last executing test programs: 3.37841756s ago: executing program 0 (id=2821): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) write(r3, 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000200)='./file0\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000000380), 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x1) 3.362396951s ago: executing program 0 (id=2822): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r3, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) eventfd2(0x4, 0x1) 3.324305195s ago: executing program 0 (id=2823): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, 0x0) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r3, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) eventfd2(0x4, 0x1) 2.756618912s ago: executing program 1 (id=2838): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) unshare(0x60000600) 2.544803024s ago: executing program 1 (id=2839): rt_sigaction(0xd, &(0x7f0000000180)={0x0, 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000200)='./file0\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000000380), 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x1) 2.461298923s ago: executing program 1 (id=2840): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000200)='./file0\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000000380), 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x1) 2.435649935s ago: executing program 1 (id=2841): rt_sigaction(0xd, &(0x7f0000000180)={0x0, 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000200)='./file0\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000000380), 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x1) 2.411402177s ago: executing program 1 (id=2842): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, 0x0) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) write(r4, 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000200)='./file0\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000000380), 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x1) 2.309160948s ago: executing program 0 (id=2844): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r0, @ANYRES64], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r1, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) eventfd2(0x4, 0x1) 1.640810945s ago: executing program 2 (id=2850): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000200)='./file0\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000000380), 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x1) 1.579621591s ago: executing program 2 (id=2851): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r0, @ANYRES64], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r1, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000200)='./file0\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000000380), 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x1) 1.213108868s ago: executing program 1 (id=2852): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r2, &(0x7f0000000440)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8014) r3 = syz_usb_connect$hid(0x0, 0x90, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0x458, 0x5016, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0xc0, 0x40, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x9, 0x0, 0x1, {0x22, 0xa0}}, {{{0x9, 0x5, 0x81, 0x3, 0x40}}}}}]}}]}}, 0x0) syz_usb_control_io(r3, 0x0, 0x0) syz_usb_control_io(r3, 0x0, 0x0) 1.212653738s ago: executing program 0 (id=2854): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, 0x0) sendmmsg$inet6(r3, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) eventfd2(0x4, 0x1) 709.164269ms ago: executing program 2 (id=2861): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000200)='./file0\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000000380), 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x1) 587.742791ms ago: executing program 2 (id=2862): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r4, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r4, @ANYRES64=r3], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r5, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r6, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r7, &(0x7f0000000540)={0xa, 0x4e22, 0x7, @empty, 0x200}, 0x1c) listen(r7, 0x0) r8 = socket$netlink(0x10, 0x3, 0x4) writev(r8, &(0x7f00000000c0)=[{&(0x7f0000012380)="580000001500add427323b470c47b45602067fffffff81004e220700000000000000a8002000eaa57b00090080020efffeffe809020000ff0004f03a007357ac8ddc1fdd00000000000004ffffffe7ee0000000044c60000", 0x58}], 0x1) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r9, &(0x7f0000000440)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8014) r10 = syz_usb_connect$hid(0x0, 0x90, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000000000105804165000000000000109022400010000c04051050000010300000009210900000122a000090581034000000000"], 0x0) syz_usb_control_io(r10, 0x0, 0x0) syz_usb_control_io(r10, 0x0, 0x0) 397.4846ms ago: executing program 0 (id=2863): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, 0x0) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000200)='./file0\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000000380), 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x1) 133.634227ms ago: executing program 3 (id=2865): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8000) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000200)='./file0\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0) 118.563509ms ago: executing program 3 (id=2866): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8000) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) write(r5, 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000380), 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x1) 98.77243ms ago: executing program 3 (id=2867): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r2, &(0x7f0000003c00), 0x0, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) write(r4, 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x1) 78.069273ms ago: executing program 3 (id=2868): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r2, &(0x7f0000003c00), 0x0, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8000) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000200)='./file0\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000000380), 0x0, 0x0) 48.165575ms ago: executing program 2 (id=2869): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000200)='./file0\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000000380), 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x1) 47.541826ms ago: executing program 3 (id=2870): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000200)='./file0\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000000380), 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x1) 32.176547ms ago: executing program 2 (id=2871): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, 0x0) sendmmsg$inet6(r3, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) eventfd2(0x4, 0x1) 0s ago: executing program 3 (id=2872): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) unshare(0x60000600) kernel console output (not intermixed with test programs): syzkaller syzkaller login: [ 17.501771][ T36] kauditd_printk_skb: 31 callbacks suppressed [ 17.501788][ T36] audit: type=1400 audit(1763339337.810:59): avc: denied { transition } for pid=232 comm="sshd-session" path="/bin/sh" dev="sda1" ino=90 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 17.507514][ T36] audit: type=1400 audit(1763339337.810:60): avc: denied { noatsecure } for pid=232 comm="sshd-session" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 17.511346][ T36] audit: type=1400 audit(1763339337.820:61): avc: denied { write } for pid=232 comm="sh" path="pipe:[1882]" dev="pipefs" ino=1882 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 17.515960][ T36] audit: type=1400 audit(1763339337.820:62): avc: denied { rlimitinh } for pid=232 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 17.519598][ T36] audit: type=1400 audit(1763339337.820:63): avc: denied { siginh } for pid=232 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.1.2' (ED25519) to the list of known hosts. [ 25.497367][ T36] audit: type=1400 audit(1763339345.810:64): avc: denied { mounton } for pid=282 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 25.498755][ T282] cgroup: Unknown subsys name 'net' [ 25.520098][ T36] audit: type=1400 audit(1763339345.810:65): avc: denied { mount } for pid=282 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 25.547464][ T36] audit: type=1400 audit(1763339345.840:66): avc: denied { unmount } for pid=282 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 25.547748][ T282] cgroup: Unknown subsys name 'devices' [ 25.707796][ T282] cgroup: Unknown subsys name 'hugetlb' [ 25.713415][ T282] cgroup: Unknown subsys name 'rlimit' [ 25.869251][ T36] audit: type=1400 audit(1763339346.180:67): avc: denied { setattr } for pid=282 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 25.892576][ T36] audit: type=1400 audit(1763339346.180:68): avc: denied { mounton } for pid=282 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 25.917372][ T36] audit: type=1400 audit(1763339346.180:69): avc: denied { mount } for pid=282 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 25.930553][ T284] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 25.949236][ T36] audit: type=1400 audit(1763339346.260:70): avc: denied { relabelto } for pid=284 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 25.974698][ T36] audit: type=1400 audit(1763339346.260:71): avc: denied { write } for pid=284 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 26.010715][ T36] audit: type=1400 audit(1763339346.320:72): avc: denied { read } for pid=282 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 26.036265][ T36] audit: type=1400 audit(1763339346.320:73): avc: denied { open } for pid=282 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 26.036609][ T282] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 28.088529][ T290] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.095880][ T290] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.102939][ T290] bridge_slave_0: entered allmulticast mode [ 28.109342][ T290] bridge_slave_0: entered promiscuous mode [ 28.121902][ T290] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.128957][ T290] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.136147][ T290] bridge_slave_1: entered allmulticast mode [ 28.142346][ T290] bridge_slave_1: entered promiscuous mode [ 28.148393][ T289] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.155424][ T289] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.162544][ T289] bridge_slave_0: entered allmulticast mode [ 28.168845][ T289] bridge_slave_0: entered promiscuous mode [ 28.185057][ T289] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.192158][ T289] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.199261][ T289] bridge_slave_1: entered allmulticast mode [ 28.205611][ T289] bridge_slave_1: entered promiscuous mode [ 28.226413][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.233445][ T292] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.240735][ T292] bridge_slave_0: entered allmulticast mode [ 28.247056][ T292] bridge_slave_0: entered promiscuous mode [ 28.260713][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.267813][ T292] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.274865][ T292] bridge_slave_1: entered allmulticast mode [ 28.281348][ T292] bridge_slave_1: entered promiscuous mode [ 28.314629][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.321703][ T291] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.329007][ T291] bridge_slave_0: entered allmulticast mode [ 28.335211][ T291] bridge_slave_0: entered promiscuous mode [ 28.341637][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.348788][ T291] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.355862][ T291] bridge_slave_1: entered allmulticast mode [ 28.362057][ T291] bridge_slave_1: entered promiscuous mode [ 28.455362][ T290] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.462430][ T290] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.469724][ T290] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.476761][ T290] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.554258][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.561332][ T292] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.568618][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.575661][ T292] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.597817][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.605221][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.612908][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.620494][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.640192][ T46] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.647248][ T46] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.666718][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.673840][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.688510][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.695648][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.708026][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.715137][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.746229][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.753271][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.777961][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.785072][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.792601][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.799671][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.807512][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.814571][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.849123][ T290] veth0_vlan: entered promiscuous mode [ 28.859915][ T292] veth0_vlan: entered promiscuous mode [ 28.868448][ T290] veth1_macvtap: entered promiscuous mode [ 28.884823][ T291] veth0_vlan: entered promiscuous mode [ 28.917041][ T289] veth0_vlan: entered promiscuous mode [ 28.917836][ T290] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 28.930621][ T289] veth1_macvtap: entered promiscuous mode [ 28.946805][ T291] veth1_macvtap: entered promiscuous mode [ 28.966525][ T292] veth1_macvtap: entered promiscuous mode [ 29.283749][ T386] FAULT_INJECTION: forcing a failure. [ 29.283749][ T386] name failslab, interval 1, probability 0, space 0, times 1 [ 29.297594][ T386] CPU: 1 UID: 0 PID: 386 Comm: syz.1.24 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 29.297628][ T386] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 29.297650][ T386] Call Trace: [ 29.297657][ T386] [ 29.297665][ T386] __dump_stack+0x21/0x30 [ 29.297708][ T386] dump_stack_lvl+0x10c/0x190 [ 29.297737][ T386] ? __cfi_dump_stack_lvl+0x10/0x10 [ 29.297766][ T386] ? stack_depot_save_flags+0x38/0x800 [ 29.297791][ T386] ? stack_trace_save+0x9d/0xe0 [ 29.297824][ T386] dump_stack+0x19/0x20 [ 29.297864][ T386] should_fail_ex+0x3d9/0x530 [ 29.297886][ T386] should_failslab+0xac/0x100 [ 29.297910][ T386] kmem_cache_alloc_node_noprof+0x45/0x440 [ 29.297932][ T386] ? __alloc_skb+0x10c/0x370 [ 29.297959][ T386] __alloc_skb+0x10c/0x370 [ 29.297984][ T386] tcp_stream_alloc_skb+0x43/0x370 [ 29.298013][ T386] tcp_sendmsg_locked+0xeb5/0x4b40 [ 29.298042][ T386] ? __asan_memcpy+0x5a/0x80 [ 29.298064][ T386] ? _raw_spin_lock_bh+0x90/0x120 [ 29.298095][ T386] ? __cfi_tcp_sendmsg_locked+0x10/0x10 [ 29.298125][ T386] ? __cfi_tcp_sendmsg+0x10/0x10 [ 29.298152][ T386] tcp_sendmsg+0x3e/0xe0 [ 29.298179][ T386] ? __cfi_tcp_sendmsg+0x10/0x10 [ 29.298206][ T386] inet_sendmsg+0xb7/0x120 [ 29.298226][ T386] sock_write_iter+0x3cb/0x4f0 [ 29.298268][ T386] ? __cfi_sock_write_iter+0x10/0x10 [ 29.298293][ T386] do_iter_readv_writev+0x628/0x810 [ 29.298316][ T386] ? vfs_iter_read+0x5f0/0x5f0 [ 29.298338][ T386] ? bpf_lsm_file_permission+0xd/0x20 [ 29.298367][ T386] vfs_writev+0x485/0xcf0 [ 29.298393][ T386] ? do_writev+0x2d0/0x2d0 [ 29.298416][ T386] ? vfs_write+0x93e/0xf30 [ 29.298440][ T386] do_writev+0x14d/0x2d0 [ 29.298463][ T386] ? vfs_readv+0xa50/0xa50 [ 29.298487][ T386] ? __kasan_check_read+0x15/0x20 [ 29.298519][ T386] __x64_sys_writev+0x81/0x90 [ 29.298540][ T386] x64_sys_call+0x1fbb/0x2ee0 [ 29.298571][ T386] do_syscall_64+0x58/0xf0 [ 29.298597][ T386] ? clear_bhb_loop+0x50/0xa0 [ 29.298620][ T386] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 29.298642][ T386] RIP: 0033:0x7f9856d8f6c9 [ 29.298665][ T386] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 29.298682][ T386] RSP: 002b:00007f9857ce3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 29.298709][ T386] RAX: ffffffffffffffda RBX: 00007f9856fe5fa0 RCX: 00007f9856d8f6c9 [ 29.298725][ T386] RDX: 0000000000000006 RSI: 0000200000000b80 RDI: 0000000000000007 [ 29.298739][ T386] RBP: 00007f9857ce3090 R08: 0000000000000000 R09: 0000000000000000 [ 29.298752][ T386] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 29.298765][ T386] R13: 00007f9856fe6038 R14: 00007f9856fe5fa0 R15: 00007ffc78269438 [ 29.298783][ T386] [ 29.410019][ T393] Zero length message leads to an empty skb [ 29.737031][ T430] FAULT_INJECTION: forcing a failure. [ 29.737031][ T430] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 29.755576][ T430] CPU: 0 UID: 0 PID: 430 Comm: syz.1.45 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 29.755608][ T430] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 29.755621][ T430] Call Trace: [ 29.755628][ T430] [ 29.755636][ T430] __dump_stack+0x21/0x30 [ 29.755670][ T430] dump_stack_lvl+0x10c/0x190 [ 29.755696][ T430] ? __cfi_dump_stack_lvl+0x10/0x10 [ 29.755725][ T430] ? check_stack_object+0x12c/0x140 [ 29.755747][ T430] dump_stack+0x19/0x20 [ 29.755773][ T430] should_fail_ex+0x3d9/0x530 [ 29.755795][ T430] should_fail+0xf/0x20 [ 29.755814][ T430] should_fail_usercopy+0x1e/0x30 [ 29.755837][ T430] _copy_to_user+0x24/0xa0 [ 29.755863][ T430] simple_read_from_buffer+0xed/0x160 [ 29.755890][ T430] proc_fail_nth_read+0x19e/0x210 [ 29.755918][ T430] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 29.755946][ T430] ? bpf_lsm_file_permission+0xd/0x20 [ 29.755975][ T430] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 29.756002][ T430] vfs_read+0x27d/0xc70 [ 29.756019][ T430] ? __cfi_selinux_file_ioctl+0x10/0x10 [ 29.756045][ T430] ? __cfi_vfs_read+0x10/0x10 [ 29.756063][ T430] ? __kasan_check_write+0x18/0x20 [ 29.756094][ T430] ? mutex_lock+0x92/0x1c0 [ 29.756113][ T430] ? __cfi_mutex_lock+0x10/0x10 [ 29.756132][ T430] ? __fget_files+0x2c5/0x340 [ 29.756156][ T430] ksys_read+0x141/0x250 [ 29.756175][ T430] ? __cfi_ksys_read+0x10/0x10 [ 29.756194][ T430] ? __kasan_check_read+0x15/0x20 [ 29.756235][ T430] __x64_sys_read+0x7f/0x90 [ 29.756254][ T430] x64_sys_call+0x2638/0x2ee0 [ 29.756285][ T430] do_syscall_64+0x58/0xf0 [ 29.756312][ T430] ? clear_bhb_loop+0x50/0xa0 [ 29.756335][ T430] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 29.756357][ T430] RIP: 0033:0x7f9856d8e0dc [ 29.756374][ T430] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 29.756392][ T430] RSP: 002b:00007f9857ce3030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 29.756414][ T430] RAX: ffffffffffffffda RBX: 00007f9856fe5fa0 RCX: 00007f9856d8e0dc [ 29.756430][ T430] RDX: 000000000000000f RSI: 00007f9857ce30a0 RDI: 0000000000000008 [ 29.756444][ T430] RBP: 00007f9857ce3090 R08: 0000000000000000 R09: 0000000000000000 [ 29.756458][ T430] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 29.756470][ T430] R13: 00007f9856fe6038 R14: 00007f9856fe5fa0 R15: 00007ffc78269438 [ 29.756489][ T430] [ 30.568214][ T36] kauditd_printk_skb: 31 callbacks suppressed [ 30.568231][ T36] audit: type=1400 audit(1763339350.880:105): avc: denied { read write } for pid=479 comm="syz.2.68" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 30.618201][ T36] audit: type=1400 audit(1763339350.910:106): avc: denied { open } for pid=479 comm="syz.2.68" path="/dev/raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 30.652098][ T36] audit: type=1400 audit(1763339350.910:107): avc: denied { ioctl } for pid=479 comm="syz.2.68" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 30.774830][ T36] audit: type=1400 audit(1763339351.080:108): avc: denied { create } for pid=484 comm="syz.0.70" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 30.821332][ T36] audit: type=1400 audit(1763339351.080:109): avc: denied { write } for pid=484 comm="syz.0.70" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 30.865739][ T45] usb 3-1: new high-speed USB device number 2 using dummy_hcd [ 31.036150][ T45] usb 3-1: config 0 interface 0 altsetting 0 has an invalid descriptor for endpoint zero, skipping [ 31.068589][ T45] usb 3-1: New USB device found, idVendor=256c, idProduct=006d, bcdDevice= 0.00 [ 31.095582][ T45] usb 3-1: New USB device strings: Mfr=2, Product=0, SerialNumber=0 [ 31.117640][ T495] FAULT_INJECTION: forcing a failure. [ 31.117640][ T495] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 31.121253][ T45] usb 3-1: Manufacturer: syz [ 31.136216][ T36] audit: type=1400 audit(1763339351.430:110): avc: denied { create } for pid=494 comm="syz.3.73" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 31.141029][ T495] CPU: 0 UID: 0 PID: 495 Comm: syz.3.73 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 31.141064][ T495] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 31.141078][ T495] Call Trace: [ 31.141086][ T495] [ 31.141095][ T495] __dump_stack+0x21/0x30 [ 31.141133][ T495] dump_stack_lvl+0x10c/0x190 [ 31.141166][ T495] ? __cfi_dump_stack_lvl+0x10/0x10 [ 31.141200][ T495] ? kstrtoull+0x13b/0x1e0 [ 31.141223][ T495] dump_stack+0x19/0x20 [ 31.141253][ T495] should_fail_ex+0x3d9/0x530 [ 31.141279][ T495] should_fail+0xf/0x20 [ 31.141302][ T495] should_fail_usercopy+0x1e/0x30 [ 31.141328][ T495] _copy_from_user+0x22/0xb0 [ 31.141365][ T495] ___sys_sendmsg+0x159/0x2a0 [ 31.141401][ T495] ? __sys_sendmsg+0x280/0x280 [ 31.141438][ T495] ? proc_fail_nth_write+0x17e/0x210 [ 31.141470][ T495] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 31.141521][ T495] __x64_sys_sendmsg+0x1eb/0x2c0 [ 31.141555][ T495] ? fput+0x1a5/0x240 [ 31.141583][ T495] ? __cfi___x64_sys_sendmsg+0x10/0x10 [ 31.141616][ T495] ? ksys_write+0x1ef/0x250 [ 31.141639][ T495] ? __kasan_check_read+0x15/0x20 [ 31.141674][ T495] x64_sys_call+0x2a4c/0x2ee0 [ 31.141715][ T495] do_syscall_64+0x58/0xf0 [ 31.141745][ T495] ? clear_bhb_loop+0x50/0xa0 [ 31.141771][ T495] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 31.141795][ T495] RIP: 0033:0x7f2c0dd8f6c9 [ 31.141819][ T495] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 31.141837][ T495] RSP: 002b:00007f2c0ecf3038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 31.141861][ T495] RAX: ffffffffffffffda RBX: 00007f2c0dfe5fa0 RCX: 00007f2c0dd8f6c9 [ 31.141879][ T495] RDX: 0000000000000040 RSI: 0000200000000340 RDI: 000000000000000a [ 31.141894][ T495] RBP: 00007f2c0ecf3090 R08: 0000000000000000 R09: 0000000000000000 [ 31.141911][ T495] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 31.141925][ T495] R13: 00007f2c0dfe6038 R14: 00007f2c0dfe5fa0 R15: 00007fff135764d8 [ 31.141945][ T495] [ 31.366696][ T36] audit: type=1400 audit(1763339351.650:111): avc: denied { write } for pid=498 comm="syz.3.75" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 31.387409][ T45] usb 3-1: config 0 descriptor?? [ 31.397570][ T45] usbhid 3-1:0.0: couldn't find an input interrupt endpoint [ 31.558737][ T36] audit: type=1400 audit(1763339351.870:112): avc: denied { read } for pid=521 comm="syz.0.85" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 31.606940][ T45] usb 3-1: USB disconnect, device number 2 [ 31.720572][ T536] No source specified [ 31.855891][ T549] fuseblk: Bad value for 'fd' [ 31.936349][ T559] FAULT_INJECTION: forcing a failure. [ 31.936349][ T559] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 31.965546][ T559] CPU: 1 UID: 0 PID: 559 Comm: syz.3.102 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 31.965577][ T559] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 31.965590][ T559] Call Trace: [ 31.965597][ T559] [ 31.965605][ T559] __dump_stack+0x21/0x30 [ 31.965637][ T559] dump_stack_lvl+0x10c/0x190 [ 31.965664][ T559] ? __cfi_dump_stack_lvl+0x10/0x10 [ 31.965692][ T559] ? check_stack_object+0x12c/0x140 [ 31.965712][ T559] dump_stack+0x19/0x20 [ 31.965738][ T559] should_fail_ex+0x3d9/0x530 [ 31.965759][ T559] should_fail+0xf/0x20 [ 31.965777][ T559] should_fail_usercopy+0x1e/0x30 [ 31.965799][ T559] _copy_to_user+0x24/0xa0 [ 31.965824][ T559] simple_read_from_buffer+0xed/0x160 [ 31.965850][ T559] proc_fail_nth_read+0x19e/0x210 [ 31.965877][ T559] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 31.965905][ T559] ? bpf_lsm_file_permission+0xd/0x20 [ 31.965932][ T559] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 31.965960][ T559] vfs_read+0x27d/0xc70 [ 31.965978][ T559] ? __cfi_vfs_read+0x10/0x10 [ 31.965994][ T559] ? __kasan_check_write+0x18/0x20 [ 31.966024][ T559] ? mutex_lock+0x92/0x1c0 [ 31.966043][ T559] ? __cfi_mutex_lock+0x10/0x10 [ 31.966061][ T559] ? __fget_files+0x2c5/0x340 [ 31.966084][ T559] ksys_read+0x141/0x250 [ 31.966101][ T559] ? __cfi_ksys_read+0x10/0x10 [ 31.966120][ T559] ? __kasan_check_read+0x15/0x20 [ 31.966150][ T559] __x64_sys_read+0x7f/0x90 [ 31.966168][ T559] x64_sys_call+0x2638/0x2ee0 [ 31.966198][ T559] do_syscall_64+0x58/0xf0 [ 31.966223][ T559] ? clear_bhb_loop+0x50/0xa0 [ 31.966245][ T559] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 31.966272][ T559] RIP: 0033:0x7f2c0dd8e0dc [ 31.966289][ T559] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 31.966306][ T559] RSP: 002b:00007f2c0ecf3030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 31.966327][ T559] RAX: ffffffffffffffda RBX: 00007f2c0dfe5fa0 RCX: 00007f2c0dd8e0dc [ 31.966343][ T559] RDX: 000000000000000f RSI: 00007f2c0ecf30a0 RDI: 0000000000000008 [ 31.966356][ T559] RBP: 00007f2c0ecf3090 R08: 0000000000000000 R09: 0000000000000000 [ 31.966368][ T559] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000000000001 [ 31.966380][ T559] R13: 00007f2c0dfe6038 R14: 00007f2c0dfe5fa0 R15: 00007fff135764d8 [ 31.966398][ T559] [ 32.301611][ T578] FAULT_INJECTION: forcing a failure. [ 32.301611][ T578] name failslab, interval 1, probability 0, space 0, times 0 [ 32.314354][ T578] CPU: 0 UID: 0 PID: 578 Comm: syz.1.111 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 32.314385][ T578] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 32.314398][ T578] Call Trace: [ 32.314405][ T578] [ 32.314414][ T578] __dump_stack+0x21/0x30 [ 32.314447][ T578] dump_stack_lvl+0x10c/0x190 [ 32.314476][ T578] ? __cfi_dump_stack_lvl+0x10/0x10 [ 32.314504][ T578] ? __kasan_check_write+0x18/0x20 [ 32.314537][ T578] ? proc_fail_nth_write+0x17e/0x210 [ 32.314565][ T578] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 32.314593][ T578] dump_stack+0x19/0x20 [ 32.314620][ T578] should_fail_ex+0x3d9/0x530 [ 32.314642][ T578] should_failslab+0xac/0x100 [ 32.314666][ T578] kmem_cache_alloc_noprof+0x42/0x430 [ 32.314686][ T578] ? getname_flags+0xc6/0x710 [ 32.314708][ T578] getname_flags+0xc6/0x710 [ 32.314728][ T578] ? build_open_flags+0x487/0x600 [ 32.314756][ T578] getname+0x1b/0x30 [ 32.314775][ T578] do_sys_openat2+0xcb/0x1c0 [ 32.314802][ T578] ? fput+0x1a5/0x240 [ 32.314826][ T578] ? do_sys_open+0x100/0x100 [ 32.314851][ T578] ? ksys_write+0x1ef/0x250 [ 32.314870][ T578] ? __cfi_ksys_write+0x10/0x10 [ 32.314891][ T578] __x64_sys_openat+0x13a/0x170 [ 32.314919][ T578] x64_sys_call+0xe69/0x2ee0 [ 32.314949][ T578] do_syscall_64+0x58/0xf0 [ 32.314976][ T578] ? clear_bhb_loop+0x50/0xa0 [ 32.315014][ T578] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 32.315036][ T578] RIP: 0033:0x7f9856d8df10 [ 32.315053][ T578] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 69 95 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 bc 95 02 00 8b 44 [ 32.315071][ T578] RSP: 002b:00007f9857ce2f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 32.315093][ T578] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f9856d8df10 [ 32.315109][ T578] RDX: 0000000000000002 RSI: 00007f9857ce2fa0 RDI: 00000000ffffff9c [ 32.315123][ T578] RBP: 00007f9857ce2fa0 R08: 0000000000000000 R09: 0000000000000000 [ 32.315136][ T578] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 32.315149][ T578] R13: 00007f9856fe6038 R14: 00007f9856fe5fa0 R15: 00007ffc78269438 [ 32.315167][ T578] [ 33.048889][ T629] fuseblk: Bad value for 'fd' [ 33.236414][ T643] fuseblk: Bad value for 'fd' [ 33.283217][ T646] fuseblk: Bad value for 'fd' [ 33.385715][ T656] No source specified [ 33.442944][ T667] capability: warning: `syz.0.153' uses deprecated v2 capabilities in a way that may be insecure [ 33.615559][ T10] usb 4-1: new high-speed USB device number 2 using dummy_hcd [ 33.635567][ T36] audit: type=1400 audit(1763339353.940:113): avc: denied { create } for pid=681 comm="syz.2.161" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 33.675566][ T36] audit: type=1400 audit(1763339353.940:114): avc: denied { setopt } for pid=681 comm="syz.2.161" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 33.786618][ T10] usb 4-1: New USB device found, idVendor=9710, idProduct=7730, bcdDevice=96.33 [ 33.799210][ T10] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 33.816759][ T10] usb 4-1: config 0 descriptor?? [ 34.033563][ T10] usb 4-1: Cannot read MAC address [ 34.038876][ T10] MOSCHIP usb-ethernet driver 4-1:0.0: probe with driver MOSCHIP usb-ethernet driver failed with error -71 [ 34.064235][ T10] usb 4-1: USB disconnect, device number 2 [ 34.333493][ T691] FAULT_INJECTION: forcing a failure. [ 34.333493][ T691] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 34.355236][ T691] CPU: 0 UID: 0 PID: 691 Comm: syz.0.165 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 34.355268][ T691] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 34.355281][ T691] Call Trace: [ 34.355288][ T691] [ 34.355297][ T691] __dump_stack+0x21/0x30 [ 34.355331][ T691] dump_stack_lvl+0x10c/0x190 [ 34.355360][ T691] ? __cfi_dump_stack_lvl+0x10/0x10 [ 34.355389][ T691] ? check_stack_object+0x12c/0x140 [ 34.355410][ T691] dump_stack+0x19/0x20 [ 34.355438][ T691] should_fail_ex+0x3d9/0x530 [ 34.355460][ T691] should_fail+0xf/0x20 [ 34.355480][ T691] should_fail_usercopy+0x1e/0x30 [ 34.355504][ T691] _copy_to_user+0x24/0xa0 [ 34.355535][ T691] simple_read_from_buffer+0xed/0x160 [ 34.355563][ T691] proc_fail_nth_read+0x19e/0x210 [ 34.355592][ T691] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 34.355621][ T691] ? bpf_lsm_file_permission+0xd/0x20 [ 34.355651][ T691] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 34.355680][ T691] vfs_read+0x27d/0xc70 [ 34.355700][ T691] ? __cfi_vfs_read+0x10/0x10 [ 34.355718][ T691] ? __kasan_check_write+0x18/0x20 [ 34.355750][ T691] ? mutex_lock+0x92/0x1c0 [ 34.355770][ T691] ? __cfi_mutex_lock+0x10/0x10 [ 34.355789][ T691] ? __fget_files+0x2c5/0x340 [ 34.355814][ T691] ksys_read+0x141/0x250 [ 34.355834][ T691] ? __cfi_ksys_read+0x10/0x10 [ 34.355852][ T691] ? fd_install+0x175/0x2e0 [ 34.355874][ T691] ? __kasan_check_read+0x15/0x20 [ 34.355906][ T691] __x64_sys_read+0x7f/0x90 [ 34.355926][ T691] x64_sys_call+0x2638/0x2ee0 [ 34.355958][ T691] do_syscall_64+0x58/0xf0 [ 34.355985][ T691] ? clear_bhb_loop+0x50/0xa0 [ 34.356009][ T691] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 34.356038][ T691] RIP: 0033:0x7fac0178e0dc [ 34.356056][ T691] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 34.356073][ T691] RSP: 002b:00007fac025ef030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 34.356097][ T691] RAX: ffffffffffffffda RBX: 00007fac019e5fa0 RCX: 00007fac0178e0dc [ 34.356113][ T691] RDX: 000000000000000f RSI: 00007fac025ef0a0 RDI: 0000000000000009 [ 34.356127][ T691] RBP: 00007fac025ef090 R08: 0000000000000000 R09: 0000000000000000 [ 34.356140][ T691] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000000000001 [ 34.356154][ T691] R13: 00007fac019e6038 R14: 00007fac019e5fa0 R15: 00007ffcb50bf398 [ 34.356172][ T691] [ 34.614020][ T701] fuseblk: Bad value for 'fd' [ 34.647085][ T705] FAULT_INJECTION: forcing a failure. [ 34.647085][ T705] name failslab, interval 1, probability 0, space 0, times 0 [ 34.660245][ T705] CPU: 0 UID: 0 PID: 705 Comm: syz.1.173 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 34.660276][ T705] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 34.660289][ T705] Call Trace: [ 34.660296][ T705] [ 34.660304][ T705] __dump_stack+0x21/0x30 [ 34.660338][ T705] dump_stack_lvl+0x10c/0x190 [ 34.660366][ T705] ? __cfi_dump_stack_lvl+0x10/0x10 [ 34.660413][ T705] ? __kasan_check_write+0x18/0x20 [ 34.660446][ T705] ? proc_fail_nth_write+0x17e/0x210 [ 34.660475][ T705] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 34.660505][ T705] dump_stack+0x19/0x20 [ 34.660532][ T705] should_fail_ex+0x3d9/0x530 [ 34.660555][ T705] should_failslab+0xac/0x100 [ 34.660580][ T705] kmem_cache_alloc_noprof+0x42/0x430 [ 34.660600][ T705] ? getname_flags+0xc6/0x710 [ 34.660623][ T705] getname_flags+0xc6/0x710 [ 34.660643][ T705] ? build_open_flags+0x487/0x600 [ 34.660673][ T705] getname+0x1b/0x30 [ 34.660692][ T705] do_sys_openat2+0xcb/0x1c0 [ 34.660720][ T705] ? fput+0x1a5/0x240 [ 34.660746][ T705] ? do_sys_open+0x100/0x100 [ 34.660783][ T705] ? ksys_write+0x1ef/0x250 [ 34.660803][ T705] ? __cfi_ksys_write+0x10/0x10 [ 34.660825][ T705] __x64_sys_openat+0x13a/0x170 [ 34.660854][ T705] x64_sys_call+0xe69/0x2ee0 [ 34.660897][ T705] do_syscall_64+0x58/0xf0 [ 34.660923][ T705] ? clear_bhb_loop+0x50/0xa0 [ 34.660947][ T705] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 34.660969][ T705] RIP: 0033:0x7f9856d8f6c9 [ 34.660986][ T705] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 34.661004][ T705] RSP: 002b:00007f9857ce3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 34.661028][ T705] RAX: ffffffffffffffda RBX: 00007f9856fe5fa0 RCX: 00007f9856d8f6c9 [ 34.661044][ T705] RDX: 000000000000275a RSI: 0000200000000080 RDI: ffffffffffffff9c [ 34.661059][ T705] RBP: 00007f9857ce3090 R08: 0000000000000000 R09: 0000000000000000 [ 34.661073][ T705] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 34.661086][ T705] R13: 00007f9856fe6038 R14: 00007f9856fe5fa0 R15: 00007ffc78269438 [ 34.661105][ T705] [ 35.060539][ T723] FAULT_INJECTION: forcing a failure. [ 35.060539][ T723] name failslab, interval 1, probability 0, space 0, times 0 [ 35.100814][ T723] CPU: 1 UID: 0 PID: 723 Comm: syz.3.181 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 35.100848][ T723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 35.100862][ T723] Call Trace: [ 35.100869][ T723] [ 35.100878][ T723] __dump_stack+0x21/0x30 [ 35.100912][ T723] dump_stack_lvl+0x10c/0x190 [ 35.100941][ T723] ? __cfi_dump_stack_lvl+0x10/0x10 [ 35.100978][ T723] ? __kasan_check_write+0x18/0x20 [ 35.101011][ T723] ? proc_fail_nth_write+0x17e/0x210 [ 35.101040][ T723] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 35.101074][ T723] dump_stack+0x19/0x20 [ 35.101102][ T723] should_fail_ex+0x3d9/0x530 [ 35.101125][ T723] should_failslab+0xac/0x100 [ 35.101149][ T723] kmem_cache_alloc_noprof+0x42/0x430 [ 35.101170][ T723] ? getname_flags+0xc6/0x710 [ 35.101192][ T723] getname_flags+0xc6/0x710 [ 35.101212][ T723] ? build_open_flags+0x487/0x600 [ 35.101241][ T723] getname+0x1b/0x30 [ 35.101260][ T723] do_sys_openat2+0xcb/0x1c0 [ 35.101305][ T723] ? fput+0x1a5/0x240 [ 35.101331][ T723] ? do_sys_open+0x100/0x100 [ 35.101359][ T723] ? ksys_write+0x1ef/0x250 [ 35.101379][ T723] ? __cfi_ksys_write+0x10/0x10 [ 35.101401][ T723] __x64_sys_openat+0x13a/0x170 [ 35.101432][ T723] x64_sys_call+0xe69/0x2ee0 [ 35.101464][ T723] do_syscall_64+0x58/0xf0 [ 35.101493][ T723] ? clear_bhb_loop+0x50/0xa0 [ 35.101518][ T723] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 35.101541][ T723] RIP: 0033:0x7f2c0dd8f6c9 [ 35.101569][ T723] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 35.101587][ T723] RSP: 002b:00007f2c0ecf3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 35.101612][ T723] RAX: ffffffffffffffda RBX: 00007f2c0dfe5fa0 RCX: 00007f2c0dd8f6c9 [ 35.101628][ T723] RDX: 000000000000275a RSI: 0000000000000000 RDI: ffffffffffffff9c [ 35.101644][ T723] RBP: 00007f2c0ecf3090 R08: 0000000000000000 R09: 0000000000000000 [ 35.101658][ T723] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 35.101672][ T723] R13: 00007f2c0dfe6038 R14: 00007f2c0dfe5fa0 R15: 00007fff135764d8 [ 35.101691][ T723] [ 35.377127][ T732] FAULT_INJECTION: forcing a failure. [ 35.377127][ T732] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 35.406003][ T732] CPU: 0 UID: 0 PID: 732 Comm: syz.3.186 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 35.406035][ T732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 35.406047][ T732] Call Trace: [ 35.406054][ T732] [ 35.406062][ T732] __dump_stack+0x21/0x30 [ 35.406095][ T732] dump_stack_lvl+0x10c/0x190 [ 35.406122][ T732] ? __cfi_dump_stack_lvl+0x10/0x10 [ 35.406149][ T732] ? selinux_file_open+0x457/0x610 [ 35.406176][ T732] dump_stack+0x19/0x20 [ 35.406201][ T732] should_fail_ex+0x3d9/0x530 [ 35.406222][ T732] should_fail_alloc_page+0xeb/0x110 [ 35.406246][ T732] __alloc_pages_noprof+0x19b/0x7b0 [ 35.406274][ T732] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 35.406302][ T732] ? is_bpf_text_address+0x17b/0x1a0 [ 35.406326][ T732] ? __kernel_text_address+0x11/0x40 [ 35.406352][ T732] ? unwind_get_return_address+0x51/0x90 [ 35.406375][ T732] ? __cfi_stack_trace_consume_entry+0x10/0x10 [ 35.406406][ T732] ? arch_stack_walk+0x10b/0x170 [ 35.406424][ T732] __folio_alloc_noprof+0x14/0x80 [ 35.406451][ T732] folio_prealloc+0x46/0x240 [ 35.406475][ T732] do_pte_missing+0x164c/0x4240 [ 35.406500][ T732] ? _parse_integer+0x2e/0x40 [ 35.406531][ T732] ? pte_marker_clear+0x1b0/0x1b0 [ 35.406556][ T732] ? kstrtouint_from_user+0xfb/0x150 [ 35.406574][ T732] ? __x64_sys_openat+0x13a/0x170 [ 35.406600][ T732] ? x64_sys_call+0xe69/0x2ee0 [ 35.406630][ T732] ? selinux_file_permission+0x309/0xb30 [ 35.406654][ T732] ? __pte_offset_map+0x1b0/0x230 [ 35.406696][ T732] ? pte_offset_map_rw_nolock+0xba/0x110 [ 35.406726][ T732] handle_mm_fault+0x1166/0x1b90 [ 35.406752][ T732] ? __cfi_handle_mm_fault+0x10/0x10 [ 35.406773][ T732] ? lock_vma_under_rcu+0x49d/0x540 [ 35.406798][ T732] ? __kasan_check_write+0x18/0x20 [ 35.406831][ T732] do_user_addr_fault+0x96c/0x1200 [ 35.406859][ T732] ? __cfi_ksys_write+0x10/0x10 [ 35.406880][ T732] exc_page_fault+0x59/0xc0 [ 35.406901][ T732] asm_exc_page_fault+0x2b/0x30 [ 35.406921][ T732] RIP: 0033:0x7f2c0dc60576 [ 35.406938][ T732] Code: 00 00 00 00 41 57 31 c0 41 56 49 89 d6 41 55 49 89 f5 48 89 d6 41 54 49 89 fc 48 8d 3d 0c 2f 1b 00 55 53 48 81 ec 88 20 00 00 <48> 89 0c 24 4c 89 44 24 08 e8 ec d9 fe ff 4d 85 f6 0f 84 46 0a 00 [ 35.406954][ T732] RSP: 002b:00007f2c0ecf0f70 EFLAGS: 00010202 [ 35.406972][ T732] RAX: 0000000000000000 RBX: 00007f2c0dfe5fa0 RCX: 0000000000000000 [ 35.406986][ T732] RDX: 0000200000000080 RSI: 0000200000000080 RDI: 00007f2c0de13479 [ 35.407000][ T732] RBP: 00007f2c0ecf3090 R08: 00007f2c0dc4e2f0 R09: 0000000000000000 [ 35.407014][ T732] R10: 0000000000000000 R11: 0000200000000080 R12: 0000000000000000 [ 35.407026][ T732] R13: 0000000000000036 R14: 0000200000000080 R15: 00007fff135764d8 [ 35.407043][ T732] [ 35.407054][ T732] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 35.685124][ T734] netlink: 12 bytes leftover after parsing attributes in process `syz.1.184'. [ 35.696189][ T36] kauditd_printk_skb: 3 callbacks suppressed [ 35.696204][ T36] audit: type=1400 audit(1763339355.990:118): avc: denied { create } for pid=729 comm="syz.1.184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 35.722675][ T36] audit: type=1400 audit(1763339355.990:119): avc: denied { setopt } for pid=729 comm="syz.1.184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 35.724323][ T735] fuseblk: Bad value for 'fd' [ 35.784580][ T739] fuseblk: Bad value for 'fd' [ 35.925622][ T9] usb 4-1: new high-speed USB device number 3 using dummy_hcd [ 36.096631][ T9] usb 4-1: config 0 interface 0 altsetting 0 has an invalid descriptor for endpoint zero, skipping [ 36.108239][ T9] usb 4-1: New USB device found, idVendor=256c, idProduct=006d, bcdDevice= 0.00 [ 36.117645][ T9] usb 4-1: New USB device strings: Mfr=2, Product=0, SerialNumber=0 [ 36.139609][ T9] usb 4-1: Manufacturer: syz [ 36.154104][ T9] usb 4-1: config 0 descriptor?? [ 36.164532][ T9] usbhid 4-1:0.0: couldn't find an input interrupt endpoint [ 36.365688][ T9] usb 4-1: USB disconnect, device number 3 [ 36.564995][ T796] fuseblk: Bad value for 'fd' [ 36.610383][ T36] audit: type=1400 audit(1763339356.920:120): avc: denied { create } for pid=797 comm="syz.0.217" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 36.655548][ T36] audit: type=1400 audit(1763339356.940:121): avc: denied { ioctl } for pid=797 comm="syz.0.217" path="socket:[5766]" dev="sockfs" ino=5766 ioctlcmd=0x8955 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 36.895543][ T36] audit: type=1400 audit(1763339357.200:122): avc: denied { write } for pid=829 