last executing test programs: 1.13461916s ago: executing program 1 (id=1413): r0 = socket$xdp(0x2c, 0x3, 0x0) r1 = dup(r0) ioctl$DRM_IOCTL_MODE_GETPLANE(r1, 0xc02064b6, 0x0) 1.038000972s ago: executing program 1 (id=1414): r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000006e40)=0x0) ioprio_get$pid(0x3, r1) 1.035351652s ago: executing program 1 (id=1415): r0 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x4, 0x2ffffffff}, 0x2e) sendmsg$NL80211_CMD_NEW_STATION(r0, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={&(0x7f0000000540)={0x1c, 0x0, 0x1, 0x70bd28, 0x25dfdbfb, {{}, {@val={0x8}, @void}}}, 0x1c}, 0x1, 0x0, 0x0, 0x400c040}, 0x8004) 921.031586ms ago: executing program 1 (id=1416): r0 = fsopen(&(0x7f0000000040)='fuseblk\x00', 0x0) fsconfig$FSCONFIG_SET_BINARY(r0, 0x2, &(0x7f0000000240)='\x00', &(0x7f0000000840)="97", 0x1) read(r0, 0x0, 0x0) 527.207855ms ago: executing program 1 (id=1428): r0 = socket$can_j1939(0x1d, 0x2, 0x7) r1 = fcntl$dupfd(r0, 0x0, r0) write$P9_RRENAMEAT(r1, 0x0, 0x0) 437.616436ms ago: executing program 1 (id=1430): r0 = socket(0x29, 0x2, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[], 0x33fe0}, 0x1, 0x0, 0x0, 0x20000080}, 0xd1) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x4008}, 0x1) 367.601115ms ago: executing program 0 (id=1426): r0 = openat$vhost_vsock(0xffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) ioctl$PIO_SCRNMAP(r1, 0x4b41, 0x0) 277.706806ms ago: executing program 0 (id=1427): r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000140)={[0x0, 0x3]}, 0x8, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_HANDLE_TO_FD_SYNC_FILE(r0, 0x2, &(0x7f0000000280)={0x0, 0x1, 0xffffffffffffffff}) fstat64(r1, &(0x7f0000000480)) 208.148215ms ago: executing program 0 (id=1429): r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fcntl$lock(r0, 0x7, &(0x7f0000000480)) fchown(r0, 0x0, 0x0) 118.633666ms ago: executing program 0 (id=1431): r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0), 0x1a1101, 0x0) r1 = dup(r0) ioctl$VHOST_VDPA_GET_STATUS(r1, 0x8001af71, 0x0) 58.328813ms ago: executing program 0 (id=1432): pipe2$watch_queue(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0xb82e336200000000) r1 = ioctl$TIOCGPTPEER(r0, 0x5450, 0x0) cachestat(r1, &(0x7f0000000000)={0xe753, 0x6}, &(0x7f0000000040), 0x0) 0s ago: executing program 0 (id=1433): r0 = openat$nvme_fabrics(0xffffff9c, &(0x7f0000000240), 0x40, 0x0) r1 = ioctl$UDMABUF_CREATE_LIST(r0, 0x5450, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) kernel console output (not intermixed with test programs): [ 47.873679][ T29] audit: type=1400 audit(47.800:56): avc: denied { read write } for pid=3087 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 47.877068][ T29] audit: type=1400 audit(47.800:57): avc: denied { open } for pid=3087 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:2042' (ED25519) to the list of known hosts. [ 63.430819][ T29] audit: type=1400 audit(63.360:58): avc: denied { name_bind } for pid=3090 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 64.580085][ T29] audit: type=1400 audit(64.510:59): avc: denied { execute } for pid=3091 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 64.585456][ T29] audit: type=1400 audit(64.510:60): avc: denied { execute_no_trans } for pid=3091 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 68.065911][ T29] audit: type=1400 audit(67.990:61): avc: denied { mounton } for pid=3091 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 68.072032][ T29] audit: type=1400 audit(68.000:62): avc: denied { mount } for pid=3091 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 68.089539][ T3091] cgroup: Unknown subsys name 'net' [ 68.098739][ T29] audit: type=1400 audit(68.030:63): avc: denied { unmount } for pid=3091 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 68.252132][ T3091] cgroup: Unknown subsys name 'cpuset' [ 68.258389][ T3091] cgroup: Unknown subsys name 'hugetlb' [ 68.259372][ T3091] cgroup: Unknown subsys name 'rlimit' [ 68.539891][ T29] audit: type=1400 audit(68.470:64): avc: denied { setattr } for pid=3091 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 68.541780][ T29] audit: type=1400 audit(68.470:65): avc: denied { mounton } for pid=3091 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 68.543856][ T29] audit: type=1400 audit(68.470:66): avc: denied { mount } for pid=3091 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 68.731342][ T3093] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 68.734022][ T29] audit: type=1400 audit(68.660:67): avc: denied { relabelto } for pid=3093 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 68.737896][ T29] audit: type=1400 audit(68.670:68): avc: denied { write } for pid=3093 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 68.773697][ T29] audit: type=1400 audit(68.700:69): avc: denied { read } for pid=3091 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 68.776866][ T29] audit: type=1400 audit(68.700:70): avc: denied { open } for pid=3091 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 76.109765][ T3091] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 77.941502][ T29] audit: type=1400 audit(77.870:71): avc: denied { execmem } for pid=3094 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 78.005660][ T29] audit: type=1400 audit(77.930:72): avc: denied { read } for pid=3096 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 78.008898][ T29] audit: type=1400 audit(77.940:73): avc: denied { open } for pid=3096 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 78.017309][ T29] audit: type=1400 audit(77.950:74): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 78.042084][ T29] audit: type=1400 audit(77.970:75): avc: denied { module_request } for pid=3097 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 78.100327][ T29] audit: type=1400 audit(78.020:76): avc: denied { sys_module } for pid=3096 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 78.689347][ T29] audit: type=1400 audit(78.620:77): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 79.704154][ T3096] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 79.713223][ T3096] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 79.910058][ T3097] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 79.923233][ T3097] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 80.450557][ T3096] hsr_slave_0: entered