last executing test programs:
1.70039832s ago: executing program 0 (id=13825):
rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300))
rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300))
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0)
write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0)
syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00')
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0)
sendto$inet(r2, 0x0, 0x0, 0x80, 0x0, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0)
pselect6(0x40, &(0x7f0000000040)={0xdf2, 0x400, 0x6, 0x3ff, 0x1, 0x9, 0x7, 0xf}, 0x0, 0x0, 0x0, 0x0)
1.337860506s ago: executing program 2 (id=13829):
rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000140))
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0)
write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0)
write$UHID_CREATE2(r2, &(0x7f0000000340)=ANY=[], 0x118)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r4, 0x0)
r5 = socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4})
sendmmsg$inet6(r5, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0)
write(r3, 0x0, 0x0)
r6 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendmmsg$inet6(r6, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4)
r7 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendmmsg$inet6(r7, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0)
syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1)
1.336417317s ago: executing program 0 (id=13831):
rt_sigaction(0xd, 0x0, 0x0, 0x8, &(0x7f0000000140))
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0)
write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0)
write$UHID_CREATE2(r2, &(0x7f0000000340)=ANY=[], 0x118)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r3, 0x0)
r4 = socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4})
sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0)
r5 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1)
getsockopt$nfc_llcp(r5, 0x118, 0x0, 0x0, 0x0)
1.328782577s ago: executing program 2 (id=13832):
rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000140))
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0)
write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES64=r0], 0x118)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0)
write$UHID_CREATE2(r2, &(0x7f0000000340)=ANY=[], 0x118)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r4, 0x0)
r5 = socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4})
sendmmsg$inet6(r5, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0)
write(r3, 0x0, 0x0)
r6 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1)
getsockopt$nfc_llcp(r6, 0x118, 0x0, 0x0, 0x0)
1.267864533s ago: executing program 2 (id=13834):
rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000140))
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0)
write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0)
write$UHID_CREATE2(r2, &(0x7f0000000340)=ANY=[], 0x118)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r4, 0x0)
r5 = socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4})
sendmmsg$inet6(r5, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0)
write(r3, 0x0, 0x0)
r6 = socket$inet6_tcp(0xa, 0x1, 0x0)
syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00')
ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4})
sendmmsg$inet6(r6, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0)
syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1)
1.220817888s ago: executing program 1 (id=13836):
rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000140))
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0)
write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0)
write$UHID_CREATE2(r2, &(0x7f0000000340)=ANY=[], 0x118)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r4, 0x0)
r5 = socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, 0x0)
sendmmsg$inet6(r5, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0)
write(r3, 0x0, 0x0)
r6 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendmmsg$inet6(r6, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4)
syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1)
1.219663608s ago: executing program 2 (id=13837):
rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300))
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0)
write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4})
sendmmsg$inet6(r2, &(0x7f00000028c0)=[{{&(0x7f0000000040)={0xa, 0x4e23, 0x7ff, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x89}, 0x1c, &(0x7f00000002c0)=[{&(0x7f00000000c0)="b4e9b035ba9df5b55f82aeeeaa1ca0a5cc33d437216db3d7aa98a266d86887439837dff75b8cd255bc56d25b0b34cafab49255cdbc923a3b5eaf259be631e419f53240602cc6b58bdc64395f718c06914bb657f0d9cb47afc663bbfb0aa78d0584fe7ae92e38618bf322e2467f3ec8c1bb7cdd42a6a3c6934b228b19cf31117b8bb50923f8d714ebb14d4f0463c93aa010b91cc5376444d75269b64205e1b03ccb558d1837", 0xa5}, {&(0x7f00000001c0)="64c2cdd83f747b28d462b5291346f152491fce8029fa614902949c5041ee", 0x1e}, {&(0x7f0000000200)="f6609cd90dd79d61f7978a09be40003e027d8c468ea77fc5844f768854e435be48aa613b3e221f18333df55c0f7e289b784295cdce5e7ac5fe8cb626ec884b424a39c0bebd32b077d70b76d59cea7bbf0378eba9cf91dbe308cf6f53c5a690b40637b7336e54068a10006f327dec59dcc28658a98e7c1394b07c590a84580391db35cd0ffae47675a7ce48064fcdd43a801658", 0x93}], 0x3, &(0x7f00000003c0)=[@rthdr_2292={{0x78, 0x29, 0x39, {0x73, 0xc, 0x0, 0x3, 0x0, [@dev={0xfe, 0x80, '\x00', 0x25}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @dev={0xfe, 0x80, '\x00', 0xe}, @empty, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}]}}}], 0x78}}, {{&(0x7f0000000480)={0xa, 0x4e23, 0x7, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x20}}, 0x3}, 0x1c, &(0x7f0000001e80)=[{&(0x7f0000002000)="380d58f87b2b0fa17b12bd010002e54ad6f761d44a60ab09994bef593231b16b48dd68c3e7f9ccab474b4e40b85aa3f3cd8ac401bd40a1c029b6a1ed74c510d4b6fa1faab5d55a5e6e1a4dd758179104332fad775b6608393431fee7f0220088140bbc90139fef7de9ba788cf016742f01fa8873870089b803610bf857414113e2722621bfe137212503ff9c68a8ac7cff", 0x91}, {&(0x7f00000020c0)="03d67b66df99ca3218188802ce7b46a68be270d105e867bed64d2f86aad7e006896b7ffb728879c91212a006913f952d4239dff4597e3daa2e054b23e5c63639ccbb001ef5832d034a46bb049fdb20d0efbd39cb06c8679fad2799f2f95e5a2244808da2a854b4d2301b91f2d4aad3ce72a33fed36ec2f0f9150d4a3a2022b46bd17249f01a14a0892b3ce2a8cd28a7faf491a5621dfab9f63794f98de3dd8815e72a0c64c9c6f7529458be99812802532c94c67959d2cdc9790c07558573a8c3697111b92defd5d", 0xc8}, {&(0x7f00000021c0)="4110c1e7ab3be8380caf2e625f04ba10011b15f2658aef4da3701661e013a7e405545d5d8c72c7ce3aaab9e61986100731edf6c56b3a0a5fb1b9f0febabdc54f2d5247c1145a5052e9d64976e404d951986554eaec2d1b8a35f3a1b94fbb17fc0a572fc26bbc5042161ce1d4738123280267dd7f3ac8e1906c3c43e9241cf3b062ed8e91c9187fc617da2f6ffb4f47979b9fc75a7cde7c025beecc7f7e55b72adc5da45ad54e00c2bd87100a735a34f5403c69fb34a1fca5", 0xb8}, {&(0x7f0000002280)="60f0c4ea06706bc2c8f27feebedc7987bccc281246bdd6d9befc90ade9be98a1c58eded9ba7ea56e18d6aea3f163e0c8bf87c4253cf8f87f389911e1a4d260395e8f", 0x42}], 0x4, &(0x7f0000002300)=[@rthdrdstopts={{0x98, 0x29, 0x37, {0x8, 0xf, '\x00', [@generic={0x8, 0x60, "52528e387196320ce7f2d1579f889590b52558df84d9da5f569b94efbe56193ab69bb290185e1bcc1488f8f14ba65ade97e4be2b0da07a419468cdcc06c857d24fca825c00be1c7b6289871ad4306606056265a421e4fd8c1d9873f06c2ea966"}, @enc_lim={0x4, 0x1, 0x4}, @ra={0x5, 0x2, 0x6}, @hao={0xc9, 0x10, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}]}}}, @dstopts_2292={{0x20, 0x29, 0x4, {0x67, 0x0, '\x00', [@enc_lim={0x4, 0x1, 0x6}]}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x7f}}, @tclass={{0x14, 0x29, 0x43, 0x8}}, @hopopts_2292={{0x30, 0x29, 0x36, {0x2f, 0x2, '\x00', [@hao={0xc9, 0x10, @mcast2}]}}}, @dstopts_2292={{0x68, 0x29, 0x4, {0x6c, 0x9, '\x00', [@jumbo={0xc2, 0x4, 0x3ff}, @jumbo={0xc2, 0x4, 0x17}, @padn={0x1, 0x1, [0x0]}, @calipso={0x7, 0x10, {0x0, 0x2, 0xd7, 0x400, [0x7f]}}, @calipso={0x7, 0x18, {0x3, 0x4, 0x8, 0x7fff, [0x4, 0x6]}}, @hao={0xc9, 0x10, @private0={0xfc, 0x0, '\x00', 0x1}}]}}}, @dstopts={{0x110, 0x29, 0x37, {0x21a215957bce0569, 0x1f, '\x00', [@hao={0xc9, 0x10, @loopback}, @generic={0xf9, 0xce, "dbbe9049f0dfbb7dc5fcaef70eccdbe5392e785772b02e7cde61c2f0467b263e13b0023eeb0fe04d0496b706374d001de7315f34805ec6a033c4103d91e4187c1d951d273eeb9f0d3d166599d61253affbabc964355f8a90da4444acfa05b36f39b67d34342117067e7b96876eedd9c1088a514c41514b349b5b626b16103b80b3005d41603dbdf424013af939497ab1bca76ef69d181cf6c3f61259b1e4f37dbcee278966616470aeba01d29b01e88541aafda4466dc88f950576a9673583e518161a755c40aefda364ff0c5f1e"}, @hao={0xc9, 0x10, @private1}, @padn={0x1, 0x2, [0x0, 0x0]}]}}}], 0x290}}, {{&(0x7f00000025c0)={0xa, 0x4e22, 0x4, @mcast1, 0x92}, 0x1c, &(0x7f0000002880)=[{&(0x7f0000002600)="e054295837d5df5d19f8ceaac308f5249896547a9e00eea7e27cbe1e1f800ddae52be987c4a177fc8bb8", 0x2a}, {&(0x7f0000002640)="448084f7eb52b81fbf80f364e5d6b576911dc5c95ef373ae8eb4db3e64feb0f0e6f8a59abf98b2fcaa4f7289eadd57f4ac0e180e9890ee661b511c4bdfde4a8bc6c488b219c84cdb76b8e1f784c6d83e13c5e94770e6025471e7c5896eb0c7e16a87f8edfdc5b4ba7d382b993371fea6b820f7217b1f32a2b53bcdb2487dc26fc5c8ece29f53c4b42fd4146d7a98911e8e906cc3ca14d09fff5eb99a5c76add8a70a76b5c69374a9c015ad3eca5d40ef472a1e77ba7231633e285f21b45c6821e61fd2f455c33fd15c0ba8fa19488b4556b5b19711969a1bd9d1d878c569bc475d4a1c68b60867031b16", 0xea}, {&(0x7f0000002740)="3ecf85e08ef0601f172612db6f6e98e027eb0baf761ce7d1628b83594ff7083e17054bf157649adc844861cd784a6c546cd6f6e94794917d3bf3040be5f021d81c934ce0894ebcab626400a7e7a0", 0x4e}, {&(0x7f00000027c0)="6da0e48cc996d3943fe574e82d02850d56a2fd77f304907a8b3c21f2df200b35c9172a22a5374c069e098cbee7e3719f0ffb61c94d9921c2d5f24c6251a7b6c88f26e5a4bf055e9185cc79c88e7dadf44727a525537dbde49770ae348783a73016c553b0a7724145ab570eed377aa3e6c7f919f855ab5021f6e0bfd1502df1caba825084e8129cbcad2a9c87a310dd5bca5fbfff3bc9b74bd5988340fe26b7087014acb81a2145cc98", 0xa9}], 0x4}}], 0x3, 0x4)
socket$inet6_tcp(0xa, 0x1, 0x0)
sendmmsg$inet6(r2, &(0x7f0000001f00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000004c0)={0xa, 0x4e24, 0x8, @mcast2}, 0x1c, &(0x7f0000001900)=[{&(0x7f0000000740)="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", 0x1000}, {&(0x7f0000000500)="5896bc6199075d04d9d50b38aa3f461e9bd7893a26fe147eae8a02d17767128b45817a051196256f42dc7d4f4425ce9555041862ef5ef262f563faa7dedc1273b2c1c6493d0c41fe32e3ff1cee90ae3b0cc0971d2d08351c8a86305518d1889ece9fda57cc2474c58c36a13a9e876a949b1447819587cdd32b14b3a4e2809a16ebdc0c1a8fa5bbe6055974520e58552e37967cdecfb0806e31abbfab860660cacc3cfcd06d40f61f4d82b9a45095b0abc758a17f63531258ecb8422d5fd544d850e31b7122e05d468cb4515eeb2712383a7555413ad94177af195ba3c3e31856ed9ddf91751547dcc5f6b1", 0xeb}, {&(0x7f0000000600)="8fb6a55f9c81d7cf7fba7777ec3c1e5ba26d5a79b185b2c07d02b701ea7b9637c152eb66b8e99bcd1e947e8314a2672c85eafe5df6634942331ab8949b30883d", 0x40}, {&(0x7f0000000640)="f95c", 0x2}, {&(0x7f0000001740)="8d2b4c3cd3e07104a5a4c97b17fcb7d728cccb891b6223167966a408858b1e123bb56994317e1cf3aa8aef7b2089f4cd6958327c926053b58b6220cf405fb2b1e136e85daa31be11441bbda3cdd44da9156e7592127c81eec8db11738ac1ac9a5a62e21cfb1bda2fb10422cf4381d606ada9b7b5c6516e42109d46d312d301262084ad06c8d39d746e3433ffac843d840e6513f04a48726229912a8e3593d3ce216958c0b2c3d2484a", 0xa9}, {&(0x7f0000001800)="67c5f90b0f655b3aeefc9dda9d28caf11dab0e7c347d43244af8c46ca506988d3e92d26912dc97c748f007f044883b51779ebbef1e92fcf4e8730b0b9c1501e496e34c552661e286a460e26a9d15ef92dd0328afad35937d6e71a56f4f200ffd48afc2a011da570246a667b93b8b7706d781f1d1e8b7fb5634ed29fd02d2fd616a1e927b16148a75cddbbe6211456279b64787084c18e2344e09c86640d0e39ad451f6d821241366acef578ca79920d505bd323f0c0ad16f39f15994627a9dd7bdc8ceee998c45e138e9ab896abec5baec7089", 0xd3}, {&(0x7f0000000680)="2fe70bdf23f6e1de3d202bdff776ecadbb4e41675b08090a497b81420c0a573a7ac6942cc90d79146e36a9c4388fb526c2cc12c11c277682", 0x38}], 0x7, &(0x7f0000001980)=[@rthdr_2292={{0x88, 0x29, 0x39, {0x3a, 0xe, 0x2, 0x3, 0x0, [@mcast2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private1, @ipv4={'\x00', '\xff\xff', @broadcast}, @ipv4={'\x00', '\xff\xff', @broadcast}, @mcast2, @remote]}}}, @rthdr_2292={{0x78, 0x29, 0x39, {0x84, 0xc, 0x0, 0x3, 0x0, [@ipv4={'\x00', '\xff\xff', @broadcast}, @empty, @ipv4={'\x00', '\xff\xff', @multicast1}, @local, @dev={0xfe, 0x80, '\x00', 0x36}, @remote]}}}, @hopopts={{0x30, 0x29, 0x36, {0x1d, 0x3, '\x00', [@pad1, @pad1, @hao={0xc9, 0x10, @private0={0xfc, 0x0, '\x00', 0x1}}]}}}], 0x130}}, {{&(0x7f00000006c0)={0xa, 0x4e22, 0xff, @ipv4={'\x00', '\xff\xff', @empty}, 0x3fb400}, 0x1c, &(0x7f0000001c80)=[{&(0x7f0000001ac0)="65d646418043ca40dd15fb83046d60e6461ef3fc30711437d2bc955b0cd894edd25c08d2fb07832262dbda0aa30321776054dd56145a3ae543e13df36555b4c2485e94af5901ad7d80de91d9add40a657fff789f23c6ad174fceec2179cdcc8c43161b92e88a88f8f8555f93f19743bde8edf0ce2c9952c0ce883e232331", 0x7e}, {&(0x7f0000001b40)="53b7129beb3e789ac3b10d894889c8d0660ffbaa4b6c0bbe4925f54ad5efdf22660aefddf223a1eb9669a0828e6af811251be60413abf21b20dcccf22711693bc742e2248b7dcf7a32cf4dedce97753ca8d4573bbe83be3f5289911ef2509a354755469262e77cc747795f00", 0x6c}, {&(0x7f0000001bc0)="5adcd5c20050d3cf98975b1212f31c3cfffa9fa5593ca2815b05af37efb7821bef0a4696628f4113f0a0b50c5e5c70a68caed72e88a877ecb8c38e7d12072fc8dbfb590aa4f869ed41f557f11f2e78ef531fb7ee9c76d3f12ccaea8a0b478a02cc11c5d57f3d9c82cf76b7b3fdc03ab754d68c2038449cb3d4820ef82c4b3d057d9cab7e0c856245c0c644f91f36797ca794765b8cf1533f305894615c531901", 0xa0}], 0x3, &(0x7f0000001cc0)=[@hoplimit_2292={{0x14, 0x29, 0x8, 0x9}}, @rthdrdstopts={{0x28, 0x29, 0x37, {0x0, 0x1, '\x00', [@jumbo={0xc2, 0x4, 0x3dd}, @ra={0x5, 0x2, 0x73c4}]}}}], 0x40}}, {{&(0x7f0000001d00)={0xa, 0x4e23, 0x2, @local, 0x1}, 0x1c, &(0x7f0000001ec0)=[{&(0x7f0000001d40)="81605c2a929a560d0342f7de3dc5e74c89523e5a66376bcfedcb6110ca1dedc49bf98f6025374b90b3cc4442fc931edafeb9aa174660af0a471de773f5fa189a8ba7f9a0552427e98d3146a444f561310b0bc6d474753baa1bfb6583a13f6c8ce23cc0336fe21095", 0x68}, {&(0x7f0000001dc0)="0b8eb8fec48dd10376f931611dcaee009301e6a9f9dcaeb4f32da66786b7cd90245b6304ff3fceb0f1b5840d8eb8c6efd9135245194a7d7a97cbfabb215da680d548d3bd914d7c6e6f69dd1ad1c0380f62856ea6868fa8c5219bd1e8fc40aedad085ea8ab5c7d796216e4cf9b7111661604b3fa49a9f568c48e96be772c5aa17caa8ca92dfb30b16bb3aeccd4bfc51df9a287e5c0e8c452122c5b716b60a02436aaafc7a2cbb422fe568b5be8704da", 0xaf}, {&(0x7f0000001e80)}], 0x3}}], 0x4, 0x20048005)
rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300))
process_madvise(0xffffffffffffffff, &(0x7f0000002a40)=[{&(0x7f0000000440)="72fa6d5ac622bc3c14321c8fe14c2af7976dc38fef21e6a7253f02e3508977bbeaf73570d41073548d1328e9bbd673c8e469fe", 0x33}, {&(0x7f0000002980)="e09c420521e511260065ee4fc91dff82c9edadbe72f47f5a59e15c7073e56046f89b22816ede57499a4abd1556c4f6c1ab5a34efec042ac0b52cbe68fc4be12190f6f407640d32d4bf8041beeb3c850dbd3c34fdb258964df8a11d96136e5bf87f0eec2dd76d4609bf0e29902c0c497f6f298a3df71759449a1c3ed476a62a6bc73280", 0x83}], 0x2, 0x0, 0x0)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0)
write$UHID_CREATE2(r4, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r4, @ANYRES64=r3], 0x118)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r4, 0x0)
ioctl$KVM_X86_SETUP_MCE(r4, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4})
sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4)
r5 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x200, 0x0)
ioctl$PTP_ENABLE_PPS(r5, 0x40043d04, 0x1)
r6 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendmmsg$inet6(r6, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4)
r7 = socket$inet6(0xa, 0x800000000000002, 0x0)
setsockopt$SO_TIMESTAMPING(r7, 0x1, 0x41, &(0x7f0000000340)=0x63ba, 0x4)
r8 = add_key$keyring(&(0x7f00000000c0), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff)
keyctl$KEYCTL_MOVE(0x1e, r8, 0x0, 0x0, 0x1)
keyctl$setperm(0x5, r8, 0x20000000)
sendmmsg$inet6(r7, &(0x7f0000000380)=[{{&(0x7f0000000700)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0}}], 0x1, 0x0)
1.00013434s ago: executing program 0 (id=13839):
rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000140))
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0)
write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8=r1, @ANYRES64=r0], 0x118)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0)
write$UHID_CREATE2(r2, &(0x7f0000000340)=ANY=[], 0x118)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r4, 0x0)
r5 = socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4})
sendmmsg$inet6(r5, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0)
write(r3, 0x0, 0x0)
r6 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendmmsg$inet6(r6, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4)
r7 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendmmsg$inet6(r7, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0)
r8 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1)
getsockopt$nfc_llcp(r8, 0x118, 0x0, 0x0, 0x0)
997.772851ms ago: executing program 2 (id=13840):
rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300))
rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300))
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0)
write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0)
syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00')
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0)
sendto$inet(r2, 0x0, 0x0, 0x80, 0x0, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0)
pselect6(0x40, &(0x7f0000000040)={0xdf2, 0x400, 0x6, 0x3ff, 0x1, 0x9, 0x7, 0xf}, 0x0, 0x0, 0x0, 0x0)
864.599534ms ago: executing program 0 (id=13844):
rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000140))
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0)
write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8=r1, @ANYRES64=r0], 0x118)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0)
write$UHID_CREATE2(r2, &(0x7f0000000340)=ANY=[], 0x118)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r4, 0x0)
r5 = socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4})
sendmmsg$inet6(r5, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0)
write(r3, 0x0, 0x0)
r6 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1)
getsockopt$nfc_llcp(r6, 0x118, 0x0, 0x0, 0x0)
844.134096ms ago: executing program 0 (id=13846):
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0)
write$UHID_CREATE2(r1, &(0x7f0000000200)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r0, @ANYBLOB="47d64848b0fc3c40747ab749ed8868c43e5c1dd90bff6b29f334852d882eaa15a7b2a4e48e30311570b408fec36f25d90503c684484b9850a34de35f"], 0x118)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0)
r2 = syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00')
ioctl$KVM_X86_SETUP_MCE(r2, 0x4008ae9c, &(0x7f00000000c0)={0xc, 0x526d630517582f26, 0x4})
r3 = socket$inet_tcp(0x2, 0x1, 0x0)
sendto$inet(r3, 0x0, 0x0, 0x805, 0x0, 0x0)
rt_sigaction(0x34, &(0x7f00000001c0)={&(0x7f0000000180)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x1]}}, 0x0, 0x8, &(0x7f0000000300))
r4 = socket$inet6_tcp(0xa, 0x1, 0x0)
rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300))
r5 = socket$inet6_tcp(0xa, 0x1, 0x0)
r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='hugetlb.1GB.usage_in_bytes\x00', 0x275a, 0x0)
write$UHID_CREATE2(r6, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r6, @ANYRES64=r5], 0x118)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r6, 0x0)
ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4})
r7 = socket$inet_tcp(0x2, 0x1, 0x0)
sendto$inet(r7, 0x0, 0x0, 0x805, 0x0, 0x0)
r8 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendmmsg$inet6(r8, &(0x7f0000000440)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8014)
sendmmsg$inet6(r8, &(0x7f00000075c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40804)
r9 = socket(0xa, 0x3, 0x3a)
setsockopt$MRT6_INIT(r9, 0x29, 0xc8, &(0x7f0000000000), 0x4)
r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0)
write$UHID_CREATE2(r10, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r10, @ANYRES64=r4], 0x118)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r10, 0x0)
ioctl$KVM_X86_SETUP_MCE(r10, 0x4008ae9c, &(0x7f0000000000)={0x9c, 0x526d630517582f25, 0x4})
sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4)
socket$inet_tcp(0x2, 0x1, 0x0)
604.79587ms ago: executing program 1 (id=13852):
rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300))
socket$inet6_tcp(0xa, 0x1, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0)
write$UHID_CREATE2(r0, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8=0x0, @ANYRES8=r0], 0x118)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4})
sendmmsg$inet6(r1, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0)
write(r2, 0x0, 0x0)
r4 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4)
sendmmsg$inet6(r1, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4)
r5 = socket$inet_tcp(0x2, 0x1, 0x0)
sendto$inet(r5, 0x0, 0x0, 0x805, 0x0, 0x0)
449.326456ms ago: executing program 3 (id=13857):
rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300))
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0)
write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0)
ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4})
sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4)
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0)
sendto$inet(r2, 0x0, 0x0, 0x80, 0x0, 0x0)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4})
sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4)
r4 = socket$inet6_tcp(0xa, 0x1, 0x0)
syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00')
ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4})
sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4)
socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)) (fail_nth: 1)
387.883211ms ago: executing program 1 (id=13858):
rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300))
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0)
write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8=0x0, @ANYRES8=r1, @ANYRES64=r0], 0x118)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4})
sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0)
write(r0, 0x0, 0x0)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4)
r4 = socket$inet6_tcp(0xa, 0x1, 0x0)
r5 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendmmsg$inet6(r5, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0)
write(r4, 0x0, 0x0)
r6 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendmmsg$inet6(r6, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4)
sendmmsg$inet6(r3, &(0x7f0000000500), 0x0, 0x4)
r7 = socket$inet_tcp(0x2, 0x1, 0x0)
sendto$inet(r7, 0x0, 0x0, 0x805, 0x0, 0x0)
324.851018ms ago: executing program 1 (id=13859):
rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000140))
socket$inet6_tcp(0xa, 0x1, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0)
write$UHID_CREATE2(r0, &(0x7f0000000340)=ANY=[], 0x118)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0)
write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[], 0x118)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r3, 0x0)
r4 = socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4})
sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0)
write(r2, 0x0, 0x0)
r5 = socket$inet6_tcp(0xa, 0x1, 0x0)
syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00')
ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4})
sendmmsg$inet6(r5, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0)
r6 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1)
getsockopt$nfc_llcp(r6, 0x118, 0x0, 0x0, 0x0)
260.044144ms ago: executing program 1 (id=13860):
rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000140))
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0)
write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0)
write$UHID_CREATE2(r2, &(0x7f0000000340)=ANY=[], 0x118)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r4, 0x0)
r5 = socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4})
sendmmsg$inet6(r5, 0x0, 0x0, 0x0)
write(r3, 0x0, 0x0)
r6 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendmmsg$inet6(r6, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4)
syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1)
255.105485ms ago: executing program 1 (id=13861):
rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x24000]}}, 0x0, 0x8, &(0x7f0000000300))
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0)
write$UHID_CREATE2(r0, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYRES8, @ANYRESDEC, @ANYRES64=r0], 0x118)
mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6c, 0x4010, 0xffffffffffffffff, 0x1000)
ioctl$KVM_X86_SETUP_MCE(r0, 0x4008ae9c, &(0x7f0000000000)={0x1b, 0x526d630517582f26, 0x4})
rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0xfffffffffffffffe]}}, 0x0, 0x8, &(0x7f0000000300))
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0)
write$UHID_CREATE2(r2, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8=0x0, @ANYRES8=r2, @ANYRES64=r1], 0x118)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r2, 0x0)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x3, 0x4})
sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x884)
write(r1, 0x0, 0x0)
r4 = socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$KVM_X86_SETUP_MCE(r2, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27})
sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4)
rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000140))
r5 = socket$inet6_tcp(0xa, 0x1, 0x0)
r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0)
write$UHID_CREATE2(r6, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r6, @ANYRES64=r5], 0x118)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r6, 0x0)
ioctl$KVM_X86_SETUP_MCE(r6, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4})
sendmmsg$inet6(r5, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4)
r7 = socket$inet_tcp(0x2, 0x1, 0x0)
sendto$inet(r7, 0x0, 0x0, 0x805, 0x0, 0x0)
r8 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendmmsg$inet6(r8, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0)
r9 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendmmsg$inet6(r9, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4)
104.55479ms ago: executing program 2 (id=13862):
mount(0x0, &(0x7f0000000100)='.\x00', &(0x7f0000000080)='proc\x00', 0x189, 0x0)
rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000140))
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0)
write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0)
ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4})
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
r4 = socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4})
sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0)
write(r3, 0x0, 0x0)
sendto$inet(r2, 0x0, 0x0, 0x80, 0x0, 0x0)
sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4)
r5 = socket$unix(0x1, 0x2, 0x0)
connect$unix(r5, &(0x7f0000000080)=@abs={0x0, 0x0, 0x4e22}, 0x6e)
104.26193ms ago: executing program 0 (id=13863):
rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000140))
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0)
write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0)
write$UHID_CREATE2(r3, &(0x7f0000000340)=ANY=[], 0x118)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r3, 0x0)
r4 = socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4})
sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0)
write(r2, 0x0, 0x0)
r5 = socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4})
sendmmsg$inet6(r5, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x1, 0xc0)
sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4)
r6 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendmmsg$inet6(r6, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0)
syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_clone(0x2100000, &(0x7f00000000c0)="412177bb514c277d5bb06473bd2801be77cef4289643f361d2b8db3729cdd9af4233f6ee972b35f9c8a7be435034b0dc949681e392648a5b2590eb790b6cd0f39cdf4acae4fd0d8f2687a8195b6bac2a52d3e7", 0x53, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="b47c9e46a33a830d83217ace74371e1649b4c9d1888774fb63e0aad74ad613ecb11762ae65c894de7f49df3b3ee278446a6e621674aa9da8818c7b0df10a8580ebe327ed899f9f2cab45658456abd16818b3986842785bda1c3b961d66ec22578d9095ec44eb1e545852a91ebcad07e6afe402729528c6953826729cdf012ae5d1f75a13338014e83d1c196ddb761fa960afc90949358722b62448742378089e8d480550dcb204e9192a71e2358d6d6b05a5a994ac82d22d1b2d72b5fbbe92b471f7f56e29531098a0cdd9ce7ef61725f47096431fddadb529f431008b")
104.06274ms ago: executing program 3 (id=13864):
rt_sigaction(0x2024, &(0x7f0000000180)={&(0x7f0000000100)="ca00d14e0f38f6b90300000041ef196ec866400fe2de0fae4e0ac4c1e16df3f2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x4]}}, 0x0, 0x8, &(0x7f0000000040)) (async)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0)
write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) (async)
ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) (async)
sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4)
socket$inet_tcp(0x2, 0x1, 0x0) (async, rerun: 32)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0) (async, rerun: 32)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0) (async)
rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c12020", 0x44000004, 0x0}, 0x0, 0x8, &(0x7f0000000300)) (async, rerun: 64)
r4 = socket$inet6_tcp(0xa, 0x1, 0x0) (async, rerun: 64)
r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0)
write$UHID_CREATE2(r5, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r5, @ANYRES64=r4], 0x118) (async, rerun: 64)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r5, 0x0) (rerun: 64)
r6 = socket$inet_tcp(0x2, 0x1, 0x0) (async, rerun: 32)
r7 = socket$inet6_tcp(0xa, 0x1, 0x0) (async, rerun: 32)
r8 = socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) (async)
sendmmsg$inet6(r8, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) (async)
write(r7, 0x0, 0x0) (async, rerun: 32)
sendto$inet(r6, 0x0, 0x0, 0x80, 0x0, 0x0) (async, rerun: 32)
r9 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendmmsg$inet6(r9, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x110916a37d76b8a6}}], 0x1, 0x200440c4)
r10 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendmmsg$inet6(r10, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4)
pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0), 0x0) (async)
ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) (async)
sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) (async)
write(r2, 0x0, 0x0)
90.274521ms ago: executing program 3 (id=13865):
socket$inet6_tcp(0xa, 0x1, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0)
write$UHID_CREATE2(r0, &(0x7f00000001c0)=ANY=[@ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRES8=r0, @ANYRES16=0x0], 0x118)
rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300))
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0)
rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000100))
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0)
write$UHID_CREATE2(r3, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r3, @ANYRES64=r2], 0x118)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r3, 0x0)
r4 = socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4})
sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4)
r5 = socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4})
sendmmsg$inet6(r5, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4)
r6 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendmmsg$inet6(r6, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4)
write$P9_RMKNOD(r4, 0x0, 0x0)
mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0xfffffffd)
write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[], 0x118)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0)
ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4})
r7 = socket$inet_tcp(0x2, 0x1, 0x0)
writev(r7, &(0x7f0000000040)=[{&(0x7f00000000c0)='W', 0x1}], 0x1)
sendto$inet(r7, 0x0, 0x0, 0x805, 0x0, 0x0)
r8 = socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4})
sendmmsg$inet6(r8, &(0x7f0000000440)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8014)
sendmmsg$inet6(r8, &(0x7f00000075c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40804)
54.038065ms ago: executing program 3 (id=13866):
rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000140))
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0)
write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0)
write$UHID_CREATE2(r2, 0x0, 0x118)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r4, 0x0)
r5 = socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4})
sendmmsg$inet6(r5, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0)
write(r3, 0x0, 0x0)
r6 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendmmsg$inet6(r6, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4)
r7 = socket$inet6_tcp(0xa, 0x1, 0x0)
syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00')
ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4})
sendmmsg$inet6(r7, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0)
syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1)
29.882037ms ago: executing program 3 (id=13867):
rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300))
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0)
write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8=0x0, @ANYRES8=r1, @ANYRES64=r0], 0x118)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4})
sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0)
write(r0, 0x0, 0x0)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4)
r4 = socket$inet6_tcp(0xa, 0x1, 0x0)
r5 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendmmsg$inet6(r5, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0)
write(r4, 0x0, 0x0)
r6 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendmmsg$inet6(r6, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4)
sendmmsg$inet6(r3, &(0x7f0000000500), 0x0, 0x4)
r7 = socket$inet_tcp(0x2, 0x1, 0x0)
sendto$inet(r7, 0x0, 0x0, 0x805, 0x0, 0x0)
0s ago: executing program 3 (id=13868):
rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000140))
socket$inet6_tcp(0xa, 0x1, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0)
write$UHID_CREATE2(r0, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r0], 0x118)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0)
write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[], 0x118)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r3, 0x0)
r4 = socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4})
sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0)
write(r2, 0x0, 0x0)
r5 = socket$inet6_tcp(0xa, 0x1, 0x0)
syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00')
ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4})
sendmmsg$inet6(r5, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0)
r6 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1)
getsockopt$nfc_llcp(r6, 0x118, 0x0, 0x0, 0x0)
kernel console output (not intermixed with test programs):
00092c0 RDI: 0000000000000005
[ 335.269601][T20899] RBP: 00007f9de4e18090 R08: 0000000000000000 R09: 0000000000000000
[ 335.269613][T20899] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 335.269625][T20899] R13: 00007f9de41e6038 R14: 00007f9de41e5fa0 R15: 00007ffd4bf5ced8
[ 335.269640][T20899]
[ 335.475489][T20897] netlink: 24 bytes leftover after parsing attributes in process `syz.0.9163'.
