last executing test programs: 4.005437568s ago: executing program 1 (id=208): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)={0x3c, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_NAT_DST={0x4}]}, 0x3c}}, 0x0) 4.005023088s ago: executing program 1 (id=210): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000600)=ANY=[@ANYBLOB="38010000160033060000000000000080e0000002000000000000000000000000ff02000000000000000000000000000100000000000a00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414bb000000000000000000000000000004d2320000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000003000000000000000000000000000000050000000000000004000000000000000000000002000000020000000a000418000000000000000048000200656362286369706865725f6e756c6c2900"/200], 0x138}}, 0x0) 3.994073938s ago: executing program 1 (id=212): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f00000002c0)={0x44, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_DEBUG_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x18, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x14, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x4}]}]}]}, 0x44}}, 0x0) 3.925497939s ago: executing program 1 (id=214): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r3 = socket(0x10, 0x3, 0x0) write(r3, &(0x7f0000000000)="240000001a005f0400f964140009040180202000000000210000000008ac65586402c5b5", 0x24) 3.360171778s ago: executing program 2 (id=217): madvise(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0xe) madvise(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x17) r0 = userfaultfd(0x801) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)={0xaa, 0x41}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000400000/0xc00000)=nil, 0xc00000}, 0x3}) ioctl$UFFDIO_WRITEPROTECT(r0, 0xc018aa06, &(0x7f0000000140)={{&(0x7f0000400000/0xc00000)=nil, 0xc00000}, 0x1}) mprotect(&(0x7f0000f69000/0x4000)=nil, 0x4000, 0x1) syz_io_uring_setup(0x48ba, &(0x7f0000000180)={0x0, 0xc6e9, 0x2000, 0xfffffffc, 0x333}, &(0x7f0000000080), &(0x7f0000ff4000)) 2.885396745s ago: executing program 1 (id=218): r0 = fsopen(&(0x7f00000000c0)='sysfs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000003140)='smackfshat', &(0x7f0000003180)='pids_localevents', 0x0) 2.814492146s ago: executing program 1 (id=220): mknodat$null(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x103) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000002280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) read$FUSE(r0, &(0x7f0000002300)={0x2020, 0x0, 0x0}, 0x2020) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x442, 0x0) write$FUSE_INIT(r0, &(0x7f0000001200)={0x50, 0x0, r1, {0x7, 0x27, 0x0, 0x500000}}, 0x50) read$FUSE(r0, &(0x7f0000004340)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0xffffffffffffffda, r3}, 0x10) ioctl$HIDIOCGRDESC(r2, 0x90044802, 0x0) 2.56247565s ago: executing program 0 (id=224): prctl$PR_SET_TAGGED_ADDR_CTRL(0x37, 0x1) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) ioctl$TIOCMBIS(r0, 0x5416, &(0x7f0000002300)=0x8) 2.562306221s ago: executing program 0 (id=225): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)={0x30, r1, 0x1, 0x0, 0x100000, {{}, {}, {0x14, 0x19, {0x2, 0x1, 0x0, 0x8}}}}, 0x30}, 0x1, 0x0, 0x0, 0x4008000}, 0x9004) 2.55543733s ago: executing program 0 (id=227): prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f00000000c0), 0x10) sendmsg$can_bcm(r3, 0x0, 0x0) sendmsg$can_bcm(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x2, 0x280, 0x1, {0x0, 0x2710}, {0x77359400}, {0x3, 0x1, 0x1}, 0x1, @can={{0x1, 0x1, 0x1}, 0x6, 0x3, 0x0, 0x0, "e4720f557d78ea46"}}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x10) 2.469752312s ago: executing program 2 (id=231): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0/file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0x3c, 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000180)=ANY=[@ANYBLOB="1400000001080102"], 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x20000400) 555.628921ms ago: executing program 2 (id=233): mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r0 = add_key(&(0x7f0000000740)='big_key\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000700)='\a\x00', 0x2, 0xffffffffffffffff) keyctl$describe(0x6, r0, 0x0, 0x0) 555.357991ms ago: executing program 3 (id=234): r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x4, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000000ac0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[@dstopts_2292={{0x18, 0x29, 0x4, {0x87}}}, @dstopts_2292={{0x18, 0x29, 0x4, {0x8}}}], 0x30}}], 0x1, 0x4000c000) 555.015361ms ago: executing program 0 (id=235): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)={0x30, r1, 0x1, 0x0, 0x100000, {{}, {}, {0x14, 0x19, {0x2, 0x1, 0x0, 0x8}}}}, 0x30}, 0x1, 0x0, 0x0, 0x4008000}, 0x9004) 529.947372ms ago: executing program 3 (id=236): mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065ffff017f000e0800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000000)={0x18, 0x0, 0x0, {0x3b9}}, 0x18) write$FUSE_DIRENTPLUS(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="b0"], 0xb0) write$FUSE_GETXATTR(r2, &(0x7f00000000c0)={0x18}, 0x18) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="b9000000000000", @ANYRES64], 0xb8) mount$9p_fd(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@cache_loose}]}}) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x20842, 0x0) write$FUSE_DIRENTPLUS(r3, &(0x7f00000029c0)={0x288, 0xffffffffffffffda, 0x0, [{{0x6, 0x1, 0xe, 0x1, 0x7, 0x20000, {0x4, 0xd355, 0x8, 0x6, 0x5, 0x2, 0x9, 0x20000, 0x6, 0xc000, 0x6}}, {0x4, 0x100000001, 0x0, 0x8}}, {{0x6, 0x2, 0x0, 0x9, 0x8, 0x8000, {0x3, 0x80000001, 0x5, 0x80000000, 0x2, 0x4, 0x5, 0x8, 0xa05, 0x6000, 0x9, 0x0, 0x0, 0x6, 0x1}}, {0x3, 0x4, 0x5, 0xfffffffe, 'wfdno'}}, {{0x6, 0x2, 0xcb28, 0x4, 0x5, 0x5, {0x1, 0x4, 0xe33, 0xaf6, 0x5, 0x0, 0x7, 0x4, 0x1, 0xa000, 0x7, 0x0, 0x0, 0xdbb9, 0x1}}, {0x5, 0x8, 0x2, 0x5f14, '\x98}'}}, {{0x2, 0x1, 0xfffffffffffffff8, 0x1, 0x2, 0x3, {0x2, 0x73a, 0x0, 0xffff, 0x0, 0xf, 0x2, 0x7, 0xfffff801, 0xa000, 0xfff, 0x0, 0x0, 0x8, 0x7b4}}, {0x5, 0x7fff, 0x1, 0x0, '\x00'}}]}, 0x288) 528.437082ms ago: executing program 0 (id=244): r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, 0x0, 0x9004) 500.260232ms ago: executing program 0 (id=237): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000480)=@abs={0x0, 0x0, 0x8004e24}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 443.925983ms ago: executing program 2 (id=238): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) prctl$PR_SET_TAGGED_ADDR_CTRL(0x37, 0x1) ioctl$PIO_SCRNMAP(r0, 0x4b41, &(0x7f00000000c0)) 426.462823ms ago: executing program 3 (id=239): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)={0x34, r1, 0x921, 0x0, 0x4, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_MESH_SETUP={0x4}, @NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_DTIM_PERIOD={0x8, 0xd, 0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x11}, 0x0) 200.794567ms ago: executing program 2 (id=240): r0 = openat$binfmt_register(0xffffffffffffff9c, &(0x7f0000000140), 0x1, 0x0) write$binfmt_register(r0, &(0x7f0000000180)={0x3a, 'syz2', 0x3a, 'M', 0x3a, 0x4, 0x3a, '(Q', 0x3a, '\x00', 0x3a, './file0'}, 0x2a) 200.488857ms ago: executing program 3 (id=241): sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00008feff0)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000100)={0x4, 0x0, &(0x7f00008feff0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="020d0000100000002f3144e8edffffff03000600ff18000002004909000100000000000000001e0e080012000200010000d200000000000030006c540203009f7eae02000000adb20200000000f52c000000cdff00000001020014bb000001000000002300001300030005"], 0x80}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f00000000c0), 0x2c8, 0x0) 200.350647ms ago: executing program 2 (id=242): bind$inet6(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) bind$802154_dgram(r3, &(0x7f0000000140)={0x24, @long={0x3, 0x2, {0xaaaaaaaaaaaa0102}}}, 0xd) 200.220517ms ago: executing program 3 (id=243): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000e00), r0) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f00000010c0)={0x0, 