last executing test programs: 24.644635336s ago: executing program 3 (id=4166): r0 = openat$binderfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x802, 0x1) connect$inet(r1, 0x0, 0x0) setsockopt$inet_int(r1, 0x0, 0x14, 0x0, 0x0) write(r1, 0x0, 0x0) recvmmsg(r1, 0x0, 0x0, 0x140, 0x0) r2 = syz_usb_connect(0x5, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x92, 0xec, 0xc6, 0x20, 0x5ac, 0x77c2, 0xeb3a, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x20, 0x0, [{{0x9, 0x4, 0xc4, 0x1, 0x2, 0xff, 0xfd, 0x1, 0x80, [], [{{0x9, 0x5, 0x2, 0x2, 0x210, 0x2}}, {{0x9, 0x5, 0x82, 0x2, 0x200}}]}}]}}]}}, 0x0) syz_usb_control_io$uac1(r2, &(0x7f0000000000)={0x14, 0x0, &(0x7f00000001c0)={0x0, 0x3, 0x2, @string={0x2}}}, 0x0) syz_usb_control_io$cdc_ecm(r2, 0x0, &(0x7f0000000c40)={0x1c, &(0x7f0000000a80)=ANY=[], 0x0, 0x0}) r3 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r3, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f0000000000)={0x42, 0x4, 0x1}, 0x10) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x10) mmap$binder(&(0x7f00000a0000)=nil, 0x2000, 0x1, 0x11, r0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0x4c, 0x0, &(0x7f0000000300)=[@transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x4f, 0x0, &(0x7f0000000380)="ec5879bcae4ebf1dcf85134d8b5e05505209abff506d2f73957fa39fbdbc84a722e85b7aa2dd37976eaa5b831df72f213796242fbd571621cc5d7cdf0257b01ea7a5119e8f9d6ed2b82920a14886fc"}) 24.094379386s ago: executing program 3 (id=4175): r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) syz_io_uring_setup(0x49a, &(0x7f0000000400)={0x0, 0x35e4, 0x3180, 0x8000, 0x69}, 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, 0x0, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4188aea7, 0x0) write$P9_RGETLOCK(r1, &(0x7f00000000c0)=ANY=[], 0xffffff6a) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz0\x00', {0x9, 0x4, 0x6, 0xfffa}, 0x1d, [0x1, 0xc95a, 0xfffffff3, 0x9, 0x80, 0x2, 0x3, 0x7f, 0x6, 0x4d, 0x39cc191a, 0x5c, 0x9, 0x5, 0x2, 0x3, 0x6, 0x7, 0x0, 0x2ab, 0x4, 0x7, 0x8, 0x3c5b, 0x8, 0xb, 0x9, 0x1, 0x1f461e2c, 0x7, 0xe661, 0x7fff, 0xb, 0x3, 0x7fff, 0x4c74, 0x80000000, 0x800242, 0xffffffff, 0xe, 0x0, 0x71, 0x2, 0x6, 0x3, 0x2, 0x5, 0x3e, 0x5ff, 0xfffffffa, 0x6, 0x3, 0x80092a3, 0x4, 0x1, 0x20000000, 0x82, 0x0, 0x7, 0x6, 0x8, 0x4, 0x1, 0x40], [0x10000007, 0xffff, 0x12f, 0x6, 0x10, 0xfffffff3, 0x129432e6, 0xcb, 0xf9, 0x3, 0x2bf, 0x5, 0x1000, 0xffffffff, 0x3, 0x0, 0x7, 0x5, 0x2f, 0xe, 0x312, 0x1, 0x0, 0xfffffffe, 0x8, 0x1, 0x8000, 0x9, 0x3fe, 0x401, 0x6, 0x4, 0xfb, 0x5, 0x8000, 0x5f31, 0x4, 0x1, 0x2, 0x2, 0x9, 0x4, 0x9, 0x8, 0x9, 0x6, 0xb, 0xa, 0x1, 0x9, 0x9, 0x2, 0x7f, 0x9, 0x1, 0x3, 0x9, 0xffffffff, 0x7, 0x3, 0x6, 0x0, 0x0, 0x400004], [0x6, 0x6, 0x80000001, 0x2, 0xff, 0x100, 0x8d2, 0x9, 0x5, 0x7fff, 0x0, 0x1, 0x8000b, 0x4, 0x5, 0x1005, 0x0, 0x1f0, 0xfffffffd, 0x2, 0x86, 0x1, 0x9, 0x3e7, 0x9, 0x5, 0x2, 0x2, 0x800, 0x8, 0x5, 0x8001, 0x7, 0x38, 0x800003, 0xff, 0x80, 0x2, 0xcc52, 0x950bfaf, 0x1000, 0xa2, 0x7, 0x53cf697b, 0xfffffff9, 0x6, 0xac8, 0xbf, 0x10002, 0x403, 0x7ff, 0x3, 0x0, 0x1, 0xffff, 0x0, 0x6, 0x1c, 0x120000, 0x3, 0x6, 0xaaed, 0x4, 0xff], [0x9, 0xbb31, 0x3, 0xb, 0x5, 0x2, 0x6, 0x5, 0x0, 0x3, 0x80ce7, 0x1ff, 0x3, 0x7, 0x5, 0x1003, 0x101, 0x10000, 0x6, 0x7fff, 0xffff, 0xe620, 0x2, 0x2, 0x1, 0x2, 0x14c, 0x60a7, 0x6, 0x4, 0xffffffff, 0x80000000, 0x7, 0x8, 0xc8, 0xee1, 0x0, 0xffff, 0x3, 0x7f, 0x100, 0x9602, 0x4, 0x2, 0xffff, 0x6, 0x1, 0x10080, 0x6, 0x8, 0x30b1d693, 0x5a2b, 0xc, 0x7, 0x1, 0x6c1b, 0x0, 0x4, 0x5, 0xb1c, 0x1, 0x200, 0xffff3441, 0xfff]}, 0x45c) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) write$eventfd(r5, 0x0, 0x0) ppoll(&(0x7f00000000c0)=[{}, {}], 0x20000000000000dc, 0x0, 0x0, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) 23.250346718s ago: executing program 3 (id=4178): openat$kvm(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0xc0042, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x100000000, 0x0, 0x81, 0x100000, 0x0, 0x2004c8, 0x8000000, 0xfffffffffffffffe, 0x1, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x2], 0xeeee8000, 0x42240}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x84}, {0x6}]}) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000040)=0x93f) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0xc008ae88, &(0x7f0000000000)=ANY=[@ANYBLOB="01000000000000000f478ef8ed"]) r3 = openat$kvm(0xffffff9c, &(0x7f00000000c0), 0x800, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f0000000200)={[0x2, 0x9, 0xfffffffffffffffd, 0x0, 0x10000, 0x0, 0x4002004c4, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x8d], 0xeeee8000, 0x2011c0}) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22.454107541s ago: executing program 3 (id=4183): r0 = syz_usb_connect(0x0, 0x36, &(0x7f0000000080)=ANY=[@ANYBLOB="120141014813442024040075ee69e30103010902240001000010000904b8070296d1ca000905060200020d0006090582020002"], 0x0) r1 = syz_usb_connect$printer(0x4, 0x0, 0x0, 0x0) syz_usb_control_io$uac1(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, &(0x7f0000000900)={0x84, &(0x7f00000003c0)={0x0, 0x5, 0x4, "abe763a8"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io(r0, &(0x7f0000001440)={0x2c, 0x0, &(0x7f0000001080)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x403}}, &(0x7f0000001600)={0x0, 0xf, 0x10, {0x5, 0xf, 0x10, 0x1, [@wireless={0xb, 0x10, 0x1, 0xc, 0x20, 0x1, 0x6, 0x4, 0x1}]}}, &(0x7f00000010c0)={0x20, 0x29, 0xf, {0xf, 0x29, 0x1f, 0x0, 0x9, 0x4, "14bdd171", "84102c39"}}, &(0x7f0000001400)={0x20, 0x2a, 0xc, {0xc, 0x2a, 0x7f, 0x1, 0x81, 0x0, 0x0, 0x90, 0x800}}}, &(0x7f0000001a80)={0x84, &(0x7f00000014c0)={0x0, 0x12, 0x1e, "adae703e88ed2898af38fea6aa0ae00670f949fdd5df96e0bf2998514d48"}, 0x0, &(0x7f0000001700)={0x0, 0x8, 0x1, 0x9}, &(0x7f0000001740)={0x20, 0x0, 0x4, {0x0, 0x1}}, &(0x7f0000001780)={0x20, 0x0, 0x4, {0x100, 0x8}}, &(0x7f00000017c0)={0x40, 0x7, 0x2, 0x6}, &(0x7f0000001800)={0x40, 0x9, 0x1, 0xc}, &(0x7f0000001840)={0x40, 0xb, 0x2, "26e2"}, &(0x7f0000001880)={0x40, 0xf, 0x2, 0x5}, &(0x7f00000018c0)={0x40, 0x13, 0x6, @random="660547d194f0"}, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a00)={0x40, 0x1e, 0x1, 0x8c}, &(0x7f0000001a40)={0x40, 0x21, 0x1, 0xfe}}) syz_usb_control_io$cdc_ecm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, &(0x7f0000000740)={0x44, &(0x7f0000000180)=ANY=[@ANYBLOB="601004"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$cdc_ecm(r0, 0x0, &(0x7f0000000300)={0x1c, &(0x7f0000001480)=ANY=[@ANYBLOB="200104"], 0x0, 0x0}) syz_usb_control_io$printer(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, &(0x7f0000001580)={0x44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io(r0, 0x0, &(0x7f0000001100)={0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$printer(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000640)={0x2c, 0x0, 0x0, 0x0, 0x0, 0x0}) mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$incfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') lseek(r2, 0x10001, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x240, 0x0) ioctl$TCFLSH(r3, 0x400455c8, 0x4) ioctl$TIOCSPGRP(r3, 0x5410, 0x0) syz_usb_connect$cdc_ncm(0x0, 0x6e, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_usb_connect$printer(0x4, 0x36, 0x0, &(0x7f0000000240)={0xa, &(0x7f0000000140)={0xa, 0x6, 0x300, 0xea, 0x9, 0x29, 0x8, 0x15}, 0x5, &(0x7f0000000200)={0x5, 0xf, 0x5}, 0x1, [{0x2, &(0x7f00000007c0)=@string={0x2}}]}) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io(r1, 0x0, 0x0) 21.649494823s ago: executing program 3 (id=4205): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x7) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000300)=[{&(0x7f0000000000)="390000001000034700bb5be1c3e4feff06000000012778010000190004000400ad003e34d61c00000000313200"/57, 0x39}], 0x1) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000000c0)=0x40) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.kill\x00', 0x275a, 0x0) fcntl$lock(r2, 0x7, &(0x7f0000000000)={0x0, 0x2, 0x1b9, 0x7fffffff}) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000080)=0x0) fcntl$lock(r0, 0x6, &(0x7f0000000180)={0x2, 0x1, 0x6, 0x7fffffff, r3}) 21.568902314s ago: executing program 3 (id=4207): r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/cpuset.cpus\x00', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/cgroup.procs\x00', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/devices.allow\x00', 0x1, 0x0) 9.112675888s ago: executing program 0 (id=4247): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0xc0084) close(r0) close(0x3) 9.103491008s ago: executing program 1 (id=4248): unshare(0x44040000) 9.062385559s ago: executing program 2 (id=4249): prlimit64(0x0, 0xe, &(0x7f0000000200)={0x8, 0x8a}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x3) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000380)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) r1 = dup3(0xffffffffffffffff, r0, 0x0) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x802, 0x0) mmap$binder(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x11, r2, 0x10000000000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r2, 0x4018620d, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r3 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r3, &(0x7f0000019680)=""/102392, 0x18ff8) r4 = epoll_create1(0x0) r5 = socket(0x1, 0x80802, 0x0) r6 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r6, &(0x7f0000000100)={0xa000000d}) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r5, &(0x7f00000000c0)={0x10000001}) close(r6) shutdown(r5, 0x0) 7.497988293s ago: executing program 0 (id=4250): r0 = socket(0x2, 0x3, 0x6) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000640)={0x0}, 0x1, 0x0, 0x0, 0x240008df}, 0x44001) 7.497321303s ago: executing program 1 (id=4251): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="89000000ffff000001"], 0x9}, 0x0) shutdown(r0, 0x1) sendmsg(r0, &(0x7f0000000380)={0x0, 0x32c, 0x0, 0x0, &(0x7f0000000000), 0x90}, 0x0) 7.491285403s ago: executing program 2 (id=4252): r0 = open$dir(&(0x7f0000000240)='./file0\x00', 0x40000400000002c2, 0x0) r1 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) close(r1) dup2(r2, r0) 5.78545506s ago: executing program 0 (id=4253): r0 = socket(0x1c, 0x1, 0x0) setsockopt$sock_int(r0, 0xffff, 0x20, 0x0, 0x0) 5.78421017s ago: executing program 1 (id=4254): r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000380)={'bond_slave_0\x00', {0x2, 0x4e20, @remote}}) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080), 0xa0080, 0x0) r2 = userfaultfd(0x180801) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000340)={{&(0x7f0000701000/0x4000)=nil, 0x4000}, 0x6}) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xfffffffe) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000400)={'nr0\x00', &(0x7f00000003c0)=@ethtool_test={0x1a, 0x401, 0x0, 0x4, [0x40, 0x7a94, 0x0, 0x200]}}) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x862a2067cb42d70d, 0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000080)={0x0, 0x6, 0xa, 0x0, 0x9}) r3 = socket(0xa, 0x1, 0x0) ioctl(r3, 0x8936, 0x0) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f00000000c0)=')}%!:\xb9+\xe4\x1f2\xba\xc3\x0ed\x93Z\xbf\xa6`\xa6\x84\xef\x18\x8d\x90@\x1bb\xff\x01\x8a%*F\xe6\az\x852\x92\x0e\xd9\x9a\x11\xd3\xa8\x96\xad\xcc\xf9\xb0\xcb\x8f\x1ao\xfd9\xa8\x03\xe0j\x81lM}\xf0\x1e\xfb\xd2\x84\xa0\xb1\xc0\x97\xc16\xf7@l%j\xc9\x11ll|\xc6x\xcdD\xd7\x94\xe2\x1c\x96\xa3\x88a\xd8?M\x8dA5q\x11Ou\xa0 LS\xff\x92Y\xee3\x8a0\b%\xe8:}\f\x14\x03\xc2S\x8a@\xf8w\xe1Z\xb7\xf5\x9c\xbbj\xb7g\xd1\x9dH\x18\x9a\x11\xc0f\xbd0\x9cD}\xf8\xff\x9d\x8b\xb2\xb2&\xbb(\xba\xe8f\xd6Qg\x9dT\xfa\xd01\xec\x12\xf4\xfb\xd4\xf1|/\xf3]\x03-\xe0\x93=O\xb3\xdcf:R\x11\t\x15\xc2\xfaV\x17\xc9b\x9b\x95\xd4@\xdb\xf0\xb5\x02\x8a\x91\xb0?