[ 335.535173][T20925] rust_binder: Read failure Err(EAGAIN) in pid:882
[ 335.547750][T20928] FAULT_INJECTION: forcing a failure.
[ 335.547750][T20928] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 335.567583][T20928] CPU: 0 UID: 0 PID: 20928 Comm: syz.2.9174 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e
[ 335.567617][T20928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
[ 335.567630][T20928] Call Trace:
[ 335.567637][T20928]
[ 335.567644][T20928] __dump_stack+0x21/0x30
[ 335.567674][T20928] dump_stack_lvl+0x10c/0x190
[ 335.567698][T20928] ? __cfi_dump_stack_lvl+0x10/0x10
[ 335.567721][T20928] ? kstrtoull+0x13b/0x1e0
[ 335.567739][T20928] dump_stack+0x19/0x20
[ 335.567761][T20928] should_fail_ex+0x3d9/0x530
[ 335.567781][T20928] should_fail+0xf/0x20
[ 335.567798][T20928] should_fail_usercopy+0x1e/0x30
[ 335.567817][T20928] _copy_from_user+0x22/0xb0
[ 335.567839][T20928] ___sys_sendmsg+0x159/0x2a0
[ 335.567865][T20928] ? __sys_sendmsg+0x280/0x280
[ 335.567890][T20928] ? proc_fail_nth_write+0x17e/0x210
[ 335.567912][T20928] ? __cfi_proc_fail_nth_write+0x10/0x10
[ 335.567945][T20928] __x64_sys_sendmsg+0x1eb/0x2c0
[ 335.567968][T20928] ? fput+0x1a5/0x240
[ 335.567989][T20928] ? __cfi___x64_sys_sendmsg+0x10/0x10
[ 335.568011][T20928] ? ksys_write+0x1ef/0x250
[ 335.568029][T20928] ? __kasan_check_read+0x15/0x20
[ 335.568054][T20928] x64_sys_call+0x2a4c/0x2ee0
[ 335.568078][T20928] do_syscall_64+0x58/0xf0
[ 335.568099][T20928] ? clear_bhb_loop+0x50/0xa0
[ 335.568119][T20928] entry_SYSCALL_64_after_hwframe+0x76/0x7e
[ 335.568139][T20928] RIP: 0033:0x7f2a1fb8f6c9
[ 335.568155][T20928] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 335.568170][T20928] RSP: 002b:00007f2a209d9038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[ 335.568190][T20928] RAX: ffffffffffffffda RBX: 00007f2a1fde5fa0 RCX: 00007f2a1fb8f6c9
[ 335.568203][T20928] RDX: 0000000000000000 RSI: 00002000000000c0 RDI: 0000000000000008
[ 335.568214][T20928] RBP: 00007f2a209d9090 R08: 0000000000000000 R09: 0000000000000000
[ 335.568225][T20928] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 335.568237][T20928] R13: 00007f2a1fde6038 R14: 00007f2a1fde5fa0 R15: 00007ffe5f625168
[ 335.568254][T20928]
[ 336.362774][T20943] netlink: 'syz.0.9182': attribute type 15 has an invalid length.
[ 336.380025][T20943] netlink: 24 bytes leftover after parsing attributes in process `syz.0.9182'.
[ 336.399861][T20943] netlink: 'syz.0.9182': attribute type 1 has an invalid length.
[ 336.419525][T20943] netlink: 'syz.0.9182': attribute type 2 has an invalid length.
[ 336.502671][T20949] binder: Bad value for 'defcontext'
[ 336.623024][T20962] netlink: 'syz.2.9193': attribute type 15 has an invalid length.
[ 336.638482][T20962] netlink: 24 bytes leftover after parsing attributes in process `syz.2.9193'.
[ 336.656050][T20962] netlink: 'syz.2.9193': attribute type 1 has an invalid length.
[ 336.669856][ T36] audit: type=1400 audit(1763400054.029:13931): avc: denied { accept } for pid=20964 comm="syz.0.9195" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1
[ 336.676650][T20962] netlink: 'syz.2.9193': attribute type 2 has an invalid length.
[ 336.830196][T20976] netlink: 20 bytes leftover after parsing attributes in process `syz.1.9189'.
[ 336.931083][T20980] FAULT_INJECTION: forcing a failure.
[ 336.931083][T20980] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 336.960292][T20980] CPU: 1 UID: 0 PID: 20980 Comm: syz.3.9199 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e
[ 336.960325][T20980] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
[ 336.960336][T20980] Call Trace:
[ 336.960343][T20980]
[ 336.960351][T20980] __dump_stack+0x21/0x30
[ 336.960378][T20980] dump_stack_lvl+0x10c/0x190
[ 336.960400][T20980] ? __cfi_dump_stack_lvl+0x10/0x10
[ 336.960424][T20980] dump_stack+0x19/0x20
[ 336.960446][T20980] should_fail_ex+0x3d9/0x530
[ 336.960466][T20980] should_fail+0xf/0x20
[ 336.960484][T20980] should_fail_usercopy+0x1e/0x30
[ 336.960504][T20980] _copy_from_user+0x22/0xb0
[ 336.960535][T20980] get_user_ifreq+0x71/0x180
[ 336.960559][T20980] sock_ioctl+0x6fb/0x7b0
[ 336.960579][T20980] ? __cfi_sock_ioctl+0x10/0x10
[ 336.960599][T20980] ? bpf_lsm_file_ioctl+0xd/0x20
[ 336.960624][T20980] ? security_file_ioctl+0x34/0xd0
[ 336.960645][T20980] ? __cfi_sock_ioctl+0x10/0x10
[ 336.960662][T20980] __se_sys_ioctl+0x135/0x1b0
[ 336.960683][T20980] __x64_sys_ioctl+0x7f/0xa0
[ 336.960702][T20980] x64_sys_call+0x1878/0x2ee0
[ 336.960728][T20980] do_syscall_64+0x58/0xf0
[ 336.960750][T20980] ? clear_bhb_loop+0x50/0xa0
[ 336.960770][T20980] entry_SYSCALL_64_after_hwframe+0x76/0x7e
[ 336.960790][T20980] RIP: 0033:0x7f9de3f8f6c9
[ 336.960806][T20980] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 336.960822][T20980] RSP: 002b:00007f9de4e18038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 336.960843][T20980] RAX: ffffffffffffffda RBX: 00007f9de41e5fa0 RCX: 00007f9de3f8f6c9
[ 336.960858][T20980] RDX: 0000200000000940 RSI: 00000000000089f3 RDI: 0000000000000007
[ 336.960872][T20980] RBP: 00007f9de4e18090 R08: 0000000000000000 R09: 0000000000000000
[ 336.960885][T20980] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 336.960897][T20980] R13: 00007f9de41e6038 R14: 00007f9de41e5fa0 R15: 00007ffd4bf5ced8
[ 336.960913][T20980]
[ 337.202227][T20991] netlink: 104 bytes leftover after parsing attributes in process `syz.1.9204'.
[ 337.202230][ T36] audit: type=1400 audit(1763400054.569:13932): avc: denied { nlmsg_read } for pid=20990 comm="syz.1.9204" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1
[ 337.285428][ T36] audit: type=1400 audit(1763400054.649:13933): avc: denied { relabelfrom } for pid=20995 comm="syz.3.9207" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1
[ 337.305577][ T36] audit: type=1400 audit(1763400054.649:13934): avc: denied { relabelto } for pid=20995 comm="syz.3.9207" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1
[ 337.453020][T21008] FAULT_INJECTION: forcing a failure.
[ 337.453020][T21008] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 337.466181][T21008] CPU: 1 UID: 0 PID: 21008 Comm: syz.2.9211 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e
[ 337.466213][T21008] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
[ 337.466225][T21008] Call Trace:
[ 337.466240][T21008]
[ 337.466247][T21008] __dump_stack+0x21/0x30
[ 337.466275][T21008] dump_stack_lvl+0x10c/0x190
[ 337.466298][T21008] ? __cfi_dump_stack_lvl+0x10/0x10
[ 337.466326][T21008] ? do_vfs_ioctl+0xeda/0x1e30
[ 337.466346][T21008] dump_stack+0x19/0x20
[ 337.466368][T21008] should_fail_ex+0x3d9/0x530
[ 337.466392][T21008] should_fail+0xf/0x20
[ 337.466408][T21008] should_fail_usercopy+0x1e/0x30
[ 337.466428][T21008] _copy_from_user+0x22/0xb0
[ 337.466450][T21008] kvm_vm_ioctl+0x245/0xb80
[ 337.466474][T21008] ? __cfi_kvm_vm_ioctl+0x10/0x10
[ 337.466496][T21008] ? ioctl_has_perm+0x1aa/0x4d0
[ 337.466517][T21008] ? __asan_memcpy+0x5a/0x80
[ 337.466533][T21008] ? ioctl_has_perm+0x3e0/0x4d0
[ 337.466554][T21008] ? has_cap_mac_admin+0xd0/0xd0
[ 337.466580][T21008] ? proc_fail_nth_write+0x17e/0x210
[ 337.466603][T21008] ? __cfi_proc_fail_nth_write+0x10/0x10
[ 337.466626][T21008] ? selinux_file_ioctl+0x6e0/0x1360
[ 337.466648][T21008] ? vfs_write+0x93e/0xf30
[ 337.466664][T21008] ? __cfi_selinux_file_ioctl+0x10/0x10
[ 337.466686][T21008] ? __cfi_vfs_write+0x10/0x10
[ 337.466702][T21008] ? __kasan_check_write+0x18/0x20
[ 337.466727][T21008] ? mutex_unlock+0x8b/0x240
[ 337.466751][T21008] ? __cfi_mutex_unlock+0x10/0x10
[ 337.466767][T21008] ? __fget_files+0x2c5/0x340
[ 337.466787][T21008] ? __fget_files+0x2c5/0x340
[ 337.466806][T21008] ? bpf_lsm_file_ioctl+0xd/0x20
[ 337.466829][T21008] ? security_file_ioctl+0x34/0xd0
[ 337.466850][T21008] ? __cfi_kvm_vm_ioctl+0x10/0x10
[ 337.466873][T21008] __se_sys_ioctl+0x135/0x1b0
[ 337.466892][T21008] __x64_sys_ioctl+0x7f/0xa0
[ 337.466911][T21008] x64_sys_call+0x1878/0x2ee0
[ 337.466934][T21008] do_syscall_64+0x58/0xf0
[ 337.466954][T21008] ? clear_bhb_loop+0x50/0xa0
[ 337.466973][T21008] entry_SYSCALL_64_after_hwframe+0x76/0x7e
[ 337.466991][T21008] RIP: 0033:0x7f2a1fb8f6c9
[ 337.467007][T21008] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 337.467025][T21008] RSP: 002b:00007f2a209d9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 337.467046][T21008] RAX: ffffffffffffffda RBX: 00007f2a1fde5fa0 RCX: 00007f2a1fb8f6c9
[ 337.467062][T21008] RDX: 0000200000000200 RSI: 000000004008ae6a RDI: 0000000000000007
[ 337.467075][T21008] RBP: 00007f2a209d9090 R08: 0000000000000000 R09: 0000000000000000
[ 337.467089][T21008] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 337.467102][T21008] R13: 00007f2a1fde6038 R14: 00007f2a1fde5fa0 R15: 00007ffe5f625168
[ 337.467118][T21008]
[ 337.760503][T21022] rust_binder: Read failure Err(EAGAIN) in pid:1011
[ 337.891954][T21028] rust_binder: Read failure Err(EAGAIN) in pid:907
[ 338.029452][T21046] FAULT_INJECTION: forcing a failure.
[ 338.029452][T21046] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 338.051363][T21046] CPU: 1 UID: 0 PID: 21046 Comm: syz.0.9229 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e
[ 338.051396][T21046] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
[ 338.051408][T21046] Call Trace:
[ 338.051415][T21046]
[ 338.051424][T21046] __dump_stack+0x21/0x30
[ 338.051451][T21046] dump_stack_lvl+0x10c/0x190
[ 338.051474][T21046] ? __cfi_dump_stack_lvl+0x10/0x10
[ 338.051499][T21046] dump_stack+0x19/0x20
[ 338.051521][T21046] should_fail_ex+0x3d9/0x530
[ 338.051541][T21046] should_fail+0xf/0x20
[ 338.051557][T21046] should_fail_usercopy+0x1e/0x30
[ 338.051577][T21046] _copy_from_user+0x22/0xb0
[ 338.051600][T21046] get_user_ifreq+0x71/0x180
[ 338.051619][T21046] sock_ioctl+0x6fb/0x7b0
[ 338.051637][T21046] ? __cfi_sock_ioctl+0x10/0x10
[ 338.051656][T21046] ? bpf_lsm_file_ioctl+0xd/0x20
[ 338.051680][T21046] ? security_file_ioctl+0x34/0xd0
[ 338.051707][T21046] ? __cfi_sock_ioctl+0x10/0x10
[ 338.051725][T21046] __se_sys_ioctl+0x135/0x1b0
[ 338.051745][T21046] __x64_sys_ioctl+0x7f/0xa0
[ 338.051765][T21046] x64_sys_call+0x1878/0x2ee0
[ 338.051790][T21046] do_syscall_64+0x58/0xf0
[ 338.051812][T21046] ? clear_bhb_loop+0x50/0xa0
[ 338.051832][T21046] entry_SYSCALL_64_after_hwframe+0x76/0x7e
[ 338.051851][T21046] RIP: 0033:0x7fbe7738f6c9
[ 338.051867][T21046] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 338.051884][T21046] RSP: 002b:00007fbe781b5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 338.051904][T21046] RAX: ffffffffffffffda RBX: 00007fbe775e5fa0 RCX: 00007fbe7738f6c9
[ 338.051919][T21046] RDX: 0000200000000440 RSI: 00000000000089f1 RDI: 0000000000000008
[ 338.051932][T21046] RBP: 00007fbe781b5090 R08: 0000000000000000 R09: 0000000000000000
[ 338.051945][T21046] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 338.051957][T21046] R13: 00007fbe775e6038 R14: 00007fbe775e5fa0 R15: 00007ffe77eec268
[ 338.051974][T21046]
[ 338.108574][T21055] rust_binder: Read failure Err(EAGAIN) in pid:1149
[ 338.154453][ T36] audit: type=1400 audit(1763400055.429:13935): avc: denied { create } for pid=21051 comm="syz.3.9233" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1
[ 338.165051][T21064] netlink: 'syz.0.9238': attribute type 15 has an invalid length.
[ 338.167696][ T36] audit: type=1400 audit(1763400055.429:13936): avc: denied { ioctl } for pid=21051 comm="syz.3.9233" path="socket:[130576]" dev="sockfs" ino=130576 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1
[ 338.172110][T21064] netlink: 24 bytes leftover after parsing attributes in process `syz.0.9238'.
[ 338.202492][T21067] FAULT_INJECTION: forcing a failure.
[ 338.202492][T21067] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 338.209982][T21068] rust_binder: Read failure Err(EAGAIN) in pid:916
[ 338.215260][T21067] CPU: 1 UID: 0 PID: 21067 Comm: syz.3.9240 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e
[ 338.215291][T21067] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
[ 338.215303][T21067] Call Trace:
[ 338.215309][T21067]
[ 338.215317][T21067] __dump_stack+0x21/0x30
[ 338.215346][T21067] dump_stack_lvl+0x10c/0x190
[ 338.215368][T21067] ? __cfi_dump_stack_lvl+0x10/0x10
[ 338.215392][T21067] dump_stack+0x19/0x20
[ 338.215413][T21067] should_fail_ex+0x3d9/0x530
[ 338.215432][T21067] should_fail+0xf/0x20
[ 338.215448][T21067] should_fail_usercopy+0x1e/0x30
[ 338.215467][T21067] _copy_from_user+0x22/0xb0
[ 338.215489][T21067] vlan_ioctl_handler+0x9e/0x680
[ 338.215510][T21067] ? __cfi_vlan_ioctl_handler+0x10/0x10
[ 338.215531][T21067] ? __kasan_check_write+0x18/0x20
[ 338.215556][T21067] ? mutex_unlock+0x8b/0x240
[ 338.215573][T21067] ? __cfi_vlan_ioctl_handler+0x10/0x10
[ 338.215593][T21067] sock_ioctl+0x532/0x7b0
[ 338.215611][T21067] ? __cfi_sock_ioctl+0x10/0x10
[ 338.215629][T21067] ? __fget_files+0x2c5/0x340
[ 338.215648][T21067] ? bpf_lsm_file_ioctl+0xd/0x20
[ 338.215678][T21067] ? security_file_ioctl+0x34/0xd0
[ 338.215698][T21067] ? __cfi_sock_ioctl+0x10/0x10
[ 338.215716][T21067] __se_sys_ioctl+0x135/0x1b0
[ 338.215735][T21067] __x64_sys_ioctl+0x7f/0xa0
[ 338.215753][T21067] x64_sys_call+0x1878/0x2ee0
[ 338.215777][T21067] do_syscall_64+0x58/0xf0
[ 338.215799][T21067] ? clear_bhb_loop+0x50/0xa0
[ 338.215819][T21067] entry_SYSCALL_64_after_hwframe+0x76/0x7e
[ 338.215838][T21067] RIP: 0033:0x7f9de3f8f6c9
[ 338.215853][T21067] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 338.215868][T21067] RSP: 002b:00007f9de4e18038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 338.215889][T21067] RAX: ffffffffffffffda RBX: 00007f9de41e5fa0 RCX: 00007f9de3f8f6c9
[ 338.215903][T21067] RDX: 0000000000000000 RSI: 0000000000008982 RDI: 000000000000000a
[ 338.215916][T21067] RBP: 00007f9de4e18090 R08: 0000000000000000 R09: 0000000000000000
[ 338.215928][T21067] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 338.215939][T21067] R13: 00007f9de41e6038 R14: 00007f9de41e5fa0 R15: 00007ffd4bf5ced8
[ 338.215954][T21067]
[ 338.231613][ T36] audit: type=1400 audit(1763400055.599:13937): avc: denied { create } for pid=21069 comm="syz.3.9241" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1
[ 338.594283][ T36] audit: type=1400 audit(1763400055.609:13938): avc: denied { listen } for pid=21069 comm="syz.3.9241" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1
[ 338.615044][ T36] audit: type=1400 audit(1763400055.609:13939): avc: denied { read } for pid=21069 comm="syz.3.9241" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1
[ 338.638300][T21092] FAULT_INJECTION: forcing a failure.
