last executing test programs: 6m16.87019173s ago: executing program 3 (id=3007): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r3, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x4]}}, 0x0, 0x0, 0x0) 6m16.653085982s ago: executing program 3 (id=3015): rt_sigaction(0xd, 0x0, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r3, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, 0x0) 6m16.603932107s ago: executing program 3 (id=3018): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x1]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) unshare(0x44040200) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e21, 0x3, @ipv4={'\x00', '\xff\xff', @loopback}, 0x4}, 0x1c) 6m16.498231907s ago: executing program 3 (id=3021): madvise(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x12) rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x1]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x6e) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000340), 0x0, &(0x7f0000000140)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@upperdir={'upperdir', 0x3d, './file1'}}]}) chdir(&(0x7f0000000140)='./bus\x00') mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x21c0, 0x103) newfstatat(0xffffffffffffff9c, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) chown(&(0x7f00000003c0)='./file0\x00', r1, 0xee01) lsetxattr$system_posix_acl(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='system.posix_acl_access\x00', &(0x7f0000000040)={{}, {}, [], {}, [], {0x10, 0x2}}, 0x24, 0x0) creat(&(0x7f0000000ac0)='./file0\x00', 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r2, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r2, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r2, 0xc008ae67, &(0x7f0000000040)={0x1, 0x8}) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(r2, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) syz_clone(0x80020000, 0x0, 0x0, 0x0, 0x0, 0x0) 6m16.497131837s ago: executing program 3 (id=3023): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00), 0x0, 0x0) write(r0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r3, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, 0x0) 6m16.106391966s ago: executing program 3 (id=3025): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',rootmode=0000000000000']) syz_usb_connect(0x0, 0x5e, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000c291492099042a102d850102030109024c0001000010000904100002e51de5000b2402010302057ff49bfd052406000105240002000d240f010500000009000700080624037f000109050602ff0300000009058202"], 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f00000035c0)='cpuset.mems\x00', 0x2, 0x0) sendfile(r3, r3, &(0x7f0000000040)=0x1, 0x100000000000001) 6m15.955490421s ago: executing program 32 (id=3025): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',rootmode=0000000000000']) syz_usb_connect(0x0, 0x5e, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000c291492099042a102d850102030109024c0001000010000904100002e51de5000b2402010302057ff49bfd052406000105240002000d240f010500000009000700080624037f000109050602ff0300000009058202"], 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f00000035c0)='cpuset.mems\x00', 0x2, 0x0) sendfile(r3, r3, &(0x7f0000000040)=0x1, 0x100000000000001) 1.517498809s ago: executing program 0 (id=13876): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r0, @ANYRES64], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r0, 0x0) ioctl$KVM_X86_SETUP_MCE(r0, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r1, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x82042, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x1) ioctl$KVM_SET_MSRS(r4, 0x4008ae89, 0x0) 1.282566812s ago: executing program 4 (id=13882): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r3 = userfaultfd(0x801) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000000280)={0xaa, 0x28}) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000ffc000/0x1000)=nil, 0x1000}, 0x3}) 1.270325583s ago: executing program 4 (id=13883): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000340)=ANY=[], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r1, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x82042, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x1) ioctl$KVM_SET_MSRS(r4, 0x4008ae89, &(0x7f0000000080)=ANY=[@ANYBLOB="010000000000000071000040000000000480", @ANYRES8=r2]) 1.155797324s ago: executing program 0 (id=13888): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x82042, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x1) ioctl$KVM_SET_MSRS(r5, 0x4008ae89, &(0x7f0000000080)=ANY=[@ANYBLOB="010000000000000071000040000000000480", @ANYRES8=r3]) 1.093357551s ago: executing program 4 (id=13889): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x82042, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x1) ioctl$KVM_SET_MSRS(r5, 0x4008ae89, &(0x7f0000000080)=ANY=[@ANYRES8=r3]) 1.092151301s ago: executing program 1 (id=13890): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r3 = userfaultfd(0x801) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000000280)={0xaa, 0x28}) ioctl$UFFDIO_WRITEPROTECT(r3, 0xc018aa06, 0x0) 1.091381091s ago: executing program 2 (id=13891): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r3 = userfaultfd(0x801) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000000280)={0xaa, 0x28}) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000ffc000/0x1000)=nil, 0x1000}, 0x3}) 1.069998613s ago: executing program 2 (id=13892): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r3 = userfaultfd(0x801) ioctl$UFFDIO_API(r3, 0xc018aa3f, 0x0) 1.055977454s ago: executing program 4 (id=13893): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r0, @ANYRES64], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r0, 0x0) ioctl$KVM_X86_SETUP_MCE(r0, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r1, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x82042, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x1) ioctl$KVM_SET_MSRS(r4, 0x4008ae89, &(0x7f0000000080)=ANY=[@ANYBLOB="010000000000000071000040000000000480"]) 989.949371ms ago: executing program 2 (id=13894): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x82042, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x1) 939.864546ms ago: executing program 0 (id=13895): rt_sigaction(0xd, &(0x7f0000000180)={0x0, 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r3 = userfaultfd(0x801) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000000280)={0xaa, 0x28}) ioctl$UFFDIO_WRITEPROTECT(r3, 0xc018aa06, 0x0) 901.07761ms ago: executing program 2 (id=13896): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r0, @ANYRES64], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r0, 0x0) ioctl$KVM_X86_SETUP_MCE(r0, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r1, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x82042, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x1) ioctl$KVM_SET_MSRS(r4, 0x4008ae89, 0x0) 840.955226ms ago: executing program 0 (id=13897): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, 0x0, 0x0, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x82042, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x1) ioctl$KVM_SET_MSRS(r5, 0x4008ae89, &(0x7f0000000080)=ANY=[@ANYBLOB="010000000000000071000040000000000480", @ANYRES8=r3]) 793.588401ms ago: executing program 0 (id=13898): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r0, @ANYRES64], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r0, 0x0) ioctl$KVM_X86_SETUP_MCE(r0, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r1, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r2 = userfaultfd(0x801) ioctl$UFFDIO_API(r2, 0xc018aa3f, 0x0) 590.479701ms ago: executing program 1 (id=13899): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x82042, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x1) ioctl$KVM_SET_MSRS(r5, 0x4008ae89, &(0x7f0000000080)=ANY=[@ANYBLOB="010000000000000071000040000000000480", @ANYRES8=r3]) 402.07258ms ago: executing program 4 (id=13900): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x82042, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x1) ioctl$KVM_SET_MSRS(r5, 0x4008ae89, &(0x7f0000000080)=ANY=[]) 251.111485ms ago: executing program 2 (id=13901): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) syz_io_uring_setup(0x5b0f, &(0x7f0000000000)={0x0, 0xfffffffc, 0x1000, 0x0, 0x359}, &(0x7f00000002c0), &(0x7f0000ff4000)) 200.54995ms ago: executing program 1 (id=13902): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x82042, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x1) ioctl$KVM_SET_MSRS(r5, 0x4008ae89, &(0x7f0000000080)=ANY=[@ANYRES8=r3]) 64.057993ms ago: executing program 1 (id=13903): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, 0x0, 0x0, 0x20080058) 63.547843ms ago: executing program 0 (id=13904): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x82042, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x1) ioctl$KVM_SET_MSRS(r5, 0x4008ae89, &(0x7f0000000080)=ANY=[@ANYBLOB="010000000000000071000040000000000480", @ANYRES8=r3]) 63.144823ms ago: executing program 1 (id=13905): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00), 0x0, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) syz_io_uring_setup(0x5b0f, &(0x7f0000000000)={0x0, 0xfffffffc, 0x1000, 0x0, 0x359}, &(0x7f00000002c0), &(0x7f0000ff4000)) 62.740084ms ago: executing program 4 (id=13906): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, 0x0) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x82042, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r4, 0x0) 35.351976ms ago: executing program 1 (id=13907): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) mmap(&(0x7f0000ff4000/0xc000)=nil, 0xc000, 0x1000003, 0x20031, 0xffffffffffffffff, 0xffffe000) syz_io_uring_setup(0x5b0f, &(0x7f0000000000)={0x0, 0xfffffffc, 0x1000, 0x0, 0x359}, &(0x7f00000002c0), &(0x7f0000ff4000)) 0s ago: executing program 2 (id=13908): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, 0x0, 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r3 = userfaultfd(0x801) ioctl$UFFDIO_API(r3, 0xc018aa3f, 0x0) kernel console output (not intermixed with test programs): ? security_socket_sendmsg+0x33/0xd0 [ 140.030828][ T7093] ? __cfi_netlink_sendmsg+0x10/0x10 [ 140.030852][ T7093] ____sys_sendmsg+0xa15/0xa70 [ 140.030877][ T7093] ? __sys_sendmsg_sock+0x50/0x50 [ 140.030902][ T7093] ? import_iovec+0x81/0xb0 [ 140.030924][ T7093] ___sys_sendmsg+0x220/0x2a0 [ 140.030947][ T7093] ? __sys_sendmsg+0x280/0x280 [ 140.030970][ T7093] ? proc_fail_nth_write+0x17e/0x210 [ 140.030991][ T7093] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 140.031017][ T7093] __x64_sys_sendmsg+0x1eb/0x2c0 [ 140.031038][ T7093] ? fput+0x1a5/0x240 [ 140.031057][ T7093] ? __cfi___x64_sys_sendmsg+0x10/0x10 [ 140.031080][ T7093] ? ksys_write+0x1ef/0x250 [ 140.031098][ T7093] ? __kasan_check_read+0x15/0x20 [ 140.031124][ T7093] x64_sys_call+0x2a4c/0x2ee0 [ 140.031149][ T7093] do_syscall_64+0x58/0xf0 [ 140.031170][ T7093] ? clear_bhb_loop+0x50/0xa0 [ 140.031190][ T7093] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 140.031208][ T7093] RIP: 0033:0x7f9257f8f6c9 [ 140.031222][ T7093] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 140.031235][ T7093] RSP: 002b:00007f9258e00038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 140.031253][ T7093] RAX: ffffffffffffffda RBX: 00007f92581e5fa0 RCX: 00007f9257f8f6c9 [ 140.031266][ T7093] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000000000000005 [ 140.031277][ T7093] RBP: 00007f9258e00090 R08: 0000000000000000 R09: 0000000000000000 [ 140.031289][ T7093] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 140.031301][ T7093] R13: 00007f92581e6038 R14: 00007f92581e5fa0 R15: 00007ffed6f9b4f8 [ 140.031316][ T7093] [ 140.490894][ T7129] tipc: Enabling of bearer rejected, failed to enable media [ 140.625554][ T7139] random: crng reseeded on system resumption [ 140.655931][ T7141] FAULT_INJECTION: forcing a failure. [ 140.655931][ T7141] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 140.709071][ T7141] CPU: 0 UID: 0 PID: 7141 Comm: syz.1.3289 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 140.709103][ T7141] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 140.709112][ T7141] Call Trace: [ 140.709117][ T7141] [ 140.709124][ T7141] __dump_stack+0x21/0x30 [ 140.709147][ T7141] dump_stack_lvl+0x10c/0x190 [ 140.709164][ T7141] ? __cfi_dump_stack_lvl+0x10/0x10 [ 140.709183][ T7141] ? check_stack_object+0x12c/0x140 [ 140.709197][ T7141] dump_stack+0x19/0x20 [ 140.709213][ T7141] should_fail_ex+0x3d9/0x530 [ 140.709228][ T7141] should_fail+0xf/0x20 [ 140.709240][ T7141] should_fail_usercopy+0x1e/0x30 [ 140.709256][ T7141] _copy_to_user+0x24/0xa0 [ 140.709272][ T7141] simple_read_from_buffer+0xed/0x160 [ 140.709292][ T7141] proc_fail_nth_read+0x19e/0x210 [ 140.709312][ T7141] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 140.709330][ T7141] ? bpf_lsm_file_permission+0xd/0x20 [ 140.709349][ T7141] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 140.709366][ T7141] vfs_read+0x27d/0xc70 [ 140.709379][ T7141] ? __cfi_vfs_read+0x10/0x10 [ 140.709390][ T7141] ? __kasan_check_write+0x18/0x20 [ 140.709410][ T7141] ? mutex_lock+0x92/0x1c0 [ 140.709423][ T7141] ? __cfi_mutex_lock+0x10/0x10 [ 140.709435][ T7141] ? __fget_files+0x2c5/0x340 [ 140.709450][ T7141] ksys_read+0x141/0x250 [ 140.709462][ T7141] ? xfd_validate_state+0x68/0x150 [ 140.709480][ T7141] ? __cfi_ksys_read+0x10/0x10 [ 140.709497][ T7141] ? __kasan_check_write+0x18/0x20 [ 140.709517][ T7141] ? fpregs_restore_userregs+0x11d/0x260 [ 140.709532][ T7141] __x64_sys_read+0x7f/0x90 [ 140.709545][ T7141] x64_sys_call+0x2638/0x2ee0 [ 140.709564][ T7141] do_syscall_64+0x58/0xf0 [ 140.709581][ T7141] ? clear_bhb_loop+0x50/0xa0 [ 140.709597][ T7141] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 140.709612][ T7141] RIP: 0033:0x7fc980b8e0dc [ 140.709623][ T7141] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 140.709635][ T7141] RSP: 002b:00007fc97f5e3030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 140.709652][ T7141] RAX: ffffffffffffffda RBX: 00007fc980de5fa0 RCX: 00007fc980b8e0dc [ 140.709663][ T7141] RDX: 000000000000000f RSI: 00007fc97f5e30a0 RDI: 0000000000000005 [ 140.709672][ T7141] RBP: 00007fc97f5e3090 R08: 0000000000000000 R09: 0000000000000000 [ 140.709682][ T7141] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 140.709690][ T7141] R13: 00007fc980de6038 R14: 00007fc980de5fa0 R15: 00007ffed4349c28 [ 140.709702][ T7141] [ 140.785494][ T7144] netlink: 32 bytes leftover after parsing attributes in process `syz.2.3288'. [ 141.361272][ T7170] FAULT_INJECTION: forcing a failure. [ 141.361272][ T7170] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 141.389139][ T7170] CPU: 0 UID: 0 PID: 7170 Comm: syz.2.3302 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 141.389170][ T7170] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 141.389181][ T7170] Call Trace: [ 141.389187][ T7170] [ 141.389194][ T7170] __dump_stack+0x21/0x30 [ 141.389221][ T7170] dump_stack_lvl+0x10c/0x190 [ 141.389243][ T7170] ? __cfi_dump_stack_lvl+0x10/0x10 [ 141.389266][ T7170] ? check_stack_object+0x107/0x140 [ 141.389284][ T7170] dump_stack+0x19/0x20 [ 141.389305][ T7170] should_fail_ex+0x3d9/0x530 [ 141.389323][ T7170] should_fail+0xf/0x20 [ 141.389340][ T7170] should_fail_usercopy+0x1e/0x30 [ 141.389358][ T7170] _copy_from_user+0x22/0xb0 [ 141.389380][ T7170] sk_setsockopt+0x243/0x2970 [ 141.389404][ T7170] ? __cfi_sk_setsockopt+0x10/0x10 [ 141.389433][ T7170] ? selinux_socket_setsockopt+0x2ea/0x390 [ 141.389462][ T7170] ? __cfi_vfs_write+0x10/0x10 [ 141.389479][ T7170] ? __kasan_check_write+0x18/0x20 [ 141.389505][ T7170] sock_setsockopt+0x5e/0x70 [ 141.389528][ T7170] do_sock_setsockopt+0x202/0x400 [ 141.389552][ T7170] ? __cfi_do_sock_setsockopt+0x10/0x10 [ 141.389578][ T7170] __x64_sys_setsockopt+0x1b8/0x250 [ 141.389601][ T7170] x64_sys_call+0x2adc/0x2ee0 [ 141.389624][ T7170] do_syscall_64+0x58/0xf0 [ 141.389644][ T7170] ? clear_bhb_loop+0x50/0xa0 [ 141.389662][ T7170] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 141.389679][ T7170] RIP: 0033:0x7fc9b658f6c9 [ 141.389695][ T7170] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 141.389709][ T7170] RSP: 002b:00007fc9b73cc038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 141.389728][ T7170] RAX: ffffffffffffffda RBX: 00007fc9b67e5fa0 RCX: 00007fc9b658f6c9 [ 141.389742][ T7170] RDX: 0000000000000019 RSI: 0000000000000001 RDI: 0000000000000005 [ 141.389754][ T7170] RBP: 00007fc9b73cc090 R08: 0000000000000010 R09: 0000000000000000 [ 141.389765][ T7170] R10: 0000200000000100 R11: 0000000000000246 R12: 0000000000000001 [ 141.389777][ T7170] R13: 00007fc9b67e6038 R14: 00007fc9b67e5fa0 R15: 00007ffcb0a5b478 [ 141.389792][ T7170] [ 141.750294][ T7189] netlink: 4 bytes leftover after parsing attributes in process `syz.1.3310'. [ 141.771088][ T7189] bridge_slave_1: left allmulticast mode [ 141.776773][ T7189] bridge_slave_1: left promiscuous mode [ 141.809255][ T7189] bridge0: port 2(bridge_slave_1) entered disabled state [ 141.827291][ T7189] bridge_slave_0: left allmulticast mode [ 141.833046][ T7189] bridge_slave_0: left promiscuous mode [ 141.859009][ T7189] bridge0: port 1(bridge_slave_0) entered disabled state [ 142.534515][ T36] kauditd_printk_skb: 4 callbacks suppressed [ 142.534532][ T36] audit: type=1400 audit(1763034764.150:306): avc: denied { read write } for pid=7225 comm="syz.1.3329" name="ppp" dev="devtmpfs" ino=86 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 142.578071][ T36] audit: type=1400 audit(1763034764.180:307): avc: denied { open } for pid=7225 comm="syz.1.3329" path="/dev/ppp" dev="devtmpfs" ino=86 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 142.590768][ T7234] FAULT_INJECTION: forcing a failure. [ 142.590768][ T7234] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 142.611249][ T36] audit: type=1400 audit(1763034764.180:308): avc: denied { ioctl } for pid=7225 comm="syz.1.3329" path="/dev/ppp" dev="devtmpfs" ino=86 ioctlcmd=0x7438 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 142.638753][ T7234] CPU: 1 UID: 0 PID: 7234 Comm: syz.4.3333 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 142.638784][ T7234] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 142.638795][ T7234] Call Trace: [ 142.638800][ T7234] [ 142.638806][ T7234] __dump_stack+0x21/0x30 [ 142.638834][ T7234] dump_stack_lvl+0x10c/0x190 [ 142.638854][ T7234] ? __cfi_dump_stack_lvl+0x10/0x10 [ 142.638875][ T7234] ? check_stack_object+0x12c/0x140 [ 142.638892][ T7234] dump_stack+0x19/0x20 [ 142.638910][ T7234] should_fail_ex+0x3d9/0x530 [ 142.638927][ T7234] should_fail+0xf/0x20 [ 142.638941][ T7234] should_fail_usercopy+0x1e/0x30 [ 142.638958][ T7234] _copy_to_user+0x24/0xa0 [ 142.638978][ T7234] simple_read_from_buffer+0xed/0x160 [ 142.638999][ T7234] proc_fail_nth_read+0x19e/0x210 [ 142.639019][ T7234] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 142.639044][ T7234] ? notify_change+0xbfc/0xee0 [ 142.639081][ T7234] ? bpf_lsm_file_permission+0xd/0x20 [ 142.639106][ T7234] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 142.639128][ T7234] vfs_read+0x27d/0xc70 [ 142.639144][ T7234] ? __kasan_check_write+0x18/0x20 [ 142.639171][ T7234] ? __cfi_vfs_read+0x10/0x10 [ 142.639186][ T7234] ? __kasan_check_write+0x18/0x20 [ 142.639211][ T7234] ? mutex_lock+0x92/0x1c0 [ 142.639228][ T7234] ? __cfi_mutex_lock+0x10/0x10 [ 142.639244][ T7234] ? __fget_files+0x2c5/0x340 [ 142.639264][ T7234] ksys_read+0x141/0x250 [ 142.639281][ T7234] ? __cfi_ksys_read+0x10/0x10 [ 142.639299][ T7234] ? __kasan_check_read+0x15/0x20 [ 142.639323][ T7234] __x64_sys_read+0x7f/0x90 [ 142.639394][ T7234] x64_sys_call+0x2638/0x2ee0 [ 142.639417][ T7234] do_syscall_64+0x58/0xf0 [ 142.639440][ T7234] ? clear_bhb_loop+0x50/0xa0 [ 142.639461][ T7234] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 142.639481][ T7234] RIP: 0033:0x7f660358e0dc [ 142.639498][ T7234] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 142.639514][ T7234] RSP: 002b:00007f6604454030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 142.639535][ T7234] RAX: ffffffffffffffda RBX: 00007f66037e5fa0 RCX: 00007f660358e0dc [ 142.639550][ T7234] RDX: 000000000000000f RSI: 00007f66044540a0 RDI: 0000000000000007 [ 142.639562][ T7234] RBP: 00007f6604454090 R08: 0000000000000000 R09: 0000000000000000 [ 142.639574][ T7234] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 142.639586][ T7234] R13: 00007f66037e6038 R14: 00007f66037e5fa0 R15: 00007ffe89a4bb88 [ 142.639601][ T7234] [ 142.832749][ T7236] ref_tracker: memory allocation failure, unreliable refcount tracker. [ 143.342358][ T7264] netlink: 12 bytes leftover after parsing attributes in process `syz.1.3347'. [ 144.124186][ T7312] FAULT_INJECTION: forcing a failure. [ 144.124186][ T7312] name failslab, interval 1, probability 0, space 0, times 0 [ 144.138534][ T7314] FAULT_INJECTION: forcing a failure. [ 144.138534][ T7314] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 144.152129][ T7314] CPU: 1 UID: 0 PID: 7314 Comm: syz.1.3363 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 144.152160][ T7314] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 144.152172][ T7314] Call Trace: [ 144.152178][ T7314] [ 144.152185][ T7314] __dump_stack+0x21/0x30 [ 144.152214][ T7314] dump_stack_lvl+0x10c/0x190 [ 144.152236][ T7314] ? __cfi_dump_stack_lvl+0x10/0x10 [ 144.152260][ T7314] ? __kasan_check_write+0x18/0x20 [ 144.152286][ T7314] ? kvm_arch_vcpu_load+0x650/0x8c0 [ 144.152312][ T7314] dump_stack+0x19/0x20 [ 144.152334][ T7314] should_fail_ex+0x3d9/0x530 [ 144.152352][ T7314] should_fail+0xf/0x20 [ 144.152370][ T7314] should_fail_usercopy+0x1e/0x30 [ 144.152388][ T7314] _copy_from_user+0x22/0xb0 [ 144.152410][ T7314] kvm_arch_vcpu_ioctl+0xa2e/0x2e50 [ 144.152428][ T7314] ? avc_has_perm+0x144/0x220 [ 144.152456][ T7314] ? __cfi_kvm_arch_vcpu_ioctl+0x10/0x10 [ 144.152473][ T7314] ? kasan_save_alloc_info+0x40/0x50 [ 144.152497][ T7314] ? selinux_file_open+0x457/0x610 [ 144.152519][ T7314] ? __cfi_selinux_file_open+0x10/0x10 [ 144.152542][ T7314] ? is_bpf_text_address+0x17b/0x1a0 [ 144.152563][ T7314] ? kernel_text_address+0xa9/0xe0 [ 144.152585][ T7314] ? __kernel_text_address+0x11/0x40 [ 144.152607][ T7314] ? do_vfs_ioctl+0xeda/0x1e30 [ 144.152626][ T7314] ? arch_stack_walk+0x10b/0x170 [ 144.152643][ T7314] ? __ia32_compat_sys_ioctl+0x850/0x850 [ 144.152663][ T7314] ? _parse_integer_limit+0x195/0x1e0 [ 144.152688][ T7314] ? _parse_integer+0x2e/0x40 [ 144.152713][ T7314] ? kstrtoull+0x13b/0x1e0 [ 144.152729][ T7314] ? kstrtouint+0x78/0xf0 [ 144.152745][ T7314] ? ioctl_has_perm+0x1aa/0x4d0 [ 144.152765][ T7314] ? __asan_memcpy+0x5a/0x80 [ 144.152781][ T7314] ? ioctl_has_perm+0x3e0/0x4d0 [ 144.152802][ T7314] ? has_cap_mac_admin+0xd0/0xd0 [ 144.152822][ T7314] ? __kasan_check_write+0x18/0x20 [ 144.152847][ T7314] ? mutex_lock_killable+0x92/0x1c0 [ 144.152865][ T7314] ? __cfi_mutex_lock_killable+0x10/0x10 [ 144.152882][ T7314] ? proc_fail_nth_write+0x17e/0x210 [ 144.152905][ T7314] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 144.152928][ T7314] kvm_vcpu_ioctl+0x77c/0xee0 [ 144.152945][ T7314] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 144.152961][ T7314] ? __cfi_vfs_write+0x10/0x10 [ 144.152977][ T7314] ? __kasan_check_write+0x18/0x20 [ 144.153010][ T7314] ? mutex_unlock+0x8b/0x240 [ 144.153026][ T7314] ? __cfi_mutex_unlock+0x10/0x10 [ 144.153042][ T7314] ? __fget_files+0x2c5/0x340 [ 144.153061][ T7314] ? __fget_files+0x2c5/0x340 [ 144.153080][ T7314] ? bpf_lsm_file_ioctl+0xd/0x20 [ 144.153104][ T7314] ? security_file_ioctl+0x34/0xd0 [ 144.153123][ T7314] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 144.153139][ T7314] __se_sys_ioctl+0x135/0x1b0 [ 144.153158][ T7314] __x64_sys_ioctl+0x7f/0xa0 [ 144.153177][ T7314] x64_sys_call+0x1878/0x2ee0 [ 144.153201][ T7314] do_syscall_64+0x58/0xf0 [ 144.153222][ T7314] ? clear_bhb_loop+0x50/0xa0 [ 144.153241][ T7314] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 144.153259][ T7314] RIP: 0033:0x7fc980b8f6c9 [ 144.153275][ T7314] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 144.153290][ T7314] RSP: 002b:00007fc97f5e3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 144.153310][ T7314] RAX: ffffffffffffffda RBX: 00007fc980de5fa0 RCX: 00007fc980b8f6c9 [ 144.153324][ T7314] RDX: 0000200000000000 RSI: 000000004008ae8a RDI: 0000000000000007 [ 144.153337][ T7314] RBP: 00007fc97f5e3090 R08: 0000000000000000 R09: 0000000000000000 [ 144.153348][ T7314] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 144.153360][ T7314] R13: 00007fc980de6038 R14: 00007fc980de5fa0 R15: 00007ffed4349c28 [ 144.153375][ T7314] [ 144.319188][ T7312] CPU: 0 UID: 0 PID: 7312 Comm: syz.0.3372 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 144.319225][ T7312] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 144.319236][ T7312] Call Trace: [ 144.319242][ T7312] [ 144.319250][ T7312] __dump_stack+0x21/0x30 [ 144.319276][ T7312] dump_stack_lvl+0x10c/0x190 [ 144.319298][ T7312] ? __cfi_dump_stack_lvl+0x10/0x10 [ 144.319321][ T7312] dump_stack+0x19/0x20 [ 144.319341][ T7312] should_fail_ex+0x3d9/0x530 [ 144.319360][ T7312] ? ethnl_default_doit+0x20e/0xe20 [ 144.319380][ T7312] should_failslab+0xac/0x100 [ 144.319400][ T7312] __kmalloc_noprof+0x69/0x530 [ 144.319416][ T7312] ? __kasan_kmalloc+0x96/0xb0 [ 144.319435][ T7312] ? ethnl_default_doit+0x20e/0xe20 [ 144.319455][ T7312] ethnl_default_doit+0x20e/0xe20 [ 144.319473][ T7312] ? genl_family_rcv_msg_attrs_parse+0x213/0x390 [ 144.319493][ T7312] genl_family_rcv_msg_doit+0x232/0x330 [ 144.319513][ T7312] ? genl_family_rcv_msg_dumpit+0x2d0/0x2d0 [ 144.319532][ T7312] ? radix_tree_lookup+0x250/0x2a0 [ 144.319555][ T7312] genl_rcv_msg+0x609/0x7a0 [ 144.319576][ T7312] ? __cfi_genl_rcv_msg+0x10/0x10 [ 144.319593][ T7312] ? __cfi_ethnl_default_doit+0x10/0x10 [ 144.319614][ T7312] netlink_rcv_skb+0x22b/0x4a0 [ 144.319636][ T7312] ? __cfi_genl_rcv_msg+0x10/0x10 [ 144.319653][ T7312] ? __cfi_netlink_rcv_skb+0x10/0x10 [ 144.319674][ T7312] ? rwsem_read_trylock+0x2b1/0x660 [ 144.319698][ T7312] ? down_read+0x79/0xe0 [ 144.319715][ T7312] ? __cfi_down_read+0x10/0x10 [ 144.319732][ T7312] ? is_vmalloc_addr+0x11/0x40 [ 144.319751][ T7312] genl_rcv+0x2c/0x40 [ 144.319766][ T7312] netlink_unicast+0x8c0/0xa60 [ 144.319788][ T7312] netlink_sendmsg+0x7f0/0xaf0 [ 144.319813][ T7312] ? __cfi_netlink_sendmsg+0x10/0x10 [ 144.319836][ T7312] ? bpf_lsm_socket_sendmsg+0xd/0x20 [ 144.319856][ T7312] ? security_socket_sendmsg+0x33/0xd0 [ 144.319871][ T7312] ? __cfi_netlink_sendmsg+0x10/0x10 [ 144.319894][ T7312] ____sys_sendmsg+0xa15/0xa70 [ 144.319918][ T7312] ? __sys_sendmsg_sock+0x50/0x50 [ 144.319942][ T7312] ? import_iovec+0x81/0xb0 [ 144.319963][ T7312] ___sys_sendmsg+0x220/0x2a0 [ 144.319986][ T7312] ? __sys_sendmsg+0x280/0x280 [ 144.320009][ T7312] ? proc_fail_nth_write+0x17e/0x210 [ 144.320031][ T7312] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 144.320058][ T7312] __x64_sys_sendmsg+0x1eb/0x2c0 [ 144.320081][ T7312] ? fput+0x1a5/0x240 [ 144.320099][ T7312] ? __cfi___x64_sys_sendmsg+0x10/0x10 [ 144.320123][ T7312] ? ksys_write+0x1ef/0x250 [ 144.320139][ T7312] ? __kasan_check_read+0x15/0x20 [ 144.320163][ T7312] x64_sys_call+0x2a4c/0x2ee0 [ 144.320186][ T7312] do_syscall_64+0x58/0xf0 [ 144.320207][ T7312] ? clear_bhb_loop+0x50/0xa0 [ 144.320230][ T7312] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 144.320248][ T7312] RIP: 0033:0x7f9257f8f6c9 [ 144.320262][ T7312] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 144.320278][ T7312] RSP: 002b:00007f9258e00038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 144.320297][ T7312] RAX: ffffffffffffffda RBX: 00007f92581e5fa0 RCX: 00007f9257f8f6c9 [ 144.320311][ T7312] RDX: 0000000000002000 RSI: 00002000000001c0 RDI: 0000000000000005 [ 144.320323][ T7312] RBP: 00007f9258e00090 R08: 0000000000000000 R09: 0000000000000000 [ 144.320334][ T7312] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 144.320344][ T7312] R13: 00007f92581e6038 R14: 00007f92581e5fa0 R15: 00007ffed6f9b4f8 [ 144.320359][ T7312] [ 144.469725][ T36] audit: type=1400 audit(1763034766.040:309): avc: denied { map } for pid=7324 comm="syz.0.3376" path="/dev/ptmx" dev="devtmpfs" ino=24 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ptmx_t tclass=chr_file permissive=1 [ 144.886398][ T36] audit: type=1400 audit(1763034766.040:310): avc: denied { execute } for pid=7324 comm="syz.0.3376" path="/dev/ptmx" dev="devtmpfs" ino=24 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ptmx_t tclass=chr_file permissive=1 [ 145.179078][ T36] audit: type=1400 audit(1763034766.790:311): avc: denied { listen } for pid=7367 comm="syz.4.3395" path=2F3131302FE91F7189591E9233614B scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 [ 145.180282][ T7370] devpts: called with bogus options [ 145.478000][ T7395] FAULT_INJECTION: forcing a failure. [ 145.478000][ T7395] name failslab, interval 1, probability 0, space 0, times 0 [ 145.529610][ T7395] CPU: 0 UID: 0 PID: 7395 Comm: syz.2.3408 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 145.529642][ T7395] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 145.529653][ T7395] Call Trace: [ 145.529659][ T7395] [ 145.529667][ T7395] __dump_stack+0x21/0x30 [ 145.529694][ T7395] dump_stack_lvl+0x10c/0x190 [ 145.529713][ T7395] ? __cfi_dump_stack_lvl+0x10/0x10 [ 145.529736][ T7395] dump_stack+0x19/0x20 [ 145.529777][ T7395] should_fail_ex+0x3d9/0x530 [ 145.529796][ T7395] should_failslab+0xac/0x100 [ 145.529816][ T7395] __kmalloc_cache_noprof+0x41/0x490 [ 145.529834][ T7395] ? v9fs_mount+0xbd/0xa00 [ 145.529851][ T7395] ? selinux_perf_event_alloc+0x110/0x110 [ 145.529873][ T7395] v9fs_mount+0xbd/0xa00 [ 145.529890][ T7395] ? __cfi_v9fs_mount+0x10/0x10 [ 145.529908][ T7395] ? selinux_capable+0x38/0x50 [ 145.529933][ T7395] legacy_get_tree+0x106/0x1b0 [ 145.529955][ T7395] ? __cfi_v9fs_mount+0x10/0x10 [ 145.529972][ T7395] vfs_get_tree+0x9e/0x290 [ 145.529994][ T7395] do_new_mount+0x251/0xb40 [ 145.530008][ T7395] ? security_capable+0xcf/0xf0 [ 145.530030][ T7395] path_mount+0x688/0x1050 [ 145.530044][ T7395] ? putname+0x113/0x150 [ 145.530062][ T7395] __se_sys_mount+0x2bd/0x480 [ 145.530078][ T7395] ? __x64_sys_mount+0xf0/0xf0 [ 145.530094][ T7395] __x64_sys_mount+0xc3/0xf0 [ 145.530118][ T7395] x64_sys_call+0x2021/0x2ee0 [ 145.530141][ T7395] do_syscall_64+0x58/0xf0 [ 145.530164][ T7395] ? clear_bhb_loop+0x50/0xa0 [ 145.530183][ T7395] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 145.530202][ T7395] RIP: 0033:0x7fc9b658f6c9 [ 145.530216][ T7395] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 145.530230][ T7395] RSP: 002b:00007fc9b73cc038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 145.530250][ T7395] RAX: ffffffffffffffda RBX: 00007fc9b67e5fa0 RCX: 00007fc9b658f6c9 [ 145.530263][ T7395] RDX: 0000200000004500 RSI: 00002000000000c0 RDI: 0000000000000000 [ 145.530274][ T7395] RBP: 00007fc9b73cc090 R08: 0000200000000640 R09: 0000000000000000 [ 145.530286][ T7395] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 145.530297][ T7395] R13: 00007fc9b67e6038 R14: 00007fc9b67e5fa0 R15: 00007ffcb0a5b478 [ 145.530313][ T7395] [ 145.830098][ T7417] rust_binder: Write failure EFAULT in pid:537 [ 145.830185][ T7416] rust_binder: Write failure EFAULT in pid:537 [ 145.882871][ T7423] rust_binder: Transaction failed: BR_FAILED_REPLY { source: EINVAL } my_pid:259 [ 145.914284][ T7433] FAULT_INJECTION: forcing a failure. [ 145.914284][ T7433] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 145.943518][ T7433] CPU: 0 UID: 0 PID: 7433 Comm: syz.0.3423 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 145.943548][ T7433] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 145.943560][ T7433] Call Trace: [ 145.943565][ T7433] [ 145.943573][ T7433] __dump_stack+0x21/0x30 [ 145.943601][ T7433] dump_stack_lvl+0x10c/0x190 [ 145.943622][ T7433] ? __cfi_dump_stack_lvl+0x10/0x10 [ 145.943643][ T7433] ? check_stack_object+0x12c/0x140 [ 145.943660][ T7433] dump_stack+0x19/0x20 [ 145.943681][ T7433] should_fail_ex+0x3d9/0x530 [ 145.943698][ T7433] should_fail+0xf/0x20 [ 145.943713][ T7433] should_fail_usercopy+0x1e/0x30 [ 145.943729][ T7433] _copy_to_user+0x24/0xa0 [ 145.943749][ T7433] simple_read_from_buffer+0xed/0x160 [ 145.943771][ T7433] proc_fail_nth_read+0x19e/0x210 [ 145.943793][ T7433] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 145.943814][ T7433] ? __kasan_slab_alloc+0x73/0x90 [ 145.943832][ T7433] ? bpf_lsm_file_permission+0xd/0x20 [ 145.943852][ T7433] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 145.943873][ T7433] vfs_read+0x27d/0xc70 [ 145.943888][ T7433] ? file_init_path+0x3b/0x5a0 [ 145.943908][ T7433] ? __cfi_vfs_read+0x10/0x10 [ 145.943923][ T7433] ? __kasan_check_write+0x18/0x20 [ 145.943947][ T7433] ? mutex_lock+0x92/0x1c0 [ 145.943962][ T7433] ? __cfi_mutex_lock+0x10/0x10 [ 145.943978][ T7433] ? __fget_files+0x2c5/0x340 [ 145.943998][ T7433] ksys_read+0x141/0x250 [ 145.944014][ T7433] ? __cfi_ksys_read+0x10/0x10 [ 145.944030][ T7433] ? fd_install+0x175/0x2e0 [ 145.944046][ T7433] ? __kasan_check_read+0x15/0x20 [ 145.944079][ T7433] __x64_sys_read+0x7f/0x90 [ 145.944095][ T7433] x64_sys_call+0x2638/0x2ee0 [ 145.944117][ T7433] do_syscall_64+0x58/0xf0 [ 145.944139][ T7433] ? clear_bhb_loop+0x50/0xa0 [ 145.944158][ T7433] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 145.944175][ T7433] RIP: 0033:0x7f9257f8e0dc [ 145.944190][ T7433] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 145.944206][ T7433] RSP: 002b:00007f9258e00030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 145.944226][ T7433] RAX: ffffffffffffffda RBX: 00007f92581e5fa0 RCX: 00007f9257f8e0dc [ 145.944241][ T7433] RDX: 000000000000000f RSI: 00007f9258e000a0 RDI: 0000000000000005 [ 145.944253][ T7433] RBP: 00007f9258e00090 R08: 0000000000000000 R09: 0000000000000000 [ 145.944265][ T7433] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 145.944276][ T7433] R13: 00007f92581e6038 R14: 00007f92581e5fa0 R15: 00007ffed6f9b4f8 [ 145.944292][ T7433] [ 146.329081][ T45] usb 3-1: new high-speed USB device number 5 using dummy_hcd [ 146.345474][ T36] audit: type=1400 audit(1763034767.960:312): avc: denied { bind } for pid=7472 comm="syz.1.3441" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 146.490131][ T45] usb 3-1: too many endpoints for config 0 interface 0 altsetting 0: 193, using maximum allowed: 30 [ 146.501132][ T45] usb 3-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 193 [ 146.524443][ T45] usb 3-1: New USB device found, idVendor=05ac, idProduct=0269, bcdDevice= 0.00 [ 146.560433][ T45] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 146.587702][ T45] usb 3-1: config 0 descriptor?? [ 146.831509][ T7509] overlayfs: option "workdir=./bus" is useless in a non-upper mount, ignore [ 146.859151][ T7509] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent [ 147.004491][ T45] magicmouse 0003:05AC:0269.0001: item fetching failed at offset 5/7 [ 147.020633][ T45] magicmouse 0003:05AC:0269.0001: magicmouse hid parse failed [ 147.028355][ T45] magicmouse 0003:05AC:0269.0001: probe with driver magicmouse failed with error -22 [ 147.207122][ T9] usb 3-1: USB disconnect, device number 5 [ 147.489336][ T36] audit: type=1400 audit(1763034769.110:313): avc: denied { mounton } for pid=7559 comm="syz.4.3481" path="/154/file0" dev="tmpfs" ino=966 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=sock_file permissive=1 [ 147.489849][ T7560] 9p: Unknown access argument 00000000000000000000-}הSOlpoND2: -22 [ 147.839339][ T36] audit: type=1400 audit(1763034769.460:314): avc: denied { bind } for pid=7580 comm="syz.1.3492" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 147.892351][ T36] audit: type=1400 audit(1763034769.510:315): avc: denied { write } for pid=7582 comm="syz.1.3493" name="/" dev="incremental-fs" ino=1798 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 147.939091][ T36] audit: type=1400 audit(1763034769.510:316): avc: denied { add_name } for pid=7582 comm="syz.1.3493" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 147.989332][ T36] audit: type=1400 audit(1763034769.510:317): avc: denied { create } for pid=7582 comm="syz.1.3493" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 148.030293][ T36] audit: type=1400 audit(1763034769.510:318): avc: denied { associate } for pid=7582 comm="syz.1.3493" name="file0" scontext=root:object_r:unlabeled_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 148.077352][ T36] audit: type=1400 audit(1763034769.510:319): avc: denied { read } for pid=7582 comm="syz.1.3493" name="file0" dev="incremental-fs" ino=1837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 148.139076][ T36] audit: type=1400 audit(1763034769.510:320): avc: denied { open } for pid=7582 comm="syz.1.3493" path="/file0/file0" dev="incremental-fs" ino=1837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 148.219082][ T36] audit: type=1400 audit(1763034769.550:321): avc: denied { setattr } for pid=7582 comm="syz.1.3493" name="file0" dev="incremental-fs" ino=1837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 149.970731][ T7654] bridge0: port 3(dummy0) entered blocking state [ 149.980534][ T7654] bridge0: port 3(dummy0) entered disabled state [ 149.992247][ T7654] dummy0: entered allmulticast mode [ 149.997606][ T7654] FAULT_INJECTION: forcing a failure. [ 149.997606][ T7654] name failslab, interval 1, probability 0, space 0, times 0 [ 150.011503][ T7654] CPU: 0 UID: 0 PID: 7654 Comm: syz.4.3514 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 150.011530][ T7654] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 150.011540][ T7654] Call Trace: [ 150.011546][ T7654] [ 150.011553][ T7654] __dump_stack+0x21/0x30 [ 150.011591][ T7654] dump_stack_lvl+0x10c/0x190 [ 150.011615][ T7654] ? __cfi_dump_stack_lvl+0x10/0x10 [ 150.011637][ T7654] ? __kasan_check_write+0x18/0x20 [ 150.011663][ T7654] ? mutex_unlock+0x8b/0x240 [ 150.011680][ T7654] ? __cfi_mutex_unlock+0x10/0x10 [ 150.011697][ T7654] dump_stack+0x19/0x20 [ 150.011718][ T7654] should_fail_ex+0x3d9/0x530 [ 150.011738][ T7654] should_failslab+0xac/0x100 [ 150.011757][ T7654] kmem_cache_alloc_noprof+0x42/0x430 [ 150.011774][ T7654] ? __cfi_selinux_kernfs_init_security+0x10/0x10 [ 150.011795][ T7654] ? __kernfs_new_node+0xe4/0x700 [ 150.011816][ T7654] __kernfs_new_node+0xe4/0x700 [ 150.011834][ T7654] ? __kasan_check_write+0x18/0x20 [ 150.011859][ T7654] ? kernfs_new_node+0x280/0x280 [ 150.011878][ T7654] ? bpf_lsm_kernfs_init_security+0xd/0x20 [ 150.011901][ T7654] ? security_kernfs_init_security+0x2f/0xc0 [ 150.011921][ T7654] ? make_kgid+0x1ba/0x650 [ 150.011946][ T7654] ? __cfi_make_kgid+0x10/0x10 [ 150.011969][ T7654] kernfs_new_node+0x154/0x280 [ 150.011986][ T7654] __kernfs_create_file+0x52/0x280 [ 150.012007][ T7654] sysfs_add_file_mode_ns+0x1d2/0x280 [ 150.012032][ T7654] sysfs_create_file_ns+0x129/0x1a0 [ 150.012054][ T7654] ? kernfs_put+0x314/0x360 [ 150.012071][ T7654] ? __cfi_sysfs_create_file_ns+0x10/0x10 [ 150.012095][ T7654] ? sysfs_do_create_link_sd+0xe9/0x120 [ 150.012113][ T7654] br_sysfs_addif+0xcf/0x250 [ 150.012141][ T7654] br_add_if+0x3b0/0xe90 [ 150.012163][ T7654] ? security_capable+0xcf/0xf0 [ 150.012186][ T7654] br_dev_siocdevprivate+0xdc9/0x13f0 [ 150.012211][ T7654] ? __cfi_br_dev_siocdevprivate+0x10/0x10 [ 150.012237][ T7654] ? ioctl_has_perm+0x384/0x4d0 [ 150.012258][ T7654] ? has_cap_mac_admin+0xd0/0xd0 [ 150.012279][ T7654] ? full_name_hash+0xa1/0xf0 [ 150.012298][ T7654] dev_ifsioc+0xb05/0xe60 [ 150.012321][ T7654] ? dev_ioctl+0x1030/0x1030 [ 150.012340][ T7654] ? dev_get_by_name_rcu+0xe9/0x140 [ 150.012363][ T7654] dev_ioctl+0xa9b/0x1030 [ 150.012385][ T7654] sock_ioctl+0x737/0x7b0 [ 150.012403][ T7654] ? __cfi_sock_ioctl+0x10/0x10 [ 150.012422][ T7654] ? bpf_lsm_file_ioctl+0xd/0x20 [ 150.012445][ T7654] ? security_file_ioctl+0x34/0xd0 [ 150.012464][ T7654] ? __cfi_sock_ioctl+0x10/0x10 [ 150.012481][ T7654] __se_sys_ioctl+0x135/0x1b0 [ 150.012501][ T7654] __x64_sys_ioctl+0x7f/0xa0 [ 150.012520][ T7654] x64_sys_call+0x1878/0x2ee0 [ 150.012544][ T7654] do_syscall_64+0x58/0xf0 [ 150.012566][ T7654] ? clear_bhb_loop+0x50/0xa0 [ 150.012596][ T7654] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 150.012616][ T7654] RIP: 0033:0x7f660358f6c9 [ 150.012631][ T7654] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 150.012646][ T7654] RSP: 002b:00007f6604454038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 150.012666][ T7654] RAX: ffffffffffffffda RBX: 00007f66037e5fa0 RCX: 00007f660358f6c9 [ 150.012679][ T7654] RDX: 0000200000000080 RSI: 00000000000089f0 RDI: 0000000000000006 [ 150.012692][ T7654] RBP: 00007f6604454090 R08: 0000000000000000 R09: 0000000000000000 [ 150.012703][ T7654] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 150.012714][ T7654] R13: 00007f66037e6038 R14: 00007f66037e5fa0 R15: 00007ffe89a4bb88 [ 150.012729][ T7654] [ 150.012777][ T7654] dummy0: left allmulticast mode [ 150.397105][ T36] audit: type=1400 audit(1763034772.010:322): avc: denied { create } for pid=7697 comm="syz.2.3535" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 150.434157][ T36] audit: type=1400 audit(1763034772.040:323): avc: denied { mounton } for pid=7697 comm="syz.2.3535" path="/dev/ptmx" dev="devtmpfs" ino=24 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ptmx_t tclass=chr_file permissive=1 [ 152.057794][ T7901] erofs: dax options not supported [ 152.262768][ T7928] erofs: dax options not supported [ 152.409550][ T7949] erofs: dax options not supported [ 152.518498][ T7969] erofs: dax options not supported [ 152.724186][ T7991] erofs: dax options not supported [ 153.059481][ T8016] FAULT_INJECTION: forcing a failure. [ 153.059481][ T8016] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 153.072620][ T8016] CPU: 1 UID: 0 PID: 8016 Comm: syz.4.3703 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 153.072652][ T8016] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 153.072663][ T8016] Call Trace: [ 153.072669][ T8016] [ 153.072676][ T8016] __dump_stack+0x21/0x30 [ 153.072705][ T8016] dump_stack_lvl+0x10c/0x190 [ 153.072728][ T8016] ? __cfi_dump_stack_lvl+0x10/0x10 [ 153.072751][ T8016] ? unwind_get_return_address+0x51/0x90 [ 153.072772][ T8016] ? __cfi_stack_trace_consume_entry+0x10/0x10 [ 153.072799][ T8016] dump_stack+0x19/0x20 [ 153.072820][ T8016] should_fail_ex+0x3d9/0x530 [ 153.072840][ T8016] should_fail+0xf/0x20 [ 153.072856][ T8016] should_fail_usercopy+0x1e/0x30 [ 153.072874][ T8016] _copy_from_user+0x22/0xb0 [ 153.072895][ T8016] ___sys_recvmsg+0x12f/0x510 [ 153.072913][ T8016] ? __sys_recvmsg+0x280/0x280 [ 153.072929][ T8016] ? __cfi_kstrtouint_from_user+0x10/0x10 [ 153.072947][ T8016] ? selinux_file_permission+0x309/0xb30 [ 153.072971][ T8016] ? __kasan_check_write+0x18/0x20 [ 153.072998][ T8016] ? proc_fail_nth_write+0x17e/0x210 [ 153.073028][ T8016] ? __kasan_check_read+0x15/0x20 [ 153.073052][ T8016] do_recvmmsg+0x326/0x770 [ 153.073068][ T8016] ? __sys_recvmmsg+0x290/0x290 [ 153.073082][ T8016] ? __cfi_vfs_write+0x10/0x10 [ 153.073098][ T8016] ? __kasan_slab_free+0x6a/0x80 [ 153.073119][ T8016] ? putname+0x113/0x150 [ 153.073138][ T8016] __x64_sys_recvmmsg+0x191/0x240 [ 153.073154][ T8016] ? __cfi___x64_sys_recvmmsg+0x10/0x10 [ 153.073171][ T8016] ? __kasan_check_read+0x15/0x20 [ 153.073197][ T8016] x64_sys_call+0x292c/0x2ee0 [ 153.073222][ T8016] do_syscall_64+0x58/0xf0 [ 153.073245][ T8016] ? clear_bhb_loop+0x50/0xa0 [ 153.073265][ T8016] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 153.073283][ T8016] RIP: 0033:0x7f660358f6c9 [ 153.073298][ T8016] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 153.073313][ T8016] RSP: 002b:00007f6604454038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 153.073334][ T8016] RAX: ffffffffffffffda RBX: 00007f66037e5fa0 RCX: 00007f660358f6c9 [ 153.073348][ T8016] RDX: 0000000000000003 RSI: 0000200000000380 RDI: 0000000000000006 [ 153.073360][ T8016] RBP: 00007f6604454090 R08: 0000000000000000 R09: 0000000000000000 [ 153.073372][ T8016] R10: 0000000040012160 R11: 0000000000000246 R12: 0000000000000001 [ 153.073385][ T8016] R13: 00007f66037e6038 R14: 00007f66037e5fa0 R15: 00007ffe89a4bb88 [ 153.073400][ T8016] [ 153.475078][ T8037] netlink: 16 bytes leftover after parsing attributes in process `syz.4.3713'. [ 153.846810][ T8065] netlink: 16 bytes leftover after parsing attributes in process `syz.1.3725'. [ 154.174067][ T8086] netlink: 16 bytes leftover after parsing attributes in process `syz.2.3734'. [ 154.401551][ T8111] 9pnet_fd: Insufficient options for proto=fd [ 154.402719][ T36] audit: type=1400 audit(1763034776.020:324): avc: denied { setattr } for pid=8110 comm="syz.0.3747" name="" dev="pipefs" ino=43249 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 154.659143][ T8127] netlink: 16 bytes leftover after parsing attributes in process `syz.0.3755'. [ 154.841285][ T8142] FAULT_INJECTION: forcing a failure. [ 154.841285][ T8142] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 154.869913][ T8142] CPU: 0 UID: 0 PID: 8142 Comm: syz.0.3762 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 154.869948][ T8142] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 154.869959][ T8142] Call Trace: [ 154.869965][ T8142] [ 154.869972][ T8142] __dump_stack+0x21/0x30 [ 154.870001][ T8142] dump_stack_lvl+0x10c/0x190 [ 154.870024][ T8142] ? __cfi_dump_stack_lvl+0x10/0x10 [ 154.870048][ T8142] ? check_stack_object+0x12c/0x140 [ 154.870066][ T8142] dump_stack+0x19/0x20 [ 154.870088][ T8142] should_fail_ex+0x3d9/0x530 [ 154.870106][ T8142] should_fail+0xf/0x20 [ 154.870134][ T8142] should_fail_usercopy+0x1e/0x30 [ 154.870154][ T8142] _copy_to_user+0x24/0xa0 [ 154.870176][ T8142] simple_read_from_buffer+0xed/0x160 [ 154.870198][ T8142] proc_fail_nth_read+0x19e/0x210 [ 154.870222][ T8142] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 154.870244][ T8142] ? bpf_lsm_file_permission+0xd/0x20 [ 154.870268][ T8142] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 154.870290][ T8142] vfs_read+0x27d/0xc70 [ 154.870307][ T8142] ? __cfi_vfs_read+0x10/0x10 [ 154.870322][ T8142] ? __kasan_check_write+0x18/0x20 [ 154.870351][ T8142] ? mutex_lock+0x92/0x1c0 [ 154.870368][ T8142] ? __cfi_mutex_lock+0x10/0x10 [ 154.870383][ T8142] ? __fget_files+0x2c5/0x340 [ 154.870404][ T8142] ksys_read+0x141/0x250 [ 154.870420][ T8142] ? __cfi_ksys_read+0x10/0x10 [ 154.870437][ T8142] ? __kasan_check_read+0x15/0x20 [ 154.870461][ T8142] __x64_sys_read+0x7f/0x90 [ 154.870478][ T8142] x64_sys_call+0x2638/0x2ee0 [ 154.870503][ T8142] do_syscall_64+0x58/0xf0 [ 154.870529][ T8142] ? clear_bhb_loop+0x50/0xa0 [ 154.870548][ T8142] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 154.870567][ T8142] RIP: 0033:0x7f9257f8e0dc [ 154.870583][ T8142] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 154.870598][ T8142] RSP: 002b:00007f9258e00030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 154.870619][ T8142] RAX: ffffffffffffffda RBX: 00007f92581e5fa0 RCX: 00007f9257f8e0dc [ 154.870634][ T8142] RDX: 000000000000000f RSI: 00007f9258e000a0 RDI: 0000000000000005 [ 154.870645][ T8142] RBP: 00007f9258e00090 R08: 0000000000000000 R09: 0000000000000000 [ 154.870657][ T8142] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 154.870673][ T8142] R13: 00007f92581e6038 R14: 00007f92581e5fa0 R15: 00007ffed6f9b4f8 [ 154.870688][ T8142] [ 155.149059][ T8150] netlink: 16 bytes leftover after parsing attributes in process `syz.0.3766'. [ 155.273337][ T8164] rust_binder: BINDER_SET_CONTEXT_MGR already set [ 155.273451][ T8164] rust_binder: Failed to allocate buffer. len:1120, is_oneway:true [ 155.721583][ T8209] netlink: 16 bytes leftover after parsing attributes in process `syz.4.3793'. [ 156.879507][ T8260] erofs: dax options not supported [ 157.063693][ T36] audit: type=1400 audit(1763034778.680:325): avc: denied { getopt } for pid=8300 comm="syz.0.3837" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 157.874619][ T8370] netlink: 16 bytes