promiscuous mode [ 80.452823][ T3096] hsr_slave_1: entered promiscuous mode [ 80.731915][ T3097] hsr_slave_0: entered promiscuous mode [ 80.734642][ T3097] hsr_slave_1: entered promiscuous mode [ 80.738561][ T3097] debugfs: 'hsr0' already exists in 'hsr' [ 80.740177][ T3097] Cannot create hsr debugfs directory [ 80.795747][ T29] audit: type=1400 audit(80.720:78): avc: denied { create } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 80.798435][ T29] audit: type=1400 audit(80.730:79): avc: denied { write } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 80.801364][ T29] audit: type=1400 audit(80.730:80): avc: denied { read } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 80.808882][ T3096] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 80.818175][ T3096] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 80.824709][ T3096] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 80.830000][ T3096] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 81.103777][ T3097] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 81.117082][ T3097] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 81.128478][ T3097] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 81.140714][ T3097] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 81.629476][ T3096] 8021q: adding VLAN 0 to HW filter on device bond0 [ 81.828825][ T3097] 8021q: adding VLAN 0 to HW filter on device bond0 [ 84.257261][ T3096] veth0_vlan: entered promiscuous mode [ 84.278583][ T3096] veth1_vlan: entered promiscuous mode [ 84.351984][ T3096] veth0_macvtap: entered promiscuous mode [ 84.362637][ T3096] veth1_macvtap: entered promiscuous mode [ 84.441616][ T12] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.442640][ T12] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.449269][ T12] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.451208][ T12] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.592323][ T29] audit: type=1400 audit(84.520:81): avc: denied { mount } for pid=3096 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 84.600407][ T29] audit: type=1400 audit(84.530:82): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/syzkaller.WGjrec/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 84.607361][ T29] audit: type=1400 audit(84.540:83): avc: denied { mount } for pid=3096 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 84.621434][ T29] audit: type=1400 audit(84.550:84): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/syzkaller.WGjrec/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 84.621843][ T29] audit: type=1400 audit(84.550:85): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/syzkaller.WGjrec/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3228 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 84.641169][ T29] audit: type=1400 audit(84.570:86): avc: denied { unmount } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 84.642132][ T3097] veth0_vlan: entered promiscuous mode [ 84.649231][ T29] audit: type=1400 audit(84.580:87): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 84.653114][ T29] audit: type=1400 audit(84.580:88): avc: denied { mount } for pid=3096 comm="syz-executor" name="/" dev="gadgetfs" ino=3229 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 84.663540][ T29] audit: type=1400 audit(84.590:89): avc: denied { mount } for pid=3096 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 84.663977][ T29] audit: type=1400 audit(84.590:90): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 84.685930][ T3097] veth1_vlan: entered promiscuous mode [ 84.732759][ T3096] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 84.814130][ T3097] veth0_macvtap: entered promiscuous mode [ 84.850831][ T3097] veth1_macvtap: entered promiscuous mode [ 84.941020][ T2280] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.941825][ T2280] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.941931][ T2280] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.941996][ T2280] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.691151][ T29] kauditd_printk_skb: 13 callbacks suppressed [ 89.692491][ T29] audit: type=1400 audit(89.620:104): avc: denied { write } for pid=3795 comm="syz.0.44" name="arp" dev="proc" ino=4026532665 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 89.792356][ T29] audit: type=1400 audit(89.720:105): avc: denied { create } for pid=3797 comm="syz.0.45" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 89.802401][ T29] audit: type=1400 audit(89.730:106): avc: denied { ioctl } for pid=3797 comm="syz.0.45" path="socket:[3399]" dev="sockfs" ino=3399 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 90.611305][ T29] audit: type=1400 audit(90.540:107): avc: denied { create } for pid=3816 comm="syz.0.54" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 90.619449][ T29] audit: type=1400 audit(90.550:108): avc: denied { write } for pid=3816 comm="syz.0.54" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 91.367589][ T29] audit: type=1400 audit(91.300:109): avc: denied { map_create } for pid=3818 comm="syz.1.55" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 91.371505][ T29] audit: type=1400 audit(91.300:110): avc: denied { bpf } for pid=3818 comm="syz.1.55" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 91.379193][ T29] audit: type=1400 audit(91.310:111): avc: denied { map_read map_write } for pid=3818 comm="syz.1.55" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 91.549533][ T29] audit: type=1400 audit(91.480:112): avc: denied { setattr } for pid=3822 comm="syz.1.57" name="pfkey" dev="proc" ino=4026532811 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 93.280456][ T3853] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=3853 comm=syz.0.72 [ 93.449868][ T29] audit: type=1400 audit(93.380:113): avc: denied { create } for pid=3856 comm="syz.0.74" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 95.403405][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 95.404414][ T29] audit: type=1400 audit(95.330:118): avc: denied { create } for pid=3903 comm="syz.0.97" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 95.662858][ T3917] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3917 comm=syz.1.103 [ 95.678720][ T29] audit: type=1400 audit(95.610:119): avc: denied { create } for pid=3916 comm="syz.0.104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 95.695510][ T29] audit: type=1400 audit(95.620:120): avc: denied { write } for pid=3916 comm="syz.0.104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 95.790605][ T29] audit: type=1400 audit(95.720:121): avc: denied { ioctl } for pid=3921 comm="syz.0.106" path="socket:[3608]" dev="sockfs" ino=3608 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 95.886789][ T3926] capability: warning: `syz.0.108' uses 32-bit capabilities (legacy support in use) [ 96.168742][ T29] audit: type=1400 audit(96.100:122): avc: denied { create } for pid=3936 comm="syz.1.114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 96.680209][ T29] audit: type=1400 audit(96.610:123): avc: denied { write } for pid=3936 comm="syz.1.114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 98.988840][ T3976] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=3976 comm=syz.0.132 [ 98.988821][ T29] audit: type=1400 audit(98.920:124): avc: denied { write } for pid=3975 comm="syz.0.132" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 99.159389][ T29] audit: type=1400 audit(99.090:125): avc: denied { remount } for pid=3979 comm="syz.0.134" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 99.161269][ T3980] ======================================================= [ 99.161269][ T3980] WARNING: The mand mount option has been deprecated and [ 99.161269][ T3980] and is ignored by this kernel. Remove the mand [ 99.161269][ T3980] option from the mount to silence this warning. [ 99.161269][ T3980] ======================================================= [ 99.182048][ T29] audit: type=1400 audit(99.110:126): avc: denied { unmount } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 101.021731][ T29] audit: type=1400 audit(100.950:127): avc: denied { write } for pid=4015 comm="syz.0.151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 101.520332][ T29] audit: type=1400 audit(101.450:128): avc: denied { create } for pid=4029 comm="syz.1.158" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 101.749248][ T4040] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4040 comm=syz.1.163 [ 101.926096][ T29] audit: type=1400 audit(101.860:129): avc: denied { write } for pid=4046 comm="syz.1.167" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 102.172316][ T4059] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4059 comm=syz.1.172 [ 102.955963][ T4098] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 102.971208][ T29] audit: type=1400 audit(102.900:130): avc: denied { getopt } for pid=4097 comm="syz.1.190" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 103.302158][ T4113] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 104.153386][ T4148] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4148 comm=syz.1.212 [ 104.627448][ T4168] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=2050 sclass=netlink_audit_socket pid=4168 comm=syz.1.223 [ 104.953893][ T29] audit: type=1400 audit(104.880:131): avc: denied { ioctl } for pid=4183 comm="syz.1.231" path="socket:[4078]" dev="sockfs" ino=4078 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 106.354827][ T4211] Zero length message leads to an empty skb [ 106.944323][ T29] audit: type=1400 audit(106.870:132): avc: denied { getopt } for pid=4224 comm="syz.1.250" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 108.143496][ T29] audit: type=1400 audit(108.070:133): avc: denied { create } for pid=4253 comm="syz.0.264" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 110.814732][ T29] audit: type=1400 audit(110.740:134): avc: denied { create } for pid=4322 comm="syz.0.298" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 110.822415][ T29] audit: type=1400 audit(110.750:135): avc: denied { setopt } for pid=4322 comm="syz.0.298" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 114.301644][ T29] audit: type=1400 audit(114.230:136): avc: denied { prog_load } for pid=4381 comm="syz.0.326" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 114.302931][ T29] audit: type=1400 audit(114.230:137): avc: denied { perfmon } for pid=4381 comm="syz.0.326" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 114.327787][ T29] audit: type=1400 audit(114.260:138): avc: denied { prog_run } for pid=4381 comm="syz.0.326" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 117.744520][ T4413] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1280 sclass=netlink_audit_socket pid=4413 comm=syz.1.340 [ 119.767870][ T29] audit: type=1400 audit(119.700:139): avc: denied { lock } for pid=4453 comm="syz.0.361" path="/dev/userio" dev="devtmpfs" ino=694 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 119.797891][ T29] audit: type=1400 audit(119.730:140): avc: denied { mount } for pid=4454 comm="syz.1.362" name="/" dev="ramfs" ino=4565 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 119.803403][ T29] audit: type=1400 audit(119.730:141): avc: denied { remount } for pid=4454 comm="syz.1.362" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 119.823599][ T29] audit: type=1400 audit(119.750:142): avc: denied { unmount } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 120.103818][ T29] audit: type=1400 audit(120.030:143): avc: denied { bind } for pid=4472 comm="syz.1.371" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 120.201404][ T29] audit: type=1400 audit(120.130:144): avc: denied { setopt } for pid=4472 comm="syz.1.371" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 120.348333][ T4492] capability: warning: `syz.1.378' uses deprecated v2 capabilities in a way that may be insecure [ 121.970522][ T29] audit: type=1400 audit(121.900:145): avc: denied { write } for pid=4567 comm="syz.1.415" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 126.477863][ T29] audit: type=1400 audit(126.410:146): avc: denied { write } for pid=4663 comm="syz.1.462" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 126.487526][ T29] audit: type=1400 audit(126.420:147): avc: denied { read } for pid=4663 comm="syz.1.462" lport=23944 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 126.662598][ T4668] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4668 comm=syz.1.464 [ 126.899213][ T4674] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=259 sclass=netlink_tcpdiag_socket pid=4674 comm=syz.1.467 [ 127.281589][ T29] audit: type=1400 audit(127.210:148): avc: denied { ioctl } for pid=4681 comm="syz.1.471" path="socket:[5777]" dev="sockfs" ino=5777 