[ 338.638300][T21092] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 338.663243][T21092] CPU: 0 UID: 0 PID: 21092 Comm: syz.1.9251 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e
[ 338.663277][T21092] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
[ 338.663289][T21092] Call Trace:
[ 338.663296][T21092]
[ 338.663304][T21092] __dump_stack+0x21/0x30
[ 338.663330][T21092] dump_stack_lvl+0x10c/0x190
[ 338.663353][T21092] ? __cfi_dump_stack_lvl+0x10/0x10
[ 338.663376][T21092] ? check_stack_object+0x12c/0x140
[ 338.663404][T21092] dump_stack+0x19/0x20
[ 338.663426][T21092] should_fail_ex+0x3d9/0x530
[ 338.663444][T21092] should_fail+0xf/0x20
[ 338.663461][T21092] should_fail_usercopy+0x1e/0x30
[ 338.663480][T21092] _copy_to_user+0x24/0xa0
[ 338.663502][T21092] simple_read_from_buffer+0xed/0x160
[ 338.663525][T21092] proc_fail_nth_read+0x19e/0x210
[ 338.663548][T21092] ? __cfi_proc_fail_nth_read+0x10/0x10
[ 338.663571][T21092] ? bpf_lsm_file_permission+0xd/0x20
[ 338.663594][T21092] ? __cfi_proc_fail_nth_read+0x10/0x10
[ 338.663614][T21092] vfs_read+0x27d/0xc70
[ 338.663630][T21092] ? __cfi_vfs_read+0x10/0x10
[ 338.663644][T21092] ? __kasan_check_write+0x18/0x20
[ 338.663668][T21092] ? mutex_lock+0x92/0x1c0
[ 338.663685][T21092] ? __cfi_mutex_lock+0x10/0x10
[ 338.663701][T21092] ? __fget_files+0x2c5/0x340
[ 338.663722][T21092] ksys_read+0x141/0x250
[ 338.663739][T21092] ? __cfi_ksys_read+0x10/0x10
[ 338.663756][T21092] ? __kasan_check_read+0x15/0x20
[ 338.663781][T21092] __x64_sys_read+0x7f/0x90
[ 338.663798][T21092] x64_sys_call+0x2638/0x2ee0
[ 338.663822][T21092] do_syscall_64+0x58/0xf0
[ 338.663842][T21092] ? clear_bhb_loop+0x50/0xa0
[ 338.663860][T21092] entry_SYSCALL_64_after_hwframe+0x76/0x7e
[ 338.663878][T21092] RIP: 0033:0x7fdd5ad8e0dc
[ 338.663894][T21092] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48
[ 338.663909][T21092] RSP: 002b:00007fdd5bbb1030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000
[ 338.663928][T21092] RAX: ffffffffffffffda RBX: 00007fdd5afe5fa0 RCX: 00007fdd5ad8e0dc
[ 338.663942][T21092] RDX: 000000000000000f RSI: 00007fdd5bbb10a0 RDI: 0000000000000008
[ 338.663956][T21092] RBP: 00007fdd5bbb1090 R08: 0000000000000000 R09: 0000000000000000
[ 338.663968][T21092] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 338.663981][T21092] R13: 00007fdd5afe6038 R14: 00007fdd5afe5fa0 R15: 00007ffdc6d18c18
[ 338.663998][T21092]
[ 338.751658][T21096] rust_binder: Read failure Err(EAGAIN) in pid:1031
[ 338.952872][T21113] rust_binder: Read failure Err(EAGAIN) in pid:1177
[ 338.966949][T21111] rust_binder: Read failure Err(EAGAIN) in pid:921
[ 339.058787][T21126] netlink: 'syz.2.9267': attribute type 15 has an invalid length.
[ 339.073385][T21126] netlink: 24 bytes leftover after parsing attributes in process `syz.2.9267'.
[ 339.134449][T21128] rust_binder: Read failure Err(EAGAIN) in pid:1181
[ 339.258153][T21145] FAULT_INJECTION: forcing a failure.
[ 339.258153][T21145] name failslab, interval 1, probability 0, space 0, times 0
[ 339.279453][T21145] CPU: 0 UID: 0 PID: 21145 Comm: syz.3.9277 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e
[ 339.279483][T21145] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
[ 339.279494][T21145] Call Trace:
[ 339.279501][T21145]
[ 339.279508][T21145] __dump_stack+0x21/0x30
[ 339.279534][T21145] dump_stack_lvl+0x10c/0x190
[ 339.279555][T21145] ? __cfi_dump_stack_lvl+0x10/0x10
[ 339.279577][T21145] dump_stack+0x19/0x20
[ 339.279597][T21145] should_fail_ex+0x3d9/0x530
[ 339.279614][T21145] should_failslab+0xac/0x100
[ 339.279633][T21145] kmem_cache_alloc_node_noprof+0x45/0x440
[ 339.279650][T21145] ? dup_task_struct+0xbc/0xc50
[ 339.279670][T21145] dup_task_struct+0xbc/0xc50
[ 339.279688][T21145] ? __kasan_check_write+0x18/0x20
[ 339.279711][T21145] ? _raw_spin_lock_irq+0x8d/0x120
[ 339.279731][T21145] ? copy_process+0x3220/0x3220
[ 339.279749][T21145] ? __kasan_check_write+0x18/0x20
[ 339.279771][T21145] copy_process+0x538/0x3220
[ 339.279792][T21145] ? __cfi_copy_process+0x10/0x10
[ 339.279813][T21145] ? proc_fail_nth_write+0x17e/0x210
[ 339.279840][T21145] kernel_clone+0x23f/0x830
[ 339.279858][T21145] ? __cfi_kernel_clone+0x10/0x10
[ 339.279879][T21145] __x64_sys_clone+0x18c/0x1f0
[ 339.279898][T21145] ? __cfi___x64_sys_clone+0x10/0x10
[ 339.279918][T21145] ? __kasan_check_read+0x15/0x20
[ 339.279942][T21145] x64_sys_call+0x2b3c/0x2ee0
[ 339.279964][T21145] do_syscall_64+0x58/0xf0
[ 339.279987][T21145] ? clear_bhb_loop+0x50/0xa0
[ 339.280005][T21145] entry_SYSCALL_64_after_hwframe+0x76/0x7e
[ 339.280022][T21145] RIP: 0033:0x7f9de3f8f6c9
[ 339.280041][T21145] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 339.280056][T21145] RSP: 002b:00007f9de4e17fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038
[ 339.280078][T21145] RAX: ffffffffffffffda RBX: 00007f9de41e5fa0 RCX: 00007f9de3f8f6c9
[ 339.280092][T21145] RDX: 0000000000000000 RSI: 00000000ffffff50 RDI: 0000000064087000
[ 339.280104][T21145] RBP: 00007f9de4e18090 R08: 0000000000000000 R09: 0000000000000000
[ 339.280115][T21145] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001
[ 339.280126][T21145] R13: 00007f9de41e6038 R14: 00007f9de41e5fa0 R15: 00007ffd4bf5ced8
[ 339.280140][T21145]
[ 339.527126][T21150] rust_binder: Read failure Err(EAGAIN) in pid:1190
[ 339.574985][T21153] netlink: 24 bytes leftover after parsing attributes in process `syz.3.9280'.
[ 339.836950][T21175] rust_binder: Read failure Err(EAGAIN) in pid:1203
[ 339.872115][T21180] rust_binder: Read failure Err(EAGAIN) in pid:1049
[ 340.211692][T21223] FAULT_INJECTION: forcing a failure.
[ 340.211692][T21223] name failslab, interval 1, probability 0, space 0, times 0
[ 340.251325][T21223] CPU: 0 UID: 0 PID: 21223 Comm: syz.1.9310 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e
[ 340.251358][T21223] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
[ 340.251371][T21223] Call Trace:
[ 340.251377][T21223]
[ 340.251385][T21223] __dump_stack+0x21/0x30
[ 340.251415][T21223] dump_stack_lvl+0x10c/0x190
[ 340.251438][T21223] ? __cfi_dump_stack_lvl+0x10/0x10
[ 340.251461][T21223] ? __kasan_check_write+0x18/0x20
[ 340.251488][T21223] ? proc_fail_nth_write+0x17e/0x210
[ 340.251510][T21223] ? __cfi_proc_fail_nth_write+0x10/0x10
[ 340.251534][T21223] dump_stack+0x19/0x20
[ 340.251556][T21223] should_fail_ex+0x3d9/0x530
[ 340.251576][T21223] should_failslab+0xac/0x100
[ 340.251597][T21223] kmem_cache_alloc_noprof+0x42/0x430
[ 340.251615][T21223] ? getname_flags+0xc6/0x710
[ 340.251634][T21223] getname_flags+0xc6/0x710
[ 340.251652][T21223] ? build_open_flags+0x487/0x600
[ 340.251675][T21223] getname+0x1b/0x30
[ 340.251692][T21223] do_sys_openat2+0xcb/0x1c0
[ 340.251713][T21223] ? fput+0x1a5/0x240
[ 340.251734][T21223] ? do_sys_open+0x100/0x100
[ 340.251756][T21223] ? ksys_write+0x1ef/0x250
[ 340.251774][T21223] ? __cfi_ksys_write+0x10/0x10
[ 340.251792][T21223] __x64_sys_openat+0x13a/0x170
[ 340.251816][T21223] x64_sys_call+0xe69/0x2ee0
[ 340.251841][T21223] do_syscall_64+0x58/0xf0
[ 340.251864][T21223] ? clear_bhb_loop+0x50/0xa0
[ 340.251886][T21223] entry_SYSCALL_64_after_hwframe+0x76/0x7e
[ 340.251905][T21223] RIP: 0033:0x7fdd5ad8df10
[ 340.251922][T21223] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 69 95 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 bc 95 02 00 8b 44
[ 340.251939][T21223] RSP: 002b:00007fdd5bbb0f60 EFLAGS: 00000293 ORIG_RAX: 0000000000000101
[ 340.251961][T21223] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fdd5ad8df10
[ 340.251975][T21223] RDX: 0000000000000000 RSI: 00007fdd5ae1207e RDI: 00000000ffffff9c
[ 340.251989][T21223] RBP: 00007fdd5ae1207e R08: 0000000000000000 R09: 0000000000000000
[ 340.252002][T21223] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001
[ 340.252014][T21223] R13: 00007fdd5afe6038 R14: 00007fdd5afe5fa0 R15: 00007ffdc6d18c18
[ 340.252030][T21223]
[ 340.835360][ T36] audit: type=1400 audit(1763400058.199:13940): avc: denied { setopt } for pid=21239 comm="syz.2.9317" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1
[ 341.163270][T21260] FAULT_INJECTION: forcing a failure.
[ 341.163270][T21260] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 341.193910][T21260] CPU: 0 UID: 0 PID: 21260 Comm: syz.3.9327 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e
[ 341.193944][T21260] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
[ 341.193955][T21260] Call Trace:
[ 341.193962][T21260]
[ 341.193970][T21260] __dump_stack+0x21/0x30
[ 341.193999][T21260] dump_stack_lvl+0x10c/0x190
[ 341.194019][T21260] ? __cfi_dump_stack_lvl+0x10/0x10
[ 341.194041][T21260] ? check_stack_object+0x12c/0x140
[ 341.194058][T21260] dump_stack+0x19/0x20
[ 341.194077][T21260] should_fail_ex+0x3d9/0x530
[ 341.194096][T21260] should_fail+0xf/0x20
[ 341.194111][T21260] should_fail_usercopy+0x1e/0x30
[ 341.194128][T21260] _copy_to_user+0x24/0xa0
[ 341.194150][T21260] simple_read_from_buffer+0xed/0x160
[ 341.194172][T21260] proc_fail_nth_read+0x19e/0x210
[ 341.194195][T21260] ? __cfi_proc_fail_nth_read+0x10/0x10
[ 341.194216][T21260] ? bpf_lsm_file_permission+0xd/0x20
[ 341.194238][T21260] ? __cfi_proc_fail_nth_read+0x10/0x10
[ 341.194260][T21260] vfs_read+0x27d/0xc70
[ 341.194278][T21260] ? __cfi_vfs_read+0x10/0x10
[ 341.194295][T21260] ? __kasan_check_write+0x18/0x20
[ 341.194321][T21260] ? mutex_lock+0x92/0x1c0
[ 341.194339][T21260] ? __cfi_mutex_lock+0x10/0x10
[ 341.194356][T21260] ? __fget_files+0x2c5/0x340
[ 341.194377][T21260] ksys_read+0x141/0x250
[ 341.194393][T21260] ? xfd_validate_state+0x68/0x150
[ 341.194417][T21260] ? __cfi_ksys_read+0x10/0x10
[ 341.194434][T21260] ? __kasan_check_write+0x18/0x20
[ 341.194467][T21260] ? fpregs_restore_userregs+0x11d/0x260
[ 341.194489][T21260] __x64_sys_read+0x7f/0x90
[ 341.194507][T21260] x64_sys_call+0x2638/0x2ee0
[ 341.194532][T21260] do_syscall_64+0x58/0xf0
[ 341.194555][T21260] ? clear_bhb_loop+0x50/0xa0
[ 341.194577][T21260] entry_SYSCALL_64_after_hwframe+0x76/0x7e
[ 341.194597][T21260] RIP: 0033:0x7f9de3f8e0dc
[ 341.194613][T21260] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48
[ 341.194630][T21260] RSP: 002b:00007f9de4e18030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000
[ 341.194651][T21260] RAX: ffffffffffffffda RBX: 00007f9de41e5fa0 RCX: 00007f9de3f8e0dc
[ 341.194666][T21260] RDX: 000000000000000f RSI: 00007f9de4e180a0 RDI: 0000000000000007
[ 341.194680][T21260] RBP: 00007f9de4e18090 R08: 0000000000000000 R09: 0000000000000000
[ 341.194692][T21260] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 341.194704][T21260] R13: 00007f9de41e6038 R14: 00007f9de41e5fa0 R15: 00007ffd4bf5ced8
[ 341.194721][T21260]
[ 341.585683][ T13] bridge_slave_1: left allmulticast mode
[ 341.591544][ T13] bridge_slave_1: left promiscuous mode
[ 341.598719][ T13] bridge0: port 2(bridge_slave_1) entered disabled state
[ 341.620378][ T13] bridge_slave_0: left allmulticast mode
[ 341.626057][ T13] bridge_slave_0: left promiscuous mode
[ 341.649910][ T13] bridge0: port 1(bridge_slave_0) entered disabled state
[ 341.811470][ T13] veth1_macvtap: left promiscuous mode
[ 341.820156][ T13] veth0_vlan: left promiscuous mode
[ 341.930246][T21271] bridge0: port 1(bridge_slave_0) entered blocking state
[ 341.937438][T21271] bridge0: port 1(bridge_slave_0) entered disabled state
[ 341.947618][T21271] bridge_slave_0: entered allmulticast mode
[ 341.956681][T21271] bridge_slave_0: entered promiscuous mode
[ 341.969642][T21271] bridge0: port 2(bridge_slave_1) entered blocking state
[ 341.977003][T21271] bridge0: port 2(bridge_slave_1) entered disabled state
[ 341.984586][T21271] bridge_slave_1: entered allmulticast mode
[ 341.991771][T21271] bridge_slave_1: entered promiscuous mode
[ 342.148072][T21271] bridge0: port 2(bridge_slave_1) entered blocking state
[ 342.155187][T21271] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 342.162612][T21271] bridge0: port 1(bridge_slave_0) entered blocking state
[ 342.169646][T21271] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 342.241472][ T13] bridge0: port 1(bridge_slave_0) entered disabled state
[ 342.249949][ T13] bridge0: port 2(bridge_slave_1) entered disabled state
[ 342.292018][ T13] bridge0: port 1(bridge_slave_0) entered blocking state
[ 342.299205][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 342.309540][ T13] bridge0: port 2(bridge_slave_1) entered blocking state
[ 342.316645][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 342.338825][T21271] veth0_vlan: entered promiscuous mode
[ 342.354545][T21271] veth1_macvtap: entered promiscuous mode
[ 343.135187][ T36] audit: type=1400 audit(1763400060.499:13941): avc: denied { ioctl } for pid=21323 comm="syz.2.9353" path="socket:[132555]" dev="sockfs" ino=132555 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1
[ 343.335247][ T36] audit: type=1400 audit(1763400060.699:13942): avc: denied { map } for pid=21332 comm="syz.2.9357" path="pipe:[101881]" dev="pipefs" ino=101881 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1
[ 343.379847][ T36] audit: type=1400 audit(1763400060.699:13943): avc: denied { execute } for pid=21332 comm="syz.2.9357" path="pipe:[101881]" dev="pipefs" ino=101881 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1
[ 343.459166][T21339] rust_binder: Read failure Err(EAGAIN) in pid:985
[ 343.570521][T21347] rust_binder: Read failure Err(EAGAIN) in pid:12
[ 343.749100][T21361] rust_binder: Read failure Err(EAGAIN) in pid:18
[ 343.783150][T21365] rust_binder: Read failure Err(EAGAIN) in pid:1077
[ 343.788988][T21367] rust_binder: Read failure Err(EAGAIN) in pid:999
[ 343.823921][T21371] rust_binder: Read failure Err(EAGAIN) in pid:1001
[ 344.242161][T21399] rust_binder: Read failure Err(EAGAIN) in pid:40
[ 344.592968][T21411] rust_binder: Read failure Err(EAGAIN) in pid:1081
[ 344.611960][T21413] rust_binder: Read failure Err(EAGAIN) in pid:52
[ 344.655596][T21417] rust_binder: Read failure Err(EAGAIN) in pid:1083
[ 344.692350][ T36] audit: type=1400 audit(1763400062.059:13944): avc: denied { ioctl } for pid=21418 comm="syz.3.9398" path="/dev/ptp0" dev="devtmpfs" ino=196 ioctlcmd=0x3d04 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1
[ 344.753728][T21425] FAULT_INJECTION: forcing a failure.
[ 344.753728][T21425] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 344.767395][T21425] CPU: 1 UID: 0 PID: 21425 Comm: syz.0.9400 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e
[ 344.767429][T21425] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
[ 344.767441][T21425] Call Trace:
[ 344.767448][T21425]
[ 344.767461][T21425] __dump_stack+0x21/0x30
[ 344.767492][T21425] dump_stack_lvl+0x10c/0x190
[ 344.767516][T21425] ? __cfi_dump_stack_lvl+0x10/0x10
[ 344.767540][T21425] ? __kasan_check_write+0x18/0x20
[ 344.767567][T21425] ? check_stack_object+0x107/0x140
[ 344.767586][T21425] dump_stack+0x19/0x20
[ 344.767613][T21425] should_fail_ex+0x3d9/0x530
[ 344.767633][T21425] should_fail+0xf/0x20
[ 344.767650][T21425] should_fail_usercopy+0x1e/0x30
[ 344.767670][T21425] _copy_from_user+0x22/0xb0
[ 344.767693][T21425] __sys_sendto+0x29e/0x6f0
[ 344.767718][T21425] ? __cfi___sys_sendto+0x10/0x10
[ 344.767743][T21425] ? __kasan_check_write+0x18/0x20
[ 344.767770][T21425] ? __cfi_ksys_write+0x10/0x10
[ 344.767790][T21425] __x64_sys_sendto+0xe9/0x100
[ 344.767814][T21425] x64_sys_call+0x2c2c/0x2ee0
[ 344.767840][T21425] do_syscall_64+0x58/0xf0
[ 344.767868][T21425] ? clear_bhb_loop+0x50/0xa0
[ 344.767889][T21425] entry_SYSCALL_64_after_hwframe+0x76/0x7e
[ 344.767908][T21425] RIP: 0033:0x7fbe7738f6c9
[ 344.767925][T21425] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 344.767942][T21425] RSP: 002b:00007fbe781b5038 EFLAGS: 00000246 ORIG_RAX: 000000000000002c
[ 344.767964][T21425] RAX: ffffffffffffffda RBX: 00007fbe775e5fa0 RCX: 00007fbe7738f6c9
[ 344.767978][T21425] RDX: 000000000000fce0 RSI: 00002000000002c0 RDI: 0000000000000008
[ 344.767992][T21425] RBP: 00007fbe781b5090 R08: 0000200000000140 R09: 0000000000000014
[ 344.768006][T21425] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000000000001
[ 344.768018][T21425] R13: 00007fbe775e6038 R14: 00007fbe775e5fa0 R15: 00007ffe77eec268
[ 344.768035][T21425]
[ 345.011660][T21437] rust_binder: Read failure Err(EAGAIN) in pid:60
[ 345.137596][T21459] rust_binder: Read failure Err(EAGAIN) in pid:1012
[ 345.202525][T21467] rust_binder: Read failure Err(EAGAIN) in pid:1101
[ 345.481594][T21510] netlink: 24 bytes leftover after parsing attributes in process `syz.2.9441'.
[ 345.564909][T21516] FAULT_INJECTION: forcing a failure.
[ 345.564909][T21516] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 345.599845][T21516] CPU: 1 UID: 0 PID: 21516 Comm: syz.2.9445 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e
[ 345.599886][T21516] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
[ 345.599897][T21516] Call Trace:
[ 345.599903][T21516]
[ 345.599910][T21516] __dump_stack+0x21/0x30
[ 345.599943][T21516] dump_stack_lvl+0x10c/0x190
[ 345.599967][T21516] ? __cfi_dump_stack_lvl+0x10/0x10
[ 345.599988][T21516] ? check_stack_object+0x107/0x140
[ 345.600005][T21516] dump_stack+0x19/0x20
[ 345.600025][T21516] should_fail_ex+0x3d9/0x530
[ 345.600049][T21516] should_fail+0xf/0x20
[ 345.600065][T21516] should_fail_usercopy+0x1e/0x30
[ 345.600083][T21516] _copy_from_user+0x22/0xb0
[ 345.600104][T21516] __sys_connect+0x136/0x440
[ 345.600128][T21516] ? __cfi___sys_connect+0x10/0x10
[ 345.600150][T21516] ? __kasan_check_read+0x15/0x20
[ 345.600173][T21516] __x64_sys_connect+0x7e/0x90
[ 345.600193][T21516] x64_sys_call+0x1c2f/0x2ee0
[ 345.600217][T21516] do_syscall_64+0x58/0xf0
[ 345.600240][T21516] ? clear_bhb_loop+0x50/0xa0
[ 345.600258][T21516] entry_SYSCALL_64_after_hwframe+0x76/0x7e
[ 345.600276][T21516] RIP: 0033:0x7f2a1fb8f6c9
[ 345.600291][T21516] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 345.600307][T21516] RSP: 002b:00007f2a209d9038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a
[ 345.600327][T21516] RAX: ffffffffffffffda RBX: 00007f2a1fde5fa0 RCX: 00007f2a1fb8f6c9
[ 345.600340][T21516] RDX: 0000000000000010 RSI: 0000200000000180 RDI: 0000000000000007
[ 345.600352][T21516] RBP: 00007f2a209d9090 R08: 0000000000000000 R09: 0000000000000000
[ 345.600364][T21516] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 345.600375][T21516] R13: 00007f2a1fde6038 R14: 00007f2a1fde5fa0 R15: 00007ffe5f625168
[ 345.600391][T21516]
[ 346.034574][T21535] rust_binder: Read failure Err(EAGAIN) in pid:1041
[ 346.222304][T21553] rust_binder: Read failure Err(EAGAIN) in pid:1097
[ 346.240765][T21557] rust_binder: Read failure Err(EAGAIN) in pid:1057
[ 346.267934][T21561] FAULT_INJECTION: forcing a failure.
