last executing test programs: 1.948252625s ago: executing program 0 (id=36924): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000005800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8014) r4 = socket(0x1e, 0x4, 0x0) sendmmsg(r4, 0x0, 0x0, 0x9200000000000000) 1.917111168s ago: executing program 2 (id=36926): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, 0x0) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r3, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0x12, r4, 0x0) 1.844184006s ago: executing program 0 (id=36927): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r0, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r3, 0x107, 0x16, 0x0, 0x0) 1.816468408s ago: executing program 0 (id=36929): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, 0x0) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000005800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8014) r4 = socket(0x1e, 0x4, 0x0) r5 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) dup3(r5, r4, 0x0) 1.436022737s ago: executing program 3 (id=36938): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, 0x0, 0x0, 0x0) write(r0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000140)=0x80) 1.119541818s ago: executing program 3 (id=36944): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000100000,user_id']) 1.046919236s ago: executing program 2 (id=36947): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000140)=0x80) 1.046389056s ago: executing program 3 (id=36949): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000005800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8014) r4 = socket(0x1e, 0x4, 0x0) sendmsg$BATADV_CMD_GET_HARDIF(r4, 0x0, 0x40040c1) 956.866625ms ago: executing program 0 (id=36951): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00), 0x0, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) r3 = socket(0x1e, 0x4, 0x0) sendmsg$BATADV_CMD_GET_HARDIF(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000500)=ANY=[@ANYBLOB="1c000000", @ANYRES16, @ANYBLOB="000226bd702208000000b5632bc449ae23033359164808439c27188a268c9409a1bb9a2f647ef4a3983d3b6b48de27bdca26785aeb4f24c77ed1ddfea1cfdb75f9d13792fe20f65f"], 0x1c}, 0x1, 0x0, 0x0, 0x48041}, 0x40040c1) 956.602885ms ago: executing program 3 (id=36952): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00), 0x0, 0x0) write(r0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000140)=0x80) 878.862192ms ago: executing program 3 (id=36954): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r4, &(0x7f0000000500), 0x0, 0x4) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0x12, r5, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r6, 0x0) 864.506714ms ago: executing program 3 (id=36956): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, 0x0) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r3, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0x12, r4, 0x0) 789.334691ms ago: executing program 1 (id=36957): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000140)=0x80) 688.167582ms ago: executing program 1 (id=36958): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, 0x0, 0x0, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000005800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8014) r4 = socket(0x1e, 0x4, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) 687.991322ms ago: executing program 2 (id=36959): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x4]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder1\x00', 0x0, 0x0) mmap$binder(&(0x7f00000a0000)=nil, 0x2000, 0x1, 0x11, r2, 0x0) mremap(&(0x7f000020e000/0x2000)=nil, 0x2000, 0x400000, 0x3, &(0x7f000082a000/0x400000)=nil) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004}, 0x0) madvise(&(0x7f000042f000/0x800000)=nil, 0x80fd00, 0x15) (fail_nth: 2) 539.551506ms ago: executing program 1 (id=36960): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000005800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8014) r4 = socket(0x1e, 0x4, 0x0) sendmsg$BATADV_CMD_GET_HARDIF(r4, 0x0, 0x40040c1) 394.891941ms ago: executing program 0 (id=36961): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, 0x0, 0x0, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000005800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8014) r4 = socket(0x1e, 0x4, 0x0) dup3(0xffffffffffffffff, r4, 0x0) 320.146888ms ago: executing program 0 (id=36962): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x275a, 0x0) rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') sendmmsg$inet6(r3, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0x12, r4, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r5, 0x0) 308.88811ms ago: executing program 2 (id=36963): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00), 0x0, 0x0) write(r0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000140)=0x80) 244.724256ms ago: executing program 1 (id=36964): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x275a, 0x0) rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000140)=0x80) 164.155824ms ago: executing program 2 (id=36965): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000005800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8014) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r5, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r4, 0x890b, &(0x7f0000000800)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private2, @private0, 0x1, 0x6, 0x0, 0x100, 0x6, 0x180107, r6}) 130.102457ms ago: executing program 1 (id=36966): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000340)=ANY=[], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r1, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000100000,user_id']) 111.072209ms ago: executing program 2 (id=36967): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r3, &(0x7f0000000440)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8014) r4 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_CONN_TIMEOUT(r4, 0x10f, 0x82, 0x0, 0x0) 0s ago: executing program 1 (id=36968): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, 0x0, 0x0, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000005800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8014) r4 = socket(0x1e, 0x4, 0x0) r5 = socket(0x1e, 0x4, 0x0) dup3(r5, r4, 0x0) kernel console output (not intermixed with test programs): dm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1422.204402][ T36] audit: type=1400 audit(1763083070.790:108153): avc: denied { read write open } for pid=5554 comm="syz.0.33959" path="/dev/fuse" dev="devtmpfs" ino=23 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1422.284342][ T36] audit: type=1400 audit(1763083070.790:108154): avc: denied { mounton } for pid=5554 comm="syz.0.33959" path="/336/file0" dev="tmpfs" ino=2100 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1422.374336][ T36] audit: type=1400 audit(1763083070.790:108155): avc: denied { mount } for pid=5554 comm="syz.0.33959" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1422.444329][ T36] audit: type=1400 audit(1763083070.830:108156): avc: denied { unmount } for pid=3064 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1422.504340][ T36] audit: type=1400 audit(1763083070.840:108157): avc: denied { read write } for pid=3064 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1424.445310][ T5636] overlayfs: overlapping lowerdir path [ 1426.896759][ T36] kauditd_printk_skb: 337 callbacks suppressed [ 1426.896779][ T36] audit: type=1400 audit(1763083075.730:108495): avc: denied { execute } for pid=5708 comm="syz.0.34033" path="/349/blkio.bfq.group_wait_time" dev="tmpfs" ino=2184 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1427.376009][ T36] audit: type=1400 audit(1763083076.210:108496): avc: denied { read write } for pid=4154 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1427.437271][ T36] audit: type=1400 audit(1763083076.210:108497): avc: denied { open } for pid=4154 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1427.484319][ T36] audit: type=1400 audit(1763083076.210:108498): avc: denied { ioctl } for pid=4154 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1427.534321][ T36] audit: type=1400 audit(1763083076.210:108499): avc: denied { execute } for pid=5710 comm="syz.3.34034" path="/164/blkio.bfq.group_wait_time" dev="tmpfs" ino=1044 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1427.594321][ T36] audit: type=1400 audit(1763083076.260:108500): avc: denied { read write } for pid=4154 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1427.662201][ T36] audit: type=1400 audit(1763083076.260:108501): avc: denied { open } for pid=4154 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1427.724316][ T36] audit: type=1400 audit(1763083076.260:108502): avc: denied { ioctl } for pid=4154 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1427.776267][ T36] audit: type=1400 audit(1763083076.270:108503): avc: denied { execute } for pid=5712 comm="syz.3.34036" path="/165/blkio.bfq.group_wait_time" dev="tmpfs" ino=1050 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1427.820677][ T36] audit: type=1400 audit(1763083076.320:108504): avc: denied { read write } for pid=4154 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1427.859206][ T5727] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=20586 sclass=netlink_route_socket pid=5727 comm=syz.1.34045 [ 1428.283656][ T5778] fuse: Unknown parameter 'g_id' [ 1429.874552][ T5887] SELinux: policydb table sizes (0,0) do not match mine (6,7) [ 1429.892623][ T5887] SELinux: failed to load policy [ 1430.186238][ T5918] netlink: 20 bytes leftover after parsing attributes in process `syz.0.34135'. [ 1431.326134][ T6056] binder: Bad value for 'max' [ 1431.745054][ T6073] SELinux: policydb table sizes (0,0) do not match mine (6,7) [ 1431.770766][ T6073] SELinux: failed to load policy [ 1431.911036][ T36] kauditd_printk_skb: 833 callbacks suppressed [ 1431.911066][ T36] audit: type=1400 audit(1763083080.740:109338): avc: denied { read write } for pid=4154 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1431.961224][ T36] audit: type=1400 audit(1763083080.740:109339): avc: denied { open } for pid=4154 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1431.987234][ T36] audit: type=1400 audit(1763083080.740:109340): avc: denied { ioctl } for pid=4154 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1432.013345][ T36] audit: type=1400 audit(1763083080.770:109341): avc: denied { execute } for pid=6080 comm="syz.3.34211" path="/221/blkio.bfq.group_wait_time" dev="tmpfs" ino=1394 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1432.157611][ T36] audit: type=1400 audit(1763083080.990:109342): avc: denied { read write } for pid=1011 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1432.196554][ T36] audit: type=1400 audit(1763083081.010:109343): avc: denied { read write open } for pid=1011 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1432.223504][ T36] audit: type=1400 audit(1763083081.010:109344): avc: denied { ioctl } for pid=1011 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1432.261805][ T36] audit: type=1400 audit(1763083081.030:109345): avc: denied { execute } for pid=6082 comm="syz.1.34213" path="/574/blkio.bfq.group_wait_time" dev="tmpfs" ino=3562 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1432.288171][ T36] audit: type=1400 audit(1763083081.030:109346): avc: denied { read } for pid=6082 comm="syz.1.34213" name="binder1" dev="binder" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1432.313675][ T36] audit: type=1400 audit(1763083081.030:109347): avc: denied { open } for pid=6082 comm="syz.1.34213" path="/dev/binderfs/binder1" dev="binder" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1433.428074][ T6131] netlink: 32 bytes leftover after parsing attributes in process `syz.2.34237'. [ 1434.794748][ T6170] SELinux: policydb version 1970299665 does not match my version range 15-33 [ 1434.814011][ T6170] SELinux: failed to load policy [ 1435.138237][ T6186] binder: Bad value for 'max' [ 1435.654359][ T4481] usb 1-1: new high-speed USB device number 30 using dummy_hcd [ 1435.804328][ T4481] usb 1-1: device descriptor read/64, error -71 [ 1435.886678][ T6229] SELinux: policydb table sizes (0,0) do not match mine (6,7) [ 1435.898910][ T6229] SELinux: failed to load policy [ 1436.054317][ T4481] usb 1-1: device descriptor read/64, error -71 [ 1436.132191][ T6249] binder: Bad value for 'max' [ 1436.185955][ T13] bridge_slave_1: left allmulticast mode [ 1436.192281][ T13] bridge_slave_1: left promiscuous mode [ 1436.201671][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 1436.210595][ T13] bridge_slave_0: left allmulticast mode [ 1436.216729][ T13] bridge_slave_0: left promiscuous mode [ 1436.223619][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 1436.280995][ T6259] netlink: 8 bytes leftover after parsing attributes in process `syz.3.34294'. [ 1436.314318][ T4481] usb 1-1: new high-speed USB device number 31 using dummy_hcd [ 1436.356655][ T13] veth1_macvtap: left promiscuous mode [ 1436.362348][ T13] veth0_vlan: left promiscuous mode [ 1436.457324][ T4481] usb 1-1: device descriptor read/64, error -71 [ 1436.530960][ T6253] bridge0: port 1(bridge_slave_0) entered blocking state [ 1436.544349][ T6253] bridge0: port 1(bridge_slave_0) entered disabled state [ 1436.554330][ T6253] bridge_slave_0: entered allmulticast mode [ 1436.560776][ T6253] bridge_slave_0: entered promiscuous mode [ 1436.583437][ T6253] bridge0: port 2(bridge_slave_1) entered blocking state [ 1436.592433][ T6253] bridge0: port 2(bridge_slave_1) entered disabled state [ 1436.600286][ T6253] bridge_slave_1: entered allmulticast mode [ 1436.606885][ T6253] bridge_slave_1: entered promiscuous mode [ 1436.668066][ T6290] FAULT_INJECTION: forcing a failure. [ 1436.668066][ T6290] name failslab, interval 1, probability 0, space 0, times 0 [ 1436.680932][ T6290] CPU: 1 UID: 0 PID: 6290 Comm: syz.3.34309 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 1436.680969][ T6290] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1436.680983][ T6290] Call Trace: [ 1436.680991][ T6290] [ 1436.681000][ T6290] __dump_stack+0x21/0x30 [ 1436.681036][ T6290] dump_stack_lvl+0x10c/0x190 [ 1436.681068][ T6290] ? __cfi_dump_stack_lvl+0x10/0x10 [ 1436.681104][ T6290] ? __kasan_check_write+0x18/0x20 [ 1436.681140][ T6290] ? proc_fail_nth_write+0x17e/0x210 [ 1436.681171][ T6290] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 1436.681202][ T6290] dump_stack+0x19/0x20 [ 1436.681231][ T6290] should_fail_ex+0x3d9/0x530 [ 1436.681255][ T6290] should_failslab+0xac/0x100 [ 1436.681281][ T6290] kmem_cache_alloc_noprof+0x42/0x430 [ 1436.681303][ T6290] ? getname_flags+0xc6/0x710 [ 1436.681326][ T6290] getname_flags+0xc6/0x710 [ 1436.681347][ T6290] ? build_open_flags+0x487/0x600 [ 1436.681376][ T6290] getname+0x1b/0x30 [ 1436.681396][ T6290] do_sys_openat2+0xcb/0x1c0 [ 1436.681423][ T6290] ? fput+0x1a5/0x240 [ 1436.681449][ T6290] ? do_sys_open+0x100/0x100 [ 1436.681478][ T6290] ? ksys_write+0x1ef/0x250 [ 1436.681499][ T6290] ? __cfi_ksys_write+0x10/0x10 [ 1436.681522][ T6290] __x64_sys_openat+0x13a/0x170 [ 1436.681553][ T6290] x64_sys_call+0xe69/0x2ee0 [ 1436.681587][ T6290] do_syscall_64+0x58/0xf0 [ 1436.681616][ T6290] ? clear_bhb_loop+0x50/0xa0 [ 1436.681715][ T6290] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 1436.681740][ T6290] RIP: 0033:0x7f79e038df10 [ 1436.681760][ T6290] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 69 95 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 bc 95 02 00 8b 44 [ 1436.681780][ T6290] RSP: 002b:00007f79e1213f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1436.681804][ T6290] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f79e038df10 [ 1436.681821][ T6290] RDX: 0000000000000002 RSI: 00007f79e1213fa0 RDI: 00000000ffffff9c [ 1436.681837][ T6290] RBP: 00007f79e1213fa0 R08: 0000000000000000 R09: 0000000000000000 [ 1436.681853][ T6290] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 1436.681866][ T6290] R13: 00007f79e05e6038 R14: 00007f79e05e5fa0 R15: 00007fff60852ba8 [ 1436.681884][ T6290] [ 1436.744557][ T4481] usb 1-1: device descriptor read/64, error -71 [ 1436.920771][ T36] kauditd_printk_skb: 524 callbacks suppressed [ 1436.920792][ T36] audit: type=1400 audit(1763083085.750:109872): avc: denied { execute } for pid=6291 comm="syz.3.34310" path="/252/blkio.bfq.group_wait_time" dev="tmpfs" ino=1585 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1436.961750][ T36] audit: type=1400 audit(1763083085.770:109873): avc: denied { execute } for pid=6291 comm="syz.3.34310" dev="tmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1436.990101][ T36] audit: type=1400 audit(1763083085.770:109874): avc: denied { execute_no_trans } for pid=6291 comm="syz.3.34310" path=2F6D656D66643AA39F6EB4645204693502ACCEE1889D5B4038D7CE1F2039497F151D933DB5E75C274CE6D28EBC294A7454447181CF81BAE531F520C8103EC95C85174CBFCF91DF4DF3025E542A202864656C6574656429 dev="tmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1437.001039][ T6253] bridge0: port 2(bridge_slave_1) entered blocking state [ 1437.035061][ T6253] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1437.042397][ T6253] bridge0: port 1(bridge_slave_0) entered blocking state [ 1437.044522][ T4481] usb usb1-port1: attempt power cycle [ 1437.049533][ T6253] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1437.072627][ T36] audit: type=1400 audit(1763083085.790:109875): avc: denied { create } for pid=6253 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1437.114753][ T36] audit: type=1400 audit(1763083085.790:109876): avc: denied { write } for pid=6253 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1437.158474][ T36] audit: type=1400 audit(1763083085.790:109877): avc: denied { read } for pid=6253 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1437.193496][ T6253] veth0_vlan: entered promiscuous mode [ 1437.204551][ T36] audit: type=1400 audit(1763083085.810:109878): avc: denied { read write } for pid=4154 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1437.237210][ T6253] veth1_macvtap: entered promiscuous mode [ 1437.264980][ T36] audit: type=1400 audit(1763083085.810:109879): avc: denied { open } for pid=4154 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1437.334369][ T36] audit: type=1400 audit(1763083085.810:109880): avc: denied { ioctl } for pid=4154 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1437.381241][ T36] audit: type=1400 audit(1763083085.810:109881): avc: denied { read } for pid=6253 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1437.424439][ T4481] usb 1-1: new high-speed USB device number 32 using dummy_hcd [ 1437.457364][ T4481] usb 1-1: device descriptor read/8, error -71 [ 1437.605614][ T4481] usb 1-1: device descriptor read/8, error -71 [ 1437.854359][ T4481] usb 1-1: new high-speed USB device number 33 using dummy_hcd [ 1437.905555][ T4481] usb 1-1: device descriptor read/8, error -71 [ 1437.956299][ T13] bridge_slave_1: left allmulticast mode [ 1437.963425][ T13] bridge_slave_1: left promiscuous mode [ 1437.974863][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 1437.993232][ T13] bridge_slave_0: left allmulticast mode [ 1437.998975][ T13] bridge_slave_0: left promiscuous mode [ 1438.012901][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 1438.035631][ T4481] usb 1-1: device descriptor read/8, error -71 [ 1438.154410][ T4481] usb usb1-port1: unable to enumerate USB device [ 1438.167237][ T13] veth1_macvtap: left promiscuous mode [ 1438.172829][ T13] veth0_vlan: left promiscuous mode [ 1438.364497][ T6314] bridge0: port 1(bridge_slave_0) entered blocking state [ 1438.374309][ T6314] bridge0: port 1(bridge_slave_0) entered disabled state [ 1438.381448][ T6314] bridge_slave_0: entered allmulticast mode [ 1438.414076][ T6314] bridge_slave_0: entered promiscuous mode [ 1438.443336][ T6314] bridge0: port 2(bridge_slave_1) entered blocking state [ 1438.457630][ T6314] bridge0: port 2(bridge_slave_1) entered disabled state [ 1438.473229][ T6314] bridge_slave_1: entered allmulticast mode [ 1438.480899][ T6314] bridge_slave_1: entered promiscuous mode [ 1438.698783][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 1438.705926][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1438.714347][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 1438.721437][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1438.765616][ T6314] veth0_vlan: entered promiscuous mode [ 1438.782923][ T6314] veth1_macvtap: entered promiscuous mode [ 1438.832683][ T6358] SELinux: policydb table sizes (0,0) do not match mine (6,7) [ 1438.840930][ T6358] SELinux: failed to load policy [ 1439.530043][ T6395] SELinux: policydb table sizes (0,0) do not match mine (6,7) [ 1439.545143][ T6395] SELinux: failed to load policy [ 1439.864473][ T6411] SELinux: policydb table sizes (0,0) do not match mine (6,7) [ 1439.882405][ T6411] SELinux: failed to load policy [ 1441.935586][ T36] kauditd_printk_skb: 650 callbacks suppressed [ 1441.935607][ T36] audit: type=1400 audit(1763083090.770:110532): avc: denied { read write } for pid=4154 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1442.004337][ T36] audit: type=1400 audit(1763083090.800:110533): avc: denied { execute } for pid=6563 comm="syz.2.34431" path="/35/blkio.bfq.group_wait_time" dev="tmpfs" ino=232 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1442.064548][ T36] audit: type=1400 audit(1763083090.810:110534): avc: denied { read write open } for pid=4154 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1442.114333][ T36] audit: type=1400 audit(1763083090.810:110535): avc: denied { ioctl } for pid=4154 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1442.174320][ T36] audit: type=1400 audit(1763083090.840:110536): avc: denied { execute } for pid=6565 comm="syz.3.34432" path="/282/blkio.bfq.group_wait_time" dev="tmpfs" ino=1777 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1442.238699][ T36] audit: type=1400 audit(1763083090.880:110537): avc: denied { read write } for pid=4154 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1442.307729][ T36] audit: type=1400 audit(1763083090.880:110538): avc: denied { open } for pid=4154 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1442.339429][ T36] audit: type=1400 audit(1763083090.880:110539): avc: denied { ioctl } for pid=4154 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1442.397337][ T36] audit: type=1400 audit(1763083090.920:110540): avc: denied { execute } for pid=6567 comm="syz.3.34433" path="/283/cpuacct.usage_percpu" dev="tmpfs" ino=1783 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1442.450232][ T36] audit: type=1400 audit(1763083091.030:110541): avc: denied { read write } for pid=4154 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1442.799535][ T6596] SELinux: policydb table sizes (0,0) do not match mine (6,7) [ 1442.824341][ T6596] SELinux: failed to load policy [ 1446.965538][ T36] kauditd_printk_skb: 532 callbacks suppressed [ 1446.965558][ T36] audit: type=1400 audit(1763083095.800:111072): avc: denied { unmount } for pid=6253 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1447.024505][ T36] audit: type=1400 audit(1763083095.820:111073): avc: denied { read write } for pid=6253 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1447.088730][ T36] audit: type=1400 audit(1763083095.830:111074): avc: denied { open } for pid=6253 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1447.152884][ T36] audit: type=1400 audit(1763083095.830:111075): avc: denied { ioctl } for pid=6253 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1447.202320][ T36] audit: type=1400 audit(1763083095.860:111076): avc: denied { execute } for pid=6781 comm="syz.1.34539" path="/58/blkio.bfq.group_wait_time" dev="tmpfs" ino=384 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1447.270656][ T36] audit: type=1400 audit(1763083095.900:111077): avc: denied { read write } for pid=6253 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1447.305211][ T6790] netlink: 188 bytes leftover after parsing attributes in process `syz.1.34544'. [ 1447.335910][ T36] audit: type=1400 audit(1763083095.900:111078): avc: denied { open } for pid=6253 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1447.372031][ T36] audit: type=1400 audit(1763083095.900:111079): avc: denied { ioctl } for pid=6253 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1447.414309][ T36] audit: type=1400 audit(1763083095.920:111080): avc: denied { execute } for pid=6783 comm="syz.1.34540" path="/59/blkio.bfq.group_wait_time" dev="tmpfs" ino=390 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1447.468227][ T36] audit: type=1400 audit(1763083095.970:111081): avc: denied { read write } for pid=6253 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1449.544891][ T6871] SELinux: policydb table sizes (0,0) do not match mine (6,7) [ 1449.558156][ T6871] SELinux: failed to load policy [ 1449.955345][ T6887] SELinux: policydb table sizes (0,0) do not match mine (6,7) [ 1449.974004][ T6887] SELinux: failed to load policy [ 1450.285451][ T6923] fuse: Bad value for 'fd' [ 1450.776544][ T6962] FAULT_INJECTION: forcing a failure. [ 1450.776544][ T6962] name failslab, interval 1, probability 0, space 0, times 0 [ 1450.793428][ T6962] CPU: 0 UID: 0 PID: 6962 Comm: syz.1.34623 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 1450.793464][ T6962] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1450.793479][ T6962] Call Trace: [ 1450.793488][ T6962] [ 1450.793497][ T6962] __dump_stack+0x21/0x30 [ 1450.793532][ T6962] dump_stack_lvl+0x10c/0x190 [ 1450.793562][ T6962] ? __cfi_dump_stack_lvl+0x10/0x10 [ 1450.793590][ T6962] ? __kasan_check_write+0x18/0x20 [ 1450.793622][ T6962] ? proc_fail_nth_write+0x17e/0x210 [ 1450.793651][ T6962] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 1450.793690][ T6962] dump_stack+0x19/0x20 [ 1450.793718][ T6962] should_fail_ex+0x3d9/0x530 [ 1450.793742][ T6962] should_failslab+0xac/0x100 [ 1450.793767][ T6962] kmem_cache_alloc_noprof+0x42/0x430 [ 1450.793788][ T6962] ? getname_flags+0xc6/0x710 [ 1450.793812][ T6962] getname_flags+0xc6/0x710 [ 1450.793833][ T6962] ? build_open_flags+0x487/0x600 [ 1450.793864][ T6962] getname+0x1b/0x30 [ 1450.793885][ T6962] do_sys_openat2+0xcb/0x1c0 [ 1450.793913][ T6962] ? fput+0x1a5/0x240 [ 1450.793938][ T6962] ? do_sys_open+0x100/0x100 [ 1450.793964][ T6962] ? ksys_write+0x1ef/0x250 [ 1450.793984][ T6962] ? __cfi_ksys_write+0x10/0x10 [ 1450.794006][ T6962] __x64_sys_openat+0x13a/0x170 [ 1450.794037][ T6962] x64_sys_call+0xe69/0x2ee0 [ 1450.794070][ T6962] do_syscall_64+0x58/0xf0 [ 1450.794099][ T6962] ? clear_bhb_loop+0x50/0xa0 [ 1450.794124][ T6962] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 1450.794148][ T6962] RIP: 0033:0x7ff7c738df10 [ 1450.794167][ T6962] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 69 95 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 bc 95 02 00 8b 44 [ 1450.794189][ T6962] RSP: 002b:00007ff7c8172f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1450.794214][ T6962] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007ff7c738df10 [ 1450.794233][ T6962] RDX: 0000000000000002 RSI: 00007ff7c8172fa0 RDI: 00000000ffffff9c [ 1450.794254][ T6962] RBP: 00007ff7c8172fa0 R08: 0000000000000000 R09: 0000000000000000 [ 1450.794270][ T6962] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 1450.794283][ T6962] R13: 00007ff7c75e6038 R14: 00007ff7c75e5fa0 R15: 00007ffd99c06f28 [ 1450.794303][ T6962] [ 1451.204451][ T6982] SELinux: policydb table sizes (0,0) do not match mine (6,7) [ 1451.219193][ T6982] SELinux: failed to load policy [ 1451.989090][ T36] kauditd_printk_skb: 594 callbacks suppressed [ 1451.989112][ T36] audit: type=1400 audit(1763083100.820:111676): avc: denied { create } for pid=7027 comm="syz.0.34659" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1452.064304][ T36] audit: type=1400 audit(1763083100.850:111677): avc: denied { ioctl } for pid=7027 comm="syz.0.34659" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=381474 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1452.136469][ T36] audit: type=1400 audit(1763083100.870:111678): avc: denied { read write } for pid=3064 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1452.194310][ T36] audit: type=1400 audit(1763083100.870:111679): avc: denied { read write open } for pid=3064 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1452.244589][ T36] audit: type=1400 audit(1763083100.870:111680): avc: denied { ioctl } for pid=3064 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1452.301003][ T36] audit: type=1400 audit(1763083100.900:111681): avc: denied { execute } for pid=7029 comm="syz.0.34661" path="/509/blkio.bfq.group_wait_time" dev="tmpfs" ino=3177 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1452.348365][ T36] audit: type=1400 audit(1763083100.900:111682): avc: denied { read write } for pid=3064 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1452.387580][ T36] audit: type=1400 audit(1763083100.900:111683): avc: denied { open } for pid=3064 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1452.444309][ T36] audit: type=1400 audit(1763083100.900:111684): avc: denied { ioctl } for pid=3064 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1452.514301][ T36] audit: type=1400 audit(1763083100.950:111685): avc: denied { execute } for pid=7031 comm="syz.0.34663" path="/510/blkio.bfq.group_wait_time" dev="tmpfs" ino=3183 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1453.235919][ T7106] SELinux: policydb table sizes (0,0) do not match mine (6,7) [ 1453.247351][ T7106] SELinux: failed to load policy [ 1453.278971][ T7113] fuse: Unknown parameter '&' [ 1453.467385][ T7142] fuse: Unknown parameter '&' [ 1453.964508][ T7160] fuse: Unknown parameter '&' [ 1454.576595][ T7193] fuse: Bad value for 'group_id' [ 1454.584282][ T7193] fuse: Bad value for 'group_id' [ 1454.708585][ T7208] fuse: Bad value for 'group_id' [ 1454.724473][ T7208] fuse: Bad value for 'group_id' [ 1454.924766][ T7220] fuse: Bad value for 'group_id' [ 1454.929777][ T7220] fuse: Bad value for 'group_id' [ 1454.996985][ T7223] fuse: Bad value for 'group_id' [ 1455.002001][ T7223] fuse: Bad value for 'group_id' [ 1455.204467][ T7233] fuse: Bad value for 'group_id' [ 1455.209672][ T7233] fuse: Bad value for 'group_id' [ 1455.307089][ T7237] SELinux: policydb table sizes (0,0) do not match mine (6,7) [ 1455.336858][ T7237] SELinux: failed to load policy [ 1455.727093][ T7260] fuse: Bad value for 'fd' [ 1456.255788][ T7297] fuse: Bad value for 'group_id' [ 1456.271172][ T7297] fuse: Bad value for 'group_id' [ 1456.408310][ T7304] fuse: Bad value for 'fd' [ 1456.479146][ T7309] fuse: Bad value for 'fd' [ 1456.609908][ T7321] fuse: Bad value for 'fd' [ 1456.674521][ T7323] fuse: Unknown parameter 'grou00000000000000000000' [ 1456.964157][ T7343] fuse: Unknown parameter 'grou00000000000000000000' [ 1456.996202][ T36] kauditd_printk_skb: 772 callbacks suppressed [ 1456.996224][ T36] audit: type=1400 audit(1763083105.830:112458): avc: denied { read write } for pid=3064 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1457.064886][ T36] audit: type=1400 audit(1763083105.830:112459): avc: denied { read write open } for pid=3064 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1457.144361][ T36] audit: type=1400 audit(1763083105.830:112460): avc: denied { ioctl } for pid=3064 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1457.204358][ T36] audit: type=1400 audit(1763083105.890:112461): avc: denied { read write } for pid=6253 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1457.264312][ T36] audit: type=1400 audit(1763083105.890:112462): avc: denied { open } for pid=6253 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1457.334316][ T36] audit: type=1400 audit(1763083105.890:112463): avc: denied { ioctl } for pid=6253 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1457.394317][ T36] audit: type=1400 audit(1763083105.910:112464): avc: denied { execute } for pid=7346 comm="syz.1.34809" path="/120/blkio.bfq.group_wait_time" dev="tmpfs" ino=773 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1457.454304][ T36] audit: type=1400 audit(1763083105.960:112465): avc: denied { read write } for pid=3064 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1457.534317][ T36] audit: type=1400 audit(1763083105.960:112466): avc: denied { open } for pid=3064 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1457.609537][ T36] audit: type=1400 audit(1763083105.960:112467): avc: denied { ioctl } for pid=3064 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1457.855322][ T7357] fuse: Bad value for 'fd' [ 1458.336853][ T7372] fuse: Bad value for 'fd' [ 1459.280043][ T7417] binder: Bad value for 'max' [ 1459.372535][ T7425] binder: Bad value for 'max' [ 1459.656748][ T7435] binder: Bad value for 'max' [ 1460.842892][ T7457] binder: Bad value for 'max' [ 1460.987612][ T7465] fuse: Unknown parameter '&' [ 1461.572069][ T7487] fuse: Bad value for 'fd' [ 1461.978584][ T7502] fuse: Invalid rootmode [ 1462.009785][ T36] kauditd_printk_skb: 372 callbacks suppressed [ 1462.009806][ T36] audit: type=1400 audit(1763083110.840:112840): avc: denied { read write } for pid=3064 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1462.074294][ T36] audit: type=1400 audit(1763083110.870:112841): avc: denied { execute } for pid=7503 comm="syz.1.34891" path="/140/cpuacct.usage_percpu" dev="tmpfs" ino=903 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1462.099776][ T36] audit: type=1400 audit(1763083110.880:112842): avc: denied { read write open } for pid=3064 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1462.153493][ T36] audit: type=1400 audit(1763083110.880:112843): avc: denied { ioctl } for pid=3064 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1462.199880][ T36] audit: type=1400 audit(1763083110.890:112844): avc: denied { read write } for pid=6253 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1462.248498][ T36] audit: type=1400 audit(1763083110.890:112845): avc: denied { open } for pid=6253 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1462.303775][ T36] audit: type=1400 audit(1763083110.890:112846): avc: denied { ioctl } for pid=6253 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1462.364295][ T36] audit: type=1400 audit(1763083110.890:112847): avc: denied { execute } for pid=7505 comm="syz.0.34888" path="/558/blkio.bfq.group_wait_time" dev="tmpfs" ino=3490 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1462.430223][ T36] audit: type=1400 audit(1763083110.910:112848): avc: denied { read write } for pid=3064 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1462.494304][ T36] audit: type=1400 audit(1763083110.910:112849): avc: denied { open } for pid=3064 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1463.032651][ T7544] binder: Bad value for 'max' [ 1463.061269][ T7542] fuse: Bad value for 'rootmode' [ 1463.776413][ T7591] fuse: Unknown parameter 'grou00000000000000000000' [ 1463.825538][ T7593] fuse: Unknown parameter 'user_i00000000000000000000' [ 1464.397916][ T7633] fuse: Unknown parameter ''' [ 1464.460897][ T7640] binder: Bad value for 'max' [ 1464.597348][ T7646] fuse: Bad value for 'group_id' [ 1464.602366][ T7646] fuse: Bad value for 'group_id' [ 1464.650398][ T7654] fuse: Unknown parameter 'user_i00000000000000000000' [ 1464.678659][ T7656] fuse: Unknown parameter ''' [ 1464.716475][ T7660] fuse: Unknown parameter 'grou00000000000000000000' [ 1464.835022][ T7668] fuse: Bad value for 'group_id' [ 1464.840389][ T7668] fuse: Bad value for 'group_id' [ 1464.983244][ T7675] fuse: Unknown parameter 'group_i00000000000000000000' [ 1465.207462][ T7698] fuse: Unknown parameter 'grou00000000000000000000' [ 1465.291961][ T7704] fuse: Unknown parameter 'user_id00000000000000000000' [ 1465.412186][ T7711] fuse: Bad value for 'user_id' [ 1465.426008][ T7711] fuse: Bad value for 'user_id' [ 1465.494668][ T7719] SELinux: policydb table sizes (0,0) do not match mine (6,7) [ 1465.508147][ T7719] SELinux: failed to load policy [ 1465.587430][ T7726] fuse: Unknown parameter 'user_id00000000000000000000' [ 1465.762505][ T7736] fuse: Unknown parameter 'group_i00000000000000000000' [ 1465.855576][ T7738] binder: Bad value for 'max' [ 1465.986226][ T7746] fuse: Unknown parameter 'user_id00000000000000000000' [ 1466.103465][ T7752] fuse: Bad value for 'user_id' [ 1466.109887][ T7756] binder: Bad value for 'max' [ 1466.118582][ T7752] fuse: Bad value for 'user_id' [ 1466.169307][ T7762] fuse: Bad value for 'user_id' [ 1466.183313][ T7762] fuse: Bad value for 'user_id' [ 1466.243329][ T7768] fuse: Bad value for 'fd' [ 1466.317059][ T7774] fuse: Bad value for 'fd' [ 1466.345913][ T7778] fuse: Bad value for 'fd' [ 1466.435344][ T7788] fuse: Bad value for 'fd' [ 1466.554774][ T7800] fuse: Bad value for 'user_id' [ 1466.559816][ T7800] fuse: Bad value for 'user_id' [ 1466.669145][ T7810] fuse: Bad value for 'fd' [ 1466.712273][ T7812] fuse: Bad value for 'fd' [ 1466.819971][ T7824] fuse: Bad value for 'fd' [ 1466.894554][ T7830] fuse: Unknown parameter '0x0000000000000007' [ 1467.256596][ T36] kauditd_printk_skb: 832 callbacks suppressed [ 1467.256615][ T36] audit: type=1400 audit(1763083116.090:113682): avc: denied { read write } for pid=3064 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1467.323878][ T36] audit: type=1400 audit(1763083116.120:113683): avc: denied { open } for pid=3064 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1467.379869][ T36] audit: type=1400 audit(1763083116.120:113684): avc: denied { ioctl } for pid=3064 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1467.434309][ T36] audit: type=1400 audit(1763083116.150:113685): avc: denied { execute } for pid=7833 comm="syz.0.35049" path="/584/blkio.bfq.group_wait_time" dev="tmpfs" ino=3655 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1467.492201][ T36] audit: type=1400 audit(1763083116.160:113686): avc: denied { unmount } for pid=6314 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1467.514916][ T36] audit: type=1400 audit(1763083116.160:113687): avc: denied { mounton } for pid=7833 comm="syz.0.35049" path="/dev/binderfs" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 1467.571258][ T36] audit: type=1400 audit(1763083116.160:113688): avc: denied { mount } for pid=7833 comm="syz.0.35049" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 1467.614304][ T36] audit: type=1400 audit(1763083116.180:113689): avc: denied { read write } for pid=6314 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1467.642576][ T7842] fuse: Bad value for 'fd' [ 1467.659008][ T36] audit: type=1400 audit(1763083116.180:113690): avc: denied { read write open } for pid=6314 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1467.724302][ T36] audit: type=1400 audit(1763083116.180:113691): avc: denied { ioctl } for pid=6314 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1467.754792][ T7844] fuse: Unknown parameter '0x0000000000000007' [ 1467.827479][ T7846] fuse: Unknown parameter 'group_id00000000000000000000' [ 1467.909441][ T7852] fuse: Bad value for 'fd' [ 1467.928698][ T7854] fuse: Bad value for 'user_id' [ 1467.933635][ T7854] fuse: Bad value for 'user_id' [ 1468.081764][ T7865] fuse: Bad value for 'fd' [ 1468.256748][ T7871] fuse: Unknown parameter '0x0000000000000007' [ 1468.541485][ T7885] binder: Bad value for 'max' [ 1468.598888][ T7887] fuse: Unknown parameter '0x0000000000000007' [ 1468.656477][ T7891] SELinux: policydb table sizes (0,0) do not match mine (6,7) [ 1468.674339][ T7891] SELinux: failed to load policy [ 1468.813752][ T7899] binder: Bad value for 'max' [ 1469.166893][ T7905] fuse: Bad value for 'user_id' [ 1469.184444][ T7905] fuse: Bad value for 'user_id' [ 1469.198879][ T7907] fuse: Unknown parameter '0x0000000000000007' [ 1469.275055][ T7910] fuse: Bad value for 'fd' [ 1469.281537][ T7911] fuse: Invalid rootmode [ 1469.518805][ T7923] fuse: Bad value for 'user_id' [ 1469.523779][ T7923] fuse: Bad value for 'user_id' [ 1469.875132][ T7929] fuse: Bad value for 'fd' [ 1469.969653][ T7936] fuse: Bad value for 'group_id' [ 1469.984314][ T7936] fuse: Bad value for 'group_id' [ 1470.125140][ T7941] binder: Bad value for 'max' [ 1470.197166][ T7943] fuse: Bad value for 'user_id' [ 1470.209802][ T7943] fuse: Bad value for 'user_id' [ 1470.307563][ T7947] binder: Bad value for 'max' [ 1470.403037][ T7957] fuse: Bad value for 'fd' [ 1470.637721][ T7966] bridge0: port 1(bridge_slave_0) entered blocking state [ 1470.653335][ T7966] bridge0: port 1(bridge_slave_0) entered disabled state [ 1470.661095][ T7966] bridge_slave_0: entered allmulticast mode [ 1470.663341][ T7974] SELinux: policydb table sizes (0,0) do not match mine (6,7) [ 1470.668375][ T7966] bridge_slave_0: entered promiscuous mode [ 1470.682680][ T7974] SELinux: failed to load policy [ 1470.688545][ T7966] bridge0: port 2(bridge_slave_1) entered blocking state [ 1470.696001][ T7966] bridge0: port 2(bridge_slave_1) entered disabled state [ 1470.703274][ T7966] bridge_slave_1: entered allmulticast mode [ 1470.710589][ T7966] bridge_slave_1: entered promiscuous mode [ 1470.718327][ T13] bridge_slave_1: left allmulticast mode [ 1470.724047][ T13] bridge_slave_1: left promiscuous mode [ 1470.733729][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 1470.742114][ T13] bridge_slave_0: left allmulticast mode [ 1470.749482][ T7976] binder: Bad value for 'max' [ 1470.761886][ T13] bridge_slave_0: left promiscuous mode [ 1470.768059][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 1470.824622][ T7982] fuse: Bad value for 'fd' [ 1470.918142][ T13] veth1_macvtap: left promiscuous mode [ 1470.923767][ T13] veth0_vlan: left promiscuous mode [ 1470.933094][ T7990] fuse: Bad value for 'fd' [ 1470.972285][ T7992] fuse: Bad value for 'fd' [ 1470.992108][ T7994] binder: Bad value for 'max' [ 1471.185960][ T7966] bridge0: port 2(bridge_slave_1) entered blocking state [ 1471.193090][ T7966] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1471.200898][ T7966] bridge0: port 1(bridge_slave_0) entered blocking state [ 1471.208178][ T7966] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1471.325415][ T293] bridge0: port 1(bridge_slave_0) entered disabled state [ 