997 comm="syz.0.2628" lport=4 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 224.645123][ T9003] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9003 comm=syz.0.2631 [ 225.911390][ T29] audit: type=1400 audit(225.840:205): avc: denied { mounton } for pid=9054 comm="syz.1.2657" path="/1346" dev="tmpfs" ino=6895 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 225.939768][ T29] audit: type=1400 audit(225.870:206): avc: denied { unmount } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 226.842666][ T29] audit: type=1400 audit(226.770:207): avc: denied { create } for pid=9094 comm="syz.0.2677" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 226.855099][ T29] audit: type=1400 audit(226.790:208): avc: denied { setopt } for pid=9094 comm="syz.0.2677" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 227.244823][ T29] audit: type=1400 audit(227.170:209): avc: denied { setcheckreqprot } for pid=9110 comm="syz.0.2684" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 227.469472][ T29] audit: type=1400 audit(227.400:210): avc: denied { accept } for pid=9117 comm="syz.0.2689" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 [ 227.528893][ T29] audit: type=1400 audit(227.460:211): avc: denied { write } for pid=9120 comm="syz.1.2690" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 228.161742][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 228.169619][ T29] audit: type=1400 audit(228.090:213): avc: denied { sys_module } for pid=9144 comm="syz.1.2702" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 228.457586][ T29] audit: type=1400 audit(228.390:214): avc: denied { create } for pid=9158 comm="syz.0.2712" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 228.567724][ T29] audit: type=1400 audit(228.500:215): avc: denied { audit_write } for pid=9162 comm="syz.0.2709" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 229.201755][ T29] audit: type=1400 audit(229.130:216): avc: denied { mount } for pid=9193 comm="syz.0.2725" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 229.497091][ T29] audit: type=1400 audit(229.430:217): avc: denied { create } for pid=9204 comm="syz.0.2731" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 229.502920][ T29] audit: type=1400 audit(229.430:218): avc: denied { ioctl } for pid=9204 comm="syz.0.2731" path="socket:[20438]" dev="sockfs" ino=20438 ioctlcmd=0x54ce scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 229.788347][ T9219] syz_tun: refused to change device tx_queue_len [ 230.941765][ T9268] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9268 comm=syz.0.2762 [ 235.010136][ T29] audit: type=1400 audit(234.940:219): avc: denied { getopt } for pid=9440 comm="syz.1.2848" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 235.491655][ T29] audit: type=1400 audit(235.420:220): avc: denied { write } for pid=9460 comm="syz.0.2858" name="arp" dev="proc" ino=4026532697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 235.647103][ T9468] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=9468 comm=syz.1.2861 [ 239.271972][ T29] audit: type=1400 audit(239.180:221): avc: denied { ioctl } for pid=9616 comm="syz.1.2934" path="socket:[22141]" dev="sockfs" ino=22141 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 240.375900][ T29] audit: type=1400 audit(240.310:222): avc: denied { write } for pid=9666 comm="syz.1.2959" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 241.655298][ T29] audit: type=1400 audit(241.590:223): avc: denied { nlmsg_read } for pid=9720 comm="syz.1.2987" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 241.736723][ T29] audit: type=1400 audit(241.670:224): avc: denied { setopt } for pid=9724 comm="syz.1.2989" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 242.861391][ T29] audit: type=1400 audit(242.790:225): avc: denied { connect } for pid=9773 comm="syz.0.3013" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 243.049762][ T29] audit: type=1400 audit(242.980:226): avc: denied { ioctl } for pid=9780 comm="syz.0.3017" path="socket:[22703]" dev="sockfs" ino=22703 ioctlcmd=0x8901 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 243.699164][ T29] audit: type=1400 audit(243.630:227): avc: denied { write } for pid=9806 comm="syz.1.3030" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 244.079430][ T9823] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=515 sclass=netlink_audit_socket pid=9823 comm=syz.0.3037 [ 244.450169][ T29] audit: type=1400 audit(244.370:228): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 244.452349][ T29] audit: type=1400 audit(244.380:229): avc: denied { open } for pid=3098 