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 128.486323][ T29] audit: type=1400 audit(128.420:149): avc: denied { create } for pid=4706 comm="syz.1.483" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 128.906280][ T29] audit: type=1400 audit(128.830:150): avc: denied { create } for pid=4722 comm="syz.1.491" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 130.167443][ T29] audit: type=1400 audit(130.100:151): avc: denied { listen } for pid=4722 comm="syz.1.491" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 130.981514][ T4769] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1542 sclass=netlink_route_socket pid=4769 comm=syz.1.513 [ 131.024449][ T4771] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=617 sclass=netlink_route_socket pid=4771 comm=syz.1.514 [ 134.682026][ T29] audit: type=1400 audit(134.610:152): avc: denied { setopt } for pid=4821 comm="syz.1.539" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 136.219660][ T4864] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4864 comm=syz.0.560 [ 139.462300][ T4906] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4906 comm=syz.1.580 [ 140.082173][ T29] audit: type=1400 audit(140.010:153): avc: denied { create } for pid=4932 comm="syz.0.594" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 140.093516][ T29] audit: type=1400 audit(140.020:154): avc: denied { connect } for pid=4932 comm="syz.0.594" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 140.339530][ T29] audit: type=1400 audit(140.270:155): avc: denied { ioctl } for pid=4938 comm="syz.1.597" path="socket:[6472]" dev="sockfs" ino=6472 ioctlcmd=0x330d scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 140.598724][ T29] audit: type=1400 audit(140.530:156): avc: denied { setopt } for pid=4932 comm="syz.0.594" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 142.069385][ T29] audit: type=1400 audit(142.000:157): avc: denied { setopt } for pid=4954 comm="syz.1.604" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 144.319785][ T29] audit: type=1400 audit(144.250:158): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=49012 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 144.367345][ T29] audit: type=1400 audit(144.300:159): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=49012 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 145.072557][ T5072] usb usb1: usbfs: process 5072 (syz.1.661) did not claim interface 22 before use [ 145.561709][ T29] audit: type=1400 audit(145.490:160): avc: denied { create } for pid=5090 comm="syz.1.671" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 145.570092][ T29] audit: type=1400 audit(145.500:161): avc: denied { bind } for pid=5090 comm="syz.1.671" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 145.762450][ T5099] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5099 comm=syz.1.675 [ 146.812587][ T5131] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5131 comm=syz.1.691 [ 147.913004][ T29] audit: type=1400 audit(147.840:162): avc: denied { nlmsg_read } for pid=5140 comm="syz.1.696" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 150.148601][ T5167] netlink: 220 bytes leftover after parsing attributes in process `syz.0.709'. [ 151.085995][ T5179] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65498 sclass=netlink_route_socket pid=5179 comm=syz.1.715 [ 153.633947][ T5207] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5207 comm=syz.0.729 [ 154.416286][ T5225] SELinux: Context system_u:object_r:devicekit_var_lib_t:s0 is not valid (left unmapped). [ 154.419135][ T29] audit: type=1400 audit(154.350:163): avc: denied { relabelto } for pid=5224 comm="syz.0.738" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:devicekit_var_lib_t:s0" [ 154.422191][ T29] audit: type=1400 audit(154.350:164): avc: denied { associate } for pid=5224 comm="syz.0.738" name="null" dev="devtmpfs" ino=4 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 srawcon="system_u:object_r:devicekit_var_lib_t:s0" [ 155.683202][ T29] audit: type=1400 audit(155.610:165): avc: denied { read } for pid=5264 comm="syz.0.758" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:devicekit_var_lib_t:s0" [ 155.686083][ T29] audit: type=1400 audit(155.610:166): avc: denied { open } for pid=5264 comm="syz.0.758" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:devicekit_var_lib_t:s0" [ 156.537769][ T29] audit: type=1400 audit(156.470:167): avc: denied { write } for pid=5302 comm="syz.1.776" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 157.073256][ T5320] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5320 comm=syz.1.784 [ 160.168152][ T29] audit: type=1400 audit(160.100:168): avc: denied { shutdown } for pid=5377 comm="syz.1.813" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 160.872504][ T29] audit: type=1400 audit(160.800:169): avc: denied { execute } for pid=5404 comm="syz.1.826" name="file0" dev="tmpfs" ino=2143 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 161.628054][ T29] audit: type=1400 audit(161.560:170): avc: denied { ioctl } for pid=5424 comm="syz.1.836" path="/dev/null" dev="devtmpfs" ino=4 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:devicekit_var_lib_t:s0" [ 162.399636][ T5454] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5454 comm=syz.1.848 [ 162.843256][ T5472] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5472 comm=syz.0.858 [ 163.237071][ T29] audit: type=1400 audit(163.160:171): avc: denied { bind } for pid=5481 comm="syz.0.864" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 163.786926][ T29] audit: type=1400 audit(163.710:172): avc: denied { create } for pid=5506 comm="syz.0.875" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 169.542450][ T29] audit: type=1400 audit(169.470:173): avc: denied { ioctl } for pid=5635 comm="syz.0.939" path="socket:[9304]" dev="sockfs" ino=9304 ioctlcmd=0x8918 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 170.153503][ T29] audit: type=1400 audit(170.080:174): avc: denied { connect } for pid=5653 comm="syz.0.946" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 170.591228][ T1800] hid-generic 0000:0000:0004.0001: unknown main item tag 0x0 [ 170.591854][ T1800] hid-generic 0000:0000:0004.0001: unknown main item tag 0x0 [ 170.592737][ T1800] hid-generic 0000:0000:0004.0001: unknown main item tag 0x0 [ 170.594743][ T1800] hid-generic 0000:0000:0004.0001: unknown main item tag 