[ 346.267934][T21561] name failslab, interval 1, probability 0, space 0, times 0
[ 346.287410][T21561] CPU: 1 UID: 0 PID: 21561 Comm: syz.2.9467 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e
[ 346.287441][T21561] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
[ 346.287451][T21561] Call Trace:
[ 346.287463][T21561]
[ 346.287471][T21561] __dump_stack+0x21/0x30
[ 346.287499][T21561] dump_stack_lvl+0x10c/0x190
[ 346.287520][T21561] ? __cfi_dump_stack_lvl+0x10/0x10
[ 346.287543][T21561] ? avc_has_perm+0x144/0x220
[ 346.287567][T21561] dump_stack+0x19/0x20
[ 346.287591][T21561] should_fail_ex+0x3d9/0x530
[ 346.287610][T21561] should_failslab+0xac/0x100
[ 346.287637][T21561] kmem_cache_alloc_lru_noprof+0x44/0x430
[ 346.287655][T21561] ? selinux_socket_create+0x181/0x290
[ 346.287685][T21561] ? sock_alloc_inode+0x48/0x150
[ 346.287705][T21561] sock_alloc_inode+0x48/0x150
[ 346.287724][T21561] ? __cfi_sock_alloc_inode+0x10/0x10
[ 346.287744][T21561] alloc_inode+0x7a/0x270
[ 346.287765][T21561] ? bpf_lsm_socket_create+0xd/0x20
[ 346.287788][T21561] new_inode_pseudo+0x19/0x40
[ 346.287808][T21561] __sock_create+0x130/0x810
[ 346.287837][T21561] __sys_socketpair+0x1ab/0x5c0
[ 346.287860][T21561] __x64_sys_socketpair+0x9f/0xc0
[ 346.287882][T21561] x64_sys_call+0x2081/0x2ee0
[ 346.287907][T21561] do_syscall_64+0x58/0xf0
[ 346.287929][T21561] ? clear_bhb_loop+0x50/0xa0
[ 346.287950][T21561] entry_SYSCALL_64_after_hwframe+0x76/0x7e
[ 346.287970][T21561] RIP: 0033:0x7f2a1fb8f6c9
[ 346.287987][T21561] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 346.288004][T21561] RSP: 002b:00007f2a209d9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035
[ 346.288026][T21561] RAX: ffffffffffffffda RBX: 00007f2a1fde5fa0 RCX: 00007f2a1fb8f6c9
[ 346.288042][T21561] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 000000000000001e
[ 346.288054][T21561] RBP: 00007f2a209d9090 R08: 0000000000000000 R09: 0000000000000000
[ 346.288067][T21561] R10: 0000200000000340 R11: 0000000000000246 R12: 0000000000000001
[ 346.288080][T21561] R13: 00007f2a1fde6038 R14: 00007f2a1fde5fa0 R15: 00007ffe5f625168
[ 346.288096][T21561]
[ 346.288182][T21561] socket: no more sockets
[ 346.691801][T21580] rust_binder: Read failure Err(EAGAIN) in pid:1108
[ 347.672929][T21605] rust_binder: Read failure Err(EAGAIN) in pid:1137
[ 347.860028][T21623] rust_binder: Read failure Err(EAGAIN) in pid:1147
[ 348.287318][T21645] rust_binder: Read failure Err(EAGAIN) in pid:92
[ 348.891733][T21669] rust_binder: Read failure Err(EAGAIN) in pid:1137
[ 349.360470][T21713] rust_binder: Read failure Err(EAGAIN) in pid:1097
[ 349.394914][T21719] rust_binder: Read failure Err(EAGAIN) in pid:1099
[ 349.524319][T21736] rust_binder: Read failure Err(EAGAIN) in pid:1103
[ 349.768909][T21783] rust_binder: Read failure Err(EAGAIN) in pid:127
[ 349.888252][T21805] rust_binder: Read failure Err(EAGAIN) in pid:135
[ 350.010760][T21831] rust_binder: Read failure Err(EAGAIN) in pid:1184
[ 350.268984][T21870] rust_binder: Read failure Err(EAGAIN) in pid:161
[ 350.422052][T21893] rust_binder: Read failure Err(EAGAIN) in pid:1157
[ 351.120619][T21939] rust_binder: Read failure Err(EAGAIN) in pid:1214
[ 351.573427][ T61] bridge_slave_1: left allmulticast mode
[ 351.586333][ T61] bridge_slave_1: left promiscuous mode
[ 351.595878][ T61] bridge0: port 2(bridge_slave_1) entered disabled state
[ 351.620285][ T61] bridge_slave_0: left allmulticast mode
[ 351.625959][ T61] bridge_slave_0: left promiscuous mode
[ 351.641388][ T61] bridge0: port 1(bridge_slave_0) entered disabled state
[ 351.659158][T21986] rust_binder: Read failure Err(EAGAIN) in pid:1172
[ 351.778196][T21977] bridge0: port 1(bridge_slave_0) entered blocking state
[ 351.797459][T22007] rust_binder: Read failure Err(EAGAIN) in pid:1227
[ 351.800388][T21977] bridge0: port 1(bridge_slave_0) entered disabled state
[ 351.830275][T21977] bridge_slave_0: entered allmulticast mode
[ 351.836817][T21977] bridge_slave_0: entered promiscuous mode
[ 351.845228][ T61] veth1_macvtap: left promiscuous mode
[ 351.865274][ T61] veth0_vlan: left promiscuous mode
[ 351.977968][T21977] bridge0: port 2(bridge_slave_1) entered blocking state
[ 352.001555][T22023] rust_binder: Read failure Err(EAGAIN) in pid:1196
[ 352.004899][T21977] bridge0: port 2(bridge_slave_1) entered disabled state
[ 352.028750][T21977] bridge_slave_1: entered allmulticast mode
[ 352.040230][T21977] bridge_slave_1: entered promiscuous mode
[ 352.175540][T21977] bridge0: port 2(bridge_slave_1) entered blocking state
[ 352.176870][T22039] rust_binder: Read failure Err(EAGAIN) in pid:1210
[ 352.182648][T21977] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 352.196541][T21977] bridge0: port 1(bridge_slave_0) entered blocking state
[ 352.203616][T21977] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 352.222998][T22047] rust_binder: Read failure Err(EAGAIN) in pid:1212
[ 352.319003][T21977] veth0_vlan: entered promiscuous mode
[ 352.354227][T21977] veth1_macvtap: entered promiscuous mode
[ 353.095584][T22064] rust_binder: Read failure Err(EAGAIN) in pid:175
[ 353.209462][T22065] bridge0: port 1(bridge_slave_0) entered blocking state
[ 353.223183][T22065] bridge0: port 1(bridge_slave_0) entered disabled state
[ 353.230292][T22065] bridge_slave_0: entered allmulticast mode
[ 353.236686][T22065] bridge_slave_0: entered promiscuous mode
[ 353.243868][T22065] bridge0: port 2(bridge_slave_1) entered blocking state
[ 353.250934][T22065] bridge0: port 2(bridge_slave_1) entered disabled state
[ 353.259554][T22065] bridge_slave_1: entered allmulticast mode
[ 353.265943][T22065] bridge_slave_1: entered promiscuous mode
[ 353.396679][T22065] bridge0: port 2(bridge_slave_1) entered blocking state
[ 353.403768][T22065] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 353.411110][T22065] bridge0: port 1(bridge_slave_0) entered blocking state
[ 353.418147][T22065] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 353.537955][T22065] veth0_vlan: entered promiscuous mode
[ 353.565693][T22065] veth1_macvtap: entered promiscuous mode
[ 354.540338][T22130] rust_binder: Read failure Err(EAGAIN) in pid:201
[ 354.662307][T22142] rust_binder: Read failure Err(EAGAIN) in pid:16
[ 354.712117][T22147] rust_binder: Read failure Err(EAGAIN) in pid:18
[ 355.134201][T22155] bridge0: port 1(bridge_slave_0) entered blocking state
[ 355.169839][T22155] bridge0: port 1(bridge_slave_0) entered disabled state
[ 355.176942][T22155] bridge_slave_0: entered allmulticast mode
[ 355.200279][T22155] bridge_slave_0: entered promiscuous mode
[ 355.230042][T22155] bridge0: port 2(bridge_slave_1) entered blocking state
[ 355.237353][T22155] bridge0: port 2(bridge_slave_1) entered disabled state
[ 355.249959][T22155] bridge_slave_1: entered allmulticast mode
[ 355.256317][T22155] bridge_slave_1: entered promiscuous mode
[ 355.346619][T22168] rust_binder: Read failure Err(EAGAIN) in pid:213
[ 355.437736][T22155] bridge0: port 2(bridge_slave_1) entered blocking state
[ 355.451372][T22155] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 355.458651][T22155] bridge0: port 1(bridge_slave_0) entered blocking state
[ 355.465728][T22155] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 355.519418][ T13] bridge0: port 1(bridge_slave_0) entered disabled state
[ 355.530961][ T13] bridge0: port 2(bridge_slave_1) entered disabled state
[ 355.570285][ T330] bridge0: port 1(bridge_slave_0) entered blocking state
[ 355.577345][ T330] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 355.611681][ T13] bridge0: port 2(bridge_slave_1) entered blocking state
[ 355.618741][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 355.687757][T22155] veth0_vlan: entered promiscuous mode
[ 355.714405][T22155] veth1_macvtap: entered promiscuous mode
[ 356.275100][T22235] rust_binder: Read failure Err(EAGAIN) in pid:222
[ 356.714827][T22273] rust_binder: Read failure Err(EAGAIN) in pid:40
[ 356.881894][T22282] rust_binder: Read failure Err(EAGAIN) in pid:249
[ 358.151570][T22348] rust_binder: Read failure Err(EAGAIN) in pid:269
[ 358.262856][T22358] rust_binder: Read failure Err(EAGAIN) in pid:70
[ 359.140979][T22374] rust_binder: Read failure Err(EAGAIN) in pid:42
[ 361.508348][T22503] rust_binder: Read failure Err(EAGAIN) in pid:94
[ 362.162995][T22525] rust_binder: Read failure Err(EAGAIN) in pid:96
[ 362.697338][T22551] rust_binder: Read failure Err(EAGAIN) in pid:112
[ 363.088082][T22573] rust_binder: Read failure Err(EAGAIN) in pid:122
[ 364.073520][T22641] rust_binder: Read failure Err(EAGAIN) in pid:105
[ 364.151035][T22645] rust_binder: Read failure Err(EAGAIN) in pid:107
[ 364.891607][T22657] rust_binder: Read failure Err(EAGAIN) in pid:136
[ 365.111926][T22694] rust_binder: Read failure Err(EAGAIN) in pid:150
[ 366.417513][T22772] rust_binder: Read failure Err(EAGAIN) in pid:172
[ 367.577789][T22892] rust_binder: Read failure Err(EAGAIN) in pid:151
[ 368.345427][T22933] rust_binder: Read failure Err(EAGAIN) in pid:240
[ 368.607131][T22955] rust_binder: Read failure Err(EAGAIN) in pid:161
[ 368.748675][T22971] rust_binder: Read failure Err(EAGAIN) in pid:169
[ 369.350488][T23036] rust_binder: Read failure Err(EAGAIN) in pid:193
[ 370.184103][T23187] rust_binder: Read failure Err(EAGAIN) in pid:487
[ 370.330355][T23212] rust_binder: Read failure Err(EAGAIN) in pid:492
[ 371.290660][T23310] rust_binder: Read failure Err(EAGAIN) in pid:279
[ 371.870140][T23352] rust_binder: Read failure Err(EAGAIN) in pid:309
[ 372.106284][T23372] rust_binder: Read failure Err(EAGAIN) in pid:323
[ 372.145981][T23376] rust_binder: Read failure Err(EAGAIN) in pid:325
[ 372.486287][T23394] rust_binder: Read failure Err(EAGAIN) in pid:341
[ 374.774168][T23546] rust_binder: Read failure Err(EAGAIN) in pid:312
[ 376.293770][T23666] rust_binder: Read failure Err(EAGAIN) in pid:350
[ 378.190115][T23765] No source specified
[ 381.151720][T24052] rust_binder: Read failure Err(EAGAIN) in pid:569
[ 384.397586][T24271] rust_binder: Read failure Err(EAGAIN) in pid:474
[ 386.181166][T24336] rust_binder: Read failure Err(EAGAIN) in pid:726
[ 386.416353][T24356] rust_binder: Read failure Err(EAGAIN) in pid:736
[ 386.461916][T24361] rust_binder: Read failure Err(EAGAIN) in pid:667
[ 386.642402][T24377] rust_binder: Read failure Err(EAGAIN) in pid:742
[ 386.688796][T24387] rust_binder: Read failure Err(EAGAIN) in pid:676
[ 386.808678][T24402] rust_binder: Read failure Err(EAGAIN) in pid:502
[ 386.965187][T24426] rust_binder: Read failure Err(EAGAIN) in pid:554
[ 387.267975][T24454] rust_binder: Read failure Err(EAGAIN) in pid:769
[ 387.910697][T24489] No source specified
[ 389.860308][T24589] rust_binder: Read failure Err(EAGAIN) in pid:720
[ 390.211674][T24615] rust_binder: Read failure Err(EAGAIN) in pid:573
[ 390.300128][T24619] rust_binder: Read failure Err(EAGAIN) in pid:734
[ 391.450347][T24733] rust_binder: Read failure Err(EAGAIN) in pid:634
[ 391.595122][T24771] rust_binder: Read failure Err(EAGAIN) in pid:650
[ 391.652500][T24777] No source specified
[ 392.752100][T24835] rust_binder: Read failure Err(EAGAIN) in pid:833
[ 393.411505][T24851] No source specified
[ 394.173710][T24881] rust_binder: Read failure Err(EAGAIN) in pid:700
[ 396.250248][ T36] audit: type=1400 audit(1763400113.609:13945): avc: denied { name_bind } for pid=25051 comm="syz.1.11107" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1
[ 396.791734][T25124] rust_binder: Read failure Err(EAGAIN) in pid:912
[ 397.353854][T25141] FAULT_INJECTION: forcing a failure.
[ 397.353854][T25141] name failslab, interval 1, probability 0, space 0, times 0
[ 397.393358][T25141] CPU: 0 UID: 0 PID: 25141 Comm: syz.0.11150 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e
[ 397.393394][T25141] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
[ 397.393406][T25141] Call Trace:
[ 397.393413][T25141]
[ 397.393424][T25141] __dump_stack+0x21/0x30
[ 397.393456][T25141] dump_stack_lvl+0x10c/0x190
[ 397.393481][T25141] ? __cfi_dump_stack_lvl+0x10/0x10
[ 397.393506][T25141] ? __kasan_check_write+0x18/0x20
[ 397.393534][T25141] ? proc_fail_nth_write+0x17e/0x210
[ 397.393560][T25141] ? __cfi_proc_fail_nth_write+0x10/0x10
[ 397.393586][T25141] dump_stack+0x19/0x20
[ 397.393610][T25141] should_fail_ex+0x3d9/0x530
[ 397.393631][T25141] should_failslab+0xac/0x100
[ 397.393652][T25141] kmem_cache_alloc_noprof+0x42/0x430
[ 397.393671][T25141] ? getname_flags+0xc6/0x710
[ 397.393691][T25141] getname_flags+0xc6/0x710
[ 397.393710][T25141] ? build_open_flags+0x487/0x600
[ 397.393735][T25141] getname+0x1b/0x30
[ 397.393753][T25141] do_sys_openat2+0xcb/0x1c0
[ 397.393775][T25141] ? fput+0x1a5/0x240
[ 397.393797][T25141] ? do_sys_open+0x100/0x100
[ 397.393820][T25141] ? ksys_write+0x1ef/0x250
[ 397.393838][T25141] ? __cfi_ksys_write+0x10/0x10
[ 397.393858][T25141] __x64_sys_openat+0x13a/0x170
[ 397.393883][T25141] x64_sys_call+0xe69/0x2ee0
[ 397.393909][T25141] do_syscall_64+0x58/0xf0
[ 397.393933][T25141] ? clear_bhb_loop+0x50/0xa0
[ 397.393955][T25141] entry_SYSCALL_64_after_hwframe+0x76/0x7e
[ 397.393976][T25141] RIP: 0033:0x7f9480f8df10
[ 397.393994][T25141] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 69 95 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 bc 95 02 00 8b 44
[ 397.394021][T25141] RSP: 002b:00007f9481e4cf10 EFLAGS: 00000293 ORIG_RAX: 0000000000000101
[ 397.394045][T25141] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f9480f8df10
[ 397.394061][T25141] RDX: 0000000000000002 RSI: 00007f9481e4cfa0 RDI: 00000000ffffff9c
[ 397.394076][T25141] RBP: 00007f9481e4cfa0 R08: 0000000000000000 R09: 0000000000000000
[ 397.394091][T25141] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001
[ 397.394105][T25141] R13: 00007f94811e6038 R14: 00007f94811e5fa0 R15: 00007ffc9a5ebef8
[ 397.394124][T25141]
[ 398.025431][T25166] No source specified
[ 400.520260][T25293] rust_binder: Read failure Err(EAGAIN) in pid:816
[ 400.931164][T25314] No source specified
[ 402.178861][T25394] No source specified
[ 403.011188][T25441] No source specified
[ 403.056492][T25451] FAULT_INJECTION: forcing a failure.
[ 403.056492][T25451] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 403.072261][T25451] CPU: 1 UID: 0 PID: 25451 Comm: syz.0.11292 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e
[ 403.072289][T25451] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
[ 403.072300][T25451] Call Trace:
[ 403.072306][T25451]
[ 403.072313][T25451] __dump_stack+0x21/0x30
[ 403.072340][T25451] dump_stack_lvl+0x10c/0x190
[ 403.072360][T25451] ? __cfi_dump_stack_lvl+0x10/0x10
[ 403.072387][T25451] ? kernel_text_address+0xa9/0xe0
[ 403.072408][T25451] dump_stack+0x19/0x20
[ 403.072427][T25451] should_fail_ex+0x3d9/0x530
[ 403.072444][T25451] should_fail+0xf/0x20
[ 403.072458][T25451] should_fail_usercopy+0x1e/0x30
[ 403.072474][T25451] _copy_from_user+0x22/0xb0
[ 403.072494][T25451] ___sys_sendmsg+0x159/0x2a0
[ 403.072517][T25451] ? __sys_sendmsg+0x280/0x280
[ 403.072538][T25451] ? kstrtouint+0x78/0xf0
[ 403.072557][T25451] __sys_sendmmsg+0x271/0x470
[ 403.072579][T25451] ? __cfi___sys_sendmmsg+0x10/0x10
[ 403.072603][T25451] ? __cfi_ksys_write+0x10/0x10
[ 403.072619][T25451] __x64_sys_sendmmsg+0xa4/0xc0
[ 403.072642][T25451] x64_sys_call+0xfec/0x2ee0
[ 403.072663][T25451] do_syscall_64+0x58/0xf0
[ 403.072682][T25451] ? clear_bhb_loop+0x50/0xa0
[ 403.072699][T25451] entry_SYSCALL_64_after_hwframe+0x76/0x7e
[ 403.072715][T25451] RIP: 0033:0x7f9480f8f6c9
[ 403.072729][T25451] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 403.072742][T25451] RSP: 002b:00007f9481e4d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133
[ 403.072761][T25451] RAX: ffffffffffffffda RBX: 00007f94811e5fa0 RCX: 00007f9480f8f6c9
[ 403.072774][T25451] RDX: 0400000000000172 RSI: 0000200000003cc0 RDI: 0000000000000006
[ 403.072786][T25451] RBP: 00007f9481e4d090 R08: 0000000000000000 R09: 0000000000000000
[ 403.072797][T25451] R10: 0000000004001c00 R11: 0000000000000246 R12: 0000000000000001
[ 403.072808][T25451] R13: 00007f94811e6038 R14: 00007f94811e5fa0 R15: 00007ffc9a5ebef8
[ 403.072822][T25451]
[ 403.696425][T25488] rust_binder: Read failure Err(EAGAIN) in pid:757
[ 403.837100][T25507] rust_binder: Read failure Err(EAGAIN) in pid:767
[ 404.329846][T25530] rust_binder: Read failure Err(EAGAIN) in pid:781
[ 404.546515][T25550] rust_binder: Read failure Err(EAGAIN) in pid:791
[ 405.676056][T25609] No source specified
[ 405.815843][T25635] No source specified
[ 405.840802][T25639] FAULT_INJECTION: forcing a failure.
[ 405.840802][T25639] name failslab, interval 1, probability 0, space 0, times 0
[ 405.858402][T25639] CPU: 0 UID: 0 PID: 25639 Comm: syz.1.11380 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e
[ 405.858435][T25639] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
[ 405.858446][T25639] Call Trace:
[ 405.858452][T25639]
[ 405.858459][T25639] __dump_stack+0x21/0x30
[ 405.858488][T25639] dump_stack_lvl+0x10c/0x190
[ 405.858509][T25639] ? __cfi_dump_stack_lvl+0x10/0x10
[ 405.858533][T25639] ? release_sock+0x171/0x1f0
[ 405.858555][T25639] dump_stack+0x19/0x20
[ 405.858577][T25639] should_fail_ex+0x3d9/0x530
[ 405.858597][T25639] should_failslab+0xac/0x100
[ 405.858618][T25639] kmem_cache_alloc_node_noprof+0x45/0x440
[ 405.858637][T25639] ? netlink_data_ready+0x20/0x20
[ 405.858660][T25639] ? __alloc_skb+0x10c/0x370
[ 405.858682][T25639] __alloc_skb+0x10c/0x370
[ 405.858704][T25639] netlink_alloc_large_skb+0xf7/0x1b0
[ 405.858728][T25639] netlink_sendmsg+0x586/0xaf0
[ 405.858754][T25639] ? __cfi_netlink_sendmsg+0x10/0x10
[ 405.858780][T25639] ? __asan_memcpy+0x5a/0x80
[ 405.858797][T25639] ? bpf_lsm_socket_sendmsg+0xd/0x20
[ 405.858819][T25639] ? security_socket_sendmsg+0x33/0xd0
[ 405.858843][T25639] sock_write_iter+0x49c/0x4f0
[ 405.858862][T25639] ? __cfi_sock_write_iter+0x10/0x10
[ 405.858887][T25639] do_iter_readv_writev+0x628/0x810
[ 405.858908][T25639] ? vfs_iter_read+0x5f0/0x5f0
[ 405.858927][T25639] ? bpf_lsm_file_permission+0xd/0x20
[ 405.858953][T25639] vfs_writev+0x485/0xcf0
[ 405.858975][T25639] ? do_writev+0x2d0/0x2d0
[ 405.858994][T25639] ? vfs_write+0x93e/0xf30
[ 405.859015][T25639] do_writev+0x14d/0x2d0
[ 405.859036][T25639] ? vfs_readv+0xa50/0xa50
[ 405.859057][T25639] ? __kasan_check_read+0x15/0x20
[ 405.859083][T25639] __x64_sys_writev+0x81/0x90
[ 405.859101][T25639] x64_sys_call+0x1fbb/0x2ee0
[ 405.859136][T25639] do_syscall_64+0x58/0xf0
[ 405.859159][T25639] ? clear_bhb_loop+0x50/0xa0
[ 405.859179][T25639] entry_SYSCALL_64_after_hwframe+0x76/0x7e
[ 405.859200][T25639] RIP: 0033:0x7f02fab8f6c9
[ 405.859217][T25639] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 405.859234][T25639] RSP: 002b:00007f02fb9f2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000014
[ 405.859256][T25639] RAX: ffffffffffffffda RBX: 00007f02fade5fa0 RCX: 00007f02fab8f6c9
[ 405.859271][T25639] RDX: 0000000000000001 RSI: 0000200000000180 RDI: 0000000000000009
[ 405.859284][T25639] RBP: 00007f02fb9f2090 R08: 0000000000000000 R09: 0000000000000000
[ 405.859296][T25639] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 405.859308][T25639] R13: 00007f02fade6038 R14: 00007f02fade5fa0 R15: 00007fffac1106c8
[ 405.859324][T25639]
[ 406.189926][ T331] usb 1-1: new full-speed USB device number 2 using dummy_hcd
[ 406.352597][ T331] usb 1-1: unable to get BOS descriptor or descriptor too short
[ 406.365790][ T331] usb 1-1: not running at top speed; connect to a high speed hub
[ 406.376741][ T331] usb 1-1: config 7 has an invalid interface number: 85 but max is 0
[ 406.386307][ T331] usb 1-1: config 7 has no interface number 0
[ 406.400634][ T331] usb 1-1: config 7 interface 85 has no altsetting 0
[ 406.412890][ T331] usb 1-1: New USB device found, idVendor=04e6, idProduct=0009, bcdDevice= 2.00
[ 406.432666][ T331] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3
[ 406.443758][T25698] rust_binder: Read failure Err(EAGAIN) in pid:960
[ 406.451885][ T331] usb 1-1: Product: syz
[ 406.463180][ T331] usb 1-1: Manufacturer: syz
[ 406.469415][ T331] usb 1-1: SerialNumber: syz
[ 406.476213][T25702] FAULT_INJECTION: forcing a failure.
[ 406.476213][T25702] name failslab, interval 1, probability 0, space 0, times 0
[ 406.496585][T25702] CPU: 1 UID: 0 PID: 25702 Comm: syz.2.11409 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e
[ 406.496616][T25702] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
[ 406.496629][T25702] Call Trace:
[ 406.496636][T25702]
[ 406.496644][T25702] __dump_stack+0x21/0x30
[ 406.496677][T25702] dump_stack_lvl+0x10c/0x190
[ 406.496701][T25702] ? __cfi_dump_stack_lvl+0x10/0x10
[ 406.496724][T25702] ? __kasan_check_write+0x18/0x20
[ 406.496752][T25702] ? proc_fail_nth_write+0x17e/0x210
[ 406.496775][T25702] ? __cfi_proc_fail_nth_write+0x10/0x10
[ 406.496799][T25702] dump_stack+0x19/0x20
[ 406.496821][T25702] should_fail_ex+0x3d9/0x530
[ 406.496841][T25702] should_failslab+0xac/0x100
[ 406.496861][T25702] kmem_cache_alloc_noprof+0x42/0x430
[ 406.496880][T25702] ? getname_flags+0xc6/0x710
[ 406.496899][T25702] getname_flags+0xc6/0x710
[ 406.496917][T25702] ? build_open_flags+0x487/0x600
[ 406.496941][T25702] getname+0x1b/0x30
[ 406.496958][T25702] do_sys_openat2+0xcb/0x1c0
[ 406.496981][T25702] ? fput+0x1a5/0x240
[ 406.497002][T25702] ? do_sys_open+0x100/0x100
[ 406.497023][T25702] ? ksys_write+0x1ef/0x250
[ 406.497040][T25702] ? __cfi_ksys_write+0x10/0x10
[ 406.497058][T25702] __x64_sys_openat+0x13a/0x170
[ 406.497081][T25702] x64_sys_call+0xe69/0x2ee0
[ 406.497106][T25702] do_syscall_64+0x58/0xf0
[ 406.497129][T25702] ? clear_bhb_loop+0x50/0xa0
[ 406.497149][T25702] entry_SYSCALL_64_after_hwframe+0x76/0x7e
[ 406.497168][T25702] RIP: 0033:0x7f80c198df10
[ 406.497184][T25702] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 69 95 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 bc 95 02 00 8b 44
[ 406.497200][T25702] RSP: 002b:00007f80c28e8f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000101
[ 406.497222][T25702] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f80c198df10
[ 406.497236][T25702] RDX: 0000000000000002 RSI: 00007f80c28e8fa0 RDI: 00000000ffffff9c
[ 406.497249][T25702] RBP: 00007f80c28e8fa0 R08: 0000000000000000 R09: 0000000000000000
[ 406.497263][T25702] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001
[ 406.497282][T25702] R13: 00007f80c1be6038 R14: 00007f80c1be5fa0 R15: 00007fff68b49fb8
[ 406.497299][T25702]
[ 406.733517][ T331] usb-storage 1-1:7.85: USB Mass Storage device detected
[ 406.966885][ T331] usb 1-1: USB disconnect, device number 2
[ 407.241268][T25753] overlayfs: failed to resolve './file1/file0': -2
[ 407.503336][T25785] rust_binder: Read failure Err(EAGAIN) in pid:987
[ 407.622606][T25807] rust_binder: Read failure Err(EAGAIN) in pid:995
[ 407.778746][T25831] FAULT_INJECTION: forcing a failure.
[ 407.778746][T25831] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 407.791627][T25835] rust_binder: Read failure Err(EAGAIN) in pid:1089
[ 407.798712][T25831] CPU: 1 UID: 0 PID: 25831 Comm: syz.1.11465 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e
[ 407.798754][T25831] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
[ 407.798766][T25831] Call Trace:
[ 407.798773][T25831]
[ 407.798781][T25831] __dump_stack+0x21/0x30
[ 407.798811][T25831] dump_stack_lvl+0x10c/0x190
[ 407.798834][T25831] ? __cfi_dump_stack_lvl+0x10/0x10
[ 407.798857][T25831] ? kstrtoull+0x13b/0x1e0
[ 407.798875][T25831] dump_stack+0x19/0x20
[ 407.798896][T25831] should_fail_ex+0x3d9/0x530
[ 407.798946][T25831] should_fail+0xf/0x20
[ 407.798964][T25831] should_fail_usercopy+0x1e/0x30
[ 407.798984][T25831] _copy_from_user+0x22/0xb0
[ 407.799007][T25831] ___sys_sendmsg+0x159/0x2a0
[ 407.799034][T25831] ? __sys_sendmsg+0x280/0x280
[ 407.799060][T25831] ? proc_fail_nth_write+0x17e/0x210
[ 407.799083][T25831] ? __cfi_proc_fail_nth_write+0x10/0x10
[ 407.799112][T25831] __x64_sys_sendmsg+0x1eb/0x2c0
[ 407.799137][T25831] ? fput+0x1a5/0x240
[ 407.799159][T25831] ? __cfi___x64_sys_sendmsg+0x10/0x10
[ 407.799184][T25831] ? ksys_write+0x1ef/0x250
[ 407.799202][T25831] ? __kasan_check_read+0x15/0x20
[ 407.799229][T25831] x64_sys_call+0x2a4c/0x2ee0
[ 407.799254][T25831] do_syscall_64+0x58/0xf0
[ 407.799277][T25831] ? clear_bhb_loop+0x50/0xa0
[ 407.799298][T25831] entry_SYSCALL_64_after_hwframe+0x76/0x7e
[ 407.799317][T25831] RIP: 0033:0x7f02fab8f6c9
[ 407.799334][T25831] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 407.799350][T25831] RSP: 002b:00007f02fb9f2038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[ 407.799372][T25831] RAX: ffffffffffffffda RBX: 00007f02fade5fa0 RCX: 00007f02fab8f6c9
[ 407.799387][T25831] RDX: 0000000000000000 RSI: 0000200000000180 RDI: 0000000000000007
[ 407.799400][T25831] RBP: 00007f02fb9f2090 R08: 0000000000000000 R09: 0000000000000000
[ 407.799413][T25831] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 407.799425][T25831] R13: 00007f02fade6038 R14: 00007f02fade5fa0 R15: 00007fffac1106c8
[ 407.799442][T25831]
[ 408.059344][ T36] audit: type=1400 audit(1763400125.419:13946): avc: denied { set_context_mgr } for pid=25843 comm="syz.3.11473" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1
[ 408.070029][T25844] FAULT_INJECTION: forcing a failure.