\xc6g\x88\x1b\xd7h\xc8\xd0\f\x8b\xad \x90\xbciz\x99R\xa4\xca{H&\xa9\xd4C\xfd<,pAz\xf4_\x9d\xf8\x98\x8e\xd9M \xf4\x0f)O\xbf\x8d\xf9:$\fK\xeb\x96Vpg\xb0\xea@q\x03\x87LZ\'\x93\x1e\xecY\xd3Lc\xfe\xbf\xafm_\aO\x96\x00\x89\xca\xb2\x0e9\x98\x8b\xbb\x84\xe0\xd8\xb2\xa1N\xd8o\xc0K\x85\x8f)\x00Lr\x00N!A\x86\xd4\xb2\x98\x86)Cr\x0e\xe4\x86\x970f\x9e\xba\xe9\xba\xd7\xb8W\xa5\xe9\xe3\xaf\x9fj0\n|\x8e\xbd\x9f\xef\xc7iq+\x0f\xcf\xd3\xb2>[2\x98\x7f\x14\x9c\x13\x83\x80\xf3xv\xd6\xd0]\xdb\x82S@\x92\xbb\x97\x8a\x850\x84\xd9~1l\x98\x90\xfb;\xde4\xba\xdc\x8a\xb7\x1f\x8f\x19Uz\x9c\xcc\a\x1e\x85=\xb3\x18s\xe2\xcf\x92\xc4\x05\xb6V\t\x06\x96\xfe\'x\x02ryX\xe6%U\x80;g\x0f\xa11\x12\xfb\xdf\x14\xff-b\x0f;\xb6\xf1R\xea\xfc\x97\x87\xbejB`\xa1\xe6,\xaa\xc4k\x02\xd5\xcc\x1bu\x96\x80\x81?\x87{\x06\xad:\x15\x93C\xab9\xb1\xaf\xd1\xcb\x8a\xeb\xdf\x9f+^\x7f\x06C\xe8\xc3\xbew6\x8f\xe7\xf0\x05x\xb7&p\xe0d\xea\x92DQm\t\xb9\xa8\xa5\x00\x00\x00\x00\x00\x00\x00\x00\x00$\xe4l\xb2\xc1.\xecu5f\xe1\xa4\xe1\xcf/\x00\xdfx\xa5\xc0\x83\xab\x1b\r\xc4\xd2\xb5\xd9\xbbs\x9a\xd8DG\xd1*t\x03\xaa\x1c\xa0Q\xd6a\xe7\xb64\r\xd9BH/\xa1\xfa/\xaa)\xe0\xdf1D\xd1\xb2\xd2\xabR\x9c\xdcrU\xf4M\xca^') mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/cpuinfo\x00', 0x0, 0x0) 5.78372898s ago: executing program 2 (id=4255): r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0xc, &(0x7f0000000040)=0x7f, 0x4) 3.962986439s ago: executing program 0 (id=4256): syz_clone(0x4100000, 0x0, 0x0, 0x0, 0x0, 0x0) waitid(0x60ff, 0x0, 0x0, 0x41000004, &(0x7f0000000040)) 3.962358689s ago: executing program 1 (id=4257): r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f0000000080)={0x73622a85, 0x100}) mmap$binder(&(0x7f00000a0000)=nil, 0x0, 0x1, 0x11, r0, 0x40000000000) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000003c0)={0x4, 0x0, &(0x7f0000000100)=[@register_looper], 0x51, 0x0, &(0x7f0000000340)="a89aff67520a7335b849b4f88a6db06e45e3f5e648a65b8003975be8a982d5135e161a783d3d01fddcbd838bac308358a7e349f333e620505e4cf1982c991b516a9e26b6bb537c85f5ad467697f0d78b9a"}) (async) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000240)={0x4c, 0x0, &(0x7f0000000140)=[@transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x30, 0x0, 0x0, 0x60, 0x18, &(0x7f00000001c0)={@ptr={0x70742a85, 0x0, &(0x7f0000000480)=""/144, 0x90, 0x1, 0x7}, @fd={0x66642a85, 0x0, r0}, @fda={0x66646185, 0x9, 0x0, 0x2d}}, &(0x7f0000000280)={0x0, 0x28, 0x40}}, 0x1000}], 0x0, 0x0, 0x0}) 3.899949959s ago: executing program 2 (id=4258): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmsg$can_raw(r1, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x2020) recvmmsg(r1, &(0x7f0000009800)=[{{0x0, 0x0, 0x0}, 0x4}, {{0x0, 0x0, 0x0}, 0x9}, {{0x0, 0x0, &(0x7f0000003640)=[{&(0x7f0000002180)=""/4096, 0x1000}, {&(0x7f0000003180)=""/177, 0xb1}, {&(0x7f00000032c0)=""/246, 0xf6}, {&(0x7f00000033c0)=""/231, 0xe7}, {&(0x7f00000034c0)=""/211, 0xd3}], 0x5}, 0x81}, {{0x0, 0x0, 0x0}, 0x8}, {{0x0, 0x0, 0x0}, 0x5}, {{0x0, 0x0, 0x0}, 0x5}, {{0x0, 0x0, 0x0}, 0x1ff}], 0x7, 0x2100, 0x0) sendmsg$NL80211_CMD_SET_MPATH(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x20, 0x0, 0x300, 0x70bd29, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MPATH_NEXT_HOP={0xa}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x800) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x482, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)={0xfffffffc, 0xb, 0x0, 0xfffffffc, 0x7f, "db8f2d2b3b7596160c6981acf8805944823a7f"}) write$binfmt_aout(r2, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x83, "00000000000000000000ffff00"}) r3 = syz_open_pts(r2, 0x0) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f0000003f80)={0x2020}, 0x2020) ioctl$UI_DEV_CREATE(r0, 0x5501) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) write$input_event(r0, &(0x7f0000000000)={{r5, r6/1000+10000}, 0x15, 0xfffc}, 0x18) madvise(&(0x7f0000000000/0x600000)=nil, 0x600722, 0x66) syz_clone(0x1022000, 0x0, 0xfffffffffffffc76, 0x0, 0x0, 0x0) 2.025641769s ago: executing program 0 (id=4259): r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r0, 0x0, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0xffffffff}, 0x10, 0x0) 2.022411038s ago: executing program 1 (id=4260): r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000800)="240000001e005f031420654400000000000000000100000001000800080008c01300ff00", 0x24) 1.974478199s ago: executing program 2 (id=4261): openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder1\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x1c0) mkdirat(0xffffffffffffff9c, 0x0, 0x1c0) ioctl$TCFLSH(0xffffffffffffffff, 0x400455c8, 0x4) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f00000002c0)=0x30) getrandom(&(0x7f0000000240)=""/286, 0xffffff9a, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setpipe(r0, 0x407, 0x0) write$FUSE_INIT(r0, &(0x7f0000000340)={0x50, 0xfffffffffffffffe, 0x0, {0x7, 0x28, 0xd19e, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x10}}, 0x50) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000100)="eb", 0x20000101}], 0x1, 0x0) fcntl$setpipe(r0, 0x407, 0x2000000) syz_clone(0xa0001000, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0) 6.85836ms ago: executing program 0 (id=4262): r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000080)='./binderfs/custom1\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x2000001, 0xc3072, 0xffffffffffffffff, 0x3000000) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/slabinfo\x00', 0x41, 0x0) write$FUSE_INTERRUPT(r1, 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f0000000000)={0x73622a85, 0x100a, 0x1}) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f0000000040)={0x73622a85, 0x1}) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) 6.0213ms ago: executing program 1 (id=4263): r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x10, 0x2}, 0x10) r1 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0xffff, 0x10000, &(0x7f0000000040)=0xff, 0x4) bind$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) 0s ago: executing program 2 (id=4264): r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) (async) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x21, &(0x7f0000000040)=0xdebb, 0x4) (async) sendto$inet6(r1, 0x0, 0x0, 0xfffffefffbfbbfbe, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @empty, 0x6}, 0x1c) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000280)={0x0, 'bridge_slave_1\x00', {}, 0x2d3}) (async) socket$igmp(0x2, 0x3, 0x2) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_RTHDR(r2, 0x29, 0x39, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x18) (async) r3 = socket$unix(0x1, 0x2, 0x0) (async) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='timerslack_ns\x00') preadv(r4, &(0x7f00000001c0)=[{&(0x7f0000000500)=""/212, 0xd4}], 0x1, 0x33, 0x0) (async, rerun: 32) r5 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder1\x00', 0x1002, 0x0) (async, rerun: 32) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) r6 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r6, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) connect$inet(r6, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) (async, rerun: 64) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) (rerun: 64) sendto$inet(r6, &(0x7f0000000900)="c45cf7035c053bdf388b125b37fbf978a43202842b9ac13bb7dee6033985e3740e8d079e39e2c5e4ba5f17c1b798855a5d69c649e0d43207700ae9514eb2c63b4eea814097f18f92836e37df71d03d84e0d30e768b1a7daf3d79a14dc45c4f44ad479df36d6e4da3566add6226729d0a3dd251ead94249389e4699eb8c0953ceb4cb9e002320c4e402df794cd43375afa9a2a704ab5615a78a83bda5e0c3c24e9943d5fea00756cc35e63e55603da5ad3bedf80031b90dbb40b0a0c7dd088dc9964d2a8d8c3879", 0xc7, 0x44088881, 0x0, 0x0) close_range(r5, 0xffffffffffffffff, 0x0) (async) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000140)={'syz_tun\x00', &(0x7f0000000040)=@ethtool_eee={0x45, 0x2, 0x1, 0x28000, 0x4, 0x1000, 0x10, 0xfffffffb, [0x0, 0x9]}}) (async, rerun: 64) r7 = socket$unix(0x1, 0x1, 0x0) (rerun: 64) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000640)=0xc) (async) bind$unix(r7, &(0x7f0000000180)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) accept4$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x80000) (async) r8 = socket$pptp(0x18, 0x1, 0x2) listen(r8, 0x51) listen(r7, 0x8) (async, rerun: 64) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffa) (rerun: 64) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x3000002, 0x12, r0, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.146' (ED25519) to the list of known hosts. [ 24.692405][ T36] audit: type=1400 audit(1750841804.560:64): avc: denied { mounton } for pid=281 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 24.693702][ T281] cgroup: Unknown subsys name 'net' [ 24.715962][ T36] audit: type=1400 audit(1750841804.560:65): avc: denied { mount } for pid=281 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 24.745369][ T36] audit: type=1400 audit(1750841804.590:66): avc: denied { unmount } for pid=281 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 24.745582][ T281] cgroup: Unknown subsys name 'devices' [ 24.954662][ T281] cgroup: Unknown subsys name 'hugetlb' [ 24.961791][ T281] cgroup: Unknown subsys name 'rlimit' [ 25.052373][ T36] audit: type=1400 audit(1750841804.920:67): avc: denied { setattr } for pid=281 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 25.078604][ T36] audit: type=1400 audit(1750841804.920:68): avc: denied { mounton } for pid=281 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 25.105879][ T36] audit: type=1400 audit(1750841804.920:69): avc: denied { mount } for pid=281 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 25.115357][ T283] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 25.143455][ T36] audit: type=1400 audit(1750841805.010:70): avc: denied { relabelto } for pid=283 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 25.170800][ T36] audit: type=1400 audit(1750841805.010:71): avc: denied { write } for pid=283 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 25.173085][ T281] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 25.201002][ T36] audit: type=1400 audit(1750841805.030:72): avc: denied { read } for pid=281 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 25.241700][ T36] audit: type=1400 audit(1750841805.030:73): avc: denied { open } for pid=281 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 26.618179][ T288] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.626052][ T288] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.633228][ T288] bridge_slave_0: entered allmulticast mode [ 26.639435][ T288] bridge_slave_0: entered promiscuous mode [ 26.647342][ T288] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.654413][ T288] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.662029][ T288] bridge_slave_1: entered allmulticast mode [ 26.668656][ T288] bridge_slave_1: entered promiscuous mode [ 26.762660][ T289] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.769813][ T289] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.776949][ T289] bridge_slave_0: entered allmulticast mode [ 26.783424][ T289] bridge_slave_0: entered promiscuous mode [ 26.790212][ T289] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.797491][ T289] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.804797][ T289] bridge_slave_1: entered allmulticast mode [ 26.811140][ T289] bridge_slave_1: entered promiscuous mode [ 26.834616][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.841766][ T291] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.849364][ T291] bridge_slave_0: entered allmulticast mode [ 26.855654][ T291] bridge_slave_0: entered promiscuous mode [ 26.868192][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.875445][ T291] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.882584][ T291] bridge_slave_1: entered allmulticast mode [ 26.888942][ T291] bridge_slave_1: entered promiscuous mode [ 26.917168][ T290] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.924404][ T290] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.931709][ T290] bridge_slave_0: entered allmulticast mode [ 26.938694][ T290] bridge_slave_0: entered promiscuous mode [ 26.945297][ T290] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.952576][ T290] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.959997][ T290] bridge_slave_1: entered allmulticast mode [ 26.966487][ T290] bridge_slave_1: entered promiscuous mode [ 27.021465][ T288] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.029773][ T288] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.037799][ T288] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.045103][ T288] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.125027][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.132136][ T291] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.139680][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.146834][ T291] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.170685][ T289] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.178656][ T289] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.186106][ T289] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.193409][ T289] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.212643][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.220484][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.229123][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.238228][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.279503][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.287411][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.298891][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.306248][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.331065][ T46] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.338551][ T46] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.347065][ T46] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.354473][ T46] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.375469][ T46] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.382726][ T46] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.392189][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.399244][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.431324][ T288] veth0_vlan: entered promiscuous mode [ 27.443382][ T291] veth0_vlan: entered promiscuous mode [ 27.455177][ T289] veth0_vlan: entered promiscuous mode [ 27.470570][ T291] veth1_macvtap: entered promiscuous mode [ 27.483559][ T288] veth1_macvtap: entered promiscuous mode [ 27.491992][ T289] veth1_macvtap: entered promiscuous mode [ 27.525176][ T291] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 27.560879][ T290] veth0_vlan: entered promiscuous mode [ 27.595336][ T290] veth1_macvtap: entered promiscuous mode [ 27.707529][ T321] kvm_intel: L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 27.946012][ T10] usb 3-1: new high-speed USB device number 2 using dummy_hcd [ 28.101824][ T333] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 28.122622][ T10] usb 3-1: Using ep0 maxpacket: 32 [ 28.131095][ T10] usb 3-1: config 0 has an invalid interface number: 67 but max is 0 [ 28.139729][ T10] usb 3-1: config 0 has no interface number 0 [ 28.147845][ T10] usb 3-1: New USB device found, idVendor=0424, idProduct=9901, bcdDevice=c2.57 [ 28.157512][ T10] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 28.165888][ T10] usb 3-1: Product: syz [ 28.170098][ T10] usb 3-1: Manufacturer: syz [ 28.175116][ T10] usb 3-1: SerialNumber: syz [ 28.181073][ T10] usb 3-1: config 0 descriptor?? [ 28.188205][ T10] smsc95xx v2.0.0 [ 28.381934][ T45] usb 4-1: new high-speed USB device number 2 using dummy_hcd [ 28.531931][ T45] usb 4-1: Using ep0 maxpacket: 32 [ 28.586162][ T342] binfmt_misc: register: failed to install interpreter file ./file0 [ 28.621683][ T45] usb 4-1: config 0 has an invalid interface number: 67 but max is 0 [ 28.646123][ T45] usb 4-1: config 0 has no interface number 0 [ 28.655916][ T45] usb 4-1: New USB device found, idVendor=0424, idProduct=9901, bcdDevice=c2.57 [ 28.691755][ T45] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 28.701706][ T45] usb 4-1: Product: syz [ 28.707689][ T45] usb 4-1: Manufacturer: syz [ 28.714724][ T45] usb 4-1: SerialNumber: syz [ 28.730219][ T45] usb 4-1: config 0 descriptor?? [ 28.762078][ T45] smsc95xx v2.0.0 [ 29.224047][ T10] smsc95xx 3-1:0.67 (unnamed net_device) (uninitialized): Failed to read reg index 0x00000030: -32 [ 29.234925][ T45] smsc95xx 4-1:0.67 (unnamed net_device) (uninitialized): Failed to read reg index 0x00000030: -32 [ 29.236293][ T10] smsc95xx 3-1:0.67 (unnamed net_device) (uninitialized): Error reading E2P_CMD [ 29.249008][ T45] smsc95xx 4-1:0.67 (unnamed net_device) (uninitialized): Error reading E2P_CMD [ 30.241929][ T305] usb 1-1: new full-speed USB device number 2 using dummy_hcd [ 30.292699][ T360] syzkaller0: entered promiscuous mode [ 30.298226][ T360] syzkaller0: entered allmulticast mode [ 30.403606][ T305] usb 1-1: config 0 interface 0 altsetting 0 has an invalid descriptor for endpoint zero, skipping [ 30.414684][ T305] usb 1-1: config 0 interface 0 altsetting 0 has an endpoint descriptor with address 0x94, changing to 0x84 [ 30.427848][ T305] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x84 has invalid maxpacket 13155, setting to 64 [ 30.440618][ T305] usb 1-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 1 [ 30.499507][ T36] kauditd_printk_skb: 52 callbacks suppressed [ 30.499526][ T36] audit: type=1400 audit(1750841810.360:126): avc: denied { create } for pid=366 comm="syz.1.18" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 30.527869][ T36] audit: type=1400 audit(1750841810.360:127): avc: denied { write } for pid=366 comm="syz.1.18" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 30.548261][ T36] audit: type=1400 audit(1750841810.360:128): avc: denied { nlmsg_write } for pid=366 comm="syz.1.18" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 30.601950][ T305] usb 1-1: New USB device found, idVendor=084e, idProduct=1001, bcdDevice=ed.ae [ 30.611304][ T305] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 30.619723][ T305] usb 1-1: Product: syz [ 30.623952][ T305] usb 1-1: Manufacturer: syz [ 30.628929][ T305] usb 1-1: SerialNumber: syz [ 30.635795][ T305] usb 1-1: config 0 descriptor?? [ 30.641188][ T357] raw-gadget.2 gadget.0: fail, usb_ep_enable returned -22 [ 30.649801][ T305] input: KB Gear Tablet as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:0.0/input/input4 [ 30.858950][ T357] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 30.867721][ T357] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 30.878982][ T36] audit: type=1400 audit(1750841810.740:129): avc: denied { read } for pid=94 comm="acpid" name="event4" dev="devtmpfs" ino=445 scontext=system_u:system_r:acpid_t tcontext=root:object_r:device_t tclass=file permissive=1 [ 30.879032][ T9] usb 1-1: USB disconnect, device number 2 [ 30.901413][ T36] audit: type=1400 audit(1750841810.740:130): avc: denied { open } for pid=94 comm="acpid" path="/dev/input/event4" dev="devtmpfs" ino=445 scontext=system_u:system_r:acpid_t tcontext=root:object_r:device_t tclass=file permissive=1 [ 30.932179][ T36] audit: type=1400 audit(1750841810.740:131): avc: denied { ioctl } for pid=94 comm="acpid" path="/dev/input/event4" dev="devtmpfs" ino=445 ioctlcmd=0x4520 scontext=system_u:system_r:acpid_t tcontext=root:object_r:device_t tclass=file permissive=1 [ 31.254705][ T36] audit: type=1400 audit(1750841811.120:132): avc: denied { read write } for pid=373 comm="syz.1.20" name="binder1" dev="binder" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 31.278269][ T36] audit: type=1400 audit(1750841811.120:133): avc: denied { open } for pid=373 comm="syz.1.20" path="/dev/binderfs/binder1" dev="binder" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 31.302589][ T36] audit: type=1400 audit(1750841811.120:134): avc: denied { read write } for pid=373 comm="syz.1.20" name="fuse" dev="devtmpfs" ino=23 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 31.327150][ T36] audit: type=1400 audit(1750841811.120:135): avc: denied { open } for pid=373 comm="syz.1.20" path="/dev/fuse" dev="devtmpfs" ino=23 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 31.332865][ T45] smsc95xx 4-1:0.67 (unnamed net_device) (uninitialized): Failed to read reg index 0x0000006c: -71 [ 31.362402][ T45] smsc95xx 4-1:0.67: probe with driver smsc95xx failed with error -71 [ 31.375321][ T45] usb 4-1: USB disconnect, device number 2 [ 31.381090][ T305] hid-generic C98F:0003:0000.0001: unknown main item tag 0x0 [ 31.390250][ T10] smsc95xx 3-1:0.67 (unnamed net_device) (uninitialized): Failed to write reg index 0x00000014: -71 [ 31.401562][ T305] hid-generic C98F:0003:0000.0001: unknown main item tag 0x0 [ 31.410412][ T10] smsc95xx 3-1:0.67: probe with driver smsc95xx failed with error -71 [ 31.419999][ T305] hid-generic C98F:0003:0000.0001: hidraw0: HID v0.00 Device [syz0] on syz1 [ 31.431507][ T10] usb 3-1: USB disconnect, device number 2 [ 31.461589][ T378] fido_id[378]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 32.890843][ T428] Zero length message leads to an empty skb [ 35.501998][ T36] kauditd_printk_skb: 629 callbacks suppressed [ 35.502014][ T36] audit: type=1400 audit(1750841815.370:765): avc: denied { create } for pid=927 comm="syz.3.288" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 35.528804][ T36] audit: type=1400 audit(1750841815.370:766): avc: denied { read write } for pid=289 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 35.557493][ T36] audit: type=1400 audit(1750841815.370:767): avc: denied { read write } for pid=291 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 35.583732][ T36] audit: type=1400 audit(1750841815.400:768): avc: denied { create } for pid=934 comm="syz.2.292" anonclass=[secretmem] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 [ 35.605111][ T36] audit: type=1400 audit(1750841815.400:769): avc: denied { read write } for pid=291 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 35.629530][ T36] audit: type=1400 audit(1750841815.400:770): avc: denied { read write } for pid=289 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 35.659146][ T36] audit: type=1400 audit(1750841815.420:771): avc: denied { read write } for pid=290 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 35.684896][ T36] audit: type=1400 audit(1750841815.420:772): avc: denied { read } for pid=939 comm="syz.2.294" dev="nsfs" ino=4026532568 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 35.707767][ T36] audit: type=1400 audit(1750841815.420:773): avc: denied { create } for pid=939 comm="syz.2.294" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 35.728181][ T36] audit: type=1400 audit(1750841815.420:774): avc: denied { read write } for pid=291 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 37.229356][ T1178] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=1178 comm=syz.0.412 [ 38.278871][ T1322] capability: warning: `syz.3.483' uses deprecated v2 capabilities in a way that may be insecure [ 38.655648][ T1421] netlink: 25 bytes leftover after parsing attributes in process `syz.3.531'. [ 38.667418][ T1421] netlink: 25 bytes leftover after parsing attributes in process `syz.3.531'. [ 38.844808][ T1475] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=1475 comm=syz.1.557 [ 40.512411][ T36] kauditd_printk_skb: 672 callbacks suppressed [ 40.512424][ T36] audit: type=1400 audit(1750841820.380:1447): avc: denied { read } for pid=1650 comm="syz.1.642" name="event0" dev="devtmpfs" ino=192 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=0 [ 40.542687][ T36] audit: type=1326 audit(1750841820.380:1448): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1650 comm="syz.1.642" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f54f238e929 code=0x7ffc0000 [ 40.566500][ T36] audit: type=1326 audit(1750841820.380:1449): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1650 comm="syz.1.642" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f54f238e929 