last executing test programs: 2.340670562s ago: executing program 0 (id=6760): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendmmsg$inet(r2, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40040) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r3, 0x29, 0x1e, 0x0, 0x4) 2.020768214s ago: executing program 0 (id=6763): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8=0x0, @ANYRES8=r1], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) write(r5, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') 2.020168824s ago: executing program 0 (id=6764): rt_sigaction(0xd, 0x0, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r3, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fremovexattr(r5, &(0x7f0000000200)=@known='trusted.overlay.opaque\x00') write$P9_RVERSION(r6, &(0x7f0000000080)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) ioctl$DMA_BUF_IOCTL_SYNC(r4, 0x40086200, &(0x7f0000000140)) r7 = dup(r6) write$FUSE_BMAP(r7, &(0x7f0000000100)={0x18}, 0x18) 1.984136638s ago: executing program 1 (id=6766): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000003780)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8014) syz_io_uring_setup(0x149d, &(0x7f0000000280)={0x0, 0x100031a, 0x101a, 0x3, 0x36b}, 0x0, 0x0) 1.949201582s ago: executing program 0 (id=6767): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, 0x0) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000700)={&(0x7f0000000040)={0x2, 0x4e20, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000680)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @dev={0xac, 0x14, 0x14, 0x3d}, @multicast2}}}], 0x20}, 0x0) 1.948384112s ago: executing program 1 (id=6768): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r3, &(0x7f0000000340)=ANY=[], 0x118) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r4, 0x11, 0x67, &(0x7f0000000440)=0x1000, 0x4) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000700)={&(0x7f0000000040)={0x2, 0x4e20, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000680)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @dev={0xac, 0x14, 0x14, 0x3d}, @multicast2}}}], 0x20}, 0x0) 1.904376996s ago: executing program 1 (id=6769): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, 0x0) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r2, 0x4008af60, &(0x7f0000000040)) 1.170732841s ago: executing program 0 (id=6772): r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) ptrace$cont(0x7, r0, 0xffffffffffffff7f, 0x9) rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='blkio.throttle.io_serviced\x00', 0x275a, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8=0x0, @ANYRES8=r2, @ANYRES64=r1], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) mount$binderfs(0x0, &(0x7f0000000100)='./binderfs\x00', &(0x7f0000000140), 0x4800, &(0x7f0000000180)=ANY=[@ANYBLOB='defcontext=\"']) 1.08069343s ago: executing program 1 (id=6774): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r3) ptrace$cont(0x1f, r3, 0x0, 0xfffffffffffffffe) 870.919182ms ago: executing program 2 (id=6779): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r3, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r3], 0x118) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r4, 0x11, 0x67, &(0x7f0000000440)=0x1000, 0x4) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000700)={&(0x7f0000000040)={0x2, 0x4e20, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000680)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @dev={0xac, 0x14, 0x14, 0x3d}, @multicast2}}}], 0x20}, 0x0) 809.827908ms ago: executing program 1 (id=6780): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, 0x0) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000700)={&(0x7f0000000040)={0x2, 0x4e20, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000680)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @dev={0xac, 0x14, 0x14, 0x3d}, @multicast2}}}], 0x20}, 0x0) 800.584419ms ago: executing program 2 (id=6781): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f00000001c0)={@private1={0xfc, 0x1, '\x00', 0x1}}, 0x14) 734.768565ms ago: executing program 2 (id=6782): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000380)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r5, &(0x7f0000000140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r6, &(0x7f0000003c00), 0x0, 0x0) rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x0, 0x0) 734.479355ms ago: executing program 2 (id=6783): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, 0x0, 0x0, 0x4) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r2, 0x4008af60, &(0x7f0000000040)) 717.872967ms ago: executing program 2 (id=6784): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendmmsg$inet(r2, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40040) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000003c00), 0x0, 0x0) r4 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r4, 0x4008af60, &(0x7f0000000040)) 678.948121ms ago: executing program 2 (id=6785): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r0, @ANYRES64], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r1, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) keyctl$reject(0x13, 0x0, 0x8000, 0xfe0f, 0x0) 506.677629ms ago: executing program 3 (id=6789): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f00000001c0)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0, @ANYRES8=r1, @ANYRES64=r0, @ANYRESDEC, @ANYRESOCT=r0, @ANYBLOB, @ANYRESDEC=r1], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) write(r2, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000000140)=[{{0x0, 0x16, 0x0}}], 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r5, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r6 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r6, 0x0, 0x0, 0x1, 0x0, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r7, &(0x7f0000003100)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)="2c05947c8661826ca0ba3abab2883202e4000103bc0c2723fbd61397d00bae57e7530af5c2f5345ed24f24e2ebf0179cb83bf10f16352dce31b7f1c1fdf26dfd879f7a6018f313c933508257", 0x4c}, {&(0x7f0000000340)="e340ca96f43e952a211f0ea0c4ad5c57b5a698debad2222bbdfe1d10df34701523e1995220e65a08ba1bc66ab3a7a8c5e25d84144d57b14640ea655b8b1833596d93de956c0b0c657a4d7d84196148454f4d514f88c3a8ec12569687e164a94d1cade6c894c5", 0x66}, {&(0x7f00000003c0)="e3083643edf1cc31d4984f3749f6e35f6c99e7fa74e58f9ad7d5201bbcb46e269e82b64689ac46b77aedde14fb017d15ae64641ad820eb1996e3b5c14cf1d1d2e4eabd71110c38ccf0f1f05b5fda4cfcd372663d2257146e6981adb8f3662130554b8545fa39d7ac2b48205682a7b10e9eb4b2567cf5b831e52cd3f124", 0x7d}, {&(0x7f0000000440)="4ff7eca00ee5e4936abb70ee1407f2c6ca14678e7e38d5cd29d7be0f184e44588183ccbeca9b791577007933497cdfcbbf95b8a820a13777261fe06455c810f03a33df9a1807c9b4de44ba9ffcc44e22e3a5d967f1bd53083c680ebd5c65919b", 0x60}], 0x4, &(0x7f00000004c0)=[@hoplimit={{0x14, 0x29, 0x34, 0x3}}], 0x18}}, {{&(0x7f0000000500)={0xa, 0x4e23, 0x8, @mcast2, 0xe}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000540)="b1281039bf56a99be9cb467a20599cd28e806f1fcf37a3bba9e54f21dd41f32d53fcffe235acce2e777a2a11547f5a372b783748c5b407c395de5c1012e6feab78cea0837cde4c88c190998354bd56c77cfe210d830242ce808fc670e7b147afbb1e0b7bff603fc4d9cfd80bd3ed9984819aacf67c3719fd31c7db6afe44b0c0d6db51935ff5d1d6bb48f9668d21d7d8076eb4400b32e5c050f45409839e", 