leftover after parsing attributes in process `syz.4.3869'. [ 158.169950][ T8384] erofs: dax options not supported [ 158.525005][ T8442] netlink: 'syz.4.3904': attribute type 11 has an invalid length. [ 158.876907][ T8470] bridge0: port 3(veth0_to_team) entered blocking state [ 158.910640][ T8470] bridge0: port 3(veth0_to_team) entered disabled state [ 158.917683][ T8470] veth0_to_team: entered allmulticast mode [ 158.939554][ T8470] veth0_to_team: entered promiscuous mode [ 159.277727][ T8489] erofs: dax options not supported [ 159.581602][ T36] audit: type=1400 audit(1763034781.200:326): avc: denied { listen } for pid=8539 comm="syz.0.3950" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 160.474072][ T8627] netlink: 16 bytes leftover after parsing attributes in process `syz.4.3992'. [ 160.639128][ T36] audit: type=1400 audit(1763034782.250:327): avc: denied { map } for pid=8645 comm="syz.4.4001" path="socket:[45537]" dev="sockfs" ino=45537 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 160.671134][ T36] audit: type=1400 audit(1763034782.290:328): avc: denied { accept } for pid=8645 comm="syz.4.4001" path="socket:[45537]" dev="sockfs" ino=45537 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 160.720195][ T8650] netlink: 16 bytes leftover after parsing attributes in process `syz.0.4002'. [ 160.773145][ T8657] FAULT_INJECTION: forcing a failure. [ 160.773145][ T8657] name failslab, interval 1, probability 0, space 0, times 0 [ 160.786905][ T8657] CPU: 1 UID: 0 PID: 8657 Comm: syz.0.4005 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 160.786935][ T8657] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 160.786946][ T8657] Call Trace: [ 160.786952][ T8657] [ 160.786959][ T8657] __dump_stack+0x21/0x30 [ 160.786987][ T8657] dump_stack_lvl+0x10c/0x190 [ 160.787008][ T8657] ? __cfi_dump_stack_lvl+0x10/0x10 [ 160.787031][ T8657] dump_stack+0x19/0x20 [ 160.787052][ T8657] should_fail_ex+0x3d9/0x530 [ 160.787070][ T8657] should_failslab+0xac/0x100 [ 160.787091][ T8657] __kmalloc_cache_noprof+0x41/0x490 [ 160.787109][ T8657] ? v9fs_mount+0xbd/0xa00 [ 160.787127][ T8657] ? selinux_perf_event_alloc+0x110/0x110 [ 160.787149][ T8657] v9fs_mount+0xbd/0xa00 [ 160.787167][ T8657] ? __cfi_v9fs_mount+0x10/0x10 [ 160.787184][ T8657] ? selinux_capable+0x38/0x50 [ 160.787210][ T8657] legacy_get_tree+0x106/0x1b0 [ 160.787231][ T8657] ? __cfi_v9fs_mount+0x10/0x10 [ 160.787249][ T8657] vfs_get_tree+0x9e/0x290 [ 160.787274][ T8657] do_new_mount+0x251/0xb40 [ 160.787290][ T8657] ? security_capable+0xcf/0xf0 [ 160.787314][ T8657] path_mount+0x688/0x1050 [ 160.787330][ T8657] ? putname+0x113/0x150 [ 160.787347][ T8657] __se_sys_mount+0x2bd/0x480 [ 160.787364][ T8657] ? __x64_sys_mount+0xf0/0xf0 [ 160.787379][ T8657] __x64_sys_mount+0xc3/0xf0 [ 160.787393][ T8657] x64_sys_call+0x2021/0x2ee0 [ 160.787415][ T8657] do_syscall_64+0x58/0xf0 [ 160.787435][ T8657] ? clear_bhb_loop+0x50/0xa0 [ 160.787455][ T8657] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 160.787474][ T8657] RIP: 0033:0x7f9257f8f6c9 [ 160.787490][ T8657] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 160.787505][ T8657] RSP: 002b:00007f9258e00038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 160.787525][ T8657] RAX: ffffffffffffffda RBX: 00007f92581e5fa0 RCX: 00007f9257f8f6c9 [ 160.787540][ T8657] RDX: 0000200000000480 RSI: 0000200000000440 RDI: 0000000000000000 [ 160.787552][ T8657] RBP: 00007f9258e00090 R08: 0000200000000300 R09: 0000000000000000 [ 160.787565][ T8657] R10: 0000000000000084 R11: 0000000000000246 R12: 0000000000000001 [ 160.787577][ T8657] R13: 00007f92581e6038 R14: 00007f92581e5fa0 R15: 00007ffed6f9b4f8 [ 160.787593][ T8657] [ 161.213228][ T8673] erofs: dax options not supported [ 161.578628][ T8723] netlink: 16 bytes leftover after parsing attributes in process `syz.0.4036'. [ 161.594505][ T8725] erofs: dax options not supported [ 161.784605][ T8746] erofs: dax options not supported [ 162.102210][ T8773] netlink: 16 bytes leftover after parsing attributes in process `syz.4.4059'. [ 162.198946][ T8780] erofs: dax options not supported [ 162.311552][ T8792] FAULT_INJECTION: forcing a failure. [ 162.311552][ T8792] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 162.349085][ T8792] CPU: 0 UID: 0 PID: 8792 Comm: syz.0.4068 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 162.349115][ T8792] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 162.349132][ T8792] Call Trace: [ 162.349143][ T8792] [ 162.349149][ T8792] __dump_stack+0x21/0x30 [ 162.349177][ T8792] dump_stack_lvl+0x10c/0x190 [ 162.349199][ T8792] ? __cfi_dump_stack_lvl+0x10/0x10 [ 162.349227][ T8792] dump_stack+0x19/0x20 [ 162.349247][ T8792] should_fail_ex+0x3d9/0x530 [ 162.349266][ T8792] should_fail+0xf/0x20 [ 162.349281][ T8792] should_fail_usercopy+0x1e/0x30 [ 162.349299][ T8792] strncpy_from_user+0x28/0x270 [ 162.349316][ T8792] ? __kasan_check_write+0x18/0x20 [ 162.349342][ T8792] getname_flags+0x102/0x710 [ 162.349359][ T8792] user_path_at+0x2b/0x60 [ 162.349378][ T8792] do_fchownat+0x109/0x270 [ 162.349398][ T8792] ? __cfi_do_fchownat+0x10/0x10 [ 162.349418][ T8792] ? __kasan_check_read+0x15/0x20 [ 162.349442][ T8792] __x64_sys_chown+0x86/0xa0 [ 162.349462][ T8792] x64_sys_call+0x280c/0x2ee0 [ 162.349486][ T8792] do_syscall_64+0x58/0xf0 [ 162.349506][ T8792] ? clear_bhb_loop+0x50/0xa0 [ 162.349526][ T8792] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 162.349544][ T8792] RIP: 0033:0x7f9257f8f6c9 [ 162.349558][ T8792] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 162.349573][ T8792] RSP: 002b:00007f9258e00038 EFLAGS: 00000246 ORIG_RAX: 000000000000005c [ 162.349594][ T8792] RAX: ffffffffffffffda RBX: 00007f92581e5fa0 RCX: 00007f9257f8f6c9 [ 162.349607][ T8792] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00002000000000c0 [ 162.349618][ T8792] RBP: 00007f9258e00090 R08: 0000000000000000 R09: 0000000000000000 [ 162.349630][ T8792] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 162.349640][ T8792] R13: 00007f92581e6038 R14: 00007f92581e5fa0 R15: 00007ffed6f9b4f8 [ 162.349655][ T8792] [ 162.587981][ T8808] erofs: dax options not supported [ 162.658932][ T8823] netlink: 16 bytes leftover after parsing attributes in process `syz.1.4080'. [ 162.709408][ T36] audit: type=1400 audit(1763034784.320:329): avc: denied { create } for pid=8830 comm="syz.1.4084" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 162.783344][ T8837] erofs: dax options not supported [ 162.788672][ T36] audit: type=1400 audit(1763034784.400:330): avc: denied { associate } for pid=8835 comm="syz.1.4084" name="core" scontext=root:object_r:etc_runtime_t tcontext=system_u:object_r:root_t tclass=filesystem permissive=1 [ 162.925490][ T8849] netlink: 16 bytes leftover after parsing attributes in process `syz.2.4093'. [ 163.007546][ T8858] FAULT_INJECTION: forcing a failure. [ 163.007546][ T8858] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 163.030840][ T8858] CPU: 1 UID: 0 PID: 8858 Comm: syz.2.4097 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 163.030874][ T8858] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 163.030886][ T8858] Call Trace: [ 163.030892][ T8858] [ 163.030900][ T8858] __dump_stack+0x21/0x30 [ 163.030928][ T8858] dump_stack_lvl+0x10c/0x190 [ 163.030951][ T8858] ? __cfi_dump_stack_lvl+0x10/0x10 [ 163.030974][ T8858] ? check_stack_object+0x12c/0x140 [ 163.030992][ T8858] dump_stack+0x19/0x20 [ 163.031014][ T8858] should_fail_ex+0x3d9/0x530 [ 163.031033][ T8858] should_fail+0xf/0x20 [ 163.031050][ T8858] should_fail_usercopy+0x1e/0x30 [ 163.031068][ T8858] _copy_to_user+0x24/0xa0 [ 163.031090][ T8858] simple_read_from_buffer+0xed/0x160 [ 163.031112][ T8858] proc_fail_nth_read+0x19e/0x210 [ 163.031136][ T8858] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 163.031159][ T8858] ? bpf_lsm_file_permission+0xd/0x20 [ 163.031182][ T8858] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 163.031204][ T8858] vfs_read+0x27d/0xc70 [ 163.031219][ T8858] ? __cfi_selinux_file_ioctl+0x10/0x10 [ 163.031241][ T8858] ? __cfi_vfs_read+0x10/0x10 [ 163.031257][ T8858] ? __kasan_check_write+0x18/0x20 [ 163.031281][ T8858] ? mutex_lock+0x92/0x1c0 [ 163.031298][ T8858] ? __cfi_mutex_lock+0x10/0x10 [ 163.031314][ T8858] ? __fget_files+0x2c5/0x340 [ 163.031338][ T8858] ksys_read+0x141/0x250 [ 163.031361][ T8858] ? __cfi_ksys_read+0x10/0x10 [ 163.031378][ T8858] ? __kasan_check_read+0x15/0x20 [ 163.031403][ T8858] __x64_sys_read+0x7f/0x90 [ 163.031420][ T8858] x64_sys_call+0x2638/0x2ee0 [ 163.031445][ T8858] do_syscall_64+0x58/0xf0 [ 163.031468][ T8858] ? clear_bhb_loop+0x50/0xa0 [ 163.031488][ T8858] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 163.031508][ T8858] RIP: 0033:0x7fc9b658e0dc [ 163.031524][ T8858] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 163.031540][ T8858] RSP: 002b:00007fc9b73cc030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 163.031561][ T8858] RAX: ffffffffffffffda RBX: 00007fc9b67e5fa0 RCX: 00007fc9b658e0dc [ 163.031575][ T8858] RDX: 000000000000000f RSI: 00007fc9b73cc0a0 RDI: 0000000000000006 [ 163.031587][ T8858] RBP: 00007fc9b73cc090 R08: 0000000000000000 R09: 0000000000000000 [ 163.031599][ T8858] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 163.031611][ T8858] R13: 00007fc9b67e6038 R14: 00007fc9b67e5fa0 R15: 00007ffcb0a5b478 [ 163.031627][ T8858] [ 163.305861][ T36] audit: type=1400 audit(1763034784.920:331): avc: denied { setopt } for pid=8864 comm="syz.2.4100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 163.368827][ T8865] ======================================================= [ 163.368827][ T8865] WARNING: The mand mount option has been deprecated and [ 163.368827][ T8865] and is ignored by this kernel. Remove the mand [ 163.368827][ T8865] option from the mount to silence this warning. [ 163.368827][ T8865] ======================================================= [ 163.408869][ T8865] overlay: Unknown parameter 'obj_type' [ 163.533217][ T8876] netlink: 16 bytes leftover after parsing attributes in process `syz.4.4104'. [ 164.240359][ T8894] FAULT_INJECTION: forcing a failure. [ 164.240359][ T8894] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 164.253552][ T8894] CPU: 0 UID: 0 PID: 8894 Comm: syz.0.4115 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 164.253584][ T8894] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 164.253594][ T8894] Call Trace: [ 164.253601][ T8894] [ 164.253613][ T8894] __dump_stack+0x21/0x30 [ 164.253641][ T8894] dump_stack_lvl+0x10c/0x190 [ 164.253664][ T8894] ? __cfi_dump_stack_lvl+0x10/0x10 [ 164.253688][ T8894] dump_stack+0x19/0x20 [ 164.253710][ T8894] should_fail_ex+0x3d9/0x530 [ 164.253733][ T8894] should_fail+0xf/0x20 [ 164.253750][ T8894] should_fail_usercopy+0x1e/0x30 [ 164.253769][ T8894] strncpy_from_user+0x28/0x270 [ 164.253787][ T8894] ? __kasan_check_write+0x18/0x20 [ 164.253813][ T8894] getname_flags+0x102/0x710 [ 164.253832][ T8894] user_path_at+0x2b/0x60 [ 164.253852][ T8894] do_fchownat+0x109/0x270 [ 164.253873][ T8894] ? __cfi_do_fchownat+0x10/0x10 [ 164.253893][ T8894] ? __kasan_check_read+0x15/0x20 [ 164.253919][ T8894] __x64_sys_chown+0x86/0xa0 [ 164.253939][ T8894] x64_sys_call+0x280c/0x2ee0 [ 164.253966][ T8894] do_syscall_64+0x58/0xf0 [ 164.253989][ T8894] ? clear_bhb_loop+0x50/0xa0 [ 164.254008][ T8894] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 164.254027][ T8894] RIP: 0033:0x7f9257f8f6c9 [ 164.254043][ T8894] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 164.254059][ T8894] RSP: 002b:00007f9258e00038 EFLAGS: 00000246 ORIG_RAX: 000000000000005c [ 164.254081][ T8894] RAX: ffffffffffffffda RBX: 00007f92581e5fa0 RCX: 00007f9257f8f6c9 [ 164.254095][ T8894] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 164.254116][ T8894] RBP: 00007f9258e00090 R08: 0000000000000000 R09: 0000000000000000 [ 164.254133][ T8894] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 164.254145][ T8894] R13: 00007f92581e6038 R14: 00007f92581e5fa0 R15: 00007ffed6f9b4f8 [ 164.254162][ T8894] [ 164.650055][ T8947] netlink: 16 bytes leftover after parsing attributes in process `syz.1.4140'. [ 164.676769][ T36] audit: type=1400 audit(1763034786.290:332): avc: denied { setopt } for pid=8943 comm="syz.2.4138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 165.122886][ T8978] kvm: MWAIT instruction emulated as NOP! [ 165.398694][ T9022] erofs: dax options not supported [ 165.550222][ T9047] erofs: dax options not supported [ 166.026755][ T9114] netlink: 16 bytes leftover after parsing attributes in process `syz.1.4217'. [ 166.170735][ T9137] netlink: 16 bytes leftover after parsing attributes in process `syz.1.4228'. [ 166.750464][ T9174] erofs: dax options not supported [ 167.388498][ T9251] erofs: dax options not supported [ 167.678018][ T9271] erofs: dax options not supported [ 168.915694][ T9362] netlink: 16 bytes leftover after parsing attributes in process `syz.4.4340'. [ 169.636293][ T9391] erofs: dax options not supported [ 169.751844][ T9399] netlink: 16 bytes leftover after parsing attributes in process `syz.0.4350'. [ 169.951120][ T9415] erofs: dax options not supported [ 169.981845][ T9419] netlink: 16 bytes leftover after parsing attributes in process `syz.0.4367'. [ 170.219588][ T9436] erofs: dax options not supported [ 170.883471][ T9465] erofs: dax options not supported [ 171.471687][ T9488] erofs: dax options not supported [ 172.105271][ T9525] erofs: dax options not supported [ 174.810270][ T9709] erofs: dax options not supported [ 175.140909][ T9726] erofs: dax options not supported [ 175.433550][ T9749] erofs: dax options not supported [ 175.467963][ T9755] netlink: 16 bytes leftover after parsing attributes in process `syz.2.4532'. [ 175.644049][ T9772] erofs: dax options not supported [ 175.677569][ T9777] netlink: 16 bytes leftover after parsing attributes in process `syz.4.4543'. [ 175.980271][ T9793] erofs: dax options not supported [ 176.230422][ T9810] netlink: 16 bytes leftover after parsing attributes in process `syz.4.4559'. [ 176.671097][ T9857] erofs: dax options not supported [ 176.772727][ T9873] erofs: dax options not supported [ 176.882123][ T9889] netlink: 80 bytes leftover after parsing attributes in process `syz.1.4598'. [ 176.941389][ T9898] erofs: dax options not supported [ 177.016104][ T9912] netlink: 80 bytes leftover after parsing attributes in process `syz.2.4609'. [ 183.761467][T10201] netlink: 8 bytes leftover after parsing attributes in process `syz.4.4753'. [ 184.869166][ T13] veth1_macvtap: left promiscuous mode [ 184.874727][ T13] veth0_vlan: left promiscuous mode [ 185.032911][T10315] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.041855][T10315] bridge0: port 1(bridge_slave_0) entered disabled state [ 185.050012][T10315] bridge_slave_0: entered allmulticast mode [ 185.056719][T10315] bridge_slave_0: entered promiscuous mode [ 185.065778][T10315] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.075982][T10315] bridge0: port 2(bridge_slave_1) entered disabled state [ 185.085091][T10315] bridge_slave_1: entered allmulticast mode [ 185.092507][T10315] bridge_slave_1: entered promiscuous mode [ 185.255728][T10315] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.263224][T10315] bridge0: port 2(bridge_slave_1) entered forwarding state [ 185.271284][T10315] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.278432][T10315] bridge0: port 1(bridge_slave_0) entered forwarding state [ 185.378695][ T60] bridge0: port 2(bridge_slave_1) entered disabled state [ 185.393528][ T60] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.400743][ T60] bridge0: port 2(bridge_slave_1) entered forwarding state [ 185.432455][T10315] veth0_vlan: entered promiscuous mode [ 185.446659][T10315] veth1_macvtap: entered promiscuous mode [ 185.478753][ T36] audit: type=1400 audit(1763034807.090:333): avc: denied { mounton } for pid=10315 comm="syz-executor" path="/root/syzkaller.im9IiI/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 186.506769][T10396] No source specified [ 186.764690][T10421] No source specified [ 187.508231][T10445] No source specified [ 189.474387][T10525] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.481634][T10525] bridge0: port 1(bridge_slave_0) entered disabled state [ 189.488836][T10525] bridge_slave_0: entered allmulticast mode [ 189.506318][T10525] bridge_slave_0: entered promiscuous mode [ 189.523428][T10525] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.551751][T10525] bridge0: port 2(bridge_slave_1) entered disabled state [ 189.571424][T10525] bridge_slave_1: entered allmulticast mode [ 189.578311][T10525] bridge_slave_1: entered promiscuous mode [ 189.758066][T10525] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.765319][T10525] bridge0: port 2(bridge_slave_1) entered forwarding state [ 189.772867][T10525] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.781838][T10525] bridge0: port 1(bridge_slave_0) entered forwarding state [ 189.829966][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 189.838052][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 189.871498][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.878643][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 189.909536][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.917115][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 190.005357][T10525] veth0_vlan: entered promiscuous mode [ 190.023576][T10525] veth1_macvtap: entered promiscuous mode [ 190.074771][T10566] netlink: 80 bytes leftover after parsing attributes in process `syz.4.4923'. [ 190.226620][T10592] netlink: 80 bytes leftover after parsing attributes in process `syz.2.4935'. [ 190.390202][T10615] netlink: 80 bytes leftover after parsing attributes in process `syz.2.4947'. [ 190.661329][T10642] netlink: 80 bytes leftover after parsing attributes in process `syz.2.4959'. [ 190.967891][T10666] netlink: 80 bytes leftover after parsing attributes in process `syz.2.4971'. [ 191.436149][T10688] netlink: 80 bytes leftover after parsing attributes in process `syz.4.4984'. [ 198.533319][T11043] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.550233][T11043] bridge0: port 1(bridge_slave_0) entered disabled state [ 198.558523][T11043] bridge_slave_0: entered allmulticast mode [ 198.579671][T11043] bridge_slave_0: entered promiscuous mode [ 198.591326][ T60] veth0_to_team: left allmulticast mode [ 198.600001][ T60] veth0_to_team: left promiscuous mode [ 198.608983][ T60] bridge0: port 3(veth0_to_team) entered disabled state [ 198.620074][ T60] bridge_slave_1: left allmulticast mode [ 198.627739][ T60] bridge_slave_1: left promiscuous mode [ 198.659179][ T60] bridge0: port 2(bridge_slave_1) entered disabled state [ 198.689150][ T60] bridge_slave_0: left allmulticast mode [ 198.698135][ T60] bridge_slave_0: left promiscuous mode [ 198.719200][ T60] bridge0: port 1(bridge_slave_0) entered disabled state [ 198.841508][T11043] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.849160][T11043] bridge0: port 2(bridge_slave_1) entered disabled state [ 198.879249][T11043] bridge_slave_1: entered allmulticast mode [ 198.886839][T11043] bridge_slave_1: entered promiscuous mode [ 198.910571][ T60] veth1_macvtap: left promiscuous mode [ 198.918672][ T60] veth0_vlan: left promiscuous mode [ 199.219808][T11043] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.228909][T11043] bridge0: port 2(bridge_slave_1) entered forwarding state [ 199.239480][T11043] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.247235][T11043] bridge0: port 1(bridge_slave_0) entered forwarding state [ 199.350794][ T6140] bridge0: port 1(bridge_slave_0) entered disabled state [ 199.361452][ T6140] bridge0: port 2(bridge_slave_1) entered disabled state [ 199.405748][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.415027][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 199.445368][ T6140] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.453110][ T6140] bridge0: port 2(bridge_slave_1) entered forwarding state [ 199.560620][T11043] veth0_vlan: entered promiscuous mode [ 199.602106][T11043] veth1_macvtap: entered promiscuous mode [ 201.133913][T11154] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.143312][T11154] bridge0: port 1(bridge_slave_0) entered disabled state [ 201.159206][T11154] bridge_slave_0: entered allmulticast mode [ 201.179522][T11154] bridge_slave_0: entered promiscuous mode [ 201.186810][T11154] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.199101][T11154] bridge0: port 2(bridge_slave_1) entered disabled state [ 201.208645][T11154] bridge_slave_1: entered allmulticast mode [ 201.216519][T11154] bridge_slave_1: entered promiscuous mode [ 201.388399][ T60] bridge_slave_1: left allmulticast mode [ 201.420822][ T60] bridge_slave_1: left promiscuous mode [ 201.427964][ T60] bridge0: port 2(bridge_slave_1) entered disabled state [ 201.446724][ T60] bridge_slave_0: left allmulticast mode [ 201.454819][ T60] bridge_slave_0: left promiscuous mode [ 201.462747][ T60] bridge0: port 1(bridge_slave_0) entered disabled state [ 201.635318][ T60] veth1_macvtap: left promiscuous mode [ 201.652109][ T60] veth0_vlan: left promiscuous mode [ 201.873383][T11154] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.881554][T11154] bridge0: port 2(bridge_slave_1) entered forwarding state [ 201.894086][T11154] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.902485][T11154] bridge0: port 1(bridge_slave_0) entered forwarding state [ 202.003519][ T293] bridge0: port 1(bridge_slave_0) entered disabled state [ 202.021297][ T293] bridge0: port 2(bridge_slave_1) entered disabled state [ 202.033192][ T6140] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.041889][ T6140] bridge0: port 1(bridge_slave_0) entered forwarding state [ 202.068101][ T6140] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.076681][ T6140] bridge0: port 2(bridge_slave_1) entered forwarding state [ 202.115399][T11154] veth0_vlan: entered promiscuous mode [ 202.135037][T11154] veth1_macvtap: entered promiscuous mode [ 221.828576][T11912] netlink: 8 bytes leftover after parsing attributes in process `syz.0.5578'. [ 222.272270][T11932] netlink: 8 bytes leftover after parsing attributes in process `syz.1.5589'. [ 223.081008][T11966] FAULT_INJECTION: forcing a failure. [ 223.081008][T11966] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 223.119286][T11966] CPU: 0 UID: 0 PID: 11966 Comm: syz.2.5606 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 223.119321][T11966] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 223.119342][T11966] Call Trace: [ 223.119348][T11966] [ 223.119359][T11966] __dump_stack+0x21/0x30 [ 223.119390][T11966] dump_stack_lvl+0x10c/0x190 [ 223.119413][T11966] ? __cfi_dump_stack_lvl+0x10/0x10 [ 223.119436][T11966] ? check_stack_object+0x12c/0x140 [ 223.119455][T11966] dump_stack+0x19/0x20 [ 223.119476][T11966] should_fail_ex+0x3d9/0x530 [ 223.119495][T11966] should_fail+0xf/0x20 [ 223.119511][T11966] should_fail_usercopy+0x1e/0x30 [ 223.119530][T11966] _copy_to_user+0x24/0xa0 [ 223.119553][T11966] simple_read_from_buffer+0xed/0x160 [ 223.119575][T11966] proc_fail_nth_read+0x19e/0x210 [ 223.119598][T11966] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 223.119621][T11966] ? bpf_lsm_file_permission+0xd/0x20 [ 223.119644][T11966] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 223.119667][T11966] vfs_read+0x27d/0xc70 [ 223.119683][T11966] ? recalc_sigpending+0x16d/0x1d0 [ 223.119702][T11966] ? __cfi_vfs_read+0x10/0x10 [ 223.119717][T11966] ? __kasan_check_write+0x18/0x20 [ 223.119741][T11966] ? mutex_lock+0x92/0x1c0 [ 223.119757][T11966] ? __cfi_mutex_lock+0x10/0x10 [ 223.119772][T11966] ? __fget_files+0x2c5/0x340 [ 223.119790][T11966] ksys_read+0x141/0x250 [ 223.119803][T11966] ? __cfi_ksys_read+0x10/0x10 [ 223.119818][T11966] ? __kasan_check_read+0x15/0x20 [ 223.119841][T11966] __x64_sys_read+0x7f/0x90 [ 223.119858][T11966] x64_sys_call+0x2638/0x2ee0 [ 223.119882][T11966] do_syscall_64+0x58/0xf0 [ 223.119905][T11966] ? clear_bhb_loop+0x50/0xa0 [ 223.119924][T11966] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 