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 244.455149][ T29] audit: type=1400 audit(244.380:230): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 244.464875][ T29] audit: type=1400 audit(244.390:231): avc: denied { read } for pid=9834 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 244.889221][ T9852] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1280 sclass=netlink_route_socket pid=9852 comm=syz.0.3052 [ 245.416788][ T29] audit: type=1400 audit(245.350:232): avc: denied { create } for pid=9873 comm="syz.1.3062" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 246.021223][ T9899] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9899 comm=syz.0.3075 [ 246.369394][ T29] audit: type=1400 audit(246.300:233): avc: denied { open } for pid=9910 comm="syz.0.3080" path="/dev/vcsu" dev="devtmpfs" ino=14 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 246.381203][ T29] audit: type=1400 audit(246.310:234): avc: denied { write } for pid=9911 comm="syz.1.3082" name="mixer" dev="devtmpfs" ino=730 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 246.392675][ T29] audit: type=1400 audit(246.320:235): avc: denied { ioctl } for pid=9911 comm="syz.1.3082" path="/dev/mixer" dev="devtmpfs" ino=730 ioctlcmd=0x5820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 247.272846][ T29] audit: type=1400 audit(247.200:236): avc: denied { read } for pid=9946 comm="syz.1.3099" dev="nsfs" ino=4026532654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 247.287158][ T29] audit: type=1400 audit(247.200:237): avc: denied { open } for pid=9946 comm="syz.1.3099" path="net:[4026532654]" dev="nsfs" ino=4026532654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 247.289407][ T29] audit: type=1400 audit(247.210:238): avc: denied { create } for pid=9946 comm="syz.1.3099" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 247.294580][ T29] audit: type=1400 audit(247.210:239): avc: denied { ioctl } for pid=9946 comm="syz.1.3099" path="socket:[23703]" dev="sockfs" ino=23703 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 247.720099][ T29] audit: type=1400 audit(247.650:240): avc: denied { setattr } for pid=9968 comm="syz.1.3110" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 247.786379][ T29] audit: type=1400 audit(247.720:241): avc: denied { create } for pid=9970 comm="syz.0.3114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 249.613071][T10039] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2561 sclass=netlink_route_socket pid=10039 comm=syz.1.3145 [ 250.670356][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 250.671789][ T29] audit: type=1400 audit(250.600:246): avc: denied { create } for pid=10081 comm="syz.0.3167" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 250.680861][ T29] audit: type=1400 audit(250.610:247): avc: denied { getopt } for pid=10081 comm="syz.0.3167" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 250.952258][ T29] audit: type=1400 audit(250.880:248): avc: denied { create } for pid=10093 comm="syz.0.3173" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 251.234366][ T29] audit: type=1400 audit(251.160:249): avc: denied { create } for pid=10109 comm="syz.1.3181" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 251.454430][T10123] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5132 sclass=netlink_route_socket pid=10123 comm=syz.0.3187 [ 252.247116][ T29] audit: type=1400 audit(252.180:250): avc: denied { watch } for pid=10155 comm="syz.0.3204" path="/1574" dev="tmpfs" ino=8045 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 252.358678][ T29] audit: type=1400 audit(252.290:251): avc: denied { create } for pid=10159 comm="syz.0.3206" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 252.364527][ T29] audit: type=1400 audit(252.290:252): avc: denied { setopt } for pid=10159 comm="syz.0.3206" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 252.538244][ T29] audit: type=1400 audit(252.470:253): avc: denied { audit_write } for pid=10166 comm="syz.1.3209" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 252.713383][ T29] audit: type=1400 audit(252.640:254): avc: denied { getopt } for pid=10175 comm="syz.1.3214" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 253.188861][T10201] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=10201 comm=syz.1.3226 [ 253.490392][ T29] audit: type=1400 audit(253.420:255): avc: denied { mounton } for pid=10210 comm="syz.1.3232" path="/dev/binderfs" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 254.591669][T10249] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=10249 comm=syz.1.3251 [ 