code=0x7ffc0000 [ 40.593857][ T36] audit: type=1326 audit(1750841820.380:1450): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1650 comm="syz.1.642" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7f54f238d58a code=0x7ffc0000 [ 40.619075][ T36] audit: type=1326 audit(1750841820.380:1451): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1650 comm="syz.1.642" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f54f23c11e5 code=0x7ffc0000 [ 40.643761][ T36] audit: type=1400 audit(1750841820.430:1452): avc: denied { read write } for pid=291 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 40.668022][ T36] audit: type=1400 audit(1750841820.430:1453): avc: denied { create } for pid=1652 comm="syz.2.643" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 40.687963][ T36] audit: type=1400 audit(1750841820.430:1454): avc: denied { read write } for pid=291 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 40.712443][ T36] audit: type=1400 audit(1750841820.460:1455): avc: denied { execmem } for pid=1654 comm="syz.2.644" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 40.733748][ T36] audit: type=1400 audit(1750841820.460:1456): avc: denied { read write } for pid=291 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 41.905055][ T1861] netlink: 24 bytes leftover after parsing attributes in process `syz.2.745'. [ 45.522848][ T36] kauditd_printk_skb: 520 callbacks suppressed [ 45.522864][ T36] audit: type=1400 audit(1750841825.390:1977): avc: denied { create } for pid=2111 comm="syz.2.869" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 45.552161][ T36] audit: type=1400 audit(1750841825.390:1978): avc: denied { create } for pid=2111 comm="syz.2.869" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 45.574300][ T36] audit: type=1400 audit(1750841825.420:1979): avc: denied { read write } for pid=291 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 45.599580][ T36] audit: type=1400 audit(1750841825.420:1980): avc: denied { read } for pid=2113 comm="syz.2.870" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 45.632305][ T36] audit: type=1400 audit(1750841825.430:1981): avc: denied { read write } for pid=291 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 45.656870][ T36] audit: type=1400 audit(1750841825.430:1982): avc: denied { read } for pid=2115 comm="syz.2.871" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 45.683052][ T36] audit: type=1400 audit(1750841825.440:1983): avc: denied { read write } for pid=291 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 45.709014][ T36] audit: type=1400 audit(1750841825.450:1984): avc: denied { execmem } for pid=2117 comm="syz.2.872" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 45.729518][ T36] audit: type=1400 audit(1750841825.450:1985): avc: denied { create } for pid=2117 comm="syz.2.872" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 45.755278][ T36] audit: type=1400 audit(1750841825.450:1986): avc: denied { create } for pid=2117 comm="syz.2.872" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 [ 49.221940][ T53] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 50.536086][ T36] kauditd_printk_skb: 623 callbacks suppressed [ 50.536103][ T36] audit: type=1400 audit(1750841830.400:2610): avc: denied { mount } for pid=2662 comm="syz.1.1131" name="/" dev="configfs" ino=1833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=0 [ 50.569349][ T36] audit: type=1400 audit(1750841830.410:2611): avc: denied { read write } for pid=288 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 50.602931][ T36] audit: type=1400 audit(1750841830.460:2612): avc: denied { mount } for pid=2664 comm="syz.1.1132" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=0 [ 50.633580][ T36] audit: type=1400 audit(1750841830.500:2613): avc: denied { read write } for pid=288 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 50.668558][ T36] audit: type=1400 audit(1750841830.530:2614): avc: denied { read } for pid=2667 comm="syz.1.1133" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 50.711910][ T36] audit: type=1400 audit(1750841830.570:2615): avc: denied { read write } for pid=288 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 50.746123][ T36] audit: type=1400 audit(1750841830.570:2616): avc: denied { read } for pid=2669 comm="syz.1.1134" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 50.773360][ T36] audit: type=1400 audit(1750841830.600:2617): avc: denied { read write } for pid=288 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 50.798304][ T36] audit: type=1400 audit(1750841830.620:2618): avc: denied { create } for pid=2671 comm="syz.1.1135" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 50.839580][ T36] audit: type=1400 audit(1750841830.700:2619): avc: denied { read write } for pid=288 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 50.993104][ T2706] netlink: 'syz.3.1152': attribute type 4 has an invalid length. [ 51.664229][ T2806] netlink: 'syz.2.1200': attribute type 4 has an invalid length. [ 51.676456][ T2806] netlink: 'syz.2.1200': attribute type 4 has an invalid length. [ 52.219866][ T2854] netlink: 'syz.2.1222': attribute type 12 has an invalid length. [ 53.200600][ T2955] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=2955 comm=syz.2.1271 [ 53.372709][ T2981] syzkaller0: entered promiscuous mode [ 53.378311][ T2981] syzkaller0: entered allmulticast mode [ 53.527821][ T3005] netlink: 'syz.1.1294': attribute type 12 has an invalid length. [ 55.771005][ T36] kauditd_printk_skb: 645 callbacks suppressed [ 55.771020][ T36] audit: type=1400 audit(1750841835.630:3265): avc: denied { read write } for pid=288 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 55.801888][ T36] audit: type=1400 audit(1750841835.640:3266): avc: denied { read write } for pid=3211 comm="syz.1.1390" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 55.825231][ T36] audit: type=1400 audit(1750841835.660:3267): avc: denied { read write } for pid=288 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 55.851599][ T36] audit: type=1400 audit(1750841835.660:3268): avc: denied { mount } for pid=3213 comm="syz.1.1391" name="/" dev="ramfs" ino=12865 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=0 [ 55.881887][ T36] audit: type=1400 audit(1750841835.670:3269): avc: denied { read write } for pid=288 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 55.908832][ T36] audit: type=1400 audit(1750841835.710:3270): avc: denied { read } for pid=3215 comm="syz.1.1392" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 55.932466][ T36] audit: type=1400 audit(1750841835.710:3271): avc: denied { read write } for pid=288 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 55.957926][ T36] audit: type=1400 audit(1750841835.710:3272): avc: denied { read write } for pid=291 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 55.982577][ T36] audit: type=1400 audit(1750841835.710:3273): avc: denied { create } for pid=3218 comm="syz.1.1393" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 [ 56.004429][ T36] audit: type=1400 audit(1750841835.750:3274): avc: denied { read write } for pid=288 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 57.064223][ T3322] capability: warning: `syz.3.1444' uses 32-bit capabilities (legacy support in use) [ 57.933499][ T3460] netlink: 'syz.0.1512': attribute type 4 has an invalid length. [ 59.225100][ T3539] veth1_macvtap: left promiscuous mode [ 59.359819][ T3554] IPv6: NLM_F_CREATE should be specified when creating new route [ 59.367915][ T3554] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 59.375889][ T3554] IPv6: NLM_F_CREATE should be set when creating new route [ 60.772085][ T36] kauditd_printk_skb: 577 callbacks suppressed [ 60.772104][ T36] audit: type=1400 audit(1750841840.630:3852): avc: denied { read write } for pid=291 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 60.836092][ T36] audit: type=1400 audit(1750841840.680:3853): avc: denied { read write } for pid=290 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 60.875467][ T36] audit: type=1400 audit(1750841840.690:3854): avc: denied { create } for pid=3623 comm="syz.3.1583" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 60.910917][ T36] audit: type=1400 audit(1750841840.690:3855): avc: denied { read write } for pid=3623 comm="syz.3.1583" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 60.935011][ T36] audit: type=1400 audit(1750841840.690:3856): avc: denied { create } for pid=3623 comm="syz.3.1583" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 [ 60.956466][ T36] audit: type=1400 audit(1750841840.690:3857): avc: denied { create } for pid=3623 comm="syz.3.1583" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 60.977692][ T36] audit: type=1400 audit(1750841840.700:3858): avc: denied { read write } for pid=290 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 61.002202][ T36] audit: type=1400 audit(1750841840.730:3859): avc: denied { mounton } for pid=3625 comm="syz.3.1584" path="/354/file1" dev="tmpfs" ino=1920 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 61.040372][ T36] audit: type=1400 audit(1750841840.770:3860): avc: denied { mounton } for pid=3625 comm="syz.3.1584" path="/354/file1/bus" dev="tmpfs" ino=1924 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 61.074475][ T36] audit: type=1400 audit(1750841840.770:3861): avc: denied { create } for pid=3625 comm="syz.3.1584" name="file1" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=0 [ 62.431871][ T3692] syz.1.1611 (3692): /proc/3691/oom_adj is deprecated, please use /proc/3691/oom_score_adj instead. [ 62.445036][ T3692] netlink: 'syz.1.1611': attribute type 12 has an invalid length. [ 63.223858][ T3708] netlink: 'syz.0.1618': attribute type 4 has an invalid length. [ 65.783656][ T36] kauditd_printk_skb: 712 callbacks suppressed [ 65.783672][ T36] audit: type=1400 audit(1750841845.650:4574): avc: denied { read write } for pid=291 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 65.816301][ T36] audit: type=1400 audit(1750841845.660:4575): avc: denied { read write } for pid=289 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 65.842938][ T36] audit: type=1400 audit(1750841845.660:4576): avc: denied { read write } for pid=291 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 65.867370][ T36] audit: type=1400 audit(1750841845.670:4577): avc: denied { create } for pid=4263 comm="syz.0.1895" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 65.889751][ T36] audit: type=1400 audit(1750841845.680:4578): avc: denied { create } for pid=4264 comm="syz.2.1896" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 65.910998][ T36] audit: type=1400 audit(1750841845.680:4579): avc: denied { create } for pid=4264 comm="syz.2.1896" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 65.932557][ T36] audit: type=1400 audit(1750841845.680:4580): avc: denied { read write } for pid=289 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 65.957083][ T36] audit: type=1400 audit(1750841845.680:4581): avc: denied { read write } for pid=291 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 65.981613][ T36] audit: type=1400 audit(1750841845.680:4582): avc: denied { create } for pid=4267 comm="syz.0.1897" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 66.001539][ T36] audit: type=1400 audit(1750841845.680:4583): avc: denied { read write } for pid=289 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 70.488509][ T4823] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=64 sclass=netlink_route_socket pid=4823 comm=syz.2.2172 [ 70.929292][ T36] kauditd_printk_skb: 634 callbacks suppressed [ 70.929307][ T36] audit: type=1400 audit(1750841850.790:5218): avc: denied { read write } for pid=290 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 70.960493][ T36] audit: type=1400 audit(1750841850.800:5219): avc: denied { read append } for pid=4840 