223.119943][T11966] RIP: 0033:0x7fb91338e0dc [ 223.119958][T11966] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 223.119974][T11966] RSP: 002b:00007fb91420d030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 223.119995][T11966] RAX: ffffffffffffffda RBX: 00007fb9135e5fa0 RCX: 00007fb91338e0dc [ 223.120008][T11966] RDX: 000000000000000f RSI: 00007fb91420d0a0 RDI: 0000000000000005 [ 223.120020][T11966] RBP: 00007fb91420d090 R08: 0000000000000000 R09: 0000000000000000 [ 223.120032][T11966] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 223.120043][T11966] R13: 00007fb9135e6038 R14: 00007fb9135e5fa0 R15: 00007ffe348a51c8 [ 223.120059][T11966] [ 224.144806][ T36] audit: type=1400 audit(1763034845.760:334): avc: denied { map } for pid=12017 comm="syz.0.5630" path="socket:[63376]" dev="sockfs" ino=63376 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 224.228884][ T36] audit: type=1400 audit(1763034845.760:335): avc: denied { accept } for pid=12017 comm="syz.0.5630" path="socket:[63376]" dev="sockfs" ino=63376 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 225.158744][T12047] FAULT_INJECTION: forcing a failure. [ 225.158744][T12047] name failslab, interval 1, probability 0, space 0, times 0 [ 225.199099][T12047] CPU: 0 UID: 0 PID: 12047 Comm: syz.4.5645 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 225.199134][T12047] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 225.199145][T12047] Call Trace: [ 225.199163][T12047] [ 225.199170][T12047] __dump_stack+0x21/0x30 [ 225.199203][T12047] dump_stack_lvl+0x10c/0x190 [ 225.199228][T12047] ? __cfi_dump_stack_lvl+0x10/0x10 [ 225.199253][T12047] ? release_sock+0x171/0x1f0 [ 225.199276][T12047] dump_stack+0x19/0x20 [ 225.199299][T12047] should_fail_ex+0x3d9/0x530 [ 225.199320][T12047] should_failslab+0xac/0x100 [ 225.199343][T12047] kmem_cache_alloc_node_noprof+0x45/0x440 [ 225.199363][T12047] ? netlink_data_ready+0x20/0x20 [ 225.199388][T12047] ? __alloc_skb+0x10c/0x370 [ 225.199411][T12047] __alloc_skb+0x10c/0x370 [ 225.199434][T12047] netlink_alloc_large_skb+0xf7/0x1b0 [ 225.199458][T12047] netlink_sendmsg+0x586/0xaf0 [ 225.199482][T12047] ? __cfi_netlink_sendmsg+0x10/0x10 [ 225.199506][T12047] ? bpf_lsm_socket_sendmsg+0xd/0x20 [ 225.199579][T12047] ? security_socket_sendmsg+0x33/0xd0 [ 225.199595][T12047] ? __cfi_netlink_sendmsg+0x10/0x10 [ 225.199618][T12047] ____sys_sendmsg+0xa15/0xa70 [ 225.199644][T12047] ? __sys_sendmsg_sock+0x50/0x50 [ 225.199667][T12047] ? import_iovec+0x81/0xb0 [ 225.199687][T12047] ___sys_sendmsg+0x220/0x2a0 [ 225.199708][T12047] ? __sys_sendmsg+0x280/0x280 [ 225.199731][T12047] ? proc_fail_nth_write+0x17e/0x210 [ 225.199752][T12047] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 225.199778][T12047] __x64_sys_sendmsg+0x1eb/0x2c0 [ 225.199800][T12047] ? fput+0x1a5/0x240 [ 225.199820][T12047] ? __cfi___x64_sys_sendmsg+0x10/0x10 [ 225.199844][T12047] ? ksys_write+0x1ef/0x250 [ 225.199862][T12047] ? __kasan_check_read+0x15/0x20 [ 225.199889][T12047] x64_sys_call+0x2a4c/0x2ee0 [ 225.199913][T12047] do_syscall_64+0x58/0xf0 [ 225.199934][T12047] ? clear_bhb_loop+0x50/0xa0 [ 225.199953][T12047] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 225.199969][T12047] RIP: 0033:0x7fa7b938f6c9 [ 225.199985][T12047] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 225.200000][T12047] RSP: 002b:00007fa7ba25d038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 225.200021][T12047] RAX: ffffffffffffffda RBX: 00007fa7b95e5fa0 RCX: 00007fa7b938f6c9 [ 225.200035][T12047] RDX: 0000000000000040 RSI: 0000200000000340 RDI: 0000000000000006 [ 225.200046][T12047] RBP: 00007fa7ba25d090 R08: 0000000000000000 R09: 0000000000000000 [ 225.200057][T12047] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 225.200068][T12047] R13: 00007fa7b95e6038 R14: 00007fa7b95e5fa0 R15: 00007ffd749d9238 [ 225.200082][T12047] [ 226.546451][ T36] audit: type=1400 audit(1763034848.160:336): avc: denied { map } for pid=12090 comm="syz.2.5667" path="socket:[64683]" dev="sockfs" ino=64683 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 226.664563][T12096] FAULT_INJECTION: forcing a failure. [ 226.664563][T12096] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 226.690939][T12096] CPU: 0 UID: 0 PID: 12096 Comm: syz.4.5668 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 226.690974][T12096] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 226.690986][T12096] Call Trace: [ 226.690992][T12096] [ 226.690999][T12096] __dump_stack+0x21/0x30 [ 226.691029][T12096] dump_stack_lvl+0x10c/0x190 [ 226.691099][T12096] ? __cfi_dump_stack_lvl+0x10/0x10 [ 226.691122][T12096] ? check_stack_object+0x12c/0x140 [ 226.691140][T12096] dump_stack+0x19/0x20 [ 226.691161][T12096] should_fail_ex+0x3d9/0x530 [ 226.691180][T12096] should_fail+0xf/0x20 [ 226.691196][T12096] should_fail_usercopy+0x1e/0x30 [ 226.691216][T12096] _copy_to_user+0x24/0xa0 [ 226.691239][T12096] simple_read_from_buffer+0xed/0x160 [ 226.691263][T12096] proc_fail_nth_read+0x19e/0x210 [ 226.691295][T12096] ? do_syscall_64+0x58/0xf0 [ 226.691318][T12096] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 226.691341][T12096] ? bpf_lsm_file_permission+0xd/0x20 [ 226.691365][T12096] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 226.691388][T12096] vfs_read+0x27d/0xc70 [ 226.691405][T12096] ? __cfi_vfs_read+0x10/0x10 [ 226.691420][T12096] ? __kasan_check_write+0x18/0x20 [ 226.691446][T12096] ? mutex_lock+0x92/0x1c0 [ 226.691462][T12096] ? __cfi_mutex_lock+0x10/0x10 [ 226.691479][T12096] ? __fget_files+0x2c5/0x340 [ 226.691507][T12096] ksys_read+0x141/0x250 [ 226.691523][T12096] ? security_inode_listsecurity+0xcd/0x140 [ 226.691543][T12096] ? __cfi_ksys_read+0x10/0x10 [ 226.691560][T12096] ? __kasan_check_read+0x15/0x20 [ 226.691585][T12096] __x64_sys_read+0x7f/0x90 [ 226.691607][T12096] x64_sys_call+0x2638/0x2ee0 [ 226.691632][T12096] do_syscall_64+0x58/0xf0 [ 226.691654][T12096] ? clear_bhb_loop+0x50/0xa0 [ 226.691675][T12096] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 226.691694][T12096] RIP: 0033:0x7fa7b938e0dc [ 226.691711][T12096] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 226.691727][T12096] RSP: 002b:00007fa7ba25d030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 226.691749][T12096] RAX: ffffffffffffffda RBX: 00007fa7b95e5fa0 RCX: 00007fa7b938e0dc [ 226.691763][T12096] RDX: 000000000000000f RSI: 00007fa7ba25d0a0 RDI: 0000000000000006 [ 226.691776][T12096] RBP: 00007fa7ba25d090 R08: 0000000000000000 R09: 0000000000000000 [ 226.691787][T12096] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 226.691798][T12096] R13: 00007fa7b95e6038 R14: 00007fa7b95e5fa0 R15: 00007ffd749d9238 [ 226.691814][T12096] [ 228.846925][T12142] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 [ 228.876951][T12142] audit: out of memory in audit_log_start [ 228.979250][ T36] audit: type=1400 audit(1763034850.600:337): avc: denied { accept } for pid=12150 comm="syz.0.5695" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 229.038720][ T36] audit: type=1400 audit(1763034850.640:338): avc: denied { create } for pid=12152 comm="syz.1.5696" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 229.361411][ T36] audit: type=1400 audit(1763034850.980:339): avc: denied { ioctl } for pid=12172 comm="syz.1.5706" path="socket:[64438]" dev="sockfs" ino=64438 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 229.444890][ T36] audit: type=1400 audit(1763034851.060:340): avc: denied { read write } for pid=12174 comm="syz.1.5708" name="vga_arbiter" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 229.475457][T12175] FAULT_INJECTION: forcing a failure. [ 229.475457][T12175] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 229.499162][ T36] audit: type=1400 audit(1763034851.060:341): avc: denied { open } for pid=12174 comm="syz.1.5708" path="/dev/vga_arbiter" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 229.529154][T12175] CPU: 0 UID: 0 PID: 12175 Comm: syz.1.5708 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 229.529199][T12175] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 229.529211][T12175] Call Trace: [ 229.529218][T12175] [ 229.529226][T12175] __dump_stack+0x21/0x30 [ 229.529254][T12175] dump_stack_lvl+0x10c/0x190 [ 229.529277][T12175] ? __cfi_dump_stack_lvl+0x10/0x10 [ 229.529300][T12175] ? check_stack_object+0x12c/0x140 [ 229.529318][T12175] dump_stack+0x19/0x20 [ 229.529338][T12175] should_fail_ex+0x3d9/0x530 [ 229.529357][T12175] should_fail+0xf/0x20 [ 229.529373][T12175] should_fail_usercopy+0x1e/0x30 [ 229.529391][T12175] _copy_to_user+0x24/0xa0 [ 229.529412][T12175] simple_read_from_buffer+0xed/0x160 [ 229.529434][T12175] proc_fail_nth_read+0x19e/0x210 [ 229.529456][T12175] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 229.529479][T12175] ? bpf_lsm_file_permission+0xd/0x20 [ 229.529510][T12175] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 229.529531][T12175] vfs_read+0x27d/0xc70 [ 229.529547][T12175] ? __cfi_vfs_read+0x10/0x10 [ 229.529561][T12175] ? __kasan_check_write+0x18/0x20 [ 229.529586][T12175] ? mutex_lock+0x92/0x1c0 [ 229.529602][T12175] ? __cfi_mutex_lock+0x10/0x10 [ 229.529634][T12175] ? __fget_files+0x2c5/0x340 [ 229.529654][T12175] ksys_read+0x141/0x250 [ 229.529669][T12175] ? __cfi_ksys_read+0x10/0x10 [ 229.529685][T12175] ? __kasan_check_read+0x15/0x20 [ 229.529709][T12175] __x64_sys_read+0x7f/0x90 [ 229.529725][T12175] x64_sys_call+0x2638/0x2ee0 [ 229.529747][T12175] do_syscall_64+0x58/0xf0 [ 229.529768][T12175] ? clear_bhb_loop+0x50/0xa0 [ 229.529787][T12175] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 229.529805][T12175] RIP: 0033:0x7fe6ed78e0dc [ 229.529820][T12175] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 229.529836][T12175] RSP: 002b:00007fe6ee617030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 229.529856][T12175] RAX: ffffffffffffffda RBX: 00007fe6ed9e5fa0 RCX: 00007fe6ed78e0dc [ 229.529870][T12175] RDX: 000000000000000f RSI: 00007fe6ee6170a0 RDI: 0000000000000006 [ 229.529881][T12175] RBP: 00007fe6ee617090 R08: 0000000000000000 R09: 0000000000000000 [ 229.529892][T12175] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 229.529904][T12175] R13: 00007fe6ed9e6038 R14: 00007fe6ed9e5fa0 R15: 00007ffee9035be8 [ 229.529919][T12175] [ 229.937732][T12193] netlink: 8 bytes leftover after parsing attributes in process `syz.1.5715'. [ 230.349166][T12215] FAULT_INJECTION: forcing a failure. [ 230.349166][T12215] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 230.389129][ T31] usb 5-1: new low-speed USB device number 2 using dummy_hcd [ 230.399109][T12215] CPU: 0 UID: 0 PID: 12215 Comm: syz.1.5726 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 230.399143][T12215] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 230.399160][T12215] Call Trace: [ 230.399166][T12215] [ 230.399174][T12215] __dump_stack+0x21/0x30 [ 230.399203][T12215] dump_stack_lvl+0x10c/0x190 [ 230.399224][T12215] ? __cfi_dump_stack_lvl+0x10/0x10 [ 230.399247][T12215] ? check_stack_object+0x12c/0x140 [ 230.399265][T12215] dump_stack+0x19/0x20 [ 230.399286][T12215] should_fail_ex+0x3d9/0x530 [ 230.399304][T12215] should_fail+0xf/0x20 [ 230.399320][T12215] should_fail_usercopy+0x1e/0x30 [ 230.399338][T12215] _copy_to_user+0x24/0xa0 [ 230.399358][T12215] simple_read_from_buffer+0xed/0x160 [ 230.399381][T12215] proc_fail_nth_read+0x19e/0x210 [ 230.399403][T12215] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 230.399422][T12215] ? rep_movs_alternative+0x4c/0xa0 [ 230.399441][T12215] ? bpf_lsm_file_permission+0xd/0x20 [ 230.399463][T12215] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 230.399485][T12215] vfs_read+0x27d/0xc70 [ 230.399499][T12215] ? __x64_sys_newfstat+0x80/0x80 [ 230.399519][T12215] ? __cfi_vfs_read+0x10/0x10 [ 230.399534][T12215] ? __kasan_check_write+0x18/0x20 [ 230.399558][T12215] ? mutex_lock+0x92/0x1c0 [ 230.399574][T12215] ? __cfi_mutex_lock+0x10/0x10 [ 230.399589][T12215] ? __fget_files+0x2c5/0x340 [ 230.399608][T12215] ksys_read+0x141/0x250 [ 230.399623][T12215] ? __cfi_ksys_read+0x10/0x10 [ 230.399636][T12215] ? __kasan_check_read+0x15/0x20 [ 230.399657][T12215] __x64_sys_read+0x7f/0x90 [ 230.399680][T12215] x64_sys_call+0x2638/0x2ee0 [ 230.399703][T12215] do_syscall_64+0x58/0xf0 [ 230.399723][T12215] ? clear_bhb_loop+0x50/0xa0 [ 230.399743][T12215] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 230.399762][T12215] RIP: 0033:0x7fe6ed78e0dc [ 230.399778][T12215] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 230.399795][T12215] RSP: 002b:00007fe6ee617030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 230.399813][T12215] RAX: ffffffffffffffda RBX: 00007fe6ed9e5fa0 RCX: 00007fe6ed78e0dc [ 230.399828][T12215] RDX: 000000000000000f RSI: 00007fe6ee6170a0 RDI: 0000000000000006 [ 230.399840][T12215] RBP: 00007fe6ee617090 R08: 0000000000000000 R09: 0000000000000000 [ 230.399851][T12215] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 230.399863][T12215] R13: 00007fe6ed9e6038 R14: 00007fe6ed9e5fa0 R15: 00007ffee9035be8 [ 230.399879][T12215] [ 230.900649][ T31] usb 5-1: unable to get BOS descriptor or descriptor too short [ 230.919820][ T31] usb 5-1: config 0 interface 0 altsetting 0 has an endpoint descriptor with address 0xEE, changing to 0x8E [ 230.942407][ T31] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x8E has an invalid bInterval 0, changing to 4 [ 230.968962][ T31] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x8E has invalid maxpacket 221, setting to 0 [ 231.000762][ T31] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x3 has invalid wMaxPacketSize 0 [ 231.015045][ T31] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0xC is Bulk; changing to Interrupt [ 231.035913][ T31] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0xF has invalid wMaxPacketSize 0 [ 231.064548][ T31] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x7 is Bulk; changing to Interrupt [ 231.113354][ T31] usb 5-1: string descriptor 0 read error: -22 [ 231.122826][ T31] usb 5-1: New USB device found, idVendor=0763, idProduct=1002, bcdDevice=5f.84 [ 231.149945][ T31] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 231.179219][ T31] usb 5-1: config 0 descriptor?? [ 231.185639][T12205] raw-gadget.0 gadget.4: fail, usb_ep_enable returned -22 [ 231.194592][T12205] raw-gadget.0 gadget.4: fail, usb_ep_enable returned -22 [ 231.236537][ T339] udevd[339]: error opening ATTR{/sys/devices/platform/dummy_hcd.4/usb5/5-1/5-1:0.0/sound/card0/controlC0/../uevent} for writing: No such file or directory [ 231.494621][ T6178] usb 5-1: USB disconnect, device number 2 [ 232.266138][T12300] SELinux: security_context_str_to_sid (system_u) failed with errno=-22 [ 232.440868][ T36] audit: type=1400 audit(1763034854.060:342): avc: denied { create } for pid=12309 comm="syz.1.5771" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 233.279204][ T36] audit: type=1400 audit(1763034854.890:343): avc: denied { compute_member } for pid=12331 comm="syz.0.5782" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 233.351953][T12334] FAULT_INJECTION: forcing a failure. [ 233.351953][T12334] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 233.409091][T12334] CPU: 0 UID: 0 PID: 12334 Comm: syz.0.5784 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 233.409133][T12334] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 233.409146][T12334] Call Trace: [ 233.409152][T12334] [ 233.409160][T12334] __dump_stack+0x21/0x30 [ 233.409191][T12334] dump_stack_lvl+0x10c/0x190 [ 233.409214][T12334] ? __cfi_dump_stack_lvl+0x10/0x10 [ 233.409237][T12334] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 233.409262][T12334] ? kstrtouint_from_user+0xfb/0x150 [ 233.409280][T12334] ? x64_sys_call+0xe69/0x2ee0 [ 233.409305][T12334] dump_stack+0x19/0x20 [ 233.409326][T12334] should_fail_ex+0x3d9/0x530 [ 233.409345][T12334] should_fail+0xf/0x20 [ 233.409362][T12334] should_fail_usercopy+0x1e/0x30 [ 233.409380][T12334] _copy_from_user+0x22/0xb0 [ 233.409402][T12334] simple_transaction_get+0x126/0x1e0 [ 233.409425][T12334] selinux_transaction_write+0xd6/0x180 [ 233.409449][T12334] ? __cfi_selinux_transaction_write+0x10/0x10 [ 233.409472][T12334] vfs_write+0x3c0/0xf30 [ 233.409490][T12334] ? __cfi_vfs_write+0x10/0x10 [ 233.409505][T12334] ? __kasan_check_write+0x18/0x20 [ 233.409531][T12334] ? mutex_lock+0x92/0x1c0 [ 233.409547][T12334] ? __cfi_mutex_lock+0x10/0x10 [ 233.409564][T12334] ? __fget_files+0x2c5/0x340 [ 233.409584][T12334] ksys_write+0x141/0x250 [ 233.409601][T12334] ? __cfi_ksys_write+0x10/0x10 [ 233.409618][T12334] ? __kasan_check_read+0x15/0x20 [ 233.409644][T12334] __x64_sys_write+0x7f/0x90 [ 233.409660][T12334] x64_sys_call+0x271c/0x2ee0 [ 233.409685][T12334] do_syscall_64+0x58/0xf0 [ 233.409707][T12334] ? clear_bhb_loop+0x50/0xa0 [ 233.409727][T12334] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 233.409746][T12334] RIP: 0033:0x7f2b26f8f6c9 [ 233.409762][T12334] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 233.409777][T12334] RSP: 002b:00007f2b27d6a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 233.409799][T12334] RAX: ffffffffffffffda RBX: 00007f2b271e5fa0 RCX: 00007f2b26f8f6c9 [ 233.409812][T12334] RDX: 0000000000000055 RSI: 00002000000001c0 RDI: 0000000000000005 [ 233.409825][T12334] RBP: 00007f2b27d6a090 R08: 0000000000000000 R09: 0000000000000000 [ 233.409837][T12334] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 233.409849][T12334] R13: 00007f2b271e6038 R14: 00007f2b271e5fa0 R15: 00007fffc362e3e8 [ 233.409865][T12334] [ 233.765062][T12341] netlink: 8 bytes leftover after parsing attributes in process `syz.0.5787'. [ 234.913458][T12369] netlink: 8 bytes leftover after parsing attributes in process `syz.2.5798'. [ 235.192716][T12375] rust_binder: Error in use_page_slow: ESRCH [ 235.192746][T12375] rust_binder: use_range failure ESRCH [ 235.209454][T12375] rust_binder: Failed to allocate buffer. len:1160, is_oneway:false [ 235.209502][T12375] rust_binder: Failure in copy_transaction_data: BR_FAILED_REPLY { source: ESRCH } [ 235.236967][T12375] rust_binder: Transaction failed: BR_FAILED_REPLY { source: ESRCH } my_pid:375 [ 235.393877][T12383] FAULT_INJECTION: forcing a failure. [ 235.393877][T12383] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 235.454267][T12383] CPU: 1 UID: 0 PID: 12383 Comm: syz.2.5805 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 235.454305][T12383] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 235.454317][T12383] Call Trace: [ 235.454323][T12383] [ 235.454331][T12383] __dump_stack+0x21/0x30 [ 235.454372][T12383] dump_stack_lvl+0x10c/0x190 [ 235.454395][T12383] ? __cfi_dump_stack_lvl+0x10/0x10 [ 235.454419][T12383] ? kstrtoull+0x13b/0x1e0 [ 235.454435][T12383] dump_stack+0x19/0x20 [ 235.454457][T12383] should_fail_ex+0x3d9/0x530 [ 235.454476][T12383] should_fail+0xf/0x20 [ 235.454492][T12383] should_fail_usercopy+0x1e/0x30 [ 235.454510][T12383] _copy_from_user+0x22/0xb0 [ 235.454532][T12383] ___sys_sendmsg+0x159/0x2a0 [ 235.454558][T12383] ? __sys_sendmsg+0x280/0x280 [ 235.454587][T12383] ? proc_fail_nth_write+0x17e/0x210 [ 235.454610][T12383] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 235.454637][T12383] __x64_sys_sendmsg+0x1eb/0x2c0 [ 235.454661][T12383] ? fput+0x1a5/0x240 [ 235.454682][T12383] ? __cfi___x64_sys_sendmsg+0x10/0x10 [ 235.454707][T12383] ? ksys_write+0x1ef/0x250 [ 235.454725][T12383] ? __kasan_check_read+0x15/0x20 [ 235.454751][T12383] x64_sys_call+0x2a4c/0x2ee0 [ 235.454776][T12383] do_syscall_64+0x58/0xf0 [ 235.454798][T12383] ? clear_bhb_loop+0x50/0xa0 [ 235.454818][T12383] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 235.454836][T12383] RIP: 0033:0x7fb91338f6c9 [ 235.454851][T12383] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 235.454866][T12383] RSP: 002b:00007fb91420d038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 235.454887][T12383] RAX: ffffffffffffffda RBX: 00007fb9135e5fa0 RCX: 00007fb91338f6c9 [ 235.454901][T12383] RDX: 0000000000000000 RSI: 0000200000000740 RDI: 0000000000000005 [ 235.454913][T12383] RBP: 00007fb91420d090 R08: 0000000000000000 R09: 0000000000000000 [ 235.454924][T12383] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 235.454935][T12383] R13: 00007fb9135e6038 R14: 00007fb9135e5fa0 R15: 00007ffe348a51c8 [ 235.454950][T12383] [ 235.834404][T12387] x_tables: unsorted underflow at hook 1 [ 236.668157][T12415] rust_binder: Write failure EFAULT in pid:601 [ 236.923140][T12427] rust_binder: Write failure EFAULT in pid:609 [ 237.033481][T12433] netlink: 8 bytes leftover after parsing attributes in process `syz.0.5830'. [ 238.051390][T12493] rust_binder: Failed to allocate buffer. len:4120, is_oneway:false [ 238.059712][T12491] rust_binder: BC_REQUEST_DEATH_NOTIFICATION invalid ref 3 [ 238.085485][T12491] rust_binder: Transaction failed: BR_FAILED_REPLY { source: EINVAL } my_pid:337 [ 238.129685][ T36] audit: type=1400 audit(1763034859.750:344): avc: denied { append } for pid=12496 comm="syz.4.5860" name="ashmem" dev="devtmpfs" ino=201 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 238.299745][ T31] usb 3-1: new full-speed USB device number 6 using dummy_hcd [ 238.461978][ T31] usb 3-1: config 253 has an invalid descriptor of length 0, skipping remainder of the config [ 238.483494][ T31] usb 3-1: too many endpoints for config 253 interface 0 altsetting 0: 255, using maximum allowed: 30 [ 238.523747][ T31] usb 3-1: config 253 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 255 [ 238.544982][ T31] usb 3-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 238.561489][ T31] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=1 [ 238.579287][ T31] usb 3-1: SerialNumber: syz [ 238.613752][T12536] FAULT_INJECTION: forcing a failure. [ 238.613752][T12536] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 238.635388][T12536] CPU: 0 UID: 0 PID: 12536 Comm: syz.4.5879 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 238.635421][T12536] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 238.635432][T12536] Call Trace: [ 238.635438][T12536] [ 238.635445][T12536] __dump_stack+0x21/0x30 [ 238.635473][T12536] dump_stack_lvl+0x10c/0x190 [ 238.635496][T12536] ? __cfi_dump_stack_lvl+0x10/0x10 [ 238.635520][T12536] dump_stack+0x19/0x20 [ 238.635542][T12536] should_fail_ex+0x3d9/0x530 [ 238.635562][T12536] should_fail+0xf/0x20 [ 238.635577][T12536] should_fail_usercopy+0x1e/0x30 [ 238.635594][T12536] _copy_to_user+0x24/0xa0 [ 238.635614][T12536] kvm_arch_dev_ioctl+0x7bc/0x890 [ 238.635637][T12536] ? __cfi_kvm_arch_dev_ioctl+0x10/0x10 [ 238.635658][T12536] ? selinux_file_ioctl+0x6e0/0x1360 [ 238.635678][T12536] ? vfs_write+0x93e/0xf30 [ 238.635693][T12536] ? __cfi_selinux_file_ioctl+0x10/0x10 [ 238.635712][T12536] ? __cfi_vfs_write+0x10/0x10 [ 238.635727][T12536] ? __kasan_check_write+0x18/0x20 [ 238.635752][T12536] ? mutex_unlock+0x8b/0x240 [ 238.635771][T12536] kvm_dev_ioctl+0x48d/0x14d0 [ 238.635796][T12536] ? __fget_files+0x2c5/0x340 [ 238.635815][T12536] ? __cfi_kvm_dev_ioctl+0x10/0x10 [ 238.635839][T12536] ? bpf_lsm_file_ioctl+0xd/0x20 [ 238.635873][T12536] ? security_file_ioctl+0x34/0xd0 [ 238.635894][T12536] ? __cfi_kvm_dev_ioctl+0x10/0x10 [ 238.635917][T12536] __se_sys_ioctl+0x135/0x1b0 [ 238.635937][T12536] __x64_sys_ioctl+0x7f/0xa0 [ 238.635957][T12536] x64_sys_call+0x1878/0x2ee0 [ 238.635982][T12536] do_syscall_64+0x58/0xf0 [ 238.636004][T12536] ? clear_bhb_loop+0x50/0xa0 [ 238.636029][T12536] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 238.636047][T12536] RIP: 0033:0x7fa7b938f6c9 [ 238.636063][T12536] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 238.636080][T12536] RSP: 002b:00007fa7ba25d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 238.636101][T12536] RAX: ffffffffffffffda RBX: 00007fa7b95e5fa0 RCX: 00007fa7b938f6c9 [ 238.636116][T12536] RDX: 0000200000000000 RSI: 000000008008ae9d RDI: 0000000000000005 [ 238.636129][T12536] RBP: 00007fa7ba25d090 R08: 0000000000000000 R09: 0000000000000000 [ 238.636141][T12536] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 