256.474586][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 256.476964][ T29] audit: type=1400 audit(256.400:259): avc: denied { create } for pid=10275 comm="syz.0.3262" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 256.483631][ T29] audit: type=1400 audit(256.410:260): avc: denied { write } for pid=10275 comm="syz.0.3262" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 256.817173][ T29] audit: type=1400 audit(256.750:261): avc: denied { lock } for pid=10289 comm="syz.0.3270" path="/dev/userfaultfd" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 257.151050][ T29] audit: type=1400 audit(257.080:262): avc: denied { create } for pid=10302 comm="syz.1.3276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 257.151479][ T29] audit: type=1400 audit(257.080:263): avc: denied { write } for pid=10302 comm="syz.1.3276" lport=4 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 257.450726][ T29] audit: type=1400 audit(257.380:264): avc: denied { create } for pid=10314 comm="syz.0.3286" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 258.446393][ T29] audit: type=1400 audit(258.380:265): avc: denied { write } for pid=10353 comm="syz.0.3301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 258.649869][ T29] audit: type=1400 audit(258.580:266): avc: denied { setopt } for pid=10361 comm="syz.0.3306" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 259.777803][ T29] audit: type=1400 audit(259.710:267): avc: denied { getopt } for pid=10400 comm="syz.0.3325" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 260.412156][ T29] audit: type=1400 audit(260.340:268): avc: denied { module_request } for pid=10425 comm="syz.1.3337" kmod=7463705FE0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 260.710122][T10436] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10436 comm=syz.1.3340 [ 262.106516][T10487] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=10487 comm=syz.1.3370 [ 262.888579][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 262.888928][ T29] audit: type=1400 audit(262.820:271): avc: denied { mounton } for pid=10516 comm="syz.1.3385" path="/1720/file1" dev="tmpfs" ino=8797 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 262.890554][ T29] audit: type=1400 audit(262.820:272): avc: denied { mount } for pid=10516 comm="syz.1.3385" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 262.908085][ T29] audit: type=1400 audit(262.840:273): avc: denied { unmount } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 263.144642][T10525] syz_tun: refused to change device tx_queue_len [ 263.491061][ T29] audit: type=1400 audit(263.420:274): avc: denied { getopt } for pid=10534 comm="syz.1.3394" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 264.898462][ T29] audit: type=1400 audit(264.830:275): avc: denied { ioctl } for pid=10584 comm="syz.1.3415" path="socket:[25108]" dev="sockfs" ino=25108 ioctlcmd=0x8955 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 265.336273][ T29] audit: type=1400 audit(265.270:276): avc: denied { append } for pid=10601 comm="syz.0.3428" name="renderD128" dev="devtmpfs" ino=613 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 265.593403][ T29] audit: type=1400 audit(265.520:277): avc: denied { connect } for pid=10610 comm="syz.1.3430" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 265.674291][ T29] audit: type=1400 audit(265.600:278): avc: denied { create } for pid=10614 comm="syz.1.3431" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 265.674722][ T29] audit: type=1400 audit(265.600:279): avc: denied { ioctl } for pid=10614 comm="syz.1.3431" path="socket:[25161]" dev="sockfs" ino=25161 ioctlcmd=0x8901 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 270.295267][ T29] audit: type=1400 audit(270.220:280): avc: denied { append } for pid=10799 comm="syz.1.3522" name="nullb0" dev="devtmpfs" ino=654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 271.378181][ T29] audit: type=1400 audit(271.310:281): avc: denied { ioctl } for pid=10851 comm="syz.0.3547" path="socket:[26199]" dev="sockfs" ino=26199 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 271.563291][ T29] audit: type=1400 audit(271.490:282): avc: denied { getopt } for pid=10861 comm="syz.0.3552" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 271.576875][T10864] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10864 comm=syz.1.3553 [ 272.362309][ T29] audit: type=1400 audit(272.290:283): avc: denied { ioctl } for pid=10896 comm="syz.0.3570" path="socket:[26270]" dev="sockfs" ino=26270 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 272.858209][ T29] audit: type=1400 audit(272.790:284): avc: denied { write } for pid=10916 comm="syz.1.3580" name="arp" dev="proc" ino=4026532665 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 273.293183][ T29] audit: type=1400 audit(273.220:285): avc: denied { ioctl } for pid=10932 comm="syz.1.3588" path="socket:[26330]" dev="sockfs" ino=26330 ioctlcmd=0x8903 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 273.763601][T10954] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=10954 comm=syz.0.3598 [ 275.186876][ T29] audit: type=1400 audit(275.120:286): avc: denied { setopt } for pid=11004 comm="syz.0.3623" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 275.933170][ T29] audit: type=1400 audit(275.860:287): avc: denied { write } for pid=11033 comm="syz.0.3639" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 277.715100][T11110] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11110 comm=syz.1.3676 [ 277.877625][ T29] audit: type=1400 audit(277.810:288): avc: denied { nlmsg_read } for pid=11115 comm="syz.0.3678" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 277.931588][T11118] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=515 sclass=netlink_audit_socket pid=11118 comm=syz.1.3679 [ 277.995680][ T29] audit: type=1400 audit(277.920:289): avc: denied { create } for pid=11119 comm="syz.0.3685" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 284.476481][T11275] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2561 sclass=netlink_route_socket pid=11275 comm=syz.1.3757 [ 287.075907][ T23] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 287.244388][ T23] usb 1-1: New USB device found, idVendor=0bda, idProduct=8150, bcdDevice= 0.00 [ 287.244728][ T23] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 287.247885][ T23] usb 1-1: Product: syz [ 287.247962][ T23] usb 1-1: Manufacturer: syz [ 287.247993][ T23] usb 1-1: SerialNumber: syz [ 287.541841][ T23] rtl8150 1-1:1.0: couldn't reset the device [ 287.543475][ T23] rtl8150 1-1:1.0: probe with driver rtl8150 failed with error -5 [ 287.553039][ T23] usb 1-1: USB disconnect, device number 2 [ 288.080532][T11396] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5137 sclass=netlink_audit_socket pid=11396 comm=syz.0.3815 [ 288.361382][ T29] audit: type=1400 audit(288.290:290): avc: denied { prog_load } for pid=11405 comm="syz.1.3817" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 288.377699][ T29] audit: type=1400 audit(288.310:291): avc: denied { bpf } for pid=11405 comm="syz.1.3817" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 288.380667][ T29] audit: type=1400 audit(288.310:292): avc: denied { perfmon } for pid=11405 comm="syz.1.3817" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 288.407009][ T29] audit: type=1400 audit(288.340:293): avc: denied { prog_run } for pid=11405 comm="syz.1.3817" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 294.969321][T11478] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5137 sclass=netlink_audit_socket pid=11478 comm=syz.1.3852 [ 296.370954][ T29] audit: type=1400 audit(296.300:294): avc: denied { allowed } for pid=11499 comm="syz.0.3864" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 296.410911][ T29] audit: type=1400 audit(296.340:295): avc: denied { create } for pid=11499 comm="syz.0.3864" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 296.413042][ T29] audit: type=1400 audit(296.340:296): avc: denied { ioctl } for pid=11499 comm="syz.0.3864" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=28261 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 298.095006][ T29] audit: type=1400 audit(298.020:297): avc: denied { setattr } for pid=11523 comm="syz.0.3876" name="NETLINK" dev="sockfs" ino=28722 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 303.915094][T11603] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5135 sclass=netlink_route_socket pid=11603 comm=syz.1.3916 [ 304.616057][T11614] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=11614 comm=syz.0.3921 [ 305.771343][T11639] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=11639 comm=syz.0.3932 [ 317.027554][T11801] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=11801 comm=syz.0.4013 [ 318.077156][T11844] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5135 sclass=netlink_route_socket pid=11844 comm=syz.0.4034 [ 318.750257][ T29] audit: type=1400 audit(318.680:298): avc: denied { ioctl } for pid=11873 comm="syz.1.4051" path="socket:[29936]" dev="sockfs" ino=29936 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 319.547397][ T29] audit: type=1400 audit(319.480:299): avc: denied { write } for pid=11901 comm="syz.0.4065" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 