comm="syz.3.2181" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 70.983937][ T36] audit: type=1400 audit(1750841850.800:5220): avc: denied { read write } for pid=290 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 71.008239][ T36] audit: type=1400 audit(1750841850.810:5221): avc: denied { read } for pid=4842 comm="syz.3.2182" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 71.031223][ T36] audit: type=1400 audit(1750841850.820:5222): avc: denied { read write } for pid=290 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 71.055746][ T36] audit: type=1400 audit(1750841850.820:5223): avc: denied { create } for pid=4844 comm="syz.3.2183" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 [ 71.232134][ T36] audit: type=1400 audit(1750841851.100:5224): avc: denied { read write } for pid=288 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 71.261331][ T36] audit: type=1400 audit(1750841851.120:5225): avc: denied { read write } for pid=4846 comm="syz.1.2184" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 71.288413][ T36] audit: type=1400 audit(1750841851.130:5226): avc: denied { read write } for pid=4846 comm="syz.1.2184" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 71.312850][ T36] audit: type=1400 audit(1750841851.130:5227): avc: denied { read write } for pid=289 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 75.228777][ T5163] netlink: 'syz.2.2339': attribute type 12 has an invalid length. [ 75.548225][ T304] Bluetooth: hci0: Frame reassembly failed (-84) [ 76.128969][ T36] kauditd_printk_skb: 436 callbacks suppressed [ 76.128985][ T36] audit: type=1400 audit(1750841855.990:5664): avc: denied { read write } for pid=291 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 76.160318][ T36] audit: type=1400 audit(1750841856.000:5665): avc: denied { read write } for pid=5209 comm="syz.2.2360" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 76.184863][ T36] audit: type=1400 audit(1750841856.000:5666): avc: denied { read write } for pid=291 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 76.210100][ T36] audit: type=1400 audit(1750841856.010:5667): avc: denied { create } for pid=5211 comm="syz.2.2361" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 76.230937][ T36] audit: type=1400 audit(1750841856.010:5668): avc: denied { create } for pid=5211 comm="syz.2.2361" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 [ 76.254032][ T36] audit: type=1400 audit(1750841856.020:5669): avc: denied { read write } for pid=291 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 76.279047][ T36] audit: type=1400 audit(1750841856.020:5670): avc: denied { read } for pid=5213 comm="syz.2.2362" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 76.302677][ T36] audit: type=1400 audit(1750841856.030:5671): avc: denied { read write } for pid=291 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 76.327146][ T36] audit: type=1400 audit(1750841856.030:5672): avc: denied { read } for pid=5215 comm="syz.2.2363" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 76.349845][ T36] audit: type=1400 audit(1750841856.040:5673): avc: denied { read write } for pid=291 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.621971][ T2297] Bluetooth: hci0: command 0x1003 tx timeout [ 77.621970][ T53] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 81.134889][ T36] kauditd_printk_skb: 619 callbacks suppressed [ 81.134905][ T36] audit: type=1400 audit(1750841861.000:6293): avc: denied { read write } for pid=289 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 81.167133][ T36] audit: type=1400 audit(1750841861.000:6294): avc: denied { create } for pid=5717 comm="syz.0.2611" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 81.187448][ T36] audit: type=1400 audit(1750841861.000:6295): avc: denied { read write } for pid=289 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 81.212707][ T36] audit: type=1400 audit(1750841861.000:6296): avc: denied { name_bind } for pid=5719 comm="syz.0.2612" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 81.240981][ T36] audit: type=1400 audit(1750841861.000:6297): avc: denied { read write } for pid=289 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 81.265388][ T36] audit: type=1400 audit(1750841861.040:6298): avc: denied { create } for pid=5721 comm="syz.0.2613" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 81.285638][ T36] audit: type=1400 audit(1750841861.040:6299): avc: denied { create } for pid=5721 comm="syz.0.2613" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 81.306474][ T36] audit: type=1400 audit(1750841861.040:6300): avc: denied { read write } for pid=289 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 81.330710][ T36] audit: type=1400 audit(1750841861.040:6301): avc: denied { create } for pid=5723 comm="syz.0.2614" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 81.351696][ T36] audit: type=1400 audit(1750841861.040:6302): avc: denied { create } for pid=5723 comm="syz.0.2614" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 82.130660][ T46] Bluetooth: hci0: Frame reassembly failed (-84) [ 84.181968][ T53] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 84.181990][ T2297] Bluetooth: hci0: command 0x1003 tx timeout [ 86.215821][ T36] kauditd_printk_skb: 433 callbacks suppressed [ 86.215837][ T36] audit: type=1400 audit(1750841866.080:6736): avc: denied { read write } for pid=289 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 86.246293][ T36] audit: type=1400 audit(1750841866.080:6737): avc: denied { mounton } for pid=6087 comm="syz.0.2785" path="/710/file0" dev="tmpfs" ino=3732 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 86.269431][ T53] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 86.274627][ T2297] Bluetooth: hci0: command 0x1003 tx timeout [ 86.275785][ T36] audit: type=1400 audit(1750841866.080:6738): avc: denied { mounton } for pid=6087 comm="syz.0.2785" path="/" dev="tmpfs" ino=3732 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 86.307303][ T6095] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2789'. [ 86.310091][ T36] audit: type=1400 audit(1750841866.120:6739): avc: denied { read write } for pid=290 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 86.340369][ T36] audit: type=1400 audit(1750841866.120:6740): avc: denied { read write } for pid=6089 comm="syz.3.2786" name="udmabuf" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 86.342448][ T6095] bridge_slave_1: left allmulticast mode [ 86.365119][ T36] audit: type=1400 audit(1750841866.150:6741): avc: denied { read write } for pid=289 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 86.391906][ T6095] bridge_slave_1: left promiscuous mode [ 86.394812][ T36] audit: type=1400 audit(1750841866.150:6742): avc: denied { read write } for pid=290 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 86.409722][ T6095] bridge0: port 2(bridge_slave_1) entered disabled state [ 86.423578][ T36] audit: type=1400 audit(1750841866.150:6743): avc: denied { read write } for pid=6092 comm="syz.3.2788" name="fuse" dev="devtmpfs" ino=23 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=0 [ 86.454106][ T36] audit: type=1400 audit(1750841866.150:6744): avc: denied { mounton } for pid=6092 comm="syz.3.2788" path="/634/file0" dev="tmpfs" ino=3384 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 86.477126][ T36] audit: type=1400 audit(1750841866.150:6745): avc: denied { read write } for pid=290 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 86.477322][ T6095] bridge_slave_0: left allmulticast mode [ 86.524182][ T6095] bridge_slave_0: left promiscuous mode [ 86.530127][ T6095] bridge0: port 1(bridge_slave_0) entered disabled state [ 86.588335][ T6118] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6118 comm=syz.2.2799 [ 86.687617][ T6142] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6142 comm=syz.0.2811 [ 86.728881][ T6151] syz.0.2823 uses obsolete (PF_INET,SOCK_PACKET) [ 86.744062][ T6155] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2816'. [ 86.752992][ T6155] bridge_slave_1: left allmulticast mode [ 86.758712][ T6155] bridge_slave_1: left promiscuous mode [ 86.764363][ T6155] bridge0: port 2(bridge_slave_1) entered disabled state [ 86.771769][ T6155] bridge_slave_0: left allmulticast mode [ 86.777490][ T6155] bridge_slave_0: left promiscuous mode [ 86.783132][ T6155] bridge0: port 1(bridge_slave_0) entered disabled state [ 89.861994][ T2297] Bluetooth: hci0: command 0x1003 tx timeout [ 89.862306][ T53] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 90.790027][ T46] Bluetooth: hci0: Frame reassembly failed (-84) [ 91.043606][ T6574] netlink: 'syz.3.3018': attribute type 4 has an invalid length. [ 91.051969][ T6574] netlink: 17 bytes leftover after parsing attributes in process `syz.3.3018'. [ 91.222381][ T36] kauditd_printk_skb: 647 callbacks suppressed [ 91.222399][ T36] audit: type=1400 audit(1750841871.090:7393): avc: denied { read write } for pid=291 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 91.258104][ T36] audit: type=1400 audit(1750841871.120:7394): avc: denied { read write } for pid=6596 comm="syz.2.3029" name="fuse" dev="devtmpfs" ino=23 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=0 [ 91.311777][ T36] audit: type=1400 audit(1750841871.120:7395): avc: denied { mounton } for pid=6596 comm="syz.2.3029" path="/779/file0" dev="tmpfs" ino=4115 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 91.361881][ T36] audit: type=1400 audit(1750841871.130:7396): avc: denied { read write } for pid=291 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 91.386305][ T36] audit: type=1400 audit(1750841871.130:7397): avc: denied { read append } for pid=6598 comm="syz.2.3030" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 91.409724][ T36] audit: type=1400 audit(1750841871.140:7398): avc: denied { read write } for pid=291 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 91.433924][ T36] audit: type=1400 audit(1750841871.140:7399): avc: denied { read } for pid=6600 comm="syz.2.3031" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 91.461833][ T36] audit: type=1400 audit(1750841871.150:7400): avc: denied { read write } for pid=291 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 91.536633][ T36] audit: type=1400 audit(1750841871.160:7401): avc: denied { mounton } for pid=6602 comm="syz.2.3032" path="/782/bus" dev="tmpfs" ino=4134 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 91.579342][ T36] audit: type=1400 audit(1750841871.160:7402): avc: denied { mounton } for pid=6602 comm="syz.2.3032" path="/782/bus/file1" dev="tmpfs" ino=4135 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 92.169087][ T6651] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6651 comm=syz.2.3055 [ 92.821916][ T2297] Bluetooth: hci0: command 0x1003 tx timeout [ 92.821916][ T53] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 95.024681][ T6851] netlink: 'syz.0.3151': attribute type 4 has an invalid length. [ 96.452505][ T36] kauditd_printk_skb: 469 callbacks suppressed [ 96.452521][ T36] audit: type=1400 audit(1750841876.320:7872): avc: denied { read write } for pid=291 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 96.482927][ T36] audit: type=1400 audit(1750841876.320:7873): avc: denied { read write } for pid=6943 comm="syz.2.3196" name="rnullb0" dev="devtmpfs" ino=31 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 96.506189][ T36] audit: type=1400 audit(1750841876.320:7874): avc: denied { read } for pid=6943 comm="syz.2.3196" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 96.528938][ T36] audit: type=1400 audit(1750841876.330:7875): avc: denied { read write } for pid=291 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 96.553382][ T36] audit: type=1400 audit(1750841876.340:7876): avc: denied { write } for pid=6946 comm="syz.2.3197" name="tcp6" dev="proc" ino=4026532614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=0 [ 96.576424][ T36] audit: type=1326 audit(1750841876.340:7877): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6946 comm="syz.2.3197" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f90ba98e929 code=0x7ffc0000 [ 96.599970][ T36] audit: type=1326 audit(1750841876.340:7878): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6946 comm="syz.2.3197" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f90ba98e929 code=0x7ffc0000 [ 96.623596][ T36] audit: type=1326 audit(1750841876.340:7879): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6946 comm="syz.2.3197" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f90ba98e929 code=0x7ffc0000 [ 96.647135][ T36] audit: type=1326 audit(1750841876.340:7880): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6946 comm="syz.2.3197" exe="/root/syz-executor" sig=0 arch=c000003e syscall=44 compat=0 ip=0x7f90ba98e929 code=0x7ffc0000 [ 96.670685][ T36] audit: type=1326 audit(1750841876.340:7881): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6946 comm="syz.2.3197" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f90ba98e929 code=0x7ffc0000 [ 101.504726][ T36] kauditd_printk_skb: 360 callbacks suppressed [ 101.504737][ T36] audit: type=1400 audit(1750841881.370:8242): avc: denied { read write } for pid=288 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 101.535340][ T36] audit: type=1400 audit(1750841881.380:8243): avc: denied { read } for pid=7162 comm="syz.1.3292" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 101.558344][ T36] audit: type=1400 audit(1750841881.380:8244): avc: denied { read write } for pid=288 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 101.582530][ T36] audit: type=1400 audit(1750841881.390:8245): avc: denied { create } for pid=7164 comm="syz.1.3293" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 101.602186][ T36] audit: type=1400 audit(1750841881.390:8246): avc: denied { read write } for pid=7164 comm="syz.1.3293" name="ppp" dev="devtmpfs" ino=86 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=0 [ 101.625325][ T36] audit: type=1400 audit(1750841881.390:8247): avc: denied { read } for pid=7164 comm="syz.1.3293" name="ppp" dev="devtmpfs" ino=86 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=0 [ 101.648074][ T36] audit: type=1400 audit(1750841881.390:8248): avc: denied { read } for pid=7164 comm="syz.1.3293" name="binder1" dev="binder" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 [ 101.670707][ T36] audit: type=1400 audit(1750841881.390:8249): avc: denied { create } for pid=7164 comm="syz.1.3293" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 101.690677][ T36] audit: type=1400 audit(1750841881.390:8250): avc: denied { read write } for pid=288 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 101.714930][ T36] audit: type=1400 audit(1750841881.400:8251): avc: denied { create } for pid=7166 comm="syz.1.3294" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 106.581829][ T36] kauditd_printk_skb: 789 callbacks suppressed [ 106.598630][ T36] audit: type=1400 audit(1750841886.440:9041): avc: denied { read write } for pid=289 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 106.622902][ T36] audit: type=1400 audit(1750841886.450:9042): avc: denied { watch watch_reads } for pid=7908 comm="syz.0.3662" path="/970" dev="tmpfs" ino=5081 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 106.646380][ T36] audit: type=1400 audit(1750841886.450:9043): avc: denied { create } for pid=7908 comm="syz.0.3662" name="file1" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=0 [ 106.667222][ T36] audit: type=1400 audit(1750841886.460:9044): avc: denied { read write } for pid=288 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 106.691238][ T36] audit: type=1400 audit(1750841886.460:9045): avc: denied { read write } for pid=289 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 106.715237][ T36] audit: type=1400 audit(1750841886.470:9046): avc: denied { name_bind } for pid=7912 comm="syz.0.3663" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=0 [ 106.736879][ T36] audit: type=1400 audit(1750841886.470:9047): avc: denied { read write } for pid=291 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 106.761076][ T36] audit: type=1400 audit(1750841886.470:9048): avc: denied { name_bind } for pid=7912 comm="syz.0.3663" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=0 [ 106.782735][ T36] audit: type=1400 audit(1750841886.480:9049): avc: denied { read write } for pid=289 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 106.806726][ T36] audit: type=1400 audit(1750841886.490:9050): avc: denied { create } for pid=7910 comm="syz.1.3664" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 108.695596][ T8073] syz.2.3743 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 111.703841][ T36] kauditd_printk_skb: 570 callbacks suppressed [ 111.703857][ T36] audit: type=1400 audit(1750841891.570:9621): avc: denied { read write } for pid=289 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 111.734212][ T36] audit: type=1400 audit(1750841891.570:9622): avc: denied { mount } for pid=8413 comm="syz.0.3907" name="/" dev="configfs" ino=1833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=0 [ 111.757105][ T36] audit: type=1400 audit(1750841891.580:9623): avc: denied { read write } for pid=289 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 111.781242][ T36] audit: type=1400 audit(1750841891.600:9624): avc: denied { mounton } for pid=8415 comm="syz.0.3908" path="/1030/file0" dev="tmpfs" ino=5407 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 111.804002][ T36] audit: type=1400 audit(1750841891.610:9625): avc: denied { read write } for pid=289 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 111.828040][ T36] audit: type=1400 audit(1750841891.610:9626): avc: denied { write } for pid=8417 comm="syz.0.3909" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 111.850731][ T36] audit: type=1400 audit(1750841891.620:9627): avc: denied { read write } for pid=289 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 111.874717][ T36] audit: type=1400 audit(1750841891.630:9628): avc: denied { read } for pid=8419 comm="syz.0.3910" dev="nsfs" ino=4026532389 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 111.925840][ T36] audit: type=1400 audit(1750841891.790:9629): avc: denied { read write } for pid=289 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 111.964823][ T36] audit: type=1400 audit(1750841891.790:9630): avc: denied { create } for pid=8421 comm="syz.0.3911" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 114.369232][ T8742] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8742 comm=syz.3.4062 [ 115.545004][ T8783] netlink: 'syz.1.4080': attribute type 4 has an invalid length. [ 115.553015][ T8783] netlink: 17 bytes leftover after parsing attributes in process `syz.1.4080'. [ 116.151154][ T8833] netlink: 'syz.2.4104': attribute type 4 has an invalid length. [ 116.723828][ T36] kauditd_printk_skb: 562 callbacks suppressed [ 116.723844][ T36] audit: type=1400 audit(1750841896.590:10193): avc: denied { create } for pid=8859 comm="syz.0.4114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 116.751017][ T36] audit: type=1400 audit(1750841896.590:10194): avc: denied { create } for pid=8859 comm="syz.0.4114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 116.829087][ T36] audit: type=1400 audit(1750841896.690:10195): avc: denied { create } for pid=8854 comm="syz.2.4112" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=0 [ 116.848977][ T36] audit: type=1400 audit(1750841896.690:10196): avc: denied { read write } for pid=289 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 116.875780][ T36] audit: type=1400 audit(1750841896.690:10197): avc: denied { create } for pid=8854 comm="syz.2.4112" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 [ 116.897921][ T36] audit: type=1400 audit(1750841896.740:10198): avc: denied { read } for pid=8862 comm="syz.0.4115" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 116.920812][ T36] audit: type=1400 audit(1750841896.740:10199): avc: denied { read } for pid=8862 comm="syz.0.4115" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 116.944010][ T36] audit: type=1400 audit(1750841896.750:10200): avc: denied { read write } for pid=291 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 116.968372][ T36] audit: type=1400 audit(1750841896.750:10201): avc: denied { read write } for pid=8862 comm="syz.0.4115" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 116.996592][ T36] audit: type=1400 audit(1750841896.770:10202): avc: denied { read write } for pid=289 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 118.378541][ T46] Bluetooth: hci0: Frame reassembly failed (-84) [ 119.139212][ T8977] netlink: 'syz.0.4167': attribute type 12 has an invalid length. [ 120.421919][ T2297] Bluetooth: hci0: command 0x1003 tx timeout [ 120.421979][ T53] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 121.270144][ T9016] FAULT_INJECTION: forcing a failure. [ 121.270144][ T9016] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 121.283322][ T9016] CPU: 0 UID: 0 PID: 9016 Comm: syz.1.4184 Not tainted 6.12.30-syzkaller-g030e00a2d78c #0 57efd5a98e1182d97bd5f975427dc401009108c9 [ 121.283354][ T9016] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 121.283368][ T9016] Call Trace: [ 121.283374][ T9016] [ 121.283382][ T9016] __dump_stack+0x21/0x30 [ 121.283408][ T9016] dump_stack_lvl+0x10c/0x190 [ 121.283427][ T9016] ? __cfi_dump_stack_lvl+0x10/0x10 [ 121.283449][ T9016] dump_stack+0x19/0x20 [ 121.283467][ T9016] should_fail_ex+0x3d9/0x530 [ 121.283488][ T9016] should_fail+0xf/0x20 [ 121.283506][ T9016] should_fail_usercopy+0x1e/0x30 [ 121.283530][ T9016] strncpy_from_user+0x28/0x270 [ 121.283551][ T9016] path_setxattr+0xf3/0x560 [ 121.283574][ T9016] ? simple_xattrs_free+0x180/0x180 [ 121.283601][ T9016] ? __cfi_ksys_write+0x10/0x10 [ 121.283624][ T9016] __x64_sys_setxattr+0xc9/0xe0 [ 121.283644][ T9016] x64_sys_call+0x2d94/0x2ee0 [ 121.283666][ T9016] do_syscall_64+0x58/0xf0 [ 121.283682][ T9016] ? clear_bhb_loop+0x50/0xa0 [ 121.283702][ T9016] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 121.283721][ T9016] RIP: 0033:0x7f54f238e929 [ 121.283741][ T9016] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 121.283755][ T9016] RSP: 002b:00007f54f329c038 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 121.283782][ T9016] RAX: ffffffffffffffda RBX: 00007f54f25b5fa0 RCX: 00007f54f238e929 [ 121.283796][ T9016] RDX: 0000000000000000 RSI: 00002000000000c0 RDI: 0000000000000000 [ 121.283808][ T9016] RBP: 00007f54f329c090 R08: 0000000000000002 R09: 0000000000000000 [ 121.283820][ T9016] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 121.283831][ T9016] R13: 0000000000000001 R14: 00007f54f25b5fa0 R15: 00007ffe8413e428 [ 121.283846][ T9016] [ 121.688676][ T9070] FAULT_INJECTION: forcing a failure. [ 121.688676][ T9070] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 121.721912][ T9070] CPU: 0 UID: 0 PID: 9070 Comm: syz.0.4201 Not tainted 6.12.30-syzkaller-g030e00a2d78c #0 57efd5a98e1182d97bd5f975427dc401009108c9 [ 121.721918][ T9074] FAULT_INJECTION: forcing a failure. [ 121.721918][ T9074] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 121.721939][ T9070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 121.721948][ T9070] Call Trace: [ 121.721953][ T9070] [ 121.721959][ T9070] __dump_stack+0x21/0x30 [ 121.721988][ T9070] dump_stack_lvl+0x10c/0x190 [ 121.722007][ T9070] ? __cfi_dump_stack_lvl+0x10/0x10 [ 121.722029][ T9070] dump_stack+0x19/0x20 [ 121.722047][ T9070] should_fail_ex+0x3d9/0x530 [ 121.722068][ T9070] should_fail+0xf/0x20 [ 121.722086][ T9070] should_fail_usercopy+0x1e/0x30 [ 121.722105][ T9070] _copy_to_user+0x24/0xa0 [ 121.722127][ T9070] simple_read_from_buffer+0xed/0x160 [ 121.722145][ T9070] proc_fail_nth_read+0x19e/0x210 [ 121.722162][ T9070] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 