238.636152][T12536] R13: 00007fa7b95e6038 R14: 00007fa7b95e5fa0 R15: 00007ffd749d9238 [ 238.636169][T12536] [ 238.800130][T12493] rust_binder: Write failure EINVAL in pid:304 [ 239.059394][ T31] rndis_host 3-1:253.0: probe with driver rndis_host failed with error -22 [ 239.121018][ T31] usb 3-1: USB disconnect, device number 6 [ 239.422248][T12560] netlink: 8 bytes leftover after parsing attributes in process `syz.4.5891'. [ 239.590754][ T36] audit: type=1400 audit(1763034861.210:345): avc: denied { mount } for pid=12570 comm="syz.2.5896" name="/" dev="ramfs" ino=67723 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 239.737284][ T36] audit: type=1400 audit(1763034861.350:346): avc: denied { execute } for pid=12570 comm="syz.2.5896" path="/cpuacct.usage_percpu" dev="ramfs" ino=67726 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:ramfs_t tclass=file permissive=1 [ 239.745293][T12581] rust_binder: validate_parent_fixup: new_min_offset=28, sg_entry.length=0 [ 239.786687][T12581] rust_binder: Error while translating object. [ 239.798757][ T36] audit: type=1400 audit(1763034861.410:347): avc: denied { ioctl } for pid=12570 comm="syz.2.5896" path="socket:[67733]" dev="sockfs" ino=67733 ioctlcmd=0x8936 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 239.824717][T12581] rust_binder: Failure in copy_transaction_data: BR_FAILED_REPLY { source: EINVAL } [ 239.847693][T12581] rust_binder: Transaction failed: BR_FAILED_REPLY { source: EINVAL } my_pid:382 [ 240.178635][T12615] FAULT_INJECTION: forcing a failure. [ 240.178635][T12615] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 240.226257][T12615] CPU: 0 UID: 0 PID: 12615 Comm: syz.2.5918 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 240.226289][T12615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 240.226301][T12615] Call Trace: [ 240.226307][T12615] [ 240.226315][T12615] __dump_stack+0x21/0x30 [ 240.226347][T12615] dump_stack_lvl+0x10c/0x190 [ 240.226371][T12615] ? __cfi_dump_stack_lvl+0x10/0x10 [ 240.226396][T12615] dump_stack+0x19/0x20 [ 240.226416][T12615] should_fail_ex+0x3d9/0x530 [ 240.226435][T12615] should_fail+0xf/0x20 [ 240.226450][T12615] should_fail_usercopy+0x1e/0x30 [ 240.226467][T12615] _copy_from_user+0x22/0xb0 [ 240.226484][T12615] lo_ioctl+0x6d3/0x1d50 [ 240.226504][T12615] ? __cfi_lo_ioctl+0x10/0x10 [ 240.226520][T12615] ? stack_depot_save_flags+0x38/0x800 [ 240.226539][T12615] ? stack_trace_save+0x9d/0xe0 [ 240.226562][T12615] ? kasan_save_track+0x4f/0x80 [ 240.226581][T12615] ? kasan_save_track+0x3e/0x80 [ 240.226597][T12615] ? kasan_save_alloc_info+0x40/0x50 [ 240.226619][T12615] ? __kasan_slab_alloc+0x73/0x90 [ 240.226637][T12615] ? kmem_cache_alloc_noprof+0x1cb/0x430 [ 240.226652][T12615] ? security_inode_alloc+0x51/0x200 [ 240.226677][T12615] ? inode_init_always_gfp+0x756/0x9e0 [ 240.226707][T12615] ? alloc_inode+0xc5/0x270 [ 240.226726][T12615] ? new_inode+0x25/0x1e0 [ 240.226743][T12615] ? proc_pid_make_inode+0x25/0x140 [ 240.226762][T12615] ? proc_pident_instantiate+0x6d/0x2c0 [ 240.226781][T12615] ? proc_pident_lookup+0x1c7/0x270 [ 240.226801][T12615] ? proc_tid_base_lookup+0x2f/0x40 [ 240.226822][T12615] ? path_openat+0x1301/0x34b0 [ 240.226840][T12615] ? do_filp_open+0x1c6/0x3e0 [ 240.226855][T12615] ? do_sys_openat2+0x12c/0x1c0 [ 240.226872][T12615] ? __x64_sys_openat+0x13a/0x170 [ 240.226892][T12615] ? x64_sys_call+0xe69/0x2ee0 [ 240.226914][T12615] ? do_syscall_64+0x58/0xf0 [ 240.226940][T12615] ? avc_has_perm_noaudit+0x286/0x360 [ 240.226963][T12615] ? avc_has_perm+0x144/0x220 [ 240.226985][T12615] ? __cfi_avc_has_perm+0x10/0x10 [ 240.227018][T12615] ? kasan_save_alloc_info+0x40/0x50 [ 240.227041][T12615] ? selinux_file_open+0x457/0x610 [ 240.227061][T12615] ? __cfi_selinux_file_open+0x10/0x10 [ 240.227083][T12615] ? avc_has_extended_perms+0x7c7/0xdd0 [ 240.227105][T12615] ? __asan_memcpy+0x5a/0x80 [ 240.227118][T12615] ? avc_has_extended_perms+0x921/0xdd0 [ 240.227139][T12615] ? do_vfs_ioctl+0xeda/0x1e30 [ 240.227158][T12615] ? arch_stack_walk+0x10b/0x170 [ 240.227175][T12615] ? __ia32_compat_sys_ioctl+0x850/0x850 [ 240.227195][T12615] ? _parse_integer+0x2e/0x40 [ 240.227220][T12615] ? blkdev_common_ioctl+0x10e4/0x2810 [ 240.227243][T12615] ? blkdev_bszset+0x220/0x220 [ 240.227264][T12615] ? has_cap_mac_admin+0xd0/0xd0 [ 240.227282][T12615] ? proc_fail_nth_write+0x17e/0x210 [ 240.227303][T12615] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 240.227324][T12615] ? selinux_file_ioctl+0x6e0/0x1360 [ 240.227344][T12615] ? vfs_write+0x93e/0xf30 [ 240.227361][T12615] ? __cfi_selinux_file_ioctl+0x10/0x10 [ 240.227382][T12615] ? __cfi_vfs_write+0x10/0x10 [ 240.227398][T12615] ? __kasan_check_write+0x18/0x20 [ 240.227424][T12615] ? mutex_unlock+0x8b/0x240 [ 240.227448][T12615] ? __cfi_mutex_unlock+0x10/0x10 [ 240.227464][T12615] ? __fget_files+0x2c5/0x340 [ 240.227484][T12615] ? __cfi_lo_ioctl+0x10/0x10 [ 240.227505][T12615] blkdev_ioctl+0x546/0x680 [ 240.227529][T12615] ? __cfi_blkdev_ioctl+0x10/0x10 [ 240.227552][T12615] ? bpf_lsm_file_ioctl+0xd/0x20 [ 240.227576][T12615] ? security_file_ioctl+0x34/0xd0 [ 240.227595][T12615] ? __cfi_blkdev_ioctl+0x10/0x10 [ 240.227617][T12615] __se_sys_ioctl+0x135/0x1b0 [ 240.227636][T12615] __x64_sys_ioctl+0x7f/0xa0 [ 240.227656][T12615] x64_sys_call+0x1878/0x2ee0 [ 240.227681][T12615] do_syscall_64+0x58/0xf0 [ 240.227768][T12615] ? clear_bhb_loop+0x50/0xa0 [ 240.227789][T12615] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 240.227809][T12615] RIP: 0033:0x7fb91338f6c9 [ 240.227825][T12615] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 240.227841][T12615] RSP: 002b:00007fb91420d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 240.227863][T12615] RAX: ffffffffffffffda RBX: 00007fb9135e5fa0 RCX: 00007fb91338f6c9 [ 240.227877][T12615] RDX: 0000000000000000 RSI: 0000000000004c04 RDI: 0000000000000005 [ 240.227890][T12615] RBP: 00007fb91420d090 R08: 0000000000000000 R09: 0000000000000000 [ 240.227902][T12615] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 240.227914][T12615] R13: 00007fb9135e6038 R14: 00007fb9135e5fa0 R15: 00007ffe348a51c8 [ 240.227930][T12615] [ 240.896236][T12638] FAULT_INJECTION: forcing a failure. [ 240.896236][T12638] name failslab, interval 1, probability 0, space 0, times 0 [ 240.914063][T12638] CPU: 0 UID: 0 PID: 12638 Comm: syz.4.5927 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 240.914097][T12638] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 240.914109][T12638] Call Trace: [ 240.914116][T12638] [ 240.914124][T12638] __dump_stack+0x21/0x30 [ 240.914152][T12638] dump_stack_lvl+0x10c/0x190 [ 240.914172][T12638] ? __cfi_dump_stack_lvl+0x10/0x10 [ 240.914194][T12638] ? _parse_integer_limit+0x195/0x1e0 [ 240.914220][T12638] dump_stack+0x19/0x20 [ 240.914238][T12638] should_fail_ex+0x3d9/0x530 [ 240.914255][T12638] should_failslab+0xac/0x100 [ 240.914272][T12638] __kmalloc_node_track_caller_noprof+0x68/0x520 [ 240.914290][T12638] ? sidtab_sid2str_get+0x139/0x370 [ 240.914308][T12638] ? kstrtouint_from_user+0xfb/0x150 [ 240.914324][T12638] ? __x64_sys_openat+0x13a/0x170 [ 240.914344][T12638] kmemdup_noprof+0x31/0x80 [ 240.914367][T12638] sidtab_sid2str_get+0x139/0x370 [ 240.914820][T12638] security_sid_to_context_core+0x30d/0x5d0 [ 240.914838][T12638] ? __kasan_check_write+0x18/0x20 [ 240.914864][T12638] security_sid_to_context+0x2e/0x50 [ 240.914880][T12638] selinux_lsm_getattr+0x25d/0x360 [ 240.914905][T12638] ? selinux_kernel_module_from_file+0x3d0/0x3d0 [ 240.914924][T12638] ? vfs_write+0x93e/0xf30 [ 240.914940][T12638] selinux_getselfattr+0x91/0x130 [ 240.914962][T12638] ? __cfi_selinux_getselfattr+0x10/0x10 [ 240.914983][T12638] ? __kasan_check_write+0x18/0x20 [ 240.915005][T12638] ? mutex_unlock+0x8b/0x240 [ 240.915021][T12638] security_getselfattr+0x2f2/0x860 [ 240.915046][T12638] ? fput+0x1a5/0x240 [ 240.915064][T12638] ? __cfi_security_getselfattr+0x10/0x10 [ 240.915086][T12638] ? ksys_write+0x1ef/0x250 [ 240.915100][T12638] ? __cfi_ksys_write+0x10/0x10 [ 240.915115][T12638] __x64_sys_lsm_get_self_attr+0x9e/0xb0 [ 240.915136][T12638] x64_sys_call+0x2d4c/0x2ee0 [ 240.915162][T12638] do_syscall_64+0x58/0xf0 [ 240.915184][T12638] ? clear_bhb_loop+0x50/0xa0 [ 240.915204][T12638] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 240.915223][T12638] RIP: 0033:0x7fa7b938f6c9 [ 240.915239][T12638] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 240.915256][T12638] RSP: 002b:00007fa7ba25d038 EFLAGS: 00000246 ORIG_RAX: 00000000000001cb [ 240.915276][T12638] RAX: ffffffffffffffda RBX: 00007fa7b95e5fa0 RCX: 00007fa7b938f6c9 [ 240.915291][T12638] RDX: 0000200000000380 RSI: 0000000000000000 RDI: 0000000000000068 [ 240.915302][T12638] RBP: 00007fa7ba25d090 R08: 0000000000000000 R09: 0000000000000000 [ 240.915314][T12638] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 240.915325][T12638] R13: 00007fa7b95e6038 R14: 00007fa7b95e5fa0 R15: 00007ffd749d9238 [ 240.915342][T12638] [ 240.949495][T12642] FAULT_INJECTION: forcing a failure. [ 240.949495][T12642] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 241.512177][T12642] CPU: 0 UID: 0 PID: 12642 Comm: syz.2.5929 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 241.512212][T12642] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 241.512225][T12642] Call Trace: [ 241.512231][T12642] [ 241.512239][T12642] __dump_stack+0x21/0x30 [ 241.512268][T12642] dump_stack_lvl+0x10c/0x190 [ 241.512291][T12642] ? __cfi_dump_stack_lvl+0x10/0x10 [ 241.512313][T12642] ? check_stack_object+0x12c/0x140 [ 241.512329][T12642] dump_stack+0x19/0x20 [ 241.512345][T12642] should_fail_ex+0x3d9/0x530 [ 241.512361][T12642] should_fail+0xf/0x20 [ 241.512377][T12642] should_fail_usercopy+0x1e/0x30 [ 241.512396][T12642] _copy_to_user+0x24/0xa0 [ 241.512418][T12642] simple_read_from_buffer+0xed/0x160 [ 241.512449][T12642] proc_fail_nth_read+0x19e/0x210 [ 241.512473][T12642] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 241.512496][T12642] ? bpf_lsm_file_permission+0xd/0x20 [ 241.512520][T12642] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 241.512544][T12642] vfs_read+0x27d/0xc70 [ 241.512572][T12642] ? __cfi_vfs_read+0x10/0x10 [ 241.512588][T12642] ? __kasan_check_write+0x18/0x20 [ 241.512613][T12642] ? mutex_lock+0x92/0x1c0 [ 241.512630][T12642] ? __cfi_mutex_lock+0x10/0x10 [ 241.512646][T12642] ? __fget_files+0x2c5/0x340 [ 241.512666][T12642] ksys_read+0x141/0x250 [ 241.512683][T12642] ? __cfi_ksys_read+0x10/0x10 [ 241.512700][T12642] ? __kasan_check_read+0x15/0x20 [ 241.512725][T12642] __x64_sys_read+0x7f/0x90 [ 241.512742][T12642] x64_sys_call+0x2638/0x2ee0 [ 241.512767][T12642] do_syscall_64+0x58/0xf0 [ 241.512789][T12642] ? clear_bhb_loop+0x50/0xa0 [ 241.512809][T12642] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 241.512828][T12642] RIP: 0033:0x7fb91338e0dc [ 241.512844][T12642] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 241.512860][T12642] RSP: 002b:00007fb91420d030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 241.512880][T12642] RAX: ffffffffffffffda RBX: 00007fb9135e5fa0 RCX: 00007fb91338e0dc [ 241.512896][T12642] RDX: 000000000000000f RSI: 00007fb91420d0a0 RDI: 0000000000000005 [ 241.512909][T12642] RBP: 00007fb91420d090 R08: 0000000000000000 R09: 0000000000000000 [ 241.512921][T12642] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 241.512933][T12642] R13: 00007fb9135e6038 R14: 00007fb9135e5fa0 R15: 00007ffe348a51c8 [ 241.512950][T12642] [ 241.701868][T12654] SELinux: security_context_str_to_sid () failed with errno=-22 [ 242.434378][T12715] FAULT_INJECTION: forcing a failure. [ 242.434378][T12715] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 242.461237][T12715] CPU: 0 UID: 0 PID: 12715 Comm: syz.0.5963 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 242.461272][T12715] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 242.461283][T12715] Call Trace: [ 242.461289][T12715] [ 242.461296][T12715] __dump_stack+0x21/0x30 [ 242.461324][T12715] dump_stack_lvl+0x10c/0x190 [ 242.461346][T12715] ? __cfi_dump_stack_lvl+0x10/0x10 [ 242.461368][T12715] ? kmem_cache_alloc_noprof+0x1cb/0x430 [ 242.461386][T12715] ? inode_init_always_gfp+0x756/0x9e0 [ 242.461405][T12715] ? alloc_inode+0xc5/0x270 [ 242.461424][T12715] ? new_inode+0x25/0x1e0 [ 242.461443][T12715] ? proc_pident_instantiate+0x6d/0x2c0 [ 242.461464][T12715] dump_stack+0x19/0x20 [ 242.461482][T12715] should_fail_ex+0x3d9/0x530 [ 242.461499][T12715] should_fail_alloc_page+0xeb/0x110 [ 242.461516][T12715] __alloc_pages_noprof+0x19b/0x7b0 [ 242.461536][T12715] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 242.461557][T12715] ? avc_has_perm_noaudit+0x286/0x360 [ 242.461581][T12715] ? avc_has_perm+0x144/0x220 [ 242.461604][T12715] pte_alloc_one+0x97/0x520 [ 242.461623][T12715] ? __cfi_pte_alloc_one+0x10/0x10 [ 242.461640][T12715] ? selinux_file_open+0x457/0x610 [ 242.461663][T12715] do_pte_missing+0x1a28/0x4240 [ 242.461687][T12715] ? __kasan_check_read+0x15/0x20 [ 242.461711][T12715] ? __thp_vma_allowable_orders+0x7f1/0x970 [ 242.461734][T12715] ? pte_marker_clear+0x1b0/0x1b0 [ 242.461755][T12715] ? is_bpf_text_address+0x17b/0x1a0 [ 242.461775][T12715] ? __cfi___thp_vma_allowable_orders+0x10/0x10 [ 242.461798][T12715] handle_mm_fault+0x1166/0x1b90 [ 242.461820][T12715] ? __cfi_handle_mm_fault+0x10/0x10 [ 242.461839][T12715] ? find_vma+0xcd/0x110 [ 242.461857][T12715] ? lock_mm_and_find_vma+0xb8/0x3a0 [ 242.461877][T12715] do_user_addr_fault+0x4ca/0x1200 [ 242.461904][T12715] exc_page_fault+0x59/0xc0 [ 242.461924][T12715] asm_exc_page_fault+0x2b/0x30 [ 242.461942][T12715] RIP: 0010:__get_user_4+0x1a/0x40 [ 242.461964][T12715] Code: 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 48 ba 00 f0 ff ff ff 7f 00 00 48 39 c2 48 19 d2 48 09 d0 0f 01 cb <8b> 10 31 c0 0f 01 ca e9 5a 56 03 00 90 90 90 90 90 90 90 90 90 90 [ 242.461980][T12715] RSP: 0018:ffffc90002d7fdb8 EFLAGS: 00050202 [ 242.461998][T12715] RAX: 0000200000000380 RBX: ffffc90002d7fe20 RCX: 0000000000000001 [ 242.462013][T12715] RDX: 0000000000000000 RSI: 0000000000000068 RDI: 0000000000000000 [ 242.462025][T12715] RBP: ffffc90002d7fed8 R08: ffffc90002d7fe3f R09: 0000000000000000 [ 242.462043][T12715] R10: ffffc90002d7fe20 R11: fffff520005affc8 R12: 0000200000000380 [ 242.462057][T12715] R13: 0000000000000068 R14: dffffc0000000000 R15: 0000000000000000 [ 242.462072][T12715] ? security_getselfattr+0xe6/0x860 [ 242.462097][T12715] ? fput+0x1a5/0x240 [ 242.462117][T12715] ? __cfi_security_getselfattr+0x10/0x10 [ 242.462141][T12715] ? ksys_write+0x1ef/0x250 [ 242.462155][T12715] ? __cfi_ksys_write+0x10/0x10 [ 242.462170][T12715] __x64_sys_lsm_get_self_attr+0x9e/0xb0 [ 242.462193][T12715] x64_sys_call+0x2d4c/0x2ee0 [ 242.463307][T12715] do_syscall_64+0x58/0xf0 [ 242.463335][T12715] ? clear_bhb_loop+0x50/0xa0 [ 242.463354][T12715] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 242.463374][T12715] RIP: 0033:0x7f2b26f8f6c9 [ 242.463391][T12715] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 242.463408][T12715] RSP: 002b:00007f2b27d6a038 EFLAGS: 00000246 ORIG_RAX: 00000000000001cb [ 242.463429][T12715] RAX: ffffffffffffffda RBX: 00007f2b271e5fa0 RCX: 00007f2b26f8f6c9 [ 242.463444][T12715] RDX: 0000200000000380 RSI: 0000000000000000 RDI: 0000000000000068 [ 242.463457][T12715] RBP: 00007f2b27d6a090 R08: 0000000000000000 R09: 0000000000000000 [ 242.463468][T12715] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 242.464568][T12715] R13: 00007f2b271e6038 R14: 00007f2b271e5fa0 R15: 00007fffc362e3e8 [ 242.464598][T12715] [ 243.583395][T12742] netlink: 8 bytes leftover after parsing attributes in process `syz.0.5978'. [ 243.731958][T12752] FAULT_INJECTION: forcing a failure. [ 243.731958][T12752] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 243.779126][T12752] CPU: 0 UID: 0 PID: 12752 Comm: syz.0.5981 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 243.779162][T12752] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 243.779174][T12752] Call Trace: [ 243.779180][T12752] [ 243.779188][T12752] __dump_stack+0x21/0x30 [ 243.779217][T12752] dump_stack_lvl+0x10c/0x190 [ 243.779240][T12752] ? __cfi_dump_stack_lvl+0x10/0x10 [ 243.779281][T12752] ? kmem_cache_alloc_noprof+0x1cb/0x430 [ 243.779300][T12752] ? inode_init_always_gfp+0x756/0x9e0 [ 243.779329][T12752] ? alloc_inode+0xc5/0x270 [ 243.779348][T12752] ? new_inode+0x25/0x1e0 [ 243.779367][T12752] ? proc_pident_instantiate+0x6d/0x2c0 [ 243.779388][T12752] dump_stack+0x19/0x20 [ 243.779410][T12752] should_fail_ex+0x3d9/0x530 [ 243.779429][T12752] should_fail_alloc_page+0xeb/0x110 [ 243.779450][T12752] __alloc_pages_noprof+0x19b/0x7b0 [ 243.779475][T12752] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 243.779499][T12752] ? avc_has_perm_noaudit+0x286/0x360 [ 243.779524][T12752] ? avc_has_perm+0x144/0x220 [ 243.779547][T12752] pte_alloc_one+0x97/0x520 [ 243.779565][T12752] ? __cfi_pte_alloc_one+0x10/0x10 [ 243.779583][T12752] ? selinux_file_open+0x457/0x610 [ 243.779605][T12752] do_pte_missing+0x1a28/0x4240 [ 243.779641][T12752] ? __kasan_check_read+0x15/0x20 [ 243.779670][T12752] ? __thp_vma_allowable_orders+0x7f1/0x970 [ 243.779693][T12752] ? pte_marker_clear+0x1b0/0x1b0 [ 243.779714][T12752] ? is_bpf_text_address+0x17b/0x1a0 [ 243.779735][T12752] ? __cfi___thp_vma_allowable_orders+0x10/0x10 [ 243.779759][T12752] handle_mm_fault+0x1166/0x1b90 [ 243.779781][T12752] ? __cfi_handle_mm_fault+0x10/0x10 [ 243.779800][T12752] ? find_vma+0xcd/0x110 [ 243.779818][T12752] ? lock_mm_and_find_vma+0xb8/0x3a0 [ 243.779839][T12752] do_user_addr_fault+0x4ca/0x1200 [ 243.779865][T12752] exc_page_fault+0x59/0xc0 [ 243.779884][T12752] asm_exc_page_fault+0x2b/0x30 [ 243.779902][T12752] RIP: 0010:__get_user_4+0x1a/0x40 [ 243.779924][T12752] Code: 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 48 ba 00 f0 ff ff ff 7f 00 00 48 39 c2 48 19 d2 48 09 d0 0f 01 cb <8b> 10 31 c0 0f 01 ca e9 5a 56 03 00 90 90 90 90 90 90 90 90 90 90 [ 243.779940][T12752] RSP: 0018:ffffc90002f7fdb8 EFLAGS: 00050202 [ 243.779959][T12752] RAX: 0000200000000380 RBX: ffffc90002f7fe20 RCX: 0000000000000001 [ 243.779973][T12752] RDX: 0000000000000000 RSI: 0000000000000068 RDI: 0000000000000000 [ 243.779985][T12752] RBP: ffffc90002f7fed8 R08: ffffc90002f7fe3f R09: 0000000000000000 [ 243.780016][T12752] R10: ffffc90002f7fe20 R11: fffff520005effc8 R12: 0000200000000380 [ 243.780031][T12752] R13: 0000000000000068 R14: dffffc0000000000 R15: 0000000000000000 [ 243.780046][T12752] ? security_getselfattr+0xe6/0x860 [ 243.780071][T12752] ? fput+0x1a5/0x240 [ 243.780093][T12752] ? __cfi_security_getselfattr+0x10/0x10 [ 243.780118][T12752] ? ksys_write+0x1ef/0x250 [ 243.780135][T12752] ? __cfi_ksys_write+0x10/0x10 [ 243.780153][T12752] __x64_sys_lsm_get_self_attr+0x9e/0xb0 [ 243.780177][T12752] x64_sys_call+0x2d4c/0x2ee0 [ 243.780202][T12752] do_syscall_64+0x58/0xf0 [ 243.780221][T12752] ? clear_bhb_loop+0x50/0xa0 [ 243.780237][T12752] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 243.780259][T12752] RIP: 0033:0x7f2b26f8f6c9 [ 243.780273][T12752] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 243.780287][T12752] RSP: 002b:00007f2b27d6a038 EFLAGS: 00000246 ORIG_RAX: 00000000000001cb [ 243.780305][T12752] RAX: ffffffffffffffda RBX: 00007f2b271e5fa0 RCX: 00007f2b26f8f6c9 [ 243.780327][T12752] RDX: 0000200000000380 RSI: 0000000000000000 RDI: 0000000000000068 [ 243.780339][T12752] RBP: 00007f2b27d6a090 R08: 0000000000000000 R09: 0000000000000000 [ 243.780351][T12752] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 243.780362][T12752] R13: 00007f2b271e6038 R14: 00007f2b271e5fa0 R15: 00007fffc362e3e8 [ 243.780379][T12752] [ 247.999376][T12854] FAULT_INJECTION: forcing a failure. [ 247.999376][T12854] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 248.040048][T12854] CPU: 1 UID: 0 PID: 12854 Comm: syz.2.6029 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 248.040079][T12854] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 248.040091][T12854] Call Trace: [ 248.040102][T12854] [ 248.040110][T12854] __dump_stack+0x21/0x30 [ 248.040139][T12854] dump_stack_lvl+0x10c/0x190 [ 248.040162][T12854] ? __cfi_dump_stack_lvl+0x10/0x10 [ 248.040187][T12854] ? check_stack_object+0x107/0x140 [ 248.040203][T12854] dump_stack+0x19/0x20 [ 248.040225][T12854] should_fail_ex+0x3d9/0x530 [ 248.040244][T12854] should_fail+0xf/0x20 [ 248.040261][T12854] should_fail_usercopy+0x1e/0x30 [ 248.040281][T12854] _copy_from_user+0x22/0xb0 [ 248.040304][T12854] __sys_bind+0x1de/0x3f0 [ 248.040327][T12854] ? __cfi___sys_bind+0x10/0x10 [ 248.040351][T12854] ? __kasan_check_read+0x15/0x20 [ 248.040376][T12854] __x64_sys_bind+0x7e/0x90 [ 248.040397][T12854] x64_sys_call+0x1ffd/0x2ee0 [ 248.040422][T12854] do_syscall_64+0x58/0xf0 [ 248.040445][T12854] ? clear_bhb_loop+0x50/0xa0 [ 248.040465][T12854] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 248.040485][T12854] RIP: 0033:0x7fb91338f6c9 [ 248.040502][T12854] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 248.040519][T12854] RSP: 002b:00007fb91420d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 [ 248.040541][T12854] RAX: ffffffffffffffda RBX: 00007fb9135e5fa0 RCX: 00007fb91338f6c9 [ 248.040557][T12854] RDX: 0000000000000047 RSI: 0000200000000040 RDI: 0000000000000007 [ 248.040570][T12854] RBP: 00007fb91420d090 R08: 0000000000000000 R09: 0000000000000000 [ 248.040583][T12854] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 248.040596][T12854] R13: 00007fb9135e6038 R14: 00007fb9135e5fa0 R15: 00007ffe348a51c8 [ 248.040613][T12854] [ 248.407994][ T36] audit: type=1400 audit(1763034870.020:348): avc: denied { read } for pid=12857 comm="syz.2.6033" name="ptp0" dev="devtmpfs" ino=196 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 248.470411][T12858] rust_binder: Write failure EFAULT in pid:380 [ 249.390516][T12888] FAULT_INJECTION: forcing a failure. [ 249.390516][T12888] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 249.449154][T12888] CPU: 1 UID: 0 PID: 12888 Comm: syz.1.6046 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 249.449189][T12888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 249.449201][T12888] Call Trace: [ 249.449208][T12888] [ 249.449216][T12888] __dump_stack+0x21/0x30 [ 249.449247][T12888] dump_stack_lvl+0x10c/0x190 [ 249.449270][T12888] ? __cfi_dump_stack_lvl+0x10/0x10 [ 249.449295][T12888] ? vfs_write+0x93e/0xf30 [ 249.449313][T12888] dump_stack+0x19/0x20 [ 249.449336][T12888] should_fail_ex+0x3d9/0x530 [ 249.449355][T12888] should_fail+0xf/0x20 [ 249.449371][T12888] should_fail_usercopy+0x1e/0x30 [ 249.449390][T12888] _copy_from_user+0x22/0xb0 [ 249.449412][T12888] do_sock_getsockopt+0x1d7/0x6d0 [ 249.449439][T12888] ? __cfi_do_sock_getsockopt+0x10/0x10 [ 249.449463][T12888] ? __fget_files+0x2c5/0x340 [ 249.449483][T12888] __x64_sys_getsockopt+0x1d5/0x280 [ 249.449509][T12888] x64_sys_call+0x10db/0x2ee0 [ 249.449830][T12888] do_syscall_64+0x58/0xf0 [ 249.449851][T12888] ? clear_bhb_loop+0x50/0xa0 [ 249.449873][T12888] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 249.449892][T12888] RIP: 0033:0x7fe6ed78f6c9 [ 249.449908][T12888] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 249.449924][T12888] RSP: 002b:00007fe6ee617038 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 249.449945][T12888] RAX: ffffffffffffffda RBX: 00007fe6ed9e5fa0 RCX: 00007fe6ed78f6c9 [ 249.449960][T12888] RDX: 0000000000000002 RSI: 0000000000000006 RDI: 0000000000000005 [ 249.449972][T12888] RBP: 00007fe6ee617090 R08: 0000200000000480 R09: 0000000000000000 [ 249.449985][T12888] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 249.449997][T12888] R13: 00007fe6ed9e6038 R14: 00007fe6ed9e5fa0 R15: 00007ffee9035be8 [ 249.450013][T12888] [ 250.135061][T12896] netlink: 8 bytes leftover after parsing attributes in process `syz.1.6052'. [ 250.465632][T12914] FAULT_INJECTION: forcing a failure. [ 250.465632][T12914] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 250.499157][T12914] CPU: 1 UID: 0 PID: 12914 Comm: syz.1.6059 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 250.499192][T12914] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 