319.888601][T11915] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11915 comm=syz.0.4069 [ 320.005320][T11920] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=11920 comm=syz.1.4072 [ 320.916425][ T29] audit: type=1400 audit(320.850:300): avc: denied { create } for pid=11957 comm="syz.1.4093" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 321.403508][T11976] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=11976 comm=syz.1.4102 [ 321.792507][T11993] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=11993 comm=syz.1.4110 [ 322.132801][T12006] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=12006 comm=syz.1.4116 [ 322.888109][T12038] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12038 comm=syz.1.4136 [ 324.036426][ T29] audit: type=1400 audit(323.970:301): avc: denied { setattr } for pid=12088 comm="syz.0.4158" name="NETLINK" dev="sockfs" ino=29602 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 325.657334][ T29] audit: type=1400 audit(325.590:302): avc: denied { setopt } for pid=12155 comm="syz.1.4192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 326.550376][T12190] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=515 sclass=netlink_audit_socket pid=12190 comm=syz.0.4209 [ 329.166658][ T29] audit: type=1400 audit(329.100:303): avc: denied { getopt } for pid=12300 comm="syz.0.4266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 329.498536][ T29] audit: type=1400 audit(329.430:304): avc: denied { lock } for pid=12315 comm="syz.1.4270" path="socket:[30967]" dev="sockfs" ino=30967 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 [ 329.736755][ T29] audit: type=1400 audit(329.670:305): avc: denied { setopt } for pid=12326 comm="syz.1.4275" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 338.196816][ T29] audit: type=1400 audit(338.130:306): avc: denied { ioctl } for pid=12565 comm="syz.0.4395" path="socket:[32166]" dev="sockfs" ino=32166 ioctlcmd=0x8915 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 339.463463][ T29] audit: type=1400 audit(339.390:307): avc: denied { map } for pid=12613 comm="syz.1.4418" path="/dev/nullb0" dev="devtmpfs" ino=654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 339.464262][ T29] audit: type=1400 audit(339.390:308): avc: denied { execmem } for pid=12613 comm="syz.1.4418" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 339.470380][ T29] audit: type=1400 audit(339.390:309): avc: denied { execute } for pid=12613 comm="syz.1.4418" path="/dev/nullb0" dev="devtmpfs" ino=654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 340.309560][T12650] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=258 sclass=netlink_audit_socket pid=12650 comm=syz.0.4439 [ 340.746322][T12668] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=12668 comm=syz.0.4445 [ 341.749897][T12711] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12711 comm=syz.1.4466 [ 341.775313][ T29] audit: type=1400 audit(341.710:310): avc: denied { read } for pid=12710 comm="syz.0.4467" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 342.045832][T12723] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1550 sclass=netlink_route_socket pid=12723 comm=syz.0.4476 [ 343.147378][ T29] audit: type=1400 audit(343.080:311): avc: denied { setopt } for pid=12763 comm="syz.1.4492" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 343.701746][T12792] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=12792 comm=syz.0.4507 [ 345.070126][ T29] audit: type=1400 audit(345.000:312): avc: denied { read } for pid=12856 comm="syz.1.4540" path="socket:[32857]" dev="sockfs" ino=32857 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 346.319724][T12879] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1550 sclass=netlink_route_socket pid=12879 comm=syz.1.4549 [ 347.329178][T12914] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=12914 comm=syz.0.4570 [ 349.243484][ T29] audit: type=1400 audit(349.170:313): avc: denied { write } for pid=12947 comm="syz.0.4584" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 352.497112][T13084] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5132 sclass=netlink_route_socket pid=13084 comm=syz.1.4650 [ 353.081631][T13107] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=13107 comm=syz.0.4661 [ 353.765762][ T2884] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 353.928316][ T2884] usb 2-1: New USB device found, idVendor=0bda, idProduct=8150, bcdDevice= 0.00 [ 353.928600][ T2884] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 353.928858][ T2884] usb 2-1: Product: syz [ 353.928900][ T2884] usb 2-1: Manufacturer: syz [ 353.928924][ T2884] usb 2-1: SerialNumber: syz [ 792.214212][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 430s! [swapper/0:0] [ 792.214529][ C0] Modules linked in: [ 792.214804][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted syzkaller #0 PREEMPT [ 792.214871][ C0] Hardware name: ARM-Versatile Express [ 792.214945][ C0] PC is at _raw_spin_lock+0x40/0x58 [ 792.215054][ C0] LR is at _raw_spin_lock+0x18/0x58 [ 792.215107][ C0] pc : [<81abbff4>] lr : [<81abbfcc>] psr: 80000013 [ 792.215153][ C0] sp : 82801e28 ip : 82801e28 fp : 82801e3c [ 792.215194][ C0] r10: 00000000 r9 : 84044c40 r8 : 840fb688 [ 792.215244][ C0] r7 : 84044d68 r6 : 00000001 r5 : 00000004 r4 : 84044d68 [ 792.215287][ C0] r3 : 00009654 r2 : 00009656 r1 : 00000000 r0 : 00000001 [ 792.215424][ C0] Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 792.215502][ C0] Control: 30c5387d Table: 851e4680 DAC: fffffffd [ 792.215572][ C0] Call trace: [ 792.215627][ C0] [<81abbfb4>] (_raw_spin_lock) from [<809c7b2c>] (gpio_mmio_set+0x44/0x80) [ 792.215717][ C0] r5:00000004 r4:84044c40 [ 792.215742][ C0] [<809c7ae8>] (gpio_mmio_set) from [<809b82e8>] (gpiochip_set+0x1c/0x44) [ 792.215817][ C0] r7:00000001 r6:00000000 r5:00000002 r4:83e77aa8 [ 792.215839][ C0] [<809b82cc>] (gpiochip_set) from [<809babb0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 792.215903][ C0] [<809bab38>] (gpiod_set_raw_value_commit) from [<809bc450>] (gpiod_set_value_nocheck+0x44/0x58) [ 792.215970][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:83f294d8 r5:00000001 [ 792.215993][ C0] r4:83e77aa8 [ 792.216010][ C0] [<809bc40c>] (gpiod_set_value_nocheck) from [<809bc4a0>] (gpiod_set_value+0x3c/0x88) [ 792.216061][ C0] [<809bc464>] (gpiod_set_value) from [<809ccc3c>] (gpio_led_set+0x5c/0x60) [ 792.216120][ C0] r5:000000ff r4:84528224 [ 792.216139][ C0] [<809ccbe0>] (gpio_led_set) from [<809ca564>] (led_set_brightness+0x84/0x90) [ 792.216195][ C0] r5:000000ff r4:84528224 [ 792.216218][ C0] [<809ca4e0>] (led_set_brightness) from [<809cc0e4>] (led_trigger_event+0x40/0x58) [ 792.216274][ C0] r5:000000ff r4:84528224 [ 792.216293][ C0] [<809cc0a4>] (led_trigger_event) from [<809cd740>] (ledtrig_cpu+0xac/0xf4) [ 792.216354][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 792.216374][ C0] [<809cd694>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 792.216447][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 792.216466][ C0] [<80227a24>] (arch_cpu_idle_exit) from [<802b168c>] (do_idle+0x5c/0x2d8) [ 792.216526][ C0] [<802b1630>] (do_idle) from [<802b1c38>] (cpu_startup_entry+0x30/0x34) [ 792.216597][ C0] r10:8281aff4 r9:8280c680 r8:823bec64 r7:00000000 r6:deffc06c r5:828222e8 [ 792.216619][ C0] r4:000000ed [ 792.216639][ C0] [<802b1c08>] (cpu_startup_entry) from [<81aaf47c>] (kernel_init+0x0/0x138) [ 792.216712][ C0] [<81aaf39c>] (rest_init) from [<8260145c>] (start_kernel+0x844/0x860) [ 792.216785][ C0] [<82600c18>] (start_kernel) from [<00000000>] (0x0) [ 792.217619][ C0] Sending NMI from CPU 0 to CPUs 1: [ 792.218250][ C1] NMI backtrace for cpu 1 [ 792.218453][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Not tainted syzkaller #0 PREEMPT [ 792.218569][ C1] Hardware name: ARM-Versatile Express [ 792.218600][ C1] PC is at _raw_spin_lock+0x4c/0x58 [ 792.218684][ C1] LR is at _raw_spin_lock+0x18/0x58 [ 792.218732][ C1] pc : [<81abc000>] lr : [<81abbfcc>] psr: 80000113 [ 792.218758][ C1] sp : df805d68 ip : df805d68 fp : df805d7c [ 792.218779][ C1] r10: 81c05450 r9 : 84044c40 r8 : 840fb688 [ 792.218799][ C1] r7 : 84044d68 r6 : 00000000 r5 : 00000001 r4 : 84044d68 [ 792.218827][ C1] r3 : 00009654 r2 : 00009655 r1 : 00000000 r0 : 00000001 [ 792.218851][ C1] Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 792.218892][ C1] Control: 30c5387d Table: 851e4680 DAC: 00000000 [ 792.218933][ C1] Call trace: frame pointer underflow [ 792.219046][ C1] [<81abbfb4>] (_raw_spin_lock) from [<809c7b2c>] (gpio_mmio_set+0x44/0x80) [ 792.219138][ C1] r5:00000001 r4:84044c40 [ 792.219164][ C1] [<809c7ae8>] (gpio_mmio_set) from [<809b82e8>] (gpiochip_set+0x1c/0x44) [ 792.219244][ C1] r7:00000000 r6:00000000 r5:00000000 r4:83e77a80 [ 792.219266][ C1] [<809b82cc>] (gpiochip_set) from [<809babb0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 792.219325][ C1] [<809bab38>] (gpiod_set_raw_value_commit) from [<809bc450>] (gpiod_set_value_nocheck+0x44/0x58) [ 792.219417][ C1] r10:81c05450 r9:df805ebc r8:00000102 r7:00001518 r6:00000007 r5:00000000 [ 792.219440][ C1] r4:83e77a80 [ 792.219461][ C1] [<809bc40c>] (gpiod_set_value_nocheck) from [<809bc4a0>] (gpiod_set_value+0x3c/0x88) [ 792.219518][ C1] [<809bc464>] (gpiod_set_value) from [<809ccc3c>] (gpio_led_set+0x5c/0x60) [ 792.219587][ C1] r5:84528044 r4:84528044 [ 792.219609][ C1] [<809ccbe0>] (gpio_led_set) from [<809ca4d4>] (led_set_brightness_nosleep+0x38/0x44) [ 792.219670][ C1] r5:84528044 r4:840e5c4c [ 792.219691][ C1] [<809ca49c>] (led_set_brightness_nosleep) from [<809cd538>] (led_heartbeat_function+0x84/0x144) [ 792.219763][ C1] [<809cd4b4>] (led_heartbeat_function) from [<80327070>] (call_timer_fn+0x30/0x220) [ 792.219836][ C1] r7:00001518 r6:809cd4b4 r5:840e5c4c r4:83216000 [ 792.219857][ C1] [<80327040>] (call_timer_fn) from [<80327524>] (__run_timers+0x2c4/0x3f8) [ 792.219928][ C1] r9:df805ebc r8:00001518 r7:00000000 r6:809cd4b4 r5:dddd9f00 r4:840e5c4c [ 792.219952][ C1] [<80327260>] (__run_timers) from [<803276c0>] (run_timer_base+0x68/0x78) [ 792.220026][ C1] r10:83216000 r9:82804d80 r8:00000102 r7:00000001 r6:00000182 r5:00000002 [ 792.220052][ C1] r4:dddd9f00 [ 792.220070][ C1] [<80327658>] (run_timer_base) from [<803276ec>] (run_timer_softirq+0x1c/0x34) [ 792.220130][ C1] r4:82804084 [ 792.220148][ C1] [<803276d0>] (run_timer_softirq) from [<8025b65c>] (handle_softirqs+0x140/0x458) [ 792.220207][ C1] [<8025b51c>] (handle_softirqs) from [<8025bad0>] (__irq_exit_rcu+0x110/0x1d0) [ 792.220280][ C1] r10:00000000 r9:83216000 r8:00000000 r7:df865e08 r6:82443f98 r5:8247f0cc [ 792.220302][ C1] r4:83216000 [ 792.220318][ C1] [<8025b9c0>] (__irq_exit_rcu) from [<8025be48>] (irq_exit+0x10/0x18) [ 792.220380][ C1] r5:8247f0cc r4:826c3a9c [ 792.220396][ C1] [<8025be38>] (irq_exit) from [<81aada64>] (generic_handle_arch_irq+0x7c/0x80) [ 792.220460][ C1] [<81aad9e8>] (generic_handle_arch_irq) from [<81a7da0c>] (call_with_stack+0x1c/0x20) [ 792.220533][ C1] r9:83216000 r8:840fb688 r7:df865e3c r6:ffffffff r5:40000113 r4:81abbfe4 [ 792.220552][ C1] [<81a7d9f0>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc) [ 792.220606][ C1] Exception stack(0xdf865e08 to 0xdf865e50) [ 792.220662][ C1] 5e00: 00000001 00000000 96559654 96549654 84044d68 00000008 [ 792.220700][ C1] 5e20: 00000001 84044d68 840fb688 84044c40 00000000 df865e6c df865e58 df865e58 [ 792.220741][ C1] 5e40: 81abbfcc 81abbfe4 40000113 ffffffff [ 792.220765][ C1] [<81abbfb4>] (_raw_spin_lock) from [<809c7b2c>] (gpio_mmio_set+0x44/0x80) [ 792.220839][ C1] r5:00000008 r4:84044c40 [ 792.220863][ C1] [<809c7ae8>] (gpio_mmio_set) from [<809b82e8>] (gpiochip_set+0x1c/0x44) [ 792.220942][ C1] r7:00000001 r6:00000000 r5:00000003 r4:83e77abc [ 792.220961][ C1] [<809b82cc>] (gpiochip_set) from [<809babb0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 792.221026][ C1] [<809bab38>] (gpiod_set_raw_value_commit) from [<809bc450>] (gpiod_set_value_nocheck+0x44/0x58) [ 792.221098][ C1] r10:00000000 r9:00000000 r8:00000001 r7:ddde24c0 r6:83f29518 r5:00000001 [ 792.221119][ C1] r4:83e77abc [ 792.221136][ C1] [<809bc40c>] (gpiod_set_value_nocheck) from [<809bc4a0>] (gpiod_set_value+0x3c/0x88) [ 792.221195][ C1] [<809bc464>] (gpiod_set_value) from [<809ccc3c>] (gpio_led_set+0x5c/0x60) [ 792.221260][ C1] r5:000000ff r4:84528314 [ 792.221283][ C1] [<809ccbe0>] (gpio_led_set) from [<809ca564>] (led_set_brightness+0x84/0x90) [ 792.221348][ C1] r5:000000ff r4:84528314 [ 792.221370][ C1] [<809ca4e0>] (led_set_brightness) from [<809cc0e4>] (led_trigger_event+0x40/0x58) [ 792.221431][ C1] r5:000000ff r4:84528314 [ 792.221450][ C1] [<809cc0a4>] (led_trigger_event) from [<809cd740>] (ledtrig_cpu+0xac/0xf4) [ 792.221548][ C1] r7:ddde24c0 r6:00000002 r5:82b15cd8 r4:000000fe [ 792.221570][ C1] [<809cd694>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 792.221644][ C1] r9:00000000 r8:00000001 r7:8280c710 r6:83216000 r5:8280c6d0 r4:00000001 [ 792.221666][ C1] [<80227a24>] (arch_cpu_idle_exit) from [<802b168c>] (do_idle+0x5c/0x2d8) [ 792.221743][ C1] [<802b1630>] (do_idle) from [<802b1c38>] (cpu_startup_entry+0x30/0x34) [ 792.221818][ C1] r10:00000000 r9:414fc0f0 r8:80003000 r7:82a7b4a4 r6:83216000 r5:00000001 [ 792.221854][ C1] r4:00000092 [ 792.221896][ C1] [<802b1c08>] (cpu_startup_entry) from [<8022f360>] (secondary_start_kernel+0x128/0x194) [ 792.221970][ C1] [<8022f238>] (secondary_start_kernel) from [<80220094>] (__enable_mmu+0x0/0xc) [ 792.222048][ C1] r7:82a7b4a4 r6:30c0387d r5:00000000 r4:830b7bc0 [ 792.223697][ C0] Kernel panic - not syncing: softlockup: hung tasks [ 792.256426][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G L syzkaller #0 PREEMPT [ 792.256906][ C0] Tainted: [L]=SOFTLOCKUP [ 792.257127][ C0] Hardware name: ARM-Versatile Express [ 792.257381][ C0] Call trace: [ 792.257688][ C0] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 