121.722179][ T9070] ? bpf_lsm_file_permission+0xd/0x20 [ 121.722198][ T9070] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 121.722215][ T9070] vfs_read+0x278/0xb60 [ 121.722233][ T9070] ? do_setitimer+0x6d/0x5e0 [ 121.722250][ T9070] ? __kasan_check_read+0x15/0x20 [ 121.722269][ T9070] ? __cfi_vfs_read+0x10/0x10 [ 121.722288][ T9070] ? __kasan_check_write+0x18/0x20 [ 121.722306][ T9070] ? mutex_lock+0x92/0x1c0 [ 121.722325][ T9070] ? __cfi_mutex_lock+0x10/0x10 [ 121.722343][ T9070] ? __fget_files+0x2c5/0x340 [ 121.722366][ T9070] ksys_read+0x141/0x250 [ 121.722386][ T9070] ? __cfi_ksys_read+0x10/0x10 [ 121.722406][ T9070] ? __kasan_check_read+0x15/0x20 [ 121.722425][ T9070] __x64_sys_read+0x7f/0x90 [ 121.722444][ T9070] x64_sys_call+0x2638/0x2ee0 [ 121.722465][ T9070] do_syscall_64+0x58/0xf0 [ 121.722480][ T9070] ? clear_bhb_loop+0x50/0xa0 [ 121.722498][ T9070] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 121.722516][ T9070] RIP: 0033:0x7fd555f8d33c [ 121.722530][ T9070] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 121.722543][ T9070] RSP: 002b:00007fd556ea3030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 121.722562][ T9070] RAX: ffffffffffffffda RBX: 00007fd5561b5fa0 RCX: 00007fd555f8d33c [ 121.722575][ T9070] RDX: 000000000000000f RSI: 00007fd556ea30a0 RDI: 0000000000000003 [ 121.722586][ T9070] RBP: 00007fd556ea3090 R08: 0000000000000000 R09: 0000000000000000 [ 121.722597][ T9070] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 121.722608][ T9070] R13: 0000000000000001 R14: 00007fd5561b5fa0 R15: 00007ffcfdeab208 [ 121.722620][ T9070] [ 121.846655][ T9043] FAULT_INJECTION: forcing a failure. [ 121.846655][ T9043] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 121.848079][ T9074] CPU: 1 UID: 0 PID: 9074 Comm: syz.1.4203 Not tainted 6.12.30-syzkaller-g030e00a2d78c #0 57efd5a98e1182d97bd5f975427dc401009108c9 [ 121.848106][ T9074] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 121.848117][ T9074] Call Trace: [ 121.848123][ T9074] [ 121.848130][ T9074] __dump_stack+0x21/0x30 [ 121.848155][ T9074] dump_stack_lvl+0x10c/0x190 [ 121.848175][ T9074] ? __cfi_dump_stack_lvl+0x10/0x10 [ 121.848195][ T9074] ? show_map_pad_vma+0x2ed/0x460 [ 121.848224][ T9074] ? __cfi_show_smap+0x10/0x10 [ 121.848242][ T9074] ? seq_putc+0xed/0x120 [ 121.848259][ T9074] dump_stack+0x19/0x20 [ 121.848277][ T9074] should_fail_ex+0x3d9/0x530 [ 121.848298][ T9074] should_fail+0xf/0x20 [ 121.848315][ T9074] should_fail_usercopy+0x1e/0x30 [ 121.848335][ T9074] _copy_to_iter+0x3bb/0x14b0 [ 121.848359][ T9074] ? __cfi__copy_to_iter+0x10/0x10 [ 121.848380][ T9074] ? check_stack_object+0x82/0x140 [ 121.848401][ T9074] ? __virt_addr_valid+0x2a6/0x380 [ 121.848425][ T9074] ? __kasan_check_write+0x18/0x20 [ 121.848445][ T9074] seq_read_iter+0xd39/0xfe0 [ 121.848471][ T9074] seq_read+0x2e3/0x3d0 [ 121.848495][ T9074] ? __cfi_seq_read+0x10/0x10 [ 121.848519][ T9074] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 121.848537][ T9074] ? bpf_lsm_file_permission+0xd/0x20 [ 121.848556][ T9074] ? __cfi_seq_read+0x10/0x10 [ 121.848578][ T9074] vfs_read+0x278/0xb60 [ 121.848599][ T9074] ? __cfi_vfs_read+0x10/0x10 [ 121.848618][ T9074] ? __kasan_check_write+0x18/0x20 [ 121.848636][ T9074] ? mutex_lock+0x92/0x1c0 [ 121.848656][ T9074] ? __cfi_mutex_lock+0x10/0x10 [ 121.848674][ T9074] ? __fget_files+0x2c5/0x340 [ 121.848697][ T9074] ksys_read+0x141/0x250 [ 121.848717][ T9074] ? __cfi_ksys_read+0x10/0x10 [ 121.848738][ T9074] ? __kasan_check_read+0x15/0x20 [ 121.848758][ T9074] __x64_sys_read+0x7f/0x90 [ 121.848778][ T9074] x64_sys_call+0x2638/0x2ee0 [ 121.848800][ T9074] do_syscall_64+0x58/0xf0 [ 121.848815][ T9074] ? clear_bhb_loop+0x50/0xa0 [ 121.848834][ T9074] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 121.848852][ T9074] RIP: 0033:0x7f54f238e929 [ 121.848866][ T9074] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 121.848888][ T9074] RSP: 002b:00007f54f329c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 121.848908][ T9074] RAX: ffffffffffffffda RBX: 00007f54f25b5fa0 RCX: 00007f54f238e929 [ 121.848922][ T9074] RDX: 0000000000002020 RSI: 0000200000000640 RDI: 0000000000000003 [ 121.848934][ T9074] RBP: 00007f54f329c090 R08: 0000000000000000 R09: 0000000000000000 [ 121.848946][ T9074] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 121.848957][ T9074] R13: 0000000000000000 R14: 00007f54f25b5fa0 R15: 00007ffe8413e428 [ 121.848972][ T9074] [ 121.974572][ T9080] netlink: 25 bytes leftover after parsing attributes in process `syz.3.4205'. [ 121.977043][ T36] kauditd_printk_skb: 270 callbacks suppressed [ 121.977058][ T36] audit: type=1400 audit(1750841901.640:10469): avc: denied { read write } for pid=289 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 122.064924][ T9043] CPU: 1 UID: 0 PID: 9043 Comm: syz.2.4196 Not tainted 6.12.30-syzkaller-g030e00a2d78c #0 57efd5a98e1182d97bd5f975427dc401009108c9 [ 122.064953][ T9043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 122.064964][ T9043] Call Trace: [ 122.064970][ T9043] [ 122.065044][ T9043] __dump_stack+0x21/0x30 [ 122.065069][ T9043] dump_stack_lvl+0x10c/0x190 [ 122.065088][ T9043] ? __cfi_dump_stack_lvl+0x10/0x10 [ 122.065108][ T9043] ? _raw_spin_lock_irqsave+0xaf/0x150 [ 122.065134][ T9043] ? __cfi__raw_spin_lock_irqsave+0x10/0x10 [ 122.065158][ T9043] dump_stack+0x19/0x20 [ 122.065176][ T9043] should_fail_ex+0x3d9/0x530 [ 122.065196][ T9043] should_fail_alloc_page+0xeb/0x110 [ 122.065219][ T9043] __alloc_pages_noprof+0x19d/0x6c0 [ 122.065238][ T9043] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 122.065255][ T9043] ? __kasan_check_write+0x18/0x20 [ 122.065273][ T9043] ? _raw_spin_lock_irqsave+0xaf/0x150 [ 122.065299][ T9043] __pud_alloc+0xb3/0x900 [ 122.065323][ T9043] ? __cfi___pud_alloc+0x10/0x10 [ 122.065344][ T9043] ? _raw_spin_unlock+0x45/0x60 [ 122.065367][ T9043] ? get_task_mm+0xbc/0xf0 [ 122.065382][ T9043] ? ns_to_kernel_old_timeval+0x25/0xc0 [ 122.065405][ T9043] ? getrusage+0x11bf/0x1280 [ 122.065426][ T9043] handle_mm_fault+0x1885/0x1b90 [ 122.065449][ T9043] ? __cfi_mt_find+0x10/0x10 [ 122.065471][ T9043] ? __cfi_handle_mm_fault+0x10/0x10 [ 122.065495][ T9043] ? refcount_dec_and_test+0x53/0x80 [ 122.065512][ T9043] ? lock_mm_and_find_vma+0xb8/0x3a0 [ 122.065535][ T9043] do_user_addr_fault+0x4ca/0x1200 [ 122.065558][ T9043] exc_page_fault+0x59/0xc0 [ 122.065582][ T9043] asm_exc_page_fault+0x2b/0x30 [ 122.065601][ T9043] RIP: 0010:rep_movs_alternative+0x4a/0xa0 [ 122.065625][ T9043] Code: 75 f1 c3 cc cc cc cc 66 0f 1f 84 00 00 00 00 00 48 8b 06 48 89 07 48 83 c6 08 48 83 c7 08 83 e9 08 74 df 83 f9 08 73 e8 eb c9 a4 e9 0f 62 03 00 48 8b 06 48 89 07 48 8d 47 08 48 83 e0 f8 48 [ 122.065642][ T9043] RSP: 0018:ffffc9000079fc80 EFLAGS: 00050206 [ 122.065658][ T9043] RAX: ffffffff82a4ae01 RBX: 0000000000000090 RCX: 0000000000000090 [ 122.065671][ T9043] RDX: 0000000000000000 RSI: ffffc9000079fd80 RDI: 0000200000000040 [ 122.065684][ T9043] RBP: ffffc9000079fcb0 R08: ffffc9000079fe0f R09: 1ffff920000f3fc1 [ 122.065697][ T9043] R10: dffffc0000000000 R11: fffff520000f3fc2 R12: 00002000000000d0 [ 122.065710][ T9043] R13: 00007ffffffff000 R14: 0000200000000040 R15: ffffc9000079fd80 [ 122.065724][ T9043] ? _copy_to_user+0x51/0xa0 [ 122.065748][ T9043] ? _copy_to_user+0x7d/0xa0 [ 122.065770][ T9043] __se_sys_waitid+0x1de/0x360 [ 122.065788][ T9043] ? __x64_sys_waitid+0xf0/0xf0 [ 122.065807][ T9043] ? __cfi_child_wait_callback+0x10/0x10 [ 122.065826][ T9043] ? mutex_unlock+0x8b/0x240 [ 122.065844][ T9043] ? __cfi_mutex_unlock+0x10/0x10 [ 122.065862][ T9043] ? __fget_files+0x2c5/0x340 [ 122.065886][ T9043] ? ksys_write+0x1ef/0x250 [ 122.065909][ T9043] __x64_sys_waitid+0xc3/0xf0 [ 122.065927][ T9043] x64_sys_call+0x2c50/0x2ee0 [ 122.065947][ T9043] do_syscall_64+0x58/0xf0 [ 122.065965][ T9043] ? clear_bhb_loop+0x50/0xa0 [ 122.065983][ T9043] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 122.066008][ T9043] RIP: 0033:0x7f90ba98e929 [ 122.066021][ T9043] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 122.066035][ T9043] RSP: 002b:00007f90bb8bd038 EFLAGS: 00000246 ORIG_RAX: 00000000000000f7 [ 122.066053][ T9043] RAX: ffffffffffffffda RBX: 00007f90babb5fa0 RCX: 00007f90ba98e929 [ 122.066066][ T9043] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 122.066077][ T9043] RBP: 00007f90bb8bd090 R08: 0000200000000040 R09: 0000000000000000 [ 122.066089][ T9043] R10: 0000000041000004 R11: 0000000000000246 R12: 0000000000000001 [ 122.066101][ T9043] R13: 0000000000000000 R14: 00007f90babb5fa0 R15: 00007fff372109b8 [ 122.066116][ T9043] [ 122.677130][ T36] audit: type=1400 audit(1750841901.750:10470): avc: denied { read write } for pid=290 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 122.727442][ T36] audit: type=1400 audit(1750841901.770:10471): avc: denied { read } for pid=9075 comm="syz.0.4204" name="binder0" dev="binder" ino=10 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 [ 122.757325][ T36] audit: type=1400 audit(1750841901.780:10472): avc: denied { read write } for pid=288 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 122.800365][ T36] audit: type=1400 audit(1750841901.800:10473): avc: denied { read } for pid=9078 comm="syz.1.4206" name="ashmem" dev="devtmpfs" ino=201 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 122.838173][ T36] audit: type=1400 audit(1750841901.800:10474): avc: denied { create } for pid=9078 comm="syz.1.4206" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 122.864846][ T36] audit: type=1400 audit(1750841901.800:10475): avc: denied { create } for pid=9078 comm="syz.1.4206" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 122.896096][ T36] audit: type=1400 audit(1750841901.810:10476): avc: denied { create } for pid=9078 comm="syz.1.4206" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 [ 122.919189][ T36] audit: type=1326 audit(1750841901.810:10477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9078 comm="syz.1.4206" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f54f238e929 code=0x0 [ 122.948009][ T36] audit: type=1400 audit(1750841901.840:10478): avc: denied { lock } for pid=9077 comm="syz.3.4205" path="socket:[31505]" dev="sockfs" ino=31505 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=0 [ 126.838890][ T9152] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=9152 comm=syz.0.4229 [ 126.991792][ T9150] FAULT_INJECTION: forcing a failure. [ 126.991792][ T9150] name failslab, interval 1, probability 0, space 0, times 0 [ 127.004860][ T9150] CPU: 0 UID: 0 PID: 9150 Comm: syz.1.4230 Not tainted 6.12.30-syzkaller-g030e00a2d78c #0 57efd5a98e1182d97bd5f975427dc401009108c9 [ 127.004892][ T9150] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 127.004904][ T9150] Call Trace: [ 127.004910][ T9150] [ 127.004917][ T9150] __dump_stack+0x21/0x30 [ 127.004943][ T9150] dump_stack_lvl+0x10c/0x190 [ 127.004964][ T9150] ? __cfi_dump_stack_lvl+0x10/0x10 [ 127.004986][ T9150] dump_stack+0x19/0x20 [ 127.005005][ T9150] should_fail_ex+0x3d9/0x530 [ 127.005026][ T9150] should_failslab+0xac/0x100 [ 127.005051][ T9150] kmem_cache_alloc_noprof+0x42/0x3a0 [ 127.005073][ T9150] ? __anon_vma_prepare+0xac/0x570 [ 127.005095][ T9150] __anon_vma_prepare+0xac/0x570 [ 127.005115][ T9150] ? __kasan_check_write+0x18/0x20 [ 127.005135][ T9150] ? _raw_spin_lock+0x8c/0x120 [ 127.005162][ T9150] do_pte_missing+0x2cd5/0x3e50 [ 127.005180][ T9150] ? _raw_spin_unlock+0x45/0x60 [ 127.005206][ T9150] ? __cfi___pmd_alloc+0x10/0x10 [ 127.005229][ T9150] ? _raw_spin_unlock+0x45/0x60 [ 127.005253][ T9150] ? pte_marker_clear+0x1b0/0x1b0 [ 127.005269][ T9150] ? getrusage+0x11bf/0x1280 [ 127.005293][ T9150] handle_mm_fault+0x1166/0x1b90 [ 127.005320][ T9150] ? __cfi_handle_mm_fault+0x10/0x10 [ 127.005345][ T9150] ? refcount_dec_and_test+0x53/0x80 [ 127.005365][ T9150] ? lock_mm_and_find_vma+0xb8/0x3a0 [ 127.005389][ T9150] do_user_addr_fault+0x4ca/0x1200 [ 127.005414][ T9150] exc_page_fault+0x59/0xc0 [ 127.005435][ T9150] asm_exc_page_fault+0x2b/0x30 [ 127.005454][ T9150] RIP: 0010:rep_movs_alternative+0x4a/0xa0 [ 127.005478][ T9150] Code: 75 f1 c3 cc cc cc cc 66 0f 1f 84 00 00 00 00 00 48 8b 06 48 89 07 48 83 c6 08 48 83 c7 08 83 e9 08 74 df 83 f9 08 73 e8 eb c9 a4 e9 0f 62 03 00 48 8b 06 48 89 07 48 8d 47 08 48 83 e0 f8 48 [ 127.005494][ T9150] RSP: 0018:ffffc9000e607c80 EFLAGS: 00050206 [ 127.005511][ T9150] RAX: ffffffff82a4ae01 RBX: 0000000000000090 RCX: 0000000000000090 [ 127.005525][ T9150] RDX: 0000000000000000 RSI: ffffc9000e607d80 RDI: 0000200000000040 [ 127.005538][ T9150] RBP: ffffc9000e607cb0 R08: ffffc9000e607e0f R09: 1ffff92001cc0fc1 [ 127.005552][ T9150] R10: dffffc0000000000 R11: fffff52001cc0fc2 R12: 00002000000000d0 [ 127.005566][ T9150] R13: 00007ffffffff000 R14: 0000200000000040 R15: ffffc9000e607d80 [ 127.005582][ T9150] ? _copy_to_user+0x51/0xa0 [ 127.005606][ T9150] ? _copy_to_user+0x7d/0xa0 [ 127.005629][ T9150] __se_sys_waitid+0x1de/0x360 [ 127.005649][ T9150] ? __x64_sys_waitid+0xf0/0xf0 [ 127.005668][ T9150] ? __cfi_child_wait_callback+0x10/0x10 [ 127.005689][ T9150] ? mutex_unlock+0x8b/0x240 [ 127.005708][ T9150] ? __cfi_mutex_unlock+0x10/0x10 [ 127.005727][ T9150] ? __fget_files+0x2c5/0x340 [ 127.005752][ T9150] ? ksys_write+0x1ef/0x250 [ 127.005781][ T9150] __x64_sys_waitid+0xc3/0xf0 [ 127.005800][ T9150] x64_sys_call+0x2c50/0x2ee0 [ 127.005822][ T9150] do_syscall_64+0x58/0xf0 [ 127.005845][ T9150] ? clear_bhb_loop+0x50/0xa0 [ 127.005864][ T9150] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 127.005887][ T9150] RIP: 0033:0x7f54f238e929 [ 127.005901][ T9150] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 127.005915][ T9150] RSP: 002b:00007f54f329c038 EFLAGS: 00000246 ORIG_RAX: 00000000000000f7 [ 127.005934][ T9150] RAX: ffffffffffffffda RBX: 00007f54f25b5fa0 RCX: 00007f54f238e929 [ 127.005948][ T9150] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 127.005959][ T9150] RBP: 00007f54f329c090 R08: 0000200000000040 R09: 0000000000000000 [ 127.005972][ T9150] R10: 0000000041000004 R11: 0000000000000246 R12: 0000000000000001 [ 127.005985][ T9150] R13: 0000000000000000 R14: 00007f54f25b5fa0 R15: 00007ffe8413e428 [ 127.006000][ T9150] [ 127.372783][ T36] kauditd_printk_skb: 81 callbacks suppressed [ 127.372797][ T36] audit: type=1400 audit(1750841906.880:10560): avc: denied { read write } for pid=288 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 127.846772][ T36] audit: type=1400 audit(1750841907.710:10561): avc: denied { execmem } for pid=9155 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 127.905487][ T36] audit: type=1400 audit(1750841907.770:10562): avc: denied { read write } for pid=288 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 127.941900][ T36] audit: type=1400 audit(1750841907.780:10563): avc: denied { read write } for pid=291 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 128.701210][ T36] audit: type=1400 audit(1750841908.560:10564): avc: denied { read write } for pid=289 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 128.980275][ T36] audit: type=1400 audit(1750841908.840:10565): avc: denied { execmem } for pid=9164 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 129.005555][ T36] audit: type=1400 audit(1750841908.870:10566): avc: denied { create } for pid=9166 comm="syz.1.4236" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 129.045566][ T36] audit: type=1400 audit(1750841908.870:10567): avc: denied { read write } for pid=9168 comm="syz.2.4237" name="uhid" dev="devtmpfs" ino=199 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=0 [ 129.069779][ T36] audit: type=1400 audit(1750841908.890:10568): avc: denied { create } for pid=9166 comm="syz.1.4236" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 129.090186][ T36] audit: type=1400 audit(1750841908.890:10569): avc: denied { create } for pid=9166 comm="syz.1.4236" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 131.687759][ T9184] FAULT_INJECTION: forcing a failure. [ 131.687759][ T9184] name failslab, interval 1, probability 0, space 0, times 0 [ 131.700457][ T9184] CPU: 0 UID: 0 PID: 9184 Comm: syz.0.4241 Not tainted 6.12.30-syzkaller-g030e00a2d78c #0 57efd5a98e1182d97bd5f975427dc401009108c9 [ 131.700486][ T9184] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 131.700500][ T9184] Call Trace: [ 131.700504][ T9184] [ 131.700509][ T9184] __dump_stack+0x21/0x30 [ 131.700526][ T9184] dump_stack_lvl+0x10c/0x190 [ 131.700537][ T9184] ? __cfi_dump_stack_lvl+0x10/0x10 [ 131.700548][ T9184] ? mas_prev+0x5f/0xa0 [ 131.700560][ T9184] ? find_mergeable_anon_vma+0x635/0x6a0 [ 131.700574][ T9184] dump_stack+0x19/0x20 [ 131.700584][ T9184] should_fail_ex+0x3d9/0x530 [ 131.700596][ T9184] should_failslab+0xac/0x100 [ 131.700610][ T9184] kmem_cache_alloc_noprof+0x42/0x3a0 [ 131.700622][ T9184] ? __anon_vma_prepare+0xf4/0x570 [ 131.700634][ T9184] __anon_vma_prepare+0xf4/0x570 [ 131.700645][ T9184] ? __kasan_check_write+0x18/0x20 [ 131.700657][ T9184] do_pte_missing+0x2cd5/0x3e50 [ 131.700667][ T9184] ? _raw_spin_unlock+0x45/0x60 [ 131.700682][ T9184] ? __cfi___pmd_alloc+0x10/0x10 [ 131.700695][ T9184] ? _raw_spin_unlock+0x45/0x60 [ 131.700708][ T9184] ? pte_marker_clear+0x1b0/0x1b0 [ 131.700717][ T9184] ? getrusage+0x11bf/0x1280 [ 131.700730][ T9184] handle_mm_fault+0x1166/0x1b90 [ 131.700745][ T9184] ? __cfi_handle_mm_fault+0x10/0x10 [ 131.700759][ T9184] ? refcount_dec_and_test+0x53/0x80 [ 131.700770][ T9184] ? lock_mm_and_find_vma+0xb8/0x3a0 [ 131.700783][ T9184] do_user_addr_fault+0x4ca/0x1200 [ 131.700796][ T9184] exc_page_fault+0x59/0xc0 [ 131.700808][ T9184] asm_exc_page_fault+0x2b/0x30 [ 131.700818][ T9184] RIP: 0010:rep_movs_alternative+0x4a/0xa0 [ 131.700833][ T9184] Code: 75 f1 c3 cc cc cc cc 66 0f 1f 84 00 00 00 00 00 48 8b 06 48 89 07 48 83 c6 08 48 83 c7 08 83 e9 08 74 df 83 f9 08 73 e8 eb c9 a4 e9 0f 62 03 00 48 8b 06 48 89 07 48 8d 47 08 48 83 e0 f8 48 [ 131.700841][ T9184] RSP: 0018:ffffc9000c12fc80 EFLAGS: 00050206 [ 131.700851][ T9184] RAX: ffffffff82a4ae01 RBX: 0000000000000090 RCX: 0000000000000090 [ 131.700858][ T9184] RDX: 0000000000000000 RSI: ffffc9000c12fd80 RDI: 0000200000000040 [ 131.700866][ T9184] RBP: ffffc9000c12fcb0 R08: ffffc9000c12fe0f R09: 1ffff92001825fc1 [ 131.700873][ T9184] R10: dffffc0000000000 R11: fffff52001825fc2 R12: 00002000000000d0 [ 131.700880][ T9184] R13: 00007ffffffff000 R14: 0000200000000040 R15: ffffc9000c12fd80 [ 131.700888][ T9184] ? _copy_to_user+0x51/0xa0 [ 131.700903][ T9184] ? _copy_to_user+0x7d/0xa0 [ 131.700916][ T9184] __se_sys_waitid+0x1de/0x360 [ 131.700927][ T9184] ? __x64_sys_waitid+0xf0/0xf0 [ 131.700937][ T9184] ? __cfi_child_wait_callback+0x10/0x10 [ 131.700948][ T9184] ? mutex_unlock+0x8b/0x240 [ 131.700959][ T9184] ? __cfi_mutex_unlock+0x10/0x10 [ 131.700969][ T9184] ? __fget_files+0x2c5/0x340 [ 131.700983][ T9184] ? ksys_write+0x1ef/0x250 [ 131.700996][ T9184] __x64_sys_waitid+0xc3/0xf0 [ 131.701006][ T9184] x64_sys_call+0x2c50/0x2ee0 [ 131.701019][ T9184] do_syscall_64+0x58/0xf0 [ 131.701027][ T9184] ? clear_bhb_loop+0x50/0xa0 [ 131.701038][ T9184] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 131.701048][ T9184] RIP: 0033:0x7fd555f8e929 [ 131.701056][ T9184] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 131.701064][ T9184] RSP: 002b:00007fd556ea3038 EFLAGS: 00000246 ORIG_RAX: 00000000000000f7 [ 131.701074][ T9184] RAX: ffffffffffffffda RBX: 00007fd5561b5fa0 RCX: 00007fd555f8e929 [ 131.701082][ T9184] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 131.701088][ T9184] RBP: 00007fd556ea3090 R08: 0000200000000040 R09: 0000000000000000 [ 131.701095][ T9184] R10: 0000000041000004 R11: 0000000000000246 R12: 0000000000000001 [ 131.701101][ T9184] R13: 0000000000000000 R14: 00007fd5561b5fa0 R15: 00007ffcfdeab208 [ 131.701109][ T9184] [ 132.944519][ T36] kauditd_printk_skb: 20 callbacks suppressed [ 132.944536][ T36] audit: type=1400 audit(1750841912.800:10590): avc: denied { execmem } for pid=9190 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 132.974585][ T36] audit: type=1400 audit(1750841912.840:10591): avc: denied { read write } for pid=289 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 133.008104][ T36] audit: type=1400 audit(1750841912.840:10592): avc: denied { read write } for pid=291 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 133.032272][ T36] audit: type=1400 audit(1750841912.840:10593): avc: denied { read write } for pid=288 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 134.461876][ T36] audit: type=1400 audit(1750841914.320:10594): avc: denied { execmem } for pid=9197 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 134.490784][ T36] audit: type=1400 audit(1750841914.350:10595): avc: denied { read write } for pid=289 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 134.515294][ T36] audit: type=1400 audit(1750841914.350:10596): avc: denied { read } for pid=9201 comm="syz.2.4249" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 [ 134.538019][ T36] audit: type=1400 audit(1750841914.350:10597): avc: denied { read write } for pid=9201 comm="syz.2.4249" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 [ 134.561407][ T36] audit: type=1400 audit(1750841914.350:10598): avc: denied { read write } for pid=288 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 134.585538][ T36] audit: type=1400 audit(1750841914.380:10599): avc: denied { read } for pid=9201 comm="syz.2.4249" name="msr" dev="devtmpfs" ino=16 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 [ 139.603207][ T36] kauditd_printk_skb: 13 callbacks suppressed [ 139.603224][ T36] audit: type=1400 audit(1750841919.470:10613): avc: denied { execmem } for pid=9218 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 139.637521][ T36] audit: type=1400 audit(1750841919.500:10614): avc: denied { read } for pid=9220 comm="syz.1.4257" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 [ 139.661194][ T36] audit: type=1400 audit(1750841919.500:10615): avc: denied { read write } for pid=9223 comm="syz.2.4258" name="uinput" dev="devtmpfs" ino=194 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=0 [ 139.679561][ T9224] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9224 comm=syz.2.4258 [ 139.685026][ T36] audit: type=1400 audit(1750841919.500:10616): avc: denied { read write } for pid=289 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 139.721515][ T36] audit: type=1400 audit(1750841919.530:10617): avc: denied { read write } for pid=288 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 140.533825][ T36] audit: type=1400 audit(1750841920.400:10618): avc: denied { read write } for pid=291 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 141.547913][ T36] audit: type=1400 audit(1750841921.400:10619): avc: denied { execmem } for pid=9228 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 141.568696][ T36] audit: type=1400 audit(1750841921.410:10620): avc: denied { read write } for pid=288 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 141.593669][ T36] audit: type=1400 audit(1750841921.440:10621): avc: denied { read } for pid=9230 comm="syz.2.4261" name="binder1" dev="binder" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 [ 141.616974][ T36] audit: type=1400 audit(1750841921.440:10622): avc: denied { read write } for pid=9229 comm="syz.0.4259" name="uhid" dev="devtmpfs" ino=199 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=0 [ 143.812788][ T311] bridge_slave_1: left allmulticast mode [ 143.818465][ T311] bridge_slave_1: left promiscuous mode [ 143.832751][ T311] bridge0: port 2(bridge_slave_1) entered disabled state [ 143.852464][ T311] bridge_slave_0: left allmulticast mode [ 143.858127][ T311] bridge_slave_0: left promiscuous mode [ 143.867917][ T311] bridge0: port 1(bridge_slave_0) entered disabled state [ 143.974192][ T311] veth1_macvtap: left promiscuous mode [ 143.979691][ T311] veth0_vlan: left promiscuous mode