0x9e}, {&(0x7f0000000600)="5b478502d3bd5445719bbae413bb3e7e46fc9e5d167903353f70a0daa1d32c89b4cff81fcb3015a25a8a26e2405f16ca8a2fa382f0d053d0d4299380dad467d75a5fbadaa7b7c926b16f2fc4eb552dad0f952134ee1372d52f0214a71975a90f8f30d99ee42319c44d2be157131bfad3223e331a59a8ca8244d30195e6c450793746527c544bf1125b2b900c439d7f4586566c7613413b3983dfa55ed104739874bd879617038f863dcb6f66a86edf10211bbc3063a7e14d73d217665cf499", 0xbf}, {&(0x7f00000006c0)="53e11c517917767325dc81984124a0ada552d5805a818e3efeaa56a4df0e2ee163716a152df93345f11863a8ca98f6c66b2943ab9222ac1acc4b78de49ea13a68030fc22411f2b4150dcf5040f481770b5ef84807647ab92cb1030980138b81da8c9a636cf86ddf07f3e8f542aa97f6c01de4b9e223afb3eea75da2d0025af6fc20d3d60bf68d8c6f05e944163e510302de4b266c7e274f6c8b048b813f74888ab98346746bc520ecdd43cd21ec9b1c7a8ffbec4886e8d5e1c1b8bf2b512daebf3125e1348c64792f6e4", 0xca}, {&(0x7f00000007c0)="42378a4e8ee562094d78ec", 0xb}, {0x0}, {&(0x7f0000000880)="23bc2f6f89a13f5a470c212a8373cba2d0e69c280224a5c02e53926f162e485a461fb766b9aab5199ce4af9adfe3a468976147efc3ef4f2a05fb12ccf6b0215a6b3362cc0b4db2346ed9ef7af4f3fdb1b4bce24a8f30b901be", 0x59}], 0x6, &(0x7f0000000980)=[@dontfrag={{0x14, 0x29, 0x3e, 0x7fffffff}}, @rthdr_2292={{0x98, 0x29, 0x39, {0x88, 0x10, 0x1, 0xc, 0x0, [@dev={0xfe, 0x80, '\x00', 0x3e}, @mcast1, @dev={0xfe, 0x80, '\x00', 0x3c}, @private0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast1, @remote]}}}], 0xb0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001880)=[@hoplimit={{0x14, 0x29, 0x34, 0x93}}, @dstopts_2292={{0x18, 0x29, 0x4, {0x88}}}, @rthdrdstopts={{0x18, 0x29, 0x37, {0x2c}}}], 0x48}}, {{0x0, 0x0, &(0x7f0000002f00), 0x0, &(0x7f0000002f40)=[@dstopts_2292={{0x18, 0x29, 0x4, {0x43}}}, @hoplimit={{0x14, 0x29, 0x34, 0x3}}, @tclass={{0x14, 0x29, 0x43, 0x5c1}}, @pktinfo={{0x24, 0x29, 0x32, {@private0}}}, @hoplimit={{0x14, 0x29, 0x34, 0x6}}], 0x88}}], 0x4, 0x4) 456.498894ms ago: executing program 3 (id=6790): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r2, &(0x7f0000003780)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8014) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r3, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) syz_io_uring_setup(0x149d, &(0x7f0000000280)={0x0, 0x100031a, 0x101a, 0x3, 0x36b}, 0x0, 0x0) 419.830068ms ago: executing program 3 (id=6791): syz_clone(0xa5102000, 0x0, 0x0, 0x0, 0x0, 0x0) 348.631565ms ago: executing program 3 (id=6792): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000380)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r5, &(0x7f0000000140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r6, &(0x7f0000003c00), 0x0, 0x0) rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x0, 0x0) 262.861533ms ago: executing program 3 (id=6793): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendmmsg$inet(r2, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40040) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000003c00), 0x0, 0x0) r4 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r4, 0x4008af60, &(0x7f0000000040)) 262.393334ms ago: executing program 3 (id=6794): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, 0x0) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003780)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8014) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r4, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8, @ANYRES64], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, 0xffffffffffffffff, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) syz_io_uring_setup(0x149d, &(0x7f0000000280)={0x0, 0x100031a, 0x101a, 0x3, 0x36b}, 0x0, 0x0) syz_clone(0xa5102000, 0x0, 0x0, 0x0, 0x0, 0x0) 133.078447ms ago: executing program 0 (id=6795): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) syz_io_uring_setup(0x149d, &(0x7f0000000280)={0x0, 0x100031a, 0x101a, 0x3, 0x36b}, 0x0, 0x0) syz_clone(0xa5102000, 0x0, 0x0, 0x0, 0x0, 0x0) 0s ago: executing program 1 (id=6796): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, 0x0, 0x0, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendmmsg$inet(r2, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40040) r3 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r3, 0x4008af60, &(0x7f0000000040)) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.186' (ED25519) to the list of known hosts. [ 333.634675][ T36] audit: type=1400 audit(1763150203.920:64): avc: denied { mounton } for pid=282 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 333.636304][ T282] cgroup: Unknown subsys name 'net' [ 333.663961][ T36] audit: type=1400 audit(1763150203.920:65): avc: denied { mount } for pid=282 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 333.700237][ T36] audit: type=1400 audit(1763150203.950:66): avc: denied { unmount } for pid=282 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 333.700548][ T282] cgroup: Unknown subsys name 'devices' [ 333.886421][ T282] cgroup: Unknown subsys name 'hugetlb' [ 333.894373][ T282] cgroup: Unknown subsys name 'rlimit' [ 334.050599][ T36] audit: type=1400 audit(1763150204.330:67): avc: denied { setattr } for pid=282 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 334.078440][ T36] audit: type=1400 audit(1763150204.330:68): avc: denied { mounton } for pid=282 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 334.107414][ T36] audit: type=1400 audit(1763150204.330:69): avc: denied { mount } for pid=282 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 334.109179][ T284] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 334.146100][ T36] audit: type=1400 audit(1763150204.430:70): avc: denied { relabelto } for pid=284 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 334.179887][ T36] audit: type=1400 audit(1763150204.430:71): avc: denied { write } for pid=284 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 334.237580][ T36] audit: type=1400 audit(1763150204.520:72): avc: denied { read } for pid=282 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 334.238280][ T282] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 334.268581][ T36] audit: type=1400 audit(1763150204.520:73): avc: denied { open } for pid=282 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 336.667041][ T289] bridge0: port 1(bridge_slave_0) entered blocking state [ 336.675452][ T289] bridge0: port 1(bridge_slave_0) entered disabled state [ 336.685349][ T289] bridge_slave_0: entered allmulticast mode [ 336.692505][ T289] bridge_slave_0: entered promiscuous mode [ 336.709362][ T289] bridge0: port 2(bridge_slave_1) entered blocking state [ 336.718263][ T289] bridge0: port 2(bridge_slave_1) entered disabled state [ 336.725705][ T289] bridge_slave_1: entered allmulticast mode [ 336.734506][ T289] bridge_slave_1: entered promiscuous mode [ 336.756141][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 336.768421][ T292] bridge0: port 1(bridge_slave_0) entered disabled state [ 336.777874][ T292] bridge_slave_0: entered allmulticast mode [ 336.786752][ T292] bridge_slave_0: entered promiscuous mode [ 336.803047][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 336.815734][ T292] bridge0: port 2(bridge_slave_1) entered disabled state [ 336.827707][ T292] bridge_slave_1: entered allmulticast mode [ 336.835537][ T292] bridge_slave_1: entered promiscuous mode [ 336.890247][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 336.901358][ T291] bridge0: port 1(bridge_slave_0) entered