0x0, &(0x7f0000001080)={&(0x7f0000000a00)=ANY=[@ANYBLOB="2c010000", @ANYRES16=r1, @ANYBLOB="01000004000000000000170000000c00060001000000010000000c01308014000400976f1044858ff397ac0dff8301800c00050004"], 0x12c}, 0x1, 0x0, 0x0, 0x24004821}, 0x0) 0s ago: executing program 3 (id=245): r0 = socket$inet_icmp(0x2, 0x2, 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) readv(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000380)=""/103, 0x67}], 0x1) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e22, @local}, 0x10) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.15.211' (ED25519) to the list of known hosts. [ 23.142681][ T36] audit: type=1400 audit(1750695105.290:64): avc: denied { mounton } for pid=281 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 23.144246][ T281] cgroup: Unknown subsys name 'net' [ 23.165368][ T36] audit: type=1400 audit(1750695105.290:65): avc: denied { mount } for pid=281 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 23.192715][ T36] audit: type=1400 audit(1750695105.320:66): avc: denied { unmount } for pid=281 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 23.192889][ T281] cgroup: Unknown subsys name 'devices' [ 23.395721][ T281] cgroup: Unknown subsys name 'hugetlb' [ 23.401346][ T281] cgroup: Unknown subsys name 'rlimit' [ 23.577601][ T36] audit: type=1400 audit(1750695105.730:67): avc: denied { setattr } for pid=281 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 23.600806][ T36] audit: type=1400 audit(1750695105.730:68): avc: denied { mounton } for pid=281 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 23.601255][ T283] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 23.625776][ T36] audit: type=1400 audit(1750695105.730:69): avc: denied { mount } for pid=281 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 23.657329][ T36] audit: type=1400 audit(1750695105.790:70): avc: denied { relabelto } for pid=283 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 23.682774][ T36] audit: type=1400 audit(1750695105.790:71): avc: denied { write } for pid=283 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 23.690807][ T281] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 23.708557][ T36] audit: type=1400 audit(1750695105.840:72): avc: denied { read } for pid=281 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 23.742830][ T36] audit: type=1400 audit(1750695105.840:73): avc: denied { open } for pid=281 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 25.079446][ T289] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.086573][ T289] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.093732][ T289] bridge_slave_0: entered allmulticast mode [ 25.100045][ T289] bridge_slave_0: entered promiscuous mode [ 25.109630][ T288] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.116764][ T288] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.124001][ T288] bridge_slave_0: entered allmulticast mode [ 25.130262][ T288] bridge_slave_0: entered promiscuous mode [ 25.138025][ T288] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.145113][ T288] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.152328][ T288] bridge_slave_1: entered allmulticast mode [ 25.158655][ T288] bridge_slave_1: entered promiscuous mode [ 25.166370][ T289] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.173453][ T289] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.180618][ T289] bridge_slave_1: entered allmulticast mode [ 25.187028][ T289] bridge_slave_1: entered promiscuous mode [ 25.219574][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.226686][ T291] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.233829][ T291] bridge_slave_0: entered allmulticast mode [ 25.240119][ T291] bridge_slave_0: entered promiscuous mode [ 25.259418][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.266595][ T291] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.273707][ T291] bridge_slave_1: entered allmulticast mode [ 25.279955][ T291] bridge_slave_1: entered promiscuous mode [ 25.330533][ T290] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.337664][ T290] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.344788][ T290] bridge_slave_0: entered allmulticast mode [ 25.351041][ T290] bridge_slave_0: entered promiscuous mode [ 25.357759][ T290] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.364863][ T290] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.371925][ T290] bridge_slave_1: entered allmulticast mode [ 25.378307][ T290] bridge_slave_1: entered promiscuous mode [ 25.520988][ T289] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.528080][ T289] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.535421][ T289] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.542463][ T289] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.556531][ T288] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.563615][ T288] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.570899][ T288] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.577958][ T288] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.590869][ T290] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.597954][ T290] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.605262][ T290] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.612337][ T290] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.623578][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.630648][ T291] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.637982][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.645030][ T291] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.691483][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.699538][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.706763][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.714539][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.721729][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.729053][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.736369][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.743654][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.758972][ T46] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.766049][ T46] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.785911][ T46] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.792961][ T46] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.800865][ T46] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.807943][ T46] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.820225][ T46] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.827322][ T46] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.841538][ T46] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.848625][ T46] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.856318][ T46] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.863396][ T46] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.871150][ T46] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.878275][ T46] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.911109][ T291] veth0_vlan: entered promiscuous mode [ 25.921711][ T46] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.928778][ T46] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.948835][ T288] veth0_vlan: entered promiscuous mode [ 25.965573][ T288] veth1_macvtap: entered promiscuous mode [ 25.990182][ T291] veth1_macvtap: entered promiscuous mode [ 25.998074][ T290] veth0_vlan: entered promiscuous mode [ 26.022544][ T289] veth0_vlan: entered promiscuous mode [ 26.046838][ T290] veth1_macvtap: entered promiscuous mode [ 26.054006][ T288] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 26.089206][ T289] veth1_macvtap: entered promiscuous mode [ 26.095787][ T309] binder: Unknown parameter 'context' [ 26.172354][ T317] rust_binder: Transaction failed: BR_FAILED_REPLY { source: ENOENT } my_pid:5 [ 26.207097][ T323] kvm_intel: L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 26.236922][ T321] ======================================================= [ 26.236922][ T321] WARNING: The mand mount option has been deprecated and [ 26.236922][ T321] and is ignored