1471.334070][ T293] bridge0: port 2(bridge_slave_1) entered disabled state [ 1471.355579][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 1471.362681][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1471.372849][ T8024] fuse: Bad value for 'fd' [ 1471.380333][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 1471.387648][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1471.447673][ T7966] veth0_vlan: entered promiscuous mode [ 1471.462383][ T7966] veth1_macvtap: entered promiscuous mode [ 1471.525209][ T8034] fuse: Bad value for 'group_id' [ 1471.530449][ T8034] fuse: Bad value for 'group_id' [ 1471.557807][ T8038] fuse: Invalid rootmode [ 1471.595506][ T8043] binder: Bad value for 'max' [ 1471.667610][ T8046] SELinux: policydb table sizes (0,0) do not match mine (6,7) [ 1471.684443][ T8046] SELinux: failed to load policy [ 1471.696243][ T8048] binder: Bad value for 'max' [ 1471.856367][ T8056] fuse: Bad value for 'rootmode' [ 1471.896503][ T8060] fuse: Bad value for 'fd' [ 1471.955390][ T8062] fuse: Invalid rootmode [ 1472.038077][ T8066] fuse: Unknown parameter 'user_id00000000000000000000' [ 1472.234189][ T8072] fuse: Bad value for 'fd' [ 1472.267231][ T36] kauditd_printk_skb: 643 callbacks suppressed [ 1472.267252][ T36] audit: type=1400 audit(1763083121.100:114335): avc: denied { read write } for pid=4154 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1472.324354][ T36] audit: type=1400 audit(1763083121.140:114336): avc: denied { read write open } for pid=4154 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1472.352093][ T8074] fuse: Bad value for 'rootmode' [ 1472.374301][ T36] audit: type=1400 audit(1763083121.140:114337): avc: denied { ioctl } for pid=4154 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1472.431287][ T36] audit: type=1400 audit(1763083121.170:114338): avc: denied { execute } for pid=8073 comm="syz.3.35163" path="/527/blkio.bfq.group_wait_time" dev="tmpfs" ino=3323 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1472.486342][ T36] audit: type=1400 audit(1763083121.180:114339): avc: denied { read write } for pid=8073 comm="syz.3.35163" name="fuse" dev="devtmpfs" ino=23 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1472.524702][ T8078] fuse: Bad value for 'fd' [ 1472.540891][ T36] audit: type=1400 audit(1763083121.180:114340): avc: denied { read write open } for pid=8073 comm="syz.3.35163" path="/dev/fuse" dev="devtmpfs" ino=23 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1472.589843][ T36] audit: type=1400 audit(1763083121.180:114341): avc: denied { mounton } for pid=8073 comm="syz.3.35163" path="/527/file0" dev="tmpfs" ino=3324 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1472.615392][ T8081] fuse: Bad value for 'group_id' [ 1472.620470][ T8081] fuse: Bad value for 'group_id' [ 1472.625714][ T8082] fuse: Bad value for 'fd' [ 1472.652070][ T36] audit: type=1400 audit(1763083121.230:114342): avc: denied { read write } for pid=4154 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1472.687006][ T8086] fuse: Unknown parameter '&' [ 1472.706867][ T36] audit: type=1400 audit(1763083121.230:114343): avc: denied { open } for pid=4154 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1472.737325][ T36] audit: type=1400 audit(1763083121.230:114344): avc: denied { ioctl } for pid=4154 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1472.770588][ T8091] binder: Bad value for 'max' [ 1472.804302][ T8094] fuse: Bad value for 'fd' [ 1472.842829][ T8097] fuse: Bad value for 'rootmode' [ 1472.862478][ T8098] fuse: Bad value for 'fd' [ 1472.988757][ T8105] fuse: Bad value for 'fd' [ 1473.009714][ T8107] fuse: Bad value for 'group_id' [ 1473.030264][ T8107] fuse: Bad value for 'group_id' [ 1473.152378][ T8113] binder: Bad value for 'max' [ 1473.161162][ T8117] binder: Bad value for 'max' [ 1473.238376][ T8121] netlink: 8 bytes leftover after parsing attributes in process `syz.2.35185'. [ 1473.257567][ T8121] netlink: 12 bytes leftover after parsing attributes in process `syz.2.35185'. [ 1473.328068][ T8131] fuse: Bad value for 'fd' [ 1473.384994][ T8134] fuse: Bad value for 'fd' [ 1473.482974][ T8138] binder: Bad value for 'max' [ 1474.408637][ T8147] binder: Bad value for 'max' [ 1474.461276][ T8151] fuse: Bad value for 'fd' [ 1475.716721][ T8171] binder: Bad value for 'max' [ 1475.778030][ T8173] fuse: Bad value for 'fd' [ 1475.819825][ T8175] fuse: Bad value for 'rootmode' [ 1475.828562][ T8179] fuse: Bad value for 'fd' [ 1475.897459][ T8185] binder: Bad value for 'max' [ 1475.947041][ T8191] fuse: Bad value for 'fd' [ 1475.991386][ T8195] binder: Bad value for 'max' [ 1476.084457][ T8202] fuse: Bad value for 'fd' [ 1477.038955][ T8216] fuse: Invalid rootmode [ 1477.191452][ T8228] fuse: Bad value for 'fd' [ 1477.263135][ T8234] fuse: Bad value for 'fd' [ 1477.284722][ T36] kauditd_printk_skb: 400 callbacks suppressed [ 1477.284741][ T36] audit: type=1400 audit(1763083126.120:114745): avc: denied { read write } for pid=6253 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1477.334280][ T36] audit: type=1400 audit(1763083126.120:114746): avc: denied { open } for pid=6253 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1477.394424][ T36] audit: type=1400 audit(1763083126.120:114747): avc: denied { ioctl } for pid=6253 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1477.451421][ T8250] fuse: Unknown parameter 'fd0x0000000000000007' [ 1477.456803][ T36] audit: type=1400 audit(1763083126.130:114748): avc: denied { read write } for pid=4154 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1477.458472][ T8253] fuse: Unknown parameter 'user_i00000000000000000000' [ 1477.488558][ T36] audit: type=1400 audit(1763083126.130:114749): avc: denied { open } for pid=4154 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1477.526740][ T8254] fuse: Unknown parameter 'use00000000000000000000' [ 1477.541957][ T36] audit: type=1400 audit(1763083126.130:114750): avc: denied { ioctl } for pid=4154 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1477.597290][ T8261] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1477.603955][ T8261] audit: audit_lost=80 audit_rate_limit=0 audit_backlog_limit=64 [ 1477.604309][ T36] audit: type=1400 audit(1763083126.140:114751): avc: denied { execute } for pid=8238 comm="syz.3.35244" path="/554/blkio.bfq.group_wait_time" dev="tmpfs" ino=3499 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1477.625817][ T8261] audit: backlog limit exceeded [ 1477.690780][ T8268] fuse: Invalid rootmode [ 1477.716870][ T8272] fuse: Unknown parameter '0x0000000000000007' [ 1477.782291][ T8277] fuse: Unknown parameter 'fd0x0000000000000007' [ 1477.819824][ T8283] fuse: Unknown parameter 'use00000000000000000000' [ 1477.839254][ T8285] fuse: Unknown parameter 'user_i00000000000000000000' [ 1477.957016][ T8293] fuse: Unknown parameter '0x0000000000000007' [ 1478.005986][ T8291] netlink: 96 bytes leftover after parsing attributes in process `syz.0.35267'. [ 1478.331791][ T8313] fuse: Bad value for 'user_id' [ 1478.344367][ T8313] fuse: Bad value for 'user_id' [ 1478.465941][ T8320] binder: Bad value for 'max' [ 1478.625799][ T8336] fuse: Bad value for 'group_id' [ 1478.630818][ T8336] fuse: Bad value for 'group_id' [ 1478.638534][ T8335] fuse: Bad value for 'user_id' [ 1478.643463][ T8335] fuse: Bad value for 'user_id' [ 1479.056523][ T8346] fuse: Bad value for 'group_id' [ 1479.071789][ T8346] fuse: Bad value for 'group_id' [ 1479.798102][ T8358] fuse: Bad value for 'user_id' [ 1479.813204][ T8358] fuse: Bad value for 'user_id' [ 1479.856479][ T8360] fuse: Unknown parameter 'fd0x0000000000000007' [ 1479.870489][ T8362] fuse: Unknown parameter 'user_id00000000000000000000' [ 1479.940408][ T8366] fuse: Bad value for 'fd' [ 1480.134774][ T8378] SELinux: policydb string S does not match my string SE Linux [ 1480.153054][ T8378] SELinux: failed to load policy [ 1480.296498][ T8384] fuse: Bad value for 'fd' [ 1480.396379][ T8390] fuse: Invalid rootmode [ 1480.729354][ T8398] SELinux: policydb string S does not match my string SE Linux [ 1480.754362][ T8398] SELinux: failed to load policy [ 1480.929436][ T8404] fuse: Bad value for 'user_id' [ 1480.944329][ T8404] fuse: Bad value for 'user_id' [ 1481.035805][ T8408] fuse: Unknown parameter '0xffffffffffffffff' [ 1481.153741][ T8414] binder: Bad value for 'max' [ 1481.228784][ T8420] fuse: Bad value for 'user_id' [ 1481.233926][ T8420] fuse: Bad value for 'user_id' [ 1481.281074][ T8423] fuse: Bad value for 'group_id' [ 1481.288928][ T8423] fuse: Bad value for 'group_id' [ 1481.295544][ T8424] fuse: Unknown parameter '0xffffffffffffffff' [ 1481.358204][ T8428] binder: Bad value for 'max' [ 1481.388400][ T8430] fuse: Bad value for 'fd' [ 1481.444865][ T8434] binder: Bad value for 'max' [ 1481.494465][ T8440] fuse: Bad value for 'fd' [ 1481.541269][ T8446] fuse: Unknown parameter '0xffffffffffffffff' [ 1481.571239][ T8448] fuse: Bad value for 'group_id' [ 1481.576282][ T8448] fuse: Bad value for 'group_id' [ 1481.623739][ T8464] binder: Bad value for 'max' [ 1481.626101][ T8463] fuse: Unknown parameter '0x0000000000000007' [ 1481.670290][ T8468] SELinux: policydb string SE Li does not match my string SE Linux [ 1481.678440][ T8471] fuse: Bad value for 'fd' [ 1481.689965][ T8468] SELinux: failed to load policy [ 1481.713309][ T8473] binder: Bad value for 'max' [ 1481.747881][ T8477] netlink: 96 bytes leftover after parsing attributes in process `syz.2.35357'. [ 1481.765864][ T8481] fuse: Bad value for 'group_id' [ 1481.771353][ T8481] fuse: Bad value for 'group_id' [ 1481.837995][ T8491] fuse: Invalid rootmode [ 1481.895528][ T8493] fuse: Bad value for 'fd' [ 1481.934462][ T8496] fuse: Bad value for 'fd' [ 1481.965908][ T8499] binder: Bad value for 'max' [ 1482.018391][ T8503] fuse: Bad value for 'fd' [ 1482.082135][ T8509] fuse: Invalid rootmode [ 1482.193133][ T8512] netlink: 96 bytes leftover after parsing attributes in process `syz.1.35374'. [ 1482.273243][ T8514] fuse: Bad value for 'fd' [ 1482.311880][ T36] kauditd_printk_skb: 735 callbacks suppressed [ 1482.311900][ T36] audit: type=1400 audit(1763083131.140:115463): avc: denied { read write } for pid=6253 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1482.371894][ T36] audit: type=1400 audit(1763083131.180:115464): avc: denied { read write open } for pid=6253 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1482.375985][ T8516] fuse: Bad value for 'fd' [ 1482.434287][ T36] audit: type=1400 audit(1763083131.180:115465): avc: denied { ioctl } for pid=6253 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1482.494283][ T36] audit: type=1400 audit(1763083131.210:115466): avc: denied { mounton } for pid=8515 comm="syz.1.35376" path="/247/file0" dev="tmpfs" ino=1595 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1482.506682][ T8522] fuse: Bad value for 'group_id' [ 1482.534607][ T8522] fuse: Bad value for 'group_id' [ 1482.544224][ T36] audit: type=1400 audit(1763083131.250:115467): avc: denied { read write } for pid=7966 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1482.599116][ T36] audit: type=1400 audit(1763083131.250:115468): avc: denied { open } for pid=7966 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1482.655037][ T36] audit: type=1400 audit(1763083131.250:115469): avc: denied { ioctl } for pid=7966 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1482.707256][ T36] audit: type=1400 audit(1763083131.290:115470): avc: denied { execute } for pid=8517 comm="syz.0.35378" path="/62/blkio.bfq.group_wait_time" dev="tmpfs" ino=415 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1482.739117][ T8532] fuse: Bad value for 'fd' [ 1482.754894][ T36] audit: type=1400 audit(1763083131.300:115471): avc: denied { read write } for pid=6253 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1482.779937][ T8536] fuse: Bad value for 'group_id' [ 1482.793764][ T36] audit: type=1400 audit(1763083131.300:115472): avc: denied { open } for pid=6253 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1482.796573][ T8536] fuse: Bad value for 'group_id' [ 1482.831894][ T8540] binder: Bad value for 'max' [ 1482.842080][ T8538] fuse: Unknown parameter 'fd0xffffffffffffffff' [ 1482.885916][ T8542] fuse: Bad value for 'group_id' [ 1482.898001][ T8542] fuse: Bad value for 'group_id' [ 1482.961009][ T8550] binder: Bad value for 'max' [ 1483.072386][ T8562] fuse: Unknown parameter 'fd0xffffffffffffffff' [ 1483.711111][ T8601] fuse: Invalid rootmode [ 1484.157482][ T8621] FAULT_INJECTION: forcing a failure. [ 1484.157482][ T8621] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1484.184328][ T8621] CPU: 0 UID: 0 PID: 8621 Comm: syz.0.35421 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 1484.184366][ T8621] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1484.184380][ T8621] Call Trace: [ 1484.184388][ T8621] [ 1484.184397][ T8621] __dump_stack+0x21/0x30 [ 1484.184431][ T8621] dump_stack_lvl+0x10c/0x190 [ 1484.184459][ T8621] ? __cfi_dump_stack_lvl+0x10/0x10 [ 1484.184488][ T8621] ? check_stack_object+0x12c/0x140 [ 1484.184510][ T8621] dump_stack+0x19/0x20 [ 1484.184537][ T8621] should_fail_ex+0x3d9/0x530 [ 1484.184560][ T8621] should_fail+0xf/0x20 [ 1484.184580][ T8621] should_fail_usercopy+0x1e/0x30 [ 1484.184615][ T8621] _copy_to_user+0x24/0xa0 [ 1484.184644][ T8621] simple_read_from_buffer+0xed/0x160 [ 1484.184674][ T8621] proc_fail_nth_read+0x19e/0x210 [ 1484.184705][ T8621] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 1484.184734][ T8621] ? bpf_lsm_file_permission+0xd/0x20 [ 1484.184763][ T8621] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 1484.184790][ T8621] vfs_read+0x27d/0xc70 [ 1484.184809][ T8621] ? __cfi_vfs_read+0x10/0x10 [ 1484.184827][ T8621] ? __kasan_check_write+0x18/0x20 [ 1484.184859][ T8621] ? mutex_lock+0x92/0x1c0 [ 1484.184880][ T8621] ? __cfi_mutex_lock+0x10/0x10 [ 1484.184900][ T8621] ? __fget_files+0x2c5/0x340 [ 1484.184927][ T8621] ksys_read+0x141/0x250 [ 1484.184947][ T8621] ? __cfi_ksys_read+0x10/0x10 [ 1484.184969][ T8621] ? __kasan_check_read+0x15/0x20 [ 1484.185002][ T8621] __x64_sys_read+0x7f/0x90 [ 1484.185023][ T8621] x64_sys_call+0x2638/0x2ee0 [ 1484.185057][ T8621] do_syscall_64+0x58/0xf0 [ 1484.185086][ T8621] ? clear_bhb_loop+0x50/0xa0 [ 1484.185111][ T8621] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 1484.185136][ T8621] RIP: 0033:0x7f25e178e0dc [ 1484.185155][ T8621] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 1484.185176][ T8621] RSP: 002b:00007f25e25d8030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1484.185200][ T8621] RAX: ffffffffffffffda RBX: 00007f25e19e5fa0 RCX: 00007f25e178e0dc [ 1484.185217][ T8621] RDX: 000000000000000f RSI: 00007f25e25d80a0 RDI: 0000000000000006 [ 1484.185231][ T8621] RBP: 00007f25e25d8090 R08: 0000000000000000 R09: 0000000000000000 [ 1484.185245][ T8621] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1484.185258][ T8621] R13: 00007f25e19e6038 R14: 00007f25e19e5fa0 R15: 00007ffeb9f66258 [ 1484.185277][ T8621] [ 1484.943866][ T8629] fuse: Bad value for 'fd' [ 1485.091004][ T8639] fuse: Bad value for 'group_id' [ 1485.104319][ T8639] fuse: Bad value for 'group_id' [ 1485.467167][ T8657] fuse: Bad value for 'group_id' [ 1485.474319][ T8657] fuse: Bad value for 'group_id' [ 1486.326237][ T293] bridge_slave_1: left allmulticast mode [ 1486.342156][ T293] bridge_slave_1: left promiscuous mode [ 1486.352276][ T293] bridge0: port 2(bridge_slave_1) entered disabled state [ 1486.374818][ T293] bridge_slave_0: left allmulticast mode [ 1486.380522][ T293] bridge_slave_0: left promiscuous mode [ 1486.399401][ T293] bridge0: port 1(bridge_slave_0) entered disabled state [ 1486.504389][ T8675] bridge0: port 1(bridge_slave_0) entered blocking state [ 1486.511677][ T8675] bridge0: port 1(bridge_slave_0) entered disabled state [ 1486.527011][ T8675] bridge_slave_0: entered allmulticast mode [ 1486.536495][ T8675] bridge_slave_0: entered promiscuous mode [ 1486.544158][ T293] veth1_macvtap: left promiscuous mode [ 1486.550825][ T293] veth0_vlan: left promiscuous mode [ 1486.571257][ T8684] binder: Bad value for 'max' [ 1486.664608][ T8675] bridge0: port 2(bridge_slave_1) entered blocking state [ 1486.671700][ T8675] bridge0: port 2(bridge_slave_1) entered disabled state [ 1486.679246][ T8675] bridge_slave_1: entered allmulticast mode [ 1486.693822][ T8675] bridge_slave_1: entered promiscuous mode [ 1486.859811][ T8675] bridge0: port 2(bridge_slave_1) entered blocking state [ 1486.866970][ T8675] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1486.874382][ T8675] bridge0: port 1(bridge_slave_0) entered blocking state [ 1486.881443][ T8675] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1486.964484][ T8708] binder: Bad value for 'max' [ 1487.045108][ T8675] veth0_vlan: entered promiscuous mode [ 1487.072053][ T8675] veth1_macvtap: entered promiscuous mode [ 1487.240640][ T8717] fuse: Bad value for 'user_id' [ 1487.248963][ T8717] fuse: Bad value for 'user_id' [ 1487.317125][ T36] kauditd_printk_skb: 534 callbacks suppressed [ 1487.317145][ T36] audit: type=1400 audit(1763083136.150:116007): avc: denied { name_bind } for pid=8721 comm="syz.3.35472" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 1487.374546][ T36] audit: type=1400 audit(1763083136.150:116008): avc: denied { node_bind } for pid=8721 comm="syz.3.35472" saddr=fe80::aa src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 1487.420285][ T36] audit: type=1400 audit(1763083136.160:116009): avc: denied { read write } for pid=8719 comm="syz.0.35471" name="fuse" dev="devtmpfs" ino=23 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1487.474070][ T36] audit: type=1400 audit(1763083136.160:116010): avc: denied { open } for pid=8719 comm="syz.0.35471" path="/dev/fuse" dev="devtmpfs" ino=23 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1487.534740][ T36] audit: type=1400 audit(1763083136.160:116011): avc: denied { mounton } for pid=8719 comm="syz.0.35471" path="/81/file0" dev="tmpfs" ino=539 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1487.584599][ T36] audit: type=1400 audit(1763083136.170:116012): avc: denied { mount } for pid=8719 comm="syz.0.35471" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1487.640303][ T36] audit: type=1400 audit(1763083136.180:116013): avc: denied { read write } for pid=8675 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1487.694666][ T36] audit: type=1400 audit(1763083136.180:116014): avc: denied { open } for pid=8675 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1487.744299][ T36] audit: type=1400 audit(1763083136.180:116015): avc: denied { ioctl } for pid=8675 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1487.801585][ T36] audit: type=1400 audit(1763083136.200:116016): avc: denied { unmount } for pid=7966 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1487.986697][ T8747] fuse: Invalid rootmode [ 1488.207527][ T8773] fuse: Bad value for 'group_id' [ 1488.231054][ T8773] fuse: Bad value for 'group_id' [ 1488.315380][ T8781] binder: Bad value for 'max' [ 1488.439345][ T8787] binder: Bad value for 'max' [ 1489.354558][ T8799] fuse: Bad value for 'fd' [ 1489.811363][ T8822] binder: Bad value for 'max' [ 1490.200176][ T8844] fuse: Bad value for 'group_id' [ 1490.219198][ T8844] fuse: Bad value for 'group_id' [ 1490.292038][ T8846] fuse: Invalid rootmode [ 1490.641054][ T8865] fuse: Bad value for 'group_id' [ 1490.654282][ T8865] fuse: Bad value for 'group_id' [ 1490.668674][ T8867] fuse: Invalid rootmode [ 1490.825478][ T8875] binder: Bad value for 'max' [ 1490.978764][ T8883] fuse: Bad value for 'group_id' [ 1490.993957][ T8883] fuse: Bad value for 'group_id' [ 1491.034943][ T8885] fuse: Invalid rootmode [ 1491.104356][ T8893] fuse: Bad value for 'user_id' [ 1491.109284][ T8893] fuse: Bad value for 'user_id' [ 1491.201677][ T8897] binder: Bad value for 'max' [ 1491.342246][ T8905] fuse: Bad value for 'fd' [ 1491.421754][ T8909] fuse: Bad value for 'group_id' [ 1491.437076][ T8909] fuse: Bad value for 'group_id' [ 1491.496238][ T8917] fuse: Bad value for 'user_id' [ 1491.501251][ T8917] fuse: Bad value for 'user_id' [ 1492.148805][ T8929] fuse: Bad value for 'fd' [ 1492.229251][ T8933] fuse: Invalid rootmode [ 1492.289256][ T8935] fuse: Bad value for 'fd' [ 1492.337649][ T36] kauditd_printk_skb: 524 callbacks suppressed [ 1492.337669][ T36] audit: type=1400 audit(1763083141.170:116541): avc: denied { execute } for pid=8936 comm="syz.0.35578" path="/106/blkio.bfq.group_wait_time" dev="tmpfs" ino=699 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1492.375704][ T8937] binder: Bad value for 'max' [ 1492.400763][ T36] audit: type=1400 audit(1763083141.210:116542): avc: denied { mounton } for pid=8936 comm="syz.0.35578" path="/dev/binderfs" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 1492.441376][ T8939] fuse: Bad value for 'fd' [ 1492.474287][ T36] audit: type=1400 audit(1763083141.230:116543): avc: denied { read write } for pid=7966 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1492.524419][ T36] audit: type=1400 audit(1763083141.230:116544): avc: denied { open } for pid=7966 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1492.583508][ T36] audit: type=1400 audit(1763083141.230:116545): avc: denied { ioctl } for pid=7966 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1492.633116][ T36] audit: type=1400 audit(1763083141.270:116546): avc: denied { execute } for pid=8938 comm="syz.0.35579" path="/107/blkio.bfq.group_wait_time" dev="tmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1492.682316][ T8949] fuse: Invalid rootmode [ 1492.694288][ T36] audit: type=1400 audit(1763083141.270:116547): avc: denied { mounton } for pid=8938 comm="syz.0.35579" path="/107/file0" dev="tmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1492.745496][ T36] audit: type=1400 audit(1763083141.310:116548): avc: denied { read write } for pid=7966 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1492.791521][ T36] audit: type=1400 audit(1763083141.310:116549): avc: denied { read write open } for pid=7966 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1492.839613][ T36] audit: type=1400 audit(1763083141.310:116550): avc: denied { ioctl } for pid=7966 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1492.883834][ T8965] binder: Bad value for 'max' [ 1492.932707][ T8973] fuse: Bad value for 'group_id' [ 1492.942809][ T8976] fuse: Bad value for 'fd' [ 1492.944374][ T8973] fuse: Bad value for 'group_id' [ 1492.994994][ T8980] fuse: Invalid rootmode [ 1493.049052][ T8986] fuse: Bad value for 'group_id' [ 1493.060528][ T8986] fuse: Bad value for 'group_id' [ 1493.171573][ T8998] fuse: Bad value for 'group_id' [ 1493.185675][ T8998] fuse: Bad value for 'group_id' [ 1493.206822][ T9000] fuse: Invalid rootmode [ 1493.287587][ T9006] fuse: Bad value for 'group_id' [ 1493.292599][ T9006] fuse: Bad value for 'group_id' [ 1493.357410][ T9012] fuse: Bad value for 'user_id' [ 1493.362490][ T9012] fuse: Bad value for 'user_id' [ 1493.464887][ T9020] fuse: Invalid rootmode [ 1493.513635][ T9025] fuse: Bad value for 'group_id' [ 1493.518777][ T9025] fuse: Bad value for 'group_id' [ 1493.556289][ T9030] fuse: Bad value for 'user_id' [ 1493.561382][ T9030] fuse: Bad value for 'user_id' [ 1493.570301][ T9029] binder: Bad value for 'max' [ 1493.597103][ T9032] binder: Bad value for 'max' [ 1493.707806][ T9044] binder: Bad value for 'max' [ 1493.740372][ T9046] fuse: Bad value for 'group_id' [ 1493.746844][ T9046] fuse: Bad value for 'group_id' [ 1493.757693][ T9052] binder: Bad value for 'max' [ 1493.799162][ T9054] binder: Bad value for 'max' [ 1493.818300][ T9057] fuse: Bad value for 'group_id' [ 1493.823535][ T9057] fuse: Bad value for 'group_id' [ 1493.851352][ T9062] fuse: Bad value for 'fd' [ 1493.895194][ T9068] binder: Bad value for 'max' [ 1493.948700][ T9072] binder: Bad value for 'max' [ 1493.977572][ T9074] fuse: Bad value for 'group_id' [ 1493.982648][ T9074] fuse: Bad value for 'group_id' [ 1494.014837][ T9078] fuse: Bad value for 'user_id' [ 1494.015793][ T9076] binder: Bad value for 'max' [ 1494.019795][ T9078] fuse: Bad value for 'user_id' [ 1494.033226][ T9080] fuse: Bad value for 'group_id' [ 1494.048933][ T9080] fuse: Bad value for 'group_id' [ 1494.165284][ T9092] binder: Bad value for 'max' [ 1494.365077][ T9109] fuse: Invalid rootmode [ 1494.386270][ T9113] binder: Bad value for 'max' [ 1494.446480][ T9119] fuse: Bad value for 'user_id' [ 1494.454301][ T9119] fuse: Bad value for 'user_id' [ 1494.597219][ T9135] binder: Bad value for 'max' [ 1494.806777][ T9152] fuse: Invalid rootmode [ 1494.815286][ T9151] binder: Bad value for 'max' [ 1495.088080][ T9171] binder: Bad value for 'max' [ 1495.316317][ T9183] binder: Bad value for 'max' [ 1495.918749][ T9206] fuse: Bad value for 'fd' [ 1496.097560][ T9216] binder: Bad value for 'max' [ 1496.217180][ T9220] binder: Bad value for 'max' [ 1496.323641][ T9224] fuse: Bad value for 'fd' [ 1496.416262][ T9230] fuse: Invalid rootmode [ 1496.457298][ T9232] fuse: Bad value for 'fd' [ 1496.538062][ T9240] binder: Bad value for 'max' [ 1496.584720][ T9243] fuse: Bad value for 'user_id' [ 1496.593371][ T9244] fuse: Bad value for 'fd' [ 1496.598017][ T9243] fuse: Bad value for 'user_id' [ 1497.304641][ T9266] fuse: Bad value for 'fd' [ 1497.344878][ T36] kauditd_printk_skb: 856 callbacks suppressed [ 1497.344899][ T36] audit: type=1400 audit(1763083146.180:117407): avc: denied { read write } for pid=6314 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1497.402392][ T36] audit: type=1400 audit(1763083146.220:117408): avc: denied { open } for pid=6314 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1497.446668][ T9268] fuse: Invalid rootmode [ 1497.461404][ T36] audit: type=1400 audit(1763083146.220:117409): avc: denied { ioctl } for pid=6314 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1497.522190][ T36] audit: type=1400 audit(1763083146.270:117410): avc: denied { execute } for pid=9267 comm="syz.2.35741" path="/340/blkio.bfq.group_wait_time" dev="tmpfs" ino=2191 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1497.577436][ T36] audit: type=1400 audit(1763083146.280:117411): avc: denied { read write } for pid=9267 comm="syz.2.35741" name="fuse" dev="devtmpfs" ino=23 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1497.624308][ T36] audit: type=1400 audit(1763083146.280:117412): avc: denied { read write open } for pid=9267 comm="syz.2.35741" path="/dev/fuse" dev="devtmpfs" ino=23 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1497.675407][ T9274] fuse: Bad value for 'fd' [ 1497.700016][ T36] audit: type=1400 audit(1763083146.280:117413): avc: denied { mounton } for pid=9267 comm="syz.2.35741" path="/340/file0" dev="tmpfs" ino=2192 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1497.764319][ T36] audit: type=1400 audit(1763083146.330:117414): avc: denied { read write } for pid=6314 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1497.807471][ T9278] binder: Bad value for 'max' [ 1497.809560][ T36] audit: type=1400 audit(1763083146.330:117415): avc: denied { open } for pid=6314 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1497.875109][ T36] audit: type=1400 audit(1763083146.330:117416): avc: denied { ioctl } for pid=6314 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1497.917895][ T9280] fuse: Bad value for 'fd' [ 1497.939285][ T9282] fuse: Bad value for 'user_id' [ 1497.944932][ T9282] fuse: Bad value for 'user_id' [ 1498.152391][ T9294] fuse: Bad value for 'fd' [ 1498.205377][ T9296] fuse: Bad value for 'group_id' [ 1498.214292][ T9296] fuse: Bad value for 'group_id' [ 1498.233194][ T9298] fuse: Bad value for 'group_id' [ 1498.243672][ T9298] fuse: Bad value for 'group_id' [ 1498.302168][ T9302] fuse: Bad value for 'user_id' [ 1498.309576][ T9302] fuse: Bad value for 'user_id' [ 1498.360056][ T9306] fuse: Bad value for 'user_id' [ 1498.368694][ T9308] fuse: Bad value for 'fd' [ 1498.373263][ T9306] fuse: Bad value for 'user_id' [ 1498.515617][ T9316] fuse: Bad value for 'group_id' [ 1498.524296][ T9316] fuse: Bad value for 'group_id' [ 1498.586216][ T9318] fuse: Bad value for 'group_id' [ 1498.595084][ T9318] fuse: Bad value for 'group_id' [ 1499.172507][ T9324] fuse: Bad value for 'fd' [ 1499.237998][ T9328] fuse: Bad value for 'user_id' [ 1499.243091][ T9328] fuse: Bad value for 'user_id' [ 1499.319756][ T9334] binder: Bad value for 'max' [ 1499.724998][ T9346] fuse: Unknown parameter '0x0000000000000003' [ 1499.847332][ T9350] fuse: Bad value for 'fd' [ 1500.992322][ T9364] fuse: Unknown parameter '0x0000000000000003' [ 1501.069775][ T9370] fuse: Bad value for 'fd' [ 1501.088842][ T9374] binder: Bad value for 'max' [ 1501.126003][ T9378] fuse: Bad value for 'group_id' [ 1501.131255][ T9378] fuse: Bad value for 'group_id' [ 1501.200688][ T9386] fuse: Unknown parameter '0x0000000000000003' [ 1501.208007][ T9382] binder: Bad value for 'max' [ 1501.608023][ T9406] fuse: Unknown parameter 'fd0x0000000000000003' [ 1502.645638][ T36] kauditd_printk_skb: 364 callbacks suppressed [ 1502.645659][ T36] audit: type=1400 audit(1763083151.480:117781): avc: denied { read write } for pid=6314 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1502.704977][ T36] audit: type=1400 audit(1763083151.480:117782): avc: denied { open } for pid=6314 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1502.774272][ T36] audit: type=1400 audit(1763083151.480:117783): avc: denied { ioctl } for pid=6314 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1502.822866][ T9420] binder: Bad value for 'max' [ 1502.833503][ T36] audit: type=1400 audit(1763083151.480:117784): avc: denied { read write } for pid=8675 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1502.872872][ T9422] fuse: Unknown parameter 'fd0x0000000000000003' [ 1502.887766][ T36] audit: type=1400 audit(1763083151.480:117785): avc: denied { open } for pid=8675 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1502.938389][ T36] audit: type=1400 audit(1763083151.480:117786): avc: denied { ioctl } for pid=8675 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1502.968963][ T9426] fuse: Invalid rootmode [ 1502.973438][ T36] audit: type=1400 audit(1763083151.520:117787): avc: denied { create } for pid=9409 comm="syz.2.35815" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1503.004523][ T36] audit: type=1400 audit(1763083151.520:117788): avc: denied { write } for pid=9409 comm="syz.2.35815" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1503.044446][ T7966] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1503.051018][ T7966] audit: audit_lost=89 audit_rate_limit=0 audit_backlog_limit=64 [ 1503.062063][ T9434] binder: Bad value for 'max' [ 1503.291128][ T9446] fuse: Unknown parameter 'fd0x0000000000000003' [ 1503.431273][ T9450] fuse: Invalid rootmode [ 1503.678907][ T9460] binder: Bad value for 'max' [ 1503.989077][ T9468] fuse: Invalid rootmode [ 1504.848619][ T9482] binder: Bad value for 'max' [ 1504.933302][ T9484] fuse: Bad value for 'user_id' [ 1504.951772][ T9484] fuse: Bad value for 'user_id' [ 1505.012890][ T9487] fuse: Bad value for 'fd' [ 1505.090631][ T9492] fuse: Invalid rootmode [ 1505.127014][ T9494] binder: Bad value for 'max' [ 1505.227806][ T9502] fuse: Bad value for 'fd' [ 1505.241587][ T9504] fuse: Bad value for 'user_id' [ 1505.246683][ T9504] fuse: Bad value for 'user_id' [ 1505.362571][ T9516] binder: Bad value for 'max' [ 1505.410546][ T9524] fuse: Bad value for 'fd' [ 1505.418493][ T9522] fuse: Bad value for 'user_id' [ 1505.423405][ T9522] fuse: Bad value for 'user_id' [ 1505.462311][ T9528] binder: Bad value for 'max' [ 1505.532455][ T9540] binder: Bad value for 'max' [ 1505.574845][ T9545] fuse: Bad value for 'fd' [ 1505.586243][ T9548] fuse: Invalid rootmode [ 1505.708031][ T9563] binder: Bad value for 'max' [ 1505.760133][ T9567] fuse: Bad value for 'fd' [ 1505.832065][ T9573] binder: Bad value for 'max' [ 1505.868827][ T9575] fuse: Bad value for 'fd' [ 1505.963566][ T9587] fuse: Bad value for 'fd' [ 1505.971096][ T9586] binder: Bad value for 'max' [ 1506.155636][ T9601] fuse: Bad value for 'fd' [ 1506.402441][ T9622] fuse: Bad value for 'fd' [ 1506.413265][ T9625] fuse: Bad value for 'fd' [ 1506.424674][ T9626] binder: Bad value for 'max' [ 1506.700932][ T9645] fuse: Bad value for 'fd' [ 1506.706313][ T9646] fuse: Bad value for 'user_id' [ 1506.711313][ T9646] fuse: Bad value for 'user_id' [ 1506.884863][ T9654] fuse: Unknown parameter 'group_i' [ 1507.172382][ T9664] binder: Bad value for 'max' [ 1507.200986][ T9666] binder: Bad value for 'max' [ 1507.254864][ T9670] fuse: Bad value for 'group_id' [ 1507.259941][ T9670] fuse: Bad value for 'group_id' [ 1507.341574][ T9674] fuse: Bad value for 'user_id' [ 1507.346923][ T9674] fuse: Bad value for 'user_id' [ 1507.361620][ T9676] binder: Bad value for 'max' [ 1507.465220][ T9684] binder: Bad value for 'max' [ 1507.533777][ T9686] fuse: Bad value for 'user_id' [ 1507.548893][ T9686] fuse: Bad value for 'user_id' [ 1507.660665][ T36] kauditd_printk_skb: 776 callbacks suppressed [ 1507.660685][ T36] audit: type=1400 audit(1763083156.490:118558): avc: denied { read write } for pid=8675 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1507.708529][ T9692] binder: Bad value for 'max' [ 1507.726284][ T36] audit: type=1400 audit(1763083156.510:118559): avc: denied { read write open } for pid=8675 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1507.780283][ T36] audit: type=1400 audit(1763083156.510:118560): avc: denied { ioctl } for pid=8675 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1507.833162][ T9698] fuse: Bad value for 'fd' [ 1507.848192][ T36] audit: type=1400 audit(1763083156.520:118561): avc: denied { read write } for pid=7966 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1507.900335][ T36] audit: type=1400 audit(1763083156.520:118562): avc: denied { open } for pid=7966 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1507.974267][ T36] audit: type=1400 audit(1763083156.520:118563): avc: denied { ioctl } for pid=7966 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1508.024277][ T36] audit: type=1400 audit(1763083156.540:118564): avc: denied { execute } for pid=9691 comm="syz.3.35952" path="/103/blkio.bfq.group_wait_time" dev="tmpfs" ino=683 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1508.074268][ T36] audit: type=1400 audit(1763083156.540:118565): avc: denied { mounton } for pid=9691 comm="syz.3.35952" path="/dev/binderfs" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 1508.119978][ T36] audit: type=1400 audit(1763083156.570:118566): avc: denied { read write } for pid=8675 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1508.146667][ T9715] fuse: Bad value for 'fd' [ 1508.148749][ T36] audit: type=1400 audit(1763083156.570:118567): avc: denied { read write open } for pid=8675 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1508.388009][ T9725] binder: Bad value for 'max' [ 1508.555829][ T9741] fuse: Invalid rootmode [ 1508.610076][ T9746] fuse: Bad value for 'fd' [ 1508.693035][ T9754] fuse: Bad value for 'fd' [ 1508.738333][ T9760] fuse: Bad value for 'rootmode' [ 1508.858976][ T9773] fuse: Bad value for 'fd' [ 1508.923627][ T9778] fuse: Bad value for 'rootmode' [ 1509.041503][ T9798] fuse: Bad value for 'fd' [ 1509.221666][ T9820] fuse: Invalid rootmode [ 1509.240551][ T9822] fuse: Bad value for 'fd' [ 1509.332420][ T9830] fuse: Bad value for 'fd' [ 1509.454120][ T9841] fuse: Invalid rootmode [ 1509.532794][ T9850] fuse: Invalid rootmode [ 1509.650295][ T9860] fuse: Invalid rootmode [ 1510.042596][ T9882] fuse: Invalid rootmode [ 1510.539086][ T9902] fuse: Invalid rootmode [ 1510.841888][ T9918] binder: Unknown parameter 'ma' [ 1511.212804][ T9951] fuse: Invalid rootmode [ 1511.490119][ T9964] fuse: Unknown parameter 'user_i00000000000000000000' [ 1512.028420][ T9970] fuse: Bad value for 'fd' [ 1512.178444][ T9980] binder: Bad value for 'max' [ 1512.311897][ T9991] fuse: Bad value for 'fd' [ 1512.322465][ T9994] fuse: Unknown parameter 'user_id00000000000000000000' [ 1512.473384][T10008] binder: Unknown parameter 'ma' [ 1512.536320][T10010] fuse: Bad value for 'fd' [ 1512.585894][T10016] fuse: Unknown parameter 'user_i00000000000000000000' [ 1512.599280][T10022] fuse: Bad value for 'group_id' [ 1512.604379][T10022] fuse: Bad value for 'group_id' [ 1512.678547][ T36] kauditd_printk_skb: 903 callbacks suppressed [ 1512.678567][ T36] audit: type=1400 audit(1763083161.510:119471): avc: denied { read write } for pid=7966 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1512.710914][ T36] audit: type=1400 audit(1763083161.510:119472): avc: denied { open } for pid=7966 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1512.752380][ T36] audit: type=1400 audit(1763083161.510:119473): avc: denied { ioctl } for pid=7966 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1512.784555][ T36] audit: type=1400 audit(1763083161.530:119474): avc: denied { execute } for pid=10033 comm="syz.0.36123" path="/220/blkio.bfq.group_wait_time" dev="tmpfs" ino=1440 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1512.832758][ T36] audit: type=1400 audit(1763083161.540:119475): avc: denied { mounton } for pid=10033 comm="syz.0.36123" path="/dev/binderfs" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 1512.872604][T10042] fuse: Bad value for 'user_id' [ 1512.878151][T10042] fuse: Bad value for 'user_id' [ 1512.883707][ T36] audit: type=1400 audit(1763083161.540:119476): avc: denied { read write } for pid=6253 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1512.925510][ T36] audit: type=1400 audit(1763083161.540:119477): avc: denied { open } for pid=6253 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1512.968751][ T36] audit: type=1400 audit(1763083161.540:119478): avc: denied { ioctl } for pid=6253 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1512.996540][ T36] audit: type=1400 audit(1763083161.570:119479): avc: denied { execute } for pid=10031 comm="syz.2.36122" path="/436/cpuacct.usage_percpu" dev="tmpfs" ino=2807 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1513.022857][ T36] audit: type=1400 audit(1763083161.570:119480): avc: denied { read } for pid=10031 comm="syz.2.36122" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1513.054770][T10044] fuse: Unknown parameter 'use00000000000000000000' [ 1513.103302][T10050] binder: Unknown parameter 'ma' [ 1513.163021][T10054] fuse: Bad value for 'fd' [ 1513.290100][T10060] fuse: Bad value for 'user_id' [ 1513.304394][T10060] fuse: Bad value for 'user_id' [ 1513.501429][T10076] fuse: Bad value for 'fd' [ 1513.570314][T10079] fuse: Bad value for 'user_id' [ 1513.575704][T10079] fuse: Bad value for 'user_id' [ 1513.696363][T10090] fuse: Unknown parameter '0xffffffffffffffff00000000000000000000' [ 1513.779731][T10098] fuse: Bad value for 'fd' [ 1513.823203][T10102] binder: Bad value for 'max' [ 1513.903029][T10112] fuse: Unknown parameter 'user_i' [ 1513.976672][T10121] fuse: Unknown parameter '0xffffffffffffffff00000000000000000000' [ 1514.073147][T10132] fuse: Unknown parameter '0x0000000000000007' [ 1514.094992][T10131] fuse: Bad value for 'fd' [ 1514.135005][T10136] fuse: Unknown parameter 'user_i' [ 1514.264588][T10147] fuse: Unknown parameter '0x0000000000000007' [ 1514.313684][T10155] fuse: Unknown parameter '0x0000000000000007' [ 1514.398855][T10162] fuse: Unknown parameter '0xffffffffffffffff00000000000000000000' [ 1514.501393][T10170] fuse: Bad value for 'fd' [ 1514.570014][T10176] fuse: Unknown parameter '0x0000000000000007' [ 1514.666847][T10182] fuse: Bad value for 'fd' [ 1514.710276][T10186] fuse: Bad value for 'fd' [ 1514.778999][T10191] fuse: Bad value for 'user_id' [ 1514.797347][T10191] fuse: Bad value for 'user_id' [ 1514.919220][T10198] fuse: Unknown parameter '0x0000000000000007' [ 1514.987514][T10202] fuse: Bad value for 'fd' [ 1515.078207][T10207] fuse: Bad value for 'fd' [ 1515.265218][T10220] fuse: Invalid rootmode [ 1515.369682][T10228] fuse: Unknown parameter '0x0000000000000007' [ 1515.504405][T10240] fuse: Invalid rootmode [ 1515.571287][T10242] fuse: Bad value for 'fd' [ 1515.684518][T10258] fuse: Unknown parameter 'fd0x0000000000000007' [ 1515.723756][T10262] fuse: Invalid rootmode [ 1515.763865][T10265] fuse: Bad value for 'fd' [ 1515.843384][T10270] fuse: Unknown parameter 'fd0x0000000000000007' [ 1515.987774][T10274] fuse: Unknown parameter '0x0000000000000007' [ 1516.060258][T10276] fuse: Unknown parameter 'fd0x0000000000000007' [ 1516.146330][T10282] fuse: Unknown parameter 'fd0xffffffffffffffff00000000000000000000' [ 1516.270848][T10286] fuse: Bad value for 'fd' [ 1516.354723][T10288] fuse: Unknown parameter '&' [ 1516.537334][T10296] fuse: Unknown parameter 'fd0x0000000000000007' [ 1516.549781][T10298] fuse: Unknown parameter 'fd0xffffffffffffffff00000000000000000000' [ 1516.696059][T10308] fuse: Unknown parameter '&' [ 1516.914276][T10322] fuse: Unknown parameter '0xffffffffffffffff00000000000000000000' [ 1516.981201][T10330] fuse: Unknown parameter '0x0000000000000007' [ 1517.210200][T10352] fuse: Unknown parameter '0x0000000000000007' [ 1517.352345][T10364] fuse: Unknown parameter '0x0000000000000007' [ 1517.438938][T10374] fuse: Unknown parameter '0x0000000000000007' [ 1517.689588][ T36] kauditd_printk_skb: 998 callbacks suppressed [ 1517.689608][ T36] audit: type=1400 audit(1763083166.520:120479): avc: denied { setopt } for pid=10389 comm="syz.3.36301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 1517.734319][ T36] audit: type=1400 audit(1763083166.560:120480): avc: denied { setopt } for pid=10389 comm="syz.3.36301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 1517.737051][T10392] fuse: Bad value for 'group_id' [ 1517.774267][ T36] audit: type=1400 audit(1763083166.560:120481): avc: denied { execute } for pid=10391 comm="syz.0.36302" path="/259/blkio.bfq.group_wait_time" dev="tmpfs" ino=1693 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1517.794317][T10392] fuse: Bad value for 'group_id' [ 1517.830156][T10394] fuse: Unknown parameter '0x0000000000000007' [ 1517.844277][ T36] audit: type=1400 audit(1763083166.560:120482): avc: denied { read write } for pid=10391 comm="syz.0.36302" name="fuse" dev="devtmpfs" ino=23 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1517.888358][ T36] audit: type=1400 audit(1763083166.560:120483): avc: denied { read write open } for pid=10391 comm="syz.0.36302" path="/dev/fuse" dev="devtmpfs" ino=23 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1517.943230][ T36] audit: type=1400 audit(1763083166.570:120484): avc: denied { mounton } for pid=10391 comm="syz.0.36302" path="/259/file0" dev="tmpfs" ino=1694 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1517.968468][T10400] fuse: Bad value for 'fd' [ 1518.004269][ T36] audit: type=1400 audit(1763083166.610:120485): avc: denied { read write } for pid=8675 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1518.052985][ T36] audit: type=1400 audit(1763083166.610:120486): avc: denied { read write open } for pid=8675 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1518.109462][ T36] audit: type=1400 audit(1763083166.610:120487): avc: denied { ioctl } for pid=8675 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1518.175635][T10410] binder: Unknown parameter 'ma' [ 1518.180735][ T36] audit: type=1400 audit(1763083166.660:120488): avc: denied { execute } for pid=10393 comm="syz.3.36303" path="/178/blkio.bfq.group_wait_time" dev="tmpfs" ino=1170 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1518.394967][T10420] fuse: Unknown parameter 'fd0x0000000000000007' [ 1518.622781][T10438] fuse: Unknown parameter 'fd0x0000000000000007' [ 1518.653710][T10442] binder: Unknown parameter 'ma' [ 1518.684175][T10444] fuse: Bad value for 'user_id' [ 1518.697198][T10444] fuse: Bad value for 'user_id' [ 1519.189316][T10478] binder: Unknown parameter 'ma' [ 1519.606461][T10498] fuse: Bad value for 'group_id' [ 1519.614254][T10498] fuse: Bad value for 'group_id' [ 1519.989331][T10516] fuse: Bad value for 'group_id' [ 1519.998532][T10516] fuse: Bad value for 'group_id' [ 1520.051183][T10524] fuse: Unknown parameter 'grou00000000000000000000' [ 1520.062532][T10523] fuse: Bad value for 'fd' [ 1520.189215][T10536] fuse: Bad value for 'group_id' [ 1520.195648][T10536] fuse: Bad value for 'group_id' [ 1520.330769][T10548] fuse: Bad value for 'fd' [ 1520.445284][T10558] fuse: Unknown parameter '&' [ 1520.462311][T10560] fuse: Unknown parameter 'use' [ 1520.484827][T10562] fuse: Bad value for 'fd' [ 1521.312593][T10594] fuse: Bad value for 'fd' [ 1521.862043][T10621] fuse: Unknown parameter 'fd0x0000000000000007' [ 1521.934448][T10628] fuse: Bad value for 'group_id' [ 1521.949174][T10628] fuse: Bad value for 'group_id' [ 1522.019543][T10636] fuse: Unknown parameter 'fd0x0000000000000007' [ 1522.192095][T10648] fuse: Unknown parameter 'fd0x0000000000000007' [ 1522.344494][T10658] fuse: Bad value for 'group_id' [ 1522.351222][T10658] fuse: Bad value for 'group_id' [ 1522.706533][ T36] kauditd_printk_skb: 784 callbacks suppressed [ 1522.706555][ T36] audit: type=1400 audit(1763083171.540:121273): avc: denied { read write } for pid=6314 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1522.793390][ T36] audit: type=1400 audit(1763083171.540:121274): avc: denied { read write open } for pid=6314 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1522.864272][ T36] audit: type=1400 audit(1763083171.540:121275): avc: denied { ioctl } for pid=6314 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1522.911636][T10688] fuse: Bad value for 'user_id' [ 1522.919756][T10688] fuse: Bad value for 'user_id' [ 1522.934276][ T36] audit: type=1400 audit(1763083171.550:121276): avc: denied { read write } for pid=6253 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1522.983943][ T36] audit: type=1400 audit(1763083171.550:121277): avc: denied { open } for pid=6253 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1523.034276][ T36] audit: type=1400 audit(1763083171.550:121278): avc: denied { ioctl } for pid=6253 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1523.094286][ T36] audit: type=1400 audit(1763083171.560:121279): avc: denied { read write } for pid=10677 comm="syz.2.36446" name="fuse" dev="devtmpfs" ino=23 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1523.132376][T10692] fuse: Bad value for 'user_id' [ 1523.137334][T10692] fuse: Bad value for 'user_id' [ 1523.154327][ T36] audit: type=1400 audit(1763083171.560:121280): avc: denied { open } for pid=10677 comm="syz.2.36446" path="/dev/fuse" dev="devtmpfs" ino=23 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1523.212286][ T36] audit: type=1400 audit(1763083171.560:121281): avc: denied { mounton } for pid=10677 comm="syz.2.36446" path="/543/file0" dev="tmpfs" ino=3501 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1523.264554][ T36] audit: type=1400 audit(1763083171.560:121282): avc: denied { mount } for pid=10677 comm="syz.2.36446" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1523.504486][T10706] fuse: Bad value for 'user_id' [ 1523.512664][T10706] fuse: Bad value for 'user_id' [ 1523.632608][T10711] fuse: Bad value for 'fd' [ 1523.830405][T10722] fuse: Bad value for 'user_id' [ 1523.839424][T10722] fuse: Bad value for 'user_id' [ 1523.897279][T10724] fuse: Bad value for 'fd' [ 1524.035633][T10732] fuse: Bad value for 'group_id' [ 1524.044328][T10732] fuse: Bad value for 'group_id' [ 1524.124886][T10740] fuse: Bad value for 'group_id' [ 1524.134281][T10740] fuse: Bad value for 'group_id' [ 1524.190902][T10742] fuse: Bad value for 'fd' [ 1525.365804][T10770] fuse: Unknown parameter 'group_id00000000000000000000' [ 1526.591731][T10784] fuse: Bad value for 'fd' [ 1526.714736][T10792] fuse: Bad value for 'fd' [ 1526.832967][T10800] fuse: Bad value for 'user_id' [ 1526.838025][T10800] fuse: Bad value for 'user_id' [ 1527.236617][T10804] fuse: Bad value for 'group_id' [ 1527.251958][T10804] fuse: Bad value for 'group_id' [ 1527.314802][T10806] fuse: Bad value for 'fd' [ 1527.425568][T10810] fuse: Bad value for 'user_id' [ 1527.433202][T10810] fuse: Bad value for 'user_id' [ 1527.557772][T10814] binder: Unknown parameter 'ma' [ 1527.725066][ T36] kauditd_printk_skb: 367 callbacks suppressed [ 1527.725087][ T36] audit: type=1400 audit(1763083176.560:121650): avc: denied { execute } for pid=10817 comm="syz.1.36518" path="/563/blkio.bfq.group_wait_time" dev="tmpfs" ino=3635 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1527.784531][ T36] audit: type=1400 audit(1763083176.600:121651): avc: denied { read write } for pid=10817 comm="syz.1.36518" name="fuse" dev="devtmpfs" ino=23 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1527.834278][ T36] audit: type=1400 audit(1763083176.600:121652): avc: denied { read write open } for pid=10817 comm="syz.1.36518" path="/dev/fuse" dev="devtmpfs" ino=23 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1527.888400][ T36] audit: type=1400 audit(1763083176.610:121653): avc: denied { read write } for pid=6253 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1527.915032][ T36] audit: type=1400 audit(1763083176.610:121654): avc: denied { open } for pid=6253 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1527.941781][ T36] audit: type=1400 audit(1763083176.610:121655): avc: denied { ioctl } for pid=6253 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1527.969659][ T36] audit: type=1400 audit(1763083176.620:121656): avc: denied { read write } for pid=7966 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1527.979716][T10827] fuse: Unknown parameter ''' [ 1528.000252][ T36] audit: type=1400 audit(1763083176.620:121657): avc: denied { read write open } for pid=7966 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1528.077671][ T36] audit: type=1400 audit(1763083176.620:121658): avc: denied { ioctl } for pid=7966 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1528.134304][ T36] audit: type=1400 audit(1763083176.660:121659): avc: denied { create } for pid=10820 comm="syz.0.36513" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1528.230304][T10856] fuse: Bad value for 'group_id' [ 1528.244639][T10856] fuse: Bad value for 'group_id' [ 1528.250916][T10858] fuse: Bad value for 'user_id' [ 1528.257702][T10858] fuse: Bad value for 'user_id' [ 1528.466528][T10881] fuse: Bad value for 'group_id' [ 1528.487523][T10881] fuse: Bad value for 'group_id' [ 1528.592192][T10892] fuse: Bad value for 'group_id' [ 1528.604280][T10892] fuse: Bad value for 'group_id' [ 1529.088496][T10924] fuse: Bad value for 'user_id' [ 1529.103648][T10924] fuse: Bad value for 'user_id' [ 1529.216605][T10932] binder: Unknown parameter 'ma' [ 1529.399023][T10946] fuse: Bad value for 'group_id' [ 1529.404196][T10946] fuse: Bad value for 'group_id' [ 1529.413836][T10944] fuse: Bad value for 'user_id' [ 1529.424293][T10944] fuse: Bad value for 'user_id' [ 1529.806471][T10962] fuse: Bad value for 'group_id' [ 1529.816265][T10962] fuse: Bad value for 'group_id' [ 1530.612977][T10982] fuse: Bad value for 'group_id' [ 1530.624289][T10982] fuse: Bad value for 'group_id' [ 1530.836301][T10995] fuse: Bad value for 'user_id' [ 1530.847514][T10995] fuse: Bad value for 'user_id' [ 1530.915508][T11000] fuse: Bad value for 'rootmode' [ 1531.167018][T11012] fuse: Bad value for 'group_id' [ 1531.172039][T11012] fuse: Bad value for 'group_id' [ 1531.849227][T11018] bridge0: port 1(bridge_slave_0) entered blocking state [ 1531.864649][T11018] bridge0: port 1(bridge_slave_0) entered disabled state [ 1531.871804][T11018] bridge_slave_0: entered allmulticast mode [ 1531.901629][T11018] bridge_slave_0: entered promiscuous mode [ 1531.927059][ T293] bridge_slave_1: left allmulticast mode [ 1531.932764][ T293] bridge_slave_1: left promiscuous mode [ 1531.947738][ T293] bridge0: port 2(bridge_slave_1) entered disabled state [ 1531.964966][ T293] bridge_slave_0: left allmulticast mode [ 1531.984252][ T293] bridge_slave_0: left promiscuous mode [ 1531.990104][ T293] bridge0: port 1(bridge_slave_0) entered disabled state [ 1532.078369][T11018] bridge0: port 2(bridge_slave_1) entered blocking state [ 1532.094277][T11018] bridge0: port 2(bridge_slave_1) entered disabled state [ 1532.104311][T11018] bridge_slave_1: entered allmulticast mode [ 1532.110888][T11018] bridge_slave_1: entered promiscuous mode [ 1532.145821][ T293] veth1_macvtap: left promiscuous mode [ 1532.154332][ T293] veth0_vlan: left promiscuous mode [ 1532.485031][T11018] bridge0: port 2(bridge_slave_1) entered blocking state [ 1532.492132][T11018] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1532.499488][T11018] bridge0: port 1(bridge_slave_0) entered blocking state [ 1532.506651][T11018] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1532.560189][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 1532.571934][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 1532.592605][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 1532.599830][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1532.616420][ T293] bridge0: port 2(bridge_slave_1) entered blocking state [ 1532.623547][ T293] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1532.674530][T11018] veth0_vlan: entered promiscuous mode [ 1532.692902][T11018] veth1_macvtap: entered promiscuous mode [ 1532.735523][ T36] kauditd_printk_skb: 575 callbacks suppressed [ 1532.735543][ T36] audit: type=1400 audit(1763083181.570:122223): avc: denied { mounton } for pid=11018 comm="syz-executor" path="/root/syzkaller.BKBmwj/syz-tmp/newroot/syz-inputs" dev="tmpfs" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1532.781988][ T36] audit: type=1400 audit(1763083181.570:122224): avc: denied { mounton } for pid=11018 comm="syz-executor" path="/root/syzkaller.BKBmwj/syz-tmp/newroot/syzcgroup/unified" dev="tmpfs" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1532.834338][ T36] audit: type=1400 audit(1763083181.570:122225): avc: denied { unmount } for pid=11018 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 1532.876540][ T36] audit: type=1400 audit(1763083181.570:122226): avc: denied { read write open } for pid=8675 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1532.912573][ T36] audit: type=1400 audit(1763083181.570:122227): avc: denied { ioctl } for pid=8675 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1532.974549][ T36] audit: type=1400 audit(1763083181.570:122228): avc: denied { read write } for pid=8675 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1533.024258][ T36] audit: type=1400 audit(1763083181.570:122229): avc: denied { open } for pid=8675 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1533.099027][ T36] audit: type=1400 audit(1763083181.570:122230): avc: denied { ioctl } for pid=8675 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1533.143734][ T36] audit: type=1400 audit(1763083181.610:122231): avc: denied { mounton } for pid=11018 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=434 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 1533.194275][ T36] audit: type=1400 audit(1763083181.610:122232): avc: denied { mounton } for pid=11018 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=435 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 1533.400457][T11063] fuse: Bad value for 'user_id' [ 1533.413151][T11063] fuse: Bad value for 'user_id' [ 1533.631293][T11079] binder: Unknown parameter 'ma' [ 1534.625387][T11113] fuse: Unknown parameter 'user_id00000000000000000000' [ 1534.930366][ T13] bridge_slave_1: left allmulticast mode [ 1534.946815][ T13] bridge_slave_1: left promiscuous mode [ 1534.952690][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 1534.974748][ T13] bridge_slave_0: left allmulticast mode [ 1534.980461][ T13] bridge_slave_0: left promiscuous mode [ 1534.999497][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 1535.187286][ T13] veth1_macvtap: left promiscuous mode [ 1535.192954][ T13] veth0_vlan: left promiscuous mode [ 1535.425043][T11134] fuse: Bad value for 'user_id' [ 1535.429992][T11134] fuse: Bad value for 'user_id' [ 1535.446328][T11129] bridge0: port 1(bridge_slave_0) entered blocking state [ 1535.464695][T11129] bridge0: port 1(bridge_slave_0) entered disabled state [ 1535.482020][T11129] bridge_slave_0: entered allmulticast mode [ 1535.488728][T11129] bridge_slave_0: entered promiscuous mode [ 1535.500789][T11129] bridge0: port 2(bridge_slave_1) entered