last executing test programs: 26m9.120182444s ago: executing program 32 (id=24343): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r2, &(0x7f0000000440), 0x0, 0x8014) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_wireguard(r4, 0x8933, &(0x7f00000002c0)={'wg2\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000dc0)={0x74, r6, 0x5, 0x70bd2a, 0x25dfdbfd, {}, [@WGDEVICE_A_PEERS={0x58, 0x8, 0x0, 0x1, [{0x54, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ALLOWEDIPS={0x2c, 0x9, 0x0, 0x1, [{0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r7}]}, 0x74}, 0x1, 0x0, 0x0, 0x4000}, 0x40) 26m7.292461357s ago: executing program 33 (id=24395): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r5, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r6, 0x0, 0x0, 0x4) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000600)=ANY=[@ANYBLOB="d4000000000101040000000000000000020000002400018014000180080001007f00000108000200ac1414000c0002800500010000000000240002801400018008000100e000000108000200e00000010c00028005000100000000000800"], 0xd4}}, 0x0) 26m5.863989731s ago: executing program 34 (id=24426): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000000440)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8014) mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(&(0x7f0000000340)='./file0/../file0\x00', &(0x7f0000000280)='./file0/file0\x00', 0x0, 0xb101e, 0x0) mount$bind(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) 26m4.197017127s ago: executing program 35 (id=24471): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000040)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 26m3.821204535s ago: executing program 36 (id=24479): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003780)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8014) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r5, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) syz_clone(0xa5102000, 0x0, 0x0, 0x0, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) 26m2.492517688s ago: executing program 37 (id=24519): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) write(r0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x72, 0x0, 0x7fff0000}]}) syz_usb_connect(0x2, 0x3f, &(0x7f0000000040)=ANY=[@ANYBLOB="12010000d0918108ac051582588f000000010902"], 0x0) close_range(r3, 0xffffffffffffffff, 0x0) 26m2.217798756s ago: executing program 38 (id=24524): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r3, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) syz_clone(0xa5102000, 0x0, 0x0, 0x0, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) 26m1.280302779s ago: executing program 39 (id=24545): rt_sigaction(0xd, 0x0, 0x0, 0x8, &(0x7f0000000040)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$key(0xf, 0x3, 0x2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) sendmsg$key(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 26m1.205437597s ago: executing program 40 (id=24547): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0xc, 0x54404d0a08a4d8, 0x4}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x80, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f0000003780)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8014) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) 26m0.299150218s ago: executing program 41 (id=24568): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(&(0x7f0000000340)='./file0/../file0\x00', &(0x7f0000000280)='./file0/file0\x00', 0x0, 0xb101e, 0x0) mount$bind(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) 25m59.845318053s ago: executing program 42 (id=24580): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r2, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(&(0x7f0000000340)='./file0/../file0\x00', &(0x7f0000000280)='./file0/file0\x00', 0x0, 0xb101e, 0x0) 25m59.360385861s ago: executing program 43 (id=24588): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r2, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f00000009c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = socket(0x10, 0x3, 0x0) write(r4, &(0x7f0000000000)="2400000011005f0414f9f40700090400810000000d0000000000000008000f0001000000", 0x24) 25m50.364588512s ago: executing program 44 (id=24892): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r0, 0x0, 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r1, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) syz_usb_connect(0x1, 0x24, &(0x7f0000000600)={{0x12, 0x1, 0x200, 0x1a, 0x2, 0x53, 0x8, 0x2040, 0xc61a, 0xf496, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x10, 0x8, 0x10, 0xde, [{{0x9, 0x4, 0xec, 0x0, 0x0, 0x10, 0x9, 0xe0, 0x7d}}]}}]}}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x1, [{0x0, 0x0}]}) 25m49.214007177s ago: executing program 45 (id=24937): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r1, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r2, &(0x7f00000009c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r3 = socket(0x10, 0x3, 0x0) write(r3, &(0x7f0000000000)="2400000011005f0414f9f40700090400810000000d0000000000000008000f0001000000", 0x24) 25m46.236151535s ago: executing program 46 (id=25014): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = socket(0x10, 0x803, 0x0) sendto(r4, &(0x7f0000000740)="120000001200e7ef007b000000000000", 0x10, 0x0, 0x0, 0x0) recvmmsg(r4, &(0x7f0000000380)=[{{0x0, 0x0, 0x0}, 0x9}, {{0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000dc0)=""/4096, 0x1000}, {&(0x7f0000000080)=""/93, 0x5d}, {&(0x7f0000003700)=""/213, 0xd5}, {&(0x7f0000000a80)=""/191, 0xbf}, {&(0x7f0000000b40)=""/161, 0xa1}, {&(0x7f0000000680)=""/111, 0x6f}], 0x6}, 0x9}], 0x2, 0x40012160, 0x0) 25m41.101665139s ago: executing program 47 (id=25123): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x40000, 0x0) ioctl$TIOCVHANGUP(r5, 0x5437, 0x0) 25m37.817045098s ago: executing program 48 (id=25212): rt_sigaction(0xd, 0x0, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x12, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) 25m37.573324722s ago: executing program 49 (id=25216): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003780)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8014) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r4, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r5, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) 25m36.440488805s ago: executing program 50 (id=25248): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r3, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) syz_clone(0xa5102000, 0x0, 0x0, 0x0, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) 25m35.754145425s ago: executing program 51 (id=25256): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYRES8, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000280)={0xa, 0x4e22, 0x9, @loopback, 0x6}, 0x1c) connect$inet6(r3, &(0x7f0000000140)={0xa, 0x4e22, 0x23, @loopback, 0x23}, 0x1c) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r3, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000340)={0x20, 0x0, 0x10, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x10001, 0x6b}}}}}, 0x20}, 0x1, 0x0, 0x0, 0x2000c064}, 0x4000) 25m32.763806544s ago: executing program 52 (id=25324): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) mount$fuseblk(0x0, &(0x7f0000000100)='./cgroup\x00', &(0x7f0000000140), 0x3818000, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESDEC, @ANYRES16=r2]) 25m32.20103221s ago: executing program 53 (id=25332): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$sock(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x4040000) sendmmsg$inet6(r3, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) openat$kvm(0xffffffffffffff9c, &(0x7f0000000680), 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r5, 0x0) 25m30.50332071s ago: executing program 54 (id=25374): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00), 0x0, 0x4) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r3, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) connect$inet(r4, &(0x7f0000000280)={0x2, 0x0, @broadcast}, 0x10) 17m14.836385035s ago: executing program 55 (id=40952): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) sendmsg$sock(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x4040000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f00000000c0)={@dev, 0x800, 0x0, 0x2000000000903, 0x1}, 0x20) 17m9.735146824s ago: executing program 56 (id=41124): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r0, 0x0, 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r1, 0x0, 0x0, 0x805, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40004) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r2, &(0x7f0000000440)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8014) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x58, r5, 0x1, 0x70bd29, 0x0, {}, [@WGDEVICE_A_IFNAME={0x14, 0x2, 'wg0\x00'}, @WGDEVICE_A_PEERS={0x30, 0x8, 0x0, 0x1, [{0x2c, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x4}, @WGPEER_A_PUBLIC_KEY={0x24}]}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x4004840}, 0x44000) 17m9.139398354s ago: executing program 57 (id=41144): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r1, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r5, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r6, 0x0, 0x0) 17m8.619879256s ago: executing program 58 (id=41166): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x80, 0x0, 0xfcee) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000280)={0x2, 0x0, @broadcast}, 0x10) 17m7.665361351s ago: executing program 59 (id=41190): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x40000, 0x0) ioctl$TIOCVHANGUP(r4, 0x5437, 0x0) 17m6.839194713s ago: executing program 60 (id=41202): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r2, &(0x7f0000005800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8014) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x8001420, 0x0) 17m5.418282525s ago: executing program 9 (id=41237): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x9, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x35}}, 0x6}, 0x1c) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x4e22, 0x7, @ipv4={'\x00', '\xff\xff', @empty}, 0xd}, 0x1c) r5 = fcntl$dupfd(r4, 0x0, r4) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r5, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)={0x28, 0x0, 0x200, 0x70bd2d, 0x25dfdbfb, {{}, {@void, @val={0x8}, @val={0xc, 0x99, {0xc, 0xe}}}}}, 0x28}, 0x1, 0x0, 0x0, 0x48010}, 0x41) 17m5.395361128s ago: executing program 9 (id=41238): syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='freezer.self_freezing\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) mount$tmpfs(0x0, 0x0, &(0x7f00000018c0), 0x1, 0x0) 17m5.380524749s ago: executing program 9 (id=41239): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40004) sendmmsg$inet6(r3, &(0x7f0000000440)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8014) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r5, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r6 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x0, 0x4004840}, 0x44000) 17m5.344200283s ago: executing program 9 (id=41240): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x805, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(&(0x7f0000000340)='./file0/../file0\x00', &(0x7f0000000280)='./file0/file0\x00', 0x0, 0xb101e, 0x0) mount$bind(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) 17m5.343488933s ago: executing program 9 (id=41241): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, 0x0, 0x0, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x80, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x1c1341, 0x0) writev(r5, 0x0, 0x0) 17m5.236817564s ago: executing program 9 (id=41242): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40004) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r3, &(0x7f0000000440)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8014) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r5, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x28, r7, 0x1, 0x70bd29, 0x0, {}, [@WGDEVICE_A_IFNAME={0x14, 0x2, 'wg0\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x4004840}, 0x44000) 17m5.236446184s ago: executing program 61 (id=41242): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40004) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r3, &(0x7f0000000440)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8014) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r5, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x28, r7, 0x1, 0x70bd29, 0x0, {}, [@WGDEVICE_A_IFNAME={0x14, 0x2, 'wg0\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x4004840}, 0x44000) 17m2.470768179s ago: executing program 8 (id=41313): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000140)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r4, 0x0, 0x0) 17m2.4698611s ago: executing program 8 (id=41315): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000140)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r5, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) 17m2.414614105s ago: executing program 8 (id=41317): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='freezer.self_freezing\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000180)='wchan\x00') 17m2.153292741s ago: executing program 0 (id=41330): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r3, &(0x7f0000000440)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8014) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x2c, r5, 0x1, 0x70bd29, 0x0, {}, [@WGDEVICE_A_IFNAME={0x14, 0x2, 'wg0\x00'}, @WGDEVICE_A_PEERS={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4004840}, 0x44000) 17m2.140339493s ago: executing program 8 (id=41331): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000000440)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8014) mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(&(0x7f0000000340)='./file0/../file0\x00', &(0x7f0000000280)='./file0/file0\x00', 0x0, 0xb101e, 0x0) 17m2.139662033s ago: executing program 0 (id=41332): rt_sigaction(0xd, &(0x7f0000000180)={0x0, 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r5, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r6, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000600)=ANY=[], 0xd4}}, 0x0) 17m2.099946356s ago: executing program 0 (id=41333): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000140)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r3, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r5, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r6, 0x0, 0x0) 17m2.099583357s ago: executing program 0 (id=41334): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(&(0x7f0000000340)='./file0/../file0\x00', &(0x7f0000000280)='./file0/file0\x00', 0x0, 0xb101e, 0x0) mount$bind(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) 17m2.099192447s ago: executing program 0 (id=41335): rt_sigaction(0xd, &(0x7f0000000180)={0x0, 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r3, &(0x7f0000000440)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8014) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) 17m2.008199806s ago: executing program 0 (id=41338): rt_sigaction(0xd, &(0x7f0000000180)={0x0, 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r5, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r6, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000600)=ANY=[@ANYBLOB="d4000000000101040000000000000000020000002400018014000180080001007f00000108000200ac1414000c0002"], 0xd4}}, 0x0) 17m1.96714814s ago: executing program 62 (id=41338): rt_sigaction(0xd, &(0x7f0000000180)={0x0, 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r5, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r6, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000600)=ANY=[@ANYBLOB="d4000000000101040000000000000000020000002400018014000180080001007f00000108000200ac1414000c0002"], 0xd4}}, 0x0) 17m1.96532039s ago: executing program 8 (id=41340): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='freezer.self_freezing\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r2, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000180)='wchan\x00') 17m1.819881865s ago: executing program 8 (id=41342): rt_sigaction(0xd, &(0x7f0000000180)={0x0, 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r5, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r6, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000600)=ANY=[], 0xd4}}, 0x0) 17m1.76718798s ago: executing program 63 (id=41342): rt_sigaction(0xd, &(0x7f0000000180)={0x0, 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r5, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r6, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000600)=ANY=[], 0xd4}}, 0x0) 17m1.302660956s ago: executing program 5 (id=41347): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x118) syz_usb_connect(0x2, 0x36, &(0x7f00000000c0)=ANY=[@ANYBLOB="120101029b95de207d077a621000010203010902"], &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0}) 17m0.124650464s ago: executing program 5 (id=41360): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r3, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) lchown(&(0x7f0000000080)='./file0\x00', 0xee00, 0xee00) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000008000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000240)="0f0d51f40f01d10fc75800f30fc73600102e0f71e100b800008ec0640f017400aa66b9e408000066b81f6269e766ba000000000f309c0c0cb8d09bbc8966efbafc0cedba4300ba210066ed3626f00fc70d", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) 17m0.001224047s ago: executing program 5 (id=41363): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r3, &(0x7f0000000340)=ANY=[], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r5, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r6, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) mount$fuseblk(0x0, &(0x7f0000000100)='./cgroup\x00', &(0x7f0000000140), 0x3818000, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESDEC, @ANYRES16=r2]) 16m59.987658688s ago: executing program 5 (id=41364): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, 0xffffffffffffffff, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r1, 0x0, 0x0, 0x805, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(&(0x7f0000000340)='./file0/../file0\x00', &(0x7f0000000280)='./file0/file0\x00', 0x0, 0xb101e, 0x0) mount$bind(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) 16m59.980165678s ago: executing program 5 (id=41365): syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='freezer.self_freezing\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f00000000c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) mount$tmpfs(0x0, 0x0, &(0x7f00000018c0), 0x1, 0x0) 16m59.893835017s ago: executing program 5 (id=41366): r0 = openat$kvm(0x0, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x10003, 0x2, 0xf000, 0x1000, &(0x7f0000e82000/0x1000)=nil}) 16m59.878433218s ago: executing program 64 (id=41366): r0 = openat$kvm(0x0, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x10003, 0x2, 0xf000, 0x1000, &(0x7f0000e82000/0x1000)=nil}) 16m56.478462978s ago: executing program 4 (id=41509): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') mount(0x0, &(0x7f0000000140)='.\x00', &(0x7f0000000080)='proc\x00', 0x189, 0x0) r4 = syz_clone(0x26000, 0x0, 0x1e, 0x0, 0x0, 0x0) syz_open_procfs(r4, &(0x7f0000000900)='environ\x00') 16m56.108150065s ago: executing program 4 (id=41510): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r3, &(0x7f0000000340)=ANY=[], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r5, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r6, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) mount$fuseblk(0x0, &(0x7f0000000100)='./cgroup\x00', &(0x7f0000000140), 0x3818000, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESDEC, @ANYRES16=r2]) 16m56.082104088s ago: executing program 4 (id=41511): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000) socket$inet6_tcp(0xa, 0x1, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz0\x00', {0x807, 0x83, 0x6, 0xfffa}, 0x2000001d, [0x8000, 0xc95a, 0x12, 0x9, 0x80, 0x2, 0x3, 0x7f, 0x6, 0x49, 0x39cc191b, 0x5f, 0x9, 0x5, 0xffff2d37, 0xffffff01, 0x3, 0x3, 0x0, 0x4, 0x8, 0x2, 0x4, 0x3c5b, 0x90, 0x24, 0x9, 0x1, 0x1f461e2c, 0x2, 0xe661, 0x4, 0x7, 0x3, 0x80002, 0x4c74, 0x80000000, 0x242, 0x0, 0xe, 0x1000, 0x71, 0x7, 0x7, 0x1, 0x7, 0x0, 0x3e, 0x8f, 0x6, 0x6, 0x0, 0x5, 0x0, 0x8, 0x0, 0x5, 0x0, 0x2, 0x6, 0xb, 0x4, 0x1, 0x40], [0x10000007, 0xffff, 0x8000012d, 0x8000, 0x10, 0xfffffff3, 0x129432e6, 0xcd, 0xe, 0x9, 0x2c1, 0x6c9, 0x8, 0xfffffffc, 0x3, 0x0, 0x7, 0xd, 0x5573, 0xe, 0x316, 0x78, 0xea4, 0x0, 0xda7a, 0x4, 0x8000, 0x2009, 0x400, 0x401, 0x6, 0x7, 0x4, 0x5, 0x5, 0x5f2e, 0x4, 0x0, 0x2, 0x2, 0x9, 0x4, 0x9, 0x8, 0x0, 0x6, 0x7, 0x8000, 0x0, 0xfe000000, 0xffff, 0x2, 0x7f, 0x5, 0x3, 0x3, 0x9, 0x1, 0x7, 0x3, 0x9, 0x48c93690, 0x142, 0x2], [0x7, 0x3, 0x0, 0x4, 0xfffffffe, 0x9, 0x8d2, 0x8, 0x5, 0x7fff, 0x0, 0x5, 0xb, 0x20004, 0x5, 0x5, 0x0, 0x1ef, 0x5, 0x100006, 0x401, 0x3, 0x9, 0x3e7, 0x9, 0x5, 0x2, 0x2, 0x3, 0xd, 0x4, 0x6d01, 0x1, 0x9, 0x800000, 0x200, 0x80, 0x3, 0x80000001, 0x2950bfaf, 0x0, 0xa2, 0x7, 0x5, 0x5, 0x5, 0xac8, 0x7, 0x2, 0x3, 0x7ff, 0x1, 0x0, 0x1, 0xffff, 0x3, 0x4, 0x1c, 0x120000, 0x403, 0x3, 0xa2ed, 0x404, 0x25], [0x9, 0xbb31, 0x296, 0xb, 0x57a, 0x938, 0x6, 0x6, 0x0, 0x5, 0xce7, 0x53f53814, 0x0, 0xa, 0x5, 0x3, 0x101, 0x10000, 0x6, 0x207fff, 0xffff, 0x2, 0x2, 0x5, 0x1, 0x2, 0x148, 0x60a7, 0x6, 0x6, 0xffffffff, 0x80000000, 0x5, 0x8, 0xc8, 0x7, 0xfffff000, 0xffff, 0x3, 0x7e, 0x20100, 0x9602, 0x7, 0x2, 0x6, 0x6, 0x1, 0x50080, 0x5, 0x8, 0x1002, 0xa1f, 0xc, 0x7, 0x1, 0x6c1b, 0x8000, 0x4, 0x5, 0xb1e, 0x9, 0x200, 0xffff3441, 0x7]}, 0x45c) ppoll(&(0x7f00000000c0)=[{}, {}], 0x20000000000000dc, 0x0, 0x0, 0x0) 16m55.980532157s ago: executing program 4 (id=41512): rt_sigaction(0xd, 0x0, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000000440)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8014) mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(&(0x7f0000000340)='./file0/../file0\x00', &(0x7f0000000280)='./file0/file0\x00', 0x0, 0xb101e, 0x0) 16m55.974619688s ago: executing program 4 (id=41514): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r3, &(0x7f0000000340)=ANY=[], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r5, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r6, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) mount$fuseblk(0x0, &(0x7f0000000100)='./cgroup\x00', &(0x7f0000000140), 0x3818000, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESDEC, @ANYRES16=r2]) 16m55.899471436s ago: executing program 4 (id=41515): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r3, &(0x7f0000000440)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8014) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x5c, r6, 0x1, 0x70bd29, 0x0, {}, [@WGDEVICE_A_IFNAME={0x14, 0x2, 'wg0\x00'}, @WGDEVICE_A_PEERS={0x34, 0x8, 0x0, 0x1, [{0x30, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x8, 0x9, 0x0, 0x1, [{0x4}]}, @WGPEER_A_PUBLIC_KEY={0x24}]}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004840}, 0x44000) 16m55.838393422s ago: executing program 65 (id=41515): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r3, &(0x7f0000000440)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8014) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x5c, r6, 0x1, 0x70bd29, 0x0, {}, [@WGDEVICE_A_IFNAME={0x14, 0x2, 'wg0\x00'}, @WGDEVICE_A_PEERS={0x34, 0x8, 0x0, 0x1, [{0x30, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x8, 0x9, 0x0, 0x1, [{0x4}]}, @WGPEER_A_PUBLIC_KEY={0x24}]}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004840}, 0x44000) 16m44.313720263s ago: executing program 3 (id=41784): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=0xffffffffffffffff, @ANYRES64=r0], 0x118) rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000340)=ANY=[], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r5, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r6, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) mount$fuseblk(0x0, &(0x7f0000000100)='./cgroup\x00', &(0x7f0000000140), 0x3818000, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESDEC, @ANYRES16=r1]) 16m43.83984118s ago: executing program 3 (id=41787): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$selinux_context(r4, 0x0, 0x0) 16m43.690606625s ago: executing program 3 (id=41788): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) syz_usb_connect(0x1, 0x24, &(0x7f0000000600)={{0x12, 0x1, 0x200, 0x1a, 0x2, 0x53, 0x8, 0x2040, 0xc61a, 0xf496, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x10, 0x8, 0x10, 0xde, [{{0x9, 0x4, 0xec, 0x0, 0x0, 0x10, 0x9, 0xe0, 0x7d}}]}}]}}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x1, [{0x0, 0x0}]}) 16m42.510254842s ago: executing program 3 (id=41805): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000000440)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8014) mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(&(0x7f0000000340)='./file0/../file0\x00', &(0x7f0000000280)='./file0/file0\x00', 0x0, 0xb101e, 0x0) 16m42.478196166s ago: executing program 3 (id=41806): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r0, @ANYRES64], 0x118) rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000340)=ANY=[], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r5, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r6, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) mount$fuseblk(0x0, &(0x7f0000000100)='./cgroup\x00', &(0x7f0000000140), 0x3818000, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESDEC, @ANYRES16=r1]) 16m42.412332482s ago: executing program 3 (id=41808): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='freezer.self_freezing\x00', 0x275a, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000340)=ANY=[], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r1, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r2, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f00000000c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) mount$tmpfs(0x0, 0x0, &(0x7f00000018c0), 0x1, 0x0) 16m42.3328321s ago: executing program 66 (id=41808): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='freezer.self_freezing\x00', 0x275a, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000340)=ANY=[], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r1, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r2, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f00000000c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) mount$tmpfs(0x0, 0x0, &(0x7f00000018c0), 0x1, 0x0) 2.158431346s ago: executing program 2 (id=71828): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r1, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) getsockopt$inet6_tcp_buf(r2, 0x6, 0x21, &(0x7f00000001c0)=""/228, &(0x7f0000000040)=0xe4) 1.942828278s ago: executing program 2 (id=71834): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f28, 0x4}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x80c1) pipe2$9p(&(0x7f00000001c0), 0x0) 1.890317433s ago: executing program 6 (id=71835): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r0, @ANYRES64], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r1, 0x0, 0x0, 0x805, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r2, &(0x7f0000000440)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8014) sendmmsg$inet6(r2, &(0x7f00000075c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40804) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f00000009c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = getpid() setresuid(0xee01, 0x0, 0x0) r5 = syz_pidfd_open(r4, 0x0) setns(r5, 0x24020000) syz_clone(0xb21e0000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.823053089s ago: executing program 2 (id=71836): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f28, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2, 0x10406) 1.743796467s ago: executing program 7 (id=71840): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f28, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x80c1) epoll_pwait2(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 1.71871044s ago: executing program 7 (id=71841): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f28, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x80c1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2, 0x10406) 1.670820725s ago: executing program 7 (id=71842): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r0, @ANYRES64], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r0, 0x0) ioctl$KVM_X86_SETUP_MCE(r0, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8000) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write(r1, 0x0, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="ec000000210001000000000000000000fc010000000000000000000000000000ac1414aa00000000000000000000000000000000000002090200000000000000", @ANYRES32=0x0, @ANYRES32=0x0], 0xec}}, 0x0) 1.547060067s ago: executing program 2 (id=71843): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f28, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r0, 0x0, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2, 0x10406) 1.370047174s ago: executing program 2 (id=71845): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f28, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x80c1) pipe2$9p(&(0x7f00000001c0), 0x0) 1.322452379s ago: executing program 1 (id=71847): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8=0x0, @ANYRES8=r1, @ANYRES64=r0], 0x118) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) statx(r1, 0x0, 0x1000, 0x40, &(0x7f0000000380)) 1.278659803s ago: executing program 1 (id=71848): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8=0x0, @ANYRES8=r0, @ANYRES64], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r1, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket(0x2, 0x2, 0x0) setsockopt$inet_opts(r2, 0x0, 0x19, 0x0, 0x0) 1.192892232s ago: executing program 2 (id=71849): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r0, @ANYRES64], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f28, 0x4}) sendmmsg$inet6(r1, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(0xffffffffffffffff, 0x0, 0x0) epoll_pwait2(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000001d80)={[0x3]}, 0x8) 968.483414ms ago: executing program 7 (id=71850): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f28, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x80c1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2, 0x10406) 751.059896ms ago: executing program 7 (id=71851): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r0, @ANYRES64], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f28, 0x4}) sendmmsg$inet6(r1, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x80c1) mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2, 0x10406) 610.43623ms ago: executing program 6 (id=71852): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8=0x0, @ANYRES8=r1, @ANYRES64=r0], 0x118) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) statx(r1, 0x0, 0x1000, 0x40, &(0x7f0000000380)) 428.478428ms ago: executing program 1 (id=71853): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f28, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x80c1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) 278.865073ms ago: executing program 6 (id=71854): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f00000075c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40804) r4 = getpid() setresuid(0xee01, 0x0, 0x0) r5 = syz_pidfd_open(r4, 0x0) setns(r5, 0x24020000) syz_clone(0xb21e0000, 0x0, 0x0, 0x0, 0x0, 0x0) 159.557245ms ago: executing program 1 (id=71855): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f28, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x80c1) pipe2$9p(&(0x7f00000001c0), 0x0) 139.939777ms ago: executing program 6 (id=71856): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f28, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2, 0x10406) 103.559191ms ago: executing program 6 (id=71857): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r0, 0x0, 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r1, 0x0, 0x0, 0x805, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r2, &(0x7f0000000440)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8014) sendmmsg$inet6(r2, &(0x7f00000075c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40804) r3 = getpid() setresuid(0xee01, 0x0, 0x0) r4 = syz_pidfd_open(r3, 0x0) setns(r4, 0x24020000) syz_clone(0xb21e0000, 0x0, 0x0, 0x0, 0x0, 0x0) 84.082662ms ago: executing program 1 (id=71858): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f28, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x80c1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) pipe2$9p(&(0x7f00000001c0), 0x0) 26.853648ms ago: executing program 7 (id=71859): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f28, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x80c1) pipe2$9p(&(0x7f00000001c0), 0x0) 25.887318ms ago: executing program 6 (id=71860): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000000440)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8014) sendmmsg$inet6(r3, &(0x7f00000075c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40804) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f00000009c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r5 = getpid() setresuid(0xee01, 0x0, 0x0) r6 = syz_pidfd_open(r5, 0x0) setns(r6, 0x24020000) syz_clone(0xb21e0000, 0x0, 0x0, 0x0, 0x0, 0x0) 0s ago: executing program 1 (id=71861): rt_sigaction(0xd, 0x0, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8=0x0, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r0, 0x0, 0x0) statx(r1, 0x0, 0x1000, 0x40, &(0x7f0000000380)) kernel