[ 408.070029][T25844] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 408.083370][T25847] No source specified
[ 408.112595][T25846] rust_binder: Failed to allocate buffer. len:4120, is_oneway:false
[ 408.113193][ T36] audit: type=1400 audit(1763400125.479:13947): avc: denied { call } for pid=25845 comm="syz.1.11472" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1
[ 408.171534][T25844] CPU: 1 UID: 0 PID: 25844 Comm: syz.3.11473 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e
[ 408.171568][T25844] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
[ 408.171580][T25844] Call Trace:
[ 408.171587][T25844]
[ 408.171595][T25844] __dump_stack+0x21/0x30
[ 408.171624][T25844] dump_stack_lvl+0x10c/0x190
[ 408.171648][T25844] ? __cfi_dump_stack_lvl+0x10/0x10
[ 408.171672][T25844] dump_stack+0x19/0x20
[ 408.171694][T25844] should_fail_ex+0x3d9/0x530
[ 408.171714][T25844] should_fail+0xf/0x20
[ 408.171731][T25844] should_fail_usercopy+0x1e/0x30
[ 408.171751][T25844] _copy_from_user+0x22/0xb0
[ 408.171774][T25844] _RNvMs2_NtCs5gLWsBERDPK_16rust_binder_main6threadNtB5_6Thread10write_read+0x493/0xa380
[ 408.171814][T25844] ? __cfi__RNvMs2_NtCs5gLWsBERDPK_16rust_binder_main6threadNtB5_6Thread10write_read+0x10/0x10
[ 408.171865][T25844] ? is_bpf_text_address+0x17b/0x1a0
[ 408.171886][T25844] ? kernel_text_address+0xa9/0xe0
[ 408.171911][T25844] ? __asan_memset+0x39/0x50
[ 408.171928][T25844] ? __update_load_avg_se+0x949/0xf10
[ 408.171952][T25844] ? __cfi___update_load_avg_cfs_rq+0x10/0x10
[ 408.171973][T25844] ? update_curr+0xdc/0xaa0
[ 408.171994][T25844] ? is_bpf_text_address+0x17b/0x1a0
[ 408.172014][T25844] ? kernel_text_address+0xa9/0xe0
[ 408.172036][T25844] ? __kernel_text_address+0x11/0x40
[ 408.172057][T25844] ? __kasan_check_write+0x18/0x20
[ 408.172083][T25844] ? _raw_spin_lock_irqsave+0xaf/0x150
[ 408.172107][T25844] ? __cfi__raw_spin_lock_irqsave+0x10/0x10
[ 408.172131][T25844] ? stack_trace_save+0x9d/0xe0
[ 408.172162][T25844] ? _raw_spin_unlock_irqrestore+0x4a/0x70
[ 408.172184][T25844] ? stack_depot_save_flags+0x399/0x800
[ 408.172205][T25844] ? detach_entity_load_avg+0x7b0/0x7b0
[ 408.172224][T25844] ? kasan_save_track+0x4f/0x80
[ 408.172242][T25844] ? kasan_save_track+0x3e/0x80
[ 408.172259][T25844] ? kasan_save_free_info+0x4a/0x60
[ 408.172281][T25844] ? __kasan_slab_free+0x5f/0x80
[ 408.172298][T25844] ? kmem_cache_free+0x1c1/0x510
[ 408.172314][T25844] ? audit_log_end+0x1f1/0x240
[ 408.172334][T25844] ? common_lsm_audit+0x148c/0x1860
[ 408.172355][T25844] ? slow_avc_audit+0x18d/0x1f0
[ 408.172385][T25844] ? avc_has_perm+0x1cd/0x220
[ 408.172407][T25844] ? selinux_binder_set_context_mgr+0xcf/0x110
[ 408.172432][T25844] ? security_binder_set_context_mgr+0x44/0xb0
[ 408.172455][T25844] ? _RNvMs4_NtCs5gLWsBERDPK_16rust_binder_main7processNtB5_7Process14set_as_manager+0x3b8/0xa60
[ 408.172479][T25844] ? _RNvMs6_NtCs5gLWsBERDPK_16rust_binder_main7processNtB5_7Process5ioctl+0x133e/0x2cf0
[ 408.172502][T25844] ? _RNvCs5gLWsBERDPK_16rust_binder_main26rust_binder_unlocked_ioctl+0xa0/0x100
[ 408.172527][T25844] ? __se_sys_ioctl+0x135/0x1b0
[ 408.172552][T25844] ? is_bpf_text_address+0x17b/0x1a0
[ 408.172571][T25844] ? kernel_text_address+0xa9/0xe0
[ 408.172593][T25844] ? __kernel_text_address+0x11/0x40
[ 408.172615][T25844] ? unwind_get_return_address+0x51/0x90
[ 408.172636][T25844] ? __cfi_stack_trace_consume_entry+0x10/0x10
[ 408.172660][T25844] ? arch_stack_walk+0x10b/0x170
[ 408.172681][T25844] ? is_bpf_text_address+0x17b/0x1a0
[ 408.172700][T25844] ? kernel_text_address+0xa9/0xe0
[ 408.172721][T25844] ? __kernel_text_address+0x11/0x40
[ 408.172741][T25844] ? unwind_get_return_address+0x51/0x90
[ 408.172761][T25844] ? __cfi_stack_trace_consume_entry+0x10/0x10
[ 408.172786][T25844] ? arch_stack_walk+0x10b/0x170
[ 408.172804][T25844] ? __kasan_check_write+0x18/0x20
[ 408.172828][T25844] ? _raw_spin_lock+0x8c/0x120
[ 408.172850][T25844] ? __cfi__raw_spin_lock+0x10/0x10
[ 408.172871][T25844] ? stack_depot_save_flags+0x38/0x800
[ 408.172889][T25844] ? stack_trace_save+0x9d/0xe0
[ 408.172913][T25844] ? _raw_spin_unlock+0x45/0x60
[ 408.172934][T25844] ? rust_helper_spin_unlock+0x19/0x30
[ 408.172952][T25844] ? _RNvMs4_NtCs5gLWsBERDPK_16rust_binder_main7processNtB5_7Process18get_current_thread+0x914/0x1400
[ 408.172976][T25844] ? security_inode_alloc+0x51/0x200
[ 408.173000][T25844] ? inode_init_always_gfp+0x756/0x9e0
[ 408.173019][T25844] ? alloc_inode+0xc5/0x270
[ 408.173039][T25844] ? proc_pident_instantiate+0x6d/0x2c0
[ 408.173059][T25844] ? proc_pident_lookup+0x1c7/0x270
[ 408.173078][T25844] ? path_openat+0x1301/0x34b0
[ 408.173103][T25844] ? do_sys_openat2+0x12c/0x1c0
[ 408.173125][T25844] ? __x64_sys_openat+0x13a/0x170
[ 408.173152][T25844] ? x64_sys_call+0xe69/0x2ee0
[ 408.173176][T25844] ? do_syscall_64+0x58/0xf0
[ 408.173198][T25844] ? entry_SYSCALL_64_after_hwframe+0x76/0x7e
[ 408.173221][T25844] ? __cfi__RNvMs4_NtCs5gLWsBERDPK_16rust_binder_main7processNtB5_7Process18get_current_thread+0x10/0x10
[ 408.173246][T25844] ? avc_has_perm_noaudit+0x268/0x360
[ 408.173270][T25844] ? __asan_memcpy+0x5a/0x80
[ 408.173286][T25844] ? avc_has_perm_noaudit+0x286/0x360
[ 408.173311][T25844] ? avc_has_perm+0x144/0x220
[ 408.173334][T25844] ? __cfi_avc_has_perm+0x10/0x10
[ 408.173357][T25844] ? kasan_save_alloc_info+0x40/0x50
[ 408.173383][T25844] ? selinux_file_open+0x457/0x610
[ 408.173404][T25844] _RNvMs6_NtCs5gLWsBERDPK_16rust_binder_main7processNtB5_7Process5ioctl+0x40c/0x2cf0
[ 408.173429][T25844] ? avc_has_extended_perms+0x7c7/0xdd0
[ 408.173452][T25844] ? __asan_memcpy+0x5a/0x80
[ 408.173468][T25844] ? avc_has_extended_perms+0x921/0xdd0
[ 408.173492][T25844] ? __cfi__RNvMs6_NtCs5gLWsBERDPK_16rust_binder_main7processNtB5_7Process5ioctl+0x10/0x10
[ 408.173516][T25844] ? do_vfs_ioctl+0xeda/0x1e30
[ 408.173535][T25844] ? arch_stack_walk+0x10b/0x170
[ 408.173551][T25844] ? __ia32_compat_sys_ioctl+0x850/0x850
[ 408.173571][T25844] ? _parse_integer+0x2e/0x40
[ 408.173598][T25844] ? ioctl_has_perm+0x384/0x4d0
[ 408.173620][T25844] ? has_cap_mac_admin+0xd0/0xd0
[ 408.173640][T25844] ? proc_fail_nth_write+0x17e/0x210
[ 408.173663][T25844] ? __cfi_proc_fail_nth_write+0x10/0x10
[ 408.173687][T25844] ? selinux_file_ioctl+0x6e0/0x1360
[ 408.173708][T25844] ? vfs_write+0x93e/0xf30
[ 408.173724][T25844] ? __cfi_selinux_file_ioctl+0x10/0x10
[ 408.173746][T25844] ? __cfi_vfs_write+0x10/0x10
[ 408.173762][T25844] ? __kasan_check_write+0x18/0x20
[ 408.173788][T25844] ? mutex_unlock+0x8b/0x240
[ 408.173805][T25844] ? __cfi_mutex_unlock+0x10/0x10
[ 408.173821][T25844] ? __fget_files+0x2c5/0x340
[ 408.173842][T25844] ? __fget_files+0x2c5/0x340
[ 408.173862][T25844] _RNvCs5gLWsBERDPK_16rust_binder_main26rust_binder_unlocked_ioctl+0xa0/0x100
[ 408.173888][T25844] ? __se_sys_ioctl+0x114/0x1b0
[ 408.173907][T25844] ? __cfi__RNvCs5gLWsBERDPK_16rust_binder_main26rust_binder_unlocked_ioctl+0x10/0x10
[ 408.173934][T25844] __se_sys_ioctl+0x135/0x1b0
[ 408.173953][T25844] __x64_sys_ioctl+0x7f/0xa0
[ 408.173973][T25844] x64_sys_call+0x1878/0x2ee0
[ 408.173999][T25844] do_syscall_64+0x58/0xf0
[ 408.174020][T25844] ? clear_bhb_loop+0x50/0xa0
[ 408.174040][T25844] entry_SYSCALL_64_after_hwframe+0x76/0x7e
[ 408.174060][T25844] RIP: 0033:0x7f84f7f8f6c9
[ 408.174077][T25844] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 408.174093][T25844] RSP: 002b:00007f84f8ebf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 408.174116][T25844] RAX: ffffffffffffffda RBX: 00007f84f81e5fa0 RCX: 00007f84f7f8f6c9
[ 408.174131][T25844] RDX: 0000200000000100 RSI: 00000000c0306201 RDI: 0000000000000006
[ 408.174150][T25844] RBP: 00007f84f8ebf090 R08: 0000000000000000 R09: 0000000000000000
[ 408.174162][T25844] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 408.174175][T25844] R13: 00007f84f81e6038 R14: 00007f84f81e5fa0 R15: 00007ffd5c4b6598
[ 408.174192][T25844]
[ 408.967116][ T36] audit: type=1400 audit(1763400126.329:13948): avc: denied { load_policy } for pid=25862 comm="syz.0.11481" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1
[ 409.010662][T25863] SELinux: failed to load policy
[ 409.061126][T25877] FAULT_INJECTION: forcing a failure.
[ 409.061126][T25877] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 409.074293][T25877] CPU: 0 UID: 0 PID: 25877 Comm: syz.1.11487 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e
[ 409.074322][T25877] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
[ 409.074333][T25877] Call Trace:
[ 409.074340][T25877]
[ 409.074348][T25877] __dump_stack+0x21/0x30
[ 409.074376][T25877] dump_stack_lvl+0x10c/0x190
[ 409.074396][T25877] ? __cfi_dump_stack_lvl+0x10/0x10
[ 409.074418][T25877] dump_stack+0x19/0x20
[ 409.074437][T25877] should_fail_ex+0x3d9/0x530
[ 409.074452][T25877] should_fail+0xf/0x20
[ 409.074465][T25877] should_fail_usercopy+0x1e/0x30
[ 409.074481][T25877] _copy_from_user+0x22/0xb0
[ 409.074499][T25877] sk_setsockopt+0x277/0x2970
[ 409.074519][T25877] ? __cfi_sk_setsockopt+0x10/0x10
[ 409.074537][T25877] ? selinux_socket_setsockopt+0x2ea/0x390
[ 409.074562][T25877] ? __cfi_vfs_write+0x10/0x10
[ 409.074576][T25877] ? __kasan_check_write+0x18/0x20
[ 409.074597][T25877] sock_setsockopt+0x5e/0x70
[ 409.074615][T25877] do_sock_setsockopt+0x202/0x400
[ 409.074635][T25877] ? __cfi_do_sock_setsockopt+0x10/0x10
[ 409.074656][T25877] __x64_sys_setsockopt+0x1b8/0x250
[ 409.074676][T25877] x64_sys_call+0x2adc/0x2ee0
[ 409.074695][T25877] do_syscall_64+0x58/0xf0
[ 409.074713][T25877] ? clear_bhb_loop+0x50/0xa0
[ 409.074729][T25877] entry_SYSCALL_64_after_hwframe+0x76/0x7e
[ 409.074744][T25877] RIP: 0033:0x7f02fab8f6c9
[ 409.074757][T25877] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 409.074769][T25877] RSP: 002b:00007f02fb9f2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036
[ 409.074786][T25877] RAX: ffffffffffffffda RBX: 00007f02fade5fa0 RCX: 00007f02fab8f6c9
[ 409.074797][T25877] RDX: 0000000000000026 RSI: 0000000000000001 RDI: 0000000000000009
[ 409.074807][T25877] RBP: 00007f02fb9f2090 R08: 0000000000000004 R09: 0000000000000000
[ 409.074816][T25877] R10: 0000200000000040 R11: 0000000000000246 R12: 0000000000000001
[ 409.074833][T25877] R13: 00007f02fade6038 R14: 00007f02fade5fa0 R15: 00007fffac1106c8
[ 409.074845][T25877]
[ 409.371199][T25889] rust_binder: Read failure Err(EAGAIN) in pid:1015
[ 409.637529][ T36] audit: type=1400 audit(1763400126.999:13949): avc: denied { read } for pid=25905 comm="syz.2.11500" name="event2" dev="devtmpfs" ino=209 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1
[ 409.679944][ T36] audit: type=1400 audit(1763400127.019:13950): avc: denied { open } for pid=25905 comm="syz.2.11500" path="/dev/input/event2" dev="devtmpfs" ino=209 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1
[ 409.722786][ T36] audit: type=1400 audit(1763400127.019:13951): avc: denied { ioctl } for pid=25905 comm="syz.2.11500" path="/dev/input/event2" dev="devtmpfs" ino=209 ioctlcmd=0x4592 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1
[ 409.873353][T25923] rust_binder: Read failure Err(EAGAIN) in pid:976
[ 409.914957][T25931] FAULT_INJECTION: forcing a failure.
[ 409.914957][T25931] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 409.934806][T25931] CPU: 1 UID: 0 PID: 25931 Comm: syz.0.11512 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e
[ 409.934835][T25931] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
[ 409.934846][T25931] Call Trace:
[ 409.934852][T25931]
[ 409.934866][T25931] __dump_stack+0x21/0x30
[ 409.934893][T25931] dump_stack_lvl+0x10c/0x190
[ 409.934915][T25931] ? __cfi_dump_stack_lvl+0x10/0x10
[ 409.934937][T25931] ? selinux_file_open+0x457/0x610
[ 409.934957][T25931] dump_stack+0x19/0x20
[ 409.934976][T25931] should_fail_ex+0x3d9/0x530
[ 409.934992][T25931] should_fail_alloc_page+0xeb/0x110
[ 409.935012][T25931] __alloc_pages_noprof+0x19b/0x7b0
[ 409.935032][T25931] ? __cfi___alloc_pages_noprof+0x10/0x10
[ 409.935052][T25931] ? is_bpf_text_address+0x17b/0x1a0
[ 409.935071][T25931] ? __kernel_text_address+0x11/0x40
[ 409.935091][T25931] ? unwind_get_return_address+0x51/0x90
[ 409.935111][T25931] ? __cfi_stack_trace_consume_entry+0x10/0x10
[ 409.935136][T25931] ? arch_stack_walk+0x10b/0x170
[ 409.935151][T25931] __folio_alloc_noprof+0x14/0x80
[ 409.935174][T25931] folio_prealloc+0x46/0x240
[ 409.935192][T25931] do_pte_missing+0x164c/0x4240
[ 409.935210][T25931] ? _parse_integer+0x2e/0x40
[ 409.935233][T25931] ? pte_marker_clear+0x1b0/0x1b0
[ 409.935252][T25931] ? kstrtouint_from_user+0xfb/0x150
[ 409.935268][T25931] ? __x64_sys_openat+0x13a/0x170
[ 409.935288][T25931] ? x64_sys_call+0xe69/0x2ee0
[ 409.935309][T25931] ? selinux_file_permission+0x309/0xb30
[ 409.935328][T25931] ? __pte_offset_map+0x1b0/0x230
[ 409.935351][T25931] ? pte_offset_map_rw_nolock+0xba/0x110
[ 409.935374][T25931] handle_mm_fault+0x1166/0x1b90
[ 409.935393][T25931] ? __cfi_handle_mm_fault+0x10/0x10
[ 409.935411][T25931] ? lock_vma_under_rcu+0x49d/0x540
[ 409.935433][T25931] ? __kasan_check_write+0x18/0x20
[ 409.935457][T25931] do_user_addr_fault+0x96c/0x1200
[ 409.935479][T25931] ? __cfi_ksys_write+0x10/0x10
[ 409.935496][T25931] exc_page_fault+0x59/0xc0
[ 409.935514][T25931] asm_exc_page_fault+0x2b/0x30
[ 409.935532][T25931] RIP: 0033:0x7f9480e60576
[ 409.935547][T25931] Code: 00 00 00 00 41 57 31 c0 41 56 49 89 d6 41 55 49 89 f5 48 89 d6 41 54 49 89 fc 48 8d 3d 0c 2f 1b 00 55 53 48 81 ec 88 20 00 00 <48> 89 0c 24 4c 89 44 24 08 e8 ec d9 fe ff 4d 85 f6 0f 84 46 0a 00
[ 409.935562][T25931] RSP: 002b:00007f9481e4af70 EFLAGS: 00010202
[ 409.935580][T25931] RAX: 0000000000000000 RBX: 00007f94811e5fa0 RCX: 0000000000000000
[ 409.935593][T25931] RDX: 0000200000000000 RSI: 0000200000000000 RDI: 00007f9481013479
[ 409.935607][T25931] RBP: 00007f9481e4d090 R08: 00007f9480e4e2f0 R09: 0000000000000000
[ 409.935620][T25931] R10: 0000000000000000 R11: 0000200000000000 R12: 0000000000000000
[ 409.935632][T25931] R13: 0000000000000090 R14: 0000200000000000 R15: 00007ffc9a5ebef8
[ 409.935646][T25931]
[ 409.935670][T25931] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF
[ 410.322650][T25954] netlink: 8 bytes leftover after parsing attributes in process `syz.3.11520'.
[ 410.449858][ T9] usb 1-1: new high-speed USB device number 3 using dummy_hcd
[ 410.551604][ T36] audit: type=1400 audit(1763400127.919:13952): avc: denied { connect } for pid=25971 comm="syz.1.11527" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1
[ 410.609921][ T9] usb 1-1: Using ep0 maxpacket: 16
[ 410.616732][ T9] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7
[ 410.628519][ T9] usb 1-1: New USB device found, idVendor=0458, idProduct=5016, bcdDevice= 0.00
[ 410.637932][ T9] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0
[ 410.648050][ T9] usb 1-1: config 0 descriptor??
[ 410.713849][T25982] rust_binder: Read failure Err(EAGAIN) in pid:1139
[ 410.856782][ T9] usbhid 1-1:0.0: can't add hid device: -71
[ 410.869469][ T9] usbhid 1-1:0.0: probe with driver usbhid failed with error -71
[ 410.878224][ T9] usb 1-1: USB disconnect, device number 3
[ 411.025958][T26008] rust_binder: Read failure Err(EAGAIN) in pid:1055
[ 411.101300][T26014] No source specified
[ 411.224166][T26030] rust_binder: Read failure Err(EAGAIN) in pid:1077
[ 411.272083][T26036] No source specified
[ 411.316879][T26042] netlink: 68 bytes leftover after parsing attributes in process `syz.3.11560'.
[ 411.346494][T26053] rust_binder: Read failure Err(EAGAIN) in pid:1094
[ 411.369291][T26059] No source specified
[ 411.409308][T26065] FAULT_INJECTION: forcing a failure.
[ 411.409308][T26065] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 411.422681][T26065] CPU: 0 UID: 0 PID: 26065 Comm: syz.3.11570 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e
[ 411.422712][T26065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
[ 411.422724][T26065] Call Trace:
[ 411.422731][T26065]
[ 411.422739][T26065] __dump_stack+0x21/0x30
[ 411.422766][T26065] dump_stack_lvl+0x10c/0x190
[ 411.422786][T26065] ? __cfi_dump_stack_lvl+0x10/0x10
[ 411.422806][T26065] ? unwind_get_return_address+0x51/0x90
[ 411.422827][T26065] ? __cfi_stack_trace_consume_entry+0x10/0x10
[ 411.422850][T26065] dump_stack+0x19/0x20
[ 411.422869][T26065] should_fail_ex+0x3d9/0x530
[ 411.422895][T26065] should_fail+0xf/0x20
[ 411.422909][T26065] should_fail_usercopy+0x1e/0x30
[ 411.422926][T26065] _copy_from_user+0x22/0xb0
[ 411.422945][T26065] ___sys_recvmsg+0x12f/0x510
[ 411.422961][T26065] ? __sys_recvmsg+0x280/0x280
[ 411.422976][T26065] ? __cfi_kstrtouint_from_user+0x10/0x10
[ 411.422992][T26065] ? selinux_file_permission+0x309/0xb30
[ 411.423012][T26065] ? __fget_files+0x2c5/0x340
[ 411.423031][T26065] do_recvmmsg+0x326/0x770
[ 411.423046][T26065] ? __sys_recvmmsg+0x290/0x290
[ 411.423061][T26065] ? __cfi_vfs_write+0x10/0x10
[ 411.423078][T26065] ? fput+0x1a5/0x240
[ 411.423096][T26065] __x64_sys_recvmmsg+0x191/0x240
[ 411.423111][T26065] ? __cfi___x64_sys_recvmmsg+0x10/0x10
[ 411.423127][T26065] ? __kasan_check_read+0x15/0x20
[ 411.423150][T26065] x64_sys_call+0x292c/0x2ee0
[ 411.423172][T26065] do_syscall_64+0x58/0xf0
[ 411.423193][T26065] ? clear_bhb_loop+0x50/0xa0
[ 411.423210][T26065] entry_SYSCALL_64_after_hwframe+0x76/0x7e
[ 411.423226][T26065] RIP: 0033:0x7f84f7f8f6c9
[ 411.423240][T26065] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 411.423254][T26065] RSP: 002b:00007f84f8ebf038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 411.423273][T26065] RAX: ffffffffffffffda RBX: 00007f84f81e5fa0 RCX: 00007f84f7f8f6c9
[ 411.423286][T26065] RDX: 0000000000000001 RSI: 0000200000000380 RDI: 0000000000000007
[ 411.423297][T26065] RBP: 00007f84f8ebf090 R08: 0000000000000000 R09: 0000000000000000
[ 411.423308][T26065] R10: 0000000040012160 R11: 0000000000000246 R12: 0000000000000001
[ 411.423320][T26065] R13: 00007f84f81e6038 R14: 00007f84f81e5fa0 R15: 00007ffd5c4b6598
[ 411.423334][T26065]
[ 411.555418][T26083] FAULT_INJECTION: forcing a failure.
[ 411.555418][T26083] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 411.677917][T26083] CPU: 1 UID: 0 PID: 26083 Comm: syz.3.11577 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e
[ 411.677951][T26083] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
[ 411.677962][T26083] Call Trace:
[ 411.677968][T26083]
[ 411.677975][T26083] __dump_stack+0x21/0x30
[ 411.678005][T26083] dump_stack_lvl+0x10c/0x190
[ 411.678024][T26083] ? __cfi_dump_stack_lvl+0x10/0x10
[ 411.678046][T26083] ? check_stack_object+0x12c/0x140
[ 411.678061][T26083] dump_stack+0x19/0x20
[ 411.678078][T26083] should_fail_ex+0x3d9/0x530
[ 411.678093][T26083] should_fail+0xf/0x20
[ 411.678106][T26083] should_fail_usercopy+0x1e/0x30
[ 411.678121][T26083] _copy_to_user+0x24/0xa0
[ 411.678139][T26083] simple_read_from_buffer+0xed/0x160
[ 411.678157][T26083] proc_fail_nth_read+0x19e/0x210
[ 411.678176][T26083] ? xas_find+0x1c6/0x840
[ 411.678196][T26083] ? __cfi_proc_fail_nth_read+0x10/0x10
[ 411.678215][T26083] ? bpf_lsm_file_permission+0xd/0x20
[ 411.678234][T26083] ? __cfi_proc_fail_nth_read+0x10/0x10
[ 411.678251][T26083] vfs_read+0x27d/0xc70
[ 411.678265][T26083] ? __cfi_mutex_unlock+0x10/0x10
[ 411.678278][T26083] ? __cfi_vfs_read+0x10/0x10
[ 411.678290][T26083] ? __kasan_check_write+0x18/0x20
[ 411.678311][T26083] ? mutex_lock+0x92/0x1c0
[ 411.678323][T26083] ? __cfi_mutex_lock+0x10/0x10
[ 411.678336][T26083] ? __fget_files+0x2c5/0x340
[ 411.678352][T26083] ksys_read+0x141/0x250
[ 411.678365][T26083] ? __cfi_ksys_read+0x10/0x10
[ 411.678378][T26083] ? __kasan_check_read+0x15/0x20
[ 411.678398][T26083] __x64_sys_read+0x7f/0x90
[ 411.678411][T26083] x64_sys_call+0x2638/0x2ee0
[ 411.678430][T26083] do_syscall_64+0x58/0xf0
[ 411.678447][T26083] ? clear_bhb_loop+0x50/0xa0
[ 411.678463][T26083] entry_SYSCALL_64_after_hwframe+0x76/0x7e
[ 411.678478][T26083] RIP: 0033:0x7f84f7f8e0dc
[ 411.678491][T26083] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48
[ 411.678503][T26083] RSP: 002b:00007f84f8e9e030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000
[ 411.678520][T26083] RAX: ffffffffffffffda RBX: 00007f84f81e6090 RCX: 00007f84f7f8e0dc
[ 411.678531][T26083] RDX: 000000000000000f RSI: 00007f84f8e9e0a0 RDI: 0000000000000008
[ 411.678541][T26083] RBP: 00007f84f8e9e090 R08: 0000000000000000 R09: 0000000000000000
[ 411.678551][T26083] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 411.678560][T26083] R13: 00007f84f81e6128 R14: 00007f84f81e6090 R15: 00007ffd5c4b6598
[ 411.678572][T26083]
[ 411.884298][T26088] No source specified
[ 412.201179][T26115] No source specified
[ 412.215149][T26119] FAULT_INJECTION: forcing a failure.