by this kernel. Remove the mand [ 26.236922][ T321] option from the mount to silence this warning. [ 26.236922][ T321] ======================================================= [ 26.389863][ T338] netlink: 16 bytes leftover after parsing attributes in process `syz.3.12'. [ 26.433398][ T305] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 26.573666][ T310] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 26.585112][ T305] usb 2-1: config 1 has an invalid descriptor of length 48, skipping remainder of the config [ 26.596059][ T305] usb 2-1: config 1 interface 1 altsetting 1 endpoint 0x82 has invalid maxpacket 26159, setting to 1024 [ 26.607752][ T305] usb 2-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 1024 [ 26.618018][ T305] usb 2-1: config 1 interface 1 altsetting 1 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 26.634632][ T305] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 26.645018][ T305] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 26.653182][ T305] usb 2-1: Product: syz [ 26.657727][ T305] usb 2-1: Manufacturer: syz [ 26.662455][ T305] usb 2-1: SerialNumber: syz [ 26.733397][ T310] usb 1-1: Using ep0 maxpacket: 16 [ 26.740640][ T310] usb 1-1: config 0 has an invalid interface number: 21 but max is 0 [ 26.750239][ T310] usb 1-1: config 0 has no interface number 0 [ 26.756615][ T310] usb 1-1: config 0 interface 21 has no altsetting 0 [ 26.908681][ T312] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 26.918255][ T310] usb 1-1: New USB device found, idVendor=0458, idProduct=704a, bcdDevice=3a.55 [ 26.927765][ T310] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 26.935995][ T310] usb 1-1: Product: syz [ 26.940342][ T310] usb 1-1: Manufacturer: syz [ 26.945510][ T310] usb 1-1: SerialNumber: syz [ 26.956883][ T310] usb 1-1: config 0 descriptor?? [ 27.174556][ T64] usb 1-1: USB disconnect, device number 2 [ 27.318653][ T305] cdc_ncm 2-1:1.0: failed GET_NTB_PARAMETERS [ 27.325516][ T305] cdc_ncm 2-1:1.0: bind() failure [ 27.331816][ T305] cdc_ncm 2-1:1.1: CDC Union missing and no IAD found [ 27.338942][ T305] cdc_ncm 2-1:1.1: bind() failure [ 27.352455][ T305] usb 2-1: USB disconnect, device number 2 [ 27.850326][ T376] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 28.073507][ T391] can: request_module (can-proto-6) failed. [ 28.935986][ T36] kauditd_printk_skb: 138 callbacks suppressed [ 28.936056][ T36] audit: type=1400 audit(1750695110.350:212): avc: denied { getopt } for pid=387 comm="syz.1.33" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 29.093044][ T36] audit: type=1400 audit(1750695111.230:213): avc: denied { setopt } for pid=396 comm="syz.2.38" lport=5 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 29.143382][ T36] audit: type=1400 audit(1750695111.230:214): avc: denied { write } for pid=396 comm="syz.2.38" lport=5 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 29.163300][ T36] audit: type=1400 audit(1750695111.270:215): avc: denied { connect } for pid=395 comm="syz.1.35" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 29.197821][ T36] audit: type=1400 audit(1750695111.350:216): avc: denied { write } for pid=408 comm="syz.0.42" name="001" dev="devtmpfs" ino=96 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 29.268450][ T10] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 29.297471][ T36] audit: type=1400 audit(1750695111.400:217): avc: denied { unmount } for pid=290 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 29.307453][ T10] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz1] on syz0 [ 29.318072][ T36] audit: type=1400 audit(1750695111.420:218): avc: denied { read write } for pid=419 comm="syz.3.46" name="uhid" dev="devtmpfs" ino=199 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 29.373506][ T36] audit: type=1400 audit(1750695111.420:219): avc: denied { open } for pid=419 comm="syz.3.46" path="/dev/uhid" dev="devtmpfs" ino=199 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 29.397631][ T36] audit: type=1400 audit(1750695111.520:220): avc: denied { read write } for pid=423 