console output (not intermixed with test programs): T29390] ? handle_mm_fault+0x169b/0x1b90 [ 2026.036196][T29390] dump_stack+0x19/0x20 [ 2026.036218][T29390] should_fail_ex+0x3d9/0x530 [ 2026.036238][T29390] should_failslab+0xac/0x100 [ 2026.036258][T29390] kmem_cache_alloc_noprof+0x42/0x430 [ 2026.036276][T29390] ? lock_vma_under_rcu+0x49d/0x540 [ 2026.036296][T29390] ? getname_flags+0xc6/0x710 [ 2026.036315][T29390] getname_flags+0xc6/0x710 [ 2026.036333][T29390] ? build_open_flags+0x487/0x600 [ 2026.036356][T29390] getname+0x1b/0x30 [ 2026.036373][T29390] do_sys_openat2+0xcb/0x1c0 [ 2026.036396][T29390] ? do_sys_open+0x100/0x100 [ 2026.036418][T29390] ? __kasan_check_write+0x18/0x20 [ 2026.036443][T29390] ? do_user_addr_fault+0xbc4/0x1200 [ 2026.036468][T29390] ? __cfi_ksys_write+0x10/0x10 [ 2026.036486][T29390] __x64_sys_openat+0x13a/0x170 [ 2026.036509][T29390] x64_sys_call+0xe69/0x2ee0 [ 2026.036535][T29390] do_syscall_64+0x58/0xf0 [ 2026.036557][T29390] ? clear_bhb_loop+0x50/0xa0 [ 2026.036578][T29390] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 2026.036596][T29390] RIP: 0033:0x7f4af758df10 [ 2026.036612][T29390] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 69 95 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 bc 95 02 00 8b 44 [ 2026.036628][T29390] RSP: 002b:00007f4af83afef0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 2026.036649][T29390] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f4af758df10 [ 2026.036663][T29390] RDX: 0000000000000002 RSI: 00007f4af7611c6c RDI: 00000000ffffff9c [ 2026.036677][T29390] RBP: 00007f4af7611c6c R08: 0000000000000000 R09: 0000000000000000 [ 2026.036690][T29390] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 2026.036702][T29390] R13: 0000000000000036 R14: 0000200000000040 R15: 00007ffebeefa1c8 [ 2026.036717][T29390] [ 2026.308323][T29402] bridge0: port 1(bridge_slave_0) entered blocking state [ 2026.315451][T29402] bridge0: port 1(bridge_slave_0) entered disabled state [ 2026.322682][T29402] bridge_slave_0: entered allmulticast mode [ 2026.332996][T29402] bridge_slave_0: entered promiscuous mode [ 2026.342113][T29402] bridge0: port 2(bridge_slave_1) entered blocking state [ 2026.358899][T29402] bridge0: port 2(bridge_slave_1) entered disabled state [ 2026.368758][T29402] bridge_slave_1: entered allmulticast mode [ 2026.380965][T29402] bridge_slave_1: entered promiscuous mode [ 2026.421508][T22780] bridge_slave_1: left allmulticast mode [ 2026.429197][T22780] bridge_slave_1: left promiscuous mode [ 2026.437074][T22780] bridge0: port 2(bridge_slave_1) entered disabled state [ 2026.444870][T22780] bridge_slave_0: left allmulticast mode [ 2026.450511][T22780] bridge_slave_0: left promiscuous mode [ 2026.456132][T22780] bridge0: port 1(bridge_slave_0) entered disabled state [ 2026.578141][T29402] bridge0: port 2(bridge_slave_1) entered blocking state [ 2026.585232][T29402] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2026.594254][T22780] veth1_macvtap: left promiscuous mode [ 2026.600597][T22780] veth0_vlan: left promiscuous mode [ 2026.681547][ T293] bridge0: port 2(bridge_slave_1) entered disabled state [ 2026.695495][T15650] bridge0: port 1(bridge_slave_0) entered blocking state [ 2026.702554][T15650] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2026.717433][ T293] bridge0: port 2(bridge_slave_1) entered blocking state [ 2026.724500][ T293] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2026.764188][T29402] veth0_vlan: entered promiscuous mode [ 2026.787665][T29402] veth1_macvtap: entered promiscuous mode [ 2030.632558][T29668] netlink: 156 bytes leftover after parsing attributes in process `syz.7.59713'. [ 2030.675421][T29668] incfs: Backing dir is not set, filesystem can't be mounted. [ 2030.683041][T29668] incfs: mount failed -2 [ 2034.036131][T29913] netlink: 156 bytes leftover after parsing attributes in process `syz.7.59834'. [ 2034.054648][T29913] incfs: Backing dir is not set, filesystem can't be mounted. [ 2034.072467][T29913] incfs: mount failed -2 [ 2035.520414][T30014] netlink: 'syz.6.59883': attribute type 16 has an invalid length. [ 2035.538526][T30014] netlink: 64130 bytes leftover after parsing attributes in process `syz.6.59883'. [ 2036.308421][T30096] netlink: 'syz.7.59923': attribute type 16 has an invalid length. [ 2036.326709][T30096] netlink: 64130 bytes leftover after parsing attributes in process `syz.7.59923'. [ 2036.635086][T30126] FAULT_INJECTION: forcing a failure. [ 2036.635086][T30126] name failslab, interval 1, probability 0, space 0, times 0 [ 2036.653744][T30126] CPU: 1 UID: 0 PID: 30126 Comm: syz.7.59938 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 2036.653775][T30126] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2036.653787][T30126] Call Trace: [ 2036.653794][T30126] [ 2036.653802][T30126] __dump_stack+0x21/0x30 [ 2036.653831][T30126] dump_stack_lvl+0x10c/0x190 [ 2036.653855][T30126] ? __cfi_dump_stack_lvl+0x10/0x10 [ 2036.653880][T30126] dump_stack+0x19/0x20 [ 2036.653901][T30126] should_fail_ex+0x3d9/0x530 [ 2036.653922][T30126] should_failslab+0xac/0x100 [ 2036.653943][T30126] kmem_cache_alloc_noprof+0x42/0x430 [ 2036.653960][T30126] ? getname_flags+0xc6/0x710 [ 2036.653979][T30126] ? __kasan_check_write+0x18/0x20 [ 2036.654005][T30126] getname_flags+0xc6/0x710 [ 2036.654024][T30126] user_path_at+0x2b/0x60 [ 2036.654044][T30126] path_getxattr+0xa6/0x200 [ 2036.654064][T30126] ? path_setxattr+0x560/0x560 [ 2036.654084][T30126] __x64_sys_getxattr+0xa5/0xc0 [ 2036.654110][T30126] x64_sys_call+0x2c80/0x2ee0 [ 2036.654134][T30126] do_syscall_64+0x58/0xf0 [ 2036.654158][T30126] ? clear_bhb_loop+0x50/0xa0 [ 2036.654178][T30126] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 2036.654197][T30126] RIP: 0033:0x7f66ba98f6c9 [ 2036.654213][T30126] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2036.654230][T30126] RSP: 002b:00007f66bb756038 EFLAGS: 00000246 ORIG_RAX: 00000000000000bf [ 2036.654251][T30126] RAX: ffffffffffffffda RBX: 00007f66babe5fa0 RCX: 00007f66ba98f6c9 [ 2036.654267][T30126] RDX: 0000000000000000 RSI: 00002000000001c0 RDI: 0000200000000140 [ 2036.654281][T30126] RBP: 00007f66bb756090 R08: 0000000000000000 R09: 0000000000000000 [ 2036.654294][T30126] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2036.654307][T30126] R13: 00007f66babe6038 R14: 00007f66babe5fa0 R15: 00007ffca0ec1cf8 [ 2036.654323][T30126] [ 2036.826637][T30141] incfs: Backing dir is not set, filesystem can't be mounted. [ 2036.865987][T30141] incfs: mount failed -2 [ 2038.351963][T30272] netlink: 'syz.6.60011': attribute type 16 has an invalid length. [ 2038.371981][T30272] netlink: 64138 bytes leftover after parsing attributes in process `syz.6.60011'. [ 2038.924671][T30309] incfs: Backing dir is not set, filesystem can't be mounted. [ 2038.942559][T30309] incfs: mount failed -2 [ 2041.870928][T30463] netlink: 'syz.7.60105': attribute type 16 has an invalid length. [ 2041.887666][T30463] netlink: 64130 bytes leftover after parsing attributes in process `syz.7.60105'. [ 2042.401416][T30531] FAULT_INJECTION: forcing a failure. [ 2042.401416][T30531] name failslab, interval 1, probability 0, space 0, times 0 [ 2042.433440][T30531] CPU: 0 UID: 0 PID: 30531 Comm: syz.7.60140 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 2042.433472][T30531] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2042.433484][T30531] Call Trace: [ 2042.433491][T30531] [ 2042.433498][T30531] __dump_stack+0x21/0x30 [ 2042.433528][T30531] dump_stack_lvl+0x10c/0x190 [ 2042.433551][T30531] ? __cfi_dump_stack_lvl+0x10/0x10 [ 2042.433576][T30531] dump_stack+0x19/0x20 [ 2042.433598][T30531] should_fail_ex+0x3d9/0x530 [ 2042.433618][T30531] should_failslab+0xac/0x100 [ 2042.433639][T30531] kmem_cache_alloc_noprof+0x42/0x430 [ 2042.433657][T30531] ? getname_flags+0xc6/0x710 [ 2042.433676][T30531] ? __kasan_check_write+0x18/0x20 [ 2042.433703][T30531] getname_flags+0xc6/0x710 [ 2042.433722][T30531] user_path_at+0x2b/0x60 [ 2042.433742][T30531] path_getxattr+0xa6/0x200 [ 2042.433761][T30531] ? path_setxattr+0x560/0x560 [ 2042.433781][T30531] __x64_sys_getxattr+0xa5/0xc0 [ 2042.433806][T30531] x64_sys_call+0x2c80/0x2ee0 [ 2042.433832][T30531] do_syscall_64+0x58/0xf0 [ 2042.433854][T30531] ? clear_bhb_loop+0x50/0xa0 [ 2042.433874][T30531] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 2042.433893][T30531] RIP: 0033:0x7f66ba98f6c9 [ 2042.433909][T30531] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2042.433925][T30531] RSP: 002b:00007f66bb756038 EFLAGS: 00000246 ORIG_RAX: 00000000000000bf [ 2042.433946][T30531] RAX: ffffffffffffffda RBX: 00007f66babe5fa0 RCX: 00007f66ba98f6c9 [ 2042.433962][T30531] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2042.433974][T30531] RBP: 00007f66bb756090 R08: 0000000000000000 R09: 0000000000000000 [ 2042.433987][T30531] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2042.433999][T30531] R13: 00007f66babe6038 R14: 00007f66babe5fa0 R15: 00007ffca0ec1cf8 [ 2042.434015][T30531] [ 2043.255782][T30573] incfs: Backing dir is not set, filesystem can't be mounted. [ 2043.274219][T30573] incfs: mount failed -2 [ 2044.013761][T30589] netlink: 'syz.1.60168': attribute type 16 has an invalid length. [ 2044.031875][T30589] netlink: 64130 bytes leftover after parsing attributes in process `syz.1.60168'. [ 2045.608116][T30691] netlink: 'syz.2.60219': attribute type 16 has an invalid length. [ 2045.633238][T30691] netlink: 64130 bytes leftover after parsing attributes in process `syz.2.60219'. [ 2046.167615][T30745] netlink: 'syz.2.60246': attribute type 16 has an invalid length. [ 2046.193243][T30745] netlink: 64130 bytes leftover after parsing attributes in process `syz.2.60246'. [ 2046.256341][T30765] netlink: 'syz.2.60256': attribute type 16 has an invalid length. [ 2046.272547][T30765] netlink: 64138 bytes leftover after parsing attributes in process `syz.2.60256'. [ 2046.283223][T30763] incfs: Backing dir is not set, filesystem can't be mounted. [ 2046.290710][T30763] incfs: mount failed -2 [ 2046.320166][T30772] binder: Unknown parameter 'c' [ 2046.365972][T30783] netlink: 'syz.1.60262': attribute type 16 has an invalid length. [ 2046.377606][T30783] netlink: 64130 bytes leftover after parsing attributes in process `syz.1.60262'. [ 2046.415644][T30790] incfs: Backing dir is not set, filesystem can't be mounted. [ 2046.428434][T30790] incfs: mount failed -2 [ 2046.518743][T30811] netlink: 'syz.1.60276': attribute type 16 has an invalid length. [ 2046.538788][T30811] netlink: 64130 bytes leftover after parsing attributes in process `syz.1.60276'. [ 2046.673632][T30837] netlink: 'syz.6.60288': attribute type 16 has an invalid length. [ 2046.703189][T30837] netlink: 64138 bytes leftover after parsing attributes in process `syz.6.60288'. [ 2047.665373][T30882] incfs: Backing dir is not set, filesystem can't be mounted. [ 2047.683157][T30882] incfs: mount failed -2 [ 2047.713130][ T10] usb 3-1: new full-speed USB device number 114 using dummy_hcd [ 2047.874421][T30871] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2047.883033][T30871] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2047.905077][ T10] usb 3-1: unable to get BOS descriptor or descriptor too short [ 2047.914385][ T10] usb 3-1: unable to read config index 0 descriptor/start: -71 [ 2047.921956][ T10] usb 3-1: can't read configurations, error -71 [ 2048.567633][T30949] netlink: 'syz.1.60342': attribute type 16 has an invalid length. [ 2048.575704][T30949] netlink: 64130 bytes leftover after parsing attributes in process `syz.1.60342'. [ 2048.783236][T18451] usb 8-1: new full-speed USB device number 96 using dummy_hcd [ 2048.954654][T30946] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2048.967669][T30946] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2048.986460][T18451] usb 8-1: unable to get BOS descriptor or descriptor too short [ 2049.002120][T18451] usb 8-1: unable to read config index 0 descriptor/start: -71 [ 2049.019868][T18451] usb 8-1: can't read configurations, error -71 [ 2050.284235][T31047] SELinux: truncated policydb string identifier [ 2050.290648][T31047] SELinux: failed to load policy [ 2051.710404][T15650] bridge_slave_1: left allmulticast mode [ 2051.716108][T15650] bridge_slave_1: left promiscuous mode [ 2051.721713][T15650] bridge0: port 2(bridge_slave_1) entered disabled state [ 2051.739927][T15650] bridge_slave_0: left allmulticast mode [ 2051.753073][T15650] bridge_slave_0: left promiscuous mode [ 2051.763126][T15650] bridge0: port 1(bridge_slave_0) entered disabled state [ 2051.812928][ T10] usb 3-1: new full-speed USB device number 116 using dummy_hcd [ 2051.904179][T15650] veth1_macvtap: left promiscuous mode [ 2051.909699][T15650] veth0_vlan: left promiscuous mode [ 2051.996955][T31127] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2052.005875][T31127] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2052.027909][ T10] usb 3-1: unable to get BOS descriptor or descriptor too short [ 2052.040468][ T10] usb 3-1: unable to read config index 0 descriptor/start: -71 [ 2052.048597][T31130] bridge0: port 1(bridge_slave_0) entered blocking state [ 2052.059409][ T10] usb 3-1: can't read configurations, error -71 [ 2052.065896][T31130] bridge0: port 1(bridge_slave_0) entered disabled state [ 2052.073681][T31130] bridge_slave_0: entered allmulticast mode [ 2052.081470][T31130] bridge_slave_0: entered promiscuous mode [ 2052.088146][T31130] bridge0: port 2(bridge_slave_1) entered blocking state [ 2052.095535][T31130] bridge0: port 2(bridge_slave_1) entered disabled state [ 2052.102650][T31130] bridge_slave_1: entered allmulticast mode [ 2052.111477][T31130] bridge_slave_1: entered promiscuous mode [ 2052.221348][T31130] bridge0: port 2(bridge_slave_1) entered blocking state [ 2052.228436][T31130] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2052.235722][T31130] bridge0: port 1(bridge_slave_0) entered blocking state [ 2052.242746][T31130] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2052.276326][T15650] bridge0: port 1(bridge_slave_0) entered disabled state [ 2052.284125][T15650] bridge0: port 2(bridge_slave_1) entered disabled state [ 2052.293890][T22780] bridge0: port 1(bridge_slave_0) entered blocking state [ 2052.300921][T22780] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2052.312754][T15650] bridge0: port 2(bridge_slave_1) entered blocking state [ 2052.319827][T15650] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2052.358463][T31130] veth0_vlan: entered promiscuous mode [ 2052.371217][T31130] veth1_macvtap: entered promiscuous mode [ 2052.390826][T31185] netlink: 'syz.7.60454': attribute type 16 has an invalid length. [ 2052.398987][T31185] netlink: 64138 bytes leftover after parsing attributes in process `syz.7.60454'. [ 2052.889549][T31235] incfs: Backing dir is not set, filesystem can't be mounted. [ 2052.907273][T31235] incfs: mount failed -2 [ 2052.999818][T31251] netlink: 'syz.2.60488': attribute type 16 has an invalid length. [ 2053.008138][T31251] netlink: 64130 bytes leftover after parsing attributes in process `syz.2.60488'. [ 2056.858763][T31491] FAULT_INJECTION: forcing a failure. [ 2056.858763][T31491] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2056.892631][T31491] CPU: 1 UID: 0 PID: 31491 Comm: syz.7.60605 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 2056.892664][T31491] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2056.892676][T31491] Call Trace: [ 2056.892683][T31491] [ 2056.892691][T31491] __dump_stack+0x21/0x30 [ 2056.892721][T31491] dump_stack_lvl+0x10c/0x190 [ 2056.892744][T31491] ? __cfi_dump_stack_lvl+0x10/0x10 [ 2056.892768][T31491] ? check_stack_object+0x82/0x140 [ 2056.892786][T31491] ? __virt_addr_valid+0x2a6/0x380 [ 2056.892807][T31491] dump_stack+0x19/0x20 [ 2056.892829][T31491] should_fail_ex+0x3d9/0x530 [ 2056.892849][T31491] should_fail+0xf/0x20 [ 2056.892867][T31491] should_fail_usercopy+0x1e/0x30 [ 2056.892887][T31491] _copy_from_user+0x22/0xb0 [ 2056.892909][T31491] memdup_sockptr_noprof+0xa7/0x110 [ 2056.892938][T31491] do_ip_setsockopt+0x1ca8/0x29e0 [ 2056.892964][T31491] ? __cfi_do_ip_setsockopt+0x10/0x10 [ 2056.892990][T31491] ? selinux_socket_setsockopt+0x2ea/0x390 [ 2056.893019][T31491] ? __cfi_selinux_socket_setsockopt+0x10/0x10 [ 2056.893047][T31491] ip_setsockopt+0x63/0x100 [ 2056.893073][T31491] raw_setsockopt+0xf4/0x1a0 [ 2056.893094][T31491] sock_common_setsockopt+0xb5/0xd0 [ 2056.893116][T31491] ? __cfi_sock_common_setsockopt+0x10/0x10 [ 2056.893136][T31491] do_sock_setsockopt+0x26d/0x400 [ 2056.893162][T31491] ? __cfi_do_sock_setsockopt+0x10/0x10 [ 2056.893189][T31491] __x64_sys_setsockopt+0x1b8/0x250 [ 2056.893222][T31491] x64_sys_call+0x2adc/0x2ee0 [ 2056.893248][T31491] do_syscall_64+0x58/0xf0 [ 2056.893271][T31491] ? clear_bhb_loop+0x50/0xa0 [ 2056.893292][T31491] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 2056.893312][T31491] RIP: 0033:0x7f66ba98f6c9 [ 2056.893328][T31491] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2056.893344][T31491] RSP: 002b:00007f66bb756038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2056.893365][T31491] RAX: ffffffffffffffda RBX: 00007f66babe5fa0 RCX: 00007f66ba98f6c9 [ 2056.893380][T31491] RDX: 0000000000000029 RSI: 0000000000000000 RDI: 0000000000000007 [ 2056.893392][T31491] RBP: 00007f66bb756090 R08: 000000000000001c R09: 0000000000000000 [ 2056.893405][T31491] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2056.893418][T31491] R13: 00007f66babe6038 R14: 00007f66babe5fa0 R15: 00007ffca0ec1cf8 [ 2056.893434][T31491] [ 2057.290930][T31503] netlink: 'syz.6.60613': attribute type 16 has an invalid length. [ 2057.324028][T31503] netlink: 64130 bytes leftover after parsing attributes in process `syz.6.60613'. [ 2057.492097][T31531] netlink: 'syz.2.60624': attribute type 16 has an invalid length. [ 2057.520509][T31531] netlink: 64138 bytes leftover after parsing attributes in process `syz.2.60624'. [ 2057.693395][T31561] netlink: 'syz.7.60640': attribute type 16 has an invalid length. [ 2057.715525][T31561] netlink: 64138 bytes leftover after parsing attributes in process `syz.7.60640'. [ 2057.863728][T31593] netlink: 'syz.1.60655': attribute type 16 has an invalid length. [ 2057.878266][T31593] netlink: 64138 bytes leftover after parsing attributes in process `syz.1.60655'. [ 2058.168582][T31651] incfs: Backing dir is not set, filesystem can't be mounted. [ 2058.178277][T31651] incfs: mount failed -2 [ 2058.485209][ T36] audit: type=1400 audit(1763284014.159:445): avc: denied { write } for pid=31681 comm="syz.1.60700" name="file2" dev="tmpfs" ino=334 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 2058.542644][ T36] audit: type=1400 audit(1763284014.159:446): avc: denied { open } for pid=31681 comm="syz.1.60700" path="/52/file2" dev="tmpfs" ino=334 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 2058.582928][ T36] audit: type=1400 audit(1763284014.189:447): avc: denied { ioctl } for pid=31681 comm="syz.1.60700" path="/52/file2" dev="tmpfs" ino=334 ioctlcmd=0x127a scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 2058.587122][T31686] incfs: Backing dir is not set, filesystem can't be mounted. [ 2058.634373][T31686] incfs: mount failed -2 [ 2059.197801][T31756] incfs: Backing dir is not set, filesystem can't be mounted. [ 2059.209255][T31756] incfs: mount failed -2 [ 2059.547365][T31836] FAULT_INJECTION: forcing a failure. [ 2059.547365][T31836] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2059.562020][T31836] CPU: 1 UID: 0 PID: 31836 Comm: syz.2.60776 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 2059.562049][T31836] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2059.562061][T31836] Call Trace: [ 2059.562068][T31836] [ 2059.562075][T31836] __dump_stack+0x21/0x30 [ 2059.562104][T31836] dump_stack_lvl+0x10c/0x190 [ 2059.562126][T31836] ? __cfi_dump_stack_lvl+0x10/0x10 [ 2059.562151][T31836] dump_stack+0x19/0x20 [ 2059.562173][T31836] should_fail_ex+0x3d9/0x530 [ 2059.562192][T31836] should_fail+0xf/0x20 [ 2059.562208][T31836] should_fail_usercopy+0x1e/0x30 [ 2059.562228][T31836] strncpy_from_user+0x28/0x270 [ 2059.562247][T31836] path_setxattr+0xf3/0x560 [ 2059.562267][T31836] ? simple_xattrs_free+0x180/0x180 [ 2059.562298][T31836] ? __cfi_ksys_write+0x10/0x10 [ 2059.562317][T31836] __x64_sys_lsetxattr+0xc6/0xe0 [ 2059.562342][T31836] x64_sys_call+0x2db8/0x2ee0 [ 2059.562366][T31836] do_syscall_64+0x58/0xf0 [ 2059.562387][T31836] ? clear_bhb_loop+0x50/0xa0 [ 2059.562408][T31836] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 2059.562429][T31836] RIP: 0033:0x7f4af758f6c9 [ 2059.562444][T31836] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2059.562461][T31836] RSP: 002b:00007f4af83b2038 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd [ 2059.562482][T31836] RAX: ffffffffffffffda RBX: 00007f4af77e5fa0 RCX: 00007f4af758f6c9 [ 2059.562497][T31836] RDX: 0000200000000580 RSI: 0000200000000540 RDI: 0000200000000400 [ 2059.562511][T31836] RBP: 00007f4af83b2090 R08: 0000000000000003 R09: 0000000000000000 [ 2059.562523][T31836] R10: 0000000000000024 R11: 0000000000000246 R12: 0000000000000001 [ 2059.562535][T31836] R13: 00007f4af77e6038 R14: 00007f4af77e5fa0 R15: 00007ffebeefa1c8 [ 2059.562551][T31836] [ 2061.659944][T31996] netlink: 'syz.1.60855': attribute type 16 has an invalid length. [ 2061.678936][T31996] netlink: 64130 bytes leftover after parsing attributes in process `syz.1.60855'. [ 2061.857570][T32016] netlink: 'syz.1.60865': attribute type 16 has an invalid length. [ 2061.882339][T32016] netlink: 64138 bytes leftover after parsing attributes in process `syz.1.60865'. [ 2062.402307][ T865] usb 7-1: new full-speed USB device number 84 using dummy_hcd [ 2062.565871][T32049] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2062.592331][T32049] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2062.613275][ T865] usb 7-1: unable to get BOS descriptor or descriptor too short [ 2062.642963][ T865] usb 7-1: unable to read config index 0 descriptor/start: -71 [ 2062.650549][ T865] usb 7-1: can't read configurations, error -71 [ 2063.605583][T32140] FAULT_INJECTION: forcing a failure. [ 2063.605583][T32140] name failslab, interval 1, probability 0, space 0, times 0 [ 2063.618323][T32140] CPU: 0 UID: 0 PID: 32140 Comm: syz.1.60927 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 2063.618353][T32140] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2063.618365][T32140] Call Trace: [ 2063.618372][T32140] [ 2063.618380][T32140] __dump_stack+0x21/0x30 [ 2063.618410][T32140] dump_stack_lvl+0x10c/0x190 [ 2063.618434][T32140] ? __cfi_dump_stack_lvl+0x10/0x10 [ 2063.618458][T32140] ? is_bpf_text_address+0x17b/0x1a0 [ 2063.618481][T32140] dump_stack+0x19/0x20 [ 2063.618503][T32140] should_fail_ex+0x3d9/0x530 [ 2063.618523][T32140] should_failslab+0xac/0x100 [ 2063.618544][T32140] __kmalloc_cache_noprof+0x41/0x490 [ 2063.618563][T32140] ? _parse_integer_limit+0x195/0x1e0 [ 2063.618589][T32140] ? futex_lock_pi+0x77a/0xa10 [ 2063.618678][T32140] ? futex_lock_pi+0x100/0xa10 [ 2063.618699][T32140] futex_lock_pi+0x77a/0xa10 [ 2063.618719][T32140] ? kstrtoull+0x13b/0x1e0 [ 2063.618743][T32140] ? __cfi_futex_lock_pi+0x10/0x10 [ 2063.618764][T32140] ? __cfi_kstrtouint_from_user+0x10/0x10 [ 2063.618782][T32140] ? selinux_file_permission+0x309/0xb30 [ 2063.618808][T32140] ? __cfi_futex_wake_mark+0x10/0x10 [ 2063.618830][T32140] ? vfs_write+0x93e/0xf30 [ 2063.618849][T32140] do_futex+0x25c/0x500 [ 2063.618868][T32140] ? __cfi_do_futex+0x10/0x10 [ 2063.618886][T32140] ? mutex_unlock+0x8b/0x240 [ 2063.618904][T32140] ? __fget_files+0x2c5/0x340 [ 2063.618924][T32140] __se_sys_futex+0x28f/0x300 [ 2063.618943][T32140] ? fput+0x1a5/0x240 [ 2063.618964][T32140] ? __x64_sys_futex+0x110/0x110 [ 2063.618983][T32140] ? __cfi_ksys_write+0x10/0x10 [ 2063.619001][T32140] __x64_sys_futex+0xe9/0x110 [ 2063.619020][T32140] x64_sys_call+0x227f/0x2ee0 [ 2063.619046][T32140] do_syscall_64+0x58/0xf0 [ 2063.619068][T32140] ? clear_bhb_loop+0x50/0xa0 [ 2063.619089][T32140] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 2063.619108][T32140] RIP: 0033:0x7f61f318f6c9 [ 2063.619124][T32140] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2063.619140][T32140] RSP: 002b:00007f61f405c038 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 2063.619162][T32140] RAX: ffffffffffffffda RBX: 00007f61f33e5fa0 RCX: 00007f61f318f6c9 [ 2063.619177][T32140] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 00002000000040c0 [ 2063.619190][T32140] RBP: 00007f61f405c090 R08: 0000000000000000 R09: 0000000000000000 [ 2063.619204][T32140] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2063.619217][T32140] R13: 00007f61f33e6038 R14: 00007f61f33e5fa0 R15: 00007ffe1a274608 [ 2063.619234][T32140] [ 2064.018323][T32178] netlink: 'syz.1.60945': attribute type 16 has an invalid length. [ 2064.030008][T32178] netlink: 64138 bytes leftover after parsing attributes in process `syz.1.60945'. [ 2064.115428][T32201] incfs: Backing dir is not set, filesystem can't be mounted. [ 2064.124914][T32204] netlink: 'syz.1.60958': attribute type 16 has an invalid length. [ 2064.125812][T32201] incfs: mount failed -2 [ 2064.134558][T32204] netlink: 64138 bytes leftover after parsing attributes in process `syz.1.60958'. [ 2064.155055][T32208] FAULT_INJECTION: forcing a failure. [ 2064.155055][T32208] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2064.175429][T32208] CPU: 1 UID: 0 PID: 32208 Comm: syz.2.60960 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 2064.175458][T32208] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2064.175471][T32208] Call Trace: [ 2064.175477][T32208] [ 2064.175485][T32208] __dump_stack+0x21/0x30 [ 2064.175514][T32208] dump_stack_lvl+0x10c/0x190 [ 2064.175537][T32208] ? __cfi_dump_stack_lvl+0x10/0x10 [ 2064.175561][T32208] dump_stack+0x19/0x20 [ 2064.175583][T32208] should_fail_ex+0x3d9/0x530 [ 2064.175602][T32208] should_fail+0xf/0x20 [ 2064.175619][T32208] should_fail_usercopy+0x1e/0x30 [ 2064.175638][T32208] strncpy_from_user+0x28/0x270 [ 2064.175657][T32208] getname_flags+0x102/0x710 [ 2064.175676][T32208] ? __fget_files+0x2c5/0x340 [ 2064.175695][T32208] user_path_at+0x2b/0x60 [ 2064.175714][T32208] __se_sys_mount+0x288/0x480 [ 2064.175731][T32208] ? ksys_write+0x1ef/0x250 [ 2064.175748][T32208] ? __x64_sys_mount+0xf0/0xf0 [ 2064.175767][T32208] __x64_sys_mount+0xc3/0xf0 [ 2064.175784][T32208] x64_sys_call+0x2021/0x2ee0 [ 2064.175809][T32208] do_syscall_64+0x58/0xf0 [ 2064.175832][T32208] ? clear_bhb_loop+0x50/0xa0 [ 2064.175852][T32208] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 2064.175870][T32208] RIP: 0033:0x7f4af758f6c9 [ 2064.175886][T32208] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2064.175902][T32208] RSP: 002b:00007f4af83b2038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2064.175922][T32208] RAX: ffffffffffffffda RBX: 00007f4af77e5fa0 RCX: 00007f4af758f6c9 [ 2064.175938][T32208] RDX: 0000000000000000 RSI: 00002000000000c0 RDI: 0000000000000000 [ 2064.175957][T32208] RBP: 00007f4af83b2090 R08: 0000000000000000 R09: 0000000000000000 [ 2064.175970][T32208] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2064.175982][T32208] R13: 00007f4af77e6038 R14: 00007f4af77e5fa0 R15: 00007ffebeefa1c8 [ 2064.175999][T32208] [ 2064.565840][T32226] incfs: Backing dir is not set, filesystem can't be mounted. [ 2064.592245][T32226] incfs: mount failed -2 [ 2064.972158][T18451] usb 3-1: new full-speed USB device number 118 using dummy_hcd [ 2065.031215][T32254] FAULT_INJECTION: forcing a failure. [ 2065.031215][T32254] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2065.044648][T32254] CPU: 0 UID: 0 PID: 32254 Comm: syz.6.60984 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 2065.044679][T32254] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2065.044691][T32254] Call Trace: [ 2065.044698][T32254] [ 2065.044705][T32254] __dump_stack+0x21/0x30 [ 2065.044733][T32254] dump_stack_lvl+0x10c/0x190 [ 2065.044755][T32254] ? __cfi_dump_stack_lvl+0x10/0x10 [ 2065.044780][T32254] dump_stack+0x19/0x20 [ 2065.044802][T32254] should_fail_ex+0x3d9/0x530 [ 2065.044822][T32254] should_fail+0xf/0x20 [ 2065.044838][T32254] should_fail_usercopy+0x1e/0x30 [ 2065.044858][T32254] strncpy_from_user+0x28/0x270 [ 2065.044877][T32254] path_setxattr+0xf3/0x560 [ 2065.044896][T32254] ? simple_xattrs_free+0x180/0x180 [ 2065.044925][T32254] ? __cfi_ksys_write+0x10/0x10 [ 2065.044943][T32254] __x64_sys_lsetxattr+0xc6/0xe0 [ 2065.044967][T32254] x64_sys_call+0x2db8/0x2ee0 [ 2065.044991][T32254] do_syscall_64+0x58/0xf0 [ 2065.045013][T32254] ? clear_bhb_loop+0x50/0xa0 [ 2065.045033][T32254] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 2065.045052][T32254] RIP: 0033:0x7fa0dff8f6c9 [ 2065.045068][T32254] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2065.045084][T32254] RSP: 002b:00007fa0de9e3038 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd [ 2065.045105][T32254] RAX: ffffffffffffffda RBX: 00007fa0e01e5fa0 RCX: 00007fa0dff8f6c9 [ 2065.045118][T32254] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2065.045130][T32254] RBP: 00007fa0de9e3090 R08: 0000000000000003 R09: 0000000000000000 [ 2065.045142][T32254] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2065.045153][T32254] R13: 00007fa0e01e6038 R14: 00007fa0e01e5fa0 R15: 00007ffda4f3d448 [ 2065.045168][T32254] [ 2065.065094][T32258] incfs: Backing dir is not set, filesystem can't be mounted. [ 2065.163139][T18451] usb 3-1: config 0 has no interfaces? [ 2065.189824][T32258] incfs: mount failed -2 [ 2065.211623][T18451] usb 3-1: New USB device found, idVendor=06cd, idProduct=0121, bcdDevice=dd.3d [ 2065.258169][T18451] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2065.266406][T18451] usb 3-1: Product: syz [ 2065.270570][T18451] usb 3-1: Manufacturer: syz [ 2065.275372][T18451] usb 3-1: SerialNumber: syz [ 2065.280914][T18451] usb 3-1: config 0 descriptor?? [ 2065.338260][T32282] incfs: Backing dir is not set, filesystem can't be mounted. [ 2065.345946][T32282] incfs: mount failed -2 [ 2065.442165][ T10] usb 2-1: new high-speed USB device number 103 using dummy_hcd [ 2065.479707][T32314] FAULT_INJECTION: forcing a failure. [ 2065.479707][T32314] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2065.492827][T32314] CPU: 0 UID: 0 PID: 32314 Comm: syz.7.61013 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 2065.492863][T32314] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2065.492875][T32314] Call Trace: [ 2065.492883][T32314] [ 2065.492890][T32314] __dump_stack+0x21/0x30 [ 2065.492919][T32314] dump_stack_lvl+0x10c/0x190 [ 2065.492942][T32314] ? __cfi_dump_stack_lvl+0x10/0x10 [ 2065.492967][T32314] dump_stack+0x19/0x20 [ 2065.492988][T32314] should_fail_ex+0x3d9/0x530 [ 2065.493008][T32314] should_fail+0xf/0x20 [ 2065.493024][T32314] should_fail_usercopy+0x1e/0x30 [ 2065.493043][T32314] strncpy_from_user+0x28/0x270 [ 2065.493062][T32314] getname_flags+0x102/0x710 [ 2065.493081][T32314] ? __fget_files+0x2c5/0x340 [ 2065.493101][T32314] user_path_at+0x2b/0x60 [ 2065.493121][T32314] __se_sys_mount+0x288/0x480 [ 2065.493138][T32314] ? ksys_write+0x1ef/0x250 [ 2065.493155][T32314] ? __x64_sys_mount+0xf0/0xf0 [ 2065.493174][T32314] __x64_sys_mount+0xc3/0xf0 [ 2065.493191][T32314] x64_sys_call+0x2021/0x2ee0 [ 2065.493215][T32314] do_syscall_64+0x58/0xf0 [ 2065.493238][T32314] ? clear_bhb_loop+0x50/0xa0 [ 2065.493258][T32314] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 2065.493277][T32314] RIP: 0033:0x7f66ba98f6c9 [ 2065.493293][T32314] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2065.493308][T32314] RSP: 002b:00007f66bb756038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2065.493329][T32314] RAX: ffffffffffffffda RBX: 00007f66babe5fa0 RCX: 00007f66ba98f6c9 [ 2065.493344][T32314] RDX: 0000000000000000 RSI: 00002000000000c0 RDI: 0000000000000000 [ 2065.493357][T32314] RBP: 00007f66bb756090 R08: 0000000000000000 R09: 0000000000000000 [ 2065.493370][T32314] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2065.493382][T32314] R13: 00007f66babe6038 R14: 00007f66babe5fa0 R15: 00007ffca0ec1cf8 [ 2065.493399][T32314] [ 2065.501285][T10391] usb 3-1: USB disconnect, device number 118 [ 2065.622118][ T10] usb 2-1: Using ep0 maxpacket: 32 [ 2065.708381][ T10] usb 2-1: config 0 has an invalid interface number: 196 but max is 0 [ 2065.731170][ T10] usb 2-1: config 0 has no interface number 0 [ 2065.737909][ T10] usb 2-1: config 0 interface 196 has no altsetting 0 [ 2065.746350][ T10] usb 2-1: New USB device found, idVendor=05ac, idProduct=77c2, bcdDevice=eb.3a [ 2065.757484][ T10] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2065.765613][ T10] usb 2-1: Product: syz [ 2065.769775][ T10] usb 2-1: Manufacturer: syz [ 2065.774549][ T10] usb 2-1: SerialNumber: syz [ 2065.790031][ T10] usb 2-1: config 0 descriptor?? [ 2065.841744][ T36] audit: type=1400 audit(1763284021.509:448): avc: denied { create } for pid=32333 comm="syz.7.61023" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 2065.995890][T32351] 9pnet_fd: Insufficient options for proto=fd [ 2066.037668][T32357] FAULT_INJECTION: forcing a failure. [ 2066.037668][T32357] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2066.053774][T32357] CPU: 1 UID: 0 PID: 32357 Comm: syz.6.61032 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 2066.053804][T32357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2066.053816][T32357] Call Trace: [ 2066.053824][T32357] [ 2066.053832][T32357] __dump_stack+0x21/0x30 [ 2066.053861][T32357] dump_stack_lvl+0x10c/0x190 [ 2066.053885][T32357] ? __cfi_dump_stack_lvl+0x10/0x10 [ 2066.053909][T32357] ? check_stack_object+0x12c/0x140 [ 2066.053929][T32357] dump_stack+0x19/0x20 [ 2066.053951][T32357] should_fail_ex+0x3d9/0x530 [ 