comm="syz.2.227" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 37.055454][ T36] audit: type=1400 audit(1763339357.360:123): avc: denied { write } for pid=850 comm="syz.2.239" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 37.097170][ T36] audit: type=1400 audit(1763339357.360:124): avc: denied { open } for pid=850 comm="syz.2.239" path="/dev/kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 37.361912][ T895] FAULT_INJECTION: forcing a failure. [ 37.361912][ T895] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 37.381155][ T895] CPU: 1 UID: 0 PID: 895 Comm: syz.2.261 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 37.381188][ T895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 37.381213][ T895] Call Trace: [ 37.381220][ T895] [ 37.381228][ T895] __dump_stack+0x21/0x30 [ 37.381262][ T895] dump_stack_lvl+0x10c/0x190 [ 37.381291][ T895] ? __cfi_dump_stack_lvl+0x10/0x10 [ 37.381321][ T895] ? kstrtoull+0x13b/0x1e0 [ 37.381341][ T895] dump_stack+0x19/0x20 [ 37.381369][ T895] should_fail_ex+0x3d9/0x530 [ 37.381392][ T895] should_fail+0xf/0x20 [ 37.381412][ T895] should_fail_usercopy+0x1e/0x30 [ 37.381435][ T895] _copy_from_user+0x22/0xb0 [ 37.381462][ T895] ___sys_sendmsg+0x159/0x2a0 [ 37.381494][ T895] ? __sys_sendmsg+0x280/0x280 [ 37.381534][ T895] ? proc_fail_nth_write+0x17e/0x210 [ 37.381564][ T895] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 37.381600][ T895] __x64_sys_sendmsg+0x1eb/0x2c0 [ 37.381632][ T895] ? fput+0x1a5/0x240 [ 37.381657][ T895] ? __cfi___x64_sys_sendmsg+0x10/0x10 [ 37.381689][ T895] ? ksys_write+0x1ef/0x250 [ 37.381710][ T895] ? __kasan_check_read+0x15/0x20 [ 37.381744][ T895] x64_sys_call+0x2a4c/0x2ee0 [ 37.381776][ T895] do_syscall_64+0x58/0xf0 [ 37.381804][ T895] ? clear_bhb_loop+0x50/0xa0 [ 37.381829][ T895] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 37.381852][ T895] RIP: 0033:0x7fb4e1f8f6c9 [ 37.381869][ T895] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 37.381887][ T895] RSP: 002b:00007fb4e09e3038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 37.381910][ T895] RAX: ffffffffffffffda RBX: 00007fb4e21e5fa0 RCX: 00007fb4e1f8f6c9 [ 37.381926][ T895] RDX: 0000000000000040 RSI: 0000200000000340 RDI: 0000000000000007 [ 37.381941][ T895] RBP: 00007fb4e09e3090 R08: 0000000000000000 R09: 0000000000000000 [ 37.381955][ T895] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 37.381967][ T895] R13: 00007fb4e21e6038 R14: 00007fb4e21e5fa0 R15: 00007ffdd3eee918 [ 37.381986][ T895] [ 38.509549][ T36] audit: type=1400 audit(1763339358.820:125): avc: denied { create } for pid=923 comm="syz.3.275" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 38.573550][ T36] audit: type=1400 audit(1763339358.820:126): avc: denied { ioctl } for pid=923 comm="syz.3.275" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=7199 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 38.886318][ T950] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 [ 38.894253][ T950] kvm_intel: L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 39.133043][ T965] fuseblk: Bad value for 'fd' [ 39.485871][ T990] fuseblk: Bad value for 'fd' [ 40.116914][ T1005] No source specified [ 40.587294][ T1025] No source specified [ 40.639907][ T1031] fuseblk: Unknown parameter '0x0000000000000009' [ 40.657148][ T10] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 40.815575][ T10] usb 1-1: device descriptor read/64, error -71 [ 40.822289][ T1055] fuseblk: Unknown parameter '0x0000000000000009' [ 40.955150][ T1081] fuseblk: Unknown parameter '0x0000000000000009' [ 41.065549][ T10] usb 1-1: device descriptor read/64, error -71 [ 41.214965][ T1114] fuseblk: Unknown parameter 'fd0x000000000000000a' [ 41.300238][ T36] kauditd_printk_skb: 3 callbacks suppressed [ 41.300255][ T36] audit: type=1400 audit(1763339361.610:129): avc: denied { map } for pid=1119 comm="syz.1.369" path="socket:[7627]" dev="sockfs" ino=7627 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 41.315577][ T10] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 41.495560][ T10] usb 1-1: device descriptor read/64, error -71 [ 41.775555][ T10] usb 1-1: device descriptor read/64, error -71 [ 41.886002][ T10] usb usb1-port1: attempt power cycle [ 42.184199][ T1167] fuseblk: Bad value for 'fd' [ 42.255615][ T10] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 42.293067][ T1179] fuseblk: Unknown parameter 'fd0x0000000000000009' [ 42.306596][ T10] usb 1-1: device descriptor read/8, error -71 [ 42.418838][ T1189] fuseblk: Bad value for 'fd' [ 42.451452][ T10] usb 1-1: device descriptor read/8, error -71 [ 42.696593][ T10] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 42.736749][ T10] usb 1-1: device descriptor read/8, error -71 [ 42.866555][ T10] usb 1-1: device descriptor read/8, error -71 [ 42.985677][ T10] usb usb1-port1: unable to enumerate USB device [ 43.270759][ T1234] fuseblk: Bad value for 'fd' [ 43.288765][ T1236] fuseblk: Unknown parameter 'r' [ 43.779676][ T1275] 9pnet_fd: Insufficient options for proto=fd [ 44.275066][ T1295] No source specified [ 45.997519][ T1400] No source specified [ 46.240184][ T1413] fuseblk: Unknown parameter '0x000000000000000a' [ 46.530989][ T1430] No source specified [ 46.891146][ T1449] fuseblk: Unknown parameter '0x000000000000000a' [ 47.312134][ T1457] fuseblk: Bad value for 'fd' [ 47.398278][ T1467] fuseblk: Unknown parameter '0x000000000000000a' [ 47.499620][ T1477] fuseblk: Bad value for 'fd' [ 47.620753][ T1496] fuseblk: Bad value for 'fd' [ 48.616214][ T1543] fuseblk: Bad value for 'fd' [ 48.675395][ T1546] No source specified [ 48.778326][ T1556] No source specified [ 48.820762][ T1558] No source specified [ 48.876706][ T1564] No source specified [ 49.560977][ T1603] fuseblk: Bad value for 'fd' [ 49.697216][ T1619] No source specified [ 50.057153][ T1689] fuseblk: Unknown parameter 'r' [ 50.185054][ T1708] No source specified [ 50.256937][ T1718] fuseblk: Unknown parameter 'r' [ 50.378784][ T1730] No source specified [ 50.492458][ T1740] fuseblk: Bad value for 'fd' [ 50.825822][ T1760] fuseblk: Bad value for 'fd' [ 50.877604][ T1762] fuseblk: Bad value for 'fd' [ 51.120271][ T1766] fuseblk: Unknown parameter 'fd0x0000000000000008' [ 51.756417][ T1825] fuseblk: Bad value for 'fd' [ 51.949177][ T1854] No source specified [ 52.146225][ T1880] fuseblk: Bad value for 'fd' [ 52.795213][ T1899] fuseblk: Bad value for 'fd' [ 53.193755][ T1930] fuseblk: Bad value for 'fd' [ 53.237412][ T1934] fuseblk: Bad value for 'fd' [ 58.387639][ T2163] No source specified [ 59.858093][ T2194] fuseblk: Bad value for 'fd' [ 60.239191][ T2212] No source specified [ 60.282880][ T2214] fuseblk: Bad value for 'fd' [ 60.805354][ T2218] fuseblk: Unknown parameter 'fd0x0000000000000009' [ 61.102113][ T2240] fuseblk: Unknown parameter 'fd0x0000000000000009' [ 61.176919][ T2242] No source specified [ 61.302127][ T2252] fuseblk: Bad value for 'fd' [ 61.406631][ T2262] fuseblk: Unknown parameter 'r' [ 61.421427][ T2264] fuseblk: Bad value for 'fd' [ 61.471243][ T2270] No source specified [ 61.634051][ T2290] fuseblk: Bad value for 'fd' [ 61.839859][ T2311] fuseblk: Bad value for 'fd' [ 62.570985][ T2338] fuseblk: Bad value for 'fd' [ 62.665902][ T2347] No source specified [ 62.813674][ T2361] No source specified [ 62.932447][ T2373] No source specified [ 63.079346][ T2388] fuseblk: Bad value for 'fd' [ 64.450036][ T2431] 9pnet_fd: Insufficient options for proto=fd [ 64.841843][ T2437] No source specified [ 64.860971][ T2439] No source specified [ 64.940065][ T2447] fuseblk: Bad value for 'fd' [ 66.188098][ T2465] fuseblk: Bad value for 'fd' [ 66.747626][ T2486] No source specified [ 67.513722][ T2521] fuseblk: Bad value for 'fd' [ 67.787202][ T2531] No source specified [ 67.909001][ T2542] No source specified [ 68.024375][ T2565] fuseblk: Bad value for 'fd' [ 68.141582][ T36] audit: type=1400 audit(1763339388.450:130): avc: denied { map } for pid=2581 comm="syz.0.1060" path=2F7365637265746D656D202864656C6574656429 dev="secretmem" ino=14117 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 68.182185][ T36] audit: type=1400 audit(1763339388.480:131): avc: denied { read } for pid=2581 comm="syz.0.1060" path=2F7365637265746D656D202864656C6574656429 dev="secretmem" ino=14117 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 68.325163][ T2601] No source specified [ 68.480364][ T2632] No source specified [ 68.542962][ T2640] No source specified [ 68.746624][ T2660] No source specified [ 69.099829][ T2681] No source specified [ 69.154094][ T2683] No source specified [ 69.212884][ T2685] No source specified [ 69.364187][ T36] audit: type=1400 audit(1763339389.670:132): avc: denied { read } for pid=2695 comm="syz.2.1112" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 69.773276][ T2718] No source specified [ 70.105556][ T63] usb 3-1: new high-speed USB device number 3 using dummy_hcd [ 70.265567][ T63] usb 3-1: Using ep0 maxpacket: 16 [ 70.276525][ T63] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 70.295559][ T63] usb 3-1: New USB device found, idVendor=0458, idProduct=5016, bcdDevice= 0.00 [ 70.314968][ T63] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 70.326333][ T63] usb 3-1: config 0 descriptor?? [ 70.746472][ T63] usbhid 3-1:0.0: can't add hid device: -71 [ 70.753257][ T63] usbhid 3-1:0.0: probe with driver usbhid failed with error -71 [ 70.770215][ T63] usb 3-1: USB disconnect, device number 3 [ 70.792471][ T2748] fuseblk: Bad value for 'fd' [ 70.794252][ T2750] No source specified [ 71.320901][ T2766] fuseblk: Bad value for 'fd' [ 71.444342][ T2776] overlayfs: "xino=on" is useless with all layers on same fs, ignore. [ 71.455526][ T36] audit: type=1400 audit(1763339391.750:133): avc: denied { unlink } for pid=2775 comm="syz.0.1150" name="#1" dev="tmpfs" ino=1575 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 71.500618][ T36] audit: type=1400 audit(1763339391.790:134): avc: denied { mount } for pid=2775 comm="syz.0.1150" name="/" dev="overlay" ino=1569 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 71.547313][ T2784] No source specified [ 71.611758][ T2786] fuseblk: Bad value for 'fd' [ 71.722433][ T2800] fuseblk: Bad value for 'fd' [ 71.818292][ T2815] fuseblk: Bad value for 'fd' [ 74.577088][ T2950] No source specified [ 74.670093][ T2957] fuseblk: Bad value for 'fd' [ 74.715766][ T2964] fuseblk: Bad value for 'fd' [ 74.836341][ T2980] fuseblk: Bad value for 'fd' [ 75.065539][ T2992] FAULT_INJECTION: forcing a failure. [ 75.065539][ T2992] name failslab, interval 1, probability 0, space 0, times 0 [ 75.078355][ T2992] CPU: 1 UID: 0 PID: 2992 Comm: syz.2.1247 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 75.078390][ T2992] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 75.078408][ T2992] Call Trace: [ 75.078415][ T2992] [ 75.078424][ T2992] __dump_stack+0x21/0x30 [ 75.078469][ T2992] dump_stack_lvl+0x10c/0x190 [ 75.078498][ T2992] ? __cfi_dump_stack_lvl+0x10/0x10 [ 75.078529][ T2992] dump_stack+0x19/0x20 [ 75.078556][ T2992] should_fail_ex+0x3d9/0x530 [ 75.078578][ T2992] ? kvm_io_bus_register_dev+0x161/0x720 [ 75.078605][ T2992] should_failslab+0xac/0x100 [ 75.078630][ T2992] __kmalloc_noprof+0x69/0x530 [ 75.078650][ T2992] ? kvm_io_bus_register_dev+0x161/0x720 [ 75.078675][ T2992] ? alloc_inode+0xc5/0x270 [ 75.078699][ T2992] ? new_inode+0x25/0x1e0 [ 75.078724][ T2992] kvm_io_bus_register_dev+0x161/0x720 [ 75.078749][ T2992] ? asm_sysvec_apic_timer_interrupt+0x1f/0x30 [ 75.078777][ T2992] kvm_pic_init+0x1a9/0x3a0 [ 75.078809][ T2992] kvm_arch_vm_ioctl+0x1039/0x14e0 [ 75.078831][ T2992] ? avc_has_perm_noaudit+0x286/0x360 [ 75.078862][ T2992] ? __cfi_kvm_arch_vm_ioctl+0x10/0x10 [ 75.078884][ T2992] ? avc_has_perm+0x144/0x220 [ 75.078913][ T2992] ? __cfi_avc_has_perm+0x10/0x10 [ 75.078942][ T2992] ? kasan_save_alloc_info+0x40/0x50 [ 75.078974][ T2992] ? selinux_file_open+0x457/0x610 [ 75.079000][ T2992] ? __cfi_selinux_file_open+0x10/0x10 [ 75.079031][ T2992] ? is_bpf_text_address+0x17b/0x1a0 [ 75.079056][ T2992] ? kernel_text_address+0xa9/0xe0 [ 75.079083][ T2992] ? __kernel_text_address+0x11/0x40 [ 75.079118][ T2992] ? do_vfs_ioctl+0xeda/0x1e30 [ 75.079141][ T2992] ? arch_stack_walk+0x10b/0x170 [ 75.079179][ T2992] ? __ia32_compat_sys_ioctl+0x850/0x850 [ 75.079205][ T2992] ? _parse_integer_limit+0x195/0x1e0 [ 75.079240][ T2992] ? _parse_integer+0x2e/0x40 [ 75.079287][ T2992] kvm_vm_ioctl+0x791/0xb80 [ 75.079316][ T2992] ? __cfi_kvm_vm_ioctl+0x10/0x10 [ 75.079345][ T2992] ? ioctl_has_perm+0x1aa/0x4d0 [ 75.079375][ T2992] ? __asan_memcpy+0x5a/0x80 [ 75.079393][ T2992] ? ioctl_has_perm+0x3e0/0x4d0 [ 75.079419][ T2992] ? has_cap_mac_admin+0xd0/0xd0 [ 75.079444][ T2992] ? proc_fail_nth_write+0x17e/0x210 [ 75.079473][ T2992] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 75.079502][ T2992] ? selinux_file_ioctl+0x6e0/0x1360 [ 75.079527][ T2992] ? vfs_write+0x93e/0xf30 [ 75.079546][ T2992] ? __cfi_selinux_file_ioctl+0x10/0x10 [ 75.079572][ T2992] ? __cfi_vfs_write+0x10/0x10 [ 75.079592][ T2992] ? __kasan_check_write+0x18/0x20 [ 75.079623][ T2992] ? mutex_unlock+0x8b/0x240 [ 75.079642][ T2992] ? __cfi_mutex_unlock+0x10/0x10 [ 75.079661][ T2992] ? __fget_files+0x2c5/0x340 [ 75.079685][ T2992] ? __fget_files+0x2c5/0x340 [ 75.079708][ T2992] ? bpf_lsm_file_ioctl+0xd/0x20 [ 75.079738][ T2992] ? security_file_ioctl+0x34/0xd0 [ 75.079761][ T2992] ? __cfi_kvm_vm_ioctl+0x10/0x10 [ 75.079789][ T2992] __se_sys_ioctl+0x135/0x1b0 [ 75.079813][ T2992] __x64_sys_ioctl+0x7f/0xa0 [ 75.079836][ T2992] x64_sys_call+0x1878/0x2ee0 [ 75.079867][ T2992] do_syscall_64+0x58/0xf0 [ 75.079896][ T2992] ? clear_bhb_loop+0x50/0xa0 [ 75.079919][ T2992] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 75.079942][ T2992] RIP: 0033:0x7fb4e1f8f6c9 [ 75.079965][ T2992] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 75.079983][ T2992] RSP: 002b:00007fb4e09e3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 75.080010][ T2992] RAX: ffffffffffffffda RBX: 00007fb4e21e5fa0 RCX: 00007fb4e1f8f6c9 [ 75.080027][ T2992] RDX: 0000000000000000 RSI: 000000000000ae60 RDI: 0000000000000008 [ 75.080040][ T2992] RBP: 00007fb4e09e3090 R08: 0000000000000000 R09: 0000000000000000 [ 75.080054][ T2992] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 75.080066][ T2992] R13: 00007fb4e21e6038 R14: 00007fb4e21e5fa0 R15: 00007ffdd3eee918 [ 75.080085][ T2992] [ 75.779494][ T3003] FAULT_INJECTION: forcing a failure. [ 75.779494][ T3003] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 75.813833][ T36] audit: type=1400 audit(1763339396.120:135): avc: denied { read } for pid=3009 comm="syz.1.1257" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 75.829458][ T3003] CPU: 0 UID: 0 PID: 3003 Comm: syz.2.1253 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 75.829496][ T3003] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 75.829510][ T3003] Call Trace: [ 75.829517][ T3003] [ 75.829526][ T3003] __dump_stack+0x21/0x30 [ 75.829564][ T3003] dump_stack_lvl+0x10c/0x190 [ 75.829594][ T3003] ? __cfi_dump_stack_lvl+0x10/0x10 [ 75.829626][ T3003] ? check_stack_object+0x12c/0x140 [ 75.829647][ T3003] dump_stack+0x19/0x20 [ 75.829676][ T3003] should_fail_ex+0x3d9/0x530 [ 75.829700][ T3003] should_fail+0xf/0x20 [ 75.829720][ T3003] should_fail_usercopy+0x1e/0x30 [ 75.829744][ T3003] _copy_to_user+0x24/0xa0 [ 75.829773][ T3003] simple_read_from_buffer+0xed/0x160 [ 75.829819][ T3003] proc_fail_nth_read+0x19e/0x210 [ 75.829853][ T3003] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 75.829885][ T3003] ? bpf_lsm_file_permission+0xd/0x20 [ 75.829919][ T3003] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 75.829950][ T3003] vfs_read+0x27d/0xc70 [ 75.829971][ T3003] ? __cfi_selinux_file_ioctl+0x10/0x10 [ 75.830013][ T3003] ? __cfi_vfs_read+0x10/0x10 [ 75.830032][ T3003] ? __kasan_check_write+0x18/0x20 [ 75.830084][ T3003] ? mutex_lock+0x92/0x1c0 [ 75.830107][ T3003] ? __cfi_mutex_lock+0x10/0x10 [ 75.830128][ T3003] ? __fget_files+0x2c5/0x340 [ 75.830155][ T3003] ksys_read+0x141/0x250 [ 75.830177][ T3003] ? __cfi_ksys_read+0x10/0x10 [ 75.830199][ T3003] ? __kasan_check_read+0x15/0x20 [ 75.830253][ T3003] __x64_sys_read+0x7f/0x90 [ 75.830273][ T3003] x64_sys_call+0x2638/0x2ee0 [ 75.830325][ T3003] do_syscall_64+0x58/0xf0 [ 75.830354][ T3003] ? clear_bhb_loop+0x50/0xa0 [ 75.830381][ T3003] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 75.830407][ T3003] RIP: 0033:0x7fb4e1f8e0dc [ 75.830426][ T3003] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 75.830447][ T3003] RSP: 002b:00007fb4e09e3030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 75.830473][ T3003] RAX: ffffffffffffffda RBX: 00007fb4e21e5fa0 RCX: 00007fb4e1f8e0dc [ 75.830491][ T3003] RDX: 000000000000000f RSI: 00007fb4e09e30a0 RDI: 0000000000000007 [ 75.830507][ T3003] RBP: 00007fb4e09e3090 R08: 0000000000000000 R09: 0000000000000000 [ 75.830522][ T3003] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 75.830537][ T3003] R13: 00007fb4e21e6038 R14: 00007fb4e21e5fa0 R15: 00007ffdd3eee918 [ 75.830558][ T3003] [ 76.083479][ T36] audit: type=1400 audit(1763339396.120:136): avc: denied { open } for pid=3009 comm="syz.1.1257" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 76.107951][ T36] audit: type=1400 audit(1763339396.120:137): avc: denied { write } for pid=3009 comm="syz.1.1257" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 76.130750][ T36] audit: type=1400 audit(1763339396.210:138): avc: denied { watch watch_reads } for pid=3014 comm="syz.2.1259" path="/323/file0" dev="tmpfs" ino=1986 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 76.169658][ T36] audit: type=1400 audit(1763339396.220:139): avc: denied { read write } for pid=3014 comm="syz.2.1259" name="rnullb0" dev="devtmpfs" ino=31 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 76.207076][ T36] audit: type=1400 audit(1763339396.220:140): avc: denied { open } for pid=3014 comm="syz.2.1259" path="/dev/rnullb0" dev="devtmpfs" ino=31 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 76.888390][ T36] audit: type=1400 audit(1763339397.200:141): avc: denied { ioctl } for pid=3045 comm="syz.1.1271" path="socket:[17514]" dev="sockfs" ino=17514 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 76.940522][ T3049] No source specified [ 77.357552][ T36] audit: type=1400 audit(1763339397.670:142): avc: denied { create } for pid=3080 comm="syz.3.1287" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 77.530960][ T3102] fuseblk: Bad value for 'fd' [ 77.569477][ T36] audit: type=1400 audit(1763339397.870:143): avc: denied { create } for pid=3104 comm="syz.0.1300" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 77.602665][ T36] audit: type=1400 audit(1763339397.880:144): avc: denied { getopt } for pid=3104 comm="syz.0.1300" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 77.925880][ T3139] fuseblk: Bad value for 'fd' [ 78.072246][ T3155] FAULT_INJECTION: forcing a failure. [ 78.072246][ T3155] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 78.101540][ T3155] CPU: 0 UID: 0 PID: 3155 Comm: syz.2.1311 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 78.101573][ T3155] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 78.101586][ T3155] Call Trace: [ 78.101594][ T3155] [ 78.101602][ T3155] __dump_stack+0x21/0x30 [ 78.101637][ T3155] dump_stack_lvl+0x10c/0x190 [ 78.101666][ T3155] ? __cfi_dump_stack_lvl+0x10/0x10 [ 78.101696][ T3155] dump_stack+0x19/0x20 [ 78.101723][ T3155] should_fail_ex+0x3d9/0x530 [ 78.101745][ T3155] should_fail_alloc_page+0xeb/0x110 [ 78.101770][ T3155] __alloc_pages_noprof+0x19b/0x7b0 [ 78.101808][ T3155] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 78.101836][ T3155] ? kernel_text_address+0xa9/0xe0 [ 78.101863][ T3155] ? kasan_save_alloc_info+0x40/0x50 [ 78.101892][ T3155] ? __kasan_slab_alloc+0x73/0x90 [ 78.101916][ T3155] ? kmem_cache_alloc_noprof+0x1ee/0x430 [ 78.101936][ T3155] ? kvm_vm_ioctl_create_vcpu+0x134/0xaa0 [ 78.101967][ T3155] kvm_vm_ioctl_create_vcpu+0x15e/0xaa0 [ 78.101997][ T3155] ? _parse_integer+0x2e/0x40 [ 78.102028][ T3155] kvm_vm_ioctl+0x729/0xb80 [ 78.102058][ T3155] ? __cfi_kvm_vm_ioctl+0x10/0x10 [ 78.102086][ T3155] ? ioctl_has_perm+0x1aa/0x4d0 [ 78.102112][ T3155] ? __asan_memcpy+0x5a/0x80 [ 78.102130][ T3155] ? ioctl_has_perm+0x3e0/0x4d0 [ 78.102156][ T3155] ? has_cap_mac_admin+0xd0/0xd0 [ 78.102181][ T3155] ? proc_fail_nth_write+0x17e/0x210 [ 78.102209][ T3155] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 78.102239][ T3155] ? selinux_file_ioctl+0x6e0/0x1360 [ 78.102263][ T3155] ? vfs_write+0x93e/0xf30 [ 78.102282][ T3155] ? __cfi_selinux_file_ioctl+0x10/0x10 [ 78.102307][ T3155] ? __cfi_vfs_write+0x10/0x10 [ 78.102326][ T3155] ? __kasan_check_write+0x18/0x20 [ 78.102357][ T3155] ? mutex_unlock+0x8b/0x240 [ 78.102377][ T3155] ? __cfi_mutex_unlock+0x10/0x10 [ 78.102395][ T3155] ? __fget_files+0x2c5/0x340 [ 78.102419][ T3155] ? __fget_files+0x2c5/0x340 [ 78.102442][ T3155] ? bpf_lsm_file_ioctl+0xd/0x20 [ 78.102470][ T3155] ? security_file_ioctl+0x34/0xd0 [ 78.102494][ T3155] ? __cfi_kvm_vm_ioctl+0x10/0x10 [ 78.102524][ T3155] __se_sys_ioctl+0x135/0x1b0 [ 78.102548][ T3155] __x64_sys_ioctl+0x7f/0xa0 [ 78.102571][ T3155] x64_sys_call+0x1878/0x2ee0 [ 78.102605][ T3155] do_syscall_64+0x58/0xf0 [ 78.102650][ T3155] ? clear_bhb_loop+0x50/0xa0 [ 78.102674][ T3155] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 78.102697][ T3155] RIP: 0033:0x7fb4e1f8f6c9 [ 78.102716][ T3155] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 78.102734][ T3155] RSP: 002b:00007fb4e09e3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 78.102758][ T3155] RAX: ffffffffffffffda RBX: 00007fb4e21e5fa0 RCX: 00007fb4e1f8f6c9 [ 78.102774][ T3155] RDX: 0000000000000000 RSI: 000000000000ae41 RDI: 000000000000000a [ 78.102793][ T3155] RBP: 00007fb4e09e3090 R08: 0000000000000000 R09: 0000000000000000 [ 78.102807][ T3155] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 78.102820][ T3155] R13: 00007fb4e21e6038 R14: 00007fb4e21e5fa0 R15: 00007ffdd3eee918 [ 78.102839][ T3155] [ 78.866566][ T3176] FAULT_INJECTION: forcing a failure. [ 78.866566][ T3176] name failslab, interval 1, probability 0, space 0, times 0 [ 78.884165][ T3176] CPU: 1 UID: 0 PID: 3176 Comm: syz.3.1331 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 78.884195][ T3176] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 78.884208][ T3176] Call Trace: [ 78.884214][ T3176] [ 78.884222][ T3176] __dump_stack+0x21/0x30 [ 78.884254][ T3176] dump_stack_lvl+0x10c/0x190 [ 78.884299][ T3176] ? __cfi_dump_stack_lvl+0x10/0x10 [ 78.884330][ T3176] dump_stack+0x19/0x20 [ 78.884357][ T3176] should_fail_ex+0x3d9/0x530 [ 78.884379][ T3176] ? kvm_io_bus_register_dev+0x161/0x720 [ 78.884404][ T3176] should_failslab+0xac/0x100 [ 78.884428][ T3176] __kmalloc_noprof+0x69/0x530 [ 78.884448][ T3176] ? kvm_io_bus_register_dev+0x161/0x720 [ 78.884473][ T3176] ? alloc_inode+0xc5/0x270 [ 78.884497][ T3176] ? new_inode+0x25/0x1e0 [ 78.884521][ T3176] kvm_io_bus_register_dev+0x161/0x720 [ 78.884546][ T3176] ? mutex_lock+0x92/0x1c0 [ 78.884568][ T3176] kvm_pic_init+0x1a9/0x3a0 [ 78.884600][ T3176] kvm_arch_vm_ioctl+0x1039/0x14e0 [ 78.884622][ T3176] ? avc_has_perm_noaudit+0x286/0x360 [ 78.884651][ T3176] ? __cfi_kvm_arch_vm_ioctl+0x10/0x10 [ 78.884673][ T3176] ? avc_has_perm+0x144/0x220 [ 78.884702][ T3176] ? __cfi_avc_has_perm+0x10/0x10 [ 78.884730][ T3176] ? kasan_save_alloc_info+0x40/0x50 [ 78.884764][ T3176] ? selinux_file_open+0x457/0x610 [ 78.884790][ T3176] ? __cfi_selinux_file_open+0x10/0x10 [ 78.884820][ T3176] ? is_bpf_text_address+0x17b/0x1a0 [ 78.884843][ T3176] ? kernel_text_address+0xa9/0xe0 [ 78.884870][ T3176] ? __kernel_text_address+0x11/0x40 [ 78.884896][ T3176] ? do_vfs_ioctl+0xeda/0x1e30 [ 78.884919][ T3176] ? arch_stack_walk+0x10b/0x170 [ 78.884938][ T3176] ? __ia32_compat_sys_ioctl+0x850/0x850 [ 78.884963][ T3176] ? _parse_integer_limit+0x195/0x1e0 [ 78.885004][ T3176] ? _parse_integer+0x2e/0x40 [ 78.885035][ T3176] kvm_vm_ioctl+0x791/0xb80 [ 78.885064][ T3176] ? __cfi_kvm_vm_ioctl+0x10/0x10 [ 78.885092][ T3176] ? ioctl_has_perm+0x1aa/0x4d0 [ 78.885117][ T3176] ? __asan_memcpy+0x5a/0x80 [ 78.885136][ T3176] ? ioctl_has_perm+0x3e0/0x4d0 [ 78.885161][ T3176] ? has_cap_mac_admin+0xd0/0xd0 [ 78.885186][ T3176] ? proc_fail_nth_write+0x17e/0x210 [ 78.885214][ T3176] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 78.885243][ T3176] ? selinux_file_ioctl+0x6e0/0x1360 [ 78.885267][ T3176] ? vfs_write+0x93e/0xf30 [ 78.885286][ T3176] ? __cfi_selinux_file_ioctl+0x10/0x10 [ 78.885312][ T3176] ? __cfi_vfs_write+0x10/0x10 [ 78.885331][ T3176] ? __kasan_check_write+0x18/0x20 [ 78.885362][ T3176] ? mutex_unlock+0x8b/0x240 [ 78.885381][ T3176] ? __cfi_mutex_unlock+0x10/0x10 [ 78.885399][ T3176] ? __fget_files+0x2c5/0x340 [ 78.885423][ T3176] ? __fget_files+0x2c5/0x340 [ 78.885446][ T3176] ? bpf_lsm_file_ioctl+0xd/0x20 [ 78.885475][ T3176] ? security_file_ioctl+0x34/0xd0 [ 78.885503][ T3176] ? __cfi_kvm_vm_ioctl+0x10/0x10 [ 78.885531][ T3176] __se_sys_ioctl+0x135/0x1b0 [ 78.885553][ T3176] __x64_sys_ioctl+0x7f/0xa0 [ 78.885590][ T3176] x64_sys_call+0x1878/0x2ee0 [ 78.885639][ T3176] do_syscall_64+0x58/0xf0 [ 78.885667][ T3176] ? clear_bhb_loop+0x50/0xa0 [ 78.885692][ T3176] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 78.885715][ T3176] RIP: 0033:0x7f2c0dd8f6c9 [ 78.885733][ T3176] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 78.885751][ T3176] RSP: 002b:00007f2c0ecf3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 78.885776][ T3176] RAX: ffffffffffffffda RBX: 00007f2c0dfe5fa0 RCX: 00007f2c0dd8f6c9 [ 78.885793][ T3176] RDX: 0000000000000000 RSI: 000000000000ae60 RDI: 0000000000000008 [ 78.885807][ T3176] RBP: 00007f2c0ecf3090 R08: 0000000000000000 R09: 0000000000000000 [ 78.885821][ T3176] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 78.885835][ T3176] R13: 00007f2c0dfe6038 R14: 00007f2c0dfe5fa0 R15: 00007fff135764d8 [ 78.885854][ T3176] [ 79.325593][ T481] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 79.339626][ T3191] No source specified [ 79.475550][ T481] usb 2-1: Using ep0 maxpacket: 16 [ 79.482008][ T481] usb 2-1: config 0 has 1 interface, different from the descriptor's value: 6 [ 79.490949][ T481] usb 2-1: config 0 interface 0 altsetting 4 has an invalid descriptor for endpoint zero, skipping [ 79.501832][ T481] usb 2-1: config 0 interface 0 has no altsetting 0 [ 79.508663][ T481] usb 2-1: New USB device found, idVendor=044f, idProduct=b304, bcdDevice= 0.00 [ 79.517738][ T481] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 79.526555][ T481] usb 2-1: config 0 descriptor?? [ 79.532453][ T481] usbhid 2-1:0.0: couldn't find an input interrupt endpoint [ 79.540794][ T3226] process 'syz.3.1354' launched '/dev/fd/5' with NULL argv: empty string added [ 79.627599][ T3242] FAULT_INJECTION: forcing a failure. [ 79.627599][ T3242] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 79.640681][ T3242] CPU: 1 UID: 0 PID: 3242 Comm: syz.0.1361 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 79.640730][ T3242] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 79.640747][ T3242] Call Trace: [ 79.640788][ T3242] [ 79.640796][ T3242] __dump_stack+0x21/0x30 [ 79.640830][ T3242] dump_stack_lvl+0x10c/0x190 [ 79.640860][ T3242] ? __cfi_dump_stack_lvl+0x10/0x10 [ 79.640890][ T3242] ? check_stack_object+0x12c/0x140 [ 79.640912][ T3242] dump_stack+0x19/0x20 [ 79.640946][ T3242] should_fail_ex+0x3d9/0x530 [ 79.640969][ T3242] should_fail+0xf/0x20 [ 79.640988][ T3242] should_fail_usercopy+0x1e/0x30 [ 79.641011][ T3242] _copy_to_user+0x24/0xa0 [ 79.641038][ T3242] simple_read_from_buffer+0xed/0x160 [ 79.641067][ T3242] proc_fail_nth_read+0x19e/0x210 [ 79.641097][ T3242] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 79.641126][ T3242] ? bpf_lsm_file_permission+0xd/0x20 [ 79.641156][ T3242] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 79.641185][ T3242] vfs_read+0x27d/0xc70 [ 79.641204][ T3242] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 79.641224][ T3242] ? __cfi_vfs_read+0x10/0x10 [ 79.641243][ T3242] ? __kasan_check_write+0x18/0x20 [ 79.641277][ T3242] ? mutex_lock+0x92/0x1c0 [ 79.641297][ T3242] ? __cfi_mutex_lock+0x10/0x10 [ 79.641317][ T3242] ? __fget_files+0x2c5/0x340 [ 79.641343][ T3242] ksys_read+0x141/0x250 [ 79.641362][ T3242] ? __cfi_ksys_read+0x10/0x10 [ 79.641383][ T3242] ? __kasan_check_read+0x15/0x20 [ 79.641428][ T3242] __x64_sys_read+0x7f/0x90 [ 79.641447][ T3242] x64_sys_call+0x2638/0x2ee0 [ 79.641478][ T3242] do_syscall_64+0x58/0xf0 [ 79.641505][ T3242] ? clear_bhb_loop+0x50/0xa0 [ 79.641530][ T3242] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 79.641552][ T3242] RIP: 0033:0x7fac0178e0dc [ 79.641569][ T3242] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 79.641587][ T3242] RSP: 002b:00007fac025ef030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 79.641610][ T3242] RAX: ffffffffffffffda RBX: 00007fac019e5fa0 RCX: 00007fac0178e0dc [ 79.641626][ T3242] RDX: 000000000000000f RSI: 00007fac025ef0a0 RDI: 000000000000000c [ 79.641640][ T3242] RBP: 00007fac025ef090 R08: 0000000000000000 R09: 0000000000000000 [ 79.641654][ T3242] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 79.641667][ T3242] R13: 00007fac019e6038 R14: 00007fac019e5fa0 R15: 00007ffcb50bf398 [ 79.641686][ T3242] [ 79.733751][ T9] usb 2-1: USB disconnect, device number 2 [ 79.984123][ T3256] FAULT_INJECTION: forcing a failure. [ 79.984123][ T3256] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 80.002165][ T3256] CPU: 1 UID: 0 PID: 3256 Comm: syz.2.1366 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 80.002197][ T3256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 80.002209][ T3256] Call Trace: [ 80.002216][ T3256] [ 80.002224][ T3256] __dump_stack+0x21/0x30 [ 80.002256][ T3256] dump_stack_lvl+0x10c/0x190 [ 80.002283][ T3256] ? __cfi_dump_stack_lvl+0x10/0x10 [ 80.002310][ T3256] ? kstrtoull+0x13b/0x1e0 [ 80.002329][ T3256] dump_stack+0x19/0x20 [ 80.002355][ T3256] should_fail_ex+0x3d9/0x530 [ 80.002376][ T3256] should_fail+0xf/0x20 [ 80.002394][ T3256] should_fail_usercopy+0x1e/0x30 [ 80.002416][ T3256] _copy_from_user+0x22/0xb0 [ 80.002442][ T3256] ___sys_sendmsg+0x159/0x2a0 [ 80.002472][ T3256] ? __sys_sendmsg+0x280/0x280 [ 80.002502][ T3256] ? proc_fail_nth_write+0x17e/0x210 [ 80.002529][ T3256] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 80.002563][ T3256] __x64_sys_sendmsg+0x1eb/0x2c0 [ 80.002592][ T3256] ? fput+0x1a5/0x240 [ 80.002626][ T3256] ? __cfi___x64_sys_sendmsg+0x10/0x10 [ 80.002686][ T3256] ? ksys_write+0x1ef/0x250 [ 80.002708][ T3256] ? __kasan_check_read+0x15/0x20 [ 80.002743][ T3256] x64_sys_call+0x2a4c/0x2ee0 [ 80.002775][ T3256] do_syscall_64+0x58/0xf0 [ 80.002804][ T3256] ? clear_bhb_loop+0x50/0xa0 [ 80.002828][ T3256] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 80.002851][ T3256] RIP: 0033:0x7fb4e1f8f6c9 [ 80.002869][ T3256] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 80.002888][ T3256] RSP: 002b:00007fb4e09e3038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 80.002912][ T3256] RAX: ffffffffffffffda RBX: 00007fb4e21e5fa0 RCX: 00007fb4e1f8f6c9 [ 80.002928][ T3256] RDX: 0000000000000040 RSI: 0000200000000340 RDI: 0000000000000009 [ 80.002943][ T3256] RBP: 00007fb4e09e3090 R08: 0000000000000000 R09: 0000000000000000 [ 80.002957][ T3256] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 80.002970][ T3256] R13: 00007fb4e21e6038 R14: 00007fb4e21e5fa0 R15: 00007ffdd3eee918 [ 80.002990][ T3256] [ 80.230431][ T3262] No source specified [ 80.539437][ T3283] FAULT_INJECTION: forcing a failure. [ 80.539437][ T3283] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 80.562316][ T3283] CPU: 0 UID: 0 PID: 3283 Comm: syz.1.1380 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 80.562350][ T3283] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 80.562364][ T3283] Call Trace: [ 80.562371][ T3283] [ 80.562379][ T3283] __dump_stack+0x21/0x30 [ 80.562415][ T3283] dump_stack_lvl+0x10c/0x190 [ 80.562445][ T3283] ? __cfi_dump_stack_lvl+0x10/0x10 [ 80.562476][ T3283] ? kstrtoull+0x13b/0x1e0 [ 80.562497][ T3283] dump_stack+0x19/0x20 [ 80.562525][ T3283] should_fail_ex+0x3d9/0x530 [ 80.562548][ T3283] should_fail+0xf/0x20 [ 80.562568][ T3283] should_fail_usercopy+0x1e/0x30 [ 80.562600][ T3283] _copy_from_user+0x22/0xb0 [ 80.562628][ T3283] ___sys_sendmsg+0x159/0x2a0 [ 80.562666][ T3283] ? __sys_sendmsg+0x280/0x280 [ 80.562699][ T3283] ? proc_fail_nth_write+0x17e/0x210 [ 80.562730][ T3283] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 80.562767][ T3283] __x64_sys_sendmsg+0x1eb/0x2c0 [ 80.562800][ T3283] ? fput+0x1a5/0x240 [ 80.562826][ T3283] ? __cfi___x64_sys_sendmsg+0x10/0x10 [ 80.562859][ T3283] ? ksys_write+0x1ef/0x250 [ 80.562882][ T3283] ? __kasan_check_read+0x15/0x20 [ 80.562917][ T3283] x64_sys_call+0x2a4c/0x2ee0 [ 80.562950][ T3283] do_syscall_64+0x58/0xf0 [ 80.562978][ T3283] ? clear_bhb_loop+0x50/0xa0 [ 80.563004][ T3283] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 80.563028][ T3283] RIP: 0033:0x7f9856d8f6c9 [ 80.563046][ T3283] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 80.563064][ T3283] RSP: 002b:00007f9857ce3038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 80.563088][ T3283] RAX: ffffffffffffffda RBX: 00007f9856fe5fa0 RCX: 00007f9856d8f6c9 [ 80.563105][ T3283] RDX: 0000000000000040 RSI: 0000200000000340 RDI: 0000000000000008 [ 80.563120][ T3283] RBP: 00007f9857ce3090 R08: 0000000000000000 R09: 0000000000000000 [ 80.563134][ T3283] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 80.563147][ T3283] R13: 00007f9856fe6038 R14: 00007f9856fe5fa0 R15: 00007ffc78269438 [ 80.563167][ T3283] [ 81.537956][ T3317] No source specified [ 81.597773][ T3319] syz.3.1399 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 81.671602][ T3321] No source specified [ 81.868471][ T3338] FAULT_INJECTION: forcing a failure. [ 81.868471][ T3338] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 81.895589][ T3338] CPU: 0 UID: 0 PID: 3338 Comm: syz.1.1408 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 81.895621][ T3338] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 81.895635][ T3338] Call Trace: [ 81.895642][ T3338] [ 81.895650][ T3338] __dump_stack+0x21/0x30 [ 81.895684][ T3338] dump_stack_lvl+0x10c/0x190 [ 81.895712][ T3338] ? __cfi_dump_stack_lvl+0x10/0x10 [ 81.895741][ T3338] ? kstrtoull+0x13b/0x1e0 [ 81.895760][ T3338] dump_stack+0x19/0x20 [ 81.895805][ T3338] should_fail_ex+0x3d9/0x530 [ 81.895827][ T3338] should_fail+0xf/0x20 [ 81.895847][ T3338] should_fail_usercopy+0x1e/0x30 [ 81.895871][ T3338] _copy_from_user+0x22/0xb0 [ 81.895898][ T3338] ___sys_sendmsg+0x159/0x2a0 [ 81.895930][ T3338] ? __sys_sendmsg+0x280/0x280 [ 81.895962][ T3338] ? proc_fail_nth_write+0x17e/0x210 [ 81.895992][ T3338] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 81.896029][ T3338] __x64_sys_sendmsg+0x1eb/0x2c0 [ 81.896061][ T3338] ? fput+0x1a5/0x240 [ 81.896086][ T3338] ? __cfi___x64_sys_sendmsg+0x10/0x10 [ 81.896119][ T3338] ? ksys_write+0x1ef/0x250 [ 81.896141][ T3338] ? __kasan_check_read+0x15/0x20 [ 81.896175][ T3338] x64_sys_call+0x2a4c/0x2ee0 [ 81.896208][ T3338] do_syscall_64+0x58/0xf0 [ 81.896236][ T3338] ? clear_bhb_loop+0x50/0xa0 [ 81.896260][ T3338] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 81.896283][ T3338] RIP: 0033:0x7f9856d8f6c9 [ 81.896302][ T3338] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 81.896320][ T3338] RSP: 002b:00007f9857ce3038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 81.896345][ T3338] RAX: ffffffffffffffda RBX: 00007f9856fe5fa0 RCX: 00007f9856d8f6c9 [ 81.896362][ T3338] RDX: 0000000000000040 RSI: 0000200000000340 RDI: 0000000000000008 [ 81.896377][ T3338] RBP: 00007f9857ce3090 R08: 0000000000000000 R09: 0000000000000000 [ 81.896392][ T3338] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 81.896406][ T3338] R13: 00007f9856fe6038 R14: 00007f9856fe5fa0 R15: 00007ffc78269438 [ 81.896425][ T3338] [ 82.726191][ T3379] FAULT_INJECTION: forcing a failure. [ 82.726191][ T3379] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 82.755522][ T3379] CPU: 1 UID: 0 PID: 3379 Comm: syz.2.1426 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 82.755556][ T3379] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 82.755570][ T3379] Call Trace: [ 82.755578][ T3379] [ 82.755586][ T3379] __dump_stack+0x21/0x30 [ 82.755626][ T3379] dump_stack_lvl+0x10c/0x190 [ 82.755662][ T3379] ? __cfi_dump_stack_lvl+0x10/0x10 [ 82.755693][ T3379] ? kstrtoull+0x13b/0x1e0 [ 82.755713][ T3379] dump_stack+0x19/0x20 [ 82.755742][ T3379] should_fail_ex+0x3d9/0x530 [ 82.755764][ T3379] should_fail+0xf/0x20 [ 82.755785][ T3379] should_fail_usercopy+0x1e/0x30 [ 82.755809][ T3379] _copy_from_user+0x22/0xb0 [ 82.755836][ T3379] ___sys_sendmsg+0x159/0x2a0 [ 82.755870][ T3379] ? __sys_sendmsg+0x280/0x280 [ 82.755903][ T3379] ? proc_fail_nth_write+0x17e/0x210 [ 82.755933][ T3379] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 82.755970][ T3379] __x64_sys_sendmsg+0x1eb/0x2c0 [ 82.756003][ T3379] ? fput+0x1a5/0x240 [ 82.756029][ T3379] ? __cfi___x64_sys_sendmsg+0x10/0x10 [ 82.756061][ T3379] ? ksys_write+0x1ef/0x250 [ 82.756084][ T3379] ? __kasan_check_read+0x15/0x20 [ 82.756118][ T3379] x64_sys_call+0x2a4c/0x2ee0 [ 82.756150][ T3379] do_syscall_64+0x58/0xf0 [ 82.756179][ T3379] ? clear_bhb_loop+0x50/0xa0 [ 82.756217][ T3379] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 82.756240][ T3379] RIP: 0033:0x7fb4e1f8f6c9 [ 82.756258][ T3379] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 82.756277][ T3379] RSP: 002b:00007fb4e09e3038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 82.756300][ T3379] RAX: ffffffffffffffda RBX: 00007fb4e21e5fa0 RCX: 00007fb4e1f8f6c9 [ 82.756317][ T3379] RDX: 0000000000000040 RSI: 0000200000000340 RDI: 0000000000000008 [ 82.756331][ T3379] RBP: 00007fb4e09e3090 R08: 0000000000000000 R09: 0000000000000000 [ 82.756345][ T3379] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 82.756359][ T3379] R13: 00007fb4e21e6038 R14: 00007fb4e21e5fa0 R15: 00007ffdd3eee918 [ 82.756377][ T3379] [ 83.067914][ T3403] No source specified [ 83.098302][ T3407] fuseblk: Bad value for 'fd' [ 83.358121][ T3434] No source specified [ 84.870472][ T3517] FAULT_INJECTION: forcing a failure. [ 84.870472][ T3517] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 84.897711][ T3517] CPU: 1 UID: 0 PID: 3517 Comm: syz.1.1487 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 84.897742][ T3517] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 84.897755][ T3517] Call Trace: [ 84.897762][ T3517] [ 84.897769][ T3517] __dump_stack+0x21/0x30 [ 84.897801][ T3517] dump_stack_lvl+0x10c/0x190 [ 84.897827][ T3517] ? __cfi_dump_stack_lvl+0x10/0x10 [ 84.897855][ T3517] dump_stack+0x19/0x20 [ 84.897880][ T3517] should_fail_ex+0x3d9/0x530 [ 84.897900][ T3517] should_fail+0xf/0x20 [ 84.897918][ T3517] should_fail_usercopy+0x1e/0x30 [ 84.897940][ T3517] strncpy_from_user+0x28/0x270 [ 84.897960][ T3517] getname_flags+0x102/0x710 [ 84.897980][ T3517] ? build_open_flags+0x487/0x600 [ 84.898005][ T3517] getname+0x1b/0x30 [ 84.898023][ T3517] do_sys_openat2+0xcb/0x1c0 [ 84.898048][ T3517] ? fput+0x1a5/0x240 [ 84.898070][ T3517] ? do_sys_open+0x100/0x100 [ 84.898095][ T3517] ? ksys_write+0x1ef/0x250 [ 84.898112][ T3517] ? __cfi_ksys_write+0x10/0x10 [ 84.898131][ T3517] __x64_sys_openat+0x13a/0x170 [ 84.898157][ T3517] x64_sys_call+0xe69/0x2ee0 [ 84.898187][ T3517] do_syscall_64+0x58/0xf0 [ 84.898212][ T3517] ? clear_bhb_loop+0x50/0xa0 [ 84.898251][ T3517] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 84.898273][ T3517] RIP: 0033:0x7f9856d8f6c9 [ 84.898289][ T3517] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 84.898305][ T3517] RSP: 002b:00007f9857ce3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 84.898324][ T3517] RAX: ffffffffffffffda RBX: 00007f9856fe5fa0 RCX: 00007f9856d8f6c9 [ 84.898338][ T3517] RDX: 000000000000275a RSI: 0000200000000280 RDI: ffffffffffffff9c [ 84.898351][ T3517] RBP: 00007f9857ce3090 R08: 0000000000000000 R09: 0000000000000000 [ 84.898363][ T3517] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 84.898374][ T3517] R13: 00007f9856fe6038 R14: 00007f9856fe5fa0 R15: 00007ffc78269438 [ 84.898389][ T3517] [ 85.267063][ T3538] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 85.299208][ T36] kauditd_printk_skb: 4 callbacks suppressed [ 85.299242][ T36] audit: type=1400 audit(1763339405.610:149): avc: denied { setopt } for pid=3537 comm="syz.1.1497" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 85.688282][ T36] audit: type=1400 audit(1763339406.000:150): avc: denied { getopt } for pid=3562 comm="syz.1.1508" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 85.772421][ T3568] No source specified [ 85.833376][ T3574] FAULT_INJECTION: forcing a failure. [ 85.833376][ T3574] name failslab, interval 1, probability 0, space 0, times 0 [ 85.855624][ T3574] CPU: 1 UID: 0 PID: 3574 Comm: syz.0.1513 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 85.855658][ T3574] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 85.855672][ T3574] Call Trace: [ 85.855679][ T3574] [ 85.855687][ T3574] __dump_stack+0x21/0x30 [ 85.855722][ T3574] dump_stack_lvl+0x10c/0x190 [ 85.855751][ T3574] ? __cfi_dump_stack_lvl+0x10/0x10 [ 85.855780][ T3574] ? __kasan_check_write+0x18/0x20 [ 85.855814][ T3574] ? proc_fail_nth_write+0x17e/0x210 [ 85.855843][ T3574] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 85.855873][ T3574] dump_stack+0x19/0x20 [ 85.855935][ T3574] should_fail_ex+0x3d9/0x530 [ 85.855977][ T3574] should_failslab+0xac/0x100 [ 85.856002][ T3574] kmem_cache_alloc_noprof+0x42/0x430 [ 85.856023][ T3574] ? getname_flags+0xc6/0x710 [ 85.856046][ T3574] getname_flags+0xc6/0x710 [ 85.856068][ T3574] ? build_open_flags+0x487/0x600 [ 85.856099][ T3574] getname+0x1b/0x30 [ 85.856119][ T3574] do_sys_openat2+0xcb/0x1c0 [ 85.856148][ T3574] ? fput+0x1a5/0x240 [ 85.856174][ T3574] ? do_sys_open+0x100/0x100 [ 85.856201][ T3574] ? ksys_write+0x1ef/0x250 [ 85.856222][ T3574] ? __cfi_ksys_write+0x10/0x10 [ 85.856244][ T3574] __x64_sys_openat+0x13a/0x170 [ 85.856275][ T3574] x64_sys_call+0xe69/0x2ee0 [ 85.856307][ T3574] do_syscall_64+0x58/0xf0 [ 85.856336][ T3574] ? clear_bhb_loop+0x50/0xa0 [ 85.856370][ T3574] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 85.856394][ T3574] RIP: 0033:0x7fac0178f6c9 [ 85.856412][ T3574] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 85.856432][ T3574] RSP: 002b:00007fac025ef038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 85.856456][ T3574] RAX: ffffffffffffffda RBX: 00007fac019e5fa0 RCX: 00007fac0178f6c9 [ 85.856473][ T3574] RDX: 000000000000275a RSI: 0000000000000000 RDI: ffffffffffffff9c [ 85.856488][ T3574] RBP: 00007fac025ef090 R08: 0000000000000000 R09: 0000000000000000 [ 85.856502][ T3574] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 85.856516][ T3574] R13: 00007fac019e6038 R14: 00007fac019e5fa0 R15: 00007ffcb50bf398 [ 85.856535][ T3574] [ 86.552925][ T3615] fuseblk: Bad value for 'fd' [ 86.566890][ T3617] No source specified [ 86.604783][ T36] audit: type=1400 audit(1763339406.910:151): avc: denied { mount } for pid=3621 comm="syz.3.1535" name="/" dev="ramfs" ino=20228 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 86.662025][ T3630] fuseblk: Unknown parameter 'fd0xffffffffffffffff' [ 86.685530][ T36] audit: type=1400 audit(1763339406.940:152): avc: denied { read write } for pid=3621 comm="syz.3.1535" name="ptp0" dev="devtmpfs" ino=196 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 86.723952][ T36] audit: type=1400 audit(1763339406.940:153): avc: denied { open } for pid=3621 comm="syz.3.1535" path="/dev/ptp0" dev="devtmpfs" ino=196 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 86.754015][ T36] audit: type=1400 audit(1763339406.940:154): avc: denied { ioctl } for pid=3621 comm="syz.3.1535" path="/dev/ptp0" dev="devtmpfs" ino=196 ioctlcmd=0x3d04 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 86.819626][ T3638] fuseblk: Bad value for 'fd' [ 86.854039][ T3641] No source specified [ 86.913755][ T3650] fuseblk: Unknown parameter 'fd0xffffffffffffffff' [ 87.036265][ T3661] fuseblk: Bad value for 'fd' [ 87.800040][ T3733] fuseblk: Bad value for 'fd' [ 87.928652][ T3741] No source specified [ 88.765319][ T3798] fuseblk: Bad value for 'fd' [ 88.842115][ T3804] fuseblk: Bad value for 'fd' [ 88.966665][ T3817] fuseblk: Bad value for 'fd' [ 89.271960][ T3842] fuseblk: Bad value for 'fd' [ 89.371388][ T3850] fuseblk: Bad value for 'fd' [ 89.530510][ T3865] fuseblk: Bad value for 'fd' [ 90.247876][ T3887] fuseblk: Bad value for 'fd' [ 90.821942][ T3946] fuseblk: Bad value for 'fd' [ 91.338941][ T4003] fuseblk: Bad value for 'fd' [ 91.421185][ T4007] fuseblk: Bad value for 'fd' [ 92.076203][ T4042] fuseblk: Bad value for 'fd' [ 92.324583][ T4057] fuseblk: Bad value for 'fd' [ 92.840842][ T4089] fuseblk: Bad value for 'fd' [ 93.730232][ T4099] No source specified [ 94.038564][ T4128] fuseblk: Bad value for 'fd' [ 95.732185][ T4262] /dev/loop0: Can't open blockdev [ 96.976180][ T4376] fuseblk: Bad value for 'fd' [ 97.860667][ T4430] fuseblk: Bad value for 'fd' [ 98.181920][ T4454] fuseblk: Bad value for 'fd' [ 99.762104][ T4522] fuseblk: Bad value for 'fd' [ 101.548738][ T4618] fuseblk: Bad value for 'fd' [ 102.652064][ T4727] fuseblk: Bad value for 'fd' [ 103.047505][ T4747] fuseblk: Bad value for 'fd' [ 103.827578][ T4763] fuseblk: Bad value for 'fd' [ 104.752066][ T36] audit: type=1400 audit(1763339425.060:155): avc: denied { map } for pid=4816 comm="syz.1.2094" path="/dev/rnullb0" dev="devtmpfs" ino=31 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 104.775121][ T4815] fuseblk: Bad value for 'fd' [ 104.810073][ T36] audit: type=1400 audit(1763339425.060:156): avc: denied { execute } for pid=4816 comm="syz.1.2094" path="/dev/rnullb0" dev="devtmpfs" ino=31 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 104.970672][ T4838] fuseblk: Bad value for 'fd' [ 105.598949][ T4892] fuseblk: Bad value for 'fd' [ 106.023970][ T4947] fuseblk: Bad value for 'fd' [ 106.227231][ T46] bridge_slave_1: left allmulticast mode [ 106.239601][ T46] bridge_slave_1: left promiscuous mode [ 106.250670][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 106.266119][ T46] bridge_slave_0: left allmulticast mode [ 106.277701][ T46] bridge_slave_0: left promiscuous mode [ 106.288859][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 106.435763][ T46] veth1_macvtap: left promiscuous mode [ 106.447778][ T46] veth0_vlan: left promiscuous mode [ 106.545396][ T4965] bridge0: port 1(bridge_slave_0) entered blocking state [ 106.552522][ T4965] bridge0: port 1(bridge_slave_0) entered disabled state [ 106.561782][ T4965] bridge_slave_0: entered allmulticast mode [ 106.568297][ T4965] bridge_slave_0: entered promiscuous mode [ 106.576070][ T4965] bridge0: port 2(bridge_slave_1) entered blocking state [ 106.583154][ T4965] bridge0: port 2(bridge_slave_1) entered disabled state [ 106.590717][ T4965] bridge_slave_1: entered allmulticast mode [ 106.597370][ T4965] bridge_slave_1: entered promiscuous mode [ 106.668623][ T4965] bridge0: port 2(bridge_slave_1) entered blocking state [ 106.675721][ T4965] bridge0: port 2(bridge_slave_1) entered forwarding state [ 106.683009][ T4965] bridge0: port 1(bridge_slave_0) entered blocking state [ 106.690089][ T4965] bridge0: port 1(bridge_slave_0) entered forwarding state [ 106.712572][ T4976] fuseblk: Bad value for 'fd' [ 106.722065][ T330] bridge0: port 1(bridge_slave_0) entered disabled state [ 106.730098][ T330] bridge0: port 2(bridge_slave_1) entered disabled state [ 106.741335][ T330] bridge0: port 1(bridge_slave_0) entered blocking state [ 106.748411][ T330] bridge0: port 1(bridge_slave_0) entered forwarding state [ 106.756667][ T330] bridge0: port 2(bridge_slave_1) entered blocking state [ 106.758700][ T4980] fuseblk: Bad value for 'fd' [ 106.763714][ T330] bridge0: port 2(bridge_slave_1) entered forwarding state [ 106.798287][ T4965] veth0_vlan: entered promiscuous mode [ 106.813901][ T4965] veth1_macvtap: entered promiscuous mode [ 106.899295][ T4998] fuseblk: Bad value for 'fd' [ 107.097705][ T5020] fuseblk: Bad value for 'fd' [ 107.159612][ T5024] fuseblk: Bad value for 'fd' [ 107.937123][ T5040] fuseblk: Bad value for 'fd' [ 108.397170][ T5072] fuseblk: Bad value for 'fd' [ 110.336546][ T5160] No source specified [ 111.470291][ T5218] fuseblk: Bad value for 'fd' [ 111.898801][ T5240] fuseblk: Bad value for 'fd' [ 112.331821][ T5250] No source specified [ 112.669657][ T329] bridge_slave_1: left allmulticast mode [ 112.685454][ T329] bridge_slave_1: left promiscuous mode [ 112.691154][ T329] bridge0: port 2(bridge_slave_1) entered disabled state [ 112.708615][ T329] bridge_slave_0: left allmulticast mode [ 112.714287][ T329] bridge_slave_0: left promiscuous mode [ 112.735724][ T329] bridge0: port 1(bridge_slave_0) entered disabled state [ 112.878506][ T329] veth1_macvtap: left promiscuous mode [ 112.884061][ T329] veth0_vlan: left promiscuous mode [ 113.044708][ T5282] fuseblk: Bad value for 'fd' [ 113.096247][ T5272] bridge0: port 1(bridge_slave_0) entered blocking state [ 113.113853][ T5272] bridge0: port 1(bridge_slave_0) entered disabled state [ 113.121130][ T5272] bridge_slave_0: entered allmulticast mode [ 113.127510][ T5272] bridge_slave_0: entered promiscuous mode [ 113.134106][ T5272] bridge0: port 2(bridge_slave_1) entered blocking state [ 113.142010][ T5272] bridge0: port 2(bridge_slave_1) entered disabled state [ 113.149113][ T5272] bridge_slave_1: entered allmulticast mode [ 113.155414][ T5272] bridge_slave_1: entered promiscuous mode [ 113.291395][ T5272] bridge0: port 2(bridge_slave_1) entered blocking state [ 113.298489][ T5272] bridge0: port 2(bridge_slave_1) entered forwarding state [ 113.305799][ T5272] bridge0: port 1(bridge_slave_0) entered blocking state [ 113.312849][ T5272] bridge0: port 1(bridge_slave_0) entered forwarding state [ 113.394770][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 113.422759][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 113.439435][ T330] bridge0: port 1(bridge_slave_0) entered blocking state [ 113.446532][ T330] bridge0: port 1(bridge_slave_0) entered forwarding state [ 113.477054][ T46] bridge0: port 2(bridge_slave_1) entered blocking state [ 113.484154][ T46] bridge0: port 2(bridge_slave_1) entered forwarding state [ 113.542050][ T5272] veth0_vlan: entered promiscuous mode [ 113.556591][ T5272] veth1_macvtap: entered promiscuous mode [ 113.621092][ T5307] No source specified [ 113.697108][ T5315] fuseblk: Bad value for 'fd' [ 114.324250][ T5369] fuseblk: Bad value for 'fd' [ 116.881106][ T5567] fuseblk: Bad value for 'fd' [ 120.570001][ T5700] No source specified [ 120.916135][ T5707] bridge0: port 1(bridge_slave_0) entered blocking state [ 120.923213][ T5707] bridge0: port 1(bridge_slave_0) entered disabled state [ 120.972090][ T5707] bridge_slave_0: entered allmulticast mode [ 121.003257][ T5707] bridge_slave_0: entered promiscuous mode [ 121.026251][ T5707] bridge0: port 2(bridge_slave_1) entered blocking state [ 121.060998][ T5707] bridge0: port 2(bridge_slave_1) entered disabled state [ 121.075534][ T5707] bridge_slave_1: entered allmulticast mode [ 121.082021][ T5707] bridge_slave_1: entered promiscuous mode [ 121.287806][ T5707] bridge0: port 2(bridge_slave_1) entered blocking state [ 121.294981][ T5707] bridge0: port 2(bridge_slave_1) entered forwarding state [ 121.302295][ T5707] bridge0: port 1(bridge_slave_0) entered blocking state [ 121.309350][ T5707] bridge0: port 1(bridge_slave_0) entered forwarding state [ 121.385068][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 121.399194][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 121.418159][ T329] bridge_slave_1: left allmulticast mode [ 121.423830][ T329] bridge_slave_1: left promiscuous mode [ 121.430731][ T329] bridge0: port 2(bridge_slave_1) entered disabled state [ 121.439529][ T329] bridge_slave_0: left allmulticast mode [ 121.448363][ T329] bridge_slave_0: left promiscuous mode [ 121.456393][ T329] bridge0: port 1(bridge_slave_0) entered disabled state [ 121.556396][ T46] bridge0: port 1(bridge_slave_0) entered blocking state [ 121.563539][ T46] bridge0: port 1(bridge_slave_0) entered forwarding state [ 121.606306][ T46] bridge0: port 2(bridge_slave_1) entered blocking state [ 121.613390][ T46] bridge0: port 2(bridge_slave_1) entered forwarding state [ 121.633616][ T329] veth1_macvtap: left promiscuous mode [ 121.655640][ T329] veth0_vlan: left promiscuous mode [ 121.792964][ T5707] veth0_vlan: entered promiscuous mode [ 121.827803][ T5707] veth1_macvtap: entered promiscuous mode [ 121.829308][ T5768] No source specified [ 122.026419][ T5794] fuseblk: Bad value for 'fd' [ 122.307711][ T329] bridge_slave_1: left allmulticast mode [ 122.315591][ T329] bridge_slave_1: left promiscuous mode [ 122.321234][ T329] bridge0: port 2(bridge_slave_1) entered disabled state [ 122.355938][ T329] bridge_slave_0: left allmulticast mode [ 122.375502][ T329] bridge_slave_0: left promiscuous mode [ 122.381137][ T329] bridge0: port 1(bridge_slave_0) entered disabled state [ 122.607968][ T329] veth1_macvtap: left promiscuous mode [ 122.613523][ T329] veth0_vlan: left promiscuous mode [ 122.685556][ T63] usb 4-1: new high-speed USB device number 4 using dummy_hcd [ 122.699585][ T5806] bridge0: port 1(bridge_slave_0) entered blocking state [ 122.706724][ T5806] bridge0: port 1(bridge_slave_0) entered disabled state [ 122.713788][ T5806] bridge_slave_0: entered allmulticast mode [ 122.720683][ T5806] bridge_slave_0: entered promiscuous mode [ 122.730447][ T5806] bridge0: port 2(bridge_slave_1) entered blocking state [ 122.737644][ T5806] bridge0: port 2(bridge_slave_1) entered disabled state [ 122.744769][ T5806] bridge_slave_1: entered allmulticast mode [ 122.751068][ T5806] bridge_slave_1: entered promiscuous mode [ 122.860517][ T63] usb 4-1: Using ep0 maxpacket: 16 [ 122.872576][ T63] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 122.896692][ T63] usb 4-1: New USB device found, idVendor=0458, idProduct=5016, bcdDevice= 0.00 [ 122.912481][ T63] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 122.936454][ T63] usb 4-1: config 0 descriptor?? [ 122.971634][ T329] bridge0: port 1(bridge_slave_0) entered blocking state [ 122.978712][ T329] bridge0: port 1(bridge_slave_0) entered forwarding state [ 122.989131][ T46] bridge0: port 2(bridge_slave_1) entered blocking state [ 122.996206][ T46] bridge0: port 2(bridge_slave_1) entered forwarding state [ 123.034796][ T5806] veth0_vlan: entered promiscuous mode [ 123.056260][ T5806] veth1_macvtap: entered promiscuous mode [ 123.273393][ T5833] fuseblk: Bad value for 'fd' [ 123.345185][ T5808] FAULT_INJECTION: forcing a failure. [ 123.345185][ T5808] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 123.368438][ T5808] CPU: 0 UID: 0 PID: 5808 Comm: syz.3.2571 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 123.368473][ T5808] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 