250.499204][T12914] Call Trace: [ 250.499211][T12914] [ 250.499220][T12914] __dump_stack+0x21/0x30 [ 250.499250][T12914] dump_stack_lvl+0x10c/0x190 [ 250.499273][T12914] ? __cfi_dump_stack_lvl+0x10/0x10 [ 250.499296][T12914] ? kstrtoull+0x13b/0x1e0 [ 250.499314][T12914] dump_stack+0x19/0x20 [ 250.500290][T12914] should_fail_ex+0x3d9/0x530 [ 250.500319][T12914] should_fail+0xf/0x20 [ 250.500334][T12914] should_fail_usercopy+0x1e/0x30 [ 250.500355][T12914] _copy_from_user+0x22/0xb0 [ 250.500379][T12914] ___sys_sendmsg+0x159/0x2a0 [ 250.500407][T12914] ? __sys_sendmsg+0x280/0x280 [ 250.500432][T12914] ? proc_fail_nth_write+0x17e/0x210 [ 250.500456][T12914] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 250.500556][T12914] __x64_sys_sendmsg+0x1eb/0x2c0 [ 250.500600][T12914] ? fput+0x1a5/0x240 [ 250.500810][T12914] ? __cfi___x64_sys_sendmsg+0x10/0x10 [ 250.500840][T12914] ? ksys_write+0x1ef/0x250 [ 250.500859][T12914] ? __kasan_check_read+0x15/0x20 [ 250.500885][T12914] x64_sys_call+0x2a4c/0x2ee0 [ 250.500911][T12914] do_syscall_64+0x58/0xf0 [ 250.500934][T12914] ? clear_bhb_loop+0x50/0xa0 [ 250.500955][T12914] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 250.500975][T12914] RIP: 0033:0x7fe6ed78f6c9 [ 250.500993][T12914] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 250.501011][T12914] RSP: 002b:00007fe6ee617038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 250.501033][T12914] RAX: ffffffffffffffda RBX: 00007fe6ed9e5fa0 RCX: 00007fe6ed78f6c9 [ 250.501048][T12914] RDX: 0000000000002000 RSI: 00002000000001c0 RDI: 0000000000000005 [ 250.501062][T12914] RBP: 00007fe6ee617090 R08: 0000000000000000 R09: 0000000000000000 [ 250.501075][T12914] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 250.501087][T12914] R13: 00007fe6ed9e6038 R14: 00007fe6ed9e5fa0 R15: 00007ffee9035be8 [ 250.501104][T12914] [ 251.970011][T12930] FAULT_INJECTION: forcing a failure. [ 251.970011][T12930] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 252.029154][T12930] CPU: 0 UID: 0 PID: 12930 Comm: syz.0.6068 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 252.029189][T12930] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 252.029202][T12930] Call Trace: [ 252.029208][T12930] [ 252.029216][T12930] __dump_stack+0x21/0x30 [ 252.029247][T12930] dump_stack_lvl+0x10c/0x190 [ 252.029281][T12930] ? __cfi_dump_stack_lvl+0x10/0x10 [ 252.029306][T12930] ? check_stack_object+0x107/0x140 [ 252.029324][T12930] dump_stack+0x19/0x20 [ 252.029351][T12930] should_fail_ex+0x3d9/0x530 [ 252.029372][T12930] should_fail+0xf/0x20 [ 252.029389][T12930] should_fail_usercopy+0x1e/0x30 [ 252.029408][T12930] _copy_from_user+0x22/0xb0 [ 252.029433][T12930] __sys_connect+0x136/0x440 [ 252.029458][T12930] ? __cfi___sys_connect+0x10/0x10 [ 252.029483][T12930] ? __kasan_check_read+0x15/0x20 [ 252.029510][T12930] __x64_sys_connect+0x7e/0x90 [ 252.029533][T12930] x64_sys_call+0x1c2f/0x2ee0 [ 252.029558][T12930] do_syscall_64+0x58/0xf0 [ 252.029581][T12930] ? clear_bhb_loop+0x50/0xa0 [ 252.029601][T12930] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 252.029620][T12930] RIP: 0033:0x7f2b26f8f6c9 [ 252.029637][T12930] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 252.029653][T12930] RSP: 002b:00007f2b27d6a038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 252.029674][T12930] RAX: ffffffffffffffda RBX: 00007f2b271e5fa0 RCX: 00007f2b26f8f6c9 [ 252.029689][T12930] RDX: 0000000000000010 RSI: 0000200000000180 RDI: 0000000000000007 [ 252.029702][T12930] RBP: 00007f2b27d6a090 R08: 0000000000000000 R09: 0000000000000000 [ 252.029715][T12930] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 252.029728][T12930] R13: 00007f2b271e6038 R14: 00007f2b271e5fa0 R15: 00007fffc362e3e8 [ 252.029745][T12930] [ 253.166582][ T36] audit: type=1326 audit(1763034874.780:349): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12995 comm="syz.0.6098" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f2b26f8f6c9 code=0x0 [ 253.721415][T13025] 9pnet: Could not find request transport: fB~0x0000000000000007 [ 253.913969][T13045] FAULT_INJECTION: forcing a failure. [ 253.913969][T13045] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 253.951207][ T36] audit: type=1400 audit(1763034875.570:350): avc: denied { remount } for pid=13051 comm="syz.0.6126" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 253.951216][T13052] binder: Unknown parameter '' [ 253.973208][T13045] CPU: 0 UID: 0 PID: 13045 Comm: syz.1.6108 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 253.973244][T13045] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 253.973261][T13045] Call Trace: [ 253.973268][T13045] [ 253.973276][T13045] __dump_stack+0x21/0x30 [ 253.973315][T13045] dump_stack_lvl+0x10c/0x190 [ 253.973344][T13045] ? __cfi_dump_stack_lvl+0x10/0x10 [ 253.973367][T13045] ? __kasan_check_write+0x18/0x20 [ 253.973401][T13045] ? check_stack_object+0x107/0x140 [ 253.973420][T13045] dump_stack+0x19/0x20 [ 253.973442][T13045] should_fail_ex+0x3d9/0x530 [ 253.973461][T13045] should_fail+0xf/0x20 [ 253.973477][T13045] should_fail_usercopy+0x1e/0x30 [ 253.973495][T13045] _copy_from_user+0x22/0xb0 [ 253.973516][T13045] __sys_sendto+0x29e/0x6f0 [ 253.973540][T13045] ? __cfi___sys_sendto+0x10/0x10 [ 253.973564][T13045] ? __kasan_check_write+0x18/0x20 [ 253.973589][T13045] ? __cfi_ksys_write+0x10/0x10 [ 253.973607][T13045] __x64_sys_sendto+0xe9/0x100 [ 253.973630][T13045] x64_sys_call+0x2c2c/0x2ee0 [ 253.973653][T13045] do_syscall_64+0x58/0xf0 [ 253.973675][T13045] ? clear_bhb_loop+0x50/0xa0 [ 253.973694][T13045] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 253.973713][T13045] RIP: 0033:0x7fe6ed78f6c9 [ 253.973728][T13045] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 253.973744][T13045] RSP: 002b:00007fe6ee617038 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 253.973764][T13045] RAX: ffffffffffffffda RBX: 00007fe6ed9e5fa0 RCX: 00007fe6ed78f6c9 [ 253.973778][T13045] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 253.973789][T13045] RBP: 00007fe6ee617090 R08: 0000200000000240 R09: 0000000000000014 [ 253.973802][T13045] R10: 0000000020000081 R11: 0000000000000246 R12: 0000000000000001 [ 253.973814][T13045] R13: 00007fe6ed9e6038 R14: 00007fe6ed9e5fa0 R15: 00007ffee9035be8 [ 253.973830][T13045] [ 254.252303][T13081] netlink: 8 bytes leftover after parsing attributes in process `syz.4.6138'. [ 254.404628][T13097] rust_binder: Failed to allocate buffer. len:4120, is_oneway:false [ 254.553025][T13115] netlink: 8 bytes leftover after parsing attributes in process `syz.0.6153'. [ 256.171769][T13156] tipc: Started in network mode [ 256.208723][T13156] tipc: Node identity ae38d3fa13ba, cluster identity 4711 [ 256.229787][T13156] tipc: Enabled bearer , priority 0 [ 256.261188][T13154] tipc: Disabling bearer [ 262.551918][ T36] audit: type=1400 audit(1763034884.170:351): avc: denied { associate } for pid=13449 comm="syz.0.6322" name="667" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 263.508477][T13498] FAULT_INJECTION: forcing a failure. [ 263.508477][T13498] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 263.530948][T13498] CPU: 1 UID: 0 PID: 13498 Comm: syz.1.6346 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 263.530982][T13498] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 263.530994][T13498] Call Trace: [ 263.531000][T13498] [ 263.531008][T13498] __dump_stack+0x21/0x30 [ 263.531037][T13498] dump_stack_lvl+0x10c/0x190 [ 263.531057][T13498] ? __cfi_dump_stack_lvl+0x10/0x10 [ 263.531081][T13498] ? check_stack_object+0x107/0x140 [ 263.531099][T13498] dump_stack+0x19/0x20 [ 263.531120][T13498] should_fail_ex+0x3d9/0x530 [ 263.531153][T13498] should_fail+0xf/0x20 [ 263.531168][T13498] should_fail_usercopy+0x1e/0x30 [ 263.531188][T13498] _copy_from_user+0x22/0xb0 [ 263.531211][T13498] __sys_connect+0x136/0x440 [ 263.531235][T13498] ? __cfi___sys_connect+0x10/0x10 [ 263.531260][T13498] ? __kasan_check_read+0x15/0x20 [ 263.531286][T13498] __x64_sys_connect+0x7e/0x90 [ 263.531308][T13498] x64_sys_call+0x1c2f/0x2ee0 [ 263.531332][T13498] do_syscall_64+0x58/0xf0 [ 263.531352][T13498] ? clear_bhb_loop+0x50/0xa0 [ 263.531370][T13498] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 263.531386][T13498] RIP: 0033:0x7fe6ed78f6c9 [ 263.531402][T13498] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 263.531417][T13498] RSP: 002b:00007fe6ee617038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 263.531437][T13498] RAX: ffffffffffffffda RBX: 00007fe6ed9e5fa0 RCX: 00007fe6ed78f6c9 [ 263.531450][T13498] RDX: 0000000000000010 RSI: 0000200000000180 RDI: 0000000000000007 [ 263.531463][T13498] RBP: 00007fe6ee617090 R08: 0000000000000000 R09: 0000000000000000 [ 263.531475][T13498] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 263.531488][T13498] R13: 00007fe6ed9e6038 R14: 00007fe6ed9e5fa0 R15: 00007ffee9035be8 [ 263.531504][T13498] [ 280.883043][T13979] netlink: 20 bytes leftover after parsing attributes in process `syz.0.6585'. [ 281.990000][T14060] FAULT_INJECTION: forcing a failure. [ 281.990000][T14060] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 282.049254][T14060] CPU: 0 UID: 0 PID: 14060 Comm: syz.1.6625 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 282.049289][T14060] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 282.049301][T14060] Call Trace: [ 282.049308][T14060] [ 282.049317][T14060] __dump_stack+0x21/0x30 [ 282.049346][T14060] dump_stack_lvl+0x10c/0x190 [ 282.049369][T14060] ? __cfi_dump_stack_lvl+0x10/0x10 [ 282.049392][T14060] ? check_stack_object+0x12c/0x140 [ 282.049412][T14060] dump_stack+0x19/0x20 [ 282.049431][T14060] should_fail_ex+0x3d9/0x530 [ 282.049449][T14060] should_fail+0xf/0x20 [ 282.049466][T14060] should_fail_usercopy+0x1e/0x30 [ 282.049485][T14060] _copy_to_user+0x24/0xa0 [ 282.049507][T14060] simple_read_from_buffer+0xed/0x160 [ 282.049531][T14060] proc_fail_nth_read+0x19e/0x210 [ 282.049565][T14060] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 282.049589][T14060] ? bpf_lsm_file_permission+0xd/0x20 [ 282.049613][T14060] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 282.049636][T14060] vfs_read+0x27d/0xc70 [ 282.049654][T14060] ? __cfi_vfs_read+0x10/0x10 [ 282.049670][T14060] ? __kasan_check_write+0x18/0x20 [ 282.049695][T14060] ? mutex_lock+0x92/0x1c0 [ 282.049712][T14060] ? __cfi_mutex_lock+0x10/0x10 [ 282.049727][T14060] ? __fget_files+0x2c5/0x340 [ 282.049744][T14060] ksys_read+0x141/0x250 [ 282.049759][T14060] ? __cfi_ksys_read+0x10/0x10 [ 282.049775][T14060] ? __kasan_check_read+0x15/0x20 [ 282.049798][T14060] __x64_sys_read+0x7f/0x90 [ 282.049815][T14060] x64_sys_call+0x2638/0x2ee0 [ 282.049839][T14060] do_syscall_64+0x58/0xf0 [ 282.049861][T14060] ? clear_bhb_loop+0x50/0xa0 [ 282.049881][T14060] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 282.049901][T14060] RIP: 0033:0x7fe6ed78e0dc [ 282.049917][T14060] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 282.049933][T14060] RSP: 002b:00007fe6ee617030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 282.049953][T14060] RAX: ffffffffffffffda RBX: 00007fe6ed9e5fa0 RCX: 00007fe6ed78e0dc [ 282.049967][T14060] RDX: 000000000000000f RSI: 00007fe6ee6170a0 RDI: 0000000000000007 [ 282.049979][T14060] RBP: 00007fe6ee617090 R08: 0000000000000000 R09: 0000000000000000 [ 282.049990][T14060] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 282.050002][T14060] R13: 00007fe6ed9e6038 R14: 00007fe6ed9e5fa0 R15: 00007ffee9035be8 [ 282.050017][T14060] [ 283.350549][T14101] FAULT_INJECTION: forcing a failure. [ 283.350549][T14101] name failslab, interval 1, probability 0, space 0, times 0 [ 283.389030][T14101] CPU: 0 UID: 0 PID: 14101 Comm: syz.0.6645 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 283.389061][T14101] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 283.389079][T14101] Call Trace: [ 283.389086][T14101] [ 283.389095][T14101] __dump_stack+0x21/0x30 [ 283.389124][T14101] dump_stack_lvl+0x10c/0x190 [ 283.389147][T14101] ? __cfi_dump_stack_lvl+0x10/0x10 [ 283.389168][T14101] ? avc_has_perm+0x144/0x220 [ 283.389192][T14101] dump_stack+0x19/0x20 [ 283.389220][T14101] should_fail_ex+0x3d9/0x530 [ 283.389238][T14101] should_failslab+0xac/0x100 [ 283.389266][T14101] kmem_cache_alloc_noprof+0x42/0x430 [ 283.389285][T14101] ? inc_rlimit_get_ucounts+0x3fb/0x470 [ 283.389311][T14101] ? __sigqueue_alloc+0x15e/0x2b0 [ 283.389339][T14101] __sigqueue_alloc+0x15e/0x2b0 [ 283.389376][T14101] __send_signal_locked+0x19d/0xb90 [ 283.389417][T14101] ? __kasan_check_write+0x18/0x20 [ 283.389444][T14101] ? __task_pid_nr_ns+0x1e2/0x280 [ 283.389467][T14101] send_signal_locked+0x428/0x5a0 [ 283.389488][T14101] do_send_sig_info+0xdb/0x220 [ 283.389513][T14101] send_sig+0x5f/0x70 [ 283.389533][T14101] sk_stream_error+0xb6/0x130 [ 283.389565][T14101] tcp_sendmsg_locked+0x42e0/0x4b40 [ 283.389591][T14101] ? __asan_memcpy+0x5a/0x80 [ 283.389618][T14101] ? __kasan_check_write+0x18/0x20 [ 283.389647][T14101] ? _raw_spin_lock_bh+0x90/0x120 [ 283.389671][T14101] ? __cfi__raw_spin_lock_bh+0x10/0x10 [ 283.389694][T14101] ? kstrtouint_from_user+0xfb/0x150 [ 283.389712][T14101] ? x64_sys_call+0xe69/0x2ee0 [ 283.389738][T14101] ? _raw_spin_unlock_bh+0x54/0x60 [ 283.389761][T14101] ? lock_sock_nested+0x1f5/0x290 [ 283.389780][T14101] ? __cfi_tcp_sendmsg_locked+0x10/0x10 [ 283.389804][T14101] ? __kasan_check_write+0x18/0x20 [ 283.389829][T14101] ? proc_fail_nth_write+0x17e/0x210 [ 283.389854][T14101] ? __cfi_tcp_sendmsg+0x10/0x10 [ 283.389876][T14101] tcp_sendmsg+0x3e/0xe0 [ 283.389899][T14101] ? __cfi_tcp_sendmsg+0x10/0x10 [ 283.389921][T14101] inet_sendmsg+0xb7/0x120 [ 283.389939][T14101] __sys_sendto+0x588/0x6f0 [ 283.389962][T14101] ? __cfi___sys_sendto+0x10/0x10 [ 283.389987][T14101] ? __kasan_check_write+0x18/0x20 [ 283.390013][T14101] ? __cfi_ksys_write+0x10/0x10 [ 283.390032][T14101] __x64_sys_sendto+0xe9/0x100 [ 283.390056][T14101] x64_sys_call+0x2c2c/0x2ee0 [ 283.390082][T14101] do_syscall_64+0x58/0xf0 [ 283.390104][T14101] ? clear_bhb_loop+0x50/0xa0 [ 283.390125][T14101] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 283.390145][T14101] RIP: 0033:0x7f2b26f8f6c9 [ 283.390161][T14101] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 283.390177][T14101] RSP: 002b:00007f2b27d6a038 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 283.390197][T14101] RAX: ffffffffffffffda RBX: 00007f2b271e5fa0 RCX: 00007f2b26f8f6c9 [ 283.390212][T14101] RDX: 0000000000000023 RSI: 00002000000000c0 RDI: 0000000000000007 [ 283.390225][T14101] RBP: 00007f2b27d6a090 R08: 0000000000000000 R09: 0000000000000000 [ 283.390237][T14101] R10: 0000000000000080 R11: 0000000000000246 R12: 0000000000000001 [ 283.390249][T14101] R13: 00007f2b271e6038 R14: 00007f2b271e5fa0 R15: 00007fffc362e3e8 [ 283.390266][T14101] [ 284.815080][T14158] netlink: 20 bytes leftover after parsing attributes in process `syz.4.6673'. [ 285.926874][T14207] netlink: 20 bytes leftover after parsing attributes in process `syz.4.6696'. [ 290.199537][T14335] FAULT_INJECTION: forcing a failure. [ 290.199537][T14335] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 290.266181][T14335] CPU: 1 UID: 0 PID: 14335 Comm: syz.0.6758 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 290.266217][T14335] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 290.266230][T14335] Call Trace: [ 290.266238][T14335] [ 290.266247][T14335] __dump_stack+0x21/0x30 [ 290.266277][T14335] dump_stack_lvl+0x10c/0x190 [ 290.266301][T14335] ? __cfi_dump_stack_lvl+0x10/0x10 [ 290.266325][T14335] ? check_stack_object+0x107/0x140 [ 290.266345][T14335] dump_stack+0x19/0x20 [ 290.266367][T14335] should_fail_ex+0x3d9/0x530 [ 290.266387][T14335] should_fail+0xf/0x20 [ 290.266404][T14335] should_fail_usercopy+0x1e/0x30 [ 290.266424][T14335] _copy_from_user+0x22/0xb0 [ 290.266447][T14335] __sys_connect+0x136/0x440 [ 290.266471][T14335] ? __cfi___sys_connect+0x10/0x10 [ 290.266505][T14335] ? __kasan_check_read+0x15/0x20 [ 290.266532][T14335] __x64_sys_connect+0x7e/0x90 [ 290.266555][T14335] x64_sys_call+0x1c2f/0x2ee0 [ 290.266581][T14335] do_syscall_64+0x58/0xf0 [ 290.266604][T14335] ? clear_bhb_loop+0x50/0xa0 [ 290.266625][T14335] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 290.266645][T14335] RIP: 0033:0x7f2b26f8f6c9 [ 290.266661][T14335] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 290.266679][T14335] RSP: 002b:00007f2b27d6a038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 290.266700][T14335] RAX: ffffffffffffffda RBX: 00007f2b271e5fa0 RCX: 00007f2b26f8f6c9 [ 290.266716][T14335] RDX: 0000000000000010 RSI: 0000200000000180 RDI: 0000000000000007 [ 290.266727][T14335] RBP: 00007f2b27d6a090 R08: 0000000000000000 R09: 0000000000000000 [ 290.266740][T14335] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 290.266752][T14335] R13: 00007f2b271e6038 R14: 00007f2b271e5fa0 R15: 00007fffc362e3e8 [ 290.266769][T14335] [ 296.809478][T14517] netlink: 20 bytes leftover after parsing attributes in process `syz.0.6848'. [ 298.555493][T14557] netlink: 20 bytes leftover after parsing attributes in process `syz.2.6858'. [ 299.791605][T14608] netlink: 20 bytes leftover after parsing attributes in process `syz.0.6892'. [ 302.944099][T14716] netlink: 20 bytes leftover after parsing attributes in process `syz.1.6946'. [ 304.069744][T14736] netlink: 20 bytes leftover after parsing attributes in process `syz.2.6955'. [ 306.114813][T14837] netlink: 4 bytes leftover after parsing attributes in process `syz.4.7005'. [ 306.639752][T14862] netlink: 20 bytes leftover after parsing attributes in process `syz.2.7019'. [ 307.203690][ T36] audit: type=1400 audit(1763034928.820:352): avc: denied { mount } for pid=14903 comm="syz.1.7037" name="/" dev="configfs" ino=281 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 307.300861][ T36] audit: type=1400 audit(1763034928.820:353): avc: denied { search } for pid=14903 comm="syz.1.7037" name="/" dev="configfs" ino=281 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 307.359224][ T36] audit: type=1400 audit(1763034928.820:354): avc: denied { read } for pid=14903 comm="syz.1.7037" name="/" dev="configfs" ino=281 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 307.429136][ T36] audit: type=1400 audit(1763034928.820:355): avc: denied { open } for pid=14903 comm="syz.1.7037" path="/" dev="configfs" ino=281 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 307.499132][ T36] audit: type=1400 audit(1763034928.950:356): avc: denied { remount } for pid=14906 comm="syz.1.7038" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 308.054855][ T36] audit: type=1400 audit(1763034929.670:357): avc: denied { getopt } for pid=14923 comm="syz.0.7044" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 308.142483][ T36] audit: type=1400 audit(1763034929.670:358): avc: denied { read } for pid=14923 comm="syz.0.7044" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 308.445282][T14936] FAULT_INJECTION: forcing a failure. [ 308.445282][T14936] name failslab, interval 1, probability 0, space 0, times 0 [ 308.475512][T14936] CPU: 0 UID: 0 PID: 14936 Comm: syz.0.7053 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 308.475545][T14936] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 308.475558][T14936] Call Trace: [ 308.475565][T14936] [ 308.475574][T14936] __dump_stack+0x21/0x30 [ 308.475605][T14936] dump_stack_lvl+0x10c/0x190 [ 308.475627][T14936] ? __cfi_dump_stack_lvl+0x10/0x10 [ 308.475651][T14936] ? avc_has_perm+0x144/0x220 [ 308.475681][T14936] dump_stack+0x19/0x20 [ 308.475703][T14936] should_fail_ex+0x3d9/0x530 [ 308.475723][T14936] should_failslab+0xac/0x100 [ 308.475743][T14936] kmem_cache_alloc_noprof+0x42/0x430 [ 308.475760][T14936] ? inc_rlimit_get_ucounts+0x3fb/0x470 [ 308.475786][T14936] ? __sigqueue_alloc+0x15e/0x2b0 [ 308.475808][T14936] __sigqueue_alloc+0x15e/0x2b0 [ 308.475831][T14936] __send_signal_locked+0x19d/0xb90 [ 308.475851][T14936] ? __kasan_check_write+0x18/0x20 [ 308.475882][T14936] ? __task_pid_nr_ns+0x1e2/0x280 [ 308.475903][T14936] send_signal_locked+0x428/0x5a0 [ 308.475924][T14936] do_send_sig_info+0xdb/0x220 [ 308.475958][T14936] send_sig+0x5f/0x70 [ 308.475977][T14936] sk_stream_error+0xb6/0x130 [ 308.476003][T14936] tcp_sendmsg_locked+0x42e0/0x4b40 [ 308.476029][T14936] ? __asan_memcpy+0x5a/0x80 [ 308.476048][T14936] ? __kasan_check_write+0x18/0x20 [ 308.476073][T14936] ? _raw_spin_lock_bh+0x90/0x120 [ 308.476096][T14936] ? __cfi__raw_spin_lock_bh+0x10/0x10 [ 308.476117][T14936] ? kstrtouint_from_user+0xfb/0x150 [ 308.476132][T14936] ? x64_sys_call+0xe69/0x2ee0 [ 308.476157][T14936] ? _raw_spin_unlock_bh+0x54/0x60 [ 308.476176][T14936] ? lock_sock_nested+0x1f5/0x290 [ 308.476192][T14936] ? __cfi_tcp_sendmsg_locked+0x10/0x10 [ 308.476212][T14936] ? __kasan_check_write+0x18/0x20 [ 308.476235][T14936] ? proc_fail_nth_write+0x17e/0x210 [ 308.476257][T14936] ? __cfi_tcp_sendmsg+0x10/0x10 [ 308.476280][T14936] tcp_sendmsg+0x3e/0xe0 [ 308.476303][T14936] ? __cfi_tcp_sendmsg+0x10/0x10 [ 308.476323][T14936] inet_sendmsg+0xb7/0x120 [ 308.476337][T14936] __sys_sendto+0x588/0x6f0 [ 308.476356][T14936] ? __cfi___sys_sendto+0x10/0x10 [ 308.476377][T14936] ? __kasan_check_write+0x18/0x20 [ 308.476400][T14936] ? __cfi_ksys_write+0x10/0x10 [ 308.476416][T14936] ? fd_install+0x175/0x2e0 [ 308.476434][T14936] __x64_sys_sendto+0xe9/0x100 [ 308.476456][T14936] x64_sys_call+0x2c2c/0x2ee0 [ 308.476478][T14936] do_syscall_64+0x58/0xf0 [ 308.476498][T14936] ? clear_bhb_loop+0x50/0xa0 [ 308.476517][T14936] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 308.476533][T14936] RIP: 0033:0x7f2b26f8f6c9 [ 308.476547][T14936] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 308.476563][T14936] RSP: 002b:00007f2b27d6a038 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 308.476582][T14936] RAX: ffffffffffffffda RBX: 00007f2b271e5fa0 RCX: 00007f2b26f8f6c9 [ 308.476595][T14936] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 308.476606][T14936] RBP: 00007f2b27d6a090 R08: 0000000000000000 R09: 0000000000000000 [ 308.476618][T14936] R10: 0000000000000805 R11: 0000000000000246 R12: 0000000000000001 [ 308.476628][T14936] R13: 00007f2b271e6038 R14: 00007f2b271e5fa0 R15: 00007fffc362e3e8 [ 308.476642][T14936] [ 311.163964][T15020] can0: slcan on ttyS3. [ 311.174827][ T36] audit: type=1400 audit(1763034932.790:359): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 311.232149][T15020] can0 (unregistered): slcan off ttyS3. [ 311.249441][ T36] audit: type=1400 audit(1763034932.820:360): avc: denied { search } for pid=149 comm="dhcpcd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 311.324357][ T36] audit: type=1400 audit(1763034932.820:361): avc: denied { read } for pid=149 comm="dhcpcd" name="n15" dev="tmpfs" ino=12990 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 311.848096][T15069] overlayfs: failed to clone lowerpath [ 312.423267][T15099] rust_binder: Error while translating object. [ 312.423323][T15099] rust_binder: Failure in copy_transaction_data: BR_FAILED_REPLY { source: EINVAL } [ 312.439541][T15099] rust_binder: Transaction failed: BR_FAILED_REPLY { source: EINVAL } my_pid:974 [ 312.742665][ T36] kauditd_printk_skb: 13 callbacks suppressed [ 312.742689][ T36] audit: type=1400 audit(1763034934.360:375): avc: denied { setopt } for pid=15120 comm="syz.2.7134" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 313.567193][T15197] can0: slcan on ttyS3. [ 313.635362][T15196] can0 (unregistered): slcan off ttyS3. [ 313.649457][T15211] FAULT_INJECTION: forcing a failure. [ 313.649457][T15211] name failslab, interval 1, probability 0, space 0, times 0 [ 313.669141][T15211] CPU: 0 UID: 0 PID: 15211 Comm: syz.0.7174 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 313.669181][T15211] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 313.669193][T15211] Call Trace: [ 313.669200][T15211] [ 313.669209][T15211] __dump_stack+0x21/0x30 [ 313.669240][T15211] dump_stack_lvl+0x10c/0x190 [ 313.669262][T15211] ? __cfi_dump_stack_lvl+0x10/0x10 [ 313.669288][T15211] dump_stack+0x19/0x20 [ 