2066.053971][T32357] should_fail+0xf/0x20 [ 2066.053988][T32357] should_fail_usercopy+0x1e/0x30 [ 2066.054009][T32357] _copy_to_user+0x24/0xa0 [ 2066.054031][T32357] simple_read_from_buffer+0xed/0x160 [ 2066.054054][T32357] proc_fail_nth_read+0x19e/0x210 [ 2066.054079][T32357] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 2066.054103][T32357] ? bpf_lsm_file_permission+0xd/0x20 [ 2066.054127][T32357] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 2066.054150][T32357] vfs_read+0x27d/0xc70 [ 2066.054168][T32357] ? __cfi_vfs_read+0x10/0x10 [ 2066.054184][T32357] ? __kasan_check_write+0x18/0x20 [ 2066.054209][T32357] ? mutex_lock+0x92/0x1c0 [ 2066.054228][T32357] ? __cfi_mutex_lock+0x10/0x10 [ 2066.054244][T32357] ? __fget_files+0x2c5/0x340 [ 2066.054265][T32357] ksys_read+0x141/0x250 [ 2066.054282][T32357] ? __cfi_ksys_read+0x10/0x10 [ 2066.054299][T32357] ? __kasan_check_write+0x18/0x20 [ 2066.054325][T32357] ? __kasan_check_read+0x15/0x20 [ 2066.054351][T32357] __x64_sys_read+0x7f/0x90 [ 2066.054368][T32357] x64_sys_call+0x2638/0x2ee0 [ 2066.054394][T32357] do_syscall_64+0x58/0xf0 [ 2066.054416][T32357] ? clear_bhb_loop+0x50/0xa0 [ 2066.054438][T32357] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 2066.054458][T32357] RIP: 0033:0x7fa0dff8e0dc [ 2066.054474][T32357] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 2066.054490][T32357] RSP: 002b:00007fa0de9e3030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2066.054511][T32357] RAX: ffffffffffffffda RBX: 00007fa0e01e5fa0 RCX: 00007fa0dff8e0dc [ 2066.054526][T32357] RDX: 000000000000000f RSI: 00007fa0de9e30a0 RDI: 0000000000000008 [ 2066.054539][T32357] RBP: 00007fa0de9e3090 R08: 0000000000000000 R09: 0000000000000000 [ 2066.054567][T32357] R10: 0000200000000080 R11: 0000000000000246 R12: 0000000000000001 [ 2066.054580][T32357] R13: 00007fa0e01e6038 R14: 00007fa0e01e5fa0 R15: 00007ffda4f3d448 [ 2066.054603][T32357] [ 2066.336830][ T10] ipheth 2-1:0.196: Unable to find endpoints [ 2066.356099][ T10] usb 2-1: USB disconnect, device number 103 [ 2067.108126][T32400] netlink: 'syz.6.61051': attribute type 16 has an invalid length. [ 2067.133531][T32400] netlink: 64138 bytes leftover after parsing attributes in process `syz.6.61051'. [ 2067.309275][T32422] FAULT_INJECTION: forcing a failure. [ 2067.309275][T32422] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2067.335601][T32422] CPU: 0 UID: 0 PID: 32422 Comm: syz.1.61063 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 2067.335634][T32422] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2067.335646][T32422] Call Trace: [ 2067.335653][T32422] [ 2067.335660][T32422] __dump_stack+0x21/0x30 [ 2067.335691][T32422] dump_stack_lvl+0x10c/0x190 [ 2067.335714][T32422] ? __cfi_dump_stack_lvl+0x10/0x10 [ 2067.335739][T32422] dump_stack+0x19/0x20 [ 2067.335761][T32422] should_fail_ex+0x3d9/0x530 [ 2067.335782][T32422] should_fail+0xf/0x20 [ 2067.335799][T32422] should_fail_usercopy+0x1e/0x30 [ 2067.335818][T32422] strncpy_from_user+0x28/0x270 [ 2067.335837][T32422] getname_flags+0x102/0x710 [ 2067.335856][T32422] ? __fget_files+0x2c5/0x340 [ 2067.335876][T32422] user_path_at+0x2b/0x60 [ 2067.335896][T32422] __se_sys_mount+0x288/0x480 [ 2067.335914][T32422] ? ksys_write+0x1ef/0x250 [ 2067.335931][T32422] ? __x64_sys_mount+0xf0/0xf0 [ 2067.335949][T32422] __x64_sys_mount+0xc3/0xf0 [ 2067.335967][T32422] x64_sys_call+0x2021/0x2ee0 [ 2067.335992][T32422] do_syscall_64+0x58/0xf0 [ 2067.336015][T32422] ? clear_bhb_loop+0x50/0xa0 [ 2067.336036][T32422] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 2067.336056][T32422] RIP: 0033:0x7f61f318f6c9 [ 2067.336072][T32422] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2067.336088][T32422] RSP: 002b:00007f61f405c038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2067.336109][T32422] RAX: ffffffffffffffda RBX: 00007f61f33e5fa0 RCX: 00007f61f318f6c9 [ 2067.336124][T32422] RDX: 0000000000000000 RSI: 00002000000000c0 RDI: 0000000000000000 [ 2067.336136][T32422] RBP: 00007f61f405c090 R08: 0000000000000000 R09: 0000000000000000 [ 2067.336149][T32422] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2067.336161][T32422] R13: 00007f61f33e6038 R14: 00007f61f33e5fa0 R15: 00007ffe1a274608 [ 2067.336177][T32422] [ 2067.568517][T32432] netlink: 'syz.1.61067': attribute type 16 has an invalid length. [ 2067.586196][T32432] netlink: 64130 bytes leftover after parsing attributes in process `syz.1.61067'. [ 2067.618875][T32436] incfs: Backing dir is not set, filesystem can't be mounted. [ 2067.642039][T32436] incfs: mount failed -2 [ 2068.166095][T32460] incfs: Backing dir is not set, filesystem can't be mounted. [ 2068.173747][T32460] incfs: mount failed -2 [ 2068.315973][T32478] FAULT_INJECTION: forcing a failure. [ 2068.315973][T32478] name failslab, interval 1, probability 0, space 0, times 0 [ 2068.347992][T32478] CPU: 0 UID: 0 PID: 32478 Comm: syz.6.61089 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 2068.348025][T32478] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2068.348038][T32478] Call Trace: [ 2068.348044][T32478] [ 2068.348052][T32478] __dump_stack+0x21/0x30 [ 2068.348082][T32478] dump_stack_lvl+0x10c/0x190 [ 2068.348106][T32478] ? __cfi_dump_stack_lvl+0x10/0x10 [ 2068.348131][T32478] dump_stack+0x19/0x20 [ 2068.348154][T32478] should_fail_ex+0x3d9/0x530 [ 2068.348174][T32478] should_failslab+0xac/0x100 [ 2068.348195][T32478] kmem_cache_alloc_noprof+0x42/0x430 [ 2068.348213][T32478] ? getname_flags+0xc6/0x710 [ 2068.348232][T32478] ? __kasan_check_write+0x18/0x20 [ 2068.348258][T32478] getname_flags+0xc6/0x710 [ 2068.348277][T32478] user_path_at+0x2b/0x60 [ 2068.348297][T32478] path_getxattr+0xa6/0x200 [ 2068.348317][T32478] ? path_setxattr+0x560/0x560 [ 2068.348337][T32478] __x64_sys_getxattr+0xa5/0xc0 [ 2068.348363][T32478] x64_sys_call+0x2c80/0x2ee0 [ 2068.348387][T32478] do_syscall_64+0x58/0xf0 [ 2068.348410][T32478] ? clear_bhb_loop+0x50/0xa0 [ 2068.348430][T32478] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 2068.348450][T32478] RIP: 0033:0x7fa0dff8f6c9 [ 2068.348466][T32478] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2068.348482][T32478] RSP: 002b:00007fa0de9e3038 EFLAGS: 00000246 ORIG_RAX: 00000000000000bf [ 2068.348503][T32478] RAX: ffffffffffffffda RBX: 00007fa0e01e5fa0 RCX: 00007fa0dff8f6c9 [ 2068.348517][T32478] RDX: 0000000000000000 RSI: 00002000000001c0 RDI: 0000200000000140 [ 2068.348531][T32478] RBP: 00007fa0de9e3090 R08: 0000000000000000 R09: 0000000000000000 [ 2068.348544][T32478] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2068.348556][T32478] R13: 00007fa0e01e6038 R14: 00007fa0e01e5fa0 R15: 00007ffda4f3d448 [ 2068.348573][T32478] [ 2068.586318][T32490] input: syz0 as /devices/virtual/input/input621 [ 2069.156984][T32559] netlink: 'syz.7.61128': attribute type 16 has an invalid length. [ 2069.191907][T32559] netlink: 64138 bytes leftover after parsing attributes in process `syz.7.61128'. [ 2069.274112][T32565] incfs: Backing dir is not set, filesystem can't be mounted. [ 2069.281647][T32565] incfs: mount failed -2 [ 2069.442955][T32575] netlink: 'syz.7.61138': attribute type 16 has an invalid length. [ 2069.450886][T32575] netlink: 64138 bytes leftover after parsing attributes in process `syz.7.61138'. [ 2069.747629][T32597] incfs: Backing dir is not set, filesystem can't be mounted. [ 2069.771951][T32597] incfs: mount failed -2 [ 2071.048317][T22780] bridge_slave_1: left allmulticast mode [ 2071.054034][T22780] bridge_slave_1: left promiscuous mode [ 2071.059634][T22780] bridge0: port 2(bridge_slave_1) entered disabled state [ 2071.082352][T22780] bridge_slave_0: left allmulticast mode [ 2071.088033][T22780] bridge_slave_0: left promiscuous mode [ 2071.103804][T22780] bridge0: port 1(bridge_slave_0) entered disabled state [ 2071.232017][T32678] bridge0: port 1(bridge_slave_0) entered blocking state [ 2071.240679][T32678] bridge0: port 1(bridge_slave_0) entered disabled state [ 2071.261832][T32678] bridge_slave_0: entered allmulticast mode [ 2071.269154][T32678] bridge_slave_0: entered promiscuous mode [ 2071.282864][T22780] veth1_macvtap: left promiscuous mode [ 2071.301824][T22780] veth0_vlan: left promiscuous mode [ 2071.421916][T32678] bridge0: port 2(bridge_slave_1) entered blocking state [ 2071.428969][T32678] bridge0: port 2(bridge_slave_1) entered disabled state [ 2071.451828][T32678] bridge_slave_1: entered allmulticast mode [ 2071.458280][T32678] bridge_slave_1: entered promiscuous mode [ 2071.605604][T32678] bridge0: port 2(bridge_slave_1) entered blocking state [ 2071.612687][T32678] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2071.619970][T32678] bridge0: port 1(bridge_slave_0) entered blocking state [ 2071.627019][T32678] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2071.671931][T22780] bridge0: port 1(bridge_slave_0) entered disabled state [ 2071.682617][T22780] bridge0: port 2(bridge_slave_1) entered disabled state [ 2071.702578][T15650] bridge0: port 1(bridge_slave_0) entered blocking state [ 2071.709606][T15650] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2071.739863][T15650] bridge0: port 2(bridge_slave_1) entered blocking state [ 2071.746921][T15650] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2071.807113][T32678] veth0_vlan: entered promiscuous mode [ 2071.835713][T32678] veth1_macvtap: entered promiscuous mode [ 2072.097120][T32728] netlink: 'syz.7.61200': attribute type 16 has an invalid length. [ 2072.112714][T32728] netlink: 64130 bytes leftover after parsing attributes in process `syz.7.61200'. [ 2073.508109][ T397] netlink: 'syz.6.61274': attribute type 16 has an invalid length. [ 2073.541175][ T397] netlink: 64130 bytes leftover after parsing attributes in process `syz.6.61274'. [ 2073.921527][ T419] netlink: 'syz.1.61283': attribute type 16 has an invalid length. [ 2073.944656][ T419] netlink: 64130 bytes leftover after parsing attributes in process `syz.1.61283'. [ 2075.300208][ T487] netlink: 'syz.7.61316': attribute type 16 has an invalid length. [ 2075.313995][ T487] netlink: 64130 bytes leftover after parsing attributes in process `syz.7.61316'. [ 2077.185550][ T626] netlink: 'syz.1.61383': attribute type 16 has an invalid length. [ 2077.215342][ T626] netlink: 64138 bytes leftover after parsing attributes in process `syz.1.61383'. [ 2077.822602][ T687] netlink: 'syz.6.61413': attribute type 16 has an invalid length. [ 2077.840675][ T687] netlink: 64138 bytes leftover after parsing attributes in process `syz.6.61413'. [ 2077.946708][ T697] netlink: 'syz.2.61416': attribute type 16 has an invalid length. [ 2077.960394][ T697] netlink: 64138 bytes leftover after parsing attributes in process `syz.2.61416'. [ 2078.851783][ T293] bridge_slave_1: left allmulticast mode [ 2078.857459][ T293] bridge_slave_1: left promiscuous mode [ 2078.871434][ T293] bridge0: port 2(bridge_slave_1) entered disabled state [ 2078.891765][ T293] bridge_slave_0: left allmulticast mode [ 2078.897566][ T293] bridge_slave_0: left promiscuous mode [ 2078.911588][ T293] bridge0: port 1(bridge_slave_0) entered disabled state [ 2078.968729][ T759] netlink: 'syz.2.61447': attribute type 16 has an invalid length. [ 2078.978772][ T759] netlink: 64138 bytes leftover after parsing attributes in process `syz.2.61447'. [ 2079.039190][ T293] veth1_macvtap: left promiscuous mode [ 2079.046045][ T293] veth0_vlan: left promiscuous mode [ 2079.179186][ T754] bridge0: port 1(bridge_slave_0) entered blocking state [ 2079.186444][ T754] bridge0: port 1(bridge_slave_0) entered disabled state [ 2079.193799][ T754] bridge_slave_0: entered allmulticast mode [ 2079.200277][ T754] bridge_slave_0: entered promiscuous mode [ 2079.206975][ T754] bridge0: port 2(bridge_slave_1) entered blocking state [ 2079.221333][ T754] bridge0: port 2(bridge_slave_1) entered disabled state [ 2079.228383][ T754] bridge_slave_1: entered allmulticast mode [ 2079.251735][ T754] bridge_slave_1: entered promiscuous mode [ 2079.376053][ T754] bridge0: port 2(bridge_slave_1) entered blocking state [ 2079.383129][ T754] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2079.390409][ T754] bridge0: port 1(bridge_slave_0) entered blocking state [ 2079.397474][ T754] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2079.441840][T22780] bridge0: port 1(bridge_slave_0) entered disabled state [ 2079.451687][T22780] bridge0: port 2(bridge_slave_1) entered disabled state [ 2079.482654][T22780] bridge0: port 1(bridge_slave_0) entered blocking state [ 2079.489696][T22780] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2079.502113][T22780] bridge0: port 2(bridge_slave_1) entered blocking state [ 2079.509152][T22780] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2079.533641][ T754] veth0_vlan: entered promiscuous mode [ 2079.549453][ T754] veth1_macvtap: entered promiscuous mode [ 2080.434193][ T909] netlink: 'syz.2.61515': attribute type 16 has an invalid length. [ 2080.444233][ T909] netlink: 64130 bytes leftover after parsing attributes in process `syz.2.61515'. [ 2081.564182][ T971] netlink: 'syz.7.61548': attribute type 16 has an invalid length. [ 2081.572237][ T971] netlink: 64138 bytes leftover after parsing attributes in process `syz.7.61548'. [ 2081.710115][ T991] netlink: 'syz.1.61557': attribute type 16 has an invalid length. [ 2081.718724][ T991] netlink: 64138 bytes leftover after parsing attributes in process `syz.1.61557'. [ 2084.511394][ T1208] netlink: 'syz.1.61663': attribute type 16 has an invalid length. [ 2084.533786][ T1208] netlink: 64138 bytes leftover after parsing attributes in process `syz.1.61663'. [ 2084.715252][ T1234] netlink: 'syz.2.61676': attribute type 16 has an invalid length. [ 2084.734700][ T1234] netlink: 64138 bytes leftover after parsing attributes in process `syz.2.61676'. [ 2085.298060][ T1297] netlink: 'syz.2.61707': attribute type 16 has an invalid length. [ 2085.307917][ T1297] netlink: 64138 bytes leftover after parsing attributes in process `syz.2.61707'. [ 2085.831505][ T1331] netlink: 'syz.7.61716': attribute type 16 has an invalid length. [ 2085.839505][ T1331] netlink: 64138 bytes leftover after parsing attributes in process `syz.7.61716'. [ 2087.463837][ T1447] netlink: 'syz.1.61779': attribute type 16 has an invalid length. [ 2087.480887][ T1447] netlink: 64130 bytes leftover after parsing attributes in process `syz.1.61779'. [ 2090.225225][ T1627] netlink: 'syz.7.61862': attribute type 16 has an invalid length. [ 2090.240390][ T1627] netlink: 64138 bytes leftover after parsing attributes in process `syz.7.61862'. [ 2091.073710][ T1674] netlink: 'syz.1.61887': attribute type 16 has an invalid length. [ 2091.090698][ T1674] netlink: 64138 bytes leftover after parsing attributes in process `syz.1.61887'. [ 2101.480486][ T2225] bridge0: port 1(bridge_slave_0) entered blocking state [ 2101.487543][ T2225] bridge0: port 1(bridge_slave_0) entered disabled state [ 2101.505818][ T2225] bridge_slave_0: entered allmulticast mode [ 2101.512500][ T2225] bridge_slave_0: entered promiscuous mode [ 2101.519503][ T2225] bridge0: port 2(bridge_slave_1) entered blocking state [ 2101.528203][ T2225] bridge0: port 2(bridge_slave_1) entered disabled state [ 2101.535289][ T2225] bridge_slave_1: entered allmulticast mode [ 2101.541679][ T2225] bridge_slave_1: entered promiscuous mode [ 2101.604755][ T293] bridge_slave_1: left allmulticast mode [ 2101.610820][ T293] bridge_slave_1: left promiscuous mode [ 2101.616439][ T293] bridge0: port 2(bridge_slave_1) entered disabled state [ 2101.640527][ T293] bridge_slave_0: left allmulticast mode [ 2101.646204][ T293] bridge_slave_0: left promiscuous mode [ 2101.660146][ T293] bridge0: port 1(bridge_slave_0) entered disabled state [ 2101.783228][ T293] veth1_macvtap: left promiscuous mode [ 2101.788780][ T293] veth0_vlan: left promiscuous mode [ 2101.930677][ T2225] bridge0: port 2(bridge_slave_1) entered blocking state [ 2101.937734][ T2225] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2101.945017][ T2225] bridge0: port 1(bridge_slave_0) entered blocking state [ 2101.952062][ T2225] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2101.974213][T22780] bridge0: port 1(bridge_slave_0) entered disabled state [ 2101.982056][T22780] bridge0: port 2(bridge_slave_1) entered disabled state [ 2101.993021][T12257] bridge0: port 1(bridge_slave_0) entered blocking state [ 2102.000060][T12257] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2102.011615][T22780] bridge0: port 2(bridge_slave_1) entered blocking state [ 2102.018640][T22780] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2102.066410][ T2225] veth0_vlan: entered promiscuous mode [ 2102.077902][ T2225] veth1_macvtap: entered promiscuous mode [ 2113.640748][ T2974] netlink: 12 bytes leftover after parsing attributes in process `syz.7.62489'. [ 2114.449714][ T3053] netlink: 12 bytes leftover after parsing attributes in process `syz.7.62526'. [ 2129.564417][T22780] bridge_slave_1: left allmulticast mode [ 2129.572285][T22780] bridge_slave_1: left promiscuous mode [ 2129.577985][T22780] bridge0: port 2(bridge_slave_1) entered disabled state [ 2129.610297][T22780] bridge_slave_0: left allmulticast mode [ 2129.620302][T22780] bridge_slave_0: left promiscuous mode [ 2129.625930][T22780] bridge0: port 1(bridge_slave_0) entered disabled state [ 2129.772641][T22780] veth1_macvtap: left promiscuous mode [ 2129.781848][T22780] veth0_vlan: left promiscuous mode [ 2129.929077][ T3908] bridge0: port 1(bridge_slave_0) entered blocking state [ 2129.953585][ T3908] bridge0: port 1(bridge_slave_0) entered disabled state [ 2129.966250][ T3908] bridge_slave_0: entered allmulticast mode [ 2129.982725][ T3908] bridge_slave_0: entered promiscuous mode [ 2129.997640][ T3908] bridge0: port 2(bridge_slave_1) entered blocking state [ 2130.020627][ T3908] bridge0: port 2(bridge_slave_1) entered disabled state [ 2130.027697][ T3908] bridge_slave_1: entered allmulticast mode [ 2130.059282][ T3908] bridge_slave_1: entered promiscuous mode [ 2130.185599][ T3908] bridge0: port 2(bridge_slave_1) entered blocking state [ 2130.192690][ T3908] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2130.199985][ T3908] bridge0: port 1(bridge_slave_0) entered blocking state [ 2130.207011][ T3908] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2130.255897][T22780] bridge0: port 1(bridge_slave_0) entered disabled state [ 2130.263274][T22780] bridge0: port 2(bridge_slave_1) entered disabled state [ 2130.295239][T22780] bridge0: port 1(bridge_slave_0) entered blocking state [ 2130.302313][T22780] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2130.312686][T22780] bridge0: port 2(bridge_slave_1) entered blocking state [ 2130.319728][T22780] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2130.343470][ T3908] veth0_vlan: entered promiscuous mode [ 2130.356711][ T3908] veth1_macvtap: entered promiscuous mode [ 2142.131006][ T4618] netlink: 32 bytes leftover after parsing attributes in process `syz.6.63221'. [ 2146.700213][ T4798] netlink: 12 bytes leftover after parsing attributes in process `syz.2.63300'. [ 2154.059237][ T293] bridge_slave_1: left allmulticast mode [ 2154.064909][ T293] bridge_slave_1: left promiscuous mode [ 2154.080665][ T293] bridge0: port 2(bridge_slave_1) entered disabled state [ 2154.101201][ T293] bridge_slave_0: left allmulticast mode [ 2154.106871][ T293] bridge_slave_0: left promiscuous mode [ 2154.141246][ T293] bridge0: port 1(bridge_slave_0) entered disabled state [ 2154.253914][ T293] veth1_macvtap: left promiscuous mode [ 2154.267405][ T293] veth0_vlan: left promiscuous mode [ 2154.416146][ T5200] bridge0: port 1(bridge_slave_0) entered blocking state [ 2154.435748][ T5200] bridge0: port 1(bridge_slave_0) entered disabled state [ 2154.447176][ T5200] bridge_slave_0: entered allmulticast mode [ 2154.453499][ T5200] bridge_slave_0: entered promiscuous mode [ 2154.487773][ T5200] bridge0: port 2(bridge_slave_1) entered blocking state [ 2154.494810][ T5200] bridge0: port 2(bridge_slave_1) entered disabled state [ 2154.517119][ T5200] bridge_slave_1: entered allmulticast mode [ 2154.523431][ T5200] bridge_slave_1: entered promiscuous mode [ 2154.667733][ T5200] bridge0: port 2(bridge_slave_1) entered blocking state [ 2154.674792][ T5200] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2154.682073][ T5200] bridge0: port 1(bridge_slave_0) entered blocking state [ 2154.689103][ T5200] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2154.739624][T22780] bridge0: port 1(bridge_slave_0) entered disabled state [ 2154.750890][T22780] bridge0: port 2(bridge_slave_1) entered disabled state [ 2154.786278][T22780] bridge0: port 1(bridge_slave_0) entered blocking state [ 2154.793340][T22780] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2154.807164][T22780] bridge0: port 2(bridge_slave_1) entered blocking state [ 2154.814213][T22780] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2154.877708][ T5200] veth0_vlan: entered promiscuous mode [ 2154.899535][ T5200] veth1_macvtap: entered promiscuous mode [ 2156.572785][ T5305] netlink: 32 bytes leftover after parsing attributes in process `syz.6.63513'. [ 2159.642142][ T5479] netlink: 12 bytes leftover after parsing attributes in process `syz.6.63589'. [ 2160.246040][ T5515] netlink: 32 bytes leftover after parsing attributes in process `syz.1.63604'. [ 2164.692834][ T5719] netlink: 32 bytes leftover after parsing attributes in process `syz.6.63694'. [ 2165.956464][ T5800] netlink: 32 bytes leftover after parsing attributes in process `syz.2.63729'. [ 2166.433393][ T5826] netlink: 32 bytes leftover after parsing attributes in process `syz.2.63739'. [ 2170.339271][ T5998] netlink: 32 bytes leftover after parsing attributes in process `syz.7.63817'. [ 2170.760050][ T6015] netlink: 12 bytes leftover after parsing attributes in process `syz.1.63825'. [ 2172.490550][T22780] bridge_slave_1: left allmulticast mode [ 2172.496273][T22780] bridge_slave_1: left promiscuous mode [ 2172.501893][T22780] bridge0: port 2(bridge_slave_1) entered disabled state [ 2172.529787][T22780] bridge_slave_0: left allmulticast mode [ 2172.535468][T22780] bridge_slave_0: left promiscuous mode [ 2172.556137][T22780] bridge0: port 1(bridge_slave_0) entered disabled state [ 2172.680259][T22780] veth1_macvtap: left promiscuous mode [ 2172.685797][T22780] veth0_vlan: left promiscuous mode [ 2172.857241][ T6096] bridge0: port 1(bridge_slave_0) entered blocking state [ 2172.884559][ T6096] bridge0: port 1(bridge_slave_0) entered disabled state [ 2172.904775][ T6096] bridge_slave_0: entered allmulticast mode [ 2172.915368][ T6096] bridge_slave_0: entered promiscuous mode [ 2172.945805][ T6096] bridge0: port 2(bridge_slave_1) entered blocking state [ 2172.957345][ T6096] bridge0: port 2(bridge_slave_1) entered disabled state [ 2172.982768][ T6096] bridge_slave_1: entered allmulticast mode [ 2173.006456][ T6096] bridge_slave_1: entered promiscuous mode [ 2173.146805][ T6096] bridge0: port 2(bridge_slave_1) entered blocking state [ 2173.153892][ T6096] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2173.161191][ T6096] bridge0: port 1(bridge_slave_0) entered blocking state [ 2173.168242][ T6096] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2173.224943][T22780] bridge0: port 1(bridge_slave_0) entered disabled state [ 2173.242280][T22780] bridge0: port 2(bridge_slave_1) entered disabled state [ 2173.262925][T15650] bridge0: port 1(bridge_slave_0) entered blocking state [ 2173.270006][T15650] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2173.302207][T22780] bridge0: port 2(bridge_slave_1) entered blocking state [ 2173.309279][T22780] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2173.375318][ T6096] veth0_vlan: entered promiscuous mode [ 2173.408686][ T6096] veth1_macvtap: entered promiscuous mode [ 2174.106162][ T6166] netlink: 12 bytes leftover after parsing attributes in process `syz.7.63888'. [ 2175.070424][ T6204] netlink: 32 bytes leftover after parsing attributes in process `syz.1.63904'. [ 2175.914858][ T6258] netlink: 32 bytes leftover after parsing attributes in process `syz.6.63924'. [ 2176.177835][ T6288] netlink: 32 bytes leftover after parsing attributes in process `syz.1.63937'. [ 2176.468622][ T6310] netlink: 12 bytes leftover after parsing attributes in process `syz.6.63946'. [ 2177.304487][ T6357] netlink: 12 bytes leftover after parsing attributes in process `syz.7.63964'. [ 2178.411435][ T6410] netlink: 32 bytes leftover after parsing attributes in process `syz.1.63989'. [ 2178.809975][ T6433] netlink: 32 bytes leftover after parsing attributes in process `syz.1.63999'. [ 2180.802053][ T6500] netlink: 32 bytes leftover after parsing attributes in process `syz.2.64029'. [ 2182.989972][ T6589] netlink: 32 bytes leftover after parsing attributes in process `syz.1.64070'. [ 2184.431403][ T6660] netlink: 32 bytes leftover after parsing attributes in process `syz.2.64102'. [ 2185.777536][ T6720] netlink: 12 bytes leftover after parsing attributes in process `syz.6.64126'. [ 2185.884192][ T6730] netlink: 32 bytes leftover after parsing attributes in process `syz.6.64132'. [ 2188.017818][ T6843] netlink: 32 bytes leftover after parsing attributes in process `syz.2.64182'. [ 2189.620883][ T6942] netlink: 32 bytes leftover after parsing attributes in process `syz.1.64225'. [ 2190.190968][ T6978] netlink: 12 bytes leftover after parsing attributes in process `syz.6.64242'. [ 2191.184097][ T7023] netlink: 32 bytes leftover after parsing attributes in process `syz.6.64263'. [ 2196.222622][ T7273] netlink: 12 bytes leftover after parsing attributes in process `syz.6.64372'. [ 2196.764304][ T7293] netlink: 12 bytes leftover after parsing attributes in process `syz.1.64382'. [ 2197.944548][ T7359] netlink: 32 bytes leftover after parsing attributes in process `syz.6.64408'. [ 2198.035434][ T7366] netlink: 12 bytes leftover after parsing attributes in process `syz.1.64411'. [ 2206.255545][ T7771] netlink: 32 bytes leftover after parsing attributes in process `syz.1.64583'. [ 2211.587943][T15650] bridge_slave_1: left allmulticast mode [ 2211.593868][T15650] bridge_slave_1: left promiscuous mode [ 2211.599571][T15650] bridge0: port 2(bridge_slave_1) entered disabled state [ 2211.608321][T15650] bridge_slave_0: left allmulticast mode [ 2211.623334][T15650] bridge_slave_0: left promiscuous mode [ 2211.629203][T15650] bridge0: port 1(bridge_slave_0) entered disabled state [ 2211.759963][T15650] veth1_macvtap: left promiscuous mode [ 2211.770921][T15650] veth0_vlan: left promiscuous mode [ 2211.920863][ T8123] bridge0: port 1(bridge_slave_0) entered blocking state [ 2211.943844][ T8123] bridge0: port 1(bridge_slave_0) entered disabled state [ 2211.959826][ T8123] bridge_slave_0: entered allmulticast mode [ 2211.980547][ T8123] bridge_slave_0: entered promiscuous mode [ 2212.001092][ T8123] bridge0: port 2(bridge_slave_1) entered blocking state [ 2212.023838][ T8123] bridge0: port 2(bridge_slave_1) entered disabled state [ 2212.041221][ T8123] bridge_slave_1: entered allmulticast mode [ 2212.055451][ T8123] bridge_slave_1: entered promiscuous mode [ 2212.197626][ T8123] bridge0: port 2(bridge_slave_1) entered blocking state [ 2212.204705][ T8123] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2212.211952][ T8123] bridge0: port 1(bridge_slave_0) entered blocking state [ 2212.219001][ T8123] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2212.243860][T15650] bridge0: port 1(bridge_slave_0) entered disabled state [ 2212.251310][T15650] bridge0: port 2(bridge_slave_1) entered disabled state [ 2212.275501][T22780] bridge0: port 1(bridge_slave_0) entered blocking state [ 2212.282551][T22780] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2212.315290][T22780] bridge0: port 2(bridge_slave_1) entered blocking state [ 2212.322354][T22780] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2212.356891][ T8123] veth0_vlan: entered promiscuous mode [ 2212.382760][ T8123] veth1_macvtap: entered promiscuous mode [ 2236.956418][T15650] bridge_slave_1: left allmulticast mode [ 2236.962092][T15650] bridge_slave_1: left promiscuous mode [ 2236.984636][T15650] bridge0: port 2(bridge_slave_1) entered disabled state [ 2236.999889][T15650] bridge_slave_0: left allmulticast mode [ 2237.014507][T15650] bridge_slave_0: left promiscuous mode [ 2237.020148][T15650] bridge0: port 1(bridge_slave_0) entered disabled state [ 2237.156875][T15650] veth1_macvtap: left promiscuous mode [ 2237.162461][T15650] veth0_vlan: left promiscuous mode [ 2237.333853][ T9381] bridge0: port 1(bridge_slave_0) entered blocking state [ 2237.341515][ T9381] bridge0: port 1(bridge_slave_0) entered disabled state [ 2237.351263][ T9381] bridge_slave_0: entered allmulticast mode [ 2237.358041][ T9381] bridge_slave_0: entered promiscuous mode [ 2237.365593][ T9381] bridge0: port 2(bridge_slave_1) entered blocking state [ 2237.372693][ T9381] bridge0: port 2(bridge_slave_1) entered disabled state [ 2237.379815][ T9381] bridge_slave_1: entered allmulticast mode [ 2237.387033][ T9381] bridge_slave_1: entered promiscuous mode [ 2237.519676][ T9381] bridge0: port 2(bridge_slave_1) entered blocking state [ 2237.526769][ T9381] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2237.534048][ T9381] bridge0: port 1(bridge_slave_0) entered blocking state [ 2237.541063][ T9381] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2237.595740][T15650] bridge0: port 1(bridge_slave_0) entered disabled state [ 2237.604929][T15650] bridge0: port 2(bridge_slave_1) entered disabled state [ 2237.621840][ T293] bridge0: port 1(bridge_slave_0) entered blocking state [ 2237.628902][ T293] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2237.648333][ T293] bridge0: port 2(bridge_slave_1) entered blocking state [ 2237.655396][ T293] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2237.677379][ T9381] veth0_vlan: entered promiscuous mode [ 2237.697543][ T9381] veth1_macvtap: entered promiscuous mode [ 2261.490803][T10660] fuse: Unknown parameter '@ù' [ 2261.571256][T10668] fuse: Unknown parameter '@ù' [ 2261.851852][T10698] FAULT_INJECTION: forcing a failure. [ 2261.851852][T10698] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2261.883177][T10698] CPU: 1 UID: 0 PID: 10698 Comm: syz.2.65823 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 2261.883210][T10698] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2261.883224][T10698] Call Trace: [ 2261.883231][T10698] [ 2261.883239][T10698] __dump_stack+0x21/0x30 [ 2261.883271][T10698] dump_stack_lvl+0x10c/0x190 [ 2261.883295][T10698] ? __cfi_dump_stack_lvl+0x10/0x10 [ 2261.883321][T10698] dump_stack+0x19/0x20 [ 2261.883344][T10698] should_fail_ex+0x3d9/0x530 [ 2261.883365][T10698] should_fail+0xf/0x20 [ 2261.883383][T10698] should_fail_usercopy+0x1e/0x30 [ 2261.883402][T10698] strncpy_from_user+0x28/0x270 [ 2261.883422][T10698] getname_flags+0x102/0x710 [ 2261.883442][T10698] ? build_open_flags+0x487/0x600 [ 2261.883465][T10698] getname+0x1b/0x30 [ 2261.883482][T10698] do_sys_openat2+0xcb/0x1c0 [ 2261.883504][T10698] ? fput+0x1a5/0x240 [ 2261.883524][T10698] ? do_sys_open+0x100/0x100 [ 2261.883546][T10698] ? ksys_write+0x1ef/0x250 [ 2261.883563][T10698] ? __cfi_ksys_write+0x10/0x10 [ 2261.883582][T10698] __x64_sys_openat+0x13a/0x170 [ 2261.883605][T10698] x64_sys_call+0xe69/0x2ee0 [ 2261.883630][T10698] do_syscall_64+0x58/0xf0 [ 2261.883654][T10698] ? clear_bhb_loop+0x50/0xa0 [ 2261.883674][T10698] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 2261.883701][T10698] RIP: 0033:0x7f56ed98df10 [ 2261.883717][T10698] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 69 95 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 bc 95 02 00 8b 44 [ 2261.883734][T10698] RSP: 002b:00007f56ee82cf10 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 2261.883756][T10698] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f56ed98df10 [ 2261.883771][T10698] RDX: 0000000000000002 RSI: 00007f56ee82cfa0 RDI: 00000000ffffff9c [ 2261.883785][T10698] RBP: 00007f56ee82cfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2261.883798][T10698] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 2261.883810][T10698] R13: 00007f56edbe6038 R14: 00007f56edbe5fa0 R15: 00007ffc0c6ea838 [ 2261.883827][T10698] [ 2264.262678][T15650] bridge_slave_1: left allmulticast mode [ 2264.270089][T15650] bridge_slave_1: left promiscuous mode [ 2264.288657][T15650] bridge0: port 2(bridge_slave_1) entered disabled state [ 2264.301093][T15650] bridge_slave_0: left allmulticast mode [ 2264.310865][T15650] bridge_slave_0: left promiscuous mode [ 2264.316476][T15650] bridge0: port 1(bridge_slave_0) entered disabled state [ 2264.470046][T15650] veth1_macvtap: left promiscuous mode [ 2264.475647][T15650] veth0_vlan: left promiscuous mode [ 2264.612368][T10829] bridge0: port 1(bridge_slave_0) entered blocking state [ 2264.629576][T10829] bridge0: port 1(bridge_slave_0) entered disabled state [ 2264.641159][T10829] bridge_slave_0: entered allmulticast mode [ 2264.647450][T10829] bridge_slave_0: entered promiscuous mode [ 2264.671766][T10829] bridge0: port 2(bridge_slave_1) entered blocking state [ 2264.681175][T10829] bridge0: port 2(bridge_slave_1) entered disabled state [ 2264.688222][T10829] bridge_slave_1: entered allmulticast mode [ 2264.711220][T10829] bridge_slave_1: entered promiscuous mode [ 2264.862772][T10829] bridge0: port 2(bridge_slave_1) entered blocking state [ 2264.869843][T10829] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2264.877147][T10829] bridge0: port 1(bridge_slave_0) entered blocking state [ 2264.884191][T10829] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2264.909882][T15650] bridge0: port 1(bridge_slave_0) entered disabled state [ 2264.921200][T15650] bridge0: port 2(bridge_slave_1) entered disabled state [ 2264.951960][ T293] bridge0: port 1(bridge_slave_0) entered blocking state [ 2264.959000][ T293] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2264.980946][ T293] bridge0: port 2(bridge_slave_1) entered blocking state [ 2264.987992][ T293] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2265.041623][T10829] veth0_vlan: entered promiscuous mode [ 2265.064576][T10829] veth1_macvtap: entered promiscuous mode [ 2265.871937][T10914] FAULT_INJECTION: forcing a failure. [ 2265.871937][T10914] name failslab, interval 1, probability 0, space 0, times 0 [ 2265.884829][T10914] CPU: 0 UID: 0 PID: 10914 Comm: syz.7.65907 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 2265.884859][T10914] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2265.884871][T10914] Call Trace: [ 2265.884878][T10914] [ 2265.884886][T10914] __dump_stack+0x21/0x30 [ 2265.884916][T10914] dump_stack_lvl+0x10c/0x190 [ 2265.884940][T10914] ? __cfi_dump_stack_lvl+0x10/0x10 [ 2265.884965][T10914] dump_stack+0x19/0x20 [ 2265.884988][T10914] should_fail_ex+0x3d9/0x530 [ 2265.885008][T10914] should_failslab+0xac/0x100 [ 2265.885030][T10914] __kmalloc_cache_node_noprof+0x46/0x450 [ 2265.885051][T10914] ? kasan_save_track+0x4f/0x80 [ 2265.885069][T10914] ? __get_vm_area_node+0x154/0x3a0 [ 2265.885093][T10914] ? __kasan_slab_alloc+0x73/0x90 [ 2265.885113][T10914] ? kmem_cache_alloc_node_noprof+0x1d6/0x440 [ 2265.885132][T10914] ? dup_task_struct+0xbc/0xc50 [ 2265.885155][T10914] __get_vm_area_node+0x154/0x3a0 [ 2265.885179][T10914] __vmalloc_node_range_noprof+0x33c/0x1420 [ 2265.885205][T10914] ? copy_process+0x538/0x3220 [ 2265.885229][T10914] ? __cfi___vmalloc_node_range_noprof+0x10/0x10 [ 2265.885255][T10914] ? kasan_save_alloc_info+0x40/0x50 [ 2265.885279][T10914] ? __kasan_slab_alloc+0x73/0x90 [ 2265.885299][T10914] ? arch_dup_task_struct+0x5b/0xe0 [ 2265.885326][T10914] ? __asan_memcpy+0x5a/0x80 [ 2265.885342][T10914] dup_task_struct+0x5bd/0xc50 [ 2265.885362][T10914] ? copy_process+0x538/0x3220 [ 2265.885383][T10914] ? _raw_spin_lock_irq+0x8d/0x120 [ 2265.885407][T10914] ? copy_process+0x3220/0x3220 [ 2265.885429][T10914] ? __kasan_check_write+0x18/0x20 [ 2265.885456][T10914] copy_process+0x538/0x3220 [ 2265.885479][T10914] ? __cfi_copy_process+0x10/0x10 [ 2265.885500][T10914] ? proc_fail_nth_write+0x17e/0x210 [ 2265.885526][T10914] kernel_clone+0x23f/0x830 [ 2265.885548][T10914] ? __cfi_kernel_clone+0x10/0x10 [ 2265.885571][T10914] __x64_sys_clone+0x18c/0x1f0 [ 2265.885602][T10914] ? __cfi___x64_sys_clone+0x10/0x10 [ 2265.885626][T10914] ? __kasan_check_read+0x15/0x20 [ 2265.885652][T10914] x64_sys_call+0x2b3c/0x2ee0 [ 2265.885676][T10914] do_syscall_64+0x58/0xf0 [ 2265.885699][T10914] ? clear_bhb_loop+0x50/0xa0 [ 2265.885719][T10914] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 2265.885738][T10914] RIP: 0033:0x7f7295d8f6c9 [ 2265.885754][T10914] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2265.885770][T10914] RSP: 002b:00007f7296c3dfe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2265.885791][T10914] RAX: ffffffffffffffda RBX: 00007f7295fe5fa0 RCX: 00007f7295d8f6c9 [ 2265.885806][T10914] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020000 [ 2265.885819][T10914] RBP: 00007f7296c3e090 R08: 0000000000000000 R09: 0000000000000000 [ 2265.885831][T10914] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 2265.885843][T10914] R13: 00007f7295fe6038 R14: 00007f7295fe5fa0 R15: 00007ffec57d3288 [ 2265.885858][T10914] [ 2265.886109][T10914] syz.7.65907: vmalloc error: size 32768, vm_struct allocation failed, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz7,mems_allowed=0 [ 2266.191712][T10914] CPU: 0 UID: 0 PID: 10914 Comm: syz.7.65907 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 2266.191741][T10914] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2266.191753][T10914] Call Trace: [ 2266.191760][T10914] [ 2266.191767][T10914] __dump_stack+0x21/0x30 [ 2266.191795][T10914] dump_stack_lvl+0x10c/0x190 [ 2266.191818][T10914] ? __cfi_dump_stack_lvl+0x10/0x10 [ 2266.191838][T10914] ? _raw_spin_unlock_irqrestore+0x4a/0x70 [ 2266.191863][T10914] dump_stack+0x19/0x20 [ 2266.191885][T10914] warn_alloc+0x1bc/0x2a0 [ 2266.191909][T10914] ? __kasan_kmalloc+0x28/0xb0 [ 2266.191930][T10914] ? __cfi_warn_alloc+0x10/0x10 [ 2266.191952][T10914] ? kasan_save_track+0x4f/0x80 [ 2266.191971][T10914] ? dup_task_struct+0xbc/0xc50 [ 2266.191993][T10914] ? __get_vm_area_node+0x392/0x3a0 [ 2266.192019][T10914] __vmalloc_node_range_noprof+0x361/0x1420 [ 2266.192048][T10914] ? __cfi___vmalloc_node_range_noprof+0x10/0x10 [ 2266.192073][T10914] ? kasan_save_alloc_info+0x40/0x50 [ 2266.192097][T10914] ? __kasan_slab_alloc+0x73/0x90 [ 2266.192116][T10914] ? arch_dup_task_struct+0x5b/0xe0 [ 2266.192141][T10914] ? __asan_memcpy+0x5a/0x80 [ 2266.192157][T10914] dup_task_struct+0x5bd/0xc50 [ 2266.192177][T10914] ? copy_process+0x538/0x3220 [ 2266.192198][T10914] ? _raw_spin_lock_irq+0x8d/0x120 [ 2266.192220][T10914] ? copy_process+0x3220/0x3220 [ 2266.192240][T10914] ? __kasan_check_write+0x18/0x20 [ 2266.192266][T10914] copy_process+0x538/0x3220 [ 2266.192290][T10914] ? __cfi_copy_process+0x10/0x10 [ 2266.192317][T10914] ? proc_fail_nth_write+0x17e/0x210 [ 2266.192342][T10914] kernel_clone+0x23f/0x830 [ 2266.192364][T10914] ? __cfi_kernel_clone+0x10/0x10 [ 2266.192385][T10914] __x64_sys_clone+0x18c/0x1f0 [ 2266.192406][T10914] ? __cfi___x64_sys_clone+0x10/0x10 [ 2266.192430][T10914] ? __kasan_check_read+0x15/0x20 [ 2266.192456][T10914] x64_sys_call+0x2b3c/0x2ee0 [ 2266.192481][T10914] do_syscall_64+0x58/0xf0 [ 2266.192503][T10914] ? clear_bhb_loop+0x50/0xa0 [ 2266.192523][T10914] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 2266.192543][T10914] RIP: 0033:0x7f7295d8f6c9 [ 2266.192559][T10914] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2266.192575][T10914] RSP: 002b:00007f7296c3dfe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2266.192595][T10914] RAX: ffffffffffffffda RBX: 00007f7295fe5fa0 RCX: 00007f7295d8f6c9 [ 2266.192611][T10914] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080020000 [ 2266.192624][T10914] RBP: 00007f7296c3e090 R08: 0000000000000000 R09: 0000000000000000 [ 2266.192637][T10914] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 2266.192648][T10914] R13: 00007f7295fe6038 R14: 00007f7295fe5fa0 R15: 00007ffec57d3288 [ 2266.192664][T10914] [ 2266.192681][T10914] Mem-Info: [ 2266.473651][T10914] active_anon:9290 inactive_anon:44 isolated_anon:0 [ 2266.473651][T10914] active_file:25226 inactive_file:3414 isolated_file:0 [ 2266.473651][T10914] unevictable:0 dirty:91 writeback:0 [ 2266.473651][T10914] slab_reclaimable:11996 slab_unreclaimable:69226 [ 2266.473651][T10914] mapped:28956 shmem:4810 pagetables:718 [ 2266.473651][T10914] sec_pagetables:0 bounce:0 [ 2266.473651][T10914] kernel_misc_reclaimable:0 [ 2266.473651][T10914] free:1489422 free_pcp:23159 free_cma:0 [ 2266.520817][T10914] Node 0 active_anon:32560kB inactive_anon:176kB active_file:100904kB inactive_file:13656kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:111724kB dirty:364kB writeback:0kB shmem:14740kB shmem_thp:0kB shmem_pmdmapped:0kB anon_thp:0kB writeback_tmp:0kB kernel_stack:5208kB pagetables:2772kB sec_pagetables:0kB all_unreclaimable? no [ 2266.555124][T10914] DMA32 free:2960212kB boost:0kB min:19088kB low:23860kB high:28632kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2965936kB mlocked:0kB bounce:0kB free_pcp:5724kB local_pcp:5724kB free_cma:0kB [ 2266.586112][T10951] FAULT_INJECTION: forcing a failure. [ 2266.586112][T10951] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2266.586669][T10914] lowmem_reserve[]: 0 3921 3921 [ 2266.599715][T10951] CPU: 1 UID: 0 PID: 10951 Comm: syz.1.65922 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 2266.599742][T10951] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2266.599754][T10951] Call Trace: [ 2266.599761][T10951] [ 2266.599768][T10951] __dump_stack+0x21/0x30 [ 2266.599796][T10951] dump_stack_lvl+0x10c/0x190 [ 2266.599818][T10951] ? __cfi_dump_stack_lvl+0x10/0x10 [ 2266.599842][T10951] dump_stack+0x19/0x20 [ 2266.599863][T10951] should_fail_ex+0x3d9/0x530 [ 2266.599881][T10951] should_fail+0xf/0x20 [ 2266.599897][T10951] should_fail_usercopy+0x1e/0x30 [ 2266.599916][T10951] strncpy_from_user+0x28/0x270 [ 2266.599934][T10951] getname_flags+0x102/0x710 [ 2266.599951][T10951] ? build_open_flags+0x487/0x600 [ 2266.599973][T10951] getname+0x1b/0x30 [ 2266.599989][T10951] do_sys_openat2+0xcb/0x1c0 [ 2266.600010][T10951] ? fput+0x1a5/0x240 [ 2266.600029][T10951] ? do_sys_open+0x100/0x100 [ 2266.600050][T10951] ? ksys_write+0x1ef/0x250 [ 2266.600066][T10951] ? __cfi_ksys_write+0x10/0x10 [ 2266.600083][T10951] __x64_sys_open+0x120/0x150 [ 2266.600104][T10951] x64_sys_call+0x131a/0x2ee0 [ 2266.600128][T10951] do_syscall_64+0x58/0xf0 [ 2266.600150][T10951] ? clear_bhb_loop+0x50/0xa0 [ 2266.600169][T10951] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 2266.600187][T10951] RIP: 0033:0x7f72ffb8f6c9 [ 2266.600202][T10951] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2266.600218][T10951] RSP: 002b:00007f7300ae5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 2266.600237][T10951] RAX: ffffffffffffffda RBX: 00007f72ffde5fa0 RCX: 00007f72ffb8f6c9 [ 2266.600252][T10951] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00002000000000c0 [ 2266.600264][T10951] RBP: 00007f7300ae5090 R08: 0000000000000000 R09: 0000000000000000 [ 2266.600289][T10951] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2266.600301][T10951] R13: 00007f72ffde6038 R14: 00007f72ffde5fa0 R15: 00007ffc9a0de9a8 [ 2266.600317][T10951] [ 2266.806136][T10914] Normal free:2996736kB boost:0kB min:25964kB low:32452kB high:38940kB reserved_highatomic:0KB free_highatomic:0KB active_anon:19260kB inactive_anon:176kB active_file:100904kB inactive_file:13656kB unevictable:0kB writepending:364kB present:5242880kB managed:4016120kB mlocked:0kB bounce:0kB free_pcp:105448kB local_pcp:63064kB free_cma:0kB [ 2266.838194][T10914] lowmem_reserve[]: 0 0 0 [ 2266.842664][T10914] DMA32: 5*4kB (M) 4*8kB (M) 4*16kB (M) 5*32kB (M) 3*64kB (M) 3*128kB (M) 4*256kB (M) 4*512kB (M) 5*1024kB (UM) 5*2048kB (M) 718*4096kB (M) = 2960212kB [ 2266.859641][T10914] Normal: 220*4kB (UME) 1116*8kB (UE) 717*16kB (UME) 818*32kB (UME) 399*64kB (UME) 231*128kB (UME) 212*256kB (UME) 126*512kB (UME) 62*1024kB (UME) 26*2048kB (UME) 649*4096kB (UME) = 2996384kB [ 2266.881377][T10914] 31715 total pagecache pages [ 2266.886066][T10914] 44 pages in swap cache [ 2266.890296][T10914] Free swap = 124464kB [ 2266.894501][T10914] Total swap = 124996kB [ 2266.900892][T10914] 2097051 pages RAM [ 2266.905018][T10914] 0 pages HighMem/MovableOnly [ 2266.910092][T10914] 351537 pages reserved [ 2266.914527][T10914] 0 pages cma reserved [ 2266.920731][T10914] Memory allocations: [ 2266.924940][T10914] 0 B 0 init/main.c:1370 func:do_initcalls [ 2266.932331][T10914] 0 B 0 init/do_mounts.c:186 func:mount_root_generic [ 2266.940462][T10914] 0 B 0 init/do_mounts.c:158 func:do_mount_root [ 2266.948859][T10914] 0 B 0 init/do_mounts.c:352 func:mount_nodev_root [ 2266.956870][T10914] 0 B 0 init/do_mounts_rd.c:241 func:rd_load_image [ 2266.964860][T10914] 0 B 0 init/do_mounts_rd.c:72 func:identify_ramdisk_image [ 2266.973513][T10914] 0 B 0 init/initramfs.c:507 func:unpack_to_rootfs [ 2266.981634][T10914] 0 B 0 init/initramfs.c:508 func:unpack_to_rootfs [ 2266.989853][T10914] 0 B 0 init/initramfs.c:509 func:unpack_to_rootfs [ 2266.997907][T10914] 0 B 0 init/initramfs.c:101 func:find_link [ 2268.943001][T11053] FAULT_INJECTION: forcing a failure. [ 2268.943001][T11053] name failslab, interval 1, probability 0, space 0, times 0 [ 2268.970636][T11053] CPU: 1 UID: 0 PID: 11053 Comm: syz.6.65967 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 2268.970668][T11053] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2268.970681][T11053] Call Trace: [ 2268.970688][T11053] [ 2268.970696][T11053] __dump_stack+0x21/0x30 [ 2268.970726][T11053] dump_stack_lvl+0x10c/0x190 [ 2268.970750][T11053] ? __cfi_dump_stack_lvl+0x10/0x10 [ 2268.970775][T11053] dump_stack+0x19/0x20 [ 2268.970798][T11053] should_fail_ex+0x3d9/0x530 [ 2268.970818][T11053] should_failslab+0xac/0x100 [ 2268.970839][T11053] kmem_cache_alloc_noprof+0x42/0x430 [ 2268.970857][T11053] ? find_exception+0x106/0x4a0 [ 2268.970964][T11053] ? dst_alloc+0x13c/0x250 [ 2268.971021][T11053] dst_alloc+0x13c/0x250 [ 2268.971038][T11053] ip_route_output_key_hash_rcu+0x1302/0x1f90 [ 2268.971067][T11053] ip_route_output_flow+0xea/0x290 [ 2268.971090][T11053] ? __asan_memcpy+0x5a/0x80 [ 2268.971107][T11053] ? __cfi_ip_route_output_flow+0x10/0x10 [ 2268.971130][T11053] ? avc_has_perm_noaudit+0x286/0x360 [ 2268.971157][T11053] ? avc_has_perm+0x144/0x220 [ 2268.971188][T11053] ? selinux_sk_getsecid+0x2e/0xd0 [ 2268.971207][T11053] tcp_v4_connect+0x767/0x19e0 [ 2268.971254][T11053] ? __cfi_tcp_v4_connect+0x10/0x10 [ 2268.971272][T11053] ? __kasan_check_write+0x18/0x20 [ 2268.971299][T11053] ? _raw_spin_lock_bh+0x90/0x120 [ 2268.971322][T11053] __inet_stream_connect+0x2a4/0xf40 [ 2268.971340][T11053] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 2268.971364][T11053] ? _raw_spin_unlock_bh+0x54/0x60 [ 2268.971387][T11053] ? lock_sock_nested+0x1f5/0x290 [ 2268.971408][T11053] ? __cfi___inet_stream_connect+0x10/0x10 [ 2268.971426][T11053] ? check_stack_object+0x107/0x140 [ 2268.971444][T11053] ? __check_object_size+0xe0/0x810 [ 2268.971461][T11053] ? __fget_files+0x2c5/0x340 [ 2268.971483][T11053] inet_stream_connect+0x66/0xa0 [ 2268.971500][T11053] __sys_connect+0x39d/0x440 [ 2268.971525][T11053] ? __cfi___sys_connect+0x10/0x10 [ 2268.971550][T11053] ? __kasan_check_read+0x15/0x20 [ 2268.971576][T11053] __x64_sys_connect+0x7e/0x90 [ 2268.971599][T11053] x64_sys_call+0x1c2f/0x2ee0 [ 2268.971625][T11053] do_syscall_64+0x58/0xf0 [ 2268.971648][T11053] ? clear_bhb_loop+0x50/0xa0 [ 2268.971668][T11053] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 2268.971688][T11053] RIP: 0033:0x7f4cb8b8f6c9 [ 2268.971704][T11053] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2268.971722][T11053] RSP: 002b:00007f4cb9a67038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 2268.971743][T11053] RAX: ffffffffffffffda RBX: 00007f4cb8de5fa0 RCX: 00007f4cb8b8f6c9 [ 2268.971758][T11053] RDX: 0000000000000010 RSI: 0000200000000180 RDI: 0000000000000007 [ 2268.971772][T11053] RBP: 00007f4cb9a67090 R08: 0000000000000000 R09: 0000000000000000 [ 2268.971784][T11053] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2268.971797][T11053] R13: 00007f4cb8de6038 R14: 00007f4cb8de5fa0 R15: 00007ffc06e653a8 [ 2268.971814][T11053] [ 2270.111892][T11138] FAULT_INJECTION: forcing a failure. [ 2270.111892][T11138] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2270.150565][T11138] CPU: 1 UID: 0 PID: 11138 Comm: syz.2.66002 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 2270.150598][T11138] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2270.150609][T11138] Call Trace: [ 2270.150615][T11138] [ 2270.150623][T11138] __dump_stack+0x21/0x30 [ 2270.150651][T11138] dump_stack_lvl+0x10c/0x190 [ 2270.150673][T11138] ? __cfi_dump_stack_lvl+0x10/0x10 [ 2270.150696][T11138] ? check_stack_object+0x12c/0x140 [ 2270.150716][T11138] dump_stack+0x19/0x20 [ 2270.150737][T11138] should_fail_ex+0x3d9/0x530 [ 2270.150757][T11138] should_fail+0xf/0x20 [ 2270.150773][T11138] should_fail_usercopy+0x1e/0x30 [ 2270.150793][T11138] _copy_to_user+0x24/0xa0 [ 2270.150815][T11138] simple_read_from_buffer+0xed/0x160 [ 2270.150838][T11138] proc_fail_nth_read+0x19e/0x210 [ 2270.150862][T11138] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 2270.150885][T11138] ? bpf_lsm_file_permission+0xd/0x20 [ 2270.150910][T11138] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 2270.150932][T11138] vfs_read+0x27d/0xc70 [ 2270.150949][T11138] ? __cfi_vfs_read+0x10/0x10 [ 2270.150964][T11138] ? __kasan_check_write+0x18/0x20 [ 2270.150989][T11138] ? mutex_lock+0x92/0x1c0 [ 2270.151006][T11138] ? __cfi_mutex_lock+0x10/0x10 [ 2270.151023][T11138] ? __fget_files+0x2c5/0x340 [ 2270.151043][T11138] ksys_read+0x141/0x250 [ 2270.151060][T11138] ? __cfi_ksys_read+0x10/0x10 [ 2270.151084][T11138] ? __kasan_check_read+0x15/0x20 [ 2270.151107][T11138] __x64_sys_read+0x7f/0x90 [ 2270.151127][T11138] x64_sys_call+0x2638/0x2ee0 [ 2270.151151][T11138] do_syscall_64+0x58/0xf0 [ 2270.151173][T11138] ? clear_bhb_loop+0x50/0xa0 [ 2270.151192][T11138] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 2270.151212][T11138] RIP: 0033:0x7f176a38e0dc [ 2270.151227][T11138] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 2270.151242][T11138] RSP: 002b:00007f176b1c5030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2270.151262][T11138] RAX: ffffffffffffffda RBX: 00007f176a5e5fa0 RCX: 00007f176a38e0dc [ 2270.151277][T11138] RDX: 000000000000000f RSI: 00007f176b1c50a0 RDI: 000000000000000a [ 2270.151289][T11138] RBP: 00007f176b1c5090 R08: 0000000000000000 R09: 0000000000000058 [ 2270.151302][T11138] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2270.151314][T11138] R13: 00007f176a5e6038 R14: 00007f176a5e5fa0 R15: 00007ffedce1a3e8 [ 2270.151330][T11138] [ 2270.802827][T11151] FAULT_INJECTION: forcing a failure. [ 2270.802827][T11151] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2270.826033][T11151] CPU: 1 UID: 0 PID: 11151 Comm: syz.6.66006 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 2270.826066][T11151] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2270.826079][T11151] Call Trace: [ 2270.826086][T11151] [ 2270.826094][T11151] __dump_stack+0x21/0x30 [ 2270.826124][T11151] dump_stack_lvl+0x10c/0x190 [ 2270.826147][T11151] ? __cfi_dump_stack_lvl+0x10/0x10 [ 2270.826172][T11151] dump_stack+0x19/0x20 [ 2270.826194][T11151] should_fail_ex+0x3d9/0x530 [ 2270.826215][T11151] should_fail+0xf/0x20 [ 2270.826232][T11151] should_fail_usercopy+0x1e/0x30 [ 2270.826252][T11151] strncpy_from_user+0x28/0x270 [ 2270.826272][T11151] getname_flags+0x102/0x710 [ 2270.826296][T11151] ? build_open_flags+0x487/0x600 [ 2270.826320][T11151] getname+0x1b/0x30 [ 2270.826337][T11151] do_sys_openat2+0xcb/0x1c0 [ 2270.826359][T11151] ? fput+0x1a5/0x240 [ 2270.826380][T11151] ? do_sys_open+0x100/0x100 [ 2270.826402][T11151] ? ksys_write+0x1ef/0x250 [ 2270.826420][T11151] ? __cfi_ksys_write+0x10/0x10 [ 2270.826439][T11151] __x64_sys_openat+0x13a/0x170 [ 2270.826463][T11151] x64_sys_call+0xe69/0x2ee0 [ 2270.826488][T11151] do_syscall_64+0x58/0xf0 [ 2270.826512][T11151] ? clear_bhb_loop+0x50/0xa0 [ 2270.826532][T11151] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 2270.826552][T11151] RIP: 0033:0x7f4cb8b8df10 [ 2270.826568][T11151] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 69 95 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 bc 95 02 00 8b 44 [ 2270.826584][T11151] RSP: 002b:00007f4cb9a66f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 2270.826606][T11151] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f4cb8b8df10 [ 2270.826621][T11151] RDX: 0000000000000002 RSI: 00007f4cb9a66fa0 RDI: 00000000ffffff9c [ 2270.826635][T11151] RBP: 00007f4cb9a66fa0 R08: 0000000000000000 R09: 0000000000000000 [ 2270.826648][T11151] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 2270.826660][T11151] R13: 00007f4cb8de6038 R14: 00007f4cb8de5fa0 R15: 00007ffc06e653a8 [ 2270.826677][T11151] [ 2271.401388][T11201] FAULT_INJECTION: forcing a failure. [ 2271.401388][T11201] name failslab, interval 1, probability 0, space 0, times 0 [ 2271.429107][T11201] CPU: 0 UID: 0 PID: 11201 Comm: syz.7.66030 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 2271.429137][T11201] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2271.429149][T11201] Call Trace: [ 2271.429155][T11201] [ 2271.429163][T11201] __dump_stack+0x21/0x30 [ 2271.429200][T11201] dump_stack_lvl+0x10c/0x190 [ 2271.429223][T11201] ? __cfi_dump_stack_lvl+0x10/0x10 [ 2271.429247][T11201] dump_stack+0x19/0x20 [ 2271.429269][T11201] should_fail_ex+0x3d9/0x530 [ 2271.429288][T11201] should_failslab+0xac/0x100 [ 2271.429309][T11201] kmem_cache_alloc_noprof+0x42/0x430 [ 2271.429326][T11201] ? getname_flags+0xc6/0x710 [ 2271.429343][T11201] ? __kasan_check_write+0x18/0x20 [ 2271.429369][T11201] getname_flags+0xc6/0x710 [ 2271.429387][T11201] user_path_at+0x2b/0x60 [ 2271.429405][T11201] path_getxattr+0xa6/0x200 [ 2271.429424][T11201] ? path_setxattr+0x560/0x560 [ 2271.429443][T11201] __x64_sys_getxattr+0xa5/0xc0 [ 2271.429468][T11201] x64_sys_call+0x2c80/0x2ee0 [ 2271.429492][T11201] do_syscall_64+0x58/0xf0 [ 2271.429515][T11201] ? clear_bhb_loop+0x50/0xa0 [ 2271.429534][T11201] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 2271.429553][T11201] RIP: 0033:0x7f7295d8f6c9 [ 2271.429569][T11201] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2271.429585][T11201] RSP: 002b:00007f7296c3e038 EFLAGS: 00000246 ORIG_RAX: 00000000000000bf [ 2271.429605][T11201] RAX: ffffffffffffffda RBX: 00007f7295fe5fa0 RCX: 00007f7295d8f6c9 [ 2271.429620][T11201] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000140 [ 2271.429632][T11201] RBP: 00007f7296c3e090 R08: 0000000000000000 R09: 0000000000000000 [ 2271.429645][T11201] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2271.429658][T11201] R13: 00007f7295fe6038 R14: 00007f7295fe5fa0 R15: 00007ffec57d3288 [ 2271.429675][T11201] [ 2271.661693][T11219] FAT-fs (rnullb0): bogus number of reserved sectors [ 2271.668397][T11219] FAT-fs (rnullb0): Can't find a valid FAT filesystem [ 2272.250420][ T36] audit: type=1400 audit(1763284227.931:449): avc: denied { bind } for pid=11239 comm="syz.7.66047" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2272.879790][ T36] audit: type=1400 audit(1763284228.561:450): avc: denied { getopt } for pid=11275 comm="syz.2.66059" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 2273.073179][T11297] FAULT_INJECTION: forcing a failure. [ 2273.073179][T11297] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2273.087765][T11297] CPU: 1 UID: 0 PID: 11297 Comm: syz.6.66069 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 2273.087795][T11297] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2273.087808][T11297] Call Trace: [ 2273.087815][T11297] [ 2273.087823][T11297] __dump_stack+0x21/0x30 [ 2273.087853][T11297] dump_stack_lvl+0x10c/0x190 [ 2273.087877][T11297] ? __cfi_dump_stack_lvl+0x10/0x10 [ 2273.087902][T11297] dump_stack+0x19/0x20 [ 2273.087924][T11297] should_fail_ex+0x3d9/0x530 [ 2273.087944][T11297] should_fail+0xf/0x20 [ 2273.087962][T11297] should_fail_usercopy+0x1e/0x30 [ 2273.087982][T11297] strncpy_from_user+0x28/0x270 [ 2273.088001][T11297] path_setxattr+0xf3/0x560 [ 2273.088022][T11297] ? simple_xattrs_free+0x180/0x180 [ 2273.088045][T11297] ? __cfi_ksys_write+0x10/0x10 [ 2273.088063][T11297] __x64_sys_lsetxattr+0xc6/0xe0 [ 2273.088089][T11297] x64_sys_call+0x2db8/0x2ee0 [ 2273.088122][T11297] do_syscall_64+0x58/0xf0 [ 2273.088146][T11297] ? clear_bhb_loop+0x50/0xa0 [ 2273.088167][T11297] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 2273.088187][T11297] RIP: 0033:0x7f4cb8b8f6c9 [ 2273.088202][T11297] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2273.088219][T11297] RSP: 002b:00007f4cb9a67038 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd [ 2273.088241][T11297] RAX: ffffffffffffffda RBX: 00007f4cb8de5fa0 RCX: 00007f4cb8b8f6c9 [ 2273.088257][T11297] RDX: 0000000000000000 RSI: 0000200000000540 RDI: 0000200000000400 [ 2273.088271][T11297] RBP: 00007f4cb9a67090 R08: 0000000000000003 R09: 0000000000000000 [ 2273.088284][T11297] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2273.088296][T11297] R13: 00007f4cb8de6038 R14: 00007f4cb8de5fa0 R15: 00007ffc06e653a8 [ 2273.088313][T11297] [ 2274.341059][T11391] FAULT_INJECTION: forcing a failure. [ 2274.341059][T11391] name failslab, interval 1, probability 0, space 0, times 0 [ 2274.360351][T11391] CPU: 0 UID: 0 PID: 11391 Comm: syz.6.66111 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 2274.360382][T11391] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2274.360393][T11391] Call Trace: [ 2274.360399][T11391] [ 2274.360407][T11391] __dump_stack+0x21/0x30 [ 2274.360435][T11391] dump_stack_lvl+0x10c/0x190 [ 2274.360456][T11391] ? __cfi_dump_stack_lvl+0x10/0x10 [ 2274.360476][T11391] ? __cfi_vfs_write+0x10/0x10 [ 2274.360490][T11391] dump_stack+0x19/0x20 [ 2274.360506][T11391] should_fail_ex+0x3d9/0x530 [ 2274.360522][T11391] should_failslab+0xac/0x100 [ 2274.360538][T11391] kmem_cache_alloc_noprof+0x42/0x430 [ 2274.360552][T11391] ? __se_sys_getcwd+0x6c/0x440 [ 2274.360651][T11391] ? ksys_write+0x1ef/0x250 [ 2274.360664][T11391] __se_sys_getcwd+0x6c/0x440 [ 2274.360685][T11391] ? __kasan_check_read+0x15/0x20 [ 2274.360705][T11391] __x64_sys_getcwd+0x5f/0x80 [ 2274.360725][T11391] x64_sys_call+0x1c71/0x2ee0 [ 2274.360754][T11391] do_syscall_64+0x58/0xf0 [ 2274.360773][T11391] ? clear_bhb_loop+0x50/0xa0 [ 2274.360789][T11391] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 2274.360804][T11391] RIP: 0033:0x7f4cb8b8f6c9 [ 2274.360817][T11391] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2274.360829][T11391] RSP: 002b:00007f4cb9a67038 EFLAGS: 00000246 ORIG_RAX: 000000000000004f [ 2274.360845][T11391] RAX: ffffffffffffffda RBX: 00007f4cb8de5fa0 RCX: 00007f4cb8b8f6c9 [ 2274.360857][T11391] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2274.360866][T11391] RBP: 00007f4cb9a67090 R08: 0000000000000000 R09: 0000000000000000 [ 2274.360876][T11391] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2274.360886][T11391] R13: 00007f4cb8de6038 R14: 00007f4cb8de5fa0 R15: 00007ffc06e653a8 [ 2274.360898][T11391] [ 2274.403598][T11406] rust_binder: Transaction failed: BR_FAILED_REPLY { source: ENOENT } my_pid:1340 [ 2274.562270][T11411] FAULT_INJECTION: forcing a failure. [ 2274.562270][T11411] name failslab, interval 1, probability 0, space 0, times 0 [ 2274.601751][T11411] CPU: 0 UID: 0 PID: 11411 Comm: syz.2.66117 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 2274.601782][T11411] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2274.601794][T11411] Call Trace: [ 2274.601801][T11411] [ 2274.601808][T11411] __dump_stack+0x21/0x30 [ 2274.601837][T11411] dump_stack_lvl+0x10c/0x190 [ 2274.601861][T11411] ? __cfi_dump_stack_lvl+0x10/0x10 [ 2274.601884][T11411] ? __cfi_vfs_write+0x10/0x10 [ 2274.601903][T11411] dump_stack+0x19/0x20 [ 2274.601925][T11411] should_fail_ex+0x3d9/0x530 [ 2274.601945][T11411] should_failslab+0xac/0x100 [ 2274.601965][T11411] kmem_cache_alloc_noprof+0x42/0x430 [ 2274.601983][T11411] ? ksys_write+0x1ef/0x250 [ 2274.601999][T11411] ? getname_flags+0xc6/0x710 [ 2274.602019][T11411] getname_flags+0xc6/0x710 [ 2274.602037][T11411] __x64_sys_mknodat+0x9a/0xc0 [ 2274.602059][T11411] x64_sys_call+0x21b9/0x2ee0 [ 2274.602083][T11411] do_syscall_64+0x58/0xf0 [ 2274.602106][T11411] ? clear_bhb_loop+0x50/0xa0 [ 2274.602127][T11411] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 2274.602145][T11411] RIP: 0033:0x7f176a38f6c9 [ 2274.602158][T11411] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2274.602172][T11411] RSP: 002b:00007f176b1c5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000103 [ 2274.602192][T11411] RAX: ffffffffffffffda RBX: 00007f176a5e5fa0 RCX: 00007f176a38f6c9 [ 2274.602205][T11411] RDX: 0000000000000000 RSI: 0000200000000040 RDI: ffffffffffffff9c [ 2274.602218][T11411] RBP: 00007f176b1c5090 R08: 0000000000000000 R09: 0000000000000000 [ 2274.602229][T11411] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2274.602239][T11411] R13: 00007f176a5e6038 R14: 00007f176a5e5fa0 R15: 00007ffedce1a3e8 [ 2274.602253][T11411] [ 2274.926479][T11428] FAULT_INJECTION: forcing a failure. [ 2274.926479][T11428] name failslab, interval 1, probability 0, space 0, times 0 [ 2274.971641][T11428] CPU: 1 UID: 0 PID: 11428 Comm: syz.2.66125 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 2274.971672][T11428] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2274.971684][T11428] Call Trace: [ 2274.971690][T11428] [ 2274.971699][T11428] __dump_stack+0x21/0x30 [ 2274.971728][T11428] dump_stack_lvl+0x10c/0x190 [ 2274.971752][T11428] ? __cfi_dump_stack_lvl+0x10/0x10 [ 2274.971776][T11428] ? __cfi_vfs_write+0x10/0x10 [ 2274.971795][T11428] dump_stack+0x19/0x20 [ 2274.971818][T11428] should_fail_ex+0x3d9/0x530 [ 2274.971838][T11428] should_failslab+0xac/0x100 [ 2274.971859][T11428] kmem_cache_alloc_noprof+0x42/0x430 [ 2274.971877][T11428] ? ksys_write+0x1ef/0x250 [ 2274.971894][T11428] ? getname_flags+0xc6/0x710 [ 2274.971913][T11428] getname_flags+0xc6/0x710 [ 2274.971939][T11428] __x64_sys_mknodat+0x9a/0xc0 [ 2274.971962][T11428] x64_sys_call+0x21b9/0x2ee0 [ 2274.971987][T11428] do_syscall_64+0x58/0xf0 [ 2274.972011][T11428] ? clear_bhb_loop+0x50/0xa0 [ 2274.972032][T11428] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 2274.972051][T11428] RIP: 0033:0x7f176a38f6c9 [ 2274.972068][T11428] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2274.972084][T11428] RSP: 002b:00007f176b1c5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000103 [ 2274.972105][T11428] RAX: ffffffffffffffda RBX: 00007f176a5e5fa0 RCX: 00007f176a38f6c9 [ 2274.972120][T11428] RDX: 0000000000000000 RSI: 0000200000000040 RDI: ffffffffffffff9c [ 2274.972134][T11428] RBP: 00007f176b1c5090 R08: 0000000000000000 R09: 0000000000000000 [ 2274.972146][T11428] R10: 00000000000000ad R11: 0000000000000246 R12: 0000000000000001 [ 2274.972159][T11428] R13: 00007f176a5e6038 R14: 00007f176a5e5fa0 R15: 00007ffedce1a3e8 [ 2274.972175][T11428] [ 2275.821158][T11480] overlay: Unknown parameter '/' [ 2275.940264][T11492] FAULT_INJECTION: forcing a failure. [ 2275.940264][T11492] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2275.970284][T11492] CPU: 0 UID: 0 PID: 11492 Comm: syz.1.66153 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 2275.970314][T11492] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2275.970325][T11492] Call Trace: [ 2275.970331][T11492] [ 2275.970338][T11492] __dump_stack+0x21/0x30 [ 2275.970366][T11492] dump_stack_lvl+0x10c/0x190 [ 2275.970386][T11492] ? __cfi_dump_stack_lvl+0x10/0x10 [ 2275.970409][T11492] ? check_stack_object+0x12c/0x140 [ 2275.970426][T11492] dump_stack+0x19/0x20 [ 2275.970446][T11492] should_fail_ex+0x3d9/0x530 [ 2275.970463][T11492] should_fail+0xf/0x20 [ 2275.970479][T11492] should_fail_usercopy+0x1e/0x30 [ 2275.970497][T11492] _copy_to_user+0x24/0xa0 [ 2275.970518][T11492] simple_read_from_buffer+0xed/0x160 [ 2275.970540][T11492] proc_fail_nth_read+0x19e/0x210 [ 2275.970562][T11492] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 2275.970583][T11492] ? bpf_lsm_file_permission+0xd/0x20 [ 2275.970606][T11492] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 2275.970639][T11492] vfs_read+0x27d/0xc70 [ 2275.970657][T11492] ? __cfi_vfs_read+0x10/0x10 [ 2275.970673][T11492] ? __kasan_check_write+0x18/0x20 [ 2275.970700][T11492] ? mutex_lock+0x92/0x1c0 [ 2275.970717][T11492] ? __cfi_mutex_lock+0x10/0x10 [ 2275.970734][T11492] ? __fget_files+0x2c5/0x340 [ 2275.970757][T11492] ksys_read+0x141/0x250 [ 2275.970774][T11492] ? __cfi_ksys_read+0x10/0x10 [ 2275.970792][T11492] ? __kasan_check_read+0x15/0x20 [ 2275.970818][T11492] __x64_sys_read+0x7f/0x90 [ 2275.970835][T11492] x64_sys_call+0x2638/0x2ee0 [ 2275.970861][T11492] do_syscall_64+0x58/0xf0 [ 2275.970883][T11492] ? clear_bhb_loop+0x50/0xa0 [ 2275.970904][T11492] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 2275.970924][T11492] RIP: 0033:0x7f72ffb8e0dc [ 2275.970941][T11492] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 2275.970956][T11492] RSP: 002b:00007f7300ae5030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2275.970977][T11492] RAX: ffffffffffffffda RBX: 00007f72ffde5fa0 RCX: 00007f72ffb8e0dc [ 2275.970992][T11492] RDX: 000000000000000f RSI: 00007f7300ae50a0 RDI: 0000000000000009 [ 2275.971005][T11492] RBP: 00007f7300ae5090 R08: 0000000000000000 R09: 0000000000000000 [ 2275.971018][T11492] R10: 0000000000080000 R11: 0000000000000246 R12: 0000000000000001 [ 2275.971031][T11492] R13: 00007f72ffde6038 R14: 00007f72ffde5fa0 R15: 00007ffc9a0de9a8 [ 2275.971048][T11492] [ 2276.670335][T11516] FAULT_INJECTION: forcing a failure. [ 2276.670335][T11516] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2276.694819][T11516] CPU: 0 UID: 0 PID: 11516 Comm: syz.2.66165 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 2276.694855][T11516] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2276.694875][T11516] Call Trace: [ 2276.694883][T11516] [ 2276.694891][T11516] __dump_stack+0x21/0x30 [ 2276.694921][T11516] dump_stack_lvl+0x10c/0x190 [ 2276.694944][T11516] ? __cfi_dump_stack_lvl+0x10/0x10 [ 2276.694969][T11516] ? do_vfs_ioctl+0xeda/0x1e30 [ 2276.694990][T11516] ? check_stack_object+0x107/0x140 [ 2276.695008][T11516] dump_stack+0x19/0x20 [ 2276.695031][T11516] should_fail_ex+0x3d9/0x530 [ 2276.695051][T11516] should_fail+0xf/0x20 [ 2276.695068][T11516] should_fail_usercopy+0x1e/0x30 [ 2276.695088][T11516] _copy_from_user+0x22/0xb0 [ 2276.695111][T11516] kvm_vm_ioctl+0x5f7/0xb80 [ 2276.695135][T11516] ? __cfi_kvm_vm_ioctl+0x10/0x10 [ 2276.695159][T11516] ? ioctl_has_perm+0x1aa/0x4d0 [ 2276.695180][T11516] ? __asan_memcpy+0x5a/0x80 [ 2276.695198][T11516] ? ioctl_has_perm+0x3e0/0x4d0 [ 2276.695221][T11516] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 2276.695247][T11516] ? selinux_file_ioctl+0x6e0/0x1360 [ 2276.695268][T11516] ? vfs_write+0x93e/0xf30 [ 2276.695285][T11516] ? __cfi_selinux_file_ioctl+0x10/0x10 [ 2276.695307][T11516] ? __cfi_vfs_write+0x10/0x10 [ 2276.695325][T11516] ? __kasan_check_write+0x18/0x20 [ 2276.695350][T11516] ? mutex_unlock+0x8b/0x240 [ 2276.695369][T11516] ? __cfi_mutex_unlock+0x10/0x10 [ 2276.695385][T11516] ? __fget_files+0x2c5/0x340 [ 2276.695405][T11516] ? __fget_files+0x2c5/0x340 [ 2276.695424][T11516] ? bpf_lsm_file_ioctl+0xd/0x20 [ 2276.695449][T11516] ? security_file_ioctl+0x34/0xd0 [ 2276.695470][T11516] ? __cfi_kvm_vm_ioctl+0x10/0x10 [ 2276.695493][T11516] __se_sys_ioctl+0x135/0x1b0 [ 2276.695513][T11516] __x64_sys_ioctl+0x7f/0xa0 [ 2276.695532][T11516] x64_sys_call+0x1878/0x2ee0 [ 2276.695557][T11516] do_syscall_64+0x58/0xf0 [ 2276.695579][T11516] ? clear_bhb_loop+0x50/0xa0 [ 2276.695600][T11516] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 2276.695619][T11516] RIP: 0033:0x7f176a38f6c9 [ 2276.695636][T11516] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2276.695652][T11516] RSP: 002b:00007f176b1c5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2276.695673][T11516] RAX: ffffffffffffffda RBX: 00007f176a5e5fa0 RCX: 00007f176a38f6c9 [ 2276.695688][T11516] RDX: 0000200000000180 RSI: 000000004020ae46 RDI: 0000000000000007 [ 2276.695702][T11516] RBP: 00007f176b1c5090 R08: 0000000000000000 R09: 0000000000000000 [ 2276.695715][T11516] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2276.695727][T11516] R13: 00007f176a5e6038 R14: 00007f176a5e5fa0 R15: 00007ffedce1a3e8 [ 2276.695744][T11516] [ 2277.321531][T11553] FAULT_INJECTION: forcing a failure. [ 2277.321531][T11553] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2277.343168][T11553] CPU: 0 UID: 0 PID: 11553 Comm: syz.1.66178 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 2277.343200][T11553] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2277.343212][T11553] Call Trace: [ 2277.343219][T11553] [ 2277.343226][T11553] __dump_stack+0x21/0x30 [ 2277.343257][T11553] dump_stack_lvl+0x10c/0x190 [ 2277.343280][T11553] ? __cfi_dump_stack_lvl+0x10/0x10 [ 2277.343306][T11553] dump_stack+0x19/0x20 [ 2277.343328][T11553] should_fail_ex+0x3d9/0x530 [ 2277.343348][T11553] should_fail+0xf/0x20 [ 2277.343365][T11553] should_fail_usercopy+0x1e/0x30 [ 2277.343384][T11553] _copy_from_user+0x22/0xb0 [ 2277.343406][T11553] vlan_ioctl_handler+0x9e/0x680 [ 2277.343535][T11553] ? __cfi_vlan_ioctl_handler+0x10/0x10 [ 2277.343557][T11553] ? __kasan_check_write+0x18/0x20 [ 2277.343584][T11553] ? mutex_unlock+0x8b/0x240 [ 2277.343602][T11553] ? __cfi_vlan_ioctl_handler+0x10/0x10 [ 2277.343622][T11553] sock_ioctl+0x532/0x7b0 [ 2277.343642][T11553] ? __cfi_sock_ioctl+0x10/0x10 [ 2277.343660][T11553] ? __fget_files+0x2c5/0x340 [ 2277.343681][T11553] ? bpf_lsm_file_ioctl+0xd/0x20 [ 2277.343706][T11553] ? security_file_ioctl+0x34/0xd0 [ 2277.343726][T11553] ? __cfi_sock_ioctl+0x10/0x10 [ 2277.343745][T11553] __se_sys_ioctl+0x135/0x1b0 [ 2277.343765][T11553] __x64_sys_ioctl+0x7f/0xa0 [ 2277.343784][T11553] x64_sys_call+0x1878/0x2ee0 [ 2277.343807][T11553] do_syscall_64+0x58/0xf0 [ 2277.343830][T11553] ? clear_bhb_loop+0x50/0xa0 [ 2277.343850][T11553] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 2277.343870][T11553] RIP: 0033:0x7f72ffb8f6c9 [ 2277.343886][T11553] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2277.343902][T11553] RSP: 002b:00007f7300ae5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2277.343923][T11553] RAX: ffffffffffffffda RBX: 00007f72ffde5fa0 RCX: 00007f72ffb8f6c9 [ 2277.343937][T11553] RDX: 0000200000000100 RSI: 0000000000008983 RDI: 0000000000000008 [ 2277.343951][T11553] RBP: 00007f7300ae5090 R08: 0000000000000000 R09: 0000000000000000 [ 2277.343964][T11553] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2277.343976][T11553] R13: 00007f72ffde6038 R14: 00007f72ffde5fa0 R15: 00007ffc9a0de9a8 [ 2277.343992][T11553] [ 2277.574694][T11555] veth0_to_team: entered promiscuous mode [ 2277.595118][T11555] veth0_to_team: entered allmulticast mode [ 2278.354398][T11612] bridge0: port 1(bridge_slave_0) entered blocking state [ 2278.370093][T11612] bridge0: port 1(bridge_slave_0) entered disabled state [ 2278.382523][T11612] bridge_slave_0: entered allmulticast mode [ 2278.388854][T11612] bridge_slave_0: entered promiscuous mode [ 2278.425974][T11612] bridge0: port 2(bridge_slave_1) entered blocking state [ 2278.435717][T11612] bridge0: port 2(bridge_slave_1) entered disabled state [ 2278.465677][T11612] bridge_slave_1: entered allmulticast mode [ 2278.490505][T11612] bridge_slave_1: entered promiscuous mode [ 2278.496567][T15650] bridge_slave_1: left allmulticast mode [ 2278.502416][T15650] bridge_slave_1: left promiscuous mode [ 2278.508020][T15650] bridge0: port 2(bridge_slave_1) entered disabled state [ 2278.530646][T15650] bridge_slave_0: left allmulticast mode [ 2278.536299][T15650] bridge_slave_0: left promiscuous mode [ 2278.544319][T15650] bridge0: port 1(bridge_slave_0) entered disabled state [ 2278.699596][T15650] veth1_macvtap: left promiscuous mode [ 2278.705161][T15650] veth0_vlan: left promiscuous mode [ 2278.935514][T11650] raw_sendmsg: syz.7.66213 forgot to set AF_INET. Fix it! [ 2278.951756][ T293] bridge0: port 1(bridge_slave_0) entered blocking state [ 2278.958817][ T293] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2278.976643][ T293] bridge0: port 2(bridge_slave_1) entered blocking state [ 2278.983699][ T293] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2279.032757][T11661] FAULT_INJECTION: forcing a failure. [ 2279.032757][T11661] name failslab, interval 1, probability 0, space 0, times 0 [ 2279.050341][T11661] CPU: 0 UID: 0 PID: 11661 Comm: syz.2.66221 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 2279.050372][T11661] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2279.050384][T11661] Call Trace: [ 2279.050391][T11661] [ 2279.050397][T11661] __dump_stack+0x21/0x30 [ 2279.050427][T11661] dump_stack_lvl+0x10c/0x190 [ 2279.050450][T11661] ? __cfi_dump_stack_lvl+0x10/0x10 [ 2279.050475][T11661] dump_stack+0x19/0x20 [ 2279.050496][T11661] should_fail_ex+0x3d9/0x530 [ 2279.050516][T11661] should_failslab+0xac/0x100 [ 2279.050537][T11661] kmem_cache_alloc_lru_noprof+0x44/0x430 [ 2279.050555][T11661] ? sock_alloc_inode+0x48/0x150 [ 2279.050576][T11661] sock_alloc_inode+0x48/0x150 [ 2279.050594][T11661] ? __cfi_sock_alloc_inode+0x10/0x10 [ 2279.050611][T11661] alloc_inode+0x7a/0x270 [ 2279.050631][T11661] new_inode_pseudo+0x19/0x40 [ 2279.050659][T11661] do_accept+0x15a/0x6b0 [ 2279.050679][T11661] ? _raw_spin_lock+0x8c/0x120 [ 2279.050702][T11661] ? __cfi_do_accept+0x10/0x10 [ 2279.050723][T11661] __sys_accept4+0x11e/0x1c0 [ 2279.050741][T11661] ? __cfi___sys_accept4+0x10/0x10 [ 2279.050764][T11661] __x64_sys_accept4+0x9e/0xb0 [ 2279.050784][T11661] x64_sys_call+0x2527/0x2ee0 [ 2279.050808][T11661] do_syscall_64+0x58/0xf0 [ 2279.050830][T11661] ? clear_bhb_loop+0x50/0xa0 [ 2279.050850][T11661] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 2279.050869][T11661] RIP: 0033:0x7f176a38f6c9 [ 2279.050883][T11661] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2279.050900][T11661] RSP: 002b:00007f176b1c5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000120 [ 2279.050921][T11661] RAX: ffffffffffffffda RBX: 00007f176a5e5fa0 RCX: 00007f176a38f6c9 [ 2279.050936][T11661] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 2279.050948][T11661] RBP: 00007f176b1c5090 R08: 0000000000000000 R09: 0000000000000000 [ 2279.050961][T11661] R10: 0000000000080000 R11: 0000000000000246 R12: 0000000000000001 [ 2279.050974][T11661] R13: 00007f176a5e6038 R14: 00007f176a5e5fa0 R15: 00007ffedce1a3e8 [ 2279.050991][T11661] [ 2279.055223][T11612] veth0_vlan: entered promiscuous mode [ 2279.231186][T11674] FAULT_INJECTION: forcing a failure. [ 2279.231186][T11674] name failslab, interval 1, probability 0, space 0, times 0 [ 2279.245511][T11612] veth1_macvtap: entered promiscuous mode [ 2279.297348][T11674] CPU: 1 UID: 0 PID: 11674 Comm: syz.2.66227 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 2279.297375][T11674] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2279.297387][T11674] Call Trace: [ 2279.297393][T11674] [ 2279.297400][T11674] __dump_stack+0x21/0x30 [ 2279.297427][T11674] dump_stack_lvl+0x10c/0x190 [ 2279.297447][T11674] ? __cfi_dump_stack_lvl+0x10/0x10 [ 2279.297468][T11674] dump_stack+0x19/0x20 [ 2279.297490][T11674] should_fail_ex+0x3d9/0x530 [ 2279.297507][T11674] should_failslab+0xac/0x100 [ 2279.297526][T11674] kmem_cache_alloc_lru_noprof+0x44/0x430 [ 2279.297542][T11674] ? sock_alloc_inode+0x48/0x150 [ 2279.297561][T11674] sock_alloc_inode+0x48/0x150 [ 2279.297577][T11674] ? __cfi_sock_alloc_inode+0x10/0x10 [ 2279.297594][T11674] alloc_inode+0x7a/0x270 [ 2279.297612][T11674] new_inode_pseudo+0x19/0x40 [ 2279.297629][T11674] do_accept+0x15a/0x6b0 [ 2279.297653][T11674] ? _raw_spin_lock+0x8c/0x120 [ 2279.297673][T11674] ? __cfi_do_accept+0x10/0x10 [ 2279.297694][T11674] __sys_accept4+0x11e/0x1c0 [ 2279.297713][T11674] ? __cfi___sys_accept4+0x10/0x10 [ 2279.297734][T11674] __x64_sys_accept4+0x9e/0xb0 [ 2279.297753][T11674] x64_sys_call+0x2527/0x2ee0 [ 2279.297775][T11674] do_syscall_64+0x58/0xf0 [ 2279.297794][T11674] ? clear_bhb_loop+0x50/0xa0 [ 2279.297812][T11674] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 2279.297829][T11674] RIP: 0033:0x7f176a38f6c9 [ 2279.297843][T11674] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2279.297857][T11674] RSP: 002b:00007f176b1c5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000120 [ 2279.297876][T11674] RAX: ffffffffffffffda RBX: 00007f176a5e5fa0 RCX: 00007f176a38f6c9 [ 2279.297889][T11674] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000008 [ 2279.297899][T11674] RBP: 00007f176b1c5090 R08: 0000000000000000 R09: 0000000000000000 [ 2279.297910][T11674] R10: 0000000000080000 R11: 0000000000000246 R12: 0000000000000001 [ 2279.297921][T11674] R13: 00007f176a5e6038 R14: 00007f176a5e5fa0 R15: 00007ffedce1a3e8 [ 2279.297935][T11674] [ 2279.590673][T11685] FAULT_INJECTION: forcing a failure. [ 2279.590673][T11685] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2279.620069][T11685] CPU: 1 UID: 0 PID: 11685 Comm: syz.6.66200 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 2279.620100][T11685] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2279.620112][T11685] Call Trace: [ 2279.620118][T11685] [ 2279.620126][T11685] __dump_stack+0x21/0x30 [ 2279.620155][T11685] dump_stack_lvl+0x10c/0x190 [ 2279.620177][T11685] ? __cfi_dump_stack_lvl+0x10/0x10 [ 2279.620202][T11685] dump_stack+0x19/0x20 [ 2279.620223][T11685] should_fail_ex+0x3d9/0x530 [ 2279.620242][T11685] should_fail+0xf/0x20 [ 2279.620258][T11685] should_fail_usercopy+0x1e/0x30 [ 2279.620277][T11685] _copy_from_user+0x22/0xb0 [ 2279.620297][T11685] vlan_ioctl_handler+0x9e/0x680 [ 2279.620318][T11685] ? __cfi_vlan_ioctl_handler+0x10/0x10 [ 2279.620339][T11685] ? __kasan_check_write+0x18/0x20 [ 2279.620373][T11685] ? mutex_unlock+0x8b/0x240 [ 2279.620391][T11685] ? __cfi_vlan_ioctl_handler+0x10/0x10 [ 2279.620410][T11685] sock_ioctl+0x532/0x7b0 [ 2279.620429][T11685] ? __cfi_sock_ioctl+0x10/0x10 [ 2279.620446][T11685] ? __fget_files+0x2c5/0x340 [ 2279.620465][T11685] ? bpf_lsm_file_ioctl+0xd/0x20 [ 2279.620488][T11685] ? security_file_ioctl+0x34/0xd0 [ 2279.620508][T11685] ? __cfi_sock_ioctl+0x10/0x10 [ 2279.620525][T11685] __se_sys_ioctl+0x135/0x1b0 [ 2279.620545][T11685] __x64_sys_ioctl+0x7f/0xa0 [ 2279.620564][T11685] x64_sys_call+0x1878/0x2ee0 [ 2279.620588][T11685] do_syscall_64+0x58/0xf0 [ 2279.620610][T11685] ? clear_bhb_loop+0x50/0xa0 [ 2279.620628][T11685] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 2279.620647][T11685] RIP: 0033:0x7fac04d8f6c9 [ 2279.620663][T11685] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2279.620679][T11685] RSP: 002b:00007fac05bd7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2279.620697][T11685] RAX: ffffffffffffffda RBX: 00007fac04fe5fa0 RCX: 00007fac04d8f6c9 [ 2279.620711][T11685] RDX: 0000200000000100 RSI: 0000000000008983 RDI: 0000000000000008 [ 2279.620724][T11685] RBP: 00007fac05bd7090 R08: 0000000000000000 R09: 0000000000000000 [ 2279.620737][T11685] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2279.620750][T11685] R13: 00007fac04fe6038 R14: 00007fac04fe5fa0 R15: 00007ffef88bc408 [ 2279.620766][T11685] [ 2279.854469][T11701] FAULT_INJECTION: forcing a failure. [ 2279.854469][T11701] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2279.867525][T11701] CPU: 1 UID: 0 PID: 11701 Comm: syz.6.66238 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 2279.867553][T11701] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2279.867566][T11701] Call Trace: [ 2279.867572][T11701] [ 2279.867581][T11701] __dump_stack+0x21/0x30 [ 2279.867609][T11701] dump_stack_lvl+0x10c/0x190 [ 2279.867633][T11701] ? __cfi_dump_stack_lvl+0x10/0x10 [ 2279.867658][T11701] dump_stack+0x19/0x20 [ 2279.867680][T11701] should_fail_ex+0x3d9/0x530 [ 2279.867700][T11701] should_fail+0xf/0x20 [ 2279.867718][T11701] should_fail_usercopy+0x1e/0x30 [ 2279.867738][T11701] _copy_from_user+0x22/0xb0 [ 2279.867761][T11701] do_seccomp+0x1a5/0xee0 [ 2279.867860][T11701] ? vfs_write+0x93e/0xf30 [ 2279.867878][T11701] ? prctl_set_seccomp+0x80/0x80 [ 2279.867895][T11701] ? __cfi_vfs_write+0x10/0x10 [ 2279.867913][T11701] ? __kasan_check_read+0x15/0x20 [ 2279.867939][T11701] ? static_key_count+0x45/0x70 [ 2279.867991][T11701] prctl_set_seccomp+0x50/0x80 [ 2279.868008][T11701] __se_sys_prctl+0x2e4/0x1460 [ 2279.868056][T11701] ? __x64_sys_prctl+0xf0/0xf0 [ 2279.868074][T11701] __x64_sys_prctl+0xc3/0xf0 [ 2279.868090][T11701] x64_sys_call+0x2614/0x2ee0 [ 2279.868116][T11701] do_syscall_64+0x58/0xf0 [ 2279.868139][T11701] ? clear_bhb_loop+0x50/0xa0 [ 2279.868160][T11701] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 2279.868180][T11701] RIP: 0033:0x7fac04d8f6c9 [ 2279.868196][T11701] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2279.868212][T11701] RSP: 002b:00007fac05bd7038 EFLAGS: 00000246 ORIG_RAX: 000000000000009d [ 2279.868233][T11701] RAX: ffffffffffffffda RBX: 00007fac04fe5fa0 RCX: 00007fac04d8f6c9 [ 2279.868249][T11701] RDX: 0000200000000080 RSI: 0000000000000002 RDI: 0000000000000016 [ 2279.868262][T11701] RBP: 00007fac05bd7090 R08: 0000000000000000 R09: 0000000000000000 [ 2279.868275][T11701] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2279.868288][T11701] R13: 00007fac04fe6038 R14: 00007fac04fe5fa0 R15: 00007ffef88bc408 [ 2279.868305][T11701] [ 2280.125355][ T36] audit: type=1400 audit(1763284235.811:451): avc: denied { create } for pid=11713 comm="syz.6.66244" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 2280.157759][T11716] FAULT_INJECTION: forcing a failure. [ 2280.157759][T11716] name failslab, interval 1, probability 0, space 0, times 0 [ 2280.170447][T11716] CPU: 1 UID: 0 PID: 11716 Comm: syz.6.66245 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 2280.170473][T11716] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2280.170484][T11716] Call Trace: [ 2280.170490][T11716] [ 2280.170496][T11716] __dump_stack+0x21/0x30 [ 2280.170523][T11716] dump_stack_lvl+0x10c/0x190 [ 2280.170545][T11716] ? __cfi_dump_stack_lvl+0x10/0x10 [ 2280.170577][T11716] dump_stack+0x19/0x20 [ 2280.170598][T11716] should_fail_ex+0x3d9/0x530 [ 2280.170618][T11716] should_failslab+0xac/0x100 [ 2280.170638][T11716] kmem_cache_alloc_lru_noprof+0x44/0x430 [ 2280.170656][T11716] ? sock_alloc_inode+0x48/0x150 [ 2280.170677][T11716] ? __kasan_check_write+0x18/0x20 [ 2280.170702][T11716] sock_alloc_inode+0x48/0x150 [ 2280.170722][T11716] ? __cfi_sock_alloc_inode+0x10/0x10 [ 2280.170741][T11716] alloc_inode+0x7a/0x270 [ 2280.170760][T11716] ? bpf_lsm_socket_create+0xd/0x20 [ 2280.170782][T11716] new_inode_pseudo+0x19/0x40 [ 2280.170802][T11716] __sock_create+0x130/0x810 [ 2280.170823][T11716] __sys_socket+0xe2/0x1c0 [ 2280.170844][T11716] __x64_sys_socket+0x7e/0x90 [ 2280.170864][T11716] x64_sys_call+0x2608/0x2ee0 [ 2280.170888][T11716] do_syscall_64+0x58/0xf0 [ 2280.170909][T11716] ? clear_bhb_loop+0x50/0xa0 [ 2280.170928][T11716] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 2280.170947][T11716] RIP: 0033:0x7fac04d8f6c9 [ 2280.170962][T11716] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2280.170978][T11716] RSP: 002b:00007fac05bd7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 2280.170998][T11716] RAX: ffffffffffffffda RBX: 00007fac04fe5fa0 RCX: 00007fac04d8f6c9 [ 2280.171013][T11716] RDX: 0000000000000005 RSI: 0000000000000003 RDI: 0000000000000010 [ 2280.171025][T11716] RBP: 00007fac05bd7090 R08: 0000000000000000 R09: 0000000000000000 [ 2280.171036][T11716] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2280.171047][T11716] R13: 00007fac04fe6038 R14: 00007fac04fe5fa0 R15: 00007ffef88bc408 [ 2280.171062][T11716] [ 2280.171070][T11716] socket: no more sockets [ 2281.750560][ T36] audit: type=1400 audit(1763284237.441:452): avc: denied { ioctl } for pid=11831 comm="syz.2.66296" path="socket:[1096367]" dev="sockfs" ino=1096367 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2281.960482][ T36] audit: type=1400 audit(1763284237.651:453): avc: denied { ioctl } for pid=11857 comm="syz.6.66307" path="socket:[1096413]" dev="sockfs" ino=1096413 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2282.406057][T11900] FAULT_INJECTION: forcing a failure. [ 2282.406057][T11900] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2282.439440][T11900] CPU: 0 UID: 0 PID: 11900 Comm: syz.2.66326 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 2282.439477][T11900] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2282.439490][T11900] Call Trace: [ 2282.439497][T11900] [ 2282.439505][T11900] __dump_stack+0x21/0x30 [ 2282.439535][T11900] dump_stack_lvl+0x10c/0x190 [ 2282.439558][T11900] ? __cfi_dump_stack_lvl+0x10/0x10 [ 2282.439584][T11900] dump_stack+0x19/0x20 [ 2282.439606][T11900] should_fail_ex+0x3d9/0x530 [ 2282.439626][T11900] should_fail+0xf/0x20 [ 2282.439643][T11900] should_fail_usercopy+0x1e/0x30 [ 2282.439663][T11900] _copy_from_user+0x22/0xb0 [ 2282.439685][T11900] vlan_ioctl_handler+0x9e/0x680 [ 2282.439708][T11900] ? __cfi_vlan_ioctl_handler+0x10/0x10 [ 2282.439730][T11900] ? __kasan_check_write+0x18/0x20 [ 2282.439757][T11900] ? mutex_unlock+0x8b/0x240 [ 2282.439775][T11900] ? __cfi_vlan_ioctl_handler+0x10/0x10 [ 2282.439796][T11900] sock_ioctl+0x532/0x7b0 [ 2282.439814][T11900] ? __cfi_sock_ioctl+0x10/0x10 [ 2282.439830][T11900] ? __fget_files+0x2c5/0x340 [ 2282.439848][T11900] ? bpf_lsm_file_ioctl+0xd/0x20 [ 2282.439873][T11900] ? security_file_ioctl+0x34/0xd0 [ 2282.439894][T11900] ? __cfi_sock_ioctl+0x10/0x10 [ 2282.439913][T11900] __se_sys_ioctl+0x135/0x1b0 [ 2282.439932][T11900] __x64_sys_ioctl+0x7f/0xa0 [ 2282.439960][T11900] x64_sys_call+0x1878/0x2ee0 [ 2282.439989][T11900] do_syscall_64+0x58/0xf0 [ 2282.440012][T11900] ? clear_bhb_loop+0x50/0xa0 [ 2282.440032][T11900] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 2282.440052][T11900] RIP: 0033:0x7f176a38f6c9 [ 2282.440069][T11900] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2282.440086][T11900] RSP: 002b:00007f176b1c5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2282.440107][T11900] RAX: ffffffffffffffda RBX: 00007f176a5e5fa0 RCX: 00007f176a38f6c9 [ 2282.440123][T11900] RDX: 0000200000000a00 RSI: 0000000000008983 RDI: 0000000000000007 [ 2282.440136][T11900] RBP: 00007f176b1c5090 R08: 0000000000000000 R09: 0000000000000000 [ 2282.440150][T11900] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2282.440169][T11900] R13: 00007f176a5e6038 R14: 00007f176a5e5fa0 R15: 00007ffedce1a3e8 [ 2282.440186][T11900] [ 2282.726126][T11912] FAULT_INJECTION: forcing a failure. [ 2282.726126][T11912] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2282.745011][T11912] CPU: 0 UID: 0 PID: 11912 Comm: syz.2.66331 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 2282.745037][T11912] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2282.745049][T11912] Call Trace: [ 2282.745055][T11912] [ 2282.745062][T11912] __dump_stack+0x21/0x30 [ 2282.745090][T11912] dump_stack_lvl+0x10c/0x190 [ 2282.745112][T11912] ? __cfi_dump_stack_lvl+0x10/0x10 [ 2282.745135][T11912] ? check_stack_object+0x12c/0x140 [ 2282.745158][T11912] dump_stack+0x19/0x20 [ 2282.745179][T11912] should_fail_ex+0x3d9/0x530 [ 2282.745197][T11912] should_fail+0xf/0x20 [ 2282.745214][T11912] should_fail_usercopy+0x1e/0x30 [ 2282.745238][T11912] _copy_to_user+0x24/0xa0 [ 2282.745260][T11912] simple_read_from_buffer+0xed/0x160 [ 2282.745282][T11912] proc_fail_nth_read+0x19e/0x210 [ 2282.745306][T11912] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 2282.745328][T11912] ? bpf_lsm_file_permission+0xd/0x20 [ 2282.745351][T11912] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 2282.745374][T11912] vfs_read+0x27d/0xc70 [ 2282.745390][T11912] ? __cfi_vfs_read+0x10/0x10 [ 2282.745411][T11912] ? __kasan_check_write+0x18/0x20 [ 2282.745435][T11912] ? mutex_lock+0x92/0x1c0 [ 2282.745452][T11912] ? __cfi_mutex_lock+0x10/0x10 [ 2282.745468][T11912] ? __fget_files+0x2c5/0x340 [ 2282.745489][T11912] ksys_read+0x141/0x250 [ 2282.745506][T11912] ? __cfi_ksys_read+0x10/0x10 [ 2282.745523][T11912] ? __kasan_check_read+0x15/0x20 [ 2282.745547][T11912] __x64_sys_read+0x7f/0x90 [ 2282.745563][T11912] x64_sys_call+0x2638/0x2ee0 [ 2282.745588][T11912] do_syscall_64+0x58/0xf0 [ 2282.745608][T11912] ? clear_bhb_loop+0x50/0xa0 [ 2282.745628][T11912] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 2282.745646][T11912] RIP: 0033:0x7f176a38e0dc [ 2282.745659][T11912] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 2282.745675][T11912] RSP: 002b:00007f176b1c5030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2282.745694][T11912] RAX: ffffffffffffffda RBX: 00007f176a5e5fa0 RCX: 00007f176a38e0dc [ 2282.745708][T11912] RDX: 000000000000000f RSI: 00007f176b1c50a0 RDI: 0000000000000007 [ 2282.745720][T11912] RBP: 00007f176b1c5090 R08: 0000000000000000 R09: 0000000000000000 [ 2282.745731][T11912] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2282.745743][T11912] R13: 00007f176a5e6038 R14: 00007f176a5e5fa0 R15: 00007ffedce1a3e8 [ 2282.745759][T11912] [ 2282.935923][T11929] syz_tun: mtu less than device minimum [ 2282.937837][ T36] audit: type=1400 audit(1763284238.601:454): avc: denied { ioctl } for pid=11928 comm="syz.6.66338" path="socket:[1096604]" dev="sockfs" ino=1096604 ioctlcmd=0x8922 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 2283.018828][ T36] audit: type=1400 audit(1763284238.641:455): avc: denied { accept } for pid=11928 comm="syz.6.66338" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 2283.287229][T11959] netlink: 84 bytes leftover after parsing attributes in process `syz.7.66351'. [ 2283.586825][ T36] audit: type=1326 audit(1763284239.271:456): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11981 comm="syz.7.66360" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f7295d8f6c9 code=0x0 [ 2285.499968][T12106] FAULT_INJECTION: forcing a failure. [ 2285.499968][T12106] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2285.513213][T12106] CPU: 1 UID: 0 PID: 12106 Comm: syz.2.66413 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 2285.513245][T12106] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2285.513256][T12106] Call Trace: [ 2285.513263][T12106] [ 2285.513271][T12106] __dump_stack+0x21/0x30 [ 2285.513300][T12106] dump_stack_lvl+0x10c/0x190 [ 2285.513322][T12106] ? __cfi_dump_stack_lvl+0x10/0x10 [ 2285.513345][T12106] dump_stack+0x19/0x20 [ 2285.513366][T12106] should_fail_ex+0x3d9/0x530 [ 2285.513385][T12106] should_fail+0xf/0x20 [ 2285.513402][T12106] should_fail_usercopy+0x1e/0x30 [ 2285.513421][T12106] strncpy_from_user+0x28/0x270 [ 2285.513440][T12106] getname_flags+0x102/0x710 [ 2285.513458][T12106] ? build_open_flags+0x487/0x600 [ 2285.513481][T12106] getname+0x1b/0x30 [ 2285.513498][T12106] do_sys_openat2+0xcb/0x1c0 [ 2285.513518][T12106] ? fput+0x1a5/0x240 [ 2285.513539][T12106] ? do_sys_open+0x100/0x100 [ 2285.513559][T12106] ? ksys_write+0x1ef/0x250 [ 2285.513576][T12106] ? __cfi_ksys_write+0x10/0x10 [ 2285.513593][T12106] __x64_sys_openat+0x13a/0x170 [ 2285.513614][T12106] x64_sys_call+0xe69/0x2ee0 [ 2285.513637][T12106] do_syscall_64+0x58/0xf0 [ 2285.513659][T12106] ? clear_bhb_loop+0x50/0xa0 [ 2285.513680][T12106] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 2285.513698][T12106] RIP: 0033:0x7f176a38f6c9 [ 2285.513713][T12106] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2285.513728][T12106] RSP: 002b:00007f176b1c5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 2285.513753][T12106] RAX: ffffffffffffffda RBX: 00007f176a5e5fa0 RCX: 00007f176a38f6c9 [ 2285.513768][T12106] RDX: 000000000000275a RSI: 0000200000000080 RDI: ffffffffffffff9c [ 2285.513782][T12106] RBP: 00007f176b1c5090 R08: 0000000000000000 R09: 0000000000000000 [ 2285.513794][T12106] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2285.513806][T12106] R13: 00007f176a5e6038 R14: 00007f176a5e5fa0 R15: 00007ffedce1a3e8 [ 2285.513821][T12106] [ 2286.650908][T12192] FAULT_INJECTION: forcing a failure. [ 2286.650908][T12192] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2286.669639][T12192] CPU: 1 UID: 0 PID: 12192 Comm: syz.7.66450 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 2286.669672][T12192] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2286.669683][T12192] Call Trace: [ 2286.669690][T12192] [ 2286.669698][T12192] __dump_stack+0x21/0x30 [ 2286.669725][T12192] dump_stack_lvl+0x10c/0x190 [ 2286.669748][T12192] ? __cfi_dump_stack_lvl+0x10/0x10 [ 2286.669772][T12192] dump_stack+0x19/0x20 [ 2286.669793][T12192] should_fail_ex+0x3d9/0x530 [ 2286.669812][T12192] should_fail+0xf/0x20 [ 2286.669829][T12192] should_fail_usercopy+0x1e/0x30 [ 2286.669847][T12192] copy_fpstate_to_sigframe+0x919/0xb80 [ 2286.669877][T12192] ? __dequeue_signal+0x50e/0x680 [ 2286.669896][T12192] ? dequeue_signal+0x7f/0x4f0 [ 2286.669914][T12192] ? get_signal+0x51c/0x14f0 [ 2286.669936][T12192] ? copy_fpstate_to_sigframe+0x174/0xb80 [ 2286.669957][T12192] ? __cfi_copy_fpstate_to_sigframe+0x10/0x10 [ 2286.669983][T12192] ? fpu__alloc_mathframe+0xb8/0x160 [ 2286.670005][T12192] get_sigframe+0x58e/0x7d0 [ 2286.670036][T12192] ? __cfi_get_sigframe+0x10/0x10 [ 2286.670060][T12192] ? __dequeue_signal+0x50e/0x680 [ 2286.670080][T12192] x64_setup_rt_frame+0x15d/0xcc0 [ 2286.670104][T12192] ? get_signal+0x1098/0x14f0 [ 2286.670126][T12192] ? _raw_spin_unlock_irq+0x45/0x70 [ 2286.670150][T12192] ? get_signal+0x1250/0x14f0 [ 2286.670172][T12192] ? __cfi_x64_setup_rt_frame+0x10/0x10 [ 2286.670204][T12192] arch_do_signal_or_restart+0x31d/0x720 [ 2286.670229][T12192] ? fput+0x1a5/0x240 [ 2286.670251][T12192] ? __cfi_arch_do_signal_or_restart+0x10/0x10 [ 2286.670276][T12192] ? ksys_write+0x1ef/0x250 [ 2286.670294][T12192] ? __kasan_check_read+0x15/0x20 [ 2286.670321][T12192] syscall_exit_to_user_mode+0x58/0xb0 [ 2286.670341][T12192] do_syscall_64+0x64/0xf0 [ 2286.670364][T12192] ? clear_bhb_loop+0x50/0xa0 [ 2286.670384][T12192] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 2286.670403][T12192] RIP: 0033:0x7f7295d8f6c9 [ 2286.670419][T12192] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2286.670435][T12192] RSP: 002b:00007f7296c3e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2286.670455][T12192] RAX: ffffffffffffffe0 RBX: 00007f7295fe5fa0 RCX: 00007f7295d8f6c9 [ 2286.670471][T12192] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 2286.670482][T12192] RBP: 00007f7296c3e090 R08: 0000000000000000 R09: 0000000000000000 [ 2286.670494][T12192] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2286.670505][T12192] R13: 00007f7295fe6038 R14: 00007f7295fe5fa0 R15: 00007ffec57d3288 [ 2286.670522][T12192] [ 2286.967585][T12206] FAULT_INJECTION: forcing a failure. [ 2286.967585][T12206] name failslab, interval 1, probability 0, space 0, times 0 [ 2287.002455][T12206] CPU: 0 UID: 0 PID: 12206 Comm: syz.1.66455 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 2287.002494][T12206] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2287.002507][T12206] Call Trace: [ 2287.002514][T12206] [ 2287.002522][T12206] __dump_stack+0x21/0x30 [ 2287.002555][T12206] dump_stack_lvl+0x10c/0x190 [ 2287.002579][T12206] ? __cfi_dump_stack_lvl+0x10/0x10 [ 2287.002605][T12206] dump_stack+0x19/0x20 [ 2287.002628][T12206] should_fail_ex+0x3d9/0x530 [ 2287.002650][T12206] should_failslab+0xac/0x100 [ 2287.002673][T12206] __kmalloc_node_track_caller_noprof+0x68/0x520 [ 2287.002693][T12206] ? rust_helper_krealloc+0x33/0xd0 [ 2287.002724][T12206] krealloc_noprof+0x8d/0x130 [ 2287.002744][T12206] rust_helper_krealloc+0x33/0xd0 [ 2287.002769][T12206] ? _RNvMNtNtCs43vyB533jt3_6kernel5alloc9allocatorNtB2_11ReallocFunc4call+0x70/0xc0 [ 2287.002796][T12206] _RNvMNtNtCs43vyB533jt3_6kernel5alloc9allocatorNtB2_11ReallocFunc4call+0x8e/0xc0 [ 2287.002821][T12206] _RNvMs3_NtCs5gLWsBERDPK_16rust_binder_main6threadNtB5_11ThreadError7try_new+0x81/0x3b0 [ 2287.002851][T12206] _RNvMs4_NtCs5gLWsBERDPK_16rust_binder_main7processNtB5_7Process18get_current_thread+0x481/0x1400 [ 2287.002877][T12206] ? inode_init_always_gfp+0x756/0x9e0 [ 2287.002898][T12206] ? alloc_inode+0xc5/0x270 [ 2287.002919][T12206] ? proc_pident_instantiate+0x6d/0x2c0 [ 2287.002940][T12206] ? proc_pident_lookup+0x1c7/0x270 [ 2287.002961][T12206] ? path_openat+0x1301/0x34b0 [ 2287.002982][T12206] ? __x64_sys_openat+0x13a/0x170 [ 2287.003005][T12206] ? x64_sys_call+0xe69/0x2ee0 [ 2287.003030][T12206] ? do_syscall_64+0x58/0xf0 [ 2287.003054][T12206] ? entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 2287.003083][T12206] ? __cfi__RNvMs4_NtCs5gLWsBERDPK_16rust_binder_main7processNtB5_7Process18get_current_thread+0x10/0x10 [ 2287.003108][T12206] ? avc_has_perm_noaudit+0x268/0x360 [ 2287.003135][T12206] ? __asan_memcpy+0x5a/0x80 [ 2287.003151][T12206] ? avc_has_perm_noaudit+0x286/0x360 [ 2287.003176][T12206] ? avc_has_perm+0x144/0x220 [ 2287.003200][T12206] ? __cfi_avc_has_perm+0x10/0x10 [ 2287.003224][T12206] ? kasan_save_alloc_info+0x40/0x50 [ 2287.003251][T12206] ? selinux_file_open+0x457/0x610 [ 2287.003273][T12206] _RNvMs6_NtCs5gLWsBERDPK_16rust_binder_main7processNtB5_7Process5ioctl+0x1a7/0x2cf0 [ 2287.003300][T12206] ? avc_has_extended_perms+0x7c7/0xdd0 [ 2287.003325][T12206] ? __asan_memcpy+0x5a/0x80 [ 2287.003341][T12206] ? avc_has_extended_perms+0x921/0xdd0 [ 2287.003366][T12206] ? __cfi__RNvMs6_NtCs5gLWsBERDPK_16rust_binder_main7processNtB5_7Process5ioctl+0x10/0x10 [ 2287.003392][T12206] ? do_vfs_ioctl+0xeda/0x1e30 [ 2287.003412][T12206] ? arch_stack_walk+0x10b/0x170 [ 2287.003431][T12206] ? __ia32_compat_sys_ioctl+0x850/0x850 [ 2287.003453][T12206] ? _parse_integer+0x2e/0x40 [ 2287.003482][T12206] ? ioctl_has_perm+0x384/0x4d0 [ 2287.003504][T12206] ? has_cap_mac_admin+0xd0/0xd0 [ 2287.003527][T12206] ? proc_fail_nth_write+0x17e/0x210 [ 2287.003550][T12206] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 2287.003575][T12206] ? selinux_file_ioctl+0x6e0/0x1360 [ 2287.003596][T12206] ? vfs_write+0x93e/0xf30 [ 2287.003613][T12206] ? __cfi_selinux_file_ioctl+0x10/0x10 [ 2287.003635][T12206] ? __cfi_vfs_write+0x10/0x10 [ 2287.003653][T12206] ? __kasan_check_write+0x18/0x20 [ 2287.003679][T12206] ? mutex_unlock+0x8b/0x240 [ 2287.003696][T12206] ? __cfi_mutex_unlock+0x10/0x10 [ 2287.003713][T12206] ? __fget_files+0x2c5/0x340 [ 2287.003733][T12206] ? __fget_files+0x2c5/0x340 [ 2287.003753][T12206] _RNvCs5gLWsBERDPK_16rust_binder_main26rust_binder_unlocked_ioctl+0xa0/0x100 [ 2287.003780][T12206] ? __se_sys_ioctl+0x114/0x1b0 [ 2287.003799][T12206] ? __cfi__RNvCs5gLWsBERDPK_16rust_binder_main26rust_binder_unlocked_ioctl+0x10/0x10 [ 2287.003825][T12206] __se_sys_ioctl+0x135/0x1b0 [ 2287.003845][T12206] __x64_sys_ioctl+0x7f/0xa0 [ 2287.003865][T12206] x64_sys_call+0x1878/0x2ee0 [ 2287.003891][T12206] do_syscall_64+0x58/0xf0 [ 2287.003914][T12206] ? clear_bhb_loop+0x50/0xa0 [ 2287.003934][T12206] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 2287.003953][T12206] RIP: 0033:0x7f72ffb8f6c9 [ 2287.003970][T12206] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2287.003987][T12206] RSP: 002b:00007f7300ae5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2287.004009][T12206] RAX: ffffffffffffffda RBX: 00007f72ffde5fa0 RCX: 00007f72ffb8f6c9 [ 2287.004024][T12206] RDX: 0000200000000100 RSI: 00000000c0306201 RDI: 0000000000000009 [ 2287.004038][T12206] RBP: 00007f7300ae5090 R08: 0000000000000000 R09: 0000000000000000 [ 2287.004052][T12206] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2287.004065][T12206] R13: 00007f72ffde6038 R14: 00007f72ffde5fa0 R15: 00007ffc9a0de9a8 [ 2287.004086][T12206] [ 2288.363104][ T36] audit: type=1326 audit(1763284244.041:457): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12260 comm="syz.6.66476" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fac04d8f6c9 code=0x0 [ 2288.438420][T12269] FAULT_INJECTION: forcing a failure. [ 2288.438420][T12269] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2288.459601][T12269] CPU: 0 UID: 0 PID: 12269 Comm: syz.7.66480 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 2288.459638][T12269] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2288.459651][T12269] Call Trace: [ 2288.459658][T12269] [ 2288.459667][T12269] __dump_stack+0x21/0x30 [ 2288.459698][T12269] dump_stack_lvl+0x10c/0x190 [ 2288.459722][T12269] ? __cfi_dump_stack_lvl+0x10/0x10 [ 2288.459747][T12269] dump_stack+0x19/0x20 [ 2288.459769][T12269] should_fail_ex+0x3d9/0x530 [ 2288.459789][T12269] should_fail+0xf/0x20 [ 2288.459806][T12269] should_fail_usercopy+0x1e/0x30 [ 2288.459827][T12269] _copy_from_user+0x22/0xb0 [ 2288.459857][T12269] do_seccomp+0x1a5/0xee0 [ 2288.459876][T12269] ? vfs_write+0x93e/0xf30 [ 2288.459895][T12269] ? prctl_set_seccomp+0x80/0x80 [ 2288.459913][T12269] ? __cfi_vfs_write+0x10/0x10 [ 2288.459932][T12269] ? __kasan_check_read+0x15/0x20 [ 2288.459958][T12269] ? static_key_count+0x45/0x70 [ 2288.459984][T12269] prctl_set_seccomp+0x50/0x80 [ 2288.460001][T12269] __se_sys_prctl+0x2e4/0x1460 [ 2288.460120][T12269] ? __x64_sys_prctl+0xf0/0xf0 [ 2288.460143][T12269] __x64_sys_prctl+0xc3/0xf0 [ 2288.460162][T12269] x64_sys_call+0x2614/0x2ee0 [ 2288.460188][T12269] do_syscall_64+0x58/0xf0 [ 2288.460211][T12269] ? clear_bhb_loop+0x50/0xa0 [ 2288.460232][T12269] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 2288.460252][T12269] RIP: 0033:0x7f7295d8f6c9 [ 2288.460274][T12269] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2288.460291][T12269] RSP: 002b:00007f7296c3e038 EFLAGS: 00000246 ORIG_RAX: 000000000000009d [ 2288.460317][T12269] RAX: ffffffffffffffda RBX: 00007f7295fe5fa0 RCX: 00007f7295d8f6c9 [ 2288.460333][T12269] RDX: 0000200000000080 RSI: 0000000000000002 RDI: 0000000000000016 [ 2288.460347][T12269] RBP: 00007f7296c3e090 R08: 0000000000000000 R09: 0000000000000000 [ 2288.460361][T12269] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2288.460373][T12269] R13: 00007f7295fe6038 R14: 00007f7295fe5fa0 R15: 00007ffec57d3288 [ 2288.460389][T12269] [ 2290.341262][ T36] audit: type=1326 audit(1763284246.022:458): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12404 comm="syz.1.66539" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f72ffb8f6c9 code=0x0 [ 2290.462463][T12419] FAULT_INJECTION: forcing a failure. [ 2290.462463][T12419] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2290.479413][T12419] CPU: 0 UID: 0 PID: 12419 Comm: syz.2.66546 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 2290.479445][T12419] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2290.479457][T12419] Call Trace: [ 2290.479463][T12419] [ 2290.479470][T12419] __dump_stack+0x21/0x30 [ 2290.479499][T12419] dump_stack_lvl+0x10c/0x190 [ 2290.479520][T12419] ? __cfi_dump_stack_lvl+0x10/0x10 [ 2290.479543][T12419] ? check_stack_object+0x12c/0x140 [ 2290.479562][T12419] dump_stack+0x19/0x20 [ 2290.479583][T12419] should_fail_ex+0x3d9/0x530 [ 2290.479608][T12419] should_fail+0xf/0x20 [ 2290.479625][T12419] should_fail_usercopy+0x1e/0x30 [ 2290.479645][T12419] _copy_to_user+0x24/0xa0 [ 2290.479683][T12419] simple_read_from_buffer+0xed/0x160 [ 2290.479707][T12419] proc_fail_nth_read+0x19e/0x210 [ 2290.479732][T12419] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 2290.479755][T12419] ? bpf_lsm_file_permission+0xd/0x20 [ 2290.479777][T12419] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 2290.479798][T12419] vfs_read+0x27d/0xc70 [ 2290.479814][T12419] ? __cfi_vfs_read+0x10/0x10 [ 2290.479828][T12419] ? __kasan_check_write+0x18/0x20 [ 2290.479854][T12419] ? mutex_lock+0x92/0x1c0 [ 2290.479871][T12419] ? __cfi_mutex_lock+0x10/0x10 [ 2290.479888][T12419] ? __fget_files+0x2c5/0x340 [ 2290.479908][T12419] ksys_read+0x141/0x250 [ 2290.479923][T12419] ? __cfi_ksys_read+0x10/0x10 [ 2290.479939][T12419] ? __kasan_check_read+0x15/0x20 [ 2290.479964][T12419] __x64_sys_read+0x7f/0x90 [ 2290.479982][T12419] x64_sys_call+0x2638/0x2ee0 [ 2290.480006][T12419] do_syscall_64+0x58/0xf0 [ 2290.480026][T12419] ? clear_bhb_loop+0x50/0xa0 [ 2290.480046][T12419] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 2290.480065][T12419] RIP: 0033:0x7f176a38e0dc [ 2290.480080][T12419] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 2290.480100][T12419] RSP: 002b:00007f176b1c5030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2290.480120][T12419] RAX: ffffffffffffffda RBX: 00007f176a5e5fa0 RCX: 00007f176a38e0dc [ 2290.480135][T12419] RDX: 000000000000000f RSI: 00007f176b1c50a0 RDI: 0000000000000008 [ 2290.480147][T12419] RBP: 00007f176b1c5090 R08: 0000000000000000 R09: 0000000000000058 [ 2290.480159][T12419] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2290.480172][T12419] R13: 00007f176a5e6038 R14: 00007f176a5e5fa0 R15: 00007ffedce1a3e8 [ 2290.480188][T12419] [ 2290.942699][T12441] FAULT_INJECTION: forcing a failure. [ 2290.942699][T12441] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2290.955801][T12441] CPU: 0 UID: 0 PID: 12441 Comm: syz.6.66550 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 2290.955834][T12441] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2290.955847][T12441] Call Trace: [ 2290.955853][T12441] [ 2290.955861][T12441] __dump_stack+0x21/0x30 [ 2290.955891][T12441] dump_stack_lvl+0x10c/0x190 [ 2290.955915][T12441] ? __cfi_dump_stack_lvl+0x10/0x10 [ 2290.955941][T12441] dump_stack+0x19/0x20 [ 2290.955964][T12441] should_fail_ex+0x3d9/0x530 [ 2290.955984][T12441] should_fail+0xf/0x20 [ 2290.956001][T12441] should_fail_usercopy+0x1e/0x30 [ 2290.956021][T12441] _copy_from_user+0x22/0xb0 [ 2290.956044][T12441] vlan_ioctl_handler+0x9e/0x680 [ 2290.956066][T12441] ? __cfi_vlan_ioctl_handler+0x10/0x10 [ 2290.956087][T12441] ? __kasan_check_write+0x18/0x20 [ 2290.956114][T12441] ? mutex_unlock+0x8b/0x240 [ 2290.956131][T12441] ? __cfi_vlan_ioctl_handler+0x10/0x10 [ 2290.956151][T12441] sock_ioctl+0x532/0x7b0 [ 2290.956172][T12441] ? __cfi_sock_ioctl+0x10/0x10 [ 2290.956191][T12441] ? __fget_files+0x2c5/0x340 [ 2290.956212][T12441] ? bpf_lsm_file_ioctl+0xd/0x20 [ 2290.956237][T12441] ? security_file_ioctl+0x34/0xd0 [ 2290.956258][T12441] ? __cfi_sock_ioctl+0x10/0x10 [ 2290.956277][T12441] __se_sys_ioctl+0x135/0x1b0 [ 2290.956297][T12441] __x64_sys_ioctl+0x7f/0xa0 [ 2290.956316][T12441] x64_sys_call+0x1878/0x2ee0 [ 2290.956341][T12441] do_syscall_64+0x58/0xf0 [ 2290.956365][T12441] ? clear_bhb_loop+0x50/0xa0 [ 2290.956386][T12441] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 2290.956405][T12441] RIP: 0033:0x7fac04d8f6c9 [ 2290.956422][T12441] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2290.956439][T12441] RSP: 002b:00007fac05bd7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2290.956461][T12441] RAX: ffffffffffffffda RBX: 00007fac04fe5fa0 RCX: 00007fac04d8f6c9 [ 2290.956476][T12441] RDX: 0000200000000a00 RSI: 0000000000008983 RDI: 0000000000000007 [ 2290.956489][T12441] RBP: 00007fac05bd7090 R08: 0000000000000000 R09: 0000000000000000 [ 2290.956501][T12441] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2290.956513][T12441] R13: 00007fac04fe6038 R14: 00007fac04fe5fa0 R15: 00007ffef88bc408 [ 2290.956529][T12441] [ 2291.916434][T12502] FAULT_INJECTION: forcing a failure. [ 2291.916434][T12502] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2291.929615][T12502] CPU: 0 UID: 0 PID: 12502 Comm: syz.6.66579 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 2291.929647][T12502] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2291.929659][T12502] Call Trace: [ 2291.929666][T12502] [ 2291.929674][T12502] __dump_stack+0x21/0x30 [ 2291.929712][T12502] dump_stack_lvl+0x10c/0x190 [ 2291.929735][T12502] ? __cfi_dump_stack_lvl+0x10/0x10 [ 2291.929766][T12502] dump_stack+0x19/0x20 [ 2291.929788][T12502] should_fail_ex+0x3d9/0x530 [ 2291.929812][T12502] should_fail+0xf/0x20 [ 2291.929829][T12502] should_fail_usercopy+0x1e/0x30 [ 2291.929849][T12502] _copy_from_user+0x22/0xb0 [ 2291.929873][T12502] vlan_ioctl_handler+0x9e/0x680 [ 2291.929894][T12502] ? __cfi_vlan_ioctl_handler+0x10/0x10 [ 2291.929917][T12502] ? __kasan_check_write+0x18/0x20 [ 2291.929943][T12502] ? mutex_unlock+0x8b/0x240 [ 2291.929961][T12502] ? __cfi_vlan_ioctl_handler+0x10/0x10 [ 2291.929981][T12502] sock_ioctl+0x532/0x7b0 [ 2291.930001][T12502] ? __cfi_sock_ioctl+0x10/0x10 [ 2291.930019][T12502] ? __fget_files+0x2c5/0x340 [ 2291.930040][T12502] ? bpf_lsm_file_ioctl+0xd/0x20 [ 2291.930063][T12502] ? security_file_ioctl+0x34/0xd0 [ 2291.930085][T12502] ? __cfi_sock_ioctl+0x10/0x10 [ 2291.930103][T12502] __se_sys_ioctl+0x135/0x1b0 [ 2291.930124][T12502] __x64_sys_ioctl+0x7f/0xa0 [ 2291.930143][T12502] x64_sys_call+0x1878/0x2ee0 [ 2291.930167][T12502] do_syscall_64+0x58/0xf0 [ 2291.930190][T12502] ? clear_bhb_loop+0x50/0xa0 [ 2291.930211][T12502] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 2291.930230][T12502] RIP: 0033:0x7fac04d8f6c9 [ 2291.930246][T12502] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2291.930264][T12502] RSP: 002b:00007fac05bd7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2291.930285][T12502] RAX: ffffffffffffffda RBX: 00007fac04fe5fa0 RCX: 00007fac04d8f6c9 [ 2291.930301][T12502] RDX: 0000000000000000 RSI: 0000000000008983 RDI: 0000000000000009 [ 2291.930314][T12502] RBP: 00007fac05bd7090 R08: 0000000000000000 R09: 0000000000000000 [ 2291.930327][T12502] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2291.930340][T12502] R13: 00007fac04fe6038 R14: 00007fac04fe5fa0 R15: 00007ffef88bc408 [ 2291.930364][T12502] [ 2292.189328][ T36] audit: type=1400 audit(1763284247.872:459): avc: denied { connect } for pid=12509 comm="syz.7.66582" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 2293.302171][T12586] FAULT_INJECTION: forcing a failure. [ 2293.302171][T12586] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2293.329287][T12586] CPU: 0 UID: 0 PID: 12586 Comm: syz.1.66616 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 2293.329319][T12586] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2293.329330][T12586] Call Trace: [ 2293.329337][T12586] [ 2293.329344][T12586] __dump_stack+0x21/0x30 [ 2293.329372][T12586] dump_stack_lvl+0x10c/0x190 [ 2293.329393][T12586] ? __cfi_dump_stack_lvl+0x10/0x10 [ 2293.329417][T12586] dump_stack+0x19/0x20 [ 2293.329437][T12586] should_fail_ex+0x3d9/0x530 [ 2293.329456][T12586] should_fail+0xf/0x20 [ 2293.329472][T12586] should_fail_usercopy+0x1e/0x30 [ 2293.329489][T12586] _copy_from_user+0x22/0xb0 [ 2293.329510][T12586] do_seccomp+0x1a5/0xee0 [ 2293.329527][T12586] ? vfs_write+0x93e/0xf30 [ 2293.329545][T12586] ? prctl_set_seccomp+0x80/0x80 [ 2293.329561][T12586] ? __cfi_vfs_write+0x10/0x10 [ 2293.329576][T12586] ? __kasan_check_read+0x15/0x20 [ 2293.329600][T12586] ? static_key_count+0x45/0x70 [ 2293.329632][T12586] prctl_set_seccomp+0x50/0x80 [ 2293.329651][T12586] __se_sys_prctl+0x2e4/0x1460 [ 2293.329674][T12586] ? __x64_sys_prctl+0xf0/0xf0 [ 2293.329690][T12586] __x64_sys_prctl+0xc3/0xf0 [ 2293.329705][T12586] x64_sys_call+0x2614/0x2ee0 [ 2293.329729][T12586] do_syscall_64+0x58/0xf0 [ 2293.329751][T12586] ? clear_bhb_loop+0x50/0xa0 [ 2293.329770][T12586] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 2293.329789][T12586] RIP: 0033:0x7f72ffb8f6c9 [ 2293.329805][T12586] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2293.329820][T12586] RSP: 002b:00007f7300ae5038 EFLAGS: 00000246 ORIG_RAX: 000000000000009d [ 2293.329840][T12586] RAX: ffffffffffffffda RBX: 00007f72ffde5fa0 RCX: 00007f72ffb8f6c9 [ 2293.329853][T12586] RDX: 0000200000000080 RSI: 0000000000000002 RDI: 0000000000000016 [ 2293.329865][T12586] RBP: 00007f7300ae5090 R08: 0000000000000000 R09: 0000000000000000 [ 2293.329882][T12586] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2293.329894][T12586] R13: 00007f72ffde6038 R14: 00007f72ffde5fa0 R15: 00007ffc9a0de9a8 [ 2293.329909][T12586] [ 2293.604173][T12607] FAULT_INJECTION: forcing a failure. [ 2293.604173][T12607] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2293.654185][T12607] CPU: 1 UID: 0 PID: 12607 Comm: syz.7.66626 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 2293.654224][T12607] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2293.654237][T12607] Call Trace: [ 2293.654243][T12607] [ 2293.654252][T12607] __dump_stack+0x21/0x30 [ 2293.654281][T12607] dump_stack_lvl+0x10c/0x190 [ 2293.654304][T12607] ? __cfi_dump_stack_lvl+0x10/0x10 [ 2293.654330][T12607] dump_stack+0x19/0x20 [ 2293.654352][T12607] should_fail_ex+0x3d9/0x530 [ 2293.654373][T12607] should_fail+0xf/0x20 [ 2293.654390][T12607] should_fail_usercopy+0x1e/0x30 [ 2293.654417][T12607] _copy_from_user+0x22/0xb0 [ 2293.654441][T12607] vlan_ioctl_handler+0x9e/0x680 [ 2293.654462][T12607] ? __cfi_vlan_ioctl_handler+0x10/0x10 [ 2293.654485][T12607] ? __kasan_check_write+0x18/0x20 [ 2293.654511][T12607] ? mutex_unlock+0x8b/0x240 [ 2293.654529][T12607] ? __cfi_vlan_ioctl_handler+0x10/0x10 [ 2293.654550][T12607] sock_ioctl+0x532/0x7b0 [ 2293.654569][T12607] ? __cfi_sock_ioctl+0x10/0x10 [ 2293.654587][T12607] ? __fget_files+0x2c5/0x340 [ 2293.654608][T12607] ? bpf_lsm_file_ioctl+0xd/0x20 [ 2293.654632][T12607] ? security_file_ioctl+0x34/0xd0 [ 2293.654652][T12607] ? __cfi_sock_ioctl+0x10/0x10 [ 2293.654670][T12607] __se_sys_ioctl+0x135/0x1b0 [ 2293.654691][T12607] __x64_sys_ioctl+0x7f/0xa0 [ 2293.654711][T12607] x64_sys_call+0x1878/0x2ee0 [ 2293.654736][T12607] do_syscall_64+0x58/0xf0 [ 2293.654757][T12607] ? clear_bhb_loop+0x50/0xa0 [ 2293.654777][T12607] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 2293.654797][T12607] RIP: 0033:0x7f7295d8f6c9 [ 2293.654814][T12607] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2293.654831][T12607] RSP: 002b:00007f7296c3e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2293.654852][T12607] RAX: ffffffffffffffda RBX: 00007f7295fe5fa0 RCX: 00007f7295d8f6c9 [ 2293.654867][T12607] RDX: 0000200000000a00 RSI: 0000000000008983 RDI: 0000000000000006 [ 2293.654881][T12607] RBP: 00007f7296c3e090 R08: 0000000000000000 R09: 0000000000000000 [ 2293.654893][T12607] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2293.654904][T12607] R13: 00007f7295fe6038 R14: 00007f7295fe5fa0 R15: 00007ffec57d3288 [ 2293.654921][T12607] [ 2294.002196][T12623] FAULT_INJECTION: forcing a failure. [ 2294.002196][T12623] name failslab, interval 1, probability 0, space 0, times 0 [ 2294.014829][T12623] CPU: 0 UID: 0 PID: 12623 Comm: syz.7.66634 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 2294.014861][T12623] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2294.014874][T12623] Call Trace: [ 2294.014880][T12623] [ 2294.014889][T12623] __dump_stack+0x21/0x30 [ 2294.014918][T12623] dump_stack_lvl+0x10c/0x190 [ 2294.014941][T12623] ? __cfi_dump_stack_lvl+0x10/0x10 [ 2294.014967][T12623] dump_stack+0x19/0x20 [ 2294.014988][T12623] should_fail_ex+0x3d9/0x530 [ 2294.015008][T12623] should_failslab+0xac/0x100 [ 2294.015030][T12623] kmem_cache_alloc_noprof+0x42/0x430 [ 2294.015048][T12623] ? inc_rlimit_get_ucounts+0x3fb/0x470 [ 2294.015075][T12623] ? __sigqueue_alloc+0x15e/0x2b0 [ 2294.015098][T12623] __sigqueue_alloc+0x15e/0x2b0 [ 2294.015121][T12623] __send_signal_locked+0x19d/0xb90 [ 2294.015141][T12623] ? __kasan_check_write+0x18/0x20 [ 2294.015173][T12623] ? __task_pid_nr_ns+0x1e2/0x280 [ 2294.015194][T12623] send_signal_locked+0x428/0x5a0 [ 2294.015215][T12623] do_send_sig_info+0xdb/0x220 [ 2294.015235][T12623] send_sig+0x5f/0x70 [ 2294.015254][T12623] sk_stream_error+0xb6/0x130 [ 2294.015280][T12623] tcp_sendmsg_locked+0x42e0/0x4b40 [ 2294.015307][T12623] ? __asan_memcpy+0x5a/0x80 [ 2294.015326][T12623] ? __kasan_check_write+0x18/0x20 [ 2294.015351][T12623] ? _raw_spin_lock_bh+0x90/0x120 [ 2294.015374][T12623] ? __cfi__raw_spin_lock_bh+0x10/0x10 [ 2294.015398][T12623] ? _raw_spin_unlock_bh+0x54/0x60 [ 2294.015420][T12623] ? lock_sock_nested+0x1f5/0x290 [ 2294.015441][T12623] ? __cfi_tcp_sendmsg_locked+0x10/0x10 [ 2294.015466][T12623] ? __cfi_tcp_sendmsg+0x10/0x10 [ 2294.015489][T12623] tcp_sendmsg+0x3e/0xe0 [ 2294.015512][T12623] ? __cfi_tcp_sendmsg+0x10/0x10 [ 2294.015535][T12623] inet6_sendmsg+0xb7/0x120 [ 2294.015562][T12623] ____sys_sendmsg+0x5db/0xa70 [ 2294.015588][T12623] ? __sys_sendmsg_sock+0x50/0x50 [ 2294.015615][T12623] ? import_iovec+0x81/0xb0 [ 2294.015645][T12623] ___sys_sendmsg+0x220/0x2a0 [ 2294.015670][T12623] ? __sys_sendmsg+0x280/0x280 [ 2294.015695][T12623] ? kstrtouint+0x78/0xf0 [ 2294.015718][T12623] __sys_sendmmsg+0x271/0x470 [ 2294.015744][T12623] ? __cfi___sys_sendmmsg+0x10/0x10 [ 2294.015773][T12623] ? __cfi_ksys_write+0x10/0x10 [ 2294.015792][T12623] __x64_sys_sendmmsg+0xa4/0xc0 [ 2294.015818][T12623] x64_sys_call+0xfec/0x2ee0 [ 2294.015842][T12623] do_syscall_64+0x58/0xf0 [ 2294.015869][T12623] ? clear_bhb_loop+0x50/0xa0 [ 2294.015890][T12623] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 2294.015910][T12623] RIP: 0033:0x7f7295d8f6c9 [ 2294.015927][T12623] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2294.015943][T12623] RSP: 002b:00007f7296c3e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2294.015964][T12623] RAX: ffffffffffffffda RBX: 00007f7295fe5fa0 RCX: 00007f7295d8f6c9 [ 2294.015980][T12623] RDX: 0000000000000001 RSI: 0000200000003c00 RDI: 000000000000000b [ 2294.015993][T12623] RBP: 00007f7296c3e090 R08: 0000000000000000 R09: 0000000000000000 [ 2294.016009][T12623] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2294.016022][T12623] R13: 00007f7295fe6038 R14: 00007f7295fe5fa0 R15: 00007ffec57d3288 [ 2294.016038][T12623] [ 2294.591207][T12646] 9pnet: Limiting 'msize' to 1048576 as this is the maximum supported by transport fd [ 2295.164522][ T36] audit: type=1326 audit(1763284250.852:460): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12670 comm="syz.2.66656" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f176a38f6c9 code=0x0 [ 2295.826476][T12700] FAULT_INJECTION: forcing a failure. [ 2295.826476][T12700] name failslab, interval 1, probability 0, space 0, times 0 [ 2295.854823][T12700] CPU: 1 UID: 0 PID: 12700 Comm: syz.1.66669 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 2295.854857][T12700] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2295.854869][T12700] Call Trace: [ 2295.854877][T12700] [ 2295.854885][T12700] __dump_stack+0x21/0x30 [ 2295.854915][T12700] dump_stack_lvl+0x10c/0x190 [ 2295.854939][T12700] ? __cfi_dump_stack_lvl+0x10/0x10 [ 2295.854963][T12700] ? release_sock+0x171/0x1f0 [ 2295.854985][T12700] dump_stack+0x19/0x20 [ 2295.855007][T12700] should_fail_ex+0x3d9/0x530 [ 2295.855027][T12700] should_failslab+0xac/0x100 [ 2295.855048][T12700] kmem_cache_alloc_node_noprof+0x45/0x440 [ 2295.855067][T12700] ? netlink_data_ready+0x20/0x20 [ 2295.855091][T12700] ? __alloc_skb+0x10c/0x370 [ 2295.855114][T12700] __alloc_skb+0x10c/0x370 [ 2295.855135][T12700] netlink_alloc_large_skb+0xf7/0x1b0 [ 2295.855159][T12700] netlink_sendmsg+0x586/0xaf0 [ 2295.855185][T12700] ? __cfi_netlink_sendmsg+0x10/0x10 [ 2295.855211][T12700] ? bpf_lsm_socket_sendmsg+0xd/0x20 [ 2295.855231][T12700] ? security_socket_sendmsg+0x33/0xd0 [ 2295.855250][T12700] ? __cfi_netlink_sendmsg+0x10/0x10 [ 2295.855274][T12700] ____sys_sendmsg+0xa15/0xa70 [ 2295.855308][T12700] ? __sys_sendmsg_sock+0x50/0x50 [ 2295.855334][T12700] ? import_iovec+0x81/0xb0 [ 2295.855358][T12700] ___sys_sendmsg+0x220/0x2a0 [ 2295.855383][T12700] ? __sys_sendmsg+0x280/0x280 [ 2295.855408][T12700] ? proc_fail_nth_write+0x17e/0x210 [ 2295.855432][T12700] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 2295.855466][T12700] __x64_sys_sendmsg+0x1eb/0x2c0 [ 2295.855491][T12700] ? fput+0x1a5/0x240 [ 2295.855512][T12700] ? __cfi___x64_sys_sendmsg+0x10/0x10 [ 2295.855538][T12700] ? ksys_write+0x1ef/0x250 [ 2295.855557][T12700] ? __kasan_check_read+0x15/0x20 [ 2295.855584][T12700] x64_sys_call+0x2a4c/0x2ee0 [ 2295.855609][T12700] do_syscall_64+0x58/0xf0 [ 2295.855634][T12700] ? clear_bhb_loop+0x50/0xa0 [ 2295.855654][T12700] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 2295.855674][T12700] RIP: 0033:0x7f72ffb8f6c9 [ 2295.855690][T12700] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2295.855706][T12700] RSP: 002b:00007f7300ae5038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2295.855727][T12700] RAX: ffffffffffffffda RBX: 00007f72ffde5fa0 RCX: 00007f72ffb8f6c9 [ 2295.855742][T12700] RDX: 0000000000000880 RSI: 0000200000000140 RDI: 000000000000000a [ 2295.855756][T12700] RBP: 00007f7300ae5090 R08: 0000000000000000 R09: 0000000000000000 [ 2295.855769][T12700] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2295.855781][T12700] R13: 00007f72ffde6038 R14: 00007f72ffde5fa0 R15: 00007ffc9a0de9a8 [ 2295.855799][T12700] [ 2295.910754][ T36] audit: type=1326 audit(1763284251.602:461): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12705 comm="syz.2.66672" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f176a38f6c9 code=0x0 [ 2296.300555][ T36] audit: type=1326 audit(1763284251.992:462): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12732 comm="syz.2.66684" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f176a38f6c9 code=0x0 [ 2296.718467][ T36] audit: type=1326 audit(1763284252.402:463): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12786 comm="syz.7.66707" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f7295d8f6c9 code=0x0 [ 2297.423743][ T36] audit: type=1326 audit(1763284253.112:464): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12869 comm="syz.7.66743" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f7295d8f6c9 code=0x0 [ 2298.511813][ T36] audit: type=1326 audit(1763284254.202:465): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12948 comm="syz.7.66779" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f7295d8f6c9 code=0x0 [ 2298.615821][ T36] audit: type=1326 audit(1763284254.302:466): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12959 comm="syz.7.66784" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f7295d8f6c9 code=0x0 [ 2299.013934][ T36] audit: type=1326 audit(1763284254.702:467): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12995 comm="syz.2.66802" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f176a38f6c9 code=0x0 [ 2299.613854][ T36] audit: type=1326 audit(1763284255.302:468): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13033 comm="syz.6.66819" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fac04d8f6c9 code=0x0 [ 2299.964054][ T36] audit: type=1326 audit(1763284255.652:469): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13058 comm="syz.6.66831" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fac04d8f6c9 code=0x0 [ 2300.296334][ T36] kauditd_printk_skb: 1 callbacks suppressed [ 2300.296352][ T36] audit: type=1326 audit(1763284255.982:471): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13094 comm="syz.1.66844" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f72ffb8f6c9 code=0x0 [ 2300.518764][ T36] audit: type=1326 audit(1763284256.202:472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13123 comm="syz.7.66862" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f7295d8f6c9 code=0x0 [ 2300.575900][ T36] audit: type=1326 audit(1763284256.262:473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13133 comm="syz.1.66867" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f72ffb8f6c9 code=0x0 [ 2300.768010][ T36] audit: type=1326 audit(1763284256.452:474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13147 comm="syz.7.66875" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f7295d8f6c9 code=0x0 [ 2300.936589][ T36] audit: type=1326 audit(1763284256.622:475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13159 comm="syz.6.66880" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fac04d8f6c9 code=0x0 [ 2301.063116][ T36] audit: type=1326 audit(1763284256.752:476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13165 comm="syz.6.66883" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fac04d8f6c9 code=0x0 [ 2302.004631][ T36] audit: type=1326 audit(1763284257.692:477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13252 comm="syz.2.66927" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f176a38f6c9 code=0x0 [ 2302.412880][ T36] audit: type=1326 audit(1763284258.102:478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13281 comm="syz.6.66941" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fac04d8f6c9 code=0x0 [ 2302.705384][ T36] audit: type=1326 audit(1763284258.392:479): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13335 comm="syz.6.66966" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fac04d8f6c9 code=0x0 [ 2302.826348][ T36] audit: type=1326 audit(1763284258.512:480): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13353 comm="syz.2.66975" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f176a38f6c9 code=0x0 [ 2305.217803][T22780] bridge_slave_1: left allmulticast mode [ 2305.223520][T22780] bridge_slave_1: left promiscuous mode [ 2305.238633][T22780] bridge0: port 2(bridge_slave_1) entered disabled state [ 2305.259003][T22780] bridge_slave_0: left allmulticast mode [ 2305.264671][T22780] bridge_slave_0: left promiscuous mode [ 2305.278652][T22780] bridge0: port 1(bridge_slave_0) entered disabled state [ 2305.400884][T22780] veth1_macvtap: left promiscuous mode [ 2305.406540][T22780] veth0_vlan: left promiscuous mode [ 2305.565374][T13534] bridge0: port 1(bridge_slave_0) entered blocking state [ 2305.589190][T13534] bridge0: port 1(bridge_slave_0) entered disabled state [ 2305.596300][T13534] bridge_slave_0: entered allmulticast mode [ 2305.618993][T13534] bridge_slave_0: entered promiscuous mode [ 2305.636029][T13534] bridge0: port 2(bridge_slave_1) entered blocking state [ 2305.648535][T13534] bridge0: port 2(bridge_slave_1) entered disabled state [ 2305.667209][T13534] bridge_slave_1: entered allmulticast mode [ 2305.677580][T13534] bridge_slave_1: entered promiscuous mode [ 2305.829858][T13534] bridge0: port 2(bridge_slave_1) entered blocking state [ 2305.836953][T13534] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2305.844290][T13534] bridge0: port 1(bridge_slave_0) entered blocking state [ 2305.851343][T13534] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2305.914794][T22780] bridge0: port 1(bridge_slave_0) entered disabled state [ 2305.922576][T22780] bridge0: port 2(bridge_slave_1) entered disabled state [ 2305.949111][ T293] bridge0: port 1(bridge_slave_0) entered blocking state [ 2305.956170][ T293] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2305.988925][ T293] bridge0: port 2(bridge_slave_1) entered blocking state [ 2305.995989][ T293] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2306.047562][T13534] veth0_vlan: entered promiscuous mode [ 2306.075667][T13534] veth1_macvtap: entered promiscuous mode [ 2306.111358][ T36] kauditd_printk_skb: 6 callbacks suppressed [ 2306.111375][ T36] audit: type=1400 audit(1763284261.802:487): avc: denied { mount } for pid=13534 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 2306.838845][ T36] audit: type=1326 audit(1763284262.533:488): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13619 comm="syz.6.67097" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fac04d8f6c9 code=0x0 [ 2307.074642][ T36] audit: type=1326 audit(1763284262.763:489): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13642 comm="syz.7.67109" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f07bf18f6c9 code=0x0 [ 2307.858151][ T36] audit: type=1326 audit(1763284263.543:490): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13668 comm="syz.2.67120" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f176a38f6c9 code=0x0 [ 2308.370424][ T36] audit: type=1326 audit(1763284264.063:491): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13708 comm="syz.6.67140" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fac04d8f6c9 code=0x0 [ 2311.205362][ T36] audit: type=1326 audit(1763284266.893:492): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13900 comm="syz.2.67223" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f176a38f6c9 code=0x0 [ 2311.438250][ T36] audit: type=1326 audit(1763284267.123:493): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13917 comm="syz.2.67239" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f176a38f6c9 code=0x0 [ 2311.982651][ T36] audit: type=1326 audit(1763284267.673:494): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13955 comm="syz.2.67257" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f176a38f6c9 code=0x0 [ 2312.188173][ T36] audit: type=1326 audit(1763284267.873:495): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13976 comm="syz.1.67267" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f72ffb8f6c9 code=0x0 [ 2312.869571][ T36] audit: type=1326 audit(1763284268.553:496): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14046 comm="syz.2.67298" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f176a38f6c9 code=0x0 [ 2313.232038][ T36] audit: type=1326 audit(1763284268.923:497): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14083 comm="syz.6.67316" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fac04d8f6c9 code=0x0 [ 2313.423639][ T36] audit: type=1326 audit(1763284269.113:498): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14106 comm="syz.1.67328" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f72ffb8f6c9 code=0x0 [ 2315.398428][ T36] audit: type=1326 audit(1763284271.093:499): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14219 comm="syz.6.67380" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fac04d8f6c9 code=0x0 [ 2317.705413][ T36] audit: type=1326 audit(1763284273.393:500): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14419 comm="syz.6.67477" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fac04d8f6c9 code=0x0 [ 2318.178527][ T36] audit: type=1326 audit(1763284273.873:501): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14474 comm="syz.2.67505" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f176a38f6c9 code=0x0 [ 2318.727789][ T36] audit: type=1326 audit(1763284274.413:502): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14508 comm="syz.7.67521" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f07bf18f6c9 code=0x0 [ 2319.948290][ T36] audit: type=1326 audit(1763284275.643:503): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14585 comm="syz.2.67559" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f176a38f6c9 code=0x0 [ 2320.234463][ T36] audit: type=1326 audit(1763284275.923:504): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14607 comm="syz.7.67570" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f07bf18f6c9 code=0x0 [ 2320.637710][ T36] audit: type=1326 audit(1763284276.323:505): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14651 comm="syz.1.67584" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f72ffb8f6c9 code=0x0 [ 2320.787740][ T36] audit: type=1326 audit(1763284276.473:506): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14677 comm="syz.7.67607" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f07bf18f6c9 code=0x0 [ 2321.013342][ T36] audit: type=1326 audit(1763284276.703:507): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14699 comm="syz.6.67616" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fac04d8f6c9 code=0x0 [ 2321.243583][ T36] audit: type=1326 audit(1763284276.933:508): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14721 comm="syz.6.67627" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fac04d8f6c9 code=0x0 [ 2322.558383][ T36] audit: type=1326 audit(1763284278.253:509): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14792 comm="syz.1.67662" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f72ffb8f6c9 code=0x0 [ 2322.948261][ T36] audit: type=1326 audit(1763284278.643:510): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14824 comm="syz.2.67678" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f176a38f6c9 code=0x0 [ 2324.222074][ T36] audit: type=1326 audit(1763284279.913:511): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14864 comm="syz.2.67696" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f176a38f6c9 code=0x0 [ 2324.296671][ T36] audit: type=1326 audit(1763284279.984:512): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14866 comm="syz.2.67701" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f176a38f6c9 code=0x0 [ 2324.443586][ T36] audit: type=1326 audit(1763284280.134:513): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14876 comm="syz.2.67704" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f176a38f6c9 code=0x0 [ 2324.859770][ T36] audit: type=1326 audit(1763284280.554:514): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14915 comm="syz.2.67725" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f176a38f6c9 code=0x0 [ 2324.918631][ T36] audit: type=1326 audit(1763284280.614:515): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14923 comm="syz.7.67720" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f07bf18f6c9 code=0x0 [ 2324.980783][ T36] audit: type=1326 audit(1763284280.674:516): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14930 comm="syz.2.67732" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f176a38f6c9 code=0x0 [ 2325.057339][ T36] audit: type=1326 audit(1763284280.744:517): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14939 comm="syz.6.67727" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fac04d8f6c9 code=0x0 [ 2325.099765][ T36] audit: type=1326 audit(1763284280.784:518): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14943 comm="syz.2.67737" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f176a38f6c9 code=0x0 [ 2325.480469][ T36] audit: type=1326 audit(1763284281.174:519): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14985 comm="syz.6.67758" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fac04d8f6c9 code=0x0 [ 2325.589252][ T293] bridge_slave_1: left allmulticast mode [ 2325.597448][ T293] bridge_slave_1: left promiscuous mode [ 2325.607526][ T293] bridge0: port 2(bridge_slave_1) entered disabled state [ 2325.619490][ T293] bridge_slave_0: left allmulticast mode [ 2325.625178][ T293] bridge_slave_0: left promiscuous mode [ 2325.647502][ T293] bridge0: port 1(bridge_slave_0) entered disabled state [ 2325.712588][T14984] bridge0: port 1(bridge_slave_0) entered blocking state [ 2325.727444][T14984] bridge0: port 1(bridge_slave_0) entered disabled state [ 2325.744944][T14984] bridge_slave_0: entered allmulticast mode [ 2325.759555][T14984] bridge_slave_0: entered promiscuous mode [ 2325.766850][ T293] veth1_macvtap: left promiscuous mode [ 2325.772788][ T293] veth0_vlan: left promiscuous mode [ 2325.829592][T14984] bridge0: port 2(bridge_slave_1) entered blocking state [ 2325.836754][T14984] bridge0: port 2(bridge_slave_1) entered disabled state [ 2325.855790][T14984] bridge_slave_1: entered allmulticast mode [ 2325.865862][T14984] bridge_slave_1: entered promiscuous mode [ 2325.957785][T14984] bridge0: port 2(bridge_slave_1) entered