123.368500][ T5808] Call Trace: [ 123.368508][ T5808] [ 123.368516][ T5808] __dump_stack+0x21/0x30 [ 123.368550][ T5808] dump_stack_lvl+0x10c/0x190 [ 123.368580][ T5808] ? __cfi_dump_stack_lvl+0x10/0x10 [ 123.368611][ T5808] dump_stack+0x19/0x20 [ 123.368639][ T5808] should_fail_ex+0x3d9/0x530 [ 123.368671][ T5808] should_fail+0xf/0x20 [ 123.368690][ T5808] should_fail_usercopy+0x1e/0x30 [ 123.368714][ T5808] _copy_from_user+0x22/0xb0 [ 123.368741][ T5808] raw_ioctl+0xaed/0x3600 [ 123.368770][ T5808] ? proc_fail_nth_write+0x17e/0x210 [ 123.368800][ T5808] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 123.368829][ T5808] ? __cfi_raw_ioctl+0x10/0x10 [ 123.368857][ T5808] ? selinux_file_ioctl+0x6e0/0x1360 [ 123.368883][ T5808] ? vfs_write+0x93e/0xf30 [ 123.368903][ T5808] ? __cfi_selinux_file_ioctl+0x10/0x10 [ 123.368929][ T5808] ? __cfi_vfs_write+0x10/0x10 [ 123.368948][ T5808] ? __kasan_check_write+0x18/0x20 [ 123.368981][ T5808] ? mutex_unlock+0x8b/0x240 [ 123.369001][ T5808] ? __cfi_mutex_unlock+0x10/0x10 [ 123.369021][ T5808] ? __fget_files+0x2c5/0x340 [ 123.369046][ T5808] ? __fget_files+0x2c5/0x340 [ 123.369070][ T5808] ? bpf_lsm_file_ioctl+0xd/0x20 [ 123.369100][ T5808] ? security_file_ioctl+0x34/0xd0 [ 123.369124][ T5808] ? __cfi_raw_ioctl+0x10/0x10 [ 123.369151][ T5808] __se_sys_ioctl+0x135/0x1b0 [ 123.369176][ T5808] __x64_sys_ioctl+0x7f/0xa0 [ 123.369199][ T5808] x64_sys_call+0x1878/0x2ee0 [ 123.369231][ T5808] do_syscall_64+0x58/0xf0 [ 123.369259][ T5808] ? clear_bhb_loop+0x50/0xa0 [ 123.369284][ T5808] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 123.369307][ T5808] RIP: 0033:0x7f805058f2cb [ 123.369325][ T5808] Code: 00 48 89 44 24 18 31 c0 48 8d 44 24 60 c7 04 24 10 00 00 00 48 89 44 24 08 48 8d 44 24 20 48 89 44 24 10 b8 10 00 00 00 0f 05 <89> c2 3d 00 f0 ff ff 77 1c 48 8b 44 24 18 64 48 2b 04 25 28 00 00 [ 123.369344][ T5808] RSP: 002b:00007f80513c2f60 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 123.369367][ T5808] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00007f805058f2cb [ 123.369384][ T5808] RDX: 00007f80513c3ff0 RSI: 0000000080085502 RDI: 0000000000000006 [ 123.369399][ T5808] RBP: 00007f80513c5090 R08: 0000000000000000 R09: 0000000000000000 [ 123.369413][ T5808] R10: 0000000000000006 R11: 0000000000000246 R12: 0000000000000000 [ 123.369426][ T5808] R13: 0000000000000000 R14: 00007f80507e5fa0 R15: 00007ffd53c9ba18 [ 123.369445][ T5808] [ 123.370691][ T63] usbhid 4-1:0.0: can't add hid device: -71 [ 123.655591][ T63] usbhid 4-1:0.0: probe with driver usbhid failed with error -71 [ 123.675633][ T63] usb 4-1: USB disconnect, device number 4 [ 126.798118][ T6121] incfs: Backing dir is not set, filesystem can't be mounted. [ 126.814004][ T6121] incfs: mount failed -2 [ 128.029033][ T6147] incfs: Backing dir is not set, filesystem can't be mounted. [ 128.048240][ T6147] incfs: mount failed -2 [ 128.279041][ T6175] rust_binder: Write failure EFAULT in pid:126 [ 128.297023][ T36] audit: type=1400 audit(1763339448.590:157): avc: denied { create } for pid=6174 comm="syz.0.2753" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 128.343535][ T36] audit: type=1400 audit(1763339448.590:158): avc: denied { ioctl } for pid=6174 comm="syz.0.2753" path="/dev/binderfs/binder1" dev="binder" ino=8 ioctlcmd=0x6201 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 128.735653][ T331] usb 3-1: new high-speed USB device number 4 using dummy_hcd [ 128.885515][ T331] usb 3-1: Using ep0 maxpacket: 8 [ 128.896917][ T331] usb 3-1: config 0 has an invalid interface number: 55 but max is 0 [ 128.905277][ T331] usb 3-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 128.925696][ T331] usb 3-1: config 0 has no interface number 0 [ 128.931811][ T331] usb 3-1: config 0 interface 55 altsetting 0 has an invalid descriptor for endpoint zero, skipping [ 128.962859][ T331] usb 3-1: config 0 interface 55 altsetting 0 endpoint 0xE has an invalid bInterval 0, changing to 7 [ 128.983983][ T331] usb 3-1: New USB device found, idVendor=0f11, idProduct=1080, bcdDevice=fc.6a [ 129.004161][ T331] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 129.025127][ T331] usb 3-1: config 0 descriptor?? [ 129.232551][ T331] usb 3-1: USB disconnect, device number 4 [ 129.511796][ T6251] incfs: Backing dir is not set, filesystem can't be mounted. [ 129.519393][ T6251] incfs: mount failed -2 [ 129.625524][ T9] usb 4-1: new high-speed USB device number 5 using dummy_hcd [ 129.687167][ T6271] incfs: Backing dir is not set, filesystem can't be mounted. [ 129.694759][ T6271] incfs: mount failed -2 [ 129.775631][ T9] usb 4-1: Using ep0 maxpacket: 16 [ 129.786180][ T9] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 129.800605][ T9] usb 4-1: New USB device found, idVendor=0458, idProduct=5016, bcdDevice= 0.00 [ 129.809945][ T9] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 129.827644][ T9] usb 4-1: config 0 descriptor?? [ 130.239814][ T9] usbhid 4-1:0.0: can't add hid device: -71 [ 130.246935][ T9] usbhid 4-1:0.0: probe with driver usbhid failed with error -71 [ 130.266810][ T9] usb 4-1: USB disconnect, device number 5 [ 130.462243][ T36] audit: type=1400 audit(1763339450.770:159): avc: denied { read } for pid=6298 comm="poweroff" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 130.497142][ T6304] incfs: Backing dir is not set, filesystem can't be mounted. [ 130.504693][ T6304] incfs: mount failed -2 [ 130.784513][ T6325] incfs: Backing dir is not set, filesystem can't be mounted. [ 130.801725][ T6325] incfs: mount failed -2 Stopping sshd: stopped /usr/sbin/sshd (pid 202) OK [ 130.956241][ T6344] overlayfs: missing 'workdir' Stopping crond: stopped /usr/sbin/crond (pid 194) OK Stopping dhcpcd... stopped /sbin/dhcpcd (pid 148) [ 131.125501][ T36] audit: type=1400 audit(1763339451.430:160): avc: denied { search } for pid=6356 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 Stopping network: [ 131.286900][ T36] audit: type=1400 audit(1763339451.600:161): avc: denied { write } for pid=149 comm="dhcpcd" name="dhcpcd" dev="tmpfs" ino=421 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 131.335186][ T36] audit: type=1400 audit(1763339451.600:162): avc: denied { remove_name } for pid=149 comm="dhcpcd" name="sock" dev="tmpfs" ino=423 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 131.371752][ T36] audit: type=1400 audit(1763339451.600:163): avc: denied { unlink } for pid=149 comm="dhcpcd" name="sock" dev="tmpfs" ino=423 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=sock_file permissive=1 [ 131.460212][ T36] audit: type=1400 audit(1763339451.680:164): avc: denied { unlink } for pid=149 comm="dhcpcd" name="pid" dev="tmpfs" ino=422 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 OK Stopping iptables: [ 131.656837][ T36] audit: type=1400 audit(1763339451.970:165): avc: denied { search } for pid=6382 comm="iptables" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 OK Stopping system message bus: [ 131.717428][ T36] audit: type=1400 audit(1763339451.990:166): avc: denied { write } for pid=6382 comm="iptables" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 done [ 132.035731][ T6396] incfs: Backing dir is not set, filesystem can't be mounted. [ 132.063510][ T6396] incfs: mount failed -2 Stopping klogd: OK Stopping acpid: [ 132.323046][ T6410] FAULT_INJECTION: forcing a failure. [ 132.323046][ T6410] name failslab, interval 1, probability 0, space 0, times 0 [ 132.362750][ T6410] CPU: 1 UID: 0 PID: 6410 Comm: syz.3.2846 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 132.362787][ T6410] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 132.362802][ T6410] Call Trace: [ 132.362809][ T6410] [ 132.362819][ T6410] __dump_stack+0x21/0x30 [ 132.362862][ T6410] dump_stack_lvl+0x10c/0x190 [ 132.362893][ T6410] ? __cfi_dump_stack_lvl+0x10/0x10 [ 132.362924][ T6410] ? stack_depot_save_flags+0x38/0x800 [ 132.362949][ T6410] ? stack_trace_save+0x9d/0xe0 [ 132.362982][ T6410] dump_stack+0x19/0x20 [ 132.363010][ T6410] should_fail_ex+0x3d9/0x530 [ 132.363034][ T6410] should_failslab+0xac/0x100 [ 132.363060][ T6410] kmem_cache_alloc_node_noprof+0x45/0x440 [ 132.363083][ T6410] ? __alloc_skb+0x10c/0x370 [ 132.363112][ T6410] __alloc_skb+0x10c/0x370 [ 132.363139][ T6410] tcp_stream_alloc_skb+0x43/0x370 [ 132.363170][ T6410] tcp_sendmsg_locked+0xeb5/0x4b40 [ 132.363202][ T6410] ? __asan_memcpy+0x5a/0x80 [ 132.363225][ T6410] ? _raw_spin_lock_bh+0x90/0x120 [ 132.363258][ T6410] ? __cfi_tcp_sendmsg_locked+0x10/0x10 [ 132.363291][ T6410] ? __cfi_tcp_sendmsg+0x10/0x10 [ 132.363320][ T6410] tcp_sendmsg+0x3e/0xe0 [ 132.363349][ T6410] ? __cfi_tcp_sendmsg+0x10/0x10 [ 132.363379][ T6410] inet_sendmsg+0xb7/0x120 [ 132.363399][ T6410] sock_write_iter+0x3cb/0x4f0 [ 132.363423][ T6410] ? __cfi_sock_write_iter+0x10/0x10 [ 132.363451][ T6410] do_iter_readv_writev+0x628/0x810 [ 132.363475][ T6410] ? vfs_iter_read+0x5f0/0x5f0 [ 132.363499][ T6410] ? bpf_lsm_file_permission+0xd/0x20 [ 132.363531][ T6410] vfs_writev+0x485/0xcf0 [ 132.363558][ T6410] ? do_writev+0x2d0/0x2d0 [ 132.363583][ T6410] ? vfs_write+0x93e/0xf30 [ 132.363609][ T6410] do_writev+0x14d/0x2d0 [ 132.363635][ T6410] ? vfs_readv+0xa50/0xa50 [ 132.363661][ T6410] ? __kasan_check_read+0x15/0x20 [ 132.363694][ T6410] __x64_sys_writev+0x81/0x90 [ 132.363718][ T6410] x64_sys_call+0x1fbb/0x2ee0 [ 132.363751][ T6410] do_syscall_64+0x58/0xf0 [ 132.363788][ T6410] ? clear_bhb_loop+0x50/0xa0 [ 132.363814][ T6410] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 132.363858][ T6410] RIP: 0033:0x7f805058f6c9 [ 132.363875][ T6410] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 132.363895][ T6410] RSP: 002b:00007f80513c5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 132.363919][ T6410] RAX: ffffffffffffffda RBX: 00007f80507e5fa0 RCX: 00007f805058f6c9 [ 132.363936][ T6410] RDX: 0000000000000006 RSI: 0000200000000b80 RDI: 0000000000000006 [ 132.363950][ T6410] RBP: 00007f80513c5090 R08: 0000000000000000 R09: 0000000000000000 [ 132.363965][ T6410] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 132.363992][ T6410] R13: 00007f80507e6038 R14: 00007f80507e5fa0 R15: 00007ffd53c9ba18 [ 132.364010][ T6410] [ 132.716170][ T6414] incfs: Backing dir is not set, filesystem can't be mounted. [ 132.731768][ T6414] incfs: mount failed -2 [ 133.039008][ T9] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 133.245544][ T9] usb 2-1: Using ep0 maxpacket: 16 [ 133.251899][ T9] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 133.285516][ T9] usb 2-1: New USB device found, idVendor=0458, idProduct=5016, bcdDevice= 0.00 [ 133.294577][ T9] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 133.335975][ T9] usb 2-1: config 0 descriptor?? OK Stopping syslogd: stopped /sbin/syslogd (pid 92) OK [ 133.743024][ T9] usbhid 2-1:0.0: can't add hid device: -71 [ 133.755618][ T9] usbhid 2-1:0.0: probe with driver usbhid failed with error -71 [ 133.776098][ T9] usb 2-1: USB disconnect, device number 3 umount: can't remount debugfs read-only umount: sysfs busy - remounted read-only umount: devtmpfs busy - remounted read-only umount: can't remount /dev/root read-only[ 134.016116][ T36] kauditd_printk_skb: 7 callbacks suppressed [ 134.016133][ T36] audit: type=1400 audit(1763339454.320:174): avc: denied { write } for pid=282 comm="syz-executor" path="pipe:[1922]" dev="pipefs" ino=1922 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 The system is going down NOW! Sent SIGTERM to all processes Connection to 10.128.1.2 closed by remote host. [ 134.287077][ T46] bridge_slave_1: left allmulticast mode [ 134.292848][ T46] bridge_slave_1: left promiscuous mode [ 134.305776][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 134.322278][ T46] bridge_slave_0: left allmulticast mode [ 134.328003][ T46] bridge_slave_0: left promiscuous mode [ 134.333584][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 134.498119][ T46] veth1_macvtap: left promiscuous mode [ 134.503625][ T46] veth0_vlan: left promiscuous mode [ 134.768374][ T46] bridge_slave_1: left allmulticast mode [ 134.774026][ T46] bridge_slave_1: left promiscuous mode [ 134.779662][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 134.787168][ T46] bridge_slave_0: left allmulticast mode [ 134.792896][ T46] bridge_slave_0: left promiscuous mode [ 134.798483][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 134.806024][ T46] bridge_slave_1: left allmulticast mode [ 134.811649][ T46] bridge_slave_1: left promiscuous mode [ 134.817305][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 134.824643][ T46] bridge_slave_0: left allmulticast mode [ 134.830413][ T46] bridge_slave_0: left promiscuous mode [ 134.835999][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 134.843606][ T46] bridge_slave_1: left allmulticast mode [ 134.849271][ T46] bridge_slave_1: left promiscuous mode [ 134.854945][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 134.862355][ T46] bridge_slave_0: left allmulticast mode [ 134.868044][ T46] bridge_slave_0: left promiscuous mode [ 134.873618][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 135.110574][ T46] veth1_macvtap: left promiscuous mode [ 135.116122][ T46] veth0_vlan: left promiscuous mode [ 135.121721][ T46] veth1_macvtap: left promiscuous mode [ 135.127245][ T46] veth0_vlan: left promiscuous mode [ 135.132718][ T46] veth1_macvtap: left promiscuous mode [ 135.138236][ T46] veth0_vlan: left promiscuous mode Sent SIGKILL to all processes Requesting system poweroff [ 136.216372][ T6463] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 136.223142][ T6463] ACPI: PM: Preparing to enter system sleep state S5 [ 136.230145][ T6463] kvm: exiting hardware virtualization [ 136.235709][ T6463] reboot: Power down serialport: VM disconnected.