0x0 [ 170.596974][ T1800] hid-generic 0000:0000:0004.0001: unknown main item tag 0x0 [ 170.597396][ T1800] hid-generic 0000:0000:0004.0001: unknown main item tag 0x0 [ 170.597546][ T1800] hid-generic 0000:0000:0004.0001: unknown main item tag 0x0 [ 170.597862][ T1800] hid-generic 0000:0000:0004.0001: unknown main item tag 0x0 [ 170.598094][ T1800] hid-generic 0000:0000:0004.0001: unknown main item tag 0x0 [ 170.598282][ T1800] hid-generic 0000:0000:0004.0001: unknown main item tag 0x0 [ 170.621893][ T1800] hid-generic 0000:0000:0004.0001: hidraw0: HID v0.03 Device [syz1] on syz1 [ 171.160904][ T29] audit: type=1400 audit(171.090:175): avc: denied { write } for pid=5682 comm="syz.1.957" path="socket:[8783]" dev="sockfs" ino=8783 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 175.878598][ T5741] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5741 comm=syz.0.985 [ 178.132927][ T29] audit: type=1400 audit(178.060:176): avc: denied { ioctl } for pid=5772 comm="syz.0.1001" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=8970 ioctlcmd=0xaa07 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 182.640349][ T29] audit: type=1400 audit(182.570:177): avc: denied { lock } for pid=5854 comm="syz.0.1041" path="socket:[9586]" dev="sockfs" ino=9586 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 184.742513][ T29] audit: type=1400 audit(184.670:178): avc: denied { setopt } for pid=5934 comm="syz.0.1081" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 186.933965][ T29] audit: type=1400 audit(186.860:179): avc: denied { append } for pid=6023 comm="syz.1.1125" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 190.018549][ T29] audit: type=1400 audit(189.950:180): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=49012 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 190.053854][ T29] audit: type=1400 audit(189.980:181): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 190.054377][ T29] audit: type=1400 audit(189.980:182): avc: denied { open } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 190.054778][ T29] audit: type=1400 audit(189.980:183): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 190.088430][ T29] audit: type=1400 audit(190.020:184): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=49012 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 190.113478][ T29] audit: type=1400 audit(190.040:185): avc: denied { read } for pid=6075 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 190.207004][ T29] audit: type=1400 audit(190.140:186): avc: denied { write } for pid=6077 comm="syz.0.1149" name="vhost-vsock" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 190.208217][ T29] audit: type=1400 audit(190.140:187): avc: denied { open } for pid=6077 comm="syz.0.1149" path="/dev/vhost-vsock" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 190.211599][ T29] audit: type=1400 audit(190.140:188): avc: denied { ioctl } for pid=6077 comm="syz.0.1149" path="/dev/vhost-vsock" dev="devtmpfs" ino=710 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 190.577139][ T29] audit: type=1400 audit(190.510:189): avc: denied { create } for pid=6086 comm="syz.0.1153" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 199.259602][ T29] kauditd_printk_skb: 14 callbacks suppressed [ 199.260837][ T29] audit: type=1400 audit(199.190:204): avc: denied { create } for pid=6166 comm="syz.1.1189" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 199.266416][ T29] audit: type=1400 audit(199.200:205): avc: denied { ioctl } for pid=6166 comm="syz.1.1189" path="socket:[10035]" dev="sockfs" ino=10035 ioctlcmd=0x4c06 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 199.348020][ T29] audit: type=1400 audit(199.280:206): avc: denied { create } for pid=6171 comm="syz.1.1192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 199.363746][ T29] audit: type=1400 audit(199.280:207): avc: denied { write } for pid=6171 comm="syz.1.1192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 199.568280][ T29] audit: type=1400 audit(199.500:208): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=49012 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 199.570227][ T29] audit: type=1400 audit(199.500:209): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=49012 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 199.615563][ T29] audit: type=1400 audit(199.540:210): avc: denied { read } for pid=6181 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 199.624413][ T29] audit: type=1400 audit(199.550:211): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 199.627392][ T29] audit: type=1400 audit(199.550:212): avc: denied { open } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 199.629130][ T29] audit: type=1400 audit(199.550:213): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 204.391137][ T29] kauditd_printk_skb: 23 callbacks suppressed [ 204.392207][ T29] audit: type=1400 audit(204.320:237): avc: denied { create } for pid=6268 comm="syz.1.1238" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 204.400760][ T29] audit: type=1400 audit(204.330:238): avc: denied { write } for pid=6268 comm="syz.1.1238" path="socket:[10935]" dev="sockfs" ino=10935 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 204.542017][ T29] audit: type=1400 audit(204.470:239): avc: denied { create } for pid=6274 comm="syz.1.1243" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 204.744838][ T29] audit: type=1400 audit(204.670:240): avc: denied { module_request } for pid=6282 comm="syz.1.1247" kmod=7463702D756C702D746C73F1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 205.453453][ T29] audit: type=1400 audit(205.380:241): avc: denied { create } for pid=6311 comm="syz.1.1263" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 205.468834][ T29] audit: type=1400 audit(205.400:242): avc: denied { lock } for pid=6311 comm="syz.1.1263" path="socket:[11007]" dev="sockfs" ino=11007 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 205.739695][ T29] audit: type=1400 audit(205.670:243): avc: denied { create } for pid=6322 comm="syz.0.1265" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 209.890915][ T29] audit: type=1400 audit(209.820:244): avc: denied { prog_load } for pid=6385 comm="syz.0.1301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 209.892499][ T29] audit: type=1400 audit(209.820:245): avc: denied { bpf } for pid=6385 