[ 412.215149][T26119] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 412.228826][T26119] CPU: 0 UID: 0 PID: 26119 Comm: syz.3.11592 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e
[ 412.228853][T26119] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
[ 412.228864][T26119] Call Trace:
[ 412.228870][T26119]
[ 412.228876][T26119] __dump_stack+0x21/0x30
[ 412.228903][T26119] dump_stack_lvl+0x10c/0x190
[ 412.228926][T26119] ? __cfi_dump_stack_lvl+0x10/0x10
[ 412.228948][T26119] ? kstrtoull+0x13b/0x1e0
[ 412.228964][T26119] dump_stack+0x19/0x20
[ 412.228986][T26119] should_fail_ex+0x3d9/0x530
[ 412.229005][T26119] should_fail+0xf/0x20
[ 412.229022][T26119] should_fail_usercopy+0x1e/0x30
[ 412.229042][T26119] _copy_from_user+0x22/0xb0
[ 412.229064][T26119] ___sys_sendmsg+0x159/0x2a0
[ 412.229091][T26119] ? __sys_sendmsg+0x280/0x280
[ 412.229116][T26119] ? proc_fail_nth_write+0x17e/0x210
[ 412.229140][T26119] ? __cfi_proc_fail_nth_write+0x10/0x10
[ 412.229174][T26119] __x64_sys_sendmsg+0x1eb/0x2c0
[ 412.229199][T26119] ? fput+0x1a5/0x240
[ 412.229220][T26119] ? __cfi___x64_sys_sendmsg+0x10/0x10
[ 412.229245][T26119] ? ksys_write+0x1ef/0x250
[ 412.229263][T26119] ? __kasan_check_read+0x15/0x20
[ 412.229290][T26119] x64_sys_call+0x2a4c/0x2ee0
[ 412.229314][T26119] do_syscall_64+0x58/0xf0
[ 412.229336][T26119] ? clear_bhb_loop+0x50/0xa0
[ 412.229356][T26119] entry_SYSCALL_64_after_hwframe+0x76/0x7e
[ 412.229376][T26119] RIP: 0033:0x7f84f7f8f6c9
[ 412.229392][T26119] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 412.229408][T26119] RSP: 002b:00007f84f8ebf038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[ 412.229430][T26119] RAX: ffffffffffffffda RBX: 00007f84f81e5fa0 RCX: 00007f84f7f8f6c9
[ 412.229445][T26119] RDX: 0000000000000000 RSI: 00002000000000c0 RDI: 0000000000000007
[ 412.229458][T26119] RBP: 00007f84f8ebf090 R08: 0000000000000000 R09: 0000000000000000
[ 412.229471][T26119] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 412.229483][T26119] R13: 00007f84f81e6038 R14: 00007f84f81e5fa0 R15: 00007ffd5c4b6598
[ 412.229498][T26119]
[ 412.547652][T26129] FAULT_INJECTION: forcing a failure.
[ 412.547652][T26129] name failslab, interval 1, probability 0, space 0, times 0
[ 412.560586][T26129] CPU: 1 UID: 0 PID: 26129 Comm: syz.3.11598 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e
[ 412.560619][T26129] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
[ 412.560631][T26129] Call Trace:
[ 412.560638][T26129]
[ 412.560646][T26129] __dump_stack+0x21/0x30
[ 412.560675][T26129] dump_stack_lvl+0x10c/0x190
[ 412.560698][T26129] ? __cfi_dump_stack_lvl+0x10/0x10
[ 412.560723][T26129] ? release_sock+0x171/0x1f0
[ 412.560745][T26129] dump_stack+0x19/0x20
[ 412.560767][T26129] should_fail_ex+0x3d9/0x530
[ 412.560787][T26129] should_failslab+0xac/0x100
[ 412.560809][T26129] kmem_cache_alloc_node_noprof+0x45/0x440
[ 412.560834][T26129] ? netlink_data_ready+0x20/0x20
[ 412.560858][T26129] ? __alloc_skb+0x10c/0x370
[ 412.560881][T26129] __alloc_skb+0x10c/0x370
[ 412.560902][T26129] netlink_alloc_large_skb+0xf7/0x1b0
[ 412.560926][T26129] netlink_sendmsg+0x586/0xaf0
[ 412.560951][T26129] ? __kasan_check_write+0x18/0x20
[ 412.560978][T26129] ? __cfi_netlink_sendmsg+0x10/0x10
[ 412.561002][T26129] ? __fget_files+0x2c5/0x340
[ 412.561028][T26129] ? bpf_lsm_socket_sendmsg+0xd/0x20
[ 412.561050][T26129] ? security_socket_sendmsg+0x33/0xd0
[ 412.561068][T26129] __sys_sendto+0x66d/0x6f0
[ 412.561093][T26129] ? __cfi___sys_sendto+0x10/0x10
[ 412.561118][T26129] ? __kasan_check_write+0x18/0x20
[ 412.561145][T26129] ? __cfi_ksys_write+0x10/0x10
[ 412.561164][T26129] __x64_sys_sendto+0xe9/0x100
[ 412.561188][T26129] x64_sys_call+0x2c2c/0x2ee0
[ 412.561214][T26129] do_syscall_64+0x58/0xf0
[ 412.561237][T26129] ? clear_bhb_loop+0x50/0xa0
[ 412.561257][T26129] entry_SYSCALL_64_after_hwframe+0x76/0x7e
[ 412.561277][T26129] RIP: 0033:0x7f84f7f8f6c9
[ 412.561294][T26129] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 412.561310][T26129] RSP: 002b:00007f84f8ebf038 EFLAGS: 00000246 ORIG_RAX: 000000000000002c
[ 412.561331][T26129] RAX: ffffffffffffffda RBX: 00007f84f81e5fa0 RCX: 00007f84f7f8f6c9
[ 412.561347][T26129] RDX: 0000000000000001 RSI: 0000200000000740 RDI: 0000000000000008
[ 412.561360][T26129] RBP: 00007f84f8ebf090 R08: 0000000000000000 R09: 0000000000000000
[ 412.561373][T26129] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 412.561386][T26129] R13: 00007f84f81e6038 R14: 00007f84f81e5fa0 R15: 00007ffd5c4b6598
[ 412.561403][T26129]
[ 412.826636][T26138] FAULT_INJECTION: forcing a failure.
[ 412.826636][T26138] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 412.839812][T26138] CPU: 1 UID: 0 PID: 26138 Comm: syz.0.11601 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e
[ 412.839841][T26138] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
[ 412.839853][T26138] Call Trace:
[ 412.839859][T26138]
[ 412.839865][T26138] __dump_stack+0x21/0x30
[ 412.839893][T26138] dump_stack_lvl+0x10c/0x190
[ 412.839916][T26138] ? __cfi_dump_stack_lvl+0x10/0x10
[ 412.839939][T26138] ? check_stack_object+0x107/0x140
[ 412.839956][T26138] dump_stack+0x19/0x20
[ 412.839981][T26138] should_fail_ex+0x3d9/0x530
[ 412.839999][T26138] should_fail+0xf/0x20
[ 412.840014][T26138] should_fail_usercopy+0x1e/0x30
[ 412.840032][T26138] _copy_from_user+0x22/0xb0
[ 412.840053][T26138] __sys_bind+0x1de/0x3f0
[ 412.840074][T26138] ? __cfi___sys_bind+0x10/0x10
[ 412.840096][T26138] ? __kasan_check_read+0x15/0x20
[ 412.840122][T26138] __x64_sys_bind+0x7e/0x90
[ 412.840141][T26138] x64_sys_call+0x1ffd/0x2ee0
[ 412.840163][T26138] do_syscall_64+0x58/0xf0
[ 412.840184][T26138] ? clear_bhb_loop+0x50/0xa0
[ 412.840204][T26138] entry_SYSCALL_64_after_hwframe+0x76/0x7e
[ 412.840222][T26138] RIP: 0033:0x7f9480f8f6c9
[ 412.840237][T26138] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 412.840251][T26138] RSP: 002b:00007f9481e4d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000031
[ 412.840271][T26138] RAX: ffffffffffffffda RBX: 00007f94811e5fa0 RCX: 00007f9480f8f6c9
[ 412.840285][T26138] RDX: 0000000000000010 RSI: 0000200000000100 RDI: 0000000000000007
[ 412.840297][T26138] RBP: 00007f9481e4d090 R08: 0000000000000000 R09: 0000000000000000
[ 412.840308][T26138] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 412.840319][T26138] R13: 00007f94811e6038 R14: 00007f94811e5fa0 R15: 00007ffc9a5ebef8
[ 412.840333][T26138]
[ 413.190793][T26153] syz.2.11608 calls setitimer() with new_value NULL pointer. Misfeature support will be removed
[ 413.471368][T26175] FAULT_INJECTION: forcing a failure.
[ 413.471368][T26175] name failslab, interval 1, probability 0, space 0, times 0
[ 413.489844][T26175] CPU: 1 UID: 0 PID: 26175 Comm: syz.2.11619 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e
[ 413.489878][T26175] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
[ 413.489891][T26175] Call Trace:
[ 413.489898][T26175]
[ 413.489906][T26175] __dump_stack+0x21/0x30
[ 413.489936][T26175] dump_stack_lvl+0x10c/0x190
[ 413.489960][T26175] ? __cfi_dump_stack_lvl+0x10/0x10
[ 413.489986][T26175] dump_stack+0x19/0x20
[ 413.490008][T26175] should_fail_ex+0x3d9/0x530
[ 413.490028][T26175] should_failslab+0xac/0x100
[ 413.490050][T26175] kmem_cache_alloc_lru_noprof+0x44/0x430
[ 413.490068][T26175] ? sock_alloc_inode+0x48/0x150
[ 413.490088][T26175] ? __kasan_check_write+0x18/0x20
[ 413.490115][T26175] sock_alloc_inode+0x48/0x150
[ 413.490135][T26175] ? __cfi_sock_alloc_inode+0x10/0x10
[ 413.490156][T26175] alloc_inode+0x7a/0x270
[ 413.490176][T26175] ? bpf_lsm_socket_create+0xd/0x20
[ 413.490199][T26175] new_inode_pseudo+0x19/0x40
[ 413.490220][T26175] __sock_create+0x130/0x810
[ 413.490242][T26175] __sys_socket+0xe2/0x1c0
[ 413.490263][T26175] __x64_sys_socket+0x7e/0x90
[ 413.490284][T26175] x64_sys_call+0x2608/0x2ee0
[ 413.490306][T26175] do_syscall_64+0x58/0xf0
[ 413.490326][T26175] ? clear_bhb_loop+0x50/0xa0
[ 413.490343][T26175] entry_SYSCALL_64_after_hwframe+0x76/0x7e
[ 413.490360][T26175] RIP: 0033:0x7f80c198f6c9
[ 413.490374][T26175] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 413.490389][T26175] RSP: 002b:00007f80c28e9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000029
[ 413.490407][T26175] RAX: ffffffffffffffda RBX: 00007f80c1be5fa0 RCX: 00007f80c198f6c9
[ 413.490420][T26175] RDX: 0000000000000000 RSI: 0000000000000803 RDI: 0000000000000010
[ 413.490433][T26175] RBP: 00007f80c28e9090 R08: 0000000000000000 R09: 0000000000000000
[ 413.490447][T26175] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 413.490464][T26175] R13: 00007f80c1be6038 R14: 00007f80c1be5fa0 R15: 00007fff68b49fb8
[ 413.490485][T26175]
[ 413.490495][T26175] socket: no more sockets
[ 413.554515][T26179] netlink: 108 bytes leftover after parsing attributes in process `syz.0.11621'.
[ 413.673986][T26184] rust_binder: Read failure Err(EAGAIN) in pid:1134
[ 413.726427][T26188] FAULT_INJECTION: forcing a failure.
[ 413.726427][T26188] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 413.747654][T26188] CPU: 0 UID: 0 PID: 26188 Comm: syz.1.11625 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e
[ 413.747686][T26188] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
[ 413.747706][T26188] Call Trace:
[ 413.747713][T26188]
[ 413.747722][T26188] __dump_stack+0x21/0x30
[ 413.747748][T26188] dump_stack_lvl+0x10c/0x190
[ 413.747771][T26188] ? __cfi_dump_stack_lvl+0x10/0x10
[ 413.747794][T26188] ? kstrtoull+0x13b/0x1e0
[ 413.747810][T26188] dump_stack+0x19/0x20
[ 413.747829][T26188] should_fail_ex+0x3d9/0x530
[ 413.747845][T26188] should_fail+0xf/0x20
[ 413.747862][T26188] should_fail_usercopy+0x1e/0x30
[ 413.747880][T26188] _copy_from_user+0x22/0xb0
[ 413.747899][T26188] ___sys_sendmsg+0x159/0x2a0
[ 413.747923][T26188] ? __sys_sendmsg+0x280/0x280
[ 413.747945][T26188] ? proc_fail_nth_write+0x17e/0x210
[ 413.747965][T26188] ? __cfi_proc_fail_nth_write+0x10/0x10
[ 413.747989][T26188] __x64_sys_sendmsg+0x1eb/0x2c0
[ 413.748010][T26188] ? fput+0x1a5/0x240
[ 413.748028][T26188] ? __cfi___x64_sys_sendmsg+0x10/0x10
[ 413.748049][T26188] ? ksys_write+0x1ef/0x250
[ 413.748064][T26188] ? __kasan_check_read+0x15/0x20
[ 413.748086][T26188] x64_sys_call+0x2a4c/0x2ee0
[ 413.748107][T26188] do_syscall_64+0x58/0xf0
[ 413.748125][T26188] ? clear_bhb_loop+0x50/0xa0
[ 413.748143][T26188] entry_SYSCALL_64_after_hwframe+0x76/0x7e
[ 413.748158][T26188] RIP: 0033:0x7f02fab8f6c9
[ 413.748173][T26188] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 413.748187][T26188] RSP: 002b:00007f02fb9f2038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[ 413.748206][T26188] RAX: ffffffffffffffda RBX: 00007f02fade5fa0 RCX: 00007f02fab8f6c9
[ 413.748219][T26188] RDX: 0000000024000000 RSI: 0000200000000280 RDI: 0000000000000008
[ 413.748230][T26188] RBP: 00007f02fb9f2090 R08: 0000000000000000 R09: 0000000000000000
[ 413.748241][T26188] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 413.748253][T26188] R13: 00007f02fade6038 R14: 00007f02fade5fa0 R15: 00007fffac1106c8
[ 413.748268][T26188]
[ 413.981713][T26202] FAULT_INJECTION: forcing a failure.
[ 413.981713][T26202] name failslab, interval 1, probability 0, space 0, times 0
[ 413.994378][T26202] CPU: 0 UID: 0 PID: 26202 Comm: syz.0.11631 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e
[ 413.994418][T26202] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
[ 413.994430][T26202] Call Trace:
[ 413.994437][T26202]
[ 413.994446][T26202] __dump_stack+0x21/0x30
[ 413.994475][T26202] dump_stack_lvl+0x10c/0x190
[ 413.994499][T26202] ? __cfi_dump_stack_lvl+0x10/0x10
[ 413.994523][T26202] ? proc_tid_base_lookup+0x2f/0x40
[ 413.994548][T26202] ? do_filp_open+0x1c6/0x3e0
[ 413.994570][T26202] ? do_sys_openat2+0x12c/0x1c0
[ 413.994593][T26202] ? __x64_sys_openat+0x13a/0x170
[ 413.994615][T26202] ? do_syscall_64+0x58/0xf0
[ 413.994639][T26202] dump_stack+0x19/0x20
[ 413.994660][T26202] should_fail_ex+0x3d9/0x530
[ 413.994680][T26202] should_failslab+0xac/0x100
[ 413.994700][T26202] kmem_cache_alloc_noprof+0x42/0x430
[ 413.994718][T26202] ? __asan_memcpy+0x5a/0x80
[ 413.994734][T26202] ? vm_area_dup+0x42/0x570
[ 413.994753][T26202] vm_area_dup+0x42/0x570
[ 413.994771][T26202] __split_vma+0x1bd/0xa80
[ 413.994790][T26202] ? kasan_save_alloc_info+0x40/0x50
[ 413.994815][T26202] ? vms_gather_munmap_vmas+0xdd0/0xdd0
[ 413.994836][T26202] vms_gather_munmap_vmas+0x273/0xdd0
[ 413.994858][T26202] mmap_region+0x598/0x1bc0
[ 413.994876][T26202] ? __cfi_mmap_region+0x10/0x10
[ 413.994897][T26202] ? __kasan_check_read+0x15/0x20
[ 413.994922][T26202] ? arch_get_unmapped_area_topdown+0x232/0x8d0
[ 413.994945][T26202] ? file_mmap_ok+0x147/0x1a0
[ 413.994962][T26202] do_mmap+0xb6d/0x13c0
[ 413.994980][T26202] ? __cfi_do_mmap+0x10/0x10
[ 413.994996][T26202] ? down_write_killable+0xe9/0x2d0
[ 413.995015][T26202] ? __cfi_down_write_killable+0x10/0x10
[ 413.995036][T26202] vm_mmap_pgoff+0x38f/0x4e0
[ 413.995055][T26202] ? __cfi_vm_mmap_pgoff+0x10/0x10
[ 413.995072][T26202] ? __fget_files+0x2c5/0x340
[ 413.995093][T26202] ksys_mmap_pgoff+0x166/0x1e0
[ 413.995111][T26202] __x64_sys_mmap+0x121/0x140
[ 413.995137][T26202] x64_sys_call+0x13bf/0x2ee0
[ 413.995162][T26202] do_syscall_64+0x58/0xf0
[ 413.995184][T26202] ? clear_bhb_loop+0x50/0xa0
[ 413.995205][T26202] entry_SYSCALL_64_after_hwframe+0x76/0x7e
[ 413.995225][T26202] RIP: 0033:0x7f9480f8f6c9
[ 413.995241][T26202] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 413.995258][T26202] RSP: 002b:00007f9481e4d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000009
[ 413.995279][T26202] RAX: ffffffffffffffda RBX: 00007f94811e5fa0 RCX: 00007f9480f8f6c9
[ 413.995294][T26202] RDX: 0000000000000000 RSI: 0000000000001000 RDI: 0000200000701000
[ 413.995307][T26202] RBP: 00007f9481e4d090 R08: 0000000000000007 R09: 0000000000000000
[ 413.995320][T26202] R10: 0000000000000012 R11: 0000000000000246 R12: 0000000000000001
[ 413.995332][T26202] R13: 00007f94811e6038 R14: 00007f94811e5fa0 R15: 00007ffc9a5ebef8
[ 413.995349][T26202]
[ 414.357324][T26214] rust_binder: Transaction failed: BR_FAILED_REPLY { source: ENOENT } my_pid:928
[ 414.405116][T26220] No source specified
[ 415.064403][T26244] No source specified
[ 416.132020][T26272] No source specified
[ 417.295545][T26300] No source specified
[ 418.600186][T26330] No source specified
[ 418.691499][T26338] rust_binder: Read failure Err(EAGAIN) in pid:1178
[ 418.930812][T26354] No source specified
[ 419.379349][T26381] rust_binder: Read failure Err(EAGAIN) in pid:1236
[ 419.709000][T26405] rust_binder: Read failure Err(EAGAIN) in pid:1071
[ 420.033100][T26427] rust_binder: Read failure Err(EAGAIN) in pid:1206
[ 420.090679][T26435] rust_binder: Read failure Err(EAGAIN) in pid:1086
[ 420.124498][T26441] No source specified
[ 420.281587][T26455] rust_binder: Read failure Err(EAGAIN) in pid:975
[ 420.581772][T26482] rust_binder: Read failure Err(EAGAIN) in pid:1257
[ 420.633582][T26488] No source specified
[ 421.132532][T26505] No source specified
[ 421.154120][ T330] bridge_slave_1: left allmulticast mode
[ 421.160282][ T330] bridge_slave_1: left promiscuous mode
[ 421.165934][ T330] bridge0: port 2(bridge_slave_1) entered disabled state
[ 421.195325][ T330] bridge_slave_0: left allmulticast mode
[ 421.209832][ T330] bridge_slave_0: left promiscuous mode
[ 421.215486][ T330] bridge0: port 1(bridge_slave_0) entered disabled state
[ 421.370733][ T330] veth1_macvtap: left promiscuous mode
[ 421.376297][ T330] veth0_vlan: left promiscuous mode
[ 421.551212][T26507] bridge0: port 1(bridge_slave_0) entered blocking state
[ 421.558330][T26507] bridge0: port 1(bridge_slave_0) entered disabled state
[ 421.578574][T26507] bridge_slave_0: entered allmulticast mode
[ 421.590387][T26507] bridge_slave_0: entered promiscuous mode
[ 421.596959][T26507] bridge0: port 2(bridge_slave_1) entered blocking state
[ 421.604062][T26507] bridge0: port 2(bridge_slave_1) entered disabled state
[ 421.611199][T26507] bridge_slave_1: entered allmulticast mode
[ 421.617550][T26507] bridge_slave_1: entered promiscuous mode
[ 421.772012][T26507] bridge0: port 2(bridge_slave_1) entered blocking state
[ 421.779082][T26507] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 421.786391][T26507] bridge0: port 1(bridge_slave_0) entered blocking state
[ 421.793444][T26507] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 421.912610][ T330] bridge0: port 1(bridge_slave_0) entered disabled state
[ 421.940335][ T330] bridge0: port 2(bridge_slave_1) entered disabled state
[ 421.972000][ T12] bridge0: port 1(bridge_slave_0) entered blocking state
[ 421.979050][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 422.007783][ T12] bridge0: port 2(bridge_slave_1) entered blocking state
[ 422.014883][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 422.083793][T26507] veth0_vlan: entered promiscuous mode
[ 422.107392][T26507] veth1_macvtap: entered promiscuous mode
[ 423.520674][T26587] No source specified
[ 424.148371][T26613] rust_binder: Read failure Err(EAGAIN) in pid:40
[ 424.186051][T26623] rust_binder: Read failure Err(EAGAIN) in pid:1251
[ 424.350695][T26653] rust_binder: Read failure Err(EAGAIN) in pid:1014
[ 424.385327][T26659] rust_binder: Read failure Err(EAGAIN) in pid:1016
[ 424.602230][T26683] rust_binder: Read failure Err(EAGAIN) in pid:1266
[ 424.788203][T26705] rust_binder: Read failure Err(EAGAIN) in pid:68
[ 424.934004][T26730] rust_binder: Read failure Err(EAGAIN) in pid:80
[ 424.946129][T26732] rust_binder: Read failure Err(EAGAIN) in pid:1281
[ 425.040200][T26744] No source specified
[ 425.194134][ T12] bridge_slave_1: left allmulticast mode
[ 425.205774][ T12] bridge_slave_1: left promiscuous mode
[ 425.219196][ T12] bridge0: port 2(bridge_slave_1) entered disabled state
[ 425.231142][ T12] bridge_slave_0: left allmulticast mode
[ 425.236855][ T12] bridge_slave_0: left promiscuous mode
[ 425.243114][ T12] bridge0: port 1(bridge_slave_0) entered disabled state
[ 425.361142][ T12] veth1_macvtap: left promiscuous mode
[ 425.371141][ T12] veth0_vlan: left promiscuous mode
[ 425.547838][T26750] bridge0: port 1(bridge_slave_0) entered blocking state
[ 425.562970][T26750] bridge0: port 1(bridge_slave_0) entered disabled state
[ 425.578248][T26750] bridge_slave_0: entered allmulticast mode
[ 425.592028][T26750] bridge_slave_0: entered promiscuous mode
[ 425.607374][T26750] bridge0: port 2(bridge_slave_1) entered blocking state
[ 425.620845][T26750] bridge0: port 2(bridge_slave_1) entered disabled state
[ 425.627953][T26750] bridge_slave_1: entered allmulticast mode
[ 425.648512][T26750] bridge_slave_1: entered promiscuous mode
[ 425.733059][T26774] rust_binder: Read failure Err(EAGAIN) in pid:1043
[ 425.780047][T26750] bridge0: port 2(bridge_slave_1) entered blocking state
[ 425.793739][T26750] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 425.801049][T26750] bridge0: port 1(bridge_slave_0) entered blocking state
[ 425.808088][T26750] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 425.839179][ T12] bridge0: port 1(bridge_slave_0) entered disabled state
[ 425.846970][ T12] bridge0: port 2(bridge_slave_1) entered disabled state
[ 425.873700][ T12] bridge0: port 1(bridge_slave_0) entered blocking state
[ 425.880779][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 425.888556][ T12] bridge0: port 2(bridge_slave_1) entered blocking state
[ 425.895628][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 425.919521][T26750] veth0_vlan: entered promiscuous mode
[ 425.929660][T26750] veth1_macvtap: entered promiscuous mode
[ 426.890355][T26850] rust_binder: Read failure Err(EAGAIN) in pid:1140
[ 427.274615][T26877] rust_binder: Read failure Err(EAGAIN) in pid:45
[ 427.580090][T26902] rust_binder: Read failure Err(EAGAIN) in pid:1166
[ 427.739408][T26914] No source specified
[ 428.172302][T26945] rust_binder: Read failure Err(EAGAIN) in pid:1071
[ 428.331079][T26973] rust_binder: Read failure Err(EAGAIN) in pid:1079
[ 428.509428][T26996] rust_binder: Read failure Err(EAGAIN) in pid:81
[ 428.553058][T27004] rust_binder: Read failure Err(EAGAIN) in pid:148
[ 428.824035][T27044] No source specified
[ 428.860864][T27049] rust_binder: Read failure Err(EAGAIN) in pid:1113
[ 429.084745][T27081] rust_binder: Read failure Err(EAGAIN) in pid:170
[ 429.289919][T27117] rust_binder: Read failure Err(EAGAIN) in pid:1192
[ 429.314067][T27121] No source specified
[ 429.448940][T27140] rust_binder: Read failure Err(EAGAIN) in pid:1206
[ 429.588100][T27160] No source specified
[ 429.609385][T27164] rust_binder: Read failure Err(EAGAIN) in pid:1146
[ 429.713598][T27179] rust_binder: Read failure Err(EAGAIN) in pid:206
[ 429.749336][T27183] No source specified
[ 429.841459][T27193] rust_binder: Read failure Err(EAGAIN) in pid:1155
[ 429.974917][T27212] rust_binder: Read failure Err(EAGAIN) in pid:1228
[ 430.244356][T27253] rust_binder: Read failure Err(EAGAIN) in pid:1244
[ 430.334756][T27266] rust_binder: Read failure Err(EAGAIN) in pid:1252
[ 430.485365][T27288] rust_binder: Read failure Err(EAGAIN) in pid:139
[ 430.625743][T27310] rust_binder: Failure when writing BR_NOOP at beginning of buffer.