disabled state [ 336.913326][ T291] bridge_slave_0: entered allmulticast mode [ 336.924661][ T291] bridge_slave_0: entered promiscuous mode [ 336.933894][ T290] bridge0: port 1(bridge_slave_0) entered blocking state [ 336.945197][ T290] bridge0: port 1(bridge_slave_0) entered disabled state [ 336.954194][ T290] bridge_slave_0: entered allmulticast mode [ 336.964458][ T290] bridge_slave_0: entered promiscuous mode [ 336.980790][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 336.990466][ T291] bridge0: port 2(bridge_slave_1) entered disabled state [ 336.999846][ T291] bridge_slave_1: entered allmulticast mode [ 337.010209][ T291] bridge_slave_1: entered promiscuous mode [ 337.023955][ T290] bridge0: port 2(bridge_slave_1) entered blocking state [ 337.033231][ T290] bridge0: port 2(bridge_slave_1) entered disabled state [ 337.041596][ T290] bridge_slave_1: entered allmulticast mode [ 337.049602][ T290] bridge_slave_1: entered promiscuous mode [ 337.255739][ T289] bridge0: port 2(bridge_slave_1) entered blocking state [ 337.267467][ T289] bridge0: port 2(bridge_slave_1) entered forwarding state [ 337.277580][ T289] bridge0: port 1(bridge_slave_0) entered blocking state [ 337.288876][ T289] bridge0: port 1(bridge_slave_0) entered forwarding state [ 337.315197][ T290] bridge0: port 2(bridge_slave_1) entered blocking state [ 337.324328][ T290] bridge0: port 2(bridge_slave_1) entered forwarding state [ 337.333748][ T290] bridge0: port 1(bridge_slave_0) entered blocking state [ 337.346446][ T290] bridge0: port 1(bridge_slave_0) entered forwarding state [ 337.361437][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 337.370437][ T291] bridge0: port 2(bridge_slave_1) entered forwarding state [ 337.381239][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 337.389775][ T291] bridge0: port 1(bridge_slave_0) entered forwarding state [ 337.406114][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 337.415015][ T292] bridge0: port 2(bridge_slave_1) entered forwarding state [ 337.424663][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 337.433814][ T292] bridge0: port 1(bridge_slave_0) entered forwarding state [ 337.495517][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 337.508083][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 337.518221][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 337.528494][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 337.540247][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 337.550031][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 337.560340][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 337.582667][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 337.592717][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 337.619002][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 337.627111][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 337.636783][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 337.646938][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 337.656894][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 337.666076][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 337.676654][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 337.686663][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 337.722032][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 337.730899][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 337.741836][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 337.752998][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 337.789890][ T291] veth0_vlan: entered promiscuous mode [ 337.812474][ T292] veth0_vlan: entered promiscuous mode [ 337.823063][ T289] veth0_vlan: entered promiscuous mode [ 337.851375][ T291] veth1_macvtap: entered promiscuous mode [ 337.861956][ T289] veth1_macvtap: entered promiscuous mode [ 337.872868][ T292] veth1_macvtap: entered promiscuous mode [ 337.915935][ T290] veth0_vlan: entered promiscuous mode [ 337.951861][ T289] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 337.957082][ T290] veth1_macvtap: entered promiscuous mode [ 339.595835][ T36] kauditd_printk_skb: 25 callbacks suppressed [ 339.595858][ T36] audit: type=1400 audit(1763150209.880:99): avc: denied { create } for pid=356 comm="syz.1.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 339.605293][ T357] kvm_intel: L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 339.631024][ T36] audit: type=1400 audit(1763150209.880:100): avc: denied { write } for pid=356 comm="syz.1.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 339.705199][ T36] audit: type=1400 audit(1763150209.890:101): avc: denied { read write } for pid=356 comm="syz.1.10" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 339.738062][ T361] 9pnet_fd: Insufficient options for proto=fd [ 339.747922][ T36] audit: type=1400 audit(1763150209.890:102): avc: denied { open } for pid=356 comm="syz.1.10" path="/dev/kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 339.781008][ T36] audit: type=1400 audit(1763150209.890:103): avc: denied { ioctl } for pid=356 comm="syz.1.10" path="/dev/kvm" dev="devtmpfs" ino=13 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 340.094427][ T36] audit: type=1400 audit(1763150210.380:104): avc: denied { create } for pid=374 comm="syz.0.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 340.203444][ T36] audit: type=1400 audit(1763150210.480:105): avc: denied { write } for pid=378 comm="syz.0.22" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 340.350310][ T36] audit: type=1400 audit(1763150210.630:106): avc: denied { create } for pid=382 comm="syz.0.24" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 340.439112][ T36] audit: type=1400 audit(1763150210.630:107): avc: denied { map } for pid=382 comm="syz.0.24" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3547 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 340.507678][ T36] audit: type=1400 audit(1763150210.630:108): avc: denied { read write } for pid=382 comm="syz.0.24" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3547 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 340.563419][ T391] 9pnet_fd: Insufficient options for proto=fd [ 340.859290][ T411] 9pnet_fd: Insufficient options for proto=fd [ 340.960335][ T417] FAULT_INJECTION: forcing a failure. [ 340.960335][ T417] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 341.024166][ T417] CPU: 0 UID: 0 PID: 417 Comm: syz.0.42 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 341.024209][ T417] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 341.024227][ T417] Call Trace: [ 341.024235][ T417] [ 341.024246][ T417] __dump_stack+0x21/0x30 [ 341.024296][ T417] dump_stack_lvl+0x10c/0x190 [ 341.024325][ T417] ? __cfi_dump_stack_lvl+0x10/0x10 [ 341.024357][ T417] ? __kasan_check_write+0x18/0x20 [ 341.024391][ T417] ? mutex_unlock+0x8b/0x240 [ 341.024412][ T417] dump_stack+0x19/0x20 [ 341.024440][ T417] should_fail_ex+0x3d9/0x530 [ 341.024462][ T417] should_fail+0xf/0x20 [ 341.024482][ T417] should_fail_usercopy+0x1e/0x30 [ 341.024531][ T417] _copy_from_user+0x22/0xb0 [ 341.024558][ T417] __x64_sys_signalfd4+0x112/0x1a0 [ 341.024587][ T417] ? __cfi___x64_sys_signalfd4+0x10/0x10 [ 341.024616][ T417] ? __kasan_check_read+0x15/0x20 [ 341.024650][ T417] x64_sys_call+0x29a4/0x2ee0 [ 341.024683][ T417] do_syscall_64+0x58/0xf0 [ 341.024711][ T417] ? clear_bhb_loop+0x50/0xa0 [ 341.024735][ T417] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 341.024759][ T417] RIP: 0033:0x7fd09778f6c9 [ 341.024782][ T417] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 341.024800][ T417] RSP: 002b:00007fd0961f7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000121 [ 341.024829][ T417] RAX: ffffffffffffffda RBX: 00007fd0979e5fa0 RCX: 00007fd09778f6c9 [ 341.024846][ T417] RDX: 0000000000000008 RSI: 0000200000000000 RDI: ffffffffffffffff [ 341.024861][ T417] RBP: 00007fd0961f7090 R08: 0000000000000000 R09: 0000000000000000 [ 341.024876][ T417] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 341.024889][ T417] R13: 00007fd0979e6038 R14: 00007fd0979e5fa0 R15: 00007ffe3246e628 [ 341.024907][ T417] [ 341.053862][ T429] FAULT_INJECTION: forcing a failure. [ 341.053862][ T429] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 341.288415][ T429] CPU: 1 UID: 0 PID: 429 Comm: syz.3.46 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 341.288452][ T429] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 341.288465][ T429] Call Trace: [ 341.288472][ T429] [ 341.288481][ T429] __dump_stack+0x21/0x30 [ 341.288516][ T429] dump_stack_lvl+0x10c/0x190 [ 341.288543][ T429] ? __cfi_dump_stack_lvl+0x10/0x10 [ 341.288582][ T429] ? check_stack_object+0x12c/0x140 [ 341.288603][ T429] dump_stack+0x19/0x20 [ 341.288631][ T429] should_fail_ex+0x3d9/0x530 [ 341.288653][ T429] should_fail+0xf/0x20 [ 341.288672][ T429] should_fail_usercopy+0x1e/0x30 [ 341.288692][ T429] _copy_to_user+0x24/0xa0 [ 341.288718][ T429] simple_read_from_buffer+0xed/0x160 [ 341.288747][ T429] proc_fail_nth_read+0x19e/0x210 [ 341.288776][ T429] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 341.288803][ T429] ? bpf_lsm_file_permission+0xd/0x20 [ 341.288832][ T429] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 341.288861][ T429] vfs_read+0x27d/0xc70 [ 341.288881][ T429] ? __cfi_vfs_read+0x10/0x10 [ 341.288899][ T429] ? __kasan_check_write+0x18/0x20 [ 341.288931][ T429] ? mutex_lock+0x92/0x1c0 [ 341.288950][ T429] ? __cfi_mutex_lock+0x10/0x10 [ 341.288969][ T429] ? __fget_files+0x2c5/0x340 [ 341.289005][ T429] ksys_read+0x141/0x250 [ 341.289028][ T429] ? __cfi_ksys_read+0x10/0x10 [ 341.289047][ T429] ? __kasan_check_read+0x15/0x20 [ 341.289078][ T429] __x64_sys_read+0x7f/0x90 [ 341.289098][ T429] x64_sys_call+0x2638/0x2ee0 [ 341.289129][ T429] do_syscall_64+0x58/0xf0 [ 341.289155][ T429] ? clear_bhb_loop+0x50/0xa0 [ 341.289180][ T429] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 341.289204][ T429] RIP: 0033:0x7f18f958e0dc [ 341.289222][ T429] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 341.289249][ T429] RSP: 002b:00007f18fa449030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 341.289272][ T429] RAX: ffffffffffffffda RBX: 00007f18f97e5fa0 RCX: 00007f18f958e0dc [ 341.289288][ T429] RDX: 000000000000000f RSI: 00007f18fa4490a0 RDI: 0000000000000008 [ 341.289303][ T429] RBP: 00007f18fa449090 R08: 0000000000000000 R09: 0000000000000000 [ 341.289317][ T429] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 341.289348][ T429] R13: 00007f18f97e6038 R14: 00007f18f97e5fa0 R15: 00007ffd4584e4f8 [ 341.289367][ T429] [ 341.406234][ T447] 9pnet_fd: Insufficient options for proto=fd [ 341.677411][ T455] FAULT_INJECTION: forcing a failure. [ 341.677411][ T455] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 341.701690][ T455] CPU: 0 UID: 0 PID: 455 Comm: syz.3.58 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 341.701726][ T455] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 341.701741][ T455] Call Trace: [ 341.701748][ T455] [ 341.701758][ T455] __dump_stack+0x21/0x30 [ 341.701793][ T455] dump_stack_lvl+0x10c/0x190 [ 341.701821][ T455] ? __cfi_dump_stack_lvl+0x10/0x10 [ 341.701853][ T455] dump_stack+0x19/0x20 [ 341.701880][ T455] should_fail_ex+0x3d9/0x530 [ 341.701905][ T455] should_fail+0xf/0x20 [ 341.701926][ T455] should_fail_usercopy+0x1e/0x30 [ 341.701949][ T455] _copy_from_user+0x22/0xb0 [ 341.701974][ T455] get_user_ifreq+0x71/0x180 [ 341.701998][ T455] sock_ioctl+0x6fb/0x7b0 [ 341.702020][ T455] ? __cfi_sock_ioctl+0x10/0x10 [ 341.702043][ T455] ? bpf_lsm_file_ioctl+0xd/0x20 [ 341.702074][ T455] ? security_file_ioctl+0x34/0xd0 [ 341.702098][ T455] ? __cfi_sock_ioctl+0x10/0x10 [ 341.702119][ T455] __se_sys_ioctl+0x135/0x1b0 [ 341.702143][ T455] __x64_sys_ioctl+0x7f/0xa0 [ 341.702166][ T455] x64_sys_call+0x1878/0x2ee0 [ 341.702210][ T455] do_syscall_64+0x58/0xf0 [ 341.702236][ T455] ? clear_bhb_loop+0x50/0xa0 [ 341.702262][ T455] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 341.702285][ T455] RIP: 0033:0x7f18f958f6c9 [ 341.702304][ T455] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 341.702322][ T455] RSP: 002b:00007f18fa449038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 341.702346][ T455] RAX: ffffffffffffffda RBX: 00007f18f97e5fa0 RCX: 00007f18f958f6c9 [ 341.702363][ T455] RDX: 0000200000000080 RSI: 00000000000089f0 RDI: 0000000000000007 [ 341.702377][ T455] RBP: 00007f18fa449090 R08: 0000000000000000 R09: 0000000000000000 [ 341.702391][ T455] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 341.702404][ T455] R13: 00007f18f97e6038 R14: 00007f18f97e5fa0 R15: 00007ffd4584e4f8 [ 341.702423][ T455] [ 341.991940][ T460] 9pnet_fd: Insufficient options for proto=fd [ 342.343586][ T490] 9pnet: Could not find request transport: fd0xffffffffffffffff [ 342.850731][ T545] 9pnet_fd: Insufficient options for proto=fd [ 343.416723][ T603] FAULT_INJECTION: forcing a failure. [ 343.416723][ T603] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 343.454420][ T603] CPU: 1 UID: 0 PID: 603 Comm: syz.0.131 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 343.454460][ T603] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 343.454474][ T603] Call Trace: [ 343.454482][ T603] [ 343.454491][ T603] __dump_stack+0x21/0x30 [ 343.454527][ T603] dump_stack_lvl+0x10c/0x190 [ 343.454557][ T603] ? __cfi_dump_stack_lvl+0x10/0x10 [ 343.454588][ T603] ? find_vma+0xcd/0x110 [ 343.454610][ T603] dump_stack+0x19/0x20 [ 343.454638][ T603] should_fail_ex+0x3d9/0x530 [ 343.454661][ T603] should_fail+0xf/0x20 [ 343.454682][ T603] should_fail_usercopy+0x1e/0x30 [ 343.454705][ T603] _copy_from_user+0x22/0xb0 [ 343.454731][ T603] io_submit_one+0xca/0x18c0 [ 343.454756][ T603] ? lookup_ioctx+0x360/0x360 [ 343.454794][ T603] ? asm_exc_page_fault+0x2b/0x30 [ 343.455144][ T603] ? __get_user_4+0x1a/0x40 [ 343.455166][ T603] ? lookup_ioctx+0x208/0x360 [ 343.455191][ T603] __se_sys_io_submit+0x164/0x3c0 [ 343.455222][ T603] ? __x64_sys_io_submit+0xa0/0xa0 [ 343.455251][ T603] ? ksys_write+0x1ef/0x250 [ 343.455276][ T603] ? __kasan_check_read+0x15/0x20 [ 343.455312][ T603] __x64_sys_io_submit+0x7f/0xa0 [ 343.455341][ T603] x64_sys_call+0x1c95/0x2ee0 [ 343.455374][ T603] do_syscall_64+0x58/0xf0 [ 343.455401][ T603] ? clear_bhb_loop+0x50/0xa0 [ 343.455427][ T603] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 343.455449][ T603] RIP: 0033:0x7fd09778f6c9 [ 343.455468][ T603] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 343.455493][ T603] RSP: 002b:00007fd0961f7038 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 343.455517][ T603] RAX: ffffffffffffffda RBX: 00007fd0979e5fa0 RCX: 00007fd09778f6c9 [ 343.455534][ T603] RDX: 0000200000000140 RSI: 0000000000000002 RDI: 