comm="syz.0.1301" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 209.896859][ T29] audit: type=1400 audit(209.830:246): avc: denied { perfmon } for pid=6385 comm="syz.0.1301" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 209.903789][ T29] audit: type=1400 audit(209.830:247): avc: denied { prog_run } for pid=6385 comm="syz.0.1301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 211.764503][ T29] audit: type=1400 audit(211.690:248): avc: denied { ioctl } for pid=6405 comm="syz.0.1307" path="socket:[11409]" dev="sockfs" ino=11409 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 211.787632][ T29] audit: type=1400 audit(211.720:249): avc: denied { write } for pid=6405 comm="syz.0.1307" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 213.745864][ T29] audit: type=1400 audit(213.660:250): avc: denied { read } for pid=6420 comm="syz.0.1315" dev="nsfs" ino=4026532654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 213.748022][ T29] audit: type=1400 audit(213.660:251): avc: denied { open } for pid=6420 comm="syz.0.1315" path="net:[4026532654]" dev="nsfs" ino=4026532654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 213.752523][ T29] audit: type=1400 audit(213.680:252): avc: denied { create } for pid=6420 comm="syz.0.1315" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 213.773622][ T29] audit: type=1400 audit(213.700:253): avc: denied { write } for pid=6420 comm="syz.0.1315" path="socket:[11203]" dev="sockfs" ino=11203 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 216.486405][ T29] audit: type=1400 audit(216.420:254): avc: denied { create } for pid=6451 comm="syz.1.1328" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 218.176527][ T29] audit: type=1400 audit(218.110:255): avc: denied { setopt } for pid=6462 comm="syz.1.1337" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 218.245893][ T29] audit: type=1400 audit(218.160:256): avc: denied { create } for pid=6461 comm="syz.0.1332" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 220.907444][ T29] audit: type=1400 audit(220.840:257): avc: denied { create } for pid=6492 comm="syz.0.1346" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 220.911085][ T29] audit: type=1400 audit(220.840:258): avc: denied { ioctl } for pid=6492 comm="syz.0.1346" path="socket:[12362]" dev="sockfs" ino=12362 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 222.644182][ T29] audit: type=1400 audit(222.570:259): avc: denied { allowed } for pid=6526 comm="syz.0.1364" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 222.652799][ T29] audit: type=1400 audit(222.580:260): avc: denied { create } for pid=6526 comm="syz.0.1364" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 222.656039][ T29] audit: type=1400 audit(222.590:261): avc: denied { map } for pid=6526 comm="syz.0.1364" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=11561 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 222.658208][ T29] audit: type=1400 audit(222.590:262): avc: denied { read write } for pid=6526 comm="syz.0.1364" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=11561 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 223.351140][ T29] audit: type=1400 audit(223.280:263): avc: denied { ioctl } for pid=6546 comm="syz.1.1373" path="socket:[11596]" dev="sockfs" ino=11596 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 223.434295][ T29] audit: type=1400 audit(223.360:264): avc: denied { write } for pid=6548 comm="syz.1.1374" name="arp" dev="proc" ino=4026532755 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 226.420412][ T29] audit: type=1400 audit(226.350:265): avc: denied { map_create } for pid=6572 comm="syz.0.1384" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 226.427963][ T29] audit: type=1400 audit(226.350:266): avc: denied { map_read map_write } for pid=6572 comm="syz.0.1384" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 227.485199][ C1] hrtimer: interrupt took 8333264 ns [ 232.369823][ T29] audit: type=1400 audit(232.300:267): avc: denied { write } for pid=6610 comm="syz.1.1403" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 232.794446][ T29] audit: type=1400 audit(232.720:268): avc: denied { create } for pid=6620 comm="syz.1.1408" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 232.802502][ T29] audit: type=1400 audit(232.730:269): avc: denied { write } for pid=6620 comm="syz.1.1408" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 233.214782][ T29] audit: type=1400 audit(233.140:270): avc: denied { create } for pid=6630 comm="syz.1.1413" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 233.232069][ T29] audit: type=1400 audit(233.160:271): avc: denied { ioctl } for pid=6630 comm="syz.1.1413" path="socket:[12619]" dev="sockfs" ino=12619 ioctlcmd=0x64b6 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 233.365529][ T6638] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=6638 comm=syz.1.1415 [ 233.606787][ T29] audit: type=1400 audit(233.540:272): avc: denied { read } for pid=6646 comm="syz.0.1421" path="socket:[12651]" dev="sockfs" ino=12651 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 234.167482][ T29] audit: type=1400 audit(234.100:273): avc: denied { setattr } for pid=6664 comm="syz.0.1429" name="pfkey" dev="proc" ino=4026532721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 660.235485][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 430s! [swapper/0:0] [ 660.235700][ C0] Modules linked in: [ 660.236662][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G L syzkaller #0 PREEMPT [ 660.236920][ C0] Tainted: [L]=SOFTLOCKUP [ 660.236971][ C0] Hardware name: ARM-Versatile Express [ 660.237173][ C0] PC is at _raw_spin_lock+0x40/0x58 [ 660.237878][ C0] LR is at _raw_spin_lock+0x18/0x58 [ 660.237920][ C0] pc : [<81abbef4>] lr : [<81abbecc>] psr: 80000013 [ 660.237960][ C0] sp : 82801e28 ip : 82801e28 fp : 82801e3c [ 660.237989][ C0] r10: 00000000 r9 : 840b9e40 r8 : 839d8a88 [ 660.238023][ C0] r7 : 840b9f68 r6 : 00000001 r5 : 00000004 r4 : 840b9f68 [ 660.238057][ C0] r3 : 00000728 r2 : 00000729 r1 : 00000000 r0 : 00000001 [ 660.238164][ C0] Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 660.238228][ C0] Control: 30c5387d Table: 85d94900 DAC: fffffffd [ 660.238316][ C0] Call trace: [ 660.238588][ C0] [<81abbeb4>] (_raw_spin_lock) from [<809c7a2c>] (gpio_mmio_set+0x44/0x80) [ 660.238924][ C0] r5:00000004 r4:840b9e40 [ 660.239020][ C0] [<809c79e8>] (gpio_mmio_set) from [<809b81e8>] (gpiochip_set+0x1c/0x44) [ 660.239087][ C0] r7:00000001 r6:00000000 r5:00000002 r4:83ff34a8 [ 660.239103][ C0] [<809b81cc>] (gpiochip_set) from [<809baab0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 660.239148][ C0] [<809baa38>] (gpiod_set_raw_value_commit) from [<809bc350>] (gpiod_set_value_nocheck+0x44/0x58) [ 660.239217][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:8393bfd8 r5:00000001 [ 660.239245][ C0] r4:83ff34a8 [ 660.239260][ C0] [<809bc30c>] (gpiod_set_value_nocheck) from [<809bc3a0>] (gpiod_set_value+0x3c/0x88) [ 660.239301][ C0] [<809bc364>] (gpiod_set_value) from [<809ccb3c>] (gpio_led_set+0x5c/0x60) [ 660.239353][ C0] r5:000000ff r4:832f7224 [ 660.239367][ C0] [<809ccae0>] (gpio_led_set) from [<809ca464>] (led_set_brightness+0x84/0x90) [ 660.239412][ C0] r5:000000ff r4:832f7224 [ 660.239426][ C0] [<809ca3e0>] (led_set_brightness) from [<809cbfe4>] (led_trigger_event+0x40/0x58) [ 660.239470][ C0] r5:000000ff r4:832f7224 [ 660.239484][ C0] [<809cbfa4>] (led_trigger_event) from [<809cd640>] (ledtrig_cpu+0xac/0xf4) [ 660.239533][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 660.239548][ C0] [<809cd594>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 660.239609][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 660.239625][ C0] [<80227a24>] (arch_cpu_idle_exit) from [<802b168c>] (do_idle+0x5c/0x2d8) [ 660.239675][ C0] [<802b1630>] (do_idle) from [<802b1c38>] (cpu_startup_entry+0x30/0x34) [ 660.239737][ C0] r10:8281aff4 r9:8280c680 r8:823bec64 r7:00000000 r6:deffc06c r5:828222e8 [ 660.239754][ C0] r4:000000ed [ 660.239768][ C0] [<802b1c08>] (cpu_startup_entry) from [<81aaf37c>] (kernel_init+0x0/0x138) [ 660.239822][ C0] [<81aaf29c>] (rest_init) from [<8260145c>] (start_kernel+0x844/0x860) [ 660.239906][ C0] [<82600c18>] (start_kernel) from [<00000000>] (0x0) [ 660.240506][ C0] Sending NMI from CPU 0 to CPUs 1: [ 660.241178][ C1] NMI backtrace for cpu 1 [ 660.241353][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G L syzkaller #0 PREEMPT [ 660.241422][ C1] Tainted: [L]=SOFTLOCKUP [ 660.241458][ C1] Hardware name: ARM-Versatile Express [ 660.241487][ C1] PC is at _raw_spin_lock+0x40/0x58 [ 660.241564][ C1] LR is at _raw_spin_lock+0x18/0x58 [ 660.241598][ C1] pc : [<81abbef4>] lr : [<81abbecc>] psr: 80000113 [ 660.241623][ C1] sp : df805d68 ip : df805d68 fp : df805d7c [ 660.241649][ C1] r10: 81c05450 r9 : 840b9e40 r8 : 839d8a88 [ 660.241669][ C1] r7 : 840b9f68 r6 : 00000001 r5 : 00000001 r4 : 840b9f68 [ 660.241692][ C1] r3 : 00000728 r2 : 0000072a r1 : 00000000 r0 : 00000001 [ 660.241717][ C1] Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 660.241756][ C1] Control: 30c5387d Table: 85adde00 DAC: 00000000 [ 660.241778][ C1] Call trace: frame pointer underflow [ 660.241875][ C1] [<81abbeb4>] (_raw_spin_lock) from [<809c7a2c>] (gpio_mmio_set+0x44/0x80) [ 660.241972][ C1] r5:00000001 r4:840b9e40 [ 660.241997][ C1] [<809c79e8>] (gpio_mmio_set) from [<809b81e8>] (gpiochip_set+0x1c/0x44) [ 660.242071][ C1] r7:00000001 r6:00000000 r5:00000000 r4:83ff3480 [ 660.242090][ C1] [<809b81cc>] (gpiochip_set) from [<809baab0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 660.242145][ C1] [<809baa38>] (gpiod_set_raw_value_commit) from [<809bc350>] (gpiod_set_value_nocheck+0x44/0x58) [ 660.242212][ C1] r10:81c05450 r9:df805ebc r8:00000102 r7:ffffe6d4 r6:00000007 r5:00000001 [ 660.242234][ C1] r4:83ff3480 [ 660.242250][ C1] [<809bc30c>] (gpiod_set_value_nocheck) from [<809bc3a0>] (gpiod_set_value+0x3c/0x88) [ 660.242304][ C1] [<809bc364>] (gpiod_set_value) from [<809ccb3c>] (gpio_led_set+0x5c/0x60) [ 660.242362][ C1] r5:832f7044 r4:832f7044 [ 660.242381][ C1] [<809ccae0>] (gpio_led_set) from [<809ca3d4>] (led_set_brightness_nosleep+0x38/0x44) [ 660.242441][ C1] r5:832f7044 r4:844c678c [ 660.242459][ C1] [<809ca39c>] (led_set_brightness_nosleep) from [<809cd438>] (led_heartbeat_function+0x84/0x144) [ 660.242517][ C1] [<809cd3b4>] (led_heartbeat_function) from [<80327070>] (call_timer_fn+0x30/0x220) [ 660.242590][ C1] r7:ffffe6d4 r6:809cd3b4 r5:844c678c r4:83216000 [ 660.242610][ C1] [<80327040>] (call_timer_fn) from [<80327524>] (__run_timers+0x2c4/0x3f8) [ 660.242683][ C1] r9:df805ebc r8:ffffe6d4 r7:00000000 r6:809cd3b4 r5:dddd9f00 r4:844c678c [ 660.242701][ C1] [<80327260>] (__run_timers) from [<803276c0>] (run_timer_base+0x68/0x78) [ 660.242800][ C1] r10:83216000 r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 [ 660.242824][ C1] r4:dddd9f00 [ 660.242840][ C1] [<80327658>] (run_timer_base) from [<803276ec>] (run_timer_softirq+0x1c/0x34) [ 660.242905][ C1] r4:82804084 [ 660.242921][ C1] [<803276d0>] (run_timer_softirq) from [<8025b65c>] (handle_softirqs+0x140/0x458) [ 660.242986][ C1] [<8025b51c>] (handle_softirqs) from [<8025bad0>] (__irq_exit_rcu+0x110/0x1d0) [ 660.243058][ C1] r10:00000000 r9:83216000 r8:00000000 r7:df865e08 r6:82443f98 r5:8247f0cc [ 660.243078][ C1] r4:83216000 [ 660.243099][ C1] [<8025b9c0>] (__irq_exit_rcu) from [<8025be48>] (irq_exit+0x10/0x18) [ 660.243163][ C1] r5:8247f0cc r4:826c3a9c [ 660.243193][ C1] [<8025be38>] (irq_exit) from [<81aad964>] (generic_handle_arch_irq+0x7c/0x80) [ 660.243259][ C1] [<81aad8e8>] (generic_handle_arch_irq) from [<81a7d904>] (call_with_stack+0x1c/0x20) [ 660.243330][ C1] r9:83216000 r8:839d8a88 r7:df865e3c r6:ffffffff r5:60000013 r4:809c822c [ 660.243349][ C1] [<81a7d8e8>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc) [ 660.243500][ C1] Exception stack(0xdf865e08 to 0xdf865e50) [ 660.243694][ C1] 5e00: e0266008 00000008 00000728 00000000 e0266008 00000008 [ 660.243783][ C1] 5e20: 00000001 840b9f68 839d8a88 840b9e40 00000000 df865e6c df865e58 df865e58 [ 660.243814][ C1] 5e40: 809c8228 809c822c 60000013 ffffffff [ 660.243873][ C1] [<809c820c>] (gpio_mmio_write32) from [<809c7a4c>] (gpio_mmio_set+0x64/0x80) [ 660.243958][ C1] r5:00000008 r4:840b9e40 [ 660.243984][ C1] [<809c79e8>] (gpio_mmio_set) from [<809b81e8>] (gpiochip_set+0x1c/0x44) [ 660.244054][ C1] r7:00000001 r6:00000000 r5:00000003 r4:83ff34bc [ 660.244076][ C1] [<809b81cc>] (gpiochip_set) from [<809baab0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 660.244135][ C1] [<809baa38>] (gpiod_set_raw_value_commit) from [<809bc350>] (gpiod_set_value_nocheck+0x44/0x58) [ 660.244203][ C1] r10:00000000 r9:00000000 r8:00000001 r7:ddde24c0 r6:8393be98 r5:00000001 [ 660.244230][ C1] r4:83ff34bc [ 