[ 430.659814][T27310] rust_binder: Read failure Err(EFAULT) in pid:149
[ 430.741350][T27316] rust_binder: Read failure Err(EAGAIN) in pid:1265
[ 431.809032][T27412] rust_binder: Read failure Err(EAGAIN) in pid:1187
[ 433.054010][ T330] bridge_slave_1: left allmulticast mode
[ 433.068502][ T330] bridge_slave_1: left promiscuous mode
[ 433.076826][ T330] bridge0: port 2(bridge_slave_1) entered disabled state
[ 433.100338][ T330] bridge_slave_0: left allmulticast mode
[ 433.106011][ T330] bridge_slave_0: left promiscuous mode
[ 433.120133][ T330] bridge0: port 1(bridge_slave_0) entered disabled state
[ 433.269019][ T330] veth1_macvtap: left promiscuous mode
[ 433.274626][ T330] veth0_vlan: left promiscuous mode
[ 433.459806][T27462] bridge0: port 1(bridge_slave_0) entered blocking state
[ 433.466876][T27462] bridge0: port 1(bridge_slave_0) entered disabled state
[ 433.489852][T27462] bridge_slave_0: entered allmulticast mode
[ 433.498865][T27462] bridge_slave_0: entered promiscuous mode
[ 433.513632][T27462] bridge0: port 2(bridge_slave_1) entered blocking state
[ 433.520984][T27462] bridge0: port 2(bridge_slave_1) entered disabled state
[ 433.528134][T27462] bridge_slave_1: entered allmulticast mode
[ 433.538920][T27462] bridge_slave_1: entered promiscuous mode
[ 433.712167][T27462] bridge0: port 2(bridge_slave_1) entered blocking state
[ 433.719239][T27462] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 433.726583][T27462] bridge0: port 1(bridge_slave_0) entered blocking state
[ 433.733659][T27462] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 433.793194][ T12] bridge0: port 1(bridge_slave_0) entered disabled state
[ 433.801023][ T12] bridge0: port 2(bridge_slave_1) entered disabled state
[ 433.830554][ T330] bridge0: port 1(bridge_slave_0) entered blocking state
[ 433.837725][ T330] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 433.860170][ T330] bridge0: port 2(bridge_slave_1) entered blocking state
[ 433.867264][ T330] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 433.927229][T27462] veth0_vlan: entered promiscuous mode
[ 433.967228][T27462] veth1_macvtap: entered promiscuous mode
[ 435.809099][T27577] rust_binder: Read failure Err(EAGAIN) in pid:14
[ 436.531745][T27634] rust_binder: Read failure Err(EAGAIN) in pid:40
[ 436.617932][T27650] rust_binder: Read failure Err(EAGAIN) in pid:313
[ 436.707790][T27663] rust_binder: Read failure Err(EAGAIN) in pid:232
[ 436.768166][T27675] rust_binder: Read failure Err(EAGAIN) in pid:240
[ 436.796490][T27683] rust_binder: Read failure Err(EAGAIN) in pid:53
[ 436.864628][T27698] rust_binder: Read failure Err(EAGAIN) in pid:246
[ 436.977849][T27709] rust_binder: Read failure Err(EAGAIN) in pid:250
[ 437.014001][ T12] bridge_slave_1: left allmulticast mode
[ 437.027391][ T12] bridge_slave_1: left promiscuous mode
[ 437.033362][ T12] bridge0: port 2(bridge_slave_1) entered disabled state
[ 437.043919][ T12] bridge_slave_0: left allmulticast mode
[ 437.049903][ T12] bridge_slave_0: left promiscuous mode
[ 437.055601][ T12] bridge0: port 1(bridge_slave_0) entered disabled state
[ 437.181953][T27713] bridge0: port 1(bridge_slave_0) entered blocking state
[ 437.189205][T27713] bridge0: port 1(bridge_slave_0) entered disabled state
[ 437.196726][T27713] bridge_slave_0: entered allmulticast mode
[ 437.205090][T27713] bridge_slave_0: entered promiscuous mode
[ 437.212102][T27713] bridge0: port 2(bridge_slave_1) entered blocking state
[ 437.219190][T27713] bridge0: port 2(bridge_slave_1) entered disabled state
[ 437.228380][T27713] bridge_slave_1: entered allmulticast mode
[ 437.234777][T27713] bridge_slave_1: entered promiscuous mode
[ 437.254469][ T12] veth1_macvtap: left promiscuous mode
[ 437.269644][ T12] veth0_vlan: left promiscuous mode
[ 437.503595][T27713] bridge0: port 2(bridge_slave_1) entered blocking state
[ 437.510691][T27713] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 437.517983][T27713] bridge0: port 1(bridge_slave_0) entered blocking state
[ 437.525058][T27713] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 437.646950][T27713] veth0_vlan: entered promiscuous mode
[ 437.660332][T27713] veth1_macvtap: entered promiscuous mode
[ 441.821017][T28027] FAULT_INJECTION: forcing a failure.
[ 441.821017][T28027] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 441.850053][T28027] CPU: 1 UID: 0 PID: 28027 Comm: syz.2.12451 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e
[ 441.850088][T28027] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
[ 441.850101][T28027] Call Trace:
[ 441.850108][T28027]
[ 441.850117][T28027] __dump_stack+0x21/0x30
[ 441.850152][T28027] dump_stack_lvl+0x10c/0x190
[ 441.850177][T28027] ? __cfi_dump_stack_lvl+0x10/0x10
[ 441.850200][T28027] ? proc_fail_nth_write+0x17e/0x210
[ 441.850223][T28027] ? check_stack_object+0x107/0x140
[ 441.850246][T28027] dump_stack+0x19/0x20
[ 441.850269][T28027] should_fail_ex+0x3d9/0x530
[ 441.850289][T28027] should_fail+0xf/0x20
[ 441.850306][T28027] should_fail_usercopy+0x1e/0x30
[ 441.850327][T28027] _copy_from_user+0x22/0xb0
[ 441.850348][T28027] __tun_chr_ioctl+0x1f2/0x1f10
[ 441.850368][T28027] ? __kasan_check_write+0x18/0x20
[ 441.850394][T28027] ? tun_flow_create+0x410/0x410
[ 441.850413][T28027] ? __fget_files+0x2c5/0x340
[ 441.850434][T28027] ? __fget_files+0x2c5/0x340
[ 441.850461][T28027] tun_chr_ioctl+0x2e/0x40
[ 441.850480][T28027] ? __cfi_tun_chr_ioctl+0x10/0x10
[ 441.850498][T28027] __se_sys_ioctl+0x135/0x1b0
[ 441.850519][T28027] __x64_sys_ioctl+0x7f/0xa0
[ 441.850539][T28027] x64_sys_call+0x1878/0x2ee0
[ 441.850564][T28027] do_syscall_64+0x58/0xf0
[ 441.850587][T28027] ? clear_bhb_loop+0x50/0xa0
[ 441.850608][T28027] entry_SYSCALL_64_after_hwframe+0x76/0x7e
[ 441.850628][T28027] RIP: 0033:0x7f48ffd8f6c9
[ 441.850645][T28027] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 441.850661][T28027] RSP: 002b:00007f4900ce3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 441.850683][T28027] RAX: ffffffffffffffda RBX: 00007f48fffe5fa0 RCX: 00007f48ffd8f6c9
[ 441.850698][T28027] RDX: 0000200000000500 RSI: 00000000400454ca RDI: 0000000000000006
[ 441.850712][T28027] RBP: 00007f4900ce3090 R08: 0000000000000000 R09: 0000000000000000
[ 441.850725][T28027] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 441.850737][T28027] R13: 00007f48fffe6038 R14: 00007f48fffe5fa0 R15: 00007ffef3c56d48
[ 441.850754][T28027]
[ 442.627774][ T36] audit: type=1400 audit(1763400159.989:13953): avc: denied { write } for pid=28099 comm="syz.3.12485" name="uinput" dev="devtmpfs" ino=194 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1
[ 442.653648][T28100] input: syz1 as /devices/virtual/input/input4
[ 442.661146][ T36] audit: type=1400 audit(1763400160.029:13954): avc: denied { read } for pid=95 comm="acpid" name="event3" dev="devtmpfs" ino=444 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 442.701623][ T36] audit: type=1400 audit(1763400160.029:13955): avc: denied { open } for pid=95 comm="acpid" path="/dev/input/event3" dev="devtmpfs" ino=444 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 442.729051][ T36] audit: type=1400 audit(1763400160.029:13956): avc: denied { ioctl } for pid=95 comm="acpid" path="/dev/input/event3" dev="devtmpfs" ino=444 ioctlcmd=0x4520 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 443.009981][ T36] audit: type=1400 audit(1763400160.369:13957): avc: denied { create } for pid=28154 comm="syz.1.12509" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1
[ 443.030193][ T36] audit: type=1400 audit(1763400160.379:13958): avc: denied { getopt } for pid=28154 comm="syz.1.12509" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1
[ 443.865128][T28313] rust_binder: Read failure Err(EAGAIN) in pid:222
[ 444.921685][T28385] rust_binder: Read failure Err(EAGAIN) in pid:152
[ 448.581055][T28579] overlayfs: workdir and upperdir must be separate subtrees
[ 448.656871][T28591] rust_binder: Failure when writing BR_NOOP at beginning of buffer.
[ 448.656895][T28591] rust_binder: Read failure Err(EFAULT) in pid:205
[ 448.778462][ T36] audit: type=1400 audit(1763400166.139:13959): avc: denied { create } for pid=28608 comm="syz.2.12725" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1
[ 450.842213][T28926] rust_binder: Failure when writing BR_NOOP at beginning of buffer.
[ 450.842237][T28926] rust_binder: Read failure Err(EFAULT) in pid:379
[ 469.572063][T29994] FAULT_INJECTION: forcing a failure.
[ 469.572063][T29994] name failslab, interval 1, probability 0, space 0, times 0
[ 469.619805][T29994] CPU: 0 UID: 0 PID: 29994 Comm: syz.0.13408 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e
[ 469.619837][T29994] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
[ 469.619848][T29994] Call Trace:
[ 469.619854][T29994]
[ 469.619861][T29994] __dump_stack+0x21/0x30
[ 469.619888][T29994] dump_stack_lvl+0x10c/0x190
[ 469.619909][T29994] ? __cfi_dump_stack_lvl+0x10/0x10
[ 469.619930][T29994] ? bpf_lsm_file_permission+0xd/0x20
[ 469.619954][T29994] dump_stack+0x19/0x20
[ 469.619974][T29994] should_fail_ex+0x3d9/0x530
[ 469.619993][T29994] should_failslab+0xac/0x100
[ 469.620014][T29994] kmem_cache_alloc_noprof+0x42/0x430
[ 469.620032][T29994] ? __kasan_check_write+0x18/0x20
[ 469.620058][T29994] ? copy_fs_struct+0x5d/0x2d0
[ 469.620076][T29994] ? __cfi_mutex_unlock+0x10/0x10
[ 469.620093][T29994] ? __fget_files+0x2c5/0x340
[ 469.620126][T29994] copy_fs_struct+0x5d/0x2d0
[ 469.620141][T29994] ? ksys_unshare+0x381/0x880
[ 469.620163][T29994] ksys_unshare+0x48f/0x880
[ 469.620185][T29994] ? __cfi_ksys_unshare+0x10/0x10
[ 469.620209][T29994] ? __kasan_check_read+0x15/0x20
[ 469.620234][T29994] ? fpregs_assert_state_consistent+0xb7/0xe0
[ 469.620257][T29994] __x64_sys_unshare+0x3c/0x50
[ 469.620279][T29994] x64_sys_call+0x2998/0x2ee0
[ 469.620305][T29994] do_syscall_64+0x58/0xf0
[ 469.620327][T29994] ? clear_bhb_loop+0x50/0xa0
[ 469.620348][T29994] entry_SYSCALL_64_after_hwframe+0x76/0x7e
[ 469.620367][T29994] RIP: 0033:0x7fad38d8f6c9
[ 469.620384][T29994] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 469.620399][T29994] RSP: 002b:00007fad39c79038 EFLAGS: 00000246 ORIG_RAX: 0000000000000110
[ 469.620420][T29994] RAX: ffffffffffffffda RBX: 00007fad38fe5fa0 RCX: 00007fad38d8f6c9
[ 469.620435][T29994] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000062040200
[ 469.620447][T29994] RBP: 00007fad39c79090 R08: 0000000000000000 R09: 0000000000000000
[ 469.620460][T29994] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 469.620473][T29994] R13: 00007fad38fe6038 R14: 00007fad38fe5fa0 R15: 00007ffc1050ec98
[ 469.620489][T29994]
[ 470.767588][ T36] audit: type=1400 audit(1763400188.129:13960): avc: denied { ioctl } for pid=30040 comm="syz.1.13432" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=210308 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1
[ 471.072342][T30085] FAULT_INJECTION: forcing a failure.
[ 471.072342][T30085] name failslab, interval 1, probability 0, space 0, times 0
[ 471.099859][T30085] CPU: 1 UID: 0 PID: 30085 Comm: syz.1.13452 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e
[ 471.099891][T30085] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
[ 471.099902][T30085] Call Trace:
[ 471.099909][T30085]
[ 471.099916][T30085] __dump_stack+0x21/0x30
[ 471.099945][T30085] dump_stack_lvl+0x10c/0x190
[ 471.099970][T30085] ? __cfi_dump_stack_lvl+0x10/0x10
[ 471.099993][T30085] ? avc_has_perm+0x144/0x220
[ 471.100017][T30085] dump_stack+0x19/0x20
[ 471.100039][T30085] should_fail_ex+0x3d9/0x530
[ 471.100059][T30085] should_failslab+0xac/0x100
[ 471.100079][T30085] __kmalloc_cache_noprof+0x41/0x490
[ 471.100098][T30085] ? vhost_task_create+0x101/0x350
[ 471.100118][T30085] ? __cfi_kvm_nx_huge_page_recovery_worker+0x10/0x10
[ 471.100138][T30085] vhost_task_create+0x101/0x350
[ 471.100156][T30085] ? __cfi_kvm_nx_huge_page_recovery_worker_kill+0x10/0x10
[ 471.100177][T30085] ? __cfi_vhost_task_create+0x10/0x10
[ 471.100197][T30085] ? __cfi_vhost_task_fn+0x10/0x10
[ 471.100214][T30085] ? __kasan_check_write+0x18/0x20
[ 471.100248][T30085] ? mutex_lock+0x92/0x1c0
[ 471.100265][T30085] ? __cfi_mutex_lock+0x10/0x10
[ 471.100282][T30085] ? kernel_text_address+0xa9/0xe0
[ 471.100305][T30085] kvm_mmu_post_init_vm+0x156/0x2d0
[ 471.100331][T30085] kvm_arch_vcpu_ioctl_run+0xd7/0x1aa0
[ 471.100354][T30085] ? _parse_integer_limit+0x195/0x1e0
[ 471.100382][T30085] ? __cfi_kvm_arch_vcpu_ioctl_run+0x10/0x10
[ 471.100405][T30085] ? kstrtoull+0x13b/0x1e0
[ 471.100422][T30085] ? kstrtouint+0x78/0xf0
[ 471.100438][T30085] ? ioctl_has_perm+0x1aa/0x4d0
[ 471.100459][T30085] ? __asan_memcpy+0x5a/0x80
[ 471.100475][T30085] ? ioctl_has_perm+0x3e0/0x4d0
[ 471.100496][T30085] ? has_cap_mac_admin+0xd0/0xd0
[ 471.100517][T30085] ? __kasan_check_write+0x18/0x20
[ 471.100542][T30085] ? mutex_lock_killable+0x92/0x1c0
[ 471.100560][T30085] ? __cfi_mutex_lock_killable+0x10/0x10
[ 471.100578][T30085] ? proc_fail_nth_write+0x17e/0x210
[ 471.100603][T30085] kvm_vcpu_ioctl+0x96f/0xee0
[ 471.100621][T30085] ? __cfi_kvm_vcpu_ioctl+0x10/0x10
[ 471.100638][T30085] ? __cfi_vfs_write+0x10/0x10
[ 471.100656][T30085] ? __kasan_check_write+0x18/0x20
[ 471.100681][T30085] ? mutex_unlock+0x8b/0x240
[ 471.100698][T30085] ? __cfi_mutex_unlock+0x10/0x10
[ 471.100714][T30085] ? __fget_files+0x2c5/0x340
[ 471.100736][T30085] ? __fget_files+0x2c5/0x340
[ 471.100755][T30085] ? bpf_lsm_file_ioctl+0xd/0x20
[ 471.100779][T30085] ? security_file_ioctl+0x34/0xd0
[ 471.100800][T30085] ? __cfi_kvm_vcpu_ioctl+0x10/0x10
[ 471.100817][T30085] __se_sys_ioctl+0x135/0x1b0
[ 471.100837][T30085] __x64_sys_ioctl+0x7f/0xa0
[ 471.100857][T30085] x64_sys_call+0x1878/0x2ee0
[ 471.100883][T30085] do_syscall_64+0x58/0xf0
[ 471.100906][T30085] ? clear_bhb_loop+0x50/0xa0
[ 471.100927][T30085] entry_SYSCALL_64_after_hwframe+0x76/0x7e
[ 471.100947][T30085] RIP: 0033:0x7fed3c58f6c9
[ 471.100963][T30085] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 471.100980][T30085] RSP: 002b:00007fed3afe3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 471.101002][T30085] RAX: ffffffffffffffda RBX: 00007fed3c7e5fa0 RCX: 00007fed3c58f6c9
[ 471.101017][T30085] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005
[ 471.101029][T30085] RBP: 00007fed3afe3090 R08: 0000000000000000 R09: 0000000000000000
[ 471.101042][T30085] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 471.101055][T30085] R13: 00007fed3c7e6038 R14: 00007fed3c7e5fa0 R15: 00007fff8f5f55a8
[ 471.101071][T30085]
[ 472.251357][T30115] binder: Unknown parameter 'm'
[ 475.792574][T30245] FAULT_INJECTION: forcing a failure.
[ 475.792574][T30245] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 475.819809][T30245] CPU: 1 UID: 0 PID: 30245 Comm: syz.1.13531 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e
[ 475.819843][T30245] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
[ 475.819854][T30245] Call Trace:
[ 475.819861][T30245]
[ 475.819870][T30245] __dump_stack+0x21/0x30
[ 475.819900][T30245] dump_stack_lvl+0x10c/0x190
[ 475.819923][T30245] ? __cfi_dump_stack_lvl+0x10/0x10
[ 475.819947][T30245] ? check_stack_object+0x107/0x140
[ 475.819966][T30245] dump_stack+0x19/0x20
[ 475.819988][T30245] should_fail_ex+0x3d9/0x530
[ 475.820008][T30245] should_fail+0xf/0x20
[ 475.820024][T30245] should_fail_usercopy+0x1e/0x30
[ 475.820045][T30245] _copy_from_user+0x22/0xb0
[ 475.820067][T30245] __sys_connect+0x136/0x440
[ 475.820091][T30245] ? __cfi___sys_connect+0x10/0x10
[ 475.820117][T30245] ? __kasan_check_read+0x15/0x20
[ 475.820143][T30245] __x64_sys_connect+0x7e/0x90
[ 475.820166][T30245] x64_sys_call+0x1c2f/0x2ee0
[ 475.820192][T30245] do_syscall_64+0x58/0xf0
[ 475.820215][T30245] ? clear_bhb_loop+0x50/0xa0
[ 475.820235][T30245] entry_SYSCALL_64_after_hwframe+0x76/0x7e
[ 475.820255][T30245] RIP: 0033:0x7fed3c58f6c9
[ 475.820272][T30245] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 475.820288][T30245] RSP: 002b:00007fed3afe3038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a
[ 475.820309][T30245] RAX: ffffffffffffffda RBX: 00007fed3c7e5fa0 RCX: 00007fed3c58f6c9
[ 475.820325][T30245] RDX: 0000000000000010 RSI: 0000200000000180 RDI: 0000000000000008
[ 475.820338][T30245] RBP: 00007fed3afe3090 R08: 0000000000000000 R09: 0000000000000000
[ 475.820350][T30245] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 475.820363][T30245] R13: 00007fed3c7e6038 R14: 00007fed3c7e5fa0 R15: 00007fff8f5f55a8
[ 475.820379][T30245]
[ 477.710182][T30333] capability: warning: `syz.0.13576' uses 32-bit capabilities (legacy support in use)
[ 478.331498][T30383] FAULT_INJECTION: forcing a failure.
[ 478.331498][T30383] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 478.379814][T30383] CPU: 0 UID: 0 PID: 30383 Comm: syz.1.13599 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e
[ 478.379847][T30383] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
[ 478.379859][T30383] Call Trace:
[ 478.379865][T30383]
[ 478.379873][T30383] __dump_stack+0x21/0x30
[ 478.379906][T30383] dump_stack_lvl+0x10c/0x190
[ 478.379926][T30383] ? __cfi_dump_stack_lvl+0x10/0x10
[ 478.379948][T30383] ? unwind_get_return_address+0x51/0x90
[ 478.379971][T30383] ? __cfi_stack_trace_consume_entry+0x10/0x10
[ 478.379999][T30383] dump_stack+0x19/0x20
[ 478.380021][T30383] should_fail_ex+0x3d9/0x530
[ 478.380042][T30383] should_fail+0xf/0x20
[ 478.380059][T30383] should_fail_usercopy+0x1e/0x30
[ 478.380079][T30383] _copy_from_user+0x22/0xb0
[ 478.380101][T30383] ___sys_recvmsg+0x12f/0x510
[ 478.380119][T30383] ? __sys_recvmsg+0x280/0x280
[ 478.380136][T30383] ? __cfi_kstrtouint_from_user+0x10/0x10
[ 478.380154][T30383] ? selinux_file_permission+0x309/0xb30
[ 478.380178][T30383] ? __kasan_check_write+0x18/0x20
[ 478.380205][T30383] ? proc_fail_nth_write+0x17e/0x210
[ 478.380229][T30383] ? __kasan_check_read+0x15/0x20
[ 478.380255][T30383] do_recvmmsg+0x326/0x770
[ 478.380273][T30383] ? __sys_recvmmsg+0x290/0x290
[ 478.380290][T30383] ? __cfi_vfs_write+0x10/0x10
[ 478.380311][T30383] ? __kasan_slab_free+0x6a/0x80
[ 478.380333][T30383] ? putname+0x113/0x150
[ 478.380354][T30383] __x64_sys_recvmmsg+0x191/0x240
[ 478.380372][T30383] ? __cfi___x64_sys_recvmmsg+0x10/0x10
[ 478.380390][T30383] ? __kasan_check_read+0x15/0x20
[ 478.380416][T30383] x64_sys_call+0x292c/0x2ee0
[ 478.380441][T30383] do_syscall_64+0x58/0xf0
[ 478.380463][T30383] ? clear_bhb_loop+0x50/0xa0
[ 478.380484][T30383] entry_SYSCALL_64_after_hwframe+0x76/0x7e
[ 478.380507][T30383] RIP: 0033:0x7fed3c58f6c9
[ 478.380524][T30383] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 478.380541][T30383] RSP: 002b:00007fed3afe3038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 478.380563][T30383] RAX: ffffffffffffffda RBX: 00007fed3c7e5fa0 RCX: 00007fed3c58f6c9
[ 478.380579][T30383] RDX: 0000000000000002 RSI: 0000200000000380 RDI: 0000000000000006
[ 478.380592][T30383] RBP: 00007fed3afe3090 R08: 0000000000000000 R09: 0000000000000000
[ 478.380610][T30383] R10: 0000000040012160 R11: 0000000000000246 R12: 0000000000000001
[ 478.380623][T30383] R13: 00007fed3c7e6038 R14: 00007fed3c7e5fa0 R15: 00007fff8f5f55a8
[ 478.380640][T30383]
[ 480.695793][T30507] FAULT_INJECTION: forcing a failure.
[ 480.695793][T30507] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 480.716947][T30507] CPU: 1 UID: 0 PID: 30507 Comm: syz.1.13658 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e
[ 480.716980][T30507] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
[ 480.716993][T30507] Call Trace:
[ 480.717000][T30507]
[ 480.717008][T30507] __dump_stack+0x21/0x30
[ 480.717037][T30507] dump_stack_lvl+0x10c/0x190
[ 480.717061][T30507] ? __cfi_dump_stack_lvl+0x10/0x10
[ 480.717085][T30507] ? check_stack_object+0x107/0x140
[ 480.717104][T30507] dump_stack+0x19/0x20
[ 480.717126][T30507] should_fail_ex+0x3d9/0x530
[ 480.717145][T30507] should_fail+0xf/0x20
[ 480.717162][T30507] should_fail_usercopy+0x1e/0x30
[ 480.717181][T30507] _copy_from_user+0x22/0xb0
[ 480.717203][T30507] __sys_connect+0x136/0x440
[ 480.717227][T30507] ? __cfi___sys_connect+0x10/0x10
[ 480.717253][T30507] ? __kasan_check_read+0x15/0x20
[ 480.717280][T30507] __x64_sys_connect+0x7e/0x90
[ 480.717303][T30507] x64_sys_call+0x1c2f/0x2ee0
[ 480.717328][T30507] do_syscall_64+0x58/0xf0
[ 480.717351][T30507] ? clear_bhb_loop+0x50/0xa0
[ 480.717372][T30507] entry_SYSCALL_64_after_hwframe+0x76/0x7e
[ 480.717392][T30507] RIP: 0033:0x7fed3c58f6c9
[ 480.717415][T30507] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 480.717431][T30507] RSP: 002b:00007fed3afe3038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a
[ 480.717453][T30507] RAX: ffffffffffffffda RBX: 00007fed3c7e5fa0 RCX: 00007fed3c58f6c9
[ 480.717469][T30507] RDX: 000000000000001c RSI: 0000200000000100 RDI: 0000000000000008
[ 480.717482][T30507] RBP: 00007fed3afe3090 R08: 0000000000000000 R09: 0000000000000000
[ 480.717496][T30507] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 480.717508][T30507] R13: 00007fed3c7e6038 R14: 00007fed3c7e5fa0 R15: 00007fff8f5f55a8
[ 480.717525][T30507]
[ 481.691556][T30544] FAULT_INJECTION: forcing a failure.
[ 481.691556][T30544] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 481.739811][T30544] CPU: 1 UID: 0 PID: 30544 Comm: syz.0.13678 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e
[ 481.739845][T30544] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
[ 481.739858][T30544] Call Trace:
[ 481.739864][T30544]
[ 481.739873][T30544] __dump_stack+0x21/0x30
[ 481.739903][T30544] dump_stack_lvl+0x10c/0x190
[ 481.739926][T30544] ? __cfi_dump_stack_lvl+0x10/0x10
[ 481.739949][T30544] ? check_stack_object+0x107/0x140
[ 481.739968][T30544] dump_stack+0x19/0x20
[ 481.739991][T30544] should_fail_ex+0x3d9/0x530
[ 481.740011][T30544] should_fail+0xf/0x20
[ 481.740027][T30544] should_fail_usercopy+0x1e/0x30
[ 481.740048][T30544] _copy_from_user+0x22/0xb0
[ 481.740067][T30544] __sys_bind+0x1de/0x3f0
[ 481.740100][T30544] ? __cfi___sys_bind+0x10/0x10
[ 481.740123][T30544] ? __kasan_check_read+0x15/0x20
[ 481.740150][T30544] __x64_sys_bind+0x7e/0x90
[ 481.740171][T30544] x64_sys_call+0x1ffd/0x2ee0
[ 481.740196][T30544] do_syscall_64+0x58/0xf0
[ 481.740218][T30544] ? clear_bhb_loop+0x50/0xa0
[ 481.740239][T30544] entry_SYSCALL_64_after_hwframe+0x76/0x7e
[ 481.740259][T30544] RIP: 0033:0x7fad38d8f6c9
[ 481.740281][T30544] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 481.740297][T30544] RSP: 002b:00007fad39c79038 EFLAGS: 00000246 ORIG_RAX: 0000000000000031
[ 481.740325][T30544] RAX: ffffffffffffffda RBX: 00007fad38fe5fa0 RCX: 00007fad38d8f6c9
[ 481.740340][T30544] RDX: 0000000000000010 RSI: 00002000000001c0 RDI: 0000000000000007
[ 481.740354][T30544] RBP: 00007fad39c79090 R08: 0000000000000000 R09: 0000000000000000
[ 481.740367][T30544] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 481.740384][T30544] R13: 00007fad38fe6038 R14: 00007fad38fe5fa0 R15: 00007ffc1050ec98
[ 481.740401][T30544]
[ 482.059794][ T331] usb 1-1: new high-speed USB device number 4 using dummy_hcd
[ 482.213953][ T331] usb 1-1: unable to get BOS descriptor or descriptor too short
[ 482.222269][ T331] usb 1-1: unable to read config index 0 descriptor/start: -71
[ 482.229890][ T331] usb 1-1: can't read configurations, error -71
[ 483.435054][T30675] FAULT_INJECTION: forcing a failure.