blocking state [ 1535.508105][T11129] bridge0: port 2(bridge_slave_1) entered disabled state [ 1535.516894][T11129] bridge_slave_1: entered allmulticast mode [ 1535.524173][T11129] bridge_slave_1: entered promiscuous mode [ 1535.739578][T11129] bridge0: port 2(bridge_slave_1) entered blocking state [ 1535.746818][T11129] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1535.754157][T11129] bridge0: port 1(bridge_slave_0) entered blocking state [ 1535.761328][T11129] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1535.812592][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 1535.820419][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 1535.836904][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 1535.844042][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1535.869200][T11156] fuse: Bad value for 'user_id' [ 1535.876888][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 1535.884040][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1535.892969][T11156] fuse: Bad value for 'user_id' [ 1535.919262][T11129] veth0_vlan: entered promiscuous mode [ 1535.958257][T11129] veth1_macvtap: entered promiscuous mode [ 1536.259064][T11176] fuse: Bad value for 'user_id' [ 1536.263998][T11176] fuse: Bad value for 'user_id' [ 1536.946686][T11188] fuse: Bad value for 'user_id' [ 1536.951606][T11188] fuse: Bad value for 'user_id' [ 1537.446912][T11218] fuse: Bad value for 'group_id' [ 1537.470349][T11218] fuse: Bad value for 'group_id' [ 1537.756063][ T36] kauditd_printk_skb: 486 callbacks suppressed [ 1537.756082][ T36] audit: type=1400 audit(1763083186.590:122719): avc: denied { read write } for pid=11018 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1537.814978][ T36] audit: type=1400 audit(1763083186.630:122720): avc: denied { open } for pid=11018 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1537.842039][T11238] fuse: Bad value for 'user_id' [ 1537.853592][T11238] fuse: Bad value for 'user_id' [ 1537.864485][ T36] audit: type=1400 audit(1763083186.630:122721): avc: denied { ioctl } for pid=11018 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1537.914259][ T36] audit: type=1400 audit(1763083186.680:122722): avc: denied { read write } for pid=11237 comm="syz.2.36714" name="fuse" dev="devtmpfs" ino=23 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1537.950837][ T36] audit: type=1400 audit(1763083186.680:122723): avc: denied { open } for pid=11237 comm="syz.2.36714" path="/dev/fuse" dev="devtmpfs" ino=23 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1537.979888][ T36] audit: type=1400 audit(1763083186.680:122724): avc: denied { mounton } for pid=11237 comm="syz.2.36714" path="/34/file0" dev="tmpfs" ino=226 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1538.004633][ T36] audit: type=1400 audit(1763083186.730:122725): avc: denied { read write } for pid=11018 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1538.029317][ T36] audit: type=1400 audit(1763083186.730:122726): avc: denied { open } for pid=11018 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1538.053935][ T36] audit: type=1400 audit(1763083186.730:122727): avc: denied { ioctl } for pid=11018 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1538.080967][ T36] audit: type=1400 audit(1763083186.750:122728): avc: denied { execute } for pid=11239 comm="syz.2.36715" path="/35/blkio.bfq.group_wait_time" dev="tmpfs" ino=232 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1538.107719][T11242] fuse: Unknown parameter '0x0000000000000007' [ 1538.383415][T11263] binder: Unknown parameter 'ma' [ 1538.389990][T11264] fuse: Unknown parameter '0x0000000000000007' [ 1538.816245][T11282] binder: Unknown parameter 'ma' [ 1538.874554][T11284] fuse: Bad value for 'rootmode' [ 1539.064798][T11293] fuse: Bad value for 'group_id' [ 1539.072168][T11293] fuse: Bad value for 'group_id' [ 1539.133577][T11298] fuse: Unknown parameter 'fd0x0000000000000007' [ 1539.200796][T11303] fuse: Bad value for 'rootmode' [ 1539.582513][T11316] fuse: Bad value for 'group_id' [ 1539.590894][T11316] fuse: Bad value for 'group_id' [ 1539.600288][T11318] fuse: Unknown parameter 'fd0x0000000000000007' [ 1540.200584][T11352] fuse: Bad value for 'group_id' [ 1540.214667][T11352] fuse: Bad value for 'group_id' [ 1540.266056][T11354] binder: Unknown parameter 'ma' [ 1540.827112][T11388] fuse: Bad value for 'user_id' [ 1540.841715][T11388] fuse: Bad value for 'user_id' [ 1541.380884][T11424] binder: Unknown parameter 'ma' [ 1541.650456][T11449] binder: Unknown parameter 'ma' [ 1541.693834][T11455] fuse: Bad value for 'group_id' [ 1541.714250][T11455] fuse: Bad value for 'group_id' [ 1541.826316][T11468] fuse: Unknown parameter 'user_i00000000000000000000' [ 1541.951112][T11484] fuse: Bad value for 'group_id' [ 1541.956192][T11484] fuse: Bad value for 'group_id' [ 1542.059392][T11493] fuse: Bad value for 'group_id' [ 1542.070188][T11493] fuse: Bad value for 'group_id' [ 1542.361623][T11523] binder: Unknown parameter 'ma' Stopping sshd: stopped /usr/sbin/sshd (pid 201) OK Stopping crond: [ 1542.688124][T11558] fuse: Bad value for 'user_id' [ 1542.694047][T11558] fuse: Bad value for 'user_id' stopped /usr/sbin/crond (pid 194) OK [ 1542.769414][ T36] kauditd_printk_skb: 810 callbacks suppressed [ 1542.769434][ T36] audit: type=1400 audit(1763083191.600:123539): avc: denied { read write } for pid=7966 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1542.841888][ T36] audit: type=1400 audit(1763083191.620:123540): avc: denied { read write } for pid=11129 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1542.894275][ T36] audit: type=1400 audit(1763083191.620:123541): avc: denied { read write open } for pid=11129 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1542.962275][ T36] audit: type=1400 audit(1763083191.620:123542): avc: denied { ioctl } for pid=11129 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 Stopping dhcpcd... [ 1543.024273][ T36] audit: type=1400 audit(1763083191.660:123543): avc: denied { execute } for pid=11563 comm="syz.1.36873" path="/55/blkio.bfq.group_wait_time" dev="tmpfs" ino=373 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 stopped /sbin/dhcpcd (pid 148) [ 1543.092465][ T36] audit: type=1400 audit(1763083191.670:123544): avc: denied { read write } for pid=11129 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1543.117536][T11581] fuse: Bad value for 'group_id' [ 1543.138153][T11581] fuse: Bad value for 'group_id' [ 1543.168500][ T36] audit: type=1400 audit(1763083191.670:123545): avc: denied { read write open } for pid=11129 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 Stopping network: [ 1543.244749][ T36] audit: type=1400 audit(1763083191.670:123546): avc: denied { ioctl } for pid=11129 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1543.335437][T11590] fuse: Bad value for 'user_id' [ 1543.340371][T11590] fuse: Bad value for 'user_id' [ 1543.342241][ T36] audit: type=1400 audit(1763083191.710:123547): avc: denied { execute } for pid=11564 comm="syz.0.36872" path="/400/blkio.bfq.group_wait_time" dev="tmpfs" ino=2612 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1543.444309][ T36] audit: type=1400 audit(1763083191.760:123548): avc: denied { execute } for pid=11567 comm="syz.1.36874" path="/56/blkio.bfq.group_wait_time" dev="tmpfs" ino=380 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1543.547418][T11598] binder: Unknown parameter 'ma' OK Stopping iptables: OK [ 1543.866307][T11611] fuse: Bad value for 'group_id' [ 1543.871331][T11611] fuse: Bad value for 'group_id' Stopping system message bus: [ 1544.070833][T11620] binder: Unknown parameter 'ma' done [ 1544.218740][T11630] fuse: Bad value for 'group_id' [ 1544.224868][T11630] fuse: Bad value for 'group_id' [ 1544.249839][T11633] fuse: Bad value for 'group_id' [ 1544.269346][T11633] fuse: Bad value for 'group_id' [ 1544.374148][T11646] fuse: Bad value for 'user_id' [ 1544.389296][T11646] fuse: Bad value for 'user_id' [ 1544.592081][T11667] binder: Unknown parameter 'ma' Stopping klogd: OK [ 1544.860359][T11693] binder: Unknown parameter 'ma' Stopping acpid: [ 1545.212310][T11720] binder: Unknown parameter 'ma' [ 1545.564880][T11732] fuse: Unknown parameter 'fd0x0000000000000007' [ 1545.670720][T11736] fuse: Bad value for 'group_id' [ 1545.680331][T11736] fuse: Bad value for 'group_id' [ 1545.728903][T11742] fuse: Bad value for 'user_id' [ 1545.738564][T11742] fuse: Bad value for 'user_id' [ 1545.869791][T11750] fuse: Unknown parameter 'fd0x0000000000000007' OK Stopping syslogd: stopped /sbin/syslogd (pid 92) OK [ 1546.138238][T11772] FAULT_INJECTION: forcing a failure. [ 1546.138238][T11772] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1546.151587][T11772] CPU: 0 UID: 0 PID: 11772 Comm: syz.2.36959 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 1546.151625][T11772] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1546.151642][T11772] Call Trace: [ 1546.151650][T11772] [ 1546.151660][T11772] __dump_stack+0x21/0x30 [ 1546.151698][T11772] dump_stack_lvl+0x10c/0x190 [ 1546.151730][T11772] ? __cfi_dump_stack_lvl+0x10/0x10 [ 1546.151762][T11772] ? vsnprintf+0x7b4/0x1aa0 [ 1546.151789][T11772] ? check_stack_object+0x107/0x140 [ 1546.151813][T11772] dump_stack+0x19/0x20 [ 1546.151842][T11772] should_fail_ex+0x3d9/0x530 [ 1546.151867][T11772] should_fail+0xf/0x20 [ 1546.151889][T11772] should_fail_usercopy+0x1e/0x30 [ 1546.151915][T11772] _copy_from_user+0x22/0xb0 [ 1546.151944][T11772] kstrtouint_from_user+0xc2/0x150 [ 1546.151967][T11772] ? __cfi_kstrtouint_from_user+0x10/0x10 [ 1546.151990][T11772] ? selinux_file_permission+0x309/0xb30 [ 1546.152020][T11772] ? __cfi_selinux_file_permission+0x10/0x10 [ 1546.152048][T11772] proc_fail_nth_write+0x89/0x210 [ 1546.152078][T11772] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 1546.152108][T11772] ? rwsem_read_trylock+0x2b1/0x660 [ 1546.152139][T11772] ? bpf_lsm_file_permission+0xd/0x20 [ 1546.152171][T11772] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 1546.152202][T11772] vfs_write+0x3c0/0xf30 [ 1546.152224][T11772] ? __cfi_vfs_write+0x10/0x10 [ 1546.152245][T11772] ? __kasan_check_write+0x18/0x20 [ 1546.152279][T11772] ? mutex_lock+0x92/0x1c0 [ 1546.152300][T11772] ? __cfi_mutex_lock+0x10/0x10 [ 1546.152321][T11772] ? __fget_files+0x2c5/0x340 [ 1546.152347][T11772] ksys_write+0x141/0x250 [ 1546.152368][T11772] ? xfd_validate_state+0x68/0x150 [ 1546.152398][T11772] ? __cfi_ksys_write+0x10/0x10 [ 1546.152419][T11772] ? __kasan_check_read+0x15/0x20 [ 1546.152454][T11772] __x64_sys_write+0x7f/0x90 [ 1546.152476][T11772] x64_sys_call+0x271c/0x2ee0 [ 1546.152510][T11772] do_syscall_64+0x58/0xf0 [ 1546.152538][T11772] ? clear_bhb_loop+0x50/0xa0 [ 1546.152574][T11772] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 1546.152600][T11772] RIP: 0033:0x7f5cf978e17f [ 1546.152619][T11772] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 1546.152639][T11772] RSP: 002b:00007f5cfa5a0030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 1546.152664][T11772] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f5cf978e17f [ 1546.152681][T11772] RDX: 0000000000000001 RSI: 00007f5cfa5a00a0 RDI: 0000000000000005 [ 1546.152696][T11772] RBP: 00007f5cfa5a0090 R08: 0000000000000000 R09: 0000000000000000 [ 1546.152711][T11772] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 1546.152726][T11772] R13: 00007f5cf99e6038 R14: 00007f5cf99e5fa0 R15: 00007ffc77e86518 [ 1546.152746][T11772] umount: can't remount debugfs read-only [ 1546.773814][T11792] fuse: Bad value for 'user_id' [ 1546.784306][T11792] fuse: Bad value for 'user_id' Connection to 10.128.0.176 closed by remote host. umount: sysfs busy - remounted read-only umount: devtmpfs busy - remounted read-only umount: can't remount /dev/root read-only The system is going down NOW! Sent SIGTERM to all processes [ 1547.131335][ T13] bridge_slave_1: left allmulticast mode [ 1547.137176][ T13] bridge_slave_1: left promiscuous mode [ 1547.142831][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 1547.150695][ T13] bridge_slave_0: left allmulticast mode [ 1547.156760][ T13] bridge_slave_0: left promiscuous mode [ 1547.162527][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 1547.344935][ T13] veth1_macvtap: left promiscuous mode [ 1547.350633][ T13] veth0_vlan: left promiscuous mode [ 1547.598388][ T13] bridge_slave_1: left allmulticast mode [ 1547.604165][ T13] bridge_slave_1: left promiscuous mode [ 1547.609959][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 1547.617698][ T13] bridge_slave_0: left allmulticast mode [ 1547.623464][ T13] bridge_slave_0: left promiscuous mode [ 1547.629116][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 1547.637014][ T13] bridge_slave_1: left allmulticast mode [ 1547.642683][ T13] bridge_slave_1: left promiscuous mode [ 1547.648558][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 1547.656283][ T13] bridge_slave_0: left allmulticast mode [ 1547.662051][ T13] bridge_slave_0: left promiscuous mode [ 1547.667839][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 1547.675789][ T13] bridge_slave_1: left allmulticast mode [ 1547.681487][ T13] bridge_slave_1: left promiscuous mode [ 1547.687276][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 1547.694899][ T13] bridge_slave_0: left allmulticast mode [ 1547.700716][ T13] bridge_slave_0: left promiscuous mode [ 1547.706472][ T13] bridge0: port 1(bridge_slave_0) entered disabled state Sent SIGKILL to all processes Requesting system poweroff [ 1547.989150][ T13] veth1_macvtap: left promiscuous mode [ 1547.994861][ T13] veth0_vlan: left promiscuous mode [ 1548.000362][ T13] veth1_macvtap: left promiscuous mode [ 1548.005914][ T13] veth0_vlan: left promiscuous mode [ 1548.011329][ T13] veth1_macvtap: left promiscuous mode [ 1548.016977][ T13] veth0_vlan: left promiscuous mode [ 1548.984931][T11796] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 1548.991962][T11796] ACPI: PM: Preparing to enter system sleep state S5 [ 1548.999228][T11796] kvm: exiting hardware virtualization [ 1549.004762][T11796] reboot: Power down serialport: VM disconnected.