660.244246][ C1] [<809bc30c>] (gpiod_set_value_nocheck) from [<809bc3a0>] (gpiod_set_value+0x3c/0x88) [ 660.244314][ C1] [<809bc364>] (gpiod_set_value) from [<809ccb3c>] (gpio_led_set+0x5c/0x60) [ 660.244373][ C1] r5:000000ff r4:832f7314 [ 660.244395][ C1] [<809ccae0>] (gpio_led_set) from [<809ca464>] (led_set_brightness+0x84/0x90) [ 660.244454][ C1] r5:000000ff r4:832f7314 [ 660.244477][ C1] [<809ca3e0>] (led_set_brightness) from [<809cbfe4>] (led_trigger_event+0x40/0x58) [ 660.244539][ C1] r5:000000ff r4:832f7314 [ 660.244561][ C1] [<809cbfa4>] (led_trigger_event) from [<809cd640>] (ledtrig_cpu+0xac/0xf4) [ 660.244627][ C1] r7:ddde24c0 r6:00000002 r5:82b15cd8 r4:000000fe [ 660.244650][ C1] [<809cd594>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 660.244723][ C1] r9:00000000 r8:00000001 r7:8280c710 r6:83216000 r5:8280c6d0 r4:00000001 [ 660.244747][ C1] [<80227a24>] (arch_cpu_idle_exit) from [<802b168c>] (do_idle+0x5c/0x2d8) [ 660.244811][ C1] [<802b1630>] (do_idle) from [<802b1c38>] (cpu_startup_entry+0x30/0x34) [ 660.244956][ C1] r10:00000000 r9:414fc0f0 r8:80003000 r7:82a7b4a4 r6:83216000 r5:00000001 [ 660.244989][ C1] r4:00000092 [ 660.245006][ C1] [<802b1c08>] (cpu_startup_entry) from [<8022f360>] (secondary_start_kernel+0x128/0x194) [ 660.245076][ C1] [<8022f238>] (secondary_start_kernel) from [<80220094>] (__enable_mmu+0x0/0xc) [ 660.245149][ C1] r7:82a7b4a4 r6:30c0387d r5:00000000 r4:830b7bc0 [ 660.246498][ C0] Kernel panic - not syncing: softlockup: hung tasks [ 660.288583][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G L syzkaller #0 PREEMPT [ 660.288973][ C0] Tainted: [L]=SOFTLOCKUP [ 660.289131][ C0] Hardware name: ARM-Versatile Express [ 660.289350][ C0] Call trace: [ 660.289629][ C0] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 660.289961][ C0] r7:822965a4 r6:8281b500 r5:00000000 r4:82295754 [ 660.290203][ C0] [<80201b58>] (show_stack) from [<8021ee08>] (dump_stack_lvl+0x54/0x7c) [ 660.290536][ C0] [<8021edb4>] (dump_stack_lvl) from [<8021ee48>] (dump_stack+0x18/0x1c) [ 660.290983][ C0] r5:00000000 r4:82a7bd14 [ 660.291162][ C0] [<8021ee30>] (dump_stack) from [<80202648>] (vpanic+0xe0/0x2e8) [ 660.291480][ C0] [<80202568>] (vpanic) from [<80202884>] (trace_suspend_resume+0x0/0xd8) [ 660.291820][ C0] r7:82ac27f8 [ 660.291977][ C0] [<80202850>] (panic) from [<80383fcc>] (watchdog_timer_fn+0x2dc/0x350) [ 660.292301][ C0] r3:00000001 r2:00004000 r1:82a7bd1c r0:822965a4 [ 660.292534][ C0] [<80383cf0>] (watchdog_timer_fn) from [<80329c64>] (__hrtimer_run_queues+0x1c4/0x454) [ 660.294190][ C0] r10:8281b500 r9:00000000 r8:dddc7130 r7:80383cf0 r6:dddc7000 r5:dddc7040 [ 660.294520][ C0] r4:dddc75d8 [ 660.294652][ C0] [<80329aa0>] (__hrtimer_run_queues) from [<8032b268>] (hrtimer_interrupt+0x148/0x2bc) [ 660.295211][ C0] r10:b535eca0 r9:dddc7180 r8:dddc7130 r7:00000099 r6:00000003 r5:20000193 [ 660.295566][ C0] r4:dddc7000 [ 660.295697][ C0] [<8032b120>] (hrtimer_interrupt) from [<813408e0>] (arch_timer_handler_virt+0x30/0x38) [ 660.296054][ C0] r10:81d0fc78 r9:8309e400 r8:00000000 r7:00000000 r6:00000000 r5:82498528 [ 660.296314][ C0] r4:8309de40 [ 660.296447][ C0] [<813408b0>] (arch_timer_handler_virt) from [<802efab4>] (handle_percpu_devid_irq+0x128/0x34c) [ 660.296792][ C0] [<802ef98c>] (handle_percpu_devid_irq) from [<802e8c44>] (handle_irq_desc+0x74/0x84) [ 660.297132][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:df80a00c r6:826c2388 r5:df80a000 [ 660.297391][ C0] r4:8280cc44 [ 660.297516][ C0] [<802e8bd0>] (handle_irq_desc) from [<802e8cc0>] (generic_handle_domain_irq+0x18/0x1c) [ 660.297840][ C0] [<802e8ca8>] (generic_handle_domain_irq) from [<802012c8>] (gic_handle_irq+0x68/0x7c) [ 660.298163][ C0] [<80201260>] (gic_handle_irq) from [<81aad948>] (generic_handle_arch_irq+0x60/0x80) [ 660.298489][ C0] r7:82801dd8 r6:82443f98 r5:8247f0cc r4:826c3a9c [ 660.298714][ C0] [<81aad8e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 660.299077][ C0] Exception stack(0x82801dd8 to 0x82801e20) [ 660.299292][ C0] 1dc0: 00000001 00000000 [ 660.299573][ C0] 1de0: 00000729 00000728 840b9f68 00000004 00000001 840b9f68 839d8a88 840b9e40 [ 660.299894][ C0] 1e00: 00000000 82801e3c 82801e28 82801e28 81abbecc 81abbef4 80000013 ffffffff [ 660.300226][ C0] r9:8281b500 r8:839d8a88 r7:82801e0c r6:ffffffff r5:80000013 r4:81abbef4 [ 660.300520][ C0] [<81abbeb4>] (_raw_spin_lock) from [<809c7a2c>] (gpio_mmio_set+0x44/0x80) [ 660.300865][ C0] r5:00000004 r4:840b9e40 [ 660.301049][ C0] [<809c79e8>] (gpio_mmio_set) from [<809b81e8>] (gpiochip_set+0x1c/0x44) [ 660.301386][ C0] r7:00000001 r6:00000000 r5:00000002 r4:83ff34a8 [ 660.301604][ C0] [<809b81cc>] (gpiochip_set) from [<809baab0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 660.301975][ C0] [<809baa38>] (gpiod_set_raw_value_commit) from [<809bc350>] (gpiod_set_value_nocheck+0x44/0x58) [ 660.302383][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:8393bfd8 r5:00000001 [ 660.302680][ C0] r4:83ff34a8 [ 660.302852][ C0] [<809bc30c>] (gpiod_set_value_nocheck) from [<809bc3a0>] (gpiod_set_value+0x3c/0x88) [ 660.303208][ C0] [<809bc364>] (gpiod_set_value) from [<809ccb3c>] (gpio_led_set+0x5c/0x60) [ 660.303652][ C0] r5:000000ff r4:832f7224 [ 660.303906][ C0] [<809ccae0>] (gpio_led_set) from [<809ca464>] (led_set_brightness+0x84/0x90) [ 660.304498][ C0] r5:000000ff r4:832f7224 [ 660.304679][ C0] [<809ca3e0>] (led_set_brightness) from [<809cbfe4>] (led_trigger_event+0x40/0x58) [ 660.305151][ C0] r5:000000ff r4:832f7224 [ 660.305411][ C0] [<809cbfa4>] (led_trigger_event) from [<809cd640>] (ledtrig_cpu+0xac/0xf4) [ 660.305753][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 660.305999][ C0] [<809cd594>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 660.306347][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 660.306709][ C0] [<80227a24>] (arch_cpu_idle_exit) from [<802b168c>] (do_idle+0x5c/0x2d8) [ 660.307096][ C0] [<802b1630>] (do_idle) from [<802b1c38>] (cpu_startup_entry+0x30/0x34) [ 660.307456][ C0] r10:8281aff4 r9:8280c680 r8:823bec64 r7:00000000 r6:deffc06c r5:828222e8 [ 660.307765][ C0] r4:000000ed [ 660.307922][ C0] [<802b1c08>] (cpu_startup_entry) from [<81aaf37c>] (kernel_init+0x0/0x138) [ 660.308281][ C0] [<81aaf29c>] (rest_init) from [<8260145c>] (start_kernel+0x844/0x860) [ 660.308666][ C0] [<82600c18>] (start_kernel) from [<00000000>] (0x0) [ 660.311256][ C0] Rebooting in 86400 seconds..