00007fd09614d000 [ 343.455549][ T603] RBP: 00007fd0961f7090 R08: 0000000000000000 R09: 0000000000000000 [ 343.455563][ T603] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 343.455576][ T603] R13: 00007fd0979e6038 R14: 00007fd0979e5fa0 R15: 00007ffe3246e628 [ 343.455595][ T603] [ 347.494405][ T36] kauditd_printk_skb: 16 callbacks suppressed [ 347.494424][ T36] audit: type=1400 audit(1763150217.780:125): avc: denied { create } for pid=681 comm="syz.0.169" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 347.543522][ T36] audit: type=1400 audit(1763150217.780:126): avc: denied { write } for pid=681 comm="syz.0.169" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 347.577011][ T36] audit: type=1400 audit(1763150217.780:127): avc: denied { read } for pid=681 comm="syz.0.169" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 347.605783][ T688] 9pnet_fd: Insufficient options for proto=fd [ 347.992088][ T36] audit: type=1400 audit(1763150218.270:128): avc: denied { create } for pid=721 comm="syz.3.189" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 348.064134][ T36] audit: type=1400 audit(1763150218.270:129): avc: denied { accept } for pid=721 comm="syz.3.189" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 348.312796][ T740] capability: warning: `syz.2.198' uses deprecated v2 capabilities in a way that may be insecure [ 348.345050][ T740] overlayfs: overlapping lowerdir path [ 348.422339][ T746] 9pnet_fd: Insufficient options for proto=fd [ 348.804940][ T36] audit: type=1400 audit(1763150219.090:130): avc: denied { create } for pid=763 comm="syz.3.211" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 348.867086][ T36] audit: type=1400 audit(1763150219.090:131): avc: denied { connect } for pid=763 comm="syz.3.211" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 349.215458][ T796] 9pnet: Could not find request transport: fd0xffffffffffffffff [ 349.253338][ T36] audit: type=1400 audit(1763150219.530:132): avc: denied { create } for pid=801 comm="syz.0.228" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 349.669005][ T822] 9pnet: Could not find request transport: fd0xffffffffffffffff [ 349.826992][ T36] audit: type=1400 audit(1763150220.100:133): avc: denied { name_bind } for pid=826 comm="syz.2.234" src=19999 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 350.288938][ T850] 9pnet_fd: Insufficient options for proto=fd [ 350.352859][ T856] 9pnet: Could not find request transport: fd0xffffffffffffffff [ 350.443042][ T36] audit: type=1400 audit(1763150220.720:134): avc: denied { read write } for pid=857 comm="syz.1.255" name="vhost-vsock" dev="devtmpfs" ino=200 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 350.766446][ T877] 9pnet: Could not find request transport: fd0xffffffffffffffff [ 351.451404][ T900] FAULT_INJECTION: forcing a failure. [ 351.451404][ T900] name failslab, interval 1, probability 0, space 0, times 0 [ 351.494168][ T900] CPU: 1 UID: 0 PID: 900 Comm: syz.3.270 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 351.494206][ T900] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 351.494219][ T900] Call Trace: [ 351.494226][ T900] [ 351.494235][ T900] __dump_stack+0x21/0x30 [ 351.494268][ T900] dump_stack_lvl+0x10c/0x190 [ 351.494297][ T900] ? __cfi_dump_stack_lvl+0x10/0x10 [ 351.494329][ T900] dump_stack+0x19/0x20 [ 351.494356][ T900] should_fail_ex+0x3d9/0x530 [ 351.494378][ T900] should_failslab+0xac/0x100 [ 351.494402][ T900] kmem_cache_alloc_lru_noprof+0x44/0x430 [ 351.494422][ T900] ? sock_alloc_inode+0x48/0x150 [ 351.494445][ T900] ? __kasan_check_write+0x18/0x20 [ 351.494478][ T900] sock_alloc_inode+0x48/0x150 [ 351.494500][ T900] ? __cfi_sock_alloc_inode+0x10/0x10 [ 351.494523][ T900] alloc_inode+0x7a/0x270 [ 351.494547][ T900] ? bpf_lsm_socket_create+0xd/0x20 [ 351.494573][ T900] new_inode_pseudo+0x19/0x40 [ 351.494597][ T900] __sock_create+0x130/0x810 [ 351.494624][ T900] __sys_socket+0xe2/0x1c0 [ 351.494650][ T900] __x64_sys_socket+0x7e/0x90 [ 351.494676][ T900] x64_sys_call+0x2608/0x2ee0 [ 351.494708][ T900] do_syscall_64+0x58/0xf0 [ 351.494736][ T900] ? clear_bhb_loop+0x50/0xa0 [ 351.494761][ T900] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 351.494784][ T900] RIP: 0033:0x7f18f958f6c9 [ 351.494802][ T900] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 351.494820][ T900] RSP: 002b:00007f18fa449038 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 351.494844][ T900] RAX: ffffffffffffffda RBX: 00007f18f97e5fa0 RCX: 00007f18f958f6c9 [ 351.494861][ T900] RDX: 0000000000000001 RSI: 000000000000000a RDI: 000000000000000b [ 351.494874][ T900] RBP: 00007f18fa449090 R08: 0000000000000000 R09: 0000000000000000 [ 351.494888][ T900] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 351.494901][ T900] R13: 00007f18f97e6038 R14: 00007f18f97e5fa0 R15: 00007ffd4584e4f8 [ 351.494921][ T900] [ 351.494945][ T900] socket: no more sockets [ 352.113971][ T924] 9pnet: Could not find request transport: fd0xffffffffffffffff [ 353.145595][ T965] 9pnet_fd: Insufficient options for proto=fd [ 353.261243][ T980] 9pnet_fd: Insufficient options for proto=fd [ 353.316226][ T36] kauditd_printk_skb: 6 callbacks suppressed [ 353.316246][ T36] audit: type=1400 audit(1763150223.600:141): avc: denied { ioctl } for pid=983 comm="syz.0.315" path="socket:[7712]" dev="sockfs" ino=7712 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 353.481224][ T1006] 9pnet_fd: Insufficient options for proto=fd [ 353.511727][ T36] audit: type=1400 audit(1763150223.790:142): avc: denied { bind } for pid=1004 comm="syz.1.326" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 353.759434][ T1028] 9pnet_fd: Insufficient options for proto=fd [ 354.000013][ T1057] 9pnet_fd: Insufficient options for proto=fd [ 354.044370][ T1060] FAULT_INJECTION: forcing a failure. [ 354.044370][ T1060] name failslab, interval 1, probability 0, space 0, times 0 [ 354.084262][ T1060] CPU: 1 UID: 0 PID: 1060 Comm: syz.2.353 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 354.084300][ T1060] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 354.084314][ T1060] Call Trace: [ 354.084322][ T1060] [ 354.084330][ T1060] __dump_stack+0x21/0x30 [ 354.084365][ T1060] dump_stack_lvl+0x10c/0x190 [ 354.084395][ T1060] ? __cfi_dump_stack_lvl+0x10/0x10 [ 354.084426][ T1060] ? avc_has_perm+0x144/0x220 [ 354.084463][ T1060] dump_stack+0x19/0x20 [ 354.084491][ T1060] should_fail_ex+0x3d9/0x530 [ 354.084515][ T1060] should_failslab+0xac/0x100 [ 354.084540][ T1060] __kmalloc_cache_noprof+0x41/0x490 [ 354.084562][ T1060] ? vhost_task_create+0x101/0x350 [ 354.084585][ T1060] ? __cfi_kvm_nx_huge_page_recovery_worker+0x10/0x10 [ 354.084611][ T1060] vhost_task_create+0x101/0x350 [ 354.084633][ T1060] ? __cfi_kvm_nx_huge_page_recovery_worker_kill+0x10/0x10 [ 354.084659][ T1060] ? __cfi_vhost_task_create+0x10/0x10 [ 354.084683][ T1060] ? __cfi_vhost_task_fn+0x10/0x10 [ 354.084704][ T1060] ? __kasan_check_write+0x18/0x20 [ 354.084737][ T1060] ? mutex_lock+0x92/0x1c0 [ 354.084812][ T1060] ? __cfi_mutex_lock+0x10/0x10 [ 354.084831][ T1060] ? kernel_text_address+0xa9/0xe0 [ 354.084861][ T1060] kvm_mmu_post_init_vm+0x156/0x2d0 [ 354.084892][ T1060] kvm_arch_vcpu_ioctl_run+0xd7/0x1aa0 [ 354.084922][ T1060] ? _parse_integer_limit+0x195/0x1e0 [ 354.084958][ T1060] ? __cfi_kvm_arch_vcpu_ioctl_run+0x10/0x10 [ 354.084987][ T1060] ? kstrtoull+0x13b/0x1e0 [ 354.085006][ T1060] ? kstrtouint+0x78/0xf0 [ 354.085023][ T1060] ? ioctl_has_perm+0x1aa/0x4d0 [ 354.085044][ T1060] ? __asan_memcpy+0x5a/0x80 [ 354.085064][ T1060] ? ioctl_has_perm+0x3e0/0x4d0 [ 354.085089][ T1060] ? has_cap_mac_admin+0xd0/0xd0 [ 354.085115][ T1060] ? __kasan_check_write+0x18/0x20 [ 354.085148][ T1060] ? mutex_lock_killable+0x92/0x1c0 [ 354.085170][ T1060] ? __cfi_mutex_lock_killable+0x10/0x10 [ 354.085192][ T1060] ? proc_fail_nth_write+0x17e/0x210 [ 354.085223][ T1060] kvm_vcpu_ioctl+0x96f/0xee0 [ 354.085244][ T1060] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 354.085263][ T1060] ? __cfi_vfs_write+0x10/0x10 [ 354.085283][ T1060] ? __kasan_check_write+0x18/0x20 [ 354.085316][ T1060] ? mutex_unlock+0x8b/0x240 [ 354.085336][ T1060] ? __cfi_mutex_unlock+0x10/0x10 [ 354.085356][ T1060] ? __fget_files+0x2c5/0x340 [ 354.085381][ T1060] ? __fget_files+0x2c5/0x340 [ 354.085405][ T1060] ? bpf_lsm_file_ioctl+0xd/0x20 [ 354.085435][ T1060] ? security_file_ioctl+0x34/0xd0 [ 354.085460][ T1060] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 354.085479][ T1060] __se_sys_ioctl+0x135/0x1b0 [ 354.085504][ T1060] __x64_sys_ioctl+0x7f/0xa0 [ 354.085528][ T1060] x64_sys_call+0x1878/0x2ee0 [ 354.085561][ T1060] do_syscall_64+0x58/0xf0 [ 354.085590][ T1060] ? clear_bhb_loop+0x50/0xa0 [ 354.085614][ T1060] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 354.085638][ T1060] RIP: 0033:0x7feef138f6c9 [ 354.085658][ T1060] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 354.085677][ T1060] RSP: 002b:00007feef22cb038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 354.085701][ T1060] RAX: ffffffffffffffda RBX: 00007feef15e5fa0 RCX: 00007feef138f6c9 [ 354.085718][ T1060] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000008 [ 354.085732][ T1060] RBP: 00007feef22cb090 R08: 0000000000000000 R09: 0000000000000000 [ 354.085746][ T1060] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 354.085770][ T1060] R13: 00007feef15e6038 R14: 00007feef15e5fa0 R15: 00007ffecb1cb068 [ 354.085789][ T1060] [ 354.670029][ T1094] 9pnet_fd: Insufficient options for proto=fd [ 354.849106][ T36] audit: type=1400 audit(1763150225.130:143): avc: denied { create } for pid=1110 comm="syz.3.380" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 355.134111][ T36] audit: type=1400 audit(1763150225.410:144): avc: denied { read write } for pid=1136 comm="syz.3.391" name="rnullb0" dev="devtmpfs" ino=31 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 355.203151][ T36] audit: type=1400 audit(1763150225.410:145): avc: denied { open } for pid=1136 comm="syz.3.391" path="/dev/rnullb0" dev="devtmpfs" ino=31 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 355.508110][ T1177] FAULT_INJECTION: forcing a failure. [ 355.508110][ T1177] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 355.523835][ T36] audit: type=1400 audit(1763150225.790:146): avc: denied { create } for pid=1176 comm="syz.3.409" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 355.555244][ T1177] CPU: 1 UID: 0 PID: 1177 Comm: syz.3.409 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 355.555279][ T1177] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 355.555293][ T1177] Call Trace: [ 355.555300][ T1177] [ 355.555308][ T1177] __dump_stack+0x21/0x30 [ 355.555344][ T1177] dump_stack_lvl+0x10c/0x190 [ 355.555374][ T1177] ? __cfi_dump_stack_lvl+0x10/0x10 [ 355.555405][ T1177] ? find_vma+0xcd/0x110 [ 355.555427][ T1177] dump_stack+0x19/0x20 [ 355.555454][ T1177] should_fail_ex+0x3d9/0x530 [ 355.555475][ T1177] should_fail+0xf/0x20 [ 355.555496][ T1177] should_fail_usercopy+0x1e/0x30 [ 355.555520][ T1177] _copy_from_user+0x22/0xb0 [ 355.555556][ T1177] io_submit_one+0xca/0x18c0 [ 355.555583][ T1177] ? lookup_ioctx+0x360/0x360 [ 355.555608][ T1177] ? asm_exc_page_fault+0x2b/0x30 [ 355.555633][ T1177] ? __get_user_4+0x1a/0x40 [ 355.555762][ T1177] ? lookup_ioctx+0x208/0x360 [ 355.555790][ T1177] __se_sys_io_submit+0x164/0x3c0 [ 355.555814][ T1177] ? __x64_sys_io_submit+0xa0/0xa0 [ 355.555835][ T1177] ? ksys_write+0x1ef/0x250 [ 355.555857][ T1177] ? __kasan_check_read+0x15/0x20 [ 355.555888][ T1177] __x64_sys_io_submit+0x7f/0xa0 [ 355.556050][ T1177] x64_sys_call+0x1c95/0x2ee0 [ 355.556089][ T1177] do_syscall_64+0x58/0xf0 [ 355.556117][ T1177] ? clear_bhb_loop+0x50/0xa0 [ 355.556141][ T1177] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 355.556164][ T1177] RIP: 0033:0x7f18f958f6c9 [ 355.556182][ T1177] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 355.556199][ T1177] RSP: 002b:00007f18fa449038 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 355.556223][ T1177] RAX: ffffffffffffffda RBX: 00007f18f97e5fa0 RCX: 00007f18f958f6c9 [ 355.556238][ T1177] RDX: 0000200000000340 RSI: 0000000000000001 RDI: 00007f18fa428000 [ 355.556252][ T1177] RBP: 00007f18fa449090 R08: 0000000000000000 R09: 0000000000000000 [ 355.556265][ T1177] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 355.556277][ T1177] R13: 00007f18f97e6038 R14: 00007f18f97e5fa0 R15: 00007ffd4584e4f8 [ 355.556295][ T1177] [ 356.361971][ T36] audit: type=1400 audit(1763150226.640:147): avc: denied { write } for pid=1223 comm="syz.0.432" name="vlan0" dev="proc" ino=4026532792 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 356.417421][ T36] audit: type=1400 audit(1763150226.700:148): avc: denied { ioctl } for pid=1223 comm="syz.0.432" path="/dev/ashmem" dev="devtmpfs" ino=201 ioctlcmd=0x7701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 356.909146][ T1287] 9pnet_fd: Insufficient options for proto=fd [ 357.689267][ T1335] 9pnet_fd: Insufficient options for proto=fd [ 357.870532][ T1355] 9pnet_fd: Insufficient options for proto=fd [ 358.744977][ T1439] 9pnet_fd: Insufficient options for proto=fd [ 359.296705][ T1455] 9pnet_fd: Insufficient options for proto=fd [ 359.387189][ T1457] 9pnet_fd: Insufficient options for proto=fd [ 359.576897][ T1467] 9pnet_fd: Insufficient options for proto=fd [ 360.075401][ T1505] 9pnet_fd: Insufficient options for proto=fd [ 360.605687][ T1537] FAULT_INJECTION: forcing a failure. [ 360.605687][ T1537] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 360.659752][ T1537] CPU: 1 UID: 0 PID: 1537 Comm: syz.1.588 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 360.659786][ T1537] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 360.659800][ T1537] Call Trace: [ 360.659807][ T1537] [ 360.659816][ T1537] __dump_stack+0x21/0x30 [ 360.659852][ T1537] dump_stack_lvl+0x10c/0x190 [ 360.659883][ T1537] ? __cfi_dump_stack_lvl+0x10/0x10 [ 360.659913][ T1537] ? check_stack_object+0x12c/0x140 [ 360.659936][ T1537] dump_stack+0x19/0x20 [ 360.659963][ T1537] should_fail_ex+0x3d9/0x530 [ 360.659987][ T1537] should_fail+0xf/0x20 [ 360.660006][ T1537] should_fail_usercopy+0x1e/0x30 [ 360.660029][ T1537] _copy_to_user+0x24/0xa0 [ 360.660057][ T1537] simple_read_from_buffer+0xed/0x160 [ 360.660086][ T1537] proc_fail_nth_read+0x19e/0x210 [ 360.660116][ T1537] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 360.660146][ T1537] ? bpf_lsm_file_permission+0xd/0x20 [ 360.660177][ T1537] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 360.660212][ T1537] vfs_read+0x27d/0xc70 [ 360.660234][ T1537] ? __cfi_vfs_read+0x10/0x10 [ 360.660252][ T1537] ? __kasan_check_write+0x18/0x20 [ 360.660286][ T1537] ? mutex_lock+0x92/0x1c0 [ 