[ 483.435054][T30675] name failslab, interval 1, probability 0, space 0, times 0
[ 483.467987][T30675] CPU: 0 UID: 0 PID: 30675 Comm: syz.1.13739 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e
[ 483.468022][T30675] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
[ 483.468035][T30675] Call Trace:
[ 483.468042][T30675]
[ 483.468050][T30675] __dump_stack+0x21/0x30
[ 483.468080][T30675] dump_stack_lvl+0x10c/0x190
[ 483.468103][T30675] ? __cfi_dump_stack_lvl+0x10/0x10
[ 483.468127][T30675] ? avc_has_perm+0x144/0x220
[ 483.468151][T30675] dump_stack+0x19/0x20
[ 483.468174][T30675] should_fail_ex+0x3d9/0x530
[ 483.468193][T30675] should_failslab+0xac/0x100
[ 483.468214][T30675] __kmalloc_cache_noprof+0x41/0x490
[ 483.468234][T30675] ? vhost_task_create+0x101/0x350
[ 483.468253][T30675] ? __cfi_kvm_nx_huge_page_recovery_worker+0x10/0x10
[ 483.468276][T30675] vhost_task_create+0x101/0x350
[ 483.468294][T30675] ? __cfi_kvm_nx_huge_page_recovery_worker_kill+0x10/0x10
[ 483.468316][T30675] ? __cfi_vhost_task_create+0x10/0x10
[ 483.468336][T30675] ? __cfi_vhost_task_fn+0x10/0x10
[ 483.468353][T30675] ? __kasan_check_write+0x18/0x20
[ 483.468380][T30675] ? mutex_lock+0x92/0x1c0
[ 483.468397][T30675] ? __cfi_mutex_lock+0x10/0x10
[ 483.468414][T30675] ? kernel_text_address+0xa9/0xe0
[ 483.468437][T30675] kvm_mmu_post_init_vm+0x156/0x2d0
[ 483.468463][T30675] kvm_arch_vcpu_ioctl_run+0xd7/0x1aa0
[ 483.468487][T30675] ? _parse_integer_limit+0x195/0x1e0
[ 483.468515][T30675] ? __cfi_kvm_arch_vcpu_ioctl_run+0x10/0x10
[ 483.468538][T30675] ? kstrtoull+0x13b/0x1e0
[ 483.468555][T30675] ? kstrtouint+0x78/0xf0
[ 483.468572][T30675] ? ioctl_has_perm+0x1aa/0x4d0
[ 483.468594][T30675] ? __asan_memcpy+0x5a/0x80
[ 483.468611][T30675] ? ioctl_has_perm+0x3e0/0x4d0
[ 483.468633][T30675] ? has_cap_mac_admin+0xd0/0xd0
[ 483.468654][T30675] ? __kasan_check_write+0x18/0x20
[ 483.468680][T30675] ? mutex_lock_killable+0x92/0x1c0
[ 483.468698][T30675] ? __cfi_mutex_lock_killable+0x10/0x10
[ 483.468716][T30675] ? proc_fail_nth_write+0x17e/0x210
[ 483.468741][T30675] kvm_vcpu_ioctl+0x96f/0xee0
[ 483.468759][T30675] ? __cfi_kvm_vcpu_ioctl+0x10/0x10
[ 483.468777][T30675] ? __cfi_vfs_write+0x10/0x10
[ 483.468794][T30675] ? __kasan_check_write+0x18/0x20
[ 483.468820][T30675] ? mutex_unlock+0x8b/0x240
[ 483.468837][T30675] ? __cfi_mutex_unlock+0x10/0x10
[ 483.468854][T30675] ? __fget_files+0x2c5/0x340
[ 483.468875][T30675] ? __fget_files+0x2c5/0x340
[ 483.468895][T30675] ? bpf_lsm_file_ioctl+0xd/0x20
[ 483.468919][T30675] ? security_file_ioctl+0x34/0xd0
[ 483.468940][T30675] ? __cfi_kvm_vcpu_ioctl+0x10/0x10
[ 483.468963][T30675] __se_sys_ioctl+0x135/0x1b0
[ 483.468984][T30675] __x64_sys_ioctl+0x7f/0xa0
[ 483.469004][T30675] x64_sys_call+0x1878/0x2ee0
[ 483.469030][T30675] do_syscall_64+0x58/0xf0
[ 483.469052][T30675] ? clear_bhb_loop+0x50/0xa0
[ 483.469074][T30675] entry_SYSCALL_64_after_hwframe+0x76/0x7e
[ 483.469093][T30675] RIP: 0033:0x7fed3c58f6c9
[ 483.469109][T30675] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 483.469126][T30675] RSP: 002b:00007fed3afe3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 483.469147][T30675] RAX: ffffffffffffffda RBX: 00007fed3c7e5fa0 RCX: 00007fed3c58f6c9
[ 483.469162][T30675] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005
[ 483.469175][T30675] RBP: 00007fed3afe3090 R08: 0000000000000000 R09: 0000000000000000
[ 483.469188][T30675] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 483.469200][T30675] R13: 00007fed3c7e6038 R14: 00007fed3c7e5fa0 R15: 00007fff8f5f55a8
[ 483.469216][T30675]
[ 483.932609][T30711] FAULT_INJECTION: forcing a failure.
[ 483.932609][T30711] name failslab, interval 1, probability 0, space 0, times 0
[ 483.951806][T30711] CPU: 0 UID: 0 PID: 30711 Comm: syz.1.13754 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e
[ 483.951840][T30711] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
[ 483.951851][T30711] Call Trace:
[ 483.951857][T30711]
[ 483.951865][T30711] __dump_stack+0x21/0x30
[ 483.951893][T30711] dump_stack_lvl+0x10c/0x190
[ 483.951925][T30711] ? __cfi_dump_stack_lvl+0x10/0x10
[ 483.951947][T30711] ? __kasan_check_write+0x18/0x20
[ 483.951973][T30711] ? proc_fail_nth_write+0x17e/0x210
[ 483.951994][T30711] ? __cfi_proc_fail_nth_write+0x10/0x10
[ 483.952016][T30711] dump_stack+0x19/0x20
[ 483.952036][T30711] should_fail_ex+0x3d9/0x530
[ 483.952054][T30711] should_failslab+0xac/0x100
[ 483.952074][T30711] kmem_cache_alloc_noprof+0x42/0x430
[ 483.952092][T30711] ? getname_flags+0xc6/0x710
[ 483.952112][T30711] getname_flags+0xc6/0x710
[ 483.952129][T30711] ? build_open_flags+0x487/0x600
[ 483.952163][T30711] getname+0x1b/0x30
[ 483.952178][T30711] do_sys_openat2+0xcb/0x1c0
[ 483.952200][T30711] ? fput+0x1a5/0x240
[ 483.952220][T30711] ? do_sys_open+0x100/0x100
[ 483.952242][T30711] ? ksys_write+0x1ef/0x250
[ 483.952259][T30711] ? __cfi_ksys_write+0x10/0x10
[ 483.952277][T30711] __x64_sys_openat+0x13a/0x170
[ 483.952300][T30711] x64_sys_call+0xe69/0x2ee0
[ 483.952324][T30711] do_syscall_64+0x58/0xf0
[ 483.952347][T30711] ? clear_bhb_loop+0x50/0xa0
[ 483.952367][T30711] entry_SYSCALL_64_after_hwframe+0x76/0x7e
[ 483.952386][T30711] RIP: 0033:0x7fed3c58df10
[ 483.952402][T30711] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 69 95 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 bc 95 02 00 8b 44
[ 483.952424][T30711] RSP: 002b:00007fed3afe2f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000101
[ 483.952445][T30711] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007fed3c58df10
[ 483.952459][T30711] RDX: 0000000000000002 RSI: 00007fed3afe2fa0 RDI: 00000000ffffff9c
[ 483.952473][T30711] RBP: 00007fed3afe2fa0 R08: 0000000000000000 R09: 0000000000000000
[ 483.952485][T30711] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001
[ 483.952497][T30711] R13: 00007fed3c7e6038 R14: 00007fed3c7e5fa0 R15: 00007fff8f5f55a8
[ 483.952513][T30711]
[ 484.197538][T30744] FAULT_INJECTION: forcing a failure.
[ 484.197538][T30744] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 484.220458][T30744] CPU: 0 UID: 0 PID: 30744 Comm: syz.2.13771 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e
[ 484.220492][T30744] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
[ 484.220504][T30744] Call Trace:
[ 484.220511][T30744]
[ 484.220520][T30744] __dump_stack+0x21/0x30
[ 484.220549][T30744] dump_stack_lvl+0x10c/0x190
[ 484.220572][T30744] ? __cfi_dump_stack_lvl+0x10/0x10
[ 484.220597][T30744] dump_stack+0x19/0x20
[ 484.220617][T30744] should_fail_ex+0x3d9/0x530
[ 484.220637][T30744] should_fail+0xf/0x20
[ 484.220654][T30744] should_fail_usercopy+0x1e/0x30
[ 484.220673][T30744] _copy_from_user+0x22/0xb0
[ 484.220697][T30744] do_fcntl+0x84f/0x1500
[ 484.220717][T30744] ? __cfi_selinux_file_fcntl+0x10/0x10
[ 484.220740][T30744] ? check_fcntl_cmd+0xb0/0xb0
[ 484.220758][T30744] ? __cfi_mutex_unlock+0x10/0x10
[ 484.220774][T30744] ? __fget_files+0x2c5/0x340
[ 484.220796][T30744] ? bpf_lsm_file_fcntl+0xd/0x20
[ 484.220819][T30744] ? security_file_fcntl+0x34/0xd0
[ 484.220840][T30744] __se_sys_fcntl+0xe4/0x180
[ 484.220859][T30744] __x64_sys_fcntl+0x7f/0xa0
[ 484.220876][T30744] x64_sys_call+0x1cb3/0x2ee0
[ 484.220915][T30744] do_syscall_64+0x58/0xf0
[ 484.220937][T30744] ? clear_bhb_loop+0x50/0xa0
[ 484.220958][T30744] entry_SYSCALL_64_after_hwframe+0x76/0x7e
[ 484.220978][T30744] RIP: 0033:0x7f48ffd8f6c9
[ 484.220995][T30744] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 484.221012][T30744] RSP: 002b:00007f4900ce3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000048
[ 484.221034][T30744] RAX: ffffffffffffffda RBX: 00007f48fffe5fa0 RCX: 00007f48ffd8f6c9
[ 484.221050][T30744] RDX: 0000200000000140 RSI: 0000000000000007 RDI: 0000000000000007
[ 484.221063][T30744] RBP: 00007f4900ce3090 R08: 0000000000000000 R09: 0000000000000000
[ 484.221075][T30744] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 484.221087][T30744] R13: 00007f48fffe6038 R14: 00007f48fffe5fa0 R15: 00007ffef3c56d48
[ 484.221104][T30744]
[ 486.418772][T30822] FAULT_INJECTION: forcing a failure.
[ 486.418772][T30822] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 486.459776][T30822] CPU: 0 UID: 0 PID: 30822 Comm: syz.2.13807 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e
[ 486.459807][T30822] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
[ 486.459818][T30822] Call Trace:
[ 486.459823][T30822]
[ 486.459830][T30822] __dump_stack+0x21/0x30
[ 486.459857][T30822] dump_stack_lvl+0x10c/0x190
[ 486.459878][T30822] ? __cfi_dump_stack_lvl+0x10/0x10
[ 486.459900][T30822] ? has_cap_mac_admin+0xd0/0xd0
[ 486.459921][T30822] dump_stack+0x19/0x20
[ 486.459943][T30822] should_fail_ex+0x3d9/0x530
[ 486.459962][T30822] should_fail+0xf/0x20
[ 486.459979][T30822] should_fail_usercopy+0x1e/0x30
[ 486.459999][T30822] _copy_from_user+0x22/0xb0
[ 486.460022][T30822] sock_do_ioctl+0x18b/0x330
[ 486.460043][T30822] ? sock_show_fdinfo+0xd0/0xd0
[ 486.460062][T30822] ? __cfi_vfs_write+0x10/0x10
[ 486.460081][T30822] ? __kasan_check_write+0x18/0x20
[ 486.460106][T30822] ? mutex_unlock+0x8b/0x240
[ 486.460124][T30822] sock_ioctl+0x634/0x7b0
[ 486.460142][T30822] ? __cfi_sock_ioctl+0x10/0x10
[ 486.460161][T30822] ? __fget_files+0x2c5/0x340
[ 486.460181][T30822] ? bpf_lsm_file_ioctl+0xd/0x20
[ 486.460205][T30822] ? security_file_ioctl+0x34/0xd0
[ 486.460225][T30822] ? __cfi_sock_ioctl+0x10/0x10
[ 486.460243][T30822] __se_sys_ioctl+0x135/0x1b0
[ 486.460264][T30822] __x64_sys_ioctl+0x7f/0xa0
[ 486.460283][T30822] x64_sys_call+0x1878/0x2ee0
[ 486.460308][T30822] do_syscall_64+0x58/0xf0
[ 486.460331][T30822] ? clear_bhb_loop+0x50/0xa0
[ 486.460352][T30822] entry_SYSCALL_64_after_hwframe+0x76/0x7e
[ 486.460371][T30822] RIP: 0033:0x7f48ffd8f6c9
[ 486.460388][T30822] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 486.460405][T30822] RSP: 002b:00007f4900ce3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 486.460427][T30822] RAX: ffffffffffffffda RBX: 00007f48fffe5fa0 RCX: 00007f48ffd8f6c9
[ 486.460442][T30822] RDX: 0000200000002280 RSI: 0000000000008914 RDI: 0000000000000007
[ 486.460456][T30822] RBP: 00007f4900ce3090 R08: 0000000000000000 R09: 0000000000000000
[ 486.460469][T30822] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 486.460481][T30822] R13: 00007f48fffe6038 R14: 00007f48fffe5fa0 R15: 00007ffef3c56d48
[ 486.460496][T30822]
[ 487.152047][T30852] FAULT_INJECTION: forcing a failure.
[ 487.152047][T30852] name failslab, interval 1, probability 0, space 0, times 0
[ 487.173005][T30852] CPU: 0 UID: 0 PID: 30852 Comm: syz.2.13819 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e
[ 487.173038][T30852] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
[ 487.173049][T30852] Call Trace:
[ 487.173055][T30852]
[ 487.173063][T30852] __dump_stack+0x21/0x30
[ 487.173089][T30852] dump_stack_lvl+0x10c/0x190
[ 487.173110][T30852] ? __cfi_dump_stack_lvl+0x10/0x10
[ 487.173131][T30852] ? avc_has_perm+0x144/0x220
[ 487.173155][T30852] dump_stack+0x19/0x20
[ 487.173175][T30852] should_fail_ex+0x3d9/0x530
[ 487.173192][T30852] should_failslab+0xac/0x100
[ 487.173211][T30852] __kmalloc_cache_noprof+0x41/0x490
[ 487.173228][T30852] ? vhost_task_create+0x101/0x350
[ 487.173245][T30852] ? __cfi_kvm_nx_huge_page_recovery_worker+0x10/0x10
[ 487.173263][T30852] vhost_task_create+0x101/0x350
[ 487.173279][T30852] ? __cfi_kvm_nx_huge_page_recovery_worker_kill+0x10/0x10
[ 487.173298][T30852] ? __cfi_vhost_task_create+0x10/0x10
[ 487.173315][T30852] ? __cfi_vhost_task_fn+0x10/0x10
[ 487.173331][T30852] ? __kasan_check_write+0x18/0x20
[ 487.173352][T30852] ? mutex_lock+0x92/0x1c0
[ 487.173368][T30852] ? __cfi_mutex_lock+0x10/0x10
[ 487.173382][T30852] ? kernel_text_address+0xa9/0xe0
[ 487.173402][T30852] kvm_mmu_post_init_vm+0x156/0x2d0
[ 487.173426][T30852] kvm_arch_vcpu_ioctl_run+0xd7/0x1aa0
[ 487.173445][T30852] ? _parse_integer_limit+0x195/0x1e0
[ 487.173470][T30852] ? __cfi_kvm_arch_vcpu_ioctl_run+0x10/0x10
[ 487.173490][T30852] ? kstrtoull+0x13b/0x1e0
[ 487.173505][T30852] ? kstrtouint+0x78/0xf0
[ 487.173519][T30852] ? ioctl_has_perm+0x1aa/0x4d0
[ 487.173536][T30852] ? __asan_memcpy+0x5a/0x80
[ 487.173549][T30852] ? ioctl_has_perm+0x3e0/0x4d0
[ 487.173567][T30852] ? has_cap_mac_admin+0xd0/0xd0
[ 487.173584][T30852] ? __kasan_check_write+0x18/0x20
[ 487.173605][T30852] ? mutex_lock_killable+0x92/0x1c0
[ 487.173620][T30852] ? __cfi_mutex_lock_killable+0x10/0x10
[ 487.173636][T30852] ? proc_fail_nth_write+0x17e/0x210
[ 487.173657][T30852] kvm_vcpu_ioctl+0x96f/0xee0
[ 487.173673][T30852] ? __cfi_kvm_vcpu_ioctl+0x10/0x10
[ 487.173687][T30852] ? __cfi_vfs_write+0x10/0x10
[ 487.173702][T30852] ? __kasan_check_write+0x18/0x20
[ 487.173722][T30852] ? mutex_unlock+0x8b/0x240
[ 487.173737][T30852] ? __cfi_mutex_unlock+0x10/0x10
[ 487.173751][T30852] ? __fget_files+0x2c5/0x340
[ 487.173769][T30852] ? __fget_files+0x2c5/0x340
[ 487.173787][T30852] ? bpf_lsm_file_ioctl+0xd/0x20
[ 487.173809][T30852] ? security_file_ioctl+0x34/0xd0
[ 487.173828][T30852] ? __cfi_kvm_vcpu_ioctl+0x10/0x10
[ 487.173844][T30852] __se_sys_ioctl+0x135/0x1b0
[ 487.173862][T30852] __x64_sys_ioctl+0x7f/0xa0
[ 487.173879][T30852] x64_sys_call+0x1878/0x2ee0
[ 487.173904][T30852] do_syscall_64+0x58/0xf0
[ 487.173927][T30852] ? clear_bhb_loop+0x50/0xa0
[ 487.173948][T30852] entry_SYSCALL_64_after_hwframe+0x76/0x7e
[ 487.173967][T30852] RIP: 0033:0x7f48ffd8f6c9
[ 487.173995][T30852] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 487.174014][T30852] RSP: 002b:00007f4900ce3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 487.174035][T30852] RAX: ffffffffffffffda RBX: 00007f48fffe5fa0 RCX: 00007f48ffd8f6c9
[ 487.174050][T30852] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005
[ 487.174063][T30852] RBP: 00007f4900ce3090 R08: 0000000000000000 R09: 0000000000000000
[ 487.174076][T30852] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 487.174088][T30852] R13: 00007f48fffe6038 R14: 00007f48fffe5fa0 R15: 00007ffef3c56d48
[ 487.174103][T30852]
[ 487.567622][ T36] audit: type=1400 audit(1763400204.929:13961): avc: denied { mount } for pid=30865 comm="syz.3.13826" name="/" dev="ramfs" ino=215749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1
[ 487.721908][T30879] No source specified
[ 487.738688][T30883] FAULT_INJECTION: forcing a failure.
[ 487.738688][T30883] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 487.751830][T30883] CPU: 0 UID: 0 PID: 30883 Comm: syz.1.13835 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e
[ 487.751861][T30883] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
[ 487.751873][T30883] Call Trace:
[ 487.751879][T30883]
[ 487.751888][T30883] __dump_stack+0x21/0x30
[ 487.751917][T30883] dump_stack_lvl+0x10c/0x190
[ 487.751947][T30883] ? __cfi_dump_stack_lvl+0x10/0x10
[ 487.751971][T30883] ? kernel_text_address+0xa9/0xe0
[ 487.751996][T30883] dump_stack+0x19/0x20
[ 487.752018][T30883] should_fail_ex+0x3d9/0x530
[ 487.752038][T30883] should_fail+0xf/0x20
[ 487.752055][T30883] should_fail_usercopy+0x1e/0x30
[ 487.752074][T30883] _copy_from_user+0x22/0xb0
[ 487.752097][T30883] ___sys_sendmsg+0x159/0x2a0
[ 487.752124][T30883] ? __sys_sendmsg+0x280/0x280
[ 487.752149][T30883] ? kstrtouint+0x78/0xf0
[ 487.752172][T30883] __sys_sendmmsg+0x271/0x470
[ 487.752198][T30883] ? __cfi___sys_sendmmsg+0x10/0x10
[ 487.752227][T30883] ? __cfi_ksys_write+0x10/0x10
[ 487.752247][T30883] __x64_sys_sendmmsg+0xa4/0xc0
[ 487.752273][T30883] x64_sys_call+0xfec/0x2ee0
[ 487.752298][T30883] do_syscall_64+0x58/0xf0
[ 487.752321][T30883] ? clear_bhb_loop+0x50/0xa0
[ 487.752342][T30883] entry_SYSCALL_64_after_hwframe+0x76/0x7e
[ 487.752362][T30883] RIP: 0033:0x7fed3c58f6c9
[ 487.752378][T30883] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 487.752395][T30883] RSP: 002b:00007fed3afe3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133
[ 487.752417][T30883] RAX: ffffffffffffffda RBX: 00007fed3c7e5fa0 RCX: 00007fed3c58f6c9
[ 487.752433][T30883] RDX: 0000000000000001 RSI: 0000200000000380 RDI: 0000000000000008
[ 487.752450][T30883] RBP: 00007fed3afe3090 R08: 0000000000000000 R09: 0000000000000000
[ 487.752463][T30883] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 487.752476][T30883] R13: 00007fed3c7e6038 R14: 00007fed3c7e5fa0 R15: 00007fff8f5f55a8
[ 487.752493][T30883]
[ 488.515473][T30925] netlink: 12 bytes leftover after parsing attributes in process `syz.3.13856'.
[ 488.570691][T30927] FAULT_INJECTION: forcing a failure.
[ 488.570691][T30927] name failslab, interval 1, probability 0, space 0, times 0
[ 488.613404][T30927] CPU: 1 UID: 0 PID: 30927 Comm: syz.3.13857 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e
[ 488.613435][T30927] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
[ 488.613446][T30927] Call Trace:
[ 488.613452][T30927]
[ 488.613459][T30927] __dump_stack+0x21/0x30
[ 488.613486][T30927] dump_stack_lvl+0x10c/0x190
[ 488.613506][T30927] ? __cfi_dump_stack_lvl+0x10/0x10
[ 488.613532][T30927] ? avc_has_perm+0x144/0x220
[ 488.613564][T30927] dump_stack+0x19/0x20
[ 488.613586][T30927] should_fail_ex+0x3d9/0x530
[ 488.613606][T30927] should_failslab+0xac/0x100
[ 488.613632][T30927] kmem_cache_alloc_lru_noprof+0x44/0x430
[ 488.613651][T30927] ? selinux_socket_create+0x181/0x290
[ 488.613676][T30927] ? sock_alloc_inode+0x48/0x150
[ 488.613699][T30927] sock_alloc_inode+0x48/0x150
[ 488.613718][T30927] ? __cfi_sock_alloc_inode+0x10/0x10
[ 488.613738][T30927] alloc_inode+0x7a/0x270
[ 488.613758][T30927] ? bpf_lsm_socket_create+0xd/0x20
[ 488.613780][T30927] new_inode_pseudo+0x19/0x40
[ 488.613799][T30927] __sock_create+0x130/0x810
[ 488.613821][T30927] __sys_socketpair+0x1ab/0x5c0
[ 488.613844][T30927] __x64_sys_socketpair+0x9f/0xc0
[ 488.613865][T30927] x64_sys_call+0x2081/0x2ee0
[ 488.613891][T30927] do_syscall_64+0x58/0xf0
[ 488.613913][T30927] ? clear_bhb_loop+0x50/0xa0
[ 488.613934][T30927] entry_SYSCALL_64_after_hwframe+0x76/0x7e
[ 488.613953][T30927] RIP: 0033:0x7f4c2c58f6c9
[ 488.613970][T30927] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 488.613986][T30927] RSP: 002b:00007f4c2d3a9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035
[ 488.614007][T30927] RAX: ffffffffffffffda RBX: 00007f4c2c7e5fa0 RCX: 00007f4c2c58f6c9
[ 488.614022][T30927] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 000000000000001e
[ 488.614034][T30927] RBP: 00007f4c2d3a9090 R08: 0000000000000000 R09: 0000000000000000
[ 488.614046][T30927] R10: 0000200000000340 R11: 0000000000000246 R12: 0000000000000001
[ 488.614060][T30927] R13: 00007f4c2c7e6038 R14: 00007f4c2c7e5fa0 R15: 00007ffd5c7d2668
[ 488.614077][T30927]
[ 488.614870][T30927] socket: no more sockets
[ 638.952436][ T12] bridge_slave_1: left allmulticast mode
[ 638.958090][ T12] bridge_slave_1: left promiscuous mode
[ 638.963734][ T12] bridge0: port 2(bridge_slave_1) entered disabled state
[ 638.971203][ T12] bridge_slave_0: left allmulticast mode
[ 638.976819][ T12] bridge_slave_0: left promiscuous mode
[ 638.982491][ T12] bridge0: port 1(bridge_slave_0) entered disabled state
[ 639.091872][ T12] veth1_macvtap: left promiscuous mode
[ 639.097457][ T12] veth0_vlan: left promiscuous mode
[ 639.321152][ T12] bridge_slave_1: left allmulticast mode
[ 639.326805][ T12] bridge_slave_1: left promiscuous mode
[ 639.332486][ T12] bridge0: port 2(bridge_slave_1) entered disabled state
[ 639.339962][ T12] bridge_slave_0: left allmulticast mode
[ 639.345583][ T12] bridge_slave_0: left promiscuous mode
[ 639.351267][ T12] bridge0: port 1(bridge_slave_0) entered disabled state
[ 639.451874][ T12] veth1_macvtap: left promiscuous mode
[ 639.457387][ T12] veth0_vlan: left promiscuous mode