313.669310][T15211] should_fail_ex+0x3d9/0x530 [ 313.669330][T15211] should_failslab+0xac/0x100 [ 313.669350][T15211] kmem_cache_alloc_noprof+0x42/0x430 [ 313.669368][T15211] ? vm_area_alloc+0x3f/0x1a0 [ 313.669388][T15211] vm_area_alloc+0x3f/0x1a0 [ 313.669414][T15211] mmap_region+0xb89/0x1bc0 [ 313.669434][T15211] ? __cfi_mmap_region+0x10/0x10 [ 313.669453][T15211] ? __kasan_check_read+0x15/0x20 [ 313.669477][T15211] ? arch_get_unmapped_area_topdown+0x232/0x8d0 [ 313.669500][T15211] ? file_mmap_ok+0x147/0x1a0 [ 313.669517][T15211] do_mmap+0xb6d/0x13c0 [ 313.669534][T15211] ? __cfi_do_mmap+0x10/0x10 [ 313.669550][T15211] ? down_write_killable+0xe9/0x2d0 [ 313.669569][T15211] ? __cfi_down_write_killable+0x10/0x10 [ 313.669590][T15211] vm_mmap_pgoff+0x38f/0x4e0 [ 313.669608][T15211] ? __cfi_vm_mmap_pgoff+0x10/0x10 [ 313.669625][T15211] ? __fget_files+0x2c5/0x340 [ 313.669644][T15211] ksys_mmap_pgoff+0x166/0x1e0 [ 313.669661][T15211] __x64_sys_mmap+0x121/0x140 [ 313.669686][T15211] x64_sys_call+0x13bf/0x2ee0 [ 313.669707][T15211] do_syscall_64+0x58/0xf0 [ 313.669725][T15211] ? clear_bhb_loop+0x50/0xa0 [ 313.669743][T15211] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 313.669758][T15211] RIP: 0033:0x7f2b26f8f6c9 [ 313.669773][T15211] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 313.669787][T15211] RSP: 002b:00007f2b27d6a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 313.669806][T15211] RAX: ffffffffffffffda RBX: 00007f2b271e5fa0 RCX: 00007f2b26f8f6c9 [ 313.669818][T15211] RDX: 0000000000000000 RSI: 0000000000002000 RDI: 0000200000003000 [ 313.669829][T15211] RBP: 00007f2b27d6a090 R08: 0000000000000005 R09: 00000000ffffd000 [ 313.669840][T15211] R10: 0000000002000011 R11: 0000000000000246 R12: 0000000000000001 [ 313.669851][T15211] R13: 00007f2b271e6038 R14: 00007f2b271e5fa0 R15: 00007fffc362e3e8 [ 313.669864][T15211] [ 315.188887][T15308] FAULT_INJECTION: forcing a failure. [ 315.188887][T15308] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 315.228157][T15308] CPU: 0 UID: 0 PID: 15308 Comm: syz.1.7210 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 315.228194][T15308] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 315.228206][T15308] Call Trace: [ 315.228213][T15308] [ 315.228223][T15308] __dump_stack+0x21/0x30 [ 315.228251][T15308] dump_stack_lvl+0x10c/0x190 [ 315.228272][T15308] ? __cfi_dump_stack_lvl+0x10/0x10 [ 315.228294][T15308] ? check_stack_object+0x12c/0x140 [ 315.228310][T15308] dump_stack+0x19/0x20 [ 315.228327][T15308] should_fail_ex+0x3d9/0x530 [ 315.228344][T15308] should_fail+0xf/0x20 [ 315.228357][T15308] should_fail_usercopy+0x1e/0x30 [ 315.228374][T15308] _copy_to_user+0x24/0xa0 [ 315.228396][T15308] simple_read_from_buffer+0xed/0x160 [ 315.228419][T15308] proc_fail_nth_read+0x19e/0x210 [ 315.228444][T15308] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 315.228467][T15308] ? bpf_lsm_file_permission+0xd/0x20 [ 315.228492][T15308] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 315.228515][T15308] vfs_read+0x27d/0xc70 [ 315.228532][T15308] ? __cfi_vfs_read+0x10/0x10 [ 315.228548][T15308] ? __kasan_check_write+0x18/0x20 [ 315.228575][T15308] ? mutex_lock+0x92/0x1c0 [ 315.228592][T15308] ? __cfi_mutex_lock+0x10/0x10 [ 315.228608][T15308] ? __fget_files+0x2c5/0x340 [ 315.228629][T15308] ksys_read+0x141/0x250 [ 315.228646][T15308] ? __cfi_ksys_read+0x10/0x10 [ 315.228665][T15308] ? __kasan_check_read+0x15/0x20 [ 315.228691][T15308] __x64_sys_read+0x7f/0x90 [ 315.228709][T15308] x64_sys_call+0x2638/0x2ee0 [ 315.228734][T15308] do_syscall_64+0x58/0xf0 [ 315.228756][T15308] ? clear_bhb_loop+0x50/0xa0 [ 315.228776][T15308] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 315.228794][T15308] RIP: 0033:0x7fe6ed78e0dc [ 315.228810][T15308] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 315.228826][T15308] RSP: 002b:00007fe6ee617030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 315.228848][T15308] RAX: ffffffffffffffda RBX: 00007fe6ed9e5fa0 RCX: 00007fe6ed78e0dc [ 315.228863][T15308] RDX: 000000000000000f RSI: 00007fe6ee6170a0 RDI: 0000000000000007 [ 315.228875][T15308] RBP: 00007fe6ee617090 R08: 0000000000000000 R09: 0000000000000000 [ 315.228888][T15308] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 315.228900][T15308] R13: 00007fe6ed9e6038 R14: 00007fe6ed9e5fa0 R15: 00007ffee9035be8 [ 315.228917][T15308] [ 318.105088][ T293] bridge_slave_1: left allmulticast mode [ 318.112460][ T293] bridge_slave_1: left promiscuous mode [ 318.139142][ T293] bridge0: port 2(bridge_slave_1) entered disabled state [ 318.146973][ T293] bridge_slave_0: left allmulticast mode [ 318.159307][ T293] bridge_slave_0: left promiscuous mode [ 318.169150][ T293] bridge0: port 1(bridge_slave_0) entered disabled state [ 318.319201][ T293] tipc: Left network mode [ 318.326247][ T293] veth1_macvtap: left promiscuous mode [ 318.339315][ T293] veth0_vlan: left promiscuous mode [ 318.448019][T15454] bridge0: port 1(bridge_slave_0) entered blocking state [ 318.455186][T15454] bridge0: port 1(bridge_slave_0) entered disabled state [ 318.466607][T15454] bridge_slave_0: entered allmulticast mode [ 318.475310][T15454] bridge_slave_0: entered promiscuous mode [ 318.491784][T15454] bridge0: port 2(bridge_slave_1) entered blocking state [ 318.498945][T15454] bridge0: port 2(bridge_slave_1) entered disabled state [ 318.506307][T15454] bridge_slave_1: entered allmulticast mode [ 318.512703][T15454] bridge_slave_1: entered promiscuous mode [ 318.683756][T15454] bridge0: port 2(bridge_slave_1) entered blocking state [ 318.690853][T15454] bridge0: port 2(bridge_slave_1) entered forwarding state [ 318.698143][T15454] bridge0: port 1(bridge_slave_0) entered blocking state [ 318.705249][T15454] bridge0: port 1(bridge_slave_0) entered forwarding state [ 318.719522][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 318.737773][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 318.803724][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 318.810829][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 318.846960][ T60] bridge0: port 2(bridge_slave_1) entered blocking state [ 318.854075][ T60] bridge0: port 2(bridge_slave_1) entered forwarding state [ 318.897810][T15454] veth0_vlan: entered promiscuous mode [ 318.922545][T15454] veth1_macvtap: entered promiscuous mode [ 318.966720][ T36] audit: type=1400 audit(1763034940.580:376): avc: denied { mount } for pid=15454 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 319.409808][T15547] overlayfs: failed to clone lowerpath [ 319.891514][ T293] bridge_slave_1: left allmulticast mode [ 319.898827][ T293] bridge_slave_1: left promiscuous mode [ 319.914801][ T293] bridge0: port 2(bridge_slave_1) entered disabled state [ 319.929699][ T293] bridge_slave_0: left allmulticast mode [ 319.939158][ T293] bridge_slave_0: left promiscuous mode [ 319.944915][ T293] bridge0: port 1(bridge_slave_0) entered disabled state [ 320.094066][ T293] veth1_macvtap: left promiscuous mode [ 320.119351][ T293] veth0_vlan: left promiscuous mode [ 320.295907][T15577] bridge0: port 1(bridge_slave_0) entered blocking state [ 320.319131][T15577] bridge0: port 1(bridge_slave_0) entered disabled state [ 320.326551][T15577] bridge_slave_0: entered allmulticast mode [ 320.349544][T15577] bridge_slave_0: entered promiscuous mode [ 320.369513][T15577] bridge0: port 2(bridge_slave_1) entered blocking state [ 320.376765][T15577] bridge0: port 2(bridge_slave_1) entered disabled state [ 320.389309][T15577] bridge_slave_1: entered allmulticast mode [ 320.395691][T15577] bridge_slave_1: entered promiscuous mode [ 320.552763][T15577] bridge0: port 2(bridge_slave_1) entered blocking state [ 320.559865][T15577] bridge0: port 2(bridge_slave_1) entered forwarding state [ 320.567141][T15577] bridge0: port 1(bridge_slave_0) entered blocking state [ 320.574201][T15577] bridge0: port 1(bridge_slave_0) entered forwarding state [ 320.647681][ T293] bridge0: port 1(bridge_slave_0) entered disabled state [ 320.674721][ T293] bridge0: port 2(bridge_slave_1) entered disabled state [ 320.706481][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 320.713688][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 320.731645][ T293] bridge0: port 2(bridge_slave_1) entered blocking state [ 320.738744][ T293] bridge0: port 2(bridge_slave_1) entered forwarding state [ 320.792281][T15577] veth0_vlan: entered promiscuous mode [ 320.805576][T15577] veth1_macvtap: entered promiscuous mode [ 321.182753][T15662] overlayfs: failed to clone lowerpath [ 323.631724][ T60] bridge_slave_1: left allmulticast mode [ 323.652946][ T60] bridge_slave_1: left promiscuous mode [ 323.658620][ T60] bridge0: port 2(bridge_slave_1) entered disabled state [ 323.679887][ T60] bridge_slave_0: left allmulticast mode [ 323.690618][ T60] bridge_slave_0: left promiscuous mode [ 323.705694][ T60] bridge0: port 1(bridge_slave_0) entered disabled state [ 323.821294][ T60] veth1_macvtap: left promiscuous mode [ 323.826952][ T60] veth0_vlan: left promiscuous mode [ 323.975196][T15883] bridge0: port 1(bridge_slave_0) entered blocking state [ 323.994715][T15883] bridge0: port 1(bridge_slave_0) entered disabled state [ 324.009148][T15883] bridge_slave_0: entered allmulticast mode [ 324.034634][T15883] bridge_slave_0: entered promiscuous mode [ 324.049816][T15883] bridge0: port 2(bridge_slave_1) entered blocking state [ 324.071195][T15883] bridge0: port 2(bridge_slave_1) entered disabled state [ 324.078401][T15883] bridge_slave_1: entered allmulticast mode [ 324.099543][T15883] bridge_slave_1: entered promiscuous mode [ 324.256791][T15883] bridge0: port 2(bridge_slave_1) entered blocking state [ 324.263894][T15883] bridge0: port 2(bridge_slave_1) entered forwarding state [ 324.271246][T15883] bridge0: port 1(bridge_slave_0) entered blocking state [ 324.278307][T15883] bridge0: port 1(bridge_slave_0) entered forwarding state [ 324.314929][ T60] bridge0: port 1(bridge_slave_0) entered disabled state [ 324.323050][ T60] bridge0: port 2(bridge_slave_1) entered disabled state [ 324.342081][ T60] bridge0: port 1(bridge_slave_0) entered blocking state [ 324.349187][ T60] bridge0: port 1(bridge_slave_0) entered forwarding state [ 324.390295][ T60] bridge0: port 2(bridge_slave_1) entered blocking state [ 324.397364][ T60] bridge0: port 2(bridge_slave_1) entered forwarding state [ 324.426168][T15883] veth0_vlan: entered promiscuous mode [ 324.441164][T15883] veth1_macvtap: entered promiscuous mode [ 324.631630][T15968] overlayfs: overlapping lowerdir path [ 325.102479][ T293] bridge_slave_1: left allmulticast mode [ 325.108179][ T293] bridge_slave_1: left promiscuous mode [ 325.139856][ T293] bridge0: port 2(bridge_slave_1) entered disabled state [ 325.148689][ T293] bridge_slave_0: left allmulticast mode [ 325.159838][ T293] bridge_slave_0: left promiscuous mode [ 325.165692][ T293] bridge0: port 1(bridge_slave_0) entered disabled state [ 325.278101][ T293] veth1_macvtap: left promiscuous mode [ 325.289290][ T293] veth0_vlan: left promiscuous mode [ 325.497486][T16032] bridge0: port 1(bridge_slave_0) entered blocking state [ 325.522924][T16032] bridge0: port 1(bridge_slave_0) entered disabled state [ 325.539111][T16032] bridge_slave_0: entered allmulticast mode [ 325.545497][T16032] bridge_slave_0: entered promiscuous mode [ 325.582831][T16032] bridge0: port 2(bridge_slave_1) entered blocking state [ 325.599688][T16032] bridge0: port 2(bridge_slave_1) entered disabled state [ 325.616974][T16032] bridge_slave_1: entered allmulticast mode [ 325.627499][T16032] bridge_slave_1: entered promiscuous mode [ 325.790326][T16032] bridge0: port 2(bridge_slave_1) entered blocking state [ 325.797438][T16032] bridge0: port 2(bridge_slave_1) entered forwarding state [ 325.804782][T16032] bridge0: port 1(bridge_slave_0) entered blocking state [ 325.811854][T16032] bridge0: port 1(bridge_slave_0) entered forwarding state [ 325.882381][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 325.889947][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 325.913172][ T293] bridge0: port 1(bridge_slave_0) entered blocking state [ 325.920361][ T293] bridge0: port 1(bridge_slave_0) entered forwarding state [ 325.959543][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 325.966613][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 326.004898][T16032] veth0_vlan: entered promiscuous mode [ 326.033348][T16032] veth1_macvtap: entered promiscuous mode [ 329.448744][T16348] overlay: Unknown parameter '/' [ 329.712868][T16369] overlay: Unknown parameter '/' [ 330.449111][T16399] overlay: Unknown parameter '/' [ 330.909312][T16477] overlayfs: overlapping lowerdir path [ 331.458573][T16543] overlayfs: overlapping lowerdir path [ 335.600063][T16795] overlayfs: overlapping lowerdir path [ 335.920306][T16825] overlayfs: overlapping lowerdir path [ 338.169176][T17008] overlayfs: overlapping lowerdir path [ 342.890249][T17259] overlayfs: overlapping lowerdir path [ 343.151432][T17283] overlayfs: overlapping lowerdir path [ 343.291695][T17303] overlayfs: overlapping lowerdir path [ 343.540102][T17331] overlayfs: overlapping lowerdir path [ 375.917616][ T6140] bridge_slave_1: left allmulticast mode [ 375.923325][ T6140] bridge_slave_1: left promiscuous mode [ 375.928947][ T6140] bridge0: port 2(bridge_slave_1) entered disabled state [ 375.959505][ T6140] bridge_slave_0: left allmulticast mode [ 375.965193][ T6140] bridge_slave_0: left promiscuous mode [ 375.979123][ T6140] bridge0: port 1(bridge_slave_0) entered disabled state [ 376.111350][ T6140] veth1_macvtap: left promiscuous mode [ 376.116904][ T6140] veth0_vlan: left promiscuous mode [ 376.320313][T19807] bridge0: port 1(bridge_slave_0) entered blocking state [ 376.337531][T19807] bridge0: port 1(bridge_slave_0) entered disabled state [ 376.345911][T19807] bridge_slave_0: entered allmulticast mode [ 376.365473][T19807] bridge_slave_0: entered promiscuous mode [ 376.379479][T19807] bridge0: port 2(bridge_slave_1) entered blocking state [ 376.386527][T19807] bridge0: port 2(bridge_slave_1) entered disabled state [ 376.418590][T19807] bridge_slave_1: entered allmulticast mode [ 376.433829][T19807] bridge_slave_1: entered promiscuous mode [ 376.611332][T19807] bridge0: port 2(bridge_slave_1) entered blocking state [ 376.618391][T19807] bridge0: port 2(bridge_slave_1) entered forwarding state [ 376.625720][T19807] bridge0: port 1(bridge_slave_0) entered blocking state [ 376.632789][T19807] bridge0: port 1(bridge_slave_0) entered forwarding state [ 376.731220][ T60] bridge0: port 1(bridge_slave_0) entered disabled state [ 376.738528][ T60] bridge0: port 2(bridge_slave_1) entered disabled state [ 376.758490][ T6140] bridge0: port 1(bridge_slave_0) entered blocking state [ 376.765553][ T6140] bridge0: port 1(bridge_slave_0) entered forwarding state [ 376.782421][ T60] bridge0: port 2(bridge_slave_1) entered blocking state [ 376.789492][ T60] bridge0: port 2(bridge_slave_1) entered forwarding state [ 376.845750][T19807] veth0_vlan: entered promiscuous mode [ 376.879655][T19807] veth1_macvtap: entered promiscuous mode [ 387.659565][ T293] bridge_slave_1: left allmulticast mode [ 387.665238][ T293] bridge_slave_1: left promiscuous mode [ 387.671247][ T293] bridge0: port 2(bridge_slave_1) entered disabled state [ 387.678982][ T293] bridge_slave_0: left allmulticast mode [ 387.684726][ T293] bridge_slave_0: left promiscuous mode [ 387.699117][ T293] bridge0: port 1(bridge_slave_0) entered disabled state [ 387.829848][T20692] bridge0: port 1(bridge_slave_0) entered blocking state [ 387.836906][T20692] bridge0: port 1(bridge_slave_0) entered disabled state [ 387.844560][T20692] bridge_slave_0: entered allmulticast mode [ 387.851042][T20692] bridge_slave_0: entered promiscuous mode [ 387.857952][ T293] veth1_macvtap: left promiscuous mode [ 387.873495][ T293] veth0_vlan: left promiscuous mode [ 387.997218][T20692] bridge0: port 2(bridge_slave_1) entered blocking state [ 388.009537][T20692] bridge0: port 2(bridge_slave_1) entered disabled state [ 388.016615][T20692] bridge_slave_1: entered allmulticast mode [ 388.029365][T20692] bridge_slave_1: entered promiscuous mode [ 388.150354][T20692] bridge0: port 2(bridge_slave_1) entered blocking state [ 388.157419][T20692] bridge0: port 2(bridge_slave_1) entered forwarding state [ 388.164726][T20692] bridge0: port 1(bridge_slave_0) entered blocking state [ 388.171779][T20692] bridge0: port 1(bridge_slave_0) entered forwarding state [ 388.228313][ T293] bridge0: port 1(bridge_slave_0) entered disabled state [ 388.236239][ T293] bridge0: port 2(bridge_slave_1) entered disabled state [ 388.251008][ T60] bridge0: port 1(bridge_slave_0) entered blocking state [ 388.258059][ T60] bridge0: port 1(bridge_slave_0) entered forwarding state [ 388.268746][ T60] bridge0: port 2(bridge_slave_1) entered blocking state [ 388.275804][ T60] bridge0: port 2(bridge_slave_1) entered forwarding state [ 388.308275][T20692] veth0_vlan: entered promiscuous mode [ 388.322139][T20692] veth1_macvtap: entered promiscuous mode [ 388.564261][ T60] bridge_slave_1: left allmulticast mode [ 388.584133][ T60] bridge_slave_1: left promiscuous mode [ 388.590081][ T60] bridge0: port 2(bridge_slave_1) entered disabled state [ 388.607906][ T60] bridge_slave_0: left allmulticast mode [ 388.614964][ T60] bridge_slave_0: left promiscuous mode [ 388.621554][ T60] bridge0: port 1(bridge_slave_0) entered disabled state [ 388.761269][ T60] veth1_macvtap: left promiscuous mode [ 388.766791][ T60] veth0_vlan: left promiscuous mode [ 388.906102][T20819] bridge0: port 1(bridge_slave_0) entered blocking state [ 388.923347][T20819] bridge0: port 1(bridge_slave_0) entered disabled state [ 388.943646][T20819] bridge_slave_0: entered allmulticast mode [ 388.950300][T20819] bridge_slave_0: entered promiscuous mode [ 388.957049][T20819] bridge0: port 2(bridge_slave_1) entered blocking state [ 388.969336][T20819] bridge0: port 2(bridge_slave_1) entered disabled state [ 388.976426][T20819] bridge_slave_1: entered allmulticast mode [ 388.999476][T20819] bridge_slave_1: entered promiscuous mode [ 389.148976][T20819] bridge0: port 2(bridge_slave_1) entered blocking state [ 389.156058][T20819] bridge0: port 2(bridge_slave_1) entered forwarding state [ 389.163373][T20819] bridge0: port 1(bridge_slave_0) entered blocking state [ 389.170433][T20819] bridge0: port 1(bridge_slave_0) entered forwarding state [ 389.242131][ T293] bridge0: port 1(bridge_slave_0) entered disabled state [ 389.260480][ T293] bridge0: port 2(bridge_slave_1) entered disabled state [ 389.293502][ T60] bridge0: port 1(bridge_slave_0) entered blocking state [ 389.300600][ T60] bridge0: port 1(bridge_slave_0) entered forwarding state [ 389.319615][ T60] bridge0: port 2(bridge_slave_1) entered blocking state [ 389.326676][ T60] bridge0: port 2(bridge_slave_1) entered forwarding state [ 389.375659][T20819] veth0_vlan: entered promiscuous mode [ 389.402297][T20819] veth1_macvtap: entered promiscuous mode [ 389.671456][ T60] bridge_slave_1: left allmulticast mode [ 389.677136][ T60] bridge_slave_1: left promiscuous mode [ 389.702750][ T60] bridge0: port 2(bridge_slave_1) entered disabled state [ 389.729564][ T60] bridge_slave_0: left allmulticast mode [ 389.735243][ T60] bridge_slave_0: left promiscuous mode [ 389.749406][ T60] bridge0: port 1(bridge_slave_0) entered disabled state [ 389.892313][ T60] veth1_macvtap: left promiscuous mode [ 389.897860][ T60] veth0_vlan: left promiscuous mode [ 390.093478][T20918] bridge0: port 1(bridge_slave_0) entered blocking state [ 390.105750][T20918] bridge0: port 1(bridge_slave_0) entered disabled state [ 390.113510][T20918] bridge_slave_0: entered allmulticast mode [ 390.119962][T20918] bridge_slave_0: entered promiscuous mode [ 390.126648][T20918] bridge0: port 2(bridge_slave_1) entered blocking state [ 390.133741][T20918] bridge0: port 2(bridge_slave_1) entered disabled state [ 390.140953][T20918] bridge_slave_1: entered allmulticast mode [ 390.147255][T20918] bridge_slave_1: entered promiscuous mode [ 390.321098][T20918] bridge0: port 2(bridge_slave_1) entered blocking state [ 390.328194][T20918] bridge0: port 2(bridge_slave_1) entered forwarding state [ 390.335533][T20918] bridge0: port 1(bridge_slave_0) entered blocking state [ 390.342574][T20918] bridge0: port 1(bridge_slave_0) entered forwarding state [ 390.410632][ T60] bridge0: port 1(bridge_slave_0) entered disabled state [ 390.418217][ T60] bridge0: port 2(bridge_slave_1) entered disabled state [ 390.451028][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 390.458074][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 390.471434][ T60] bridge0: port 2(bridge_slave_1) entered blocking state [ 390.478499][ T60] bridge0: port 2(bridge_slave_1) entered forwarding state [ 390.540788][T20918] veth0_vlan: entered promiscuous mode [ 390.563281][T20918] veth1_macvtap: entered promiscuous mode [ 401.057705][ T36] audit: type=1400 audit(1763035022.670:377): avc: denied { mounton } for pid=21980 comm="syz.1.10502" path="/syzcgroup/unified/syz1" dev="cgroup2" ino=113 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=dir permissive=1 [ 401.750025][T22063] FAULT_INJECTION: forcing a failure. [ 401.750025][T22063] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 401.789094][T22063] CPU: 0 UID: 0 PID: 22063 Comm: syz.0.10543 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 401.789128][T22063] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 401.789140][T22063] Call Trace: [ 401.789147][T22063] [ 401.789156][T22063] __dump_stack+0x21/0x30 [ 401.789186][T22063] dump_stack_lvl+0x10c/0x190 [ 401.789209][T22063] ? __cfi_dump_stack_lvl+0x10/0x10 [ 401.789233][T22063] ? check_stack_object+0x12c/0x140 [ 401.789252][T22063] dump_stack+0x19/0x20 [ 401.789275][T22063] should_fail_ex+0x3d9/0x530 [ 401.789295][T22063] should_fail+0xf/0x20 [ 401.789313][T22063] should_fail_usercopy+0x1e/0x30 [ 401.789333][T22063] _copy_to_user+0x24/0xa0 [ 401.789356][T22063] simple_read_from_buffer+0xed/0x160 [ 401.789379][T22063] proc_fail_nth_read+0x19e/0x210 [ 401.789404][T22063] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 401.789426][T22063] ? __kasan_check_read+0x15/0x20 [ 401.789453][T22063] ? bpf_lsm_file_permission+0xd/0x20 [ 401.789477][T22063] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 401.789500][T22063] vfs_read+0x27d/0xc70 [ 401.789517][T22063] ? __x64_sys_newfstat+0x80/0x80 [ 401.789540][T22063] ? __cfi_vfs_read+0x10/0x10 [ 401.789556][T22063] ? __kasan_check_write+0x18/0x20 [ 401.789582][T22063] ? mutex_lock+0x92/0x1c0 [ 401.789599][T22063] ? __cfi_mutex_lock+0x10/0x10 [ 401.789624][T22063] ? __fget_files+0x2c5/0x340 [ 401.789645][T22063] ksys_read+0x141/0x250 [ 401.789662][T22063] ? __cfi_ksys_read+0x10/0x10 [ 401.789679][T22063] ? __se_sys_pidfd_open+0x1c4/0x240 [ 401.789702][T22063] ? __kasan_check_read+0x15/0x20 [ 401.789728][T22063] __x64_sys_read+0x7f/0x90 [ 401.789746][T22063] x64_sys_call+0x2638/0x2ee0 [ 401.789771][T22063] do_syscall_64+0x58/0xf0 [ 401.789794][T22063] ? clear_bhb_loop+0x50/0xa0 [ 401.789815][T22063] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 401.789836][T22063] RIP: 0033:0x7f9425d8e0dc [ 401.789853][T22063] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 401.789870][T22063] RSP: 002b:00007f9426c70030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 401.789891][T22063] RAX: ffffffffffffffda RBX: 00007f9425fe5fa0 RCX: 00007f9425d8e0dc [ 401.789905][T22063] RDX: 000000000000000f RSI: 00007f9426c700a0 RDI: 0000000000000006 [ 401.789919][T22063] RBP: 00007f9426c70090 R08: 0000000000000000 R09: 0000000000000000 [ 401.789932][T22063] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 401.789945][T22063] R13: 00007f9425fe6038 R14: 00007f9425fe5fa0 R15: 00007ffde1f15ef8 [ 401.789962][T22063] [ 405.193425][T22255] FAULT_INJECTION: forcing a failure. [ 405.193425][T22255] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 405.220834][T22255] CPU: 0 UID: 0 PID: 22255 Comm: syz.2.10636 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 