360.660306][ T1537] ? __cfi_mutex_lock+0x10/0x10 [ 360.660326][ T1537] ? __fget_files+0x2c5/0x340 [ 360.660351][ T1537] ksys_read+0x141/0x250 [ 360.660370][ T1537] ? __cfi_ksys_read+0x10/0x10 [ 360.660390][ T1537] ? __cfi___x64_sys_epoll_wait+0x10/0x10 [ 360.660422][ T1537] ? __kasan_check_read+0x15/0x20 [ 360.660463][ T1537] __x64_sys_read+0x7f/0x90 [ 360.660483][ T1537] x64_sys_call+0x2638/0x2ee0 [ 360.660514][ T1537] do_syscall_64+0x58/0xf0 [ 360.660649][ T1537] ? clear_bhb_loop+0x50/0xa0 [ 360.660675][ T1537] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 360.660698][ T1537] RIP: 0033:0x7fd8fbd8e0dc [ 360.660717][ T1537] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 360.660736][ T1537] RSP: 002b:00007fd8fcc40030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 360.660759][ T1537] RAX: ffffffffffffffda RBX: 00007fd8fbfe5fa0 RCX: 00007fd8fbd8e0dc [ 360.660775][ T1537] RDX: 000000000000000f RSI: 00007fd8fcc400a0 RDI: 0000000000000008 [ 360.660789][ T1537] RBP: 00007fd8fcc40090 R08: 0000000000000000 R09: 0000000000000000 [ 360.660803][ T1537] R10: 0000000000009450 R11: 0000000000000246 R12: 0000000000000001 [ 360.660818][ T1537] R13: 00007fd8fbfe6038 R14: 00007fd8fbfe5fa0 R15: 00007ffe4b002e08 [ 360.660838][ T1537] [ 360.999925][ T1544] 9pnet_fd: Insufficient options for proto=fd [ 361.863175][ T1567] 9pnet_fd: Insufficient options for proto=fd [ 362.392769][ T1613] 9pnet: Could not find request transport: 0xffffffffffffffff [ 362.521115][ T1625] 9pnet_fd: Insufficient options for proto=fd [ 363.995863][ T1737] 9pnet_fd: Insufficient options for proto=fd [ 364.074468][ T1741] 9pnet: Could not find request transport: fd0x0000000000000007 [ 364.535777][ T1753] 9pnet: Could not find request transport: fd0x0000000000000008 [ 367.059644][ T1835] 9pnet_fd: Insufficient options for proto=fd [ 369.165748][ T1887] 9pnet_fd: Insufficient options for proto=fd [ 369.321109][ T36] audit: type=1400 audit(1763150239.590:149): avc: denied { map } for pid=1898 comm="syz.2.768" path="socket:[13264]" dev="sockfs" ino=13264 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 369.388632][ T36] audit: type=1400 audit(1763150239.590:150): avc: denied { read } for pid=1898 comm="syz.2.768" path="socket:[13264]" dev="sockfs" ino=13264 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 369.442018][ T1909] FAULT_INJECTION: forcing a failure. [ 369.442018][ T1909] name failslab, interval 1, probability 0, space 0, times 0 [ 369.487028][ T1909] CPU: 1 UID: 0 PID: 1909 Comm: syz.2.773 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 369.487067][ T1909] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 369.487086][ T1909] Call Trace: [ 369.487093][ T1909] [ 369.487106][ T1909] __dump_stack+0x21/0x30 [ 369.487143][ T1909] dump_stack_lvl+0x10c/0x190 [ 369.487171][ T1909] ? __cfi_dump_stack_lvl+0x10/0x10 [ 369.487202][ T1909] ? avc_has_perm+0x144/0x220 [ 369.487234][ T1909] dump_stack+0x19/0x20 [ 369.487262][ T1909] should_fail_ex+0x3d9/0x530 [ 369.487285][ T1909] should_failslab+0xac/0x100 [ 369.487311][ T1909] __kmalloc_cache_noprof+0x41/0x490 [ 369.487333][ T1909] ? vhost_task_create+0x101/0x350 [ 369.487356][ T1909] ? __cfi_kvm_nx_huge_page_recovery_worker+0x10/0x10 [ 369.487382][ T1909] vhost_task_create+0x101/0x350 [ 369.487404][ T1909] ? __cfi_kvm_nx_huge_page_recovery_worker_kill+0x10/0x10 [ 369.487430][ T1909] ? __cfi_vhost_task_create+0x10/0x10 [ 369.487453][ T1909] ? __cfi_vhost_task_fn+0x10/0x10 [ 369.487474][ T1909] ? __kasan_check_write+0x18/0x20 [ 369.487504][ T1909] ? mutex_lock+0x92/0x1c0 [ 369.487524][ T1909] ? __cfi_mutex_lock+0x10/0x10 [ 369.487543][ T1909] ? kernel_text_address+0xa9/0xe0 [ 369.487572][ T1909] kvm_mmu_post_init_vm+0x156/0x2d0 [ 369.487605][ T1909] kvm_arch_vcpu_ioctl_run+0xd7/0x1aa0 [ 369.487634][ T1909] ? _parse_integer_limit+0x195/0x1e0 [ 369.487701][ T1909] ? __cfi_kvm_arch_vcpu_ioctl_run+0x10/0x10 [ 369.487730][ T1909] ? kstrtoull+0x13b/0x1e0 [ 369.487749][ T1909] ? kstrtouint+0x78/0xf0 [ 369.487768][ T1909] ? ioctl_has_perm+0x1aa/0x4d0 [ 369.487793][ T1909] ? __asan_memcpy+0x5a/0x80 [ 369.487813][ T1909] ? ioctl_has_perm+0x3e0/0x4d0 [ 369.487838][ T1909] ? has_cap_mac_admin+0xd0/0xd0 [ 369.487864][ T1909] ? __kasan_check_write+0x18/0x20 [ 369.487896][ T1909] ? mutex_lock_killable+0x92/0x1c0 [ 369.487918][ T1909] ? __cfi_mutex_lock_killable+0x10/0x10 [ 369.487939][ T1909] ? proc_fail_nth_write+0x17e/0x210 [ 369.487972][ T1909] kvm_vcpu_ioctl+0x96f/0xee0 [ 369.487993][ T1909] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 369.488012][ T1909] ? __cfi_vfs_write+0x10/0x10 [ 369.488031][ T1909] ? __kasan_check_write+0x18/0x20 [ 369.488064][ T1909] ? mutex_unlock+0x8b/0x240 [ 369.488083][ T1909] ? __cfi_mutex_unlock+0x10/0x10 [ 369.488101][ T1909] ? __fget_files+0x2c5/0x340 [ 369.488123][ T1909] ? __fget_files+0x2c5/0x340 [ 369.488146][ T1909] ? bpf_lsm_file_ioctl+0xd/0x20 [ 369.488176][ T1909] ? security_file_ioctl+0x34/0xd0 [ 369.488201][ T1909] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 369.488220][ T1909] __se_sys_ioctl+0x135/0x1b0 [ 369.488245][ T1909] __x64_sys_ioctl+0x7f/0xa0 [ 369.488268][ T1909] x64_sys_call+0x1878/0x2ee0 [ 369.488299][ T1909] do_syscall_64+0x58/0xf0 [ 369.488326][ T1909] ? clear_bhb_loop+0x50/0xa0 [ 369.488349][ T1909] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 369.488372][ T1909] RIP: 0033:0x7feef138f6c9 [ 369.488389][ T1909] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 369.488407][ T1909] RSP: 002b:00007feef22cb038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 369.488430][ T1909] RAX: ffffffffffffffda RBX: 00007feef15e5fa0 RCX: 00007feef138f6c9 [ 369.488445][ T1909] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000008 [ 369.488458][ T1909] RBP: 00007feef22cb090 R08: 0000000000000000 R09: 0000000000000000 [ 369.488471][ T1909] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 369.488484][ T1909] R13: 00007feef15e6038 R14: 00007feef15e5fa0 R15: 00007ffecb1cb068 [ 369.488501][ T1909] [ 371.704171][ T2020] FAULT_INJECTION: forcing a failure. [ 371.704171][ T2020] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 371.731080][ T2020] CPU: 1 UID: 0 PID: 2020 Comm: syz.3.825 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 371.731120][ T2020] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 371.731135][ T2020] Call Trace: [ 371.731143][ T2020] [ 371.731152][ T2020] __dump_stack+0x21/0x30 [ 371.731189][ T2020] dump_stack_lvl+0x10c/0x190 [ 371.731219][ T2020] ? __cfi_dump_stack_lvl+0x10/0x10 [ 371.731249][ T2020] ? check_stack_object+0x12c/0x140 [ 371.731271][ T2020] dump_stack+0x19/0x20 [ 371.731299][ T2020] should_fail_ex+0x3d9/0x530 [ 371.731322][ T2020] should_fail+0xf/0x20 [ 371.731342][ T2020] should_fail_usercopy+0x1e/0x30 [ 371.731366][ T2020] _copy_to_user+0x24/0xa0 [ 371.731394][ T2020] simple_read_from_buffer+0xed/0x160 [ 371.731423][ T2020] proc_fail_nth_read+0x19e/0x210 [ 371.731453][ T2020] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 371.731490][ T2020] ? bpf_lsm_file_permission+0xd/0x20 [ 371.731520][ T2020] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 371.731548][ T2020] vfs_read+0x27d/0xc70 [ 371.731567][ T2020] ? fdget+0x189/0x1f0 [ 371.731590][ T2020] ? __cfi_vfs_read+0x10/0x10 [ 371.731608][ T2020] ? __kasan_check_write+0x18/0x20 [ 371.731639][ T2020] ? mutex_lock+0x92/0x1c0 [ 