blocking state [ 2325.964945][T14984] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2325.972275][T14984] bridge0: port 1(bridge_slave_0) entered blocking state [ 2325.979440][T14984] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2326.014243][T22780] bridge0: port 1(bridge_slave_0) entered disabled state [ 2326.023185][T22780] bridge0: port 2(bridge_slave_1) entered disabled state [ 2326.036377][T15650] bridge0: port 1(bridge_slave_0) entered blocking state [ 2326.043458][T15650] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2326.060107][T22780] bridge0: port 2(bridge_slave_1) entered blocking state [ 2326.067246][T22780] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2326.135792][T14984] veth0_vlan: entered promiscuous mode [ 2326.163917][T14984] veth1_macvtap: entered promiscuous mode [ 2328.031407][ T36] kauditd_printk_skb: 9 callbacks suppressed [ 2328.031423][ T36] audit: type=1326 audit(1763284283.724:529): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15230 comm="syz.7.67875" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f07bf18f6c9 code=0x0 [ 2328.379316][ T36] audit: type=1326 audit(1763284284.074:530): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15250 comm="syz.7.67886" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f07bf18f6c9 code=0x0 [ 2328.440002][ T36] audit: type=1326 audit(1763284284.074:531): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15251 comm="syz.2.67879" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f176a38f6c9 code=0x0 [ 2328.595535][ T36] audit: type=1326 audit(1763284284.284:532): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15268 comm="syz.7.67894" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f07bf18f6c9 code=0x0 [ 2328.851466][ T36] audit: type=1326 audit(1763284284.544:533): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15297 comm="syz.7.67910" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f07bf18f6c9 code=0x0 [ 2332.344093][ T36] audit: type=1326 audit(1763284288.034:534): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15444 comm="syz.2.67983" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f176a38f6c9 code=0x0 [ 2332.684931][ T36] audit: type=1326 audit(1763284288.374:535): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15476 comm="syz.1.67998" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f744ab8f6c9 code=0x0 [ 2333.304993][ T36] audit: type=1326 audit(1763284288.994:536): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15528 comm="syz.6.68024" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fac04d8f6c9 code=0x0 [ 2333.354538][ T293] bridge_slave_1: left allmulticast mode [ 2333.360363][ T293] bridge_slave_1: left promiscuous mode [ 2333.366175][ T293] bridge0: port 2(bridge_slave_1) entered disabled state [ 2333.382462][ T293] bridge_slave_0: left allmulticast mode [ 2333.389112][ T293] bridge_slave_0: left promiscuous mode [ 2333.395306][ T293] bridge0: port 1(bridge_slave_0) entered disabled state [ 2333.531156][T15526] bridge0: port 1(bridge_slave_0) entered blocking state [ 2333.547101][T15526] bridge0: port 1(bridge_slave_0) entered disabled state [ 2333.558261][T15526] bridge_slave_0: entered allmulticast mode [ 2333.564960][T15526] bridge_slave_0: entered promiscuous mode [ 2333.573303][T15526] bridge0: port 2(bridge_slave_1) entered blocking state [ 2333.581054][T15526] bridge0: port 2(bridge_slave_1) entered disabled state [ 2333.589227][T15526] bridge_slave_1: entered allmulticast mode [ 2333.596667][T15526] bridge_slave_1: entered promiscuous mode [ 2333.606427][ T293] veth1_macvtap: left promiscuous mode [ 2333.621037][ T293] veth0_vlan: left promiscuous mode [ 2333.731922][ T36] audit: type=1326 audit(1763284289.424:537): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15557 comm="syz.7.68032" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f07bf18f6c9 code=0x0 [ 2333.810989][T15526] bridge0: port 2(bridge_slave_1) entered blocking state [ 2333.818115][T15526] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2333.825667][T15526] bridge0: port 1(bridge_slave_0) entered blocking state [ 2333.832820][T15526] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2333.858015][T15650] bridge0: port 1(bridge_slave_0) entered disabled state [ 2333.875912][T15650] bridge0: port 2(bridge_slave_1) entered disabled state [ 2333.909177][T22780] bridge0: port 1(bridge_slave_0) entered blocking state [ 2333.916394][T22780] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2333.947278][T22780] bridge0: port 2(bridge_slave_1) entered blocking state [ 2333.954388][T22780] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2334.016228][T15526] veth0_vlan: entered promiscuous mode [ 2334.051074][T15526] veth1_macvtap: entered promiscuous mode [ 2334.630850][ T36] audit: type=1326 audit(1763284290.324:538): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15632 comm="syz.7.68071" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f07bf18f6c9 code=0x0 [ 2334.707766][ T36] audit: type=1326 audit(1763284290.404:539): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15634 comm="syz.7.68072" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f07bf18f6c9 code=0x0 [ 2334.964693][ T36] audit: type=1326 audit(1763284290.654:540): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15677 comm="syz.6.68091" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fac04d8f6c9 code=0x0 [ 2335.149676][ T36] audit: type=1326 audit(1763284290.834:541): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15707 comm="syz.1.68106" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f744ab8f6c9 code=0x0 [ 2335.180895][ T36] audit: type=1326 audit(1763284290.874:542): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15711 comm="syz.2.68108" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fa1cb78f6c9 code=0x0 [ 2335.513685][ T36] audit: type=1326 audit(1763284291.204:543): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15774 comm="syz.2.68140" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fa1cb78f6c9 code=0x0 [ 2336.648453][ T36] audit: type=1326 audit(1763284292.344:544): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15847 comm="syz.7.68177" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f07bf18f6c9 code=0x0 [ 2337.668903][ T36] audit: type=1326 audit(1763284293.364:545): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15883 comm="syz.1.68196" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f744ab8f6c9 code=0x0 [ 2339.043327][ T36] kauditd_printk_skb: 1 callbacks suppressed [ 2339.043346][ T36] audit: type=1326 audit(1763284294.734:547): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16035 comm="syz.2.68263" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fa1cb78f6c9 code=0x0 [ 2339.335682][ T36] audit: type=1326 audit(1763284295.024:548): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16069 comm="syz.1.68287" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f744ab8f6c9 code=0x0 [ 2339.367770][ T36] audit: type=1326 audit(1763284295.024:549): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16070 comm="syz.6.68288" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fac04d8f6c9 code=0x0 [ 2339.766214][ T36] audit: type=1326 audit(1763284295.454:550): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16131 comm="syz.6.68318" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fac04d8f6c9 code=0x0 [ 2342.186507][ T36] audit: type=1326 audit(1763284297.865:551): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16281 comm="syz.1.68394" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f744ab8f6c9 code=0x0 [ 2342.284513][ T36] audit: type=1326 audit(1763284297.975:552): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16299 comm="syz.2.68388" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fa1cb78f6c9 code=0x0 [ 2343.026476][ T36] audit: type=1326 audit(1763284298.715:553): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16377 comm="syz.7.68442" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f07bf18f6c9 code=0x0 [ 2343.414507][ T36] audit: type=1326 audit(1763284299.105:554): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16411 comm="syz.7.68458" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f07bf18f6c9 code=0x0 [ 2345.466604][ T36] audit: type=1326 audit(1763284301.165:555): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16545 comm="syz.6.68526" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fac04d8f6c9 code=0x0 [ 2345.615417][ T36] audit: type=1326 audit(1763284301.305:556): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16549 comm="syz.6.68528" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fac04d8f6c9 code=0x0 [ 2345.849080][ T36] audit: type=1326 audit(1763284301.545:557): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16566 comm="syz.1.68537" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f744ab8f6c9 code=0x0 [ 2346.259803][ T36] audit: type=1326 audit(1763284301.955:558): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16603 comm="syz.2.68555" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fa1cb78f6c9 code=0x0 [ 2346.357488][ T36] audit: type=1326 audit(1763284302.055:559): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16617 comm="syz.1.68562" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f744ab8f6c9 code=0x0 [ 2346.766167][ T36] audit: type=1326 audit(1763284302.455:560): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16657 comm="syz.1.68582" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f744ab8f6c9 code=0x0 [ 2348.397124][ T36] audit: type=1326 audit(1763284304.095:561): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16799 comm="syz.7.68652" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f07bf18f6c9 code=0x0 [ 2348.827130][T16825] bridge0: port 1(bridge_slave_0) entered blocking state [ 2348.835343][T16825] bridge0: port 1(bridge_slave_0) entered disabled state [ 2348.866163][T16825] bridge_slave_0: entered allmulticast mode [ 2348.874293][T16825] bridge_slave_0: entered promiscuous mode [ 2348.907224][T15650] bridge_slave_1: left allmulticast mode [ 2348.926601][T15650] bridge_slave_1: left promiscuous mode [ 2348.946340][T15650] bridge0: port 2(bridge_slave_1) entered disabled state [ 2348.961639][T15650] bridge_slave_0: left allmulticast mode [ 2348.970639][T15650] bridge_slave_0: left promiscuous mode [ 2348.979145][T15650] bridge0: port 1(bridge_slave_0) entered disabled state [ 2349.056327][T16825] bridge0: port 2(bridge_slave_1) entered blocking state [ 2349.066928][T16825] bridge0: port 2(bridge_slave_1) entered disabled state [ 2349.079343][T16825] bridge_slave_1: entered allmulticast mode [ 2349.090700][T16825] bridge_slave_1: entered promiscuous mode [ 2349.116222][T15650] veth1_macvtap: left promiscuous mode [ 2349.122353][T15650] veth0_vlan: left promiscuous mode [ 2349.313484][T16825] bridge0: port 2(bridge_slave_1) entered blocking state [ 2349.321829][T16825] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2349.331426][T16825] bridge0: port 1(bridge_slave_0) entered blocking state [ 2349.339967][T16825] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2349.432087][ T293] bridge0: port 1(bridge_slave_0) entered disabled state [ 2349.446291][ T293] bridge0: port 2(bridge_slave_1) entered disabled state [ 2349.477494][ T293] bridge0: port 1(bridge_slave_0) entered blocking state [ 2349.484872][ T293] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2349.516490][ T293] bridge0: port 2(bridge_slave_1) entered blocking state [ 2349.524291][ T293] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2349.585699][T16825] veth0_vlan: entered promiscuous mode [ 2349.611512][T16825] veth1_macvtap: entered promiscuous mode [ 2349.730871][ T36] audit: type=1326 audit(1763284305.415:562): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16913 comm="syz.6.68702" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f645378f6c9 code=0x0 [ 2352.580267][ T36] audit: type=1326 audit(1763284308.275:563): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17068 comm="syz.7.68781" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f07bf18f6c9 code=0x0 [ 2353.415881][ T36] audit: type=1326 audit(1763284309.105:564): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17146 comm="syz.1.68819" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f744ab8f6c9 code=0x0 [ 2356.165113][ T36] audit: type=1326 audit(1763284311.855:565): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17324 comm="syz.7.68910" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f07bf18f6c9 code=0x0 [ 2356.400567][ T36] audit: type=1326 audit(1763284312.095:566): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17348 comm="syz.6.68920" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f645378f6c9 code=0x0 [ 2357.518423][ T36] audit: type=1326 audit(1763284313.215:567): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17430 comm="syz.1.68962" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f744ab8f6c9 code=0x0 [ 2357.585621][ T36] audit: type=1326 audit(1763284313.255:568): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17432 comm="syz.6.68963" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f645378f6c9 code=0x0 [ 2357.930717][ T36] audit: type=1326 audit(1763284313.625:569): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17464 comm="syz.6.68979" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f645378f6c9 code=0x0 [ 2359.689533][ T36] audit: type=1326 audit(1763284315.385:570): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17566 comm="syz.1.69030" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f744ab8f6c9 code=0x0 [ 2360.000788][ T36] audit: type=1326 audit(1763284315.696:571): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17590 comm="syz.1.69041" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f744ab8f6c9 code=0x0 [ 2360.568688][ T36] audit: type=1326 audit(1763284316.266:572): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17644 comm="syz.7.69069" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f07bf18f6c9 code=0x0 [ 2360.635842][ T36] audit: type=1326 audit(1763284316.326:573): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17650 comm="syz.6.69071" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f645378f6c9 code=0x0 [ 2360.800635][ T36] audit: type=1326 audit(1763284316.496:574): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17673 comm="syz.7.69082" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f07bf18f6c9 code=0x0 [ 2362.845332][ T36] audit: type=1326 audit(1763284318.536:575): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17876 comm="syz.1.69184" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f744ab8f6c9 code=0x0 [ 2363.292569][T17897] netlink: 20 bytes leftover after parsing attributes in process `syz.7.69194'. [ 2363.566778][ T36] audit: type=1326 audit(1763284319.266:576): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17907 comm="syz.6.69195" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f645378f6c9 code=0x0 [ 2364.033003][ T36] audit: type=1326 audit(1763284319.726:577): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17944 comm="syz.1.69218" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f744ab8f6c9 code=0x0 [ 2364.824833][ T36] audit: type=1326 audit(1763284320.516:578): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17985 comm="syz.7.69239" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f07bf18f6c9 code=0x0 [ 2366.745093][ T36] audit: type=1326 audit(1763284322.436:579): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18134 comm="syz.1.69314" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f744ab8f6c9 code=0x0 [ 2367.320072][ T36] audit: type=1326 audit(1763284323.016:580): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18190 comm="syz.6.69341" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f645378f6c9 code=0x0 [ 2368.053044][ T36] audit: type=1326 audit(1763284323.746:581): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18261 comm="syz.1.69376" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f744ab8f6c9 code=0x0 [ 2368.960387][ T36] audit: type=1326 audit(1763284324.656:582): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18299 comm="syz.6.69396" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f645378f6c9 code=0x0 [ 2369.577898][ T36] audit: type=1326 audit(1763284325.276:583): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18341 comm="syz.1.69416" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f744ab8f6c9 code=0x0 [ 2370.234964][ T36] audit: type=1326 audit(1763284325.926:584): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18367 comm="syz.2.69430" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fa1cb78f6c9 code=0x0 [ 2370.636220][ T36] audit: type=1326 audit(1763284326.336:585): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18393 comm="syz.6.69443" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f645378f6c9 code=0x0 [ 2371.074091][ T36] audit: type=1326 audit(1763284326.766:586): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18439 comm="syz.7.69465" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f07bf18f6c9 code=0x0 [ 2371.435288][T22780] bridge_slave_1: left allmulticast mode [ 2371.442164][T22780] bridge_slave_1: left promiscuous mode [ 2371.451533][T22780] bridge0: port 2(bridge_slave_1) entered disabled state [ 2371.485183][T22780] bridge_slave_0: left allmulticast mode [ 2371.491690][T22780] bridge_slave_0: left promiscuous mode [ 2371.498325][T22780] bridge0: port 1(bridge_slave_0) entered disabled state [ 2371.660462][T22780] veth1_macvtap: left promiscuous mode [ 2371.678675][T22780] veth0_vlan: left promiscuous mode [ 2371.801060][T18450] bridge0: port 1(bridge_slave_0) entered blocking state [ 2371.808982][T18450] bridge0: port 1(bridge_slave_0) entered disabled state [ 2371.816922][ T36] audit: type=1326 audit(1763284327.506:587): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18465 comm="syz.1.69476" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f744ab8f6c9 code=0x0 [ 2371.846451][T18450] bridge_slave_0: entered allmulticast mode [ 2371.854510][T18450] bridge_slave_0: entered promiscuous mode [ 2371.866350][T18450] bridge0: port 2(bridge_slave_1) entered blocking state [ 2371.878373][T18450] bridge0: port 2(bridge_slave_1) entered disabled state [ 2371.888741][T18450] bridge_slave_1: entered allmulticast mode [ 2371.899687][T18450] bridge_slave_1: entered promiscuous mode [ 2372.040127][T18450] bridge0: port 2(bridge_slave_1) entered blocking state [ 2372.051599][T18450] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2372.060620][T18450] bridge0: port 1(bridge_slave_0) entered blocking state [ 2372.069229][T18450] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2372.105045][T22780] bridge0: port 1(bridge_slave_0) entered disabled state [ 2372.114810][T22780] bridge0: port 2(bridge_slave_1) entered disabled state [ 2372.139415][ T293] bridge0: port 1(bridge_slave_0) entered blocking state [ 2372.148808][ T293] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2372.182417][T22780] bridge0: port 2(bridge_slave_1) entered blocking state [ 2372.192074][T22780] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2372.274439][T18450] veth0_vlan: entered promiscuous mode [ 2372.308726][T18450] veth1_macvtap: entered promiscuous mode [ 2373.096555][ T36] audit: type=1326 audit(1763284328.796:588): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18611 comm="syz.2.69545" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fa1cb78f6c9 code=0x0 [ 2374.161376][ T36] audit: type=1326 audit(1763284329.856:589): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18639 comm="syz.7.69554" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f03e218f6c9 code=0x0 [ 2374.516290][T18667] FAULT_INJECTION: forcing a failure. [ 2374.516290][T18667] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2374.544756][T18667] CPU: 1 UID: 0 PID: 18667 Comm: syz.7.69573 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 2374.544791][T18667] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2374.544804][T18667] Call Trace: [ 2374.544810][T18667] [ 2374.544818][T18667] __dump_stack+0x21/0x30 [ 2374.544850][T18667] dump_stack_lvl+0x10c/0x190 [ 2374.544873][T18667] ? __cfi_dump_stack_lvl+0x10/0x10 [ 2374.544898][T18667] dump_stack+0x19/0x20 [ 2374.544921][T18667] should_fail_ex+0x3d9/0x530 [ 2374.545195][T18667] should_fail+0xf/0x20 [ 2374.545211][T18667] should_fail_usercopy+0x1e/0x30 [ 2374.545229][T18667] copy_fpstate_to_sigframe+0x919/0xb80 [ 2374.545254][T18667] ? __dequeue_signal+0x50e/0x680 [ 2374.545274][T18667] ? dequeue_signal+0x7f/0x4f0 [ 2374.545292][T18667] ? get_signal+0x51c/0x14f0 [ 2374.545315][T18667] ? copy_fpstate_to_sigframe+0x174/0xb80 [ 2374.545337][T18667] ? __cfi_copy_fpstate_to_sigframe+0x10/0x10 [ 2374.545362][T18667] ? fpu__alloc_mathframe+0xb8/0x160 [ 2374.545384][T18667] get_sigframe+0x58e/0x7d0 [ 2374.545411][T18667] ? __cfi_get_sigframe+0x10/0x10 [ 2374.545435][T18667] ? __dequeue_signal+0x50e/0x680 [ 2374.545456][T18667] x64_setup_rt_frame+0x15d/0xcc0 [ 2374.545482][T18667] ? get_signal+0x1098/0x14f0 [ 2374.545504][T18667] ? _raw_spin_unlock_irq+0x45/0x70 [ 2374.545530][T18667] ? get_signal+0x1250/0x14f0 [ 2374.545553][T18667] ? __cfi_x64_setup_rt_frame+0x10/0x10 [ 2374.545580][T18667] arch_do_signal_or_restart+0x31d/0x720 [ 2374.545693][T18667] ? fput+0x1a5/0x240 [ 2374.545716][T18667] ? __cfi_arch_do_signal_or_restart+0x10/0x10 [ 2374.545742][T18667] ? ksys_write+0x1ef/0x250 [ 2374.545760][T18667] ? __kasan_check_read+0x15/0x20 [ 2374.545788][T18667] syscall_exit_to_user_mode+0x58/0xb0 [ 2374.545809][T18667] do_syscall_64+0x64/0xf0 [ 2374.545832][T18667] ? clear_bhb_loop+0x50/0xa0 [ 2374.545852][T18667] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 2374.545871][T18667] RIP: 0033:0x7f03e218f6c9 [ 2374.545888][T18667] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2374.545906][T18667] RSP: 002b:00007f03e2fb0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2374.545928][T18667] RAX: ffffffffffffffe0 RBX: 00007f03e23e5fa0 RCX: 00007f03e218f6c9 [ 2374.545944][T18667] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000008 [ 2374.545956][T18667] RBP: 00007f03e2fb0090 R08: 0000000000000000 R09: 0000000000000000 [ 2374.545968][T18667] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2374.545980][T18667] R13: 00007f03e23e6038 R14: 00007f03e23e5fa0 R15: 00007fff11454168 [ 2374.545996][T18667] [ 2375.266858][ T36] audit: type=1326 audit(1763284330.966:590): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18681 comm="syz.7.69581" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f03e218f6c9 code=0x0 [ 2376.277652][ T36] audit: type=1400 audit(1763284331.976:591): avc: denied { create } for pid=18762 comm="syz.2.69611" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2377.052396][T18854] netlink: 'syz.7.69655': attribute type 4 has an invalid length. [ 2377.107722][T18854] netlink: 'syz.7.69655': attribute type 4 has an invalid length. [ 2377.347424][ T36] audit: type=1400 audit(1763284333.046:592): avc: denied { create } for pid=18893 comm="syz.6.69682" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 2377.372987][T18896] netlink: 'syz.7.69684': attribute type 4 has an invalid length. [ 2377.389536][T18900] netlink: 'syz.1.69683': attribute type 4 has an invalid length. [ 2377.416204][T18896] netlink: 'syz.7.69684': attribute type 4 has an invalid length. [ 2377.416393][T18900] FAULT_INJECTION: forcing a failure. [ 2377.416393][T18900] name failslab, interval 1, probability 0, space 0, times 0 [ 2377.460731][T18900] CPU: 1 UID: 0 PID: 18900 Comm: syz.1.69683 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 2377.460774][T18900] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2377.460785][T18900] Call Trace: [ 2377.460790][T18900] [ 2377.460799][T18900] __dump_stack+0x21/0x30 [ 2377.460837][T18900] dump_stack_lvl+0x10c/0x190 [ 2377.460858][T18900] ? __cfi_dump_stack_lvl+0x10/0x10 [ 2377.460881][T18900] dump_stack+0x19/0x20 [ 2377.460901][T18900] should_fail_ex+0x3d9/0x530 [ 2377.460921][T18900] should_failslab+0xac/0x100 [ 2377.460942][T18900] kmem_cache_alloc_node_noprof+0x45/0x440 [ 2377.460960][T18900] ? selinux_socket_getpeersec_dgram+0x253/0x360 [ 2377.460981][T18900] ? __alloc_skb+0x10c/0x370 [ 2377.461004][T18900] __alloc_skb+0x10c/0x370 [ 2377.461025][T18900] netlink_alloc_large_skb+0xf7/0x1b0 [ 2377.461050][T18900] netlink_sendmsg+0x586/0xaf0 [ 2377.461076][T18900] ? __cfi_netlink_sendmsg+0x10/0x10 [ 2377.461100][T18900] ? __asan_memcpy+0x5a/0x80 [ 2377.461116][T18900] ? bpf_lsm_socket_sendmsg+0xd/0x20 [ 2377.461148][T18900] ? security_socket_sendmsg+0x33/0xd0 [ 2377.461166][T18900] sock_write_iter+0x49c/0x4f0 [ 2377.461184][T18900] ? __cfi_sock_write_iter+0x10/0x10 [ 2377.461205][T18900] do_iter_readv_writev+0x628/0x810 [ 2377.461223][T18900] ? vfs_iter_read+0x5f0/0x5f0 [ 2377.461241][T18900] ? bpf_lsm_file_permission+0xd/0x20 [ 2377.461264][T18900] vfs_writev+0x485/0xcf0 [ 2377.461284][T18900] ? do_writev+0x2d0/0x2d0 [ 2377.461302][T18900] ? vfs_write+0x93e/0xf30 [ 2377.461322][T18900] do_writev+0x14d/0x2d0 [ 2377.461340][T18900] ? vfs_readv+0xa50/0xa50 [ 2377.461359][T18900] ? __kasan_check_read+0x15/0x20 [ 2377.461384][T18900] __x64_sys_writev+0x81/0x90 [ 2377.461401][T18900] x64_sys_call+0x1fbb/0x2ee0 [ 2377.461425][T18900] do_syscall_64+0x58/0xf0 [ 2377.461446][T18900] ? clear_bhb_loop+0x50/0xa0 [ 2377.461465][T18900] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 2377.461483][T18900] RIP: 0033:0x7f744ab8f6c9 [ 2377.461499][T18900] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2377.461515][T18900] RSP: 002b:00007f744ba6c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 2377.461535][T18900] RAX: ffffffffffffffda RBX: 00007f744ade5fa0 RCX: 00007f744ab8f6c9 [ 2377.461549][T18900] RDX: 0000000000000001 RSI: 00002000000001c0 RDI: 0000000000000008 [ 2377.461561][T18900] RBP: 00007f744ba6c090 R08: 0000000000000000 R09: 0000000000000000 [ 2377.461573][T18900] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2377.461585][T18900] R13: 00007f744ade6038 R14: 00007f744ade5fa0 R15: 00007ffdbba54798 [ 2377.461599][T18900] [ 2378.455305][ T36] audit: type=1326 audit(1763284334.157:593): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19003 comm="syz.6.69735" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f645378f6c9 code=0x0 [ 2378.780635][ T36] audit: type=1400 audit(1763284334.477:594): avc: denied { ioctl } for pid=19031 comm="syz.7.69749" path="socket:[1135037]" dev="sockfs" ino=1135037 ioctlcmd=0x5411 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2379.615532][T19094] FAULT_INJECTION: forcing a failure. [ 2379.615532][T19094] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2379.653901][T19094] CPU: 0 UID: 0 PID: 19094 Comm: syz.7.69780 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 2379.653936][T19094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2379.653949][T19094] Call Trace: [ 2379.653956][T19094] [ 2379.653964][T19094] __dump_stack+0x21/0x30 [ 2379.653995][T19094] dump_stack_lvl+0x10c/0x190 [ 2379.654019][T19094] ? __cfi_dump_stack_lvl+0x10/0x10 [ 2379.654044][T19094] dump_stack+0x19/0x20 [ 2379.654066][T19094] should_fail_ex+0x3d9/0x530 [ 2379.654087][T19094] should_fail+0xf/0x20 [ 2379.654103][T19094] should_fail_usercopy+0x1e/0x30 [ 2379.654123][T19094] _copy_from_user+0x22/0xb0 [ 2379.654145][T19094] vlan_ioctl_handler+0x9e/0x680 [ 2379.654169][T19094] ? __cfi_vlan_ioctl_handler+0x10/0x10 [ 2379.654191][T19094] ? __kasan_check_write+0x18/0x20 [ 2379.654218][T19094] ? mutex_unlock+0x8b/0x240 [ 2379.654286][T19094] ? __cfi_vlan_ioctl_handler+0x10/0x10 [ 2379.654307][T19094] sock_ioctl+0x532/0x7b0 [ 2379.654330][T19094] ? __cfi_sock_ioctl+0x10/0x10 [ 2379.654344][T19094] ? __fget_files+0x2c5/0x340 [ 2379.654362][T19094] ? bpf_lsm_file_ioctl+0xd/0x20 [ 2379.654383][T19094] ? security_file_ioctl+0x34/0xd0 [ 2379.654402][T19094] ? __cfi_sock_ioctl+0x10/0x10 [ 2379.654420][T19094] __se_sys_ioctl+0x135/0x1b0 [ 2379.654442][T19094] __x64_sys_ioctl+0x7f/0xa0 [ 2379.654461][T19094] x64_sys_call+0x1878/0x2ee0 [ 2379.654484][T19094] do_syscall_64+0x58/0xf0 [ 2379.654607][T19094] ? clear_bhb_loop+0x50/0xa0 [ 2379.654670][T19094] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 2379.654691][T19094] RIP: 0033:0x7f03e218f6c9 [ 2379.654708][T19094] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2379.654725][T19094] RSP: 002b:00007f03e2fb0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2379.654746][T19094] RAX: ffffffffffffffda RBX: 00007f03e23e5fa0 RCX: 00007f03e218f6c9 [ 2379.654761][T19094] RDX: 0000200000000a00 RSI: 0000000000008983 RDI: 0000000000000006 [ 2379.654775][T19094] RBP: 00007f03e2fb0090 R08: 0000000000000000 R09: 0000000000000000 [ 2379.654788][T19094] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2379.654801][T19094] R13: 00007f03e23e6038 R14: 00007f03e23e5fa0 R15: 00007fff11454168 [ 2379.654819][T19094] [ 2380.543339][ T36] audit: type=1326 audit(1763284336.237:595): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19137 comm="syz.1.69801" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f744ab8f6c9 code=0x0 [ 2381.570074][ T36] audit: type=1326 audit(1763284337.267:596): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19214 comm="syz.2.69840" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fa1cb78f6c9 code=0x0 [ 2381.604909][T19216] overlayfs: "xino" feature enabled using 3 upper inode bits. [ 2383.215004][T19285] netlink: 'syz.2.69873': attribute type 4 has an invalid length. [ 2383.599770][T19339] FAULT_INJECTION: forcing a failure. [ 2383.599770][T19339] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2383.634230][T19339] CPU: 1 UID: 0 PID: 19339 Comm: syz.2.69901 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 2383.634267][T19339] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2383.634279][T19339] Call Trace: [ 2383.634286][T19339] [ 2383.634295][T19339] __dump_stack+0x21/0x30 [ 2383.634325][T19339] dump_stack_lvl+0x10c/0x190 [ 2383.634348][T19339] ? __cfi_dump_stack_lvl+0x10/0x10 [ 2383.634374][T19339] dump_stack+0x19/0x20 [ 2383.634400][T19339] should_fail_ex+0x3d9/0x530 [ 2383.634421][T19339] should_fail+0xf/0x20 [ 2383.634438][T19339] should_fail_usercopy+0x1e/0x30 [ 2383.634458][T19339] _copy_from_user+0x22/0xb0 [ 2383.634481][T19339] vlan_ioctl_handler+0x9e/0x680 [ 2383.634502][T19339] ? __cfi_vlan_ioctl_handler+0x10/0x10 [ 2383.634525][T19339] ? __kasan_check_write+0x18/0x20 [ 2383.634567][T19339] ? mutex_unlock+0x8b/0x240 [ 2383.634585][T19339] ? __cfi_vlan_ioctl_handler+0x10/0x10 [ 2383.634606][T19339] sock_ioctl+0x532/0x7b0 [ 2383.634625][T19339] ? __cfi_sock_ioctl+0x10/0x10 [ 2383.634657][T19339] ? __fget_files+0x2c5/0x340 [ 2383.634682][T19339] ? bpf_lsm_file_ioctl+0xd/0x20 [ 2383.634707][T19339] ? security_file_ioctl+0x34/0xd0 [ 2383.634727][T19339] ? __cfi_sock_ioctl+0x10/0x10 [ 2383.634746][T19339] __se_sys_ioctl+0x135/0x1b0 [ 2383.634766][T19339] __x64_sys_ioctl+0x7f/0xa0 [ 2383.634786][T19339] x64_sys_call+0x1878/0x2ee0 [ 2383.634812][T19339] do_syscall_64+0x58/0xf0 [ 2383.634835][T19339] ? clear_bhb_loop+0x50/0xa0 [ 2383.634856][T19339] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 2383.634875][T19339] RIP: 0033:0x7fa1cb78f6c9 [ 2383.634891][T19339] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2383.634908][T19339] RSP: 002b:00007fa1cc6fb038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2383.634929][T19339] RAX: ffffffffffffffda RBX: 00007fa1cb9e5fa0 RCX: 00007fa1cb78f6c9 [ 2383.634944][T19339] RDX: 0000200000000a00 RSI: 0000000000008983 RDI: 0000000000000008 [ 2383.634957][T19339] RBP: 00007fa1cc6fb090 R08: 0000000000000000 R09: 0000000000000000 [ 2383.634970][T19339] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2383.634982][T19339] R13: 00007fa1cb9e6038 R14: 00007fa1cb9e5fa0 R15: 00007ffd16dbc698 [ 2383.634999][T19339] [ 2384.251618][T19367] netlink: 'syz.7.69914': attribute type 4 has an invalid length. [ 2384.357795][ T36] audit: type=1400 audit(1763284340.057:597): avc: denied { create } for pid=19368 comm="syz.7.69916" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 2384.573248][T19379] FAULT_INJECTION: forcing a failure. [ 2384.573248][T19379] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2384.610395][T19379] CPU: 0 UID: 0 PID: 19379 Comm: syz.7.69920 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 2384.610432][T19379] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2384.610445][T19379] Call Trace: [ 2384.610452][T19379] [ 2384.610461][T19379] __dump_stack+0x21/0x30 [ 2384.610491][T19379] dump_stack_lvl+0x10c/0x190 [ 2384.610515][T19379] ? __cfi_dump_stack_lvl+0x10/0x10 [ 2384.610540][T19379] dump_stack+0x19/0x20 [ 2384.610562][T19379] should_fail_ex+0x3d9/0x530 [ 2384.610583][T19379] should_fail+0xf/0x20 [ 2384.610600][T19379] should_fail_usercopy+0x1e/0x30 [ 2384.610619][T19379] _copy_from_user+0x22/0xb0 [ 2384.610641][T19379] do_seccomp+0x1a5/0xee0 [ 2384.610660][T19379] ? vfs_write+0x93e/0xf30 [ 2384.610679][T19379] ? prctl_set_seccomp+0x80/0x80 [ 2384.610696][T19379] ? __cfi_vfs_write+0x10/0x10 [ 2384.610715][T19379] ? __kasan_check_read+0x15/0x20 [ 2384.610742][T19379] ? static_key_count+0x45/0x70 [ 2384.610768][T19379] prctl_set_seccomp+0x50/0x80 [ 2384.610785][T19379] __se_sys_prctl+0x2e4/0x1460 [ 2384.610804][T19379] ? __x64_sys_prctl+0xf0/0xf0 [ 2384.610821][T19379] __x64_sys_prctl+0xc3/0xf0 [ 2384.610838][T19379] x64_sys_call+0x2614/0x2ee0 [ 2384.610864][T19379] do_syscall_64+0x58/0xf0 [ 2384.610887][T19379] ? clear_bhb_loop+0x50/0xa0 [ 2384.610907][T19379] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 2384.610927][T19379] RIP: 0033:0x7f03e218f6c9 [ 2384.610960][T19379] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2384.610977][T19379] RSP: 002b:00007f03e2fb0038 EFLAGS: 00000246 ORIG_RAX: 000000000000009d [ 2384.610998][T19379] RAX: ffffffffffffffda RBX: 00007f03e23e5fa0 RCX: 00007f03e218f6c9 [ 2384.611013][T19379] RDX: 0000200000000080 RSI: 0000000000000002 RDI: 0000000000000016 [ 2384.611026][T19379] RBP: 00007f03e2fb0090 R08: 0000000000000000 R09: 0000000000000000 [ 2384.611038][T19379] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2384.611051][T19379] R13: 00007f03e23e6038 R14: 00007f03e23e5fa0 R15: 00007fff11454168 [ 2384.611068][T19379] [ 2385.017616][T19399] FAULT_INJECTION: forcing a failure. [ 2385.017616][T19399] name failslab, interval 1, probability 0, space 0, times 0 [ 2385.077479][T19399] CPU: 1 UID: 0 PID: 19399 Comm: syz.1.69930 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 2385.077514][T19399] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2385.077527][T19399] Call Trace: [ 2385.077534][T19399] [ 2385.077543][T19399] __dump_stack+0x21/0x30 [ 2385.077573][T19399] dump_stack_lvl+0x10c/0x190 [ 2385.077597][T19399] ? __cfi_dump_stack_lvl+0x10/0x10 [ 2385.077620][T19399] ? __kasan_check_write+0x18/0x20 [ 2385.077647][T19399] ? proc_fail_nth_write+0x17e/0x210 [ 2385.077673][T19399] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 2385.077697][T19399] dump_stack+0x19/0x20 [ 2385.077719][T19399] should_fail_ex+0x3d9/0x530 [ 2385.077739][T19399] should_failslab+0xac/0x100 [ 2385.077760][T19399] kmem_cache_alloc_noprof+0x42/0x430 [ 2385.077778][T19399] ? getname_flags+0xc6/0x710 [ 2385.077798][T19399] getname_flags+0xc6/0x710 [ 2385.077830][T19399] ? build_open_flags+0x487/0x600 [ 2385.077854][T19399] getname+0x1b/0x30 [ 2385.077871][T19399] do_sys_openat2+0xcb/0x1c0 [ 2385.078025][T19399] ? fput+0x1a5/0x240 [ 2385.078060][T19399] ? do_sys_open+0x100/0x100 [ 2385.078084][T19399] ? ksys_write+0x1ef/0x250 [ 2385.078101][T19399] ? __cfi_ksys_write+0x10/0x10 [ 2385.078120][T19399] __x64_sys_openat+0x13a/0x170 [ 2385.078141][T19399] x64_sys_call+0xe69/0x2ee0 [ 2385.078163][T19399] do_syscall_64+0x58/0xf0 [ 2385.078182][T19399] ? clear_bhb_loop+0x50/0xa0 [ 2385.078199][T19399] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 2385.078215][T19399] RIP: 0033:0x7f744ab8df10 [ 2385.078231][T19399] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 69 95 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 bc 95 02 00 8b 44 [ 2385.078249][T19399] RSP: 002b:00007f744ba6bf10 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 2385.078272][T19399] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f744ab8df10 [ 2385.078287][T19399] RDX: 0000000000000002 RSI: 00007f744ba6bfa0 RDI: 00000000ffffff9c [ 2385.078302][T19399] RBP: 00007f744ba6bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2385.078316][T19399] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 2385.078329][T19399] R13: 00007f744ade6038 R14: 00007f744ade5fa0 R15: 00007ffdbba54798 [ 2385.078346][T19399] [ 2386.499597][ T36] audit: type=1326 audit(1763284342.197:598): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19445 comm="syz.6.69953" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f645378f6c9 code=0x0 [ 2386.794444][T19473] FAULT_INJECTION: forcing a failure. [ 2386.794444][T19473] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2386.814017][T19473] CPU: 0 UID: 0 PID: 19473 Comm: syz.1.69967 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 2386.814050][T19473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2386.814062][T19473] Call Trace: [ 2386.814069][T19473] [ 2386.814077][T19473] __dump_stack+0x21/0x30 [ 2386.814106][T19473] dump_stack_lvl+0x10c/0x190 [ 2386.814126][T19473] ? __cfi_dump_stack_lvl+0x10/0x10 [ 2386.814150][T19473] dump_stack+0x19/0x20 [ 2386.814172][T19473] should_fail_ex+0x3d9/0x530 [ 2386.814189][T19473] should_fail+0xf/0x20 [ 2386.814203][T19473] should_fail_usercopy+0x1e/0x30 [ 2386.814219][T19473] _copy_from_user+0x22/0xb0 [ 2386.814239][T19473] do_seccomp+0x1a5/0xee0 [ 2386.814253][T19473] ? vfs_write+0x93e/0xf30 [ 2386.814270][T19473] ? prctl_set_seccomp+0x80/0x80 [ 2386.814286][T19473] ? __cfi_vfs_write+0x10/0x10 [ 2386.814304][T19473] ? __kasan_check_read+0x15/0x20 [ 2386.814330][T19473] ? static_key_count+0x45/0x70 [ 2386.814354][T19473] prctl_set_seccomp+0x50/0x80 [ 2386.814370][T19473] __se_sys_prctl+0x2e4/0x1460 [ 2386.814388][T19473] ? __x64_sys_prctl+0xf0/0xf0 [ 2386.814406][T19473] __x64_sys_prctl+0xc3/0xf0 [ 2386.814422][T19473] x64_sys_call+0x2614/0x2ee0 [ 2386.814447][T19473] do_syscall_64+0x58/0xf0 [ 2386.814469][T19473] ? clear_bhb_loop+0x50/0xa0 [ 2386.814491][T19473] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 2386.814511][T19473] RIP: 0033:0x7f744ab8f6c9 [ 2386.814527][T19473] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2386.814543][T19473] RSP: 002b:00007f744ba6c038 EFLAGS: 00000246 ORIG_RAX: 000000000000009d [ 2386.814564][T19473] RAX: ffffffffffffffda RBX: 00007f744ade5fa0 RCX: 00007f744ab8f6c9 [ 2386.814580][T19473] RDX: 0000200000000080 RSI: 0000000000000002 RDI: 0000000000000016 [ 2386.814593][T19473] RBP: 00007f744ba6c090 R08: 0000000000000000 R09: 0000000000000000 [ 2386.814606][T19473] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2386.814618][T19473] R13: 00007f744ade6038 R14: 00007f744ade5fa0 R15: 00007ffdbba54798 [ 2386.814636][T19473] [ 2388.512378][T19547] netlink: 'syz.2.70006': attribute type 4 has an invalid length. [ 2389.351599][T19573] FAULT_INJECTION: forcing a failure. [ 2389.351599][T19573] name failslab, interval 1, probability 0, space 0, times 0 [ 2389.383985][T19573] CPU: 0 UID: 0 PID: 19573 Comm: syz.7.70018 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 2389.384020][T19573] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2389.384033][T19573] Call Trace: [ 2389.384040][T19573] [ 2389.384048][T19573] __dump_stack+0x21/0x30 [ 2389.384092][T19573] dump_stack_lvl+0x10c/0x190 [ 2389.384115][T19573] ? __cfi_dump_stack_lvl+0x10/0x10 [ 2389.384139][T19573] ? kernel_text_address+0xa9/0xe0 [ 2389.384164][T19573] dump_stack+0x19/0x20 [ 2389.384186][T19573] should_fail_ex+0x3d9/0x530 [ 2389.384206][T19573] should_failslab+0xac/0x100 [ 2389.384227][T19573] __kmalloc_node_noprof+0x6c/0x520 [ 2389.384247][T19573] ? __kvmalloc_node_noprof+0x11d/0x300 [ 2389.384274][T19573] __kvmalloc_node_noprof+0x11d/0x300 [ 2389.384300][T19573] ? __cfi___kvmalloc_node_noprof+0x10/0x10 [ 2389.384328][T19573] traverse+0xf5/0x720 [ 2389.384348][T19573] ? __cfi_mutex_lock+0x10/0x10 [ 2389.384367][T19573] ? selinux_file_permission+0x309/0xb30 [ 2389.384392][T19573] seq_read_iter+0xe55/0xfe0 [ 2389.384413][T19573] ? __kasan_check_write+0x18/0x20 [ 2389.384438][T19573] ? proc_fail_nth_write+0x17e/0x210 [ 2389.384464][T19573] vfs_read+0x62b/0xc70 [ 2389.384482][T19573] ? __cfi_vfs_read+0x10/0x10 [ 2389.384502][T19573] ksys_pread64+0x170/0x270 [ 2389.384520][T19573] ? __cfi_ksys_pread64+0x10/0x10 [ 2389.384539][T19573] __x64_sys_pread64+0x9f/0xb0 [ 2389.384557][T19573] x64_sys_call+0x2a34/0x2ee0 [ 2389.384582][T19573] do_syscall_64+0x58/0xf0 [ 2389.384605][T19573] ? clear_bhb_loop+0x50/0xa0 [ 2389.384634][T19573] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 2389.384654][T19573] RIP: 0033:0x7f03e218f6c9 [ 2389.384670][T19573] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2389.384686][T19573] RSP: 002b:00007f03e2fb0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000011 [ 2389.384708][T19573] RAX: ffffffffffffffda RBX: 00007f03e23e5fa0 RCX: 00007f03e218f6c9 [ 2389.384724][T19573] RDX: 0000000000001000 RSI: 00002000000029c0 RDI: 0000000000000006 [ 2389.384738][T19573] RBP: 00007f03e2fb0090 R08: 0000000000000000 R09: 0000000000000000 [ 2389.384752][T19573] R10: 0000000000000d36 R11: 0000000000000246 R12: 0000000000000001 [ 2389.384764][T19573] R13: 00007f03e23e6038 R14: 00007f03e23e5fa0 R15: 00007fff11454168 [ 2389.384781][T19573] [ 2390.374354][T19639] overlayfs: failed to resolve './file1': -2 [ 2390.704360][T19682] No source specified [ 2390.785475][T19686] netlink: 'syz.6.70071': attribute type 4 has an invalid length. [ 2392.072233][T19717] netlink: 'syz.1.70085': attribute type 4 has an invalid length. [ 2392.749432][ T36] audit: type=1326 audit(1763284348.437:599): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19740 comm="syz.7.70097" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f03e218f6c9 code=0x0 [ 2392.835673][ T36] audit: type=1400 audit(1763284348.537:600): avc: denied { checkpoint_restore } for pid=19744 comm="syz.7.70099" capability=40 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2393.582301][T19827] FAULT_INJECTION: forcing a failure. [ 2393.582301][T19827] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2393.606940][T19822] netlink: 'syz.1.70137': attribute type 4 has an invalid length. [ 2393.618435][T19827] CPU: 1 UID: 0 PID: 19827 Comm: syz.6.70139 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 2393.618470][T19827] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2393.618482][T19827] Call Trace: [ 2393.618489][T19827] [ 2393.618497][T19827] __dump_stack+0x21/0x30 [ 2393.618526][T19827] dump_stack_lvl+0x10c/0x190 [ 2393.618549][T19827] ? __cfi_dump_stack_lvl+0x10/0x10 [ 2393.618572][T19827] ? check_stack_object+0x12c/0x140 [ 2393.618592][T19827] dump_stack+0x19/0x20 [ 2393.618614][T19827] should_fail_ex+0x3d9/0x530 [ 2393.618634][T19827] should_fail+0xf/0x20 [ 2393.618651][T19827] should_fail_usercopy+0x1e/0x30 [ 2393.618670][T19827] _copy_to_user+0x24/0xa0 [ 2393.618693][T19827] simple_read_from_buffer+0xed/0x160 [ 2393.618717][T19827] proc_fail_nth_read+0x19e/0x210 [ 2393.618741][T19827] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 2393.618764][T19827] ? bpf_lsm_file_permission+0xd/0x20 [ 2393.618789][T19827] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 2393.618811][T19827] vfs_read+0x27d/0xc70 [ 2393.618829][T19827] ? __cfi_vfs_read+0x10/0x10 [ 2393.618845][T19827] ? __kasan_check_write+0x18/0x20 [ 2393.618871][T19827] ? mutex_lock+0x92/0x1c0 [ 2393.618889][T19827] ? __cfi_mutex_lock+0x10/0x10 [ 2393.618906][T19827] ? __fget_files+0x2c5/0x340 [ 2393.618928][T19827] ksys_read+0x141/0x250 [ 2393.618944][T19827] ? __cfi_ksys_read+0x10/0x10 [ 2393.618962][T19827] ? __kasan_check_read+0x15/0x20 [ 2393.618988][T19827] __x64_sys_read+0x7f/0x90 [ 2393.619005][T19827] x64_sys_call+0x2638/0x2ee0 [ 2393.619031][T19827] do_syscall_64+0x58/0xf0 [ 2393.619054][T19827] ? clear_bhb_loop+0x50/0xa0 [ 2393.619075][T19827] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 2393.619095][T19827] RIP: 0033:0x7f645378e0dc [ 2393.619111][T19827] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 2393.619128][T19827] RSP: 002b:00007f6454640030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2393.619149][T19827] RAX: ffffffffffffffda RBX: 00007f64539e5fa0 RCX: 00007f645378e0dc [ 2393.619164][T19827] RDX: 000000000000000f RSI: 00007f64546400a0 RDI: 0000000000000007 [ 2393.619178][T19827] RBP: 00007f6454640090 R08: 0000000000000000 R09: 0000000000000058 [ 2393.619190][T19827] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2393.619203][T19827] R13: 00007f64539e6038 R14: 00007f64539e5fa0 R15: 00007ffd10b44e88 [ 2393.619221][T19827] [ 2393.935785][T19822] netlink: 'syz.1.70137': attribute type 5 has an invalid length. [ 2393.945685][T19822] netlink: 3657 bytes leftover after parsing attributes in process `syz.1.70137'. [ 2394.138528][T19845] FAULT_INJECTION: forcing a failure. [ 2394.138528][T19845] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2394.189681][T19845] CPU: 1 UID: 0 PID: 19845 Comm: syz.6.70149 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 2394.189716][T19845] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2394.189727][T19845] Call Trace: [ 2394.189733][T19845] [ 2394.189758][T19845] __dump_stack+0x21/0x30 [ 2394.189786][T19845] dump_stack_lvl+0x10c/0x190 [ 2394.189808][T19845] ? __cfi_dump_stack_lvl+0x10/0x10 [ 2394.189830][T19845] ? check_stack_object+0x12c/0x140 [ 2394.189848][T19845] dump_stack+0x19/0x20 [ 2394.189899][T19845] should_fail_ex+0x3d9/0x530 [ 2394.189919][T19845] should_fail+0xf/0x20 [ 2394.189936][T19845] should_fail_usercopy+0x1e/0x30 [ 2394.189955][T19845] _copy_to_user+0x24/0xa0 [ 2394.189977][T19845] simple_read_from_buffer+0xed/0x160 [ 2394.190012][T19845] proc_fail_nth_read+0x19e/0x210 [ 2394.190036][T19845] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 2394.190079][T19845] ? bpf_lsm_file_permission+0xd/0x20 [ 2394.190103][T19845] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 2394.190123][T19845] vfs_read+0x27d/0xc70 [ 2394.190137][T19845] ? __cfi_vfs_read+0x10/0x10 [ 2394.190161][T19845] ? __kasan_check_write+0x18/0x20 [ 2394.190184][T19845] ? mutex_lock+0x92/0x1c0 [ 2394.190200][T19845] ? __cfi_mutex_lock+0x10/0x10 [ 2394.190221][T19845] ? __fget_files+0x2c5/0x340 [ 2394.190339][T19845] ksys_read+0x141/0x250 [ 2394.190368][T19845] ? __cfi_ksys_read+0x10/0x10 [ 2394.190384][T19845] ? __kasan_check_write+0x18/0x20 [ 2394.190408][T19845] ? __kasan_check_read+0x15/0x20 [ 2394.190431][T19845] __x64_sys_read+0x7f/0x90 [ 2394.190446][T19845] x64_sys_call+0x2638/0x2ee0 [ 2394.190471][T19845] do_syscall_64+0x58/0xf0 [ 2394.190509][T19845] ? clear_bhb_loop+0x50/0xa0 [ 2394.190529][T19845] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 2394.190549][T19845] RIP: 0033:0x7f645378e0dc [ 2394.190564][T19845] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 2394.190581][T19845] RSP: 002b:00007f6454640030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2394.190670][T19845] RAX: ffffffffffffffda RBX: 00007f64539e5fa0 RCX: 00007f645378e0dc [ 2394.190686][T19845] RDX: 000000000000000f RSI: 00007f64546400a0 RDI: 000000000000000a [ 2394.190699][T19845] RBP: 00007f6454640090 R08: 0000000000000000 R09: 0000000000000000 [ 2394.190710][T19845] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2394.190721][T19845] R13: 00007f64539e6038 R14: 00007f64539e5fa0 R15: 00007ffd10b44e88 [ 2394.190736][T19845] [ 2394.608095][ T293] bridge_slave_1: left allmulticast mode [ 2394.614684][ T293] bridge_slave_1: left promiscuous mode [ 2394.621712][ T293] bridge0: port 2(bridge_slave_1) entered disabled state [ 2394.652367][ T293] bridge_slave_0: left allmulticast mode [ 2394.665413][ T293] bridge_slave_0: left promiscuous mode [ 2394.683376][ T293] bridge0: port 1(bridge_slave_0) entered disabled state [ 2394.799435][T19880] bridge0: port 1(bridge_slave_0) entered blocking state [ 2394.818777][T19880] bridge0: port 1(bridge_slave_0) entered disabled state [ 2394.840393][T19880] bridge_slave_0: entered allmulticast mode [ 2394.851121][T19880] bridge_slave_0: entered promiscuous mode [ 2394.864863][ T293] veth1_macvtap: left promiscuous mode [ 2394.878372][ T293] veth0_vlan: left promiscuous mode [ 2394.987326][T19880] bridge0: port 2(bridge_slave_1) entered blocking state [ 2395.031634][T19880] bridge0: port 2(bridge_slave_1) entered disabled state [ 2395.052181][T19880] bridge_slave_1: entered allmulticast mode [ 2395.069484][T19880] bridge_slave_1: entered promiscuous mode [ 2395.315721][T15650] bridge0: port 1(bridge_slave_0) entered blocking state [ 2395.324406][T15650] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2395.355784][T15650] bridge0: port 2(bridge_slave_1) entered blocking state [ 2395.366120][T15650] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2395.377065][T19941] netlink: 'syz.6.70188': attribute type 4 has an invalid length. [ 2395.449944][T19880] veth0_vlan: entered promiscuous mode [ 2395.468596][T19880] veth1_macvtap: entered promiscuous mode [ 2396.322345][T20073] FAULT_INJECTION: forcing a failure. [ 2396.322345][T20073] name failslab, interval 1, probability 0, space 0, times 0 [ 2396.343485][T20073] CPU: 1 UID: 0 PID: 20073 Comm: syz.6.70254 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 2396.343519][T20073] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2396.343531][T20073] Call Trace: [ 2396.343537][T20073] [ 2396.343552][T20073] __dump_stack+0x21/0x30 [ 2396.343580][T20073] dump_stack_lvl+0x10c/0x190 [ 2396.343600][T20073] ? __cfi_dump_stack_lvl+0x10/0x10 [ 2396.343622][T20073] ? get_random_u64+0x2ac/0x4b0 [ 2396.343774][T20073] dump_stack+0x19/0x20 [ 2396.343795][T20073] should_fail_ex+0x3d9/0x530 [ 2396.343815][T20073] should_failslab+0xac/0x100 [ 2396.343835][T20073] kmem_cache_alloc_noprof+0x42/0x430 [ 2396.343849][T20073] ? prepare_creds+0x48/0x6b0 [ 2396.343866][T20073] prepare_creds+0x48/0x6b0 [ 2396.343881][T20073] copy_creds+0xe8/0x5d0 [ 2396.343896][T20073] copy_process+0x894/0x3220 [ 2396.343915][T20073] ? __cfi_copy_process+0x10/0x10 [ 2396.343930][T20073] ? proc_fail_nth_write+0x17e/0x210 [ 2396.343951][T20073] kernel_clone+0x23f/0x830 [ 2396.343968][T20073] ? __cfi_kernel_clone+0x10/0x10 [ 2396.343988][T20073] __x64_sys_clone+0x18c/0x1f0 [ 2396.344006][T20073] ? __cfi___x64_sys_clone+0x10/0x10 [ 2396.344027][T20073] ? __kasan_check_read+0x15/0x20 [ 2396.344051][T20073] x64_sys_call+0x2b3c/0x2ee0 [ 2396.344072][T20073] do_syscall_64+0x58/0xf0 [ 2396.344100][T20073] ? clear_bhb_loop+0x50/0xa0 [ 2396.344118][T20073] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 2396.344134][T20073] RIP: 0033:0x7f645378f6c9 [ 2396.344149][T20073] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2396.344164][T20073] RSP: 002b:00007f645463ffe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2396.344183][T20073] RAX: ffffffffffffffda RBX: 00007f64539e5fa0 RCX: 00007f645378f6c9 [ 2396.344196][T20073] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020223000 [ 2396.344207][T20073] RBP: 00007f6454640090 R08: 0000000000000000 R09: 0000000000000000 [ 2396.344219][T20073] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 2396.344230][T20073] R13: 00007f64539e6038 R14: 00007f64539e5fa0 R15: 00007ffd10b44e88 [ 2396.344245][T20073] [ 2396.409093][T20082] netlink: 'syz.1.70258': attribute type 4 has an invalid length. [ 2397.784961][T20246] FAULT_INJECTION: forcing a failure. [ 2397.784961][T20246] name failslab, interval 1, probability 0, space 0, times 0 [ 2397.820924][T20246] CPU: 1 UID: 0 PID: 20246 Comm: syz.2.70339 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 2397.820960][T20246] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2397.820973][T20246] Call Trace: [ 2397.820979][T20246] [ 2397.820988][T20246] __dump_stack+0x21/0x30 [ 2397.821019][T20246] dump_stack_lvl+0x10c/0x190 [ 2397.821053][T20246] ? __cfi_dump_stack_lvl+0x10/0x10 [ 2397.821079][T20246] dump_stack+0x19/0x20 [ 2397.821108][T20246] should_fail_ex+0x3d9/0x530 [ 2397.821128][T20246] should_failslab+0xac/0x100 [ 2397.821150][T20246] kmem_cache_alloc_lru_noprof+0x44/0x430 [ 2397.821169][T20246] ? sock_alloc_inode+0x48/0x150 [ 2397.821190][T20246] ? __kasan_check_write+0x18/0x20 [ 2397.821218][T20246] sock_alloc_inode+0x48/0x150 [ 2397.821238][T20246] ? __cfi_sock_alloc_inode+0x10/0x10 [ 2397.821258][T20246] alloc_inode+0x7a/0x270 [ 2397.821277][T20246] ? bpf_lsm_socket_create+0xd/0x20 [ 2397.821297][T20246] new_inode_pseudo+0x19/0x40 [ 2397.821318][T20246] __sock_create+0x130/0x810 [ 2397.821339][T20246] __sys_socket+0xe2/0x1c0 [ 2397.821360][T20246] __x64_sys_socket+0x7e/0x90 [ 2397.821381][T20246] x64_sys_call+0x2608/0x2ee0 [ 2397.821406][T20246] do_syscall_64+0x58/0xf0 [ 2397.821429][T20246] ? clear_bhb_loop+0x50/0xa0 [ 2397.821450][T20246] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 2397.821469][T20246] RIP: 0033:0x7fa1cb78f6c9 [ 2397.821486][T20246] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2397.821502][T20246] RSP: 002b:00007fa1cc6fb038 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 2397.821522][T20246] RAX: ffffffffffffffda RBX: 00007fa1cb9e5fa0 RCX: 00007fa1cb78f6c9 [ 2397.821538][T20246] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000002 [ 2397.821550][T20246] RBP: 00007fa1cc6fb090 R08: 0000000000000000 R09: 0000000000000000 [ 2397.821563][T20246] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2397.821575][T20246] R13: 00007fa1cb9e6038 R14: 00007fa1cb9e5fa0 R15: 00007ffd16dbc698 [ 2397.821592][T20246] [ 2397.821602][T20246] socket: no more sockets [ 2398.927091][ T36] audit: type=1400 audit(1763284354.618:601): avc: denied { create } for pid=20274 comm="syz.7.70353" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 2399.833235][T12832] usb 7-1: new high-speed USB device number 86 using dummy_hcd [ 2400.004277][T12832] usb 7-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2400.035453][T12832] usb 7-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2400.067340][T12832] usb 7-1: New USB device found, idVendor=256c, idProduct=006d, bcdDevice= 0.00 [ 2400.083228][T12832] usb 7-1: New USB device strings: Mfr=2, Product=0, SerialNumber=0 [ 2400.103261][T12832] usb 7-1: Manufacturer: syz [ 2400.118271][T12832] usb 7-1: config 0 descriptor?? [ 2401.154462][T12832] uclogic 0003:256C:006D.001D: failed retrieving string descriptor #200: -71 [ 2401.187423][T12832] uclogic 0003:256C:006D.001D: failed retrieving pen parameters: -71 [ 2401.203404][T12832] uclogic 0003:256C:006D.001D: failed probing pen v2 parameters: -71 [ 2401.223233][T12832] uclogic 0003:256C:006D.001D: failed probing parameters: -71 [ 2401.231475][T12832] uclogic 0003:256C:006D.001D: probe with driver uclogic failed with error -71 [ 2401.266593][T12832] usb 7-1: USB disconnect, device number 86 [ 2401.885108][T20522] netlink: 'syz.7.70445': attribute type 4 has an invalid length. [ 2406.311371][T20693] netlink: 'syz.6.70530': attribute type 4 has an invalid length. [ 2417.463584][T21123] netlink: 'syz.6.70744': attribute type 4 has an invalid length. [ 2418.274397][T21198] bridge0: port 1(bridge_slave_0) entered blocking state [ 2418.284202][T21198] bridge0: port 1(bridge_slave_0) entered disabled state [ 2418.293242][T21198] bridge_slave_0: entered allmulticast mode [ 2418.302600][T21198] bridge_slave_0: entered promiscuous mode [ 2418.310416][T21198] bridge0: port 2(bridge_slave_1) entered blocking state [ 2418.319909][T21198] bridge0: port 2(bridge_slave_1) entered disabled state [ 2418.328200][T21198] bridge_slave_1: entered allmulticast mode [ 2418.336185][T21198] bridge_slave_1: entered promiscuous mode [ 2418.493903][T21198] bridge0: port 2(bridge_slave_1) entered blocking state [ 2418.502756][T21198] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2418.511604][T21198] bridge0: port 1(bridge_slave_0) entered blocking state [ 2418.519937][T21198] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2418.536760][ T293] bridge_slave_1: left allmulticast mode [ 2418.543267][ T293] bridge_slave_1: left promiscuous mode [ 2418.564162][ T293] bridge0: port 2(bridge_slave_1) entered disabled state [ 2418.582760][ T293] bridge_slave_0: left allmulticast mode [ 2418.590834][ T293] bridge_slave_0: left promiscuous mode [ 2418.603341][ T293] bridge0: port 1(bridge_slave_0) entered disabled state [ 2418.751511][T15650] bridge0: port 1(bridge_slave_0) entered disabled state [ 2418.770099][T15650] bridge0: port 2(bridge_slave_1) entered disabled state [ 2418.796279][ T293] veth1_macvtap: left promiscuous mode [ 2418.819451][ T293] veth0_vlan: left promiscuous mode [ 2418.954562][T22780] bridge0: port 1(bridge_slave_0) entered blocking state [ 2418.962845][T22780] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2418.981026][T22780] bridge0: port 2(bridge_slave_1) entered blocking state [ 2418.989300][T22780] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2419.036053][T21198] veth0_vlan: entered promiscuous mode [ 2419.054966][T21198] veth1_macvtap: entered promiscuous mode [ 2420.922581][T21333] netlink: 'syz.7.70842': attribute type 4 has an invalid length. [ 2422.158536][T21420] netlink: 'syz.1.70886': attribute type 4 has an invalid length. [ 2423.812600][T21514] bridge0: port 1(bridge_slave_0) entered blocking state [ 2423.832113][T21514] bridge0: port 1(bridge_slave_0) entered disabled state [ 2423.840328][T21514] bridge_slave_0: entered allmulticast mode [ 2423.849545][T21514] bridge_slave_0: entered promiscuous mode [ 2423.858480][T21514] bridge0: port 2(bridge_slave_1) entered blocking state [ 2423.869485][T21514] bridge0: port 2(bridge_slave_1) entered disabled state [ 2423.878506][T21514] bridge_slave_1: entered allmulticast mode [ 2423.886464][T21514] bridge_slave_1: entered promiscuous mode [ 2424.038253][ T293] bridge_slave_1: left allmulticast mode [ 2424.045735][ T293] bridge_slave_1: left promiscuous mode [ 2424.051585][ T293] bridge0: port 2(bridge_slave_1) entered disabled state [ 2424.070671][ T293] bridge_slave_0: left allmulticast mode [ 2424.090722][ T293] bridge_slave_0: left promiscuous mode [ 2424.101958][ T293] bridge0: port 1(bridge_slave_0) entered disabled state [ 2424.200064][T21514] bridge0: port 2(bridge_slave_1) entered blocking state [ 2424.207919][T21514] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2424.216127][T21514] bridge0: port 1(bridge_slave_0) entered blocking state [ 2424.224120][T21514] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2424.298072][ T293] veth1_macvtap: left promiscuous mode [ 2424.307174][ T293] veth0_vlan: left promiscuous mode [ 2424.433499][T22780] bridge0: port 1(bridge_slave_0) entered disabled state [ 2424.460571][T22780] bridge0: port 2(bridge_slave_1) entered disabled state [ 2424.477904][T11651] bridge0: port 1(bridge_slave_0) entered blocking state [ 2424.486007][T11651] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2424.510657][T22780] bridge0: port 2(bridge_slave_1) entered blocking state [ 2424.518150][T22780] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2424.584327][T21561] netlink: 'syz.2.70950': attribute type 4 has an invalid length. [ 2424.603400][T21514] veth0_vlan: entered promiscuous mode [ 2424.636896][T21514] veth1_macvtap: entered promiscuous mode [ 2424.913680][T21583] netlink: 'syz.2.70960': attribute type 4 has an invalid length. [ 2429.033554][T21806] netlink: 'syz.6.71064': attribute type 4 has an invalid length. [ 2430.547030][T21873] netlink: 'syz.1.71104': attribute type 4 has an invalid length. [ 2431.183073][T21923] netlink: 156 bytes leftover after parsing attributes in process `syz.6.71129'. [ 2434.472313][T22049] netlink: 156 bytes leftover after parsing attributes in process `syz.7.71191'. [ 2438.292285][T22265] netlink: 156 bytes leftover after parsing attributes in process `syz.6.71297'. [ 2443.036996][T22476] netlink: 136 bytes leftover after parsing attributes in process `syz.6.71400'. [ 2447.070614][T22649] netlink: 156 bytes leftover after parsing attributes in process `syz.2.71484'. [ 2448.240507][ T2941] usb 8-1: new high-speed USB device number 98 using dummy_hcd [ 2448.370497][ T2941] usb 8-1: device descriptor read/64, error -71 [ 2448.610482][ T2941] usb 8-1: device descriptor read/64, error -71 [ 2448.880509][ T2941] usb 8-1: new high-speed USB device number 99 using dummy_hcd [ 2449.020465][ T2941] usb 8-1: device descriptor read/64, error -71 [ 2449.260446][ T2941] usb 8-1: device descriptor read/64, error -71 [ 2449.370549][ T2941] usb usb8-port1: attempt power cycle [ 2449.720417][ T2941] usb 8-1: new high-speed USB device number 100 using dummy_hcd [ 2449.761376][ T2941] usb 8-1: device descriptor read/8, error -71 [ 2449.891405][ T2941] usb 8-1: device descriptor read/8, error -71 [ 2450.130447][ T2941] usb 8-1: new high-speed USB device number 101 using dummy_hcd [ 2450.170771][ T2941] usb 8-1: device descriptor read/8, error -71 [ 2450.350741][ T2941] usb 8-1: device descriptor read/8, error -71 [ 2450.460462][ T2941] usb usb8-port1: unable to enumerate USB device [ 2451.500323][ T9461] usb 2-1: new high-speed USB device number 104 using dummy_hcd [ 2451.658797][ T9461] usb 2-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 2451.669108][ T9461] usb 2-1: config 0 has 0 interfaces, different from the descriptor's value: 1 [ 2451.694047][ T9461] usb 2-1: New USB device found, idVendor=256c, idProduct=006d, bcdDevice= 0.00 [ 2451.703325][ T9461] usb 2-1: New USB device strings: Mfr=2, Product=0, SerialNumber=0 [ 2451.711369][ T9461] usb 2-1: Manufacturer: syz [ 2451.718513][ T9461] usb 2-1: config 0 descriptor?? [ 2451.740747][T22874] netlink: 156 bytes leftover after parsing attributes in process `syz.6.71590'. [ 2452.151626][T22894] netlink: 156 bytes leftover after parsing attributes in process `syz.6.71600'. [ 2452.401597][T22919] netlink: 156 bytes leftover after parsing attributes in process `syz.6.71612'. [ 2454.263556][ T9461] usb 2-1: USB disconnect, device number 104 [ 2458.172076][T23232] netlink: 156 bytes leftover after parsing attributes in process `syz.2.71761'. [ 2458.880340][T23249] netlink: 156 bytes leftover after parsing attributes in process `syz.2.71770'. [ 2460.220896][ T36] audit: type=1400 audit(1763284415.921:602): avc: denied { read } for pid=23319 comm="poweroff" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2460.532175][ T36] audit: type=1400 audit(1763284416.231:603): avc: denied { execute } for pid=23328 comm="syz.2.71806" path="/233/blkio.bfq.group_wait_time" dev="tmpfs" ino=1451 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 Stopping sshd: stopped /usr/sbin/sshd (pid 201) OK Stopping crond: stopped /usr/sbin/crond (pid 194) OK Stopping dhcpcd... stopped /sbin/dhcpcd (pid 148) [ 2461.089226][ T36] audit: type=1400 audit(1763284416.781:604): avc: denied { search } for pid=23372 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 Stopping network: [ 2461.231374][ T36] audit: type=1400 audit(1763284416.931:605): avc: denied { read write } for pid=23381 comm="ip" path="/dev/console" dev="rootfs" ino=47 scontext=system_u:system_r:ifconfig_t tcontext=system_u:object_r:root_t tclass=chr_file permissive=1 [ 2461.364175][ T36] audit: type=1400 audit(1763284417.051:606): avc: denied { write } for pid=149 comm="dhcpcd" name="dhcpcd" dev="tmpfs" ino=421 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 OK [ 2461.440762][ T36] audit: type=1400 audit(1763284417.051:607): avc: denied { remove_name } for pid=149 comm="dhcpcd" name="sock" dev="tmpfs" ino=423 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2461.499741][ T36] audit: type=1400 audit(1763284417.051:608): avc: denied { unlink } for pid=149 comm="dhcpcd" name="sock" dev="tmpfs" ino=423 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=sock_file permissive=1 Stopping iptables: [ 2461.576219][ T36] audit: type=1400 audit(1763284417.091:609): avc: denied { unlink } for pid=149 comm="dhcpcd" name="pid" dev="tmpfs" ino=422 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 OK Stopping system message bus: [ 2461.642013][ T36] audit: type=1400 audit(1763284417.281:610): avc: denied { read write } for pid=23398 comm="iptables" path="/dev/console" dev="rootfs" ino=47 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:root_t tclass=chr_file permissive=1 [ 2461.709726][ T36] audit: type=1400 audit(1763284417.281:611): avc: denied { search } for pid=23398 comm="iptables" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 done Stopping klogd: OK Stopping acpid: OK Stopping syslogd: stopped /sbin/syslogd (pid 92) OK umount: can't remount debugfs read-only umount: sysfs busy - remounted read-only umount: devtmpfs busy - remounted read-only umount: can't remount /dev/root read-only The system is going down NOW! Sent SIGTERM to all processes Connection to 10.128.0.171 closed by remote host. [ 2464.280609][T22780] bridge_slave_1: left allmulticast mode [ 2464.286293][T22780] bridge_slave_1: left promiscuous mode [ 2464.292010][T22780] bridge0: port 2(bridge_slave_1) entered disabled state [ 2464.311426][T22780] bridge_slave_0: left allmulticast mode [ 2464.317107][T22780] bridge_slave_0: left promiscuous mode [ 2464.339639][T22780] bridge0: port 1(bridge_slave_0) entered disabled state [ 2464.475469][T22780] veth1_macvtap: left promiscuous mode [ 2464.481063][T22780] veth0_vlan: left promiscuous mode [ 2464.812201][T22780] bridge_slave_1: left allmulticast mode [ 2464.817872][T22780] bridge_slave_1: left promiscuous mode [ 2464.823558][T22780] bridge0: port 2(bridge_slave_1) entered disabled state [ 2464.831062][T22780] bridge_slave_0: left allmulticast mode [ 2464.836685][T22780] bridge_slave_0: left promiscuous mode [ 2464.842484][T22780] bridge0: port 1(bridge_slave_0) entered disabled state [ 2464.850141][T22780] bridge_slave_1: left allmulticast mode [ 2464.855761][T22780] bridge_slave_1: left promiscuous mode [ 2464.861373][T22780] bridge0: port 2(bridge_slave_1) entered disabled state [ 2464.868779][T22780] bridge_slave_0: left allmulticast mode [ 2464.874491][T22780] bridge_slave_0: left promiscuous mode [ 2464.880075][T22780] bridge0: port 1(bridge_slave_0) entered disabled state [ 2464.887621][T22780] bridge_slave_1: left allmulticast mode [ 2464.893382][T22780] bridge_slave_1: left promiscuous mode [ 2464.898944][T22780] bridge0: port 2(bridge_slave_1) entered disabled state [ 2464.906496][T22780] bridge_slave_0: left allmulticast mode [ 2464.912180][T22780] bridge_slave_0: left promiscuous mode [ 2464.917800][T22780] bridge0: port 1(bridge_slave_0) entered disabled state Sent SIGKILL to all processes Requesting system poweroff [ 2465.203784][T22780] veth1_macvtap: left promiscuous mode [ 2465.209315][T22780] veth0_vlan: left promiscuous mode [ 2465.214890][T22780] veth1_macvtap: left promiscuous mode [ 2465.220474][T22780] veth0_vlan: left promiscuous mode [ 2465.225982][T22780] veth1_macvtap: left promiscuous mode [ 2465.231497][T22780] veth0_vlan: left promiscuous mode [ 2466.148613][T23490] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 2466.156135][T23490] ACPI: PM: Preparing to enter system sleep state S5 [ 2466.163130][T23490] kvm: exiting hardware virtualization [ 2466.168666][T23490] reboot: Power down serialport: VM disconnected.