405.220869][T22255] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 405.220881][T22255] Call Trace: [ 405.220887][T22255] [ 405.220895][T22255] __dump_stack+0x21/0x30 [ 405.220924][T22255] dump_stack_lvl+0x10c/0x190 [ 405.220948][T22255] ? __cfi_dump_stack_lvl+0x10/0x10 [ 405.220972][T22255] ? check_stack_object+0x107/0x140 [ 405.220991][T22255] dump_stack+0x19/0x20 [ 405.221014][T22255] should_fail_ex+0x3d9/0x530 [ 405.221034][T22255] should_fail+0xf/0x20 [ 405.221049][T22255] should_fail_usercopy+0x1e/0x30 [ 405.221070][T22255] _copy_from_user+0x22/0xb0 [ 405.221092][T22255] __sys_connect+0x136/0x440 [ 405.221116][T22255] ? __cfi___sys_connect+0x10/0x10 [ 405.221142][T22255] ? __kasan_check_read+0x15/0x20 [ 405.221167][T22255] __x64_sys_connect+0x7e/0x90 [ 405.221191][T22255] x64_sys_call+0x1c2f/0x2ee0 [ 405.221215][T22255] do_syscall_64+0x58/0xf0 [ 405.221238][T22255] ? clear_bhb_loop+0x50/0xa0 [ 405.221258][T22255] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 405.221278][T22255] RIP: 0033:0x7fc58f78f6c9 [ 405.221304][T22255] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 405.221320][T22255] RSP: 002b:00007fc59064a038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 405.221342][T22255] RAX: ffffffffffffffda RBX: 00007fc58f9e5fa0 RCX: 00007fc58f78f6c9 [ 405.221357][T22255] RDX: 0000000000000010 RSI: 0000200000000180 RDI: 0000000000000007 [ 405.221370][T22255] RBP: 00007fc59064a090 R08: 0000000000000000 R09: 0000000000000000 [ 405.221383][T22255] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 405.221395][T22255] R13: 00007fc58f9e6038 R14: 00007fc58f9e5fa0 R15: 00007ffe84d66208 [ 405.221412][T22255] [ 405.669056][ T36] audit: type=1400 audit(1763035027.280:378): avc: denied { ioctl } for pid=22260 comm="syz.2.10641" path="socket:[111607]" dev="sockfs" ino=111607 ioctlcmd=0x8916 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 405.765328][T22273] random: crng reseeded on system resumption [ 405.766701][ T36] audit: type=1400 audit(1763035027.380:379): avc: denied { write } for pid=22272 comm="syz.0.10646" name="snapshot" dev="devtmpfs" ino=21 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 405.800611][T22275] FAULT_INJECTION: forcing a failure. [ 405.800611][T22275] name failslab, interval 1, probability 0, space 0, times 0 [ 405.813428][T22275] CPU: 0 UID: 0 PID: 22275 Comm: syz.2.10647 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 405.813455][T22275] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 405.813466][T22275] Call Trace: [ 405.813473][T22275] [ 405.813479][T22275] __dump_stack+0x21/0x30 [ 405.813506][T22275] dump_stack_lvl+0x10c/0x190 [ 405.813525][T22275] ? __cfi_dump_stack_lvl+0x10/0x10 [ 405.813547][T22275] dump_stack+0x19/0x20 [ 405.813566][T22275] should_fail_ex+0x3d9/0x530 [ 405.813583][T22275] should_failslab+0xac/0x100 [ 405.813601][T22275] __kmalloc_cache_noprof+0x41/0x490 [ 405.813617][T22275] ? io_ring_ctx_alloc+0x61/0x1e10 [ 405.813639][T22275] ? vfs_write+0x93e/0xf30 [ 405.813654][T22275] io_ring_ctx_alloc+0x61/0x1e10 [ 405.813674][T22275] ? __cfi_vfs_write+0x10/0x10 [ 405.813689][T22275] io_uring_create+0x2e0/0x13d0 [ 405.813711][T22275] __se_sys_io_uring_setup+0x24b/0x260 [ 405.813732][T22275] ? __x64_sys_io_uring_setup+0x80/0x80 [ 405.813754][T22275] ? __kasan_check_read+0x15/0x20 [ 405.813777][T22275] __x64_sys_io_uring_setup+0x5f/0x80 [ 405.813797][T22275] x64_sys_call+0x22c0/0x2ee0 [ 405.813819][T22275] do_syscall_64+0x58/0xf0 [ 405.813840][T22275] ? clear_bhb_loop+0x50/0xa0 [ 405.813860][T22275] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 405.813879][T22275] RIP: 0033:0x7fc58f78f6c9 [ 405.813895][T22275] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 405.813910][T22275] RSP: 002b:00007fc590649fc8 EFLAGS: 00000206 ORIG_RAX: 00000000000001a9 [ 405.813928][T22275] RAX: ffffffffffffffda RBX: 00007fc58f9e5fa0 RCX: 00007fc58f78f6c9 [ 405.813942][T22275] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 00000000000028fc [ 405.813955][T22275] RBP: 0000200000000040 R08: 0000000000000000 R09: 0000000000000000 [ 405.813968][T22275] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 405.813979][T22275] R13: 0000000000000000 R14: 00000000000028fc R15: 0000000000000000 [ 405.813992][T22275] [ 406.025604][T22287] rust_binder: Failed to allocate buffer. len:136, is_oneway:false [ 406.169824][T22310] capability: warning: `syz.2.10662' uses 32-bit capabilities (legacy support in use) [ 407.540075][T22418] FAULT_INJECTION: forcing a failure. [ 407.540075][T22418] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 407.559177][T22418] CPU: 0 UID: 0 PID: 22418 Comm: syz.2.10706 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 407.559212][T22418] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 407.559224][T22418] Call Trace: [ 407.559230][T22418] [ 407.559238][T22418] __dump_stack+0x21/0x30 [ 407.559268][T22418] dump_stack_lvl+0x10c/0x190 [ 407.559291][T22418] ? __cfi_dump_stack_lvl+0x10/0x10 [ 407.559315][T22418] ? check_stack_object+0x107/0x140 [ 407.559334][T22418] dump_stack+0x19/0x20 [ 407.559356][T22418] should_fail_ex+0x3d9/0x530 [ 407.559376][T22418] should_fail+0xf/0x20 [ 407.559394][T22418] should_fail_usercopy+0x1e/0x30 [ 407.559414][T22418] _copy_from_user+0x22/0xb0 [ 407.559437][T22418] __sys_connect+0x136/0x440 [ 407.559460][T22418] ? __cfi___sys_connect+0x10/0x10 [ 407.559486][T22418] ? __kasan_check_read+0x15/0x20 [ 407.559512][T22418] __x64_sys_connect+0x7e/0x90 [ 407.559535][T22418] x64_sys_call+0x1c2f/0x2ee0 [ 407.559560][T22418] do_syscall_64+0x58/0xf0 [ 407.559583][T22418] ? clear_bhb_loop+0x50/0xa0 [ 407.559604][T22418] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 407.559624][T22418] RIP: 0033:0x7fc58f78f6c9 [ 407.559641][T22418] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 407.559658][T22418] RSP: 002b:00007fc59064a038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 407.559679][T22418] RAX: ffffffffffffffda RBX: 00007fc58f9e5fa0 RCX: 00007fc58f78f6c9 [ 407.559695][T22418] RDX: 0000000000000010 RSI: 0000200000000180 RDI: 0000000000000006 [ 407.559709][T22418] RBP: 00007fc59064a090 R08: 0000000000000000 R09: 0000000000000000 [ 407.559722][T22418] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 407.559735][T22418] R13: 00007fc58f9e6038 R14: 00007fc58f9e5fa0 R15: 00007ffe84d66208 [ 407.559751][T22418] [ 408.330078][T22442] FAULT_INJECTION: forcing a failure. [ 408.330078][T22442] name failslab, interval 1, probability 0, space 0, times 0 [ 408.359440][T22442] CPU: 0 UID: 0 PID: 22442 Comm: syz.0.10727 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 408.359472][T22442] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 408.359484][T22442] Call Trace: [ 408.359489][T22442] [ 408.359497][T22442] __dump_stack+0x21/0x30 [ 408.359528][T22442] dump_stack_lvl+0x10c/0x190 [ 408.359549][T22442] ? __cfi_dump_stack_lvl+0x10/0x10 [ 408.359573][T22442] dump_stack+0x19/0x20 [ 408.359594][T22442] should_fail_ex+0x3d9/0x530 [ 408.359612][T22442] should_failslab+0xac/0x100 [ 408.359631][T22442] kmem_cache_alloc_lru_noprof+0x44/0x430 [ 408.359648][T22442] ? sock_alloc_inode+0x48/0x150 [ 408.359669][T22442] ? __kasan_check_write+0x18/0x20 [ 408.359694][T22442] sock_alloc_inode+0x48/0x150 [ 408.359713][T22442] ? __cfi_sock_alloc_inode+0x10/0x10 [ 408.359731][T22442] alloc_inode+0x7a/0x270 [ 408.359751][T22442] ? bpf_lsm_socket_create+0xd/0x20 [ 408.359773][T22442] new_inode_pseudo+0x19/0x40 [ 408.359793][T22442] __sock_create+0x130/0x810 [ 408.359815][T22442] __sys_socket+0xe2/0x1c0 [ 408.359837][T22442] __x64_sys_socket+0x7e/0x90 [ 408.359857][T22442] x64_sys_call+0x2608/0x2ee0 [ 408.359880][T22442] do_syscall_64+0x58/0xf0 [ 408.359900][T22442] ? clear_bhb_loop+0x50/0xa0 [ 408.359919][T22442] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 408.359937][T22442] RIP: 0033:0x7f9425d8f6c9 [ 408.359952][T22442] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 408.359976][T22442] RSP: 002b:00007f9426c70038 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 408.359996][T22442] RAX: ffffffffffffffda RBX: 00007f9425fe5fa0 RCX: 00007f9425d8f6c9 [ 408.360011][T22442] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000002 [ 408.360023][T22442] RBP: 00007f9426c70090 R08: 0000000000000000 R09: 0000000000000000 [ 408.360036][T22442] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 408.360048][T22442] R13: 00007f9425fe6038 R14: 00007f9425fe5fa0 R15: 00007ffde1f15ef8 [ 408.360064][T22442] [ 408.360088][T22442] socket: no more sockets [ 408.986051][T22487] FAULT_INJECTION: forcing a failure. [ 408.986051][T22487] name failslab, interval 1, probability 0, space 0, times 0 [ 408.998771][T22487] CPU: 0 UID: 0 PID: 22487 Comm: syz.4.10747 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 408.998803][T22487] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 408.998816][T22487] Call Trace: [ 408.998823][T22487] [ 408.998831][T22487] __dump_stack+0x21/0x30 [ 408.998861][T22487] dump_stack_lvl+0x10c/0x190 [ 408.998885][T22487] ? __cfi_dump_stack_lvl+0x10/0x10 [ 408.998910][T22487] ? avc_has_perm+0x144/0x220 [ 408.998935][T22487] dump_stack+0x19/0x20 [ 408.998957][T22487] should_fail_ex+0x3d9/0x530 [ 408.998976][T22487] should_failslab+0xac/0x100 [ 408.998997][T22487] kmem_cache_alloc_noprof+0x42/0x430 [ 408.999015][T22487] ? inc_rlimit_get_ucounts+0x3fb/0x470 [ 408.999037][T22487] ? __sigqueue_alloc+0x15e/0x2b0 [ 408.999056][T22487] __sigqueue_alloc+0x15e/0x2b0 [ 408.999075][T22487] __send_signal_locked+0x19d/0xb90 [ 408.999090][T22487] ? __kasan_check_write+0x18/0x20 [ 408.999112][T22487] ? __task_pid_nr_ns+0x1e2/0x280 [ 408.999132][T22487] send_signal_locked+0x428/0x5a0 [ 408.999150][T22487] do_send_sig_info+0xdb/0x220 [ 408.999172][T22487] send_sig+0x5f/0x70 [ 408.999192][T22487] sk_stream_error+0xb6/0x130 [ 408.999220][T22487] tcp_sendmsg_locked+0x42e0/0x4b40 [ 408.999248][T22487] ? __asan_memcpy+0x5a/0x80 [ 408.999268][T22487] ? __kasan_check_write+0x18/0x20 [ 408.999290][T22487] ? _raw_spin_lock_bh+0x90/0x120 [ 408.999310][T22487] ? __cfi__raw_spin_lock_bh+0x10/0x10 [ 408.999334][T22487] ? kstrtouint_from_user+0xfb/0x150 [ 408.999350][T22487] ? x64_sys_call+0xe69/0x2ee0 [ 408.999378][T22487] ? _raw_spin_unlock_bh+0x54/0x60 [ 408.999402][T22487] ? lock_sock_nested+0x1f5/0x290 [ 408.999423][T22487] ? __cfi_tcp_sendmsg_locked+0x10/0x10 [ 408.999449][T22487] ? __kasan_check_write+0x18/0x20 [ 408.999476][T22487] ? proc_fail_nth_write+0x17e/0x210 [ 408.999503][T22487] ? __cfi_tcp_sendmsg+0x10/0x10 [ 408.999527][T22487] tcp_sendmsg+0x3e/0xe0 [ 408.999551][T22487] ? __cfi_tcp_sendmsg+0x10/0x10 [ 408.999575][T22487] inet_sendmsg+0xb7/0x120 [ 408.999595][T22487] __sys_sendto+0x588/0x6f0 [ 408.999621][T22487] ? __cfi___sys_sendto+0x10/0x10 [ 408.999656][T22487] ? __kasan_check_write+0x18/0x20 [ 408.999685][T22487] ? __cfi_ksys_write+0x10/0x10 [ 408.999706][T22487] __x64_sys_sendto+0xe9/0x100 [ 408.999731][T22487] x64_sys_call+0x2c2c/0x2ee0 [ 408.999758][T22487] do_syscall_64+0x58/0xf0 [ 408.999781][T22487] ? clear_bhb_loop+0x50/0xa0 [ 408.999805][T22487] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 408.999836][T22487] RIP: 0033:0x7f85ae18f6c9 [ 408.999853][T22487] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 408.999871][T22487] RSP: 002b:00007f85aef54038 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 408.999894][T22487] RAX: ffffffffffffffda RBX: 00007f85ae3e5fa0 RCX: 00007f85ae18f6c9 [ 408.999908][T22487] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 408.999921][T22487] RBP: 00007f85aef54090 R08: 0000000000000000 R09: 0000000000000000 [ 408.999935][T22487] R10: 0000000000000805 R11: 0000000000000246 R12: 0000000000000001 [ 408.999949][T22487] R13: 00007f85ae3e6038 R14: 00007f85ae3e5fa0 R15: 00007ffe5e762748 [ 408.999965][T22487] [ 410.492233][T22577] rust_binder: Failed to allocate buffer. len:1168, is_oneway:true [ 440.711709][ T60] bridge_slave_1: left allmulticast mode [ 440.725842][ T60] bridge_slave_1: left promiscuous mode [ 440.731848][ T60] bridge0: port 2(bridge_slave_1) entered disabled state [ 440.739773][ T60] bridge_slave_0: left allmulticast mode [ 440.745436][ T60] bridge_slave_0: left promiscuous mode [ 440.751571][ T60] bridge0: port 1(bridge_slave_0) entered disabled state [ 440.882768][ T60] veth1_macvtap: left promiscuous mode [ 440.898483][ T60] veth0_vlan: left promiscuous mode [ 440.994915][T24714] bridge0: port 1(bridge_slave_0) entered blocking state [ 441.002050][T24714] bridge0: port 1(bridge_slave_0) entered disabled state [ 441.011321][T24714] bridge_slave_0: entered allmulticast mode [ 441.017597][T24714] bridge_slave_0: entered promiscuous mode [ 441.025536][T24714] bridge0: port 2(bridge_slave_1) entered blocking state [ 441.033136][T24714] bridge0: port 2(bridge_slave_1) entered disabled state [ 441.040251][T24714] bridge_slave_1: entered allmulticast mode [ 441.046572][T24714] bridge_slave_1: entered promiscuous mode [ 441.152512][T24714] bridge0: port 2(bridge_slave_1) entered blocking state [ 441.159605][T24714] bridge0: port 2(bridge_slave_1) entered forwarding state [ 441.166874][T24714] bridge0: port 1(bridge_slave_0) entered blocking state [ 441.173937][T24714] bridge0: port 1(bridge_slave_0) entered forwarding state [ 441.200450][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 441.208076][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 441.225373][ T293] bridge0: port 1(bridge_slave_0) entered blocking state [ 441.232474][ T293] bridge0: port 1(bridge_slave_0) entered forwarding state [ 441.248749][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 441.255820][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 441.285694][T24714] veth0_vlan: entered promiscuous mode [ 441.295566][T24714] veth1_macvtap: entered promiscuous mode [ 450.911599][T25283] bridge0: port 1(bridge_slave_0) entered blocking state [ 450.918660][T25283] bridge0: port 1(bridge_slave_0) entered disabled state [ 450.943027][T25283] bridge_slave_0: entered allmulticast mode [ 450.949417][T25283] bridge_slave_0: entered promiscuous mode [ 450.956244][T25283] bridge0: port 2(bridge_slave_1) entered blocking state [ 450.963301][T25283] bridge0: port 2(bridge_slave_1) entered disabled state [ 450.970420][T25283] bridge_slave_1: entered allmulticast mode [ 450.976760][T25283] bridge_slave_1: entered promiscuous mode [ 451.121675][ T60] bridge_slave_1: left allmulticast mode [ 451.127365][ T60] bridge_slave_1: left promiscuous mode [ 451.139147][ T60] bridge0: port 2(bridge_slave_1) entered disabled state [ 451.159557][ T60] bridge_slave_0: left allmulticast mode [ 451.165232][ T60] bridge_slave_0: left promiscuous mode [ 451.179122][ T60] bridge0: port 1(bridge_slave_0) entered disabled state [ 451.281369][T25283] bridge0: port 2(bridge_slave_1) entered blocking state [ 451.288458][T25283] bridge0: port 2(bridge_slave_1) entered forwarding state [ 451.295852][T25283] bridge0: port 1(bridge_slave_0) entered blocking state [ 451.302904][T25283] bridge0: port 1(bridge_slave_0) entered forwarding state [ 451.350866][ T60] veth1_macvtap: left promiscuous mode [ 451.356411][ T60] veth0_vlan: left promiscuous mode [ 451.539763][T25283] veth0_vlan: entered promiscuous mode [ 451.566099][T25283] veth1_macvtap: entered promiscuous mode [ 460.722002][T25809] bridge0: port 1(bridge_slave_0) entered blocking state [ 460.759105][T25809] bridge0: port 1(bridge_slave_0) entered disabled state [ 460.766224][T25809] bridge_slave_0: entered allmulticast mode [ 460.783042][T25809] bridge_slave_0: entered promiscuous mode [ 460.799783][T25809] bridge0: port 2(bridge_slave_1) entered blocking state [ 460.817014][T25809] bridge0: port 2(bridge_slave_1) entered disabled state [ 460.837240][T25809] bridge_slave_1: entered allmulticast mode [ 460.849609][T25809] bridge_slave_1: entered promiscuous mode [ 460.900778][ T6140] bridge_slave_1: left allmulticast mode [ 460.906449][ T6140] bridge_slave_1: left promiscuous mode [ 460.919122][ T6140] bridge0: port 2(bridge_slave_1) entered disabled state [ 460.929653][ T6140] bridge_slave_0: left allmulticast mode [ 460.935318][ T6140] bridge_slave_0: left promiscuous mode [ 460.952028][ T6140] bridge0: port 1(bridge_slave_0) entered disabled state [ 461.109119][ T6140] veth1_macvtap: left promiscuous mode [ 461.114673][ T6140] veth0_vlan: left promiscuous mode [ 461.282323][T25809] bridge0: port 2(bridge_slave_1) entered blocking state [ 461.289408][T25809] bridge0: port 2(bridge_slave_1) entered forwarding state [ 461.296718][T25809] bridge0: port 1(bridge_slave_0) entered blocking state [ 461.303796][T25809] bridge0: port 1(bridge_slave_0) entered forwarding state [ 461.328516][ T60] bridge0: port 1(bridge_slave_0) entered disabled state [ 461.336028][ T60] bridge0: port 2(bridge_slave_1) entered disabled state [ 461.346245][ T293] bridge0: port 1(bridge_slave_0) entered blocking state [ 461.353299][ T293] bridge0: port 1(bridge_slave_0) entered forwarding state [ 461.362976][ T60] bridge0: port 2(bridge_slave_1) entered blocking state [ 461.370028][ T60] bridge0: port 2(bridge_slave_1) entered forwarding state [ 461.433133][T25809] veth0_vlan: entered promiscuous mode [ 461.445424][T25809] veth1_macvtap: entered promiscuous mode [ 467.182417][ T293] bridge_slave_1: left allmulticast mode [ 467.188224][ T293] bridge_slave_1: left promiscuous mode [ 467.194271][ T293] bridge0: port 2(bridge_slave_1) entered disabled state [ 467.202191][ T293] bridge_slave_0: left allmulticast mode [ 467.207841][ T293] bridge_slave_0: left promiscuous mode [ 467.213807][ T293] bridge0: port 1(bridge_slave_0) entered disabled state [ 467.336105][ T293] veth1_macvtap: left promiscuous mode [ 467.346345][ T293] veth0_vlan: left promiscuous mode [ 467.488649][T26288] bridge0: port 1(bridge_slave_0) entered blocking state [ 467.505961][T26288] bridge0: port 1(bridge_slave_0) entered disabled state [ 467.519103][T26288] bridge_slave_0: entered allmulticast mode [ 467.529652][T26288] bridge_slave_0: entered promiscuous mode [ 467.547072][T26288] bridge0: port 2(bridge_slave_1) entered blocking state [ 467.559074][T26288] bridge0: port 2(bridge_slave_1) entered disabled state [ 467.579297][T26288] bridge_slave_1: entered allmulticast mode [ 467.589770][T26288] bridge_slave_1: entered promiscuous mode [ 467.738985][T26288] bridge0: port 2(bridge_slave_1) entered blocking state [ 467.746094][T26288] bridge0: port 2(bridge_slave_1) entered forwarding state [ 467.753404][T26288] bridge0: port 1(bridge_slave_0) entered blocking state [ 467.760459][T26288] bridge0: port 1(bridge_slave_0) entered forwarding state [ 467.791876][ T60] bridge0: port 1(bridge_slave_0) entered disabled state [ 467.799950][ T60] bridge0: port 2(bridge_slave_1) entered disabled state [ 467.809906][ T6140] bridge0: port 1(bridge_slave_0) entered blocking state [ 467.816972][ T6140] bridge0: port 1(bridge_slave_0) entered forwarding state [ 467.837864][ T60] bridge0: port 2(bridge_slave_1) entered blocking state [ 467.844949][ T60] bridge0: port 2(bridge_slave_1) entered forwarding state [ 467.890150][T26288] veth0_vlan: entered promiscuous mode [ 467.919275][T26288] veth1_macvtap: entered promiscuous mode [ 504.569164][ T36] audit: type=1400 audit(1763035126.180:380): avc: denied { read } for pid=28724 comm="poweroff" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 504.731815][ T36] audit: type=1400 audit(1763035126.350:381): avc: denied { execute } for pid=28741 comm="syz.2.13849" path="/445/blkio.bfq.group_wait_time" dev="tmpfs" ino=2693 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 Stopping sshd: stopped /usr/sbin/sshd (pid 201) OK Stopping crond: stopped /usr/sbin/crond (pid 194) OK Stopping dhcpcd... stopped /sbin/dhcpcd (pid 148) Stopping network: [ 505.433959][ T36] audit: type=1400 audit(1763035127.050:382): avc: denied { read write } for pid=28785 comm="ip" path="/dev/console" dev="rootfs" ino=118 scontext=system_u:system_r:ifconfig_t tcontext=system_u:object_r:root_t tclass=chr_file permissive=1 [ 505.490805][ T36] audit: type=1400 audit(1763035127.080:383): avc: denied { unlink } for pid=149 comm="dhcpcd" name="sock" dev="tmpfs" ino=423 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=sock_file permissive=1 OK Stopping iptables: [ 505.609732][ T36] audit: type=1400 audit(1763035127.230:384): avc: denied { read write } for pid=28797 comm="iptables" path="/dev/console" dev="rootfs" ino=118 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:root_t tclass=chr_file permissive=1 OK Stopping system message bus: [ 505.670609][ T36] audit: type=1400 audit(1763035127.250:385): avc: denied { search } for pid=28797 comm="iptables" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 505.693585][ T36] audit: type=1400 audit(1763035127.250:386): avc: denied { write } for pid=28797 comm="iptables" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 505.736306][ T36] audit: type=1400 audit(1763035127.250:387): avc: denied { add_name } for pid=28797 comm="iptables" name="xtables.lock" scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 done [ 505.795395][ T36] audit: type=1400 audit(1763035127.250:388): avc: denied { create } for pid=28797 comm="iptables" name="xtables.lock" scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 505.822496][ T36] audit: type=1400 audit(1763035127.250:389): avc: denied { read open } for pid=28797 comm="iptables" path="/run/xtables.lock" dev="tmpfs" ino=17846 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 Stopping klogd: OK Stopping acpid: OK Stopping syslogd: stopped /sbin/syslogd (pid 92) OK umount: can't remount debugfs read-only Connection to 10.128.0.192 closed by remote host. umount: sysfs busy - remounted read-only umount: devtmpfs busy - remounted read-only umount: c[ 507.771496][ T293] bridge_slave_1: left allmulticast mode [ 507.777173][ T293] bridge_slave_1: left promiscuous mode [ 507.782834][ T293] bridge0: port 2(bridge_slave_1) entered disabled state [ 507.790221][ T293] bridge_slave_0: left allmulticast mode [ 507.795844][ T293] bridge_slave_0: left promiscuous mode [ 507.801556][ T293] bridge0: port 1(bridge_slave_0) entered disabled state [ 507.940505][ T293] veth1_macvtap: left promiscuous mode [ 507.946017][ T293] veth0_vlan: left promiscuous mode [ 508.240091][ T293] bridge_slave_1: left allmulticast mode [ 508.245741][ T293] bridge_slave_1: left promiscuous mode [ 508.251370][ T293] bridge0: port 2(bridge_slave_1) entered disabled state [ 508.258707][ T293] bridge_slave_0: left allmulticast mode [ 508.264421][ T293] bridge_slave_0: left promiscuous mode [ 508.270021][ T293] bridge0: port 1(bridge_slave_0) entered disabled state [ 508.277463][ T293] bridge_slave_1: left allmulticast mode [ 508.283118][ T293] bridge_slave_1: left promiscuous mode [ 508.288675][ T293] bridge0: port 2(bridge_slave_1) entered disabled state [ 508.296007][ T293] bridge_slave_0: left allmulticast mode [ 508.301662][ T293] bridge_slave_0: left promiscuous mode [ 508.307221][ T293] bridge0: port 1(bridge_slave_0) entered disabled state [ 508.314867][ T293] bridge_slave_1: left allmulticast mode [ 508.320534][ T293] bridge_slave_1: left promiscuous mode [ 508.326113][ T293] bridge0: port 2(bridge_slave_1) entered disabled state [ 508.333534][ T293] bridge_slave_0: left allmulticast mode [ 508.339225][ T293] bridge_slave_0: left promiscuous mode [ 508.344787][ T293] bridge0: port 1(bridge_slave_0) entered disabled state [ 508.613038][ T293] veth1_macvtap: left promiscuous mode [ 508.618557][ T293] veth0_vlan: left promiscuous mode [ 508.624044][ T293] veth1_macvtap: left promiscuous mode [ 508.629552][ T293] veth0_vlan: left promiscuous mode [ 508.635016][ T293] veth1_macvtap: left promiscuous mode [ 508.640509][ T293] veth0_vlan: left promiscuous mode Sent SIGKILL to all processes Requesting system poweroff [ 509.749571][T28906] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 509.756228][T28906] ACPI: PM: Preparing to enter system sleep state S5 [ 509.763117][T28906] kvm: exiting hardware virtualization [ 509.768599][T28906] reboot: Power down serialport: VM disconnected.