792.258109][ C0] r7:822965a4 r6:8281b500 r5:00000000 r4:82295754 [ 792.258378][ C0] [<80201b58>] (show_stack) from [<8021ee08>] (dump_stack_lvl+0x54/0x7c) [ 792.258778][ C0] [<8021edb4>] (dump_stack_lvl) from [<8021ee48>] (dump_stack+0x18/0x1c) [ 792.259165][ C0] r5:00000000 r4:82a7bd14 [ 792.259380][ C0] [<8021ee30>] (dump_stack) from [<80202648>] (vpanic+0xe0/0x2e8) [ 792.259730][ C0] [<80202568>] (vpanic) from [<80202884>] (trace_suspend_resume+0x0/0xd8) [ 792.260366][ C0] r7:82ac27f8 [ 792.260616][ C0] [<80202850>] (panic) from [<80383fcc>] (watchdog_timer_fn+0x2dc/0x350) [ 792.261021][ C0] r3:00000001 r2:00004000 r1:82a7bd1c r0:822965a4 [ 792.261282][ C0] [<80383cf0>] (watchdog_timer_fn) from [<80329c64>] (__hrtimer_run_queues+0x1c4/0x454) [ 792.261675][ C0] r10:8281b500 r9:00000000 r8:dddc7130 r7:80383cf0 r6:dddc7000 r5:dddc7040 [ 792.261961][ C0] r4:dddc75d8 [ 792.262114][ C0] [<80329aa0>] (__hrtimer_run_queues) from [<8032b268>] (hrtimer_interrupt+0x148/0x2bc) [ 792.262481][ C0] r10:6fd4ce40 r9:dddc7180 r8:dddc7130 r7:000000b8 r6:00000003 r5:20000193 [ 792.262756][ C0] r4:dddc7000 [ 792.262921][ C0] [<8032b120>] (hrtimer_interrupt) from [<813409e8>] (arch_timer_handler_virt+0x30/0x38) [ 792.263303][ C0] r10:81d0fc78 r9:8309e400 r8:00000000 r7:00000000 r6:00000000 r5:82498528 [ 792.263571][ C0] r4:8309de40 [ 792.263740][ C0] [<813409b8>] (arch_timer_handler_virt) from [<802efab4>] (handle_percpu_devid_irq+0x128/0x34c) [ 792.264528][ C0] [<802ef98c>] (handle_percpu_devid_irq) from [<802e8c44>] (handle_irq_desc+0x74/0x84) [ 792.265191][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:df80a00c r6:826c2388 r5:df80a000 [ 792.265481][ C0] r4:8280cc44 [ 792.265654][ C0] [<802e8bd0>] (handle_irq_desc) from [<802e8cc0>] (generic_handle_domain_irq+0x18/0x1c) [ 792.266073][ C0] [<802e8ca8>] (generic_handle_domain_irq) from [<802012c8>] (gic_handle_irq+0x68/0x7c) [ 792.266437][ C0] [<80201260>] (gic_handle_irq) from [<81aada48>] (generic_handle_arch_irq+0x60/0x80) [ 792.266789][ C0] r7:82801dd8 r6:82443f98 r5:8247f0cc r4:826c3a9c [ 792.267040][ C0] [<81aad9e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 792.267379][ C0] Exception stack(0x82801dd8 to 0x82801e20) [ 792.267627][ C0] 1dc0: 00000001 00000000 [ 792.267947][ C0] 1de0: 00009656 00009654 84044d68 00000004 00000001 84044d68 840fb688 84044c40 [ 792.268259][ C0] 1e00: 00000000 82801e3c 82801e28 82801e28 81abbfcc 81abbff4 80000013 ffffffff [ 792.268570][ C0] r9:8281b500 r8:840fb688 r7:82801e0c r6:ffffffff r5:80000013 r4:81abbff4 [ 792.268850][ C0] [<81abbfb4>] (_raw_spin_lock) from [<809c7b2c>] (gpio_mmio_set+0x44/0x80) [ 792.269200][ C0] r5:00000004 r4:84044c40 [ 792.269378][ C0] [<809c7ae8>] (gpio_mmio_set) from [<809b82e8>] (gpiochip_set+0x1c/0x44) [ 792.269732][ C0] r7:00000001 r6:00000000 r5:00000002 r4:83e77aa8 [ 792.269979][ C0] [<809b82cc>] (gpiochip_set) from [<809babb0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 792.270313][ C0] [<809bab38>] (gpiod_set_raw_value_commit) from [<809bc450>] (gpiod_set_value_nocheck+0x44/0x58) [ 792.270678][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:83f294d8 r5:00000001 [ 792.270963][ C0] r4:83e77aa8 [ 792.271114][ C0] [<809bc40c>] (gpiod_set_value_nocheck) from [<809bc4a0>] (gpiod_set_value+0x3c/0x88) [ 792.271460][ C0] [<809bc464>] (gpiod_set_value) from [<809ccc3c>] (gpio_led_set+0x5c/0x60) [ 792.271845][ C0] r5:000000ff r4:84528224 [ 792.272051][ C0] [<809ccbe0>] (gpio_led_set) from [<809ca564>] (led_set_brightness+0x84/0x90) [ 792.272419][ C0] r5:000000ff r4:84528224 [ 792.272605][ C0] [<809ca4e0>] (led_set_brightness) from [<809cc0e4>] (led_trigger_event+0x40/0x58) [ 792.272984][ C0] r5:000000ff r4:84528224 [ 792.273172][ C0] [<809cc0a4>] (led_trigger_event) from [<809cd740>] (ledtrig_cpu+0xac/0xf4) [ 792.273542][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 792.273937][ C0] [<809cd694>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 792.274560][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 792.274867][ C0] [<80227a24>] (arch_cpu_idle_exit) from [<802b168c>] (do_idle+0x5c/0x2d8) [ 792.275219][ C0] [<802b1630>] (do_idle) from [<802b1c38>] (cpu_startup_entry+0x30/0x34) [ 792.275579][ C0] r10:8281aff4 r9:8280c680 r8:823bec64 r7:00000000 r6:deffc06c r5:828222e8 [ 792.275892][ C0] r4:000000ed [ 792.276043][ C0] [<802b1c08>] (cpu_startup_entry) from [<81aaf47c>] (kernel_init+0x0/0x138) [ 792.276412][ C0] [<81aaf39c>] (rest_init) from [<8260145c>] (start_kernel+0x844/0x860) [ 792.276765][ C0] [<82600c18>] (start_kernel) from [<00000000>] (0x0) [ 792.279572][ C0] Rebooting in 86400 seconds..