comm="syz.1.47" name="fuse" dev="devtmpfs" ino=23 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 29.421387][ T36] audit: type=1400 audit(1750695111.520:221): avc: denied { open } for pid=423 comm="syz.1.47" path="/dev/fuse" dev="devtmpfs" ino=23 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 29.910076][ T442] rust_binder: Failure when writing BR_NOOP at beginning of buffer. [ 29.910145][ T442] rust_binder: Read failure Err(EFAULT) in pid:31 [ 30.885828][ T455] capability: warning: `syz.3.58' uses deprecated v2 capabilities in a way that may be insecure [ 31.243309][ T9] usb 3-1: new low-speed USB device number 2 using dummy_hcd [ 31.435456][ T9] usb 3-1: config index 0 descriptor too short (expected 301, got 45) [ 31.444585][ T9] usb 3-1: config 16 has an invalid interface number: 80 but max is 0 [ 31.453691][ T9] usb 3-1: config 16 has an invalid descriptor of length 173, skipping remainder of the config [ 31.466371][ T9] usb 3-1: config 16 has no interface number 0 [ 31.473095][ T9] usb 3-1: config 16 interface 80 altsetting 24 endpoint 0x8B is Bulk; changing to Interrupt [ 31.614710][ T9] usb 3-1: config 16 interface 80 altsetting 24 has 1 endpoint descriptor, different from the interface descriptor's value: 3 [ 31.627943][ T9] usb 3-1: config 16 interface 80 has no altsetting 0 [ 31.637159][ T9] usb 3-1: New USB device found, idVendor=ee8d, idProduct=db1e, bcdDevice=61.23 [ 31.646431][ T9] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 33.191597][ T508] input: syz0 as /devices/virtual/input/input4 [ 33.215525][ T510] @: renamed from vlan0 (while UP) [ 34.022588][ T310] usb 3-1: USB disconnect, device number 2 [ 34.064423][ T36] kauditd_printk_skb: 27 callbacks suppressed [ 34.064443][ T36] audit: type=1400 audit(1750695116.220:249): avc: denied { ioctl } for pid=532 comm="syz.0.87" path="socket:[3784]" dev="sockfs" ino=3784 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 34.078833][ T533] netlink: 8 bytes leftover after parsing attributes in process `syz.0.87'. [ 34.648477][ T36] audit: type=1400 audit(1750695116.800:250): avc: denied { name_bind } for pid=560 comm="syz.2.101" src=3618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 34.670093][ T36] audit: type=1400 audit(1750695116.820:251): avc: denied { name_bind } for pid=562 comm="syz.0.100" src=129 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=udp_socket permissive=1 [ 34.759663][ T36] audit: type=1400 audit(1750695116.910:252): avc: denied { setopt } for pid=576 comm="syz.0.107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 35.558182][ T36] audit: type=1400 audit(1750695117.710:253): avc: denied { create } for pid=585 comm="syz.3.110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 35.685671][ T36] audit: type=1400 audit(1750695117.840:254): avc: denied { mount } for pid=588 comm="syz.3.112" name="/" dev="ramfs" ino=3900 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 35.744896][ T36] audit: type=1400 audit(1750695117.870:255): avc: denied { read } for pid=587 comm="syz.0.111" name="vga_arbiter" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 35.840058][ T36] audit: type=1400 audit(1750695117.870:256): avc: denied { open } for pid=587 comm="syz.0.111" path="/dev/vga_arbiter" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 35.875884][ T36] audit: type=1400 audit(1750695118.020:257): avc: denied { bind } for pid=596 comm="syz.2.116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 35.895199][ T36] audit: type=1400 audit(1750695118.020:258): avc: denied { connect } for pid=596 comm="syz.2.116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 37.432194][ T641] tap0: tun_chr_ioctl cmd 1074025677 [ 37.437683][ T641] tap0: linktype set to 0 [ 37.983362][ T568] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 39.695716][ T36] kauditd_printk_skb: 12 callbacks suppressed [ 39.695737][ T36] audit: type=1400 audit(1750695121.840:271): avc: denied { read } for pid=734 comm="syz.1.172" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 39.738905][ T36] audit: type=1400 audit(1750695121.890:272): avc: denied { accept } for pid=730 comm="syz.2.171" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 39.867458][ T36] audit: type=1400 audit(1750695122.020:273): avc: denied { bind } for pid=754 comm="syz.1.179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 40.019143][ T36] audit: type=1400 audit(1750695122.170:274): avc: denied { call } for pid=761 comm="syz.3.182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 40.467377][ T36] audit: type=1400 audit(1750695122.620:275): avc: denied { read } for pid=767 comm="syz.2.185" name="usbmon6" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 40.490584][ T36] audit: type=1400 audit(1750695122.620:276): avc: denied { open } for pid=767 comm="syz.2.185" path="/dev/usbmon6" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 40.961931][ T790] TCP: TCP_TX_DELAY enabled [ 41.752079][ T823] netlink: 64 bytes leftover after parsing attributes in process `syz.1.210'. [ 42.685485][ T843] capability: warning: `syz.3.216' uses 32-bit capabilities (legacy support in use) [ 43.093300][ T36] audit: type=1400 audit(1750695125.240:277): avc: denied { read write } for pid=855 comm="syz.0.223" dev="9p" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 43.125627][ T36] audit: type=1400 audit(1750695125.240:278): avc: denied { open } for pid=855 comm="syz.0.223" path="/73/file0" dev="9p" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 43.158924][ T36] audit: type=1400 audit(1750695125.270:279): avc: denied { unmount } for pid=289 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 43.300698][ T872] rust_binder: Failure when writing BR_NOOP at beginning of buffer. [ 43.300724][ T872] rust_binder: Read failure Err(EFAULT) in pid:143 [ 45.787643][ T36] audit: type=1400 audit(1750695127.940:280): avc: denied { bind } for pid=905 comm="syz.2.242" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 46.163462][ T850] Oops: general protection fault, probably for non-canonical address 0xdffffc0000000019: 0000 [#1] PREEMPT SMP KASAN PTI [ 46.176899][ T850] KASAN: null-ptr-deref in range [0x00000000000000c8-0x00000000000000cf] [ 46.185346][ T850] CPU: 1 UID: 0 PID: 850 Comm: syz.1.220 Not tainted 6.12.30-syzkaller-g5bf4b91e3333 #0 38ee2089744292f67dc407ed27f6a777b522fef8 [ 46.198660][ T850] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 46.208739][ T850] RIP: 0010:fuse_file_release+0x29e/0x400 [ 46.214514][ T850] Code: 00 74 12 48 89 df e8 c1 14 a1 ff 48 ba 00 00 00 00 00 fc ff df 4c 89 2b 4c 8b 75 b8 49 81 c7 c8 00 00 00 4c 89 f8 48 c1 e8 03 <80> 3c 10 00 74 12 4c 89 ff e8 74 13 a1 ff 48 ba 00 00 00 00 00 fc [ 46.234143][ T850] RSP: 0018:ffffc9000e3a7ae0 EFLAGS: 00010202 [ 46.240228][ T850] RAX: 0000000000000019 RBX: 0000000000000000 RCX: ffff888120c40000 [ 46.248198][ T850] RDX: dffffc0000000000 RSI: 0000000000000a06 RDI: ffff888116a15d78 [ 46.256171][ T850] RBP: ffffc9000e3a7b28 R08: 0000000000000003 R09: 0000000000000004 [ 46.264140][ T850] R10: dffffc0000000000 R11: fffff52001c74f2c R12: 0000000000008402 [ 46.272107][ T850] R13: ffff88813340c900 R14: ffff888116a15d00 R15: 00000000000000c8 [ 46.280074][ T850] FS: 0000555567ff1500(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 46.289000][ T850] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 46.295582][ T850] CR2: 0000555567ff14a8 CR3: 0000000121236000 CR4: 00000000003526b0 [ 46.303552][ T850] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 46.311522][ T850] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 46.319490][ T850] Call Trace: [ 46.322768][ T850] [ 46.325699][ T850] fuse_release+0x13e/0x1b0 [ 46.330203][ T850] ? __cfi_fuse_release+0x10/0x10 [ 46.335228][ T850] __fput+0x1fb/0xa00 [ 46.339208][ T850] ? __cfi__raw_spin_lock_irq+0x10/0x10 [ 46.344760][ T850] ____fput+0x20/0x30 [ 46.348739][ T850] task_work_run+0x1e0/0x250 [ 46.353328][ T850] ? __cfi_task_work_run+0x10/0x10 [ 46.358434][ T850] ? __kasan_check_write+0x18/0x20 [ 46.363544][ T850] ? task_work_add+0x258/0x3f0 [ 46.368326][ T850] get_signal+0x1307/0x14f0 [ 46.372829][ T850] ? __kasan_check_write+0x18/0x20 [ 46.377940][ T850] ? _raw_spin_lock+0x8c/0x120 [ 46.382706][ T850] ? __cfi__raw_spin_lock+0x10/0x10 [ 46.387922][ T850] ? fput+0x1ac/0x240 [ 46.391902][ T850] arch_do_signal_or_restart+0x96/0x720 [ 46.397454][ T850] ? __cfi_arch_do_signal_or_restart+0x10/0x10 [ 46.403635][ T850] ? __kasan_check_read+0x15/0x20 [ 46.408661][ T850] syscall_exit_to_user_mode+0x58/0xb0 [ 46.414121][ T850] do_syscall_64+0x64/0xf0 [ 46.418547][ T850] ? clear_bhb_loop+0x50/0xa0 [ 46.423221][ T850] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 46.429114][ T850] RIP: 0033:0x7ff87e58e929 [ 46.433538][ T850] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 46.453223][ T850] RSP: 002b:00007ffd133964d8 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4 [ 46.461638][ T850] RAX: 0000000000000000 RBX: 000000000000a7e6 RCX: 00007ff87e58e929 [ 46.469606][ T850] RDX: 0000000000000000 RSI: 000000000000001e RDI: 0000000000000003 [ 46.477576][ T850] RBP: 00007ff87e7b7ba0 R08: 0000000000000001 R09: 00000009133967cf [ 46.485544][ T850] R10: 00007ff87e400000 R11: 0000000000000246 R12: 00007ff87e7b5fac [ 46.493511][ T850] R13: 00007ff87e7b5fa0 R14: ffffffffffffffff R15: 00007ffd133965f0 [ 46.500497][ T36] audit: type=1400 audit(1750695128.650:281): avc: denied { bind } for pid=911 comm="syz.3.245" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 46.501489][ T850] [ 46.523532][ T850] Modules linked in: [ 46.527690][ T850] ---[ end trace 0000000000000000 ]--- [ 46.538237][ T850] RIP: 0010:fuse_file_release+0x29e/0x400 [ 46.544113][ T850] Code: 00 74 12 48 89 df e8 c1 14 a1 ff 48 ba 00 00 00 00 00 fc ff df 4c 89 2b 4c 8b 75 b8 49 81 c7 c8 00 00 00 4c 89 f8 48 c1 e8 03 <80> 3c 10 00 74 12 4c 89 ff e8 74 13 a1 ff 48 ba 00 00 00 00 00 fc [ 46.570405][ T36] audit: type=1400 audit(1750695128.650:282): avc: denied { name_bind } for pid=911 comm="syz.3.245" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=icmp_socket permissive=1 [ 46.591033][ T36] audit: type=1400 audit(1750695128.650:283): avc: denied { node_bind } for pid=911 comm="syz.3.245" saddr=172.20.20.170 src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=icmp_socket permissive=1 [ 46.604136][ T850] RSP: 0018:ffffc9000e3a7ae0 EFLAGS: 00010202 [ 46.616004][ T36] audit: type=1400 audit(1750695128.690:284): avc: denied { read } for pid=91 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 46.624134][ T850] [ 46.644402][ T36] audit: type=1400 audit(1750695128.690:285): avc: denied { search } for pid=91 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 46.666864][ T850] RAX: 0000000000000019 RBX: 0000000000000000 RCX: ffff888120c40000 [ 46.667882][ T36] audit: type=1400 audit(1750695128.690:286): avc: denied { write } for pid=91 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 46.685636][ T850] RDX: dffffc0000000000 RSI: 0000000000000a06 RDI: ffff888116a15d78 [ 46.709037][ T36] audit: type=1400 audit(1750695128.690:287): avc: denied { add_name } for pid=91 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 46.723281][ T850] RBP: ffffc9000e3a7b28 R08: 0000000000000003 R09: 0000000000000004 [ 46.729929][ T36] audit: type=1400 audit(1750695128.690:288): avc: denied { create } for pid=91 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 46.743274][ T850] R10: dffffc0000000000 R11: fffff52001c74f2c R12: 0000000000008402 [ 46.758335][ T36] audit: type=1400 audit(1750695128.690:289): avc: denied { append open } for pid=91 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 46.789130][ T850] R13: ffff88813340c900 R14: ffff888116a15d00 R15: 00000000000000c8 [ 46.797343][ T850] FS: 0000555567ff1500(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 46.806498][ T850] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 46.813139][ T850] CR2: 00007fb595583338 CR3: 0000000121236000 CR4: 00000000003526b0 [ 46.821384][ T850] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 46.829546][ T850] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 46.837727][ T850] Kernel panic - not syncing: Fatal exception [ 46.844106][ T850] Kernel Offset: disabled [ 46.848430][ T850] Rebooting in 86400 seconds..