371.731659][ T2020] ? __cfi_mutex_lock+0x10/0x10 [ 371.731678][ T2020] ? __fget_files+0x2c5/0x340 [ 371.731703][ T2020] ksys_read+0x141/0x250 [ 371.731721][ T2020] ? __cfi_ksys_read+0x10/0x10 [ 371.731739][ T2020] ? __x64_sys_sendfile64+0x193/0x1f0 [ 371.731764][ T2020] ? __kasan_check_read+0x15/0x20 [ 371.731797][ T2020] __x64_sys_read+0x7f/0x90 [ 371.731817][ T2020] x64_sys_call+0x2638/0x2ee0 [ 371.731848][ T2020] do_syscall_64+0x58/0xf0 [ 371.731876][ T2020] ? clear_bhb_loop+0x50/0xa0 [ 371.731901][ T2020] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 371.731924][ T2020] RIP: 0033:0x7f18f958e0dc [ 371.731942][ T2020] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 371.731967][ T2020] RSP: 002b:00007f18fa449030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 371.731991][ T2020] RAX: ffffffffffffffda RBX: 00007f18f97e5fa0 RCX: 00007f18f958e0dc [ 371.732008][ T2020] RDX: 000000000000000f RSI: 00007f18fa4490a0 RDI: 0000000000000007 [ 371.732022][ T2020] RBP: 00007f18fa449090 R08: 0000000000000000 R09: 0000000000000000 [ 371.732036][ T2020] R10: 000000000000fffb R11: 0000000000000246 R12: 0000000000000001 [ 371.732050][ T2020] R13: 00007f18f97e6038 R14: 00007f18f97e5fa0 R15: 00007ffd4584e4f8 [ 371.732069][ T2020] [ 372.108800][ T2027] netlink: 'syz.0.828': attribute type 4 has an invalid length. [ 372.377065][ T2058] FAULT_INJECTION: forcing a failure. [ 372.377065][ T2058] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 372.398494][ T2058] CPU: 1 UID: 0 PID: 2058 Comm: syz.3.842 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 372.398529][ T2058] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 372.398542][ T2058] Call Trace: [ 372.398549][ T2058] [ 372.398559][ T2058] __dump_stack+0x21/0x30 [ 372.398594][ T2058] dump_stack_lvl+0x10c/0x190 [ 372.398623][ T2058] ? __cfi_dump_stack_lvl+0x10/0x10 [ 372.398655][ T2058] dump_stack+0x19/0x20 [ 372.398683][ T2058] should_fail_ex+0x3d9/0x530 [ 372.398707][ T2058] should_fail+0xf/0x20 [ 372.398727][ T2058] should_fail_usercopy+0x1e/0x30 [ 372.398752][ T2058] _copy_from_user+0x22/0xb0 [ 372.398780][ T2058] get_user_ifreq+0x71/0x180 [ 372.398802][ T2058] sock_ioctl+0x6fb/0x7b0 [ 372.398825][ T2058] ? __cfi_sock_ioctl+0x10/0x10 [ 372.398849][ T2058] ? bpf_lsm_file_ioctl+0xd/0x20 [ 372.398880][ T2058] ? security_file_ioctl+0x34/0xd0 [ 372.398905][ T2058] ? __cfi_sock_ioctl+0x10/0x10 [ 372.398926][ T2058] __se_sys_ioctl+0x135/0x1b0 [ 372.398951][ T2058] __x64_sys_ioctl+0x7f/0xa0 [ 372.398975][ T2058] x64_sys_call+0x1878/0x2ee0 [ 372.399008][ T2058] do_syscall_64+0x58/0xf0 [ 372.399036][ T2058] ? clear_bhb_loop+0x50/0xa0 [ 372.399061][ T2058] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 372.399084][ T2058] RIP: 0033:0x7f18f958f6c9 [ 372.399103][ T2058] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 372.399132][ T2058] RSP: 002b:00007f18fa449038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 372.399156][ T2058] RAX: ffffffffffffffda RBX: 00007f18f97e5fa0 RCX: 00007f18f958f6c9 [ 372.399174][ T2058] RDX: 0000200000000080 RSI: 00000000000089f0 RDI: 0000000000000008 [ 372.399188][ T2058] RBP: 00007f18fa449090 R08: 0000000000000000 R09: 0000000000000000 [ 372.399203][ T2058] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 372.399216][ T2058] R13: 00007f18f97e6038 R14: 00007f18f97e5fa0 R15: 00007ffd4584e4f8 [ 372.399236][ T2058] [ 373.279860][ T2100] Zero length message leads to an empty skb [ 383.206762][ T2868] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 383.263842][ T36] audit: type=1400 audit(1763150253.540:151): avc: denied { getopt } for pid=2867 comm="syz.0.1241" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 384.137158][ T2978] 9pnet_fd: Insufficient options for proto=fd [ 386.303163][ T3206] 9pnet_fd: Insufficient options for proto=fd [ 386.913487][ T3245] 9pnet_fd: Insufficient options for proto=fd [ 386.954292][ T36] audit: type=1400 audit(1763150257.220:152): avc: denied { read } for pid=3246 comm="syz.2.1428" name="snapshot" dev="devtmpfs" ino=21 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 387.034211][ T36] audit: type=1400 audit(1763150257.220:153): avc: denied { open } for pid=3246 comm="syz.2.1428" path="/dev/snapshot" dev="devtmpfs" ino=21 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 418.736648][ T4926] bridge0: port 1(bridge_slave_0) entered blocking state [ 418.768253][ T4926] bridge0: port 1(bridge_slave_0) entered disabled state [ 418.789669][ T4926] bridge_slave_0: entered allmulticast mode [ 418.809955][ T4926] bridge_slave_0: entered promiscuous mode [ 418.824822][ T4926] bridge0: port 2(bridge_slave_1) entered blocking state [ 418.844178][ T4926] bridge0: port 2(bridge_slave_1) entered disabled state [ 418.851721][ T4926] bridge_slave_1: entered allmulticast mode [ 418.878501][ T4926] bridge_slave_1: entered promiscuous mode [ 419.045275][ T45] bridge_slave_1: left allmulticast mode [ 419.051109][ T45] bridge_slave_1: left promiscuous mode [ 419.077520][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 419.098393][ T45] bridge_slave_0: left allmulticast mode [ 419.109734][ T45] bridge_slave_0: left promiscuous mode [ 419.118158][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 419.249184][ T45] veth1_macvtap: left promiscuous mode [ 419.264316][ T45] veth0_vlan: left promiscuous mode [ 419.396876][ T4926] bridge0: port 2(bridge_slave_1) entered blocking state [ 419.404234][ T4926] bridge0: port 2(bridge_slave_1) entered forwarding state [ 419.412099][ T4926] bridge0: port 1(bridge_slave_0) entered blocking state [ 419.419325][ T4926] bridge0: port 1(bridge_slave_0) entered forwarding state [ 419.473321][ T330] bridge0: port 1(bridge_slave_0) entered disabled state [ 419.486106][ T330] bridge0: port 2(bridge_slave_1) entered disabled state [ 419.505333][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 419.512512][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 419.525854][ T330] bridge0: port 2(bridge_slave_1) entered blocking state [ 419.533050][ T330] bridge0: port 2(bridge_slave_1) entered forwarding state [ 419.612680][ T4926] veth0_vlan: entered promiscuous mode [ 419.650701][ T4926] veth1_macvtap: entered promiscuous mode [ 420.049531][ T12] bridge_slave_1: left allmulticast mode [ 420.068928][ T12] bridge_slave_1: left promiscuous mode [ 420.082326][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 420.097896][ T12] bridge_slave_0: left allmulticast mode [ 420.103703][ T12] bridge_slave_0: left promiscuous mode [ 420.109960][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 420.245228][ T5055] bridge0: port 1(bridge_slave_0) entered blocking state [ 420.263301][ T5055] bridge0: port 1(bridge_slave_0) entered disabled state [ 420.282923][ T5055] bridge_slave_0: entered allmulticast mode [ 420.290653][ T5055] bridge_slave_0: entered promiscuous mode [ 420.304858][ T5055] bridge0: port 2(bridge_slave_1) entered blocking state [ 420.322126][ T5055] bridge0: port 2(bridge_slave_1) entered disabled state [ 420.334129][ T5055] bridge_slave_1: entered allmulticast mode [ 420.350759][ T5055] bridge_slave_1: entered promiscuous mode [ 420.365228][ T12] veth1_macvtap: left promiscuous mode [ 420.371035][ T12] veth0_vlan: left promiscuous mode [ 420.642438][ T5055] bridge0: port 2(bridge_slave_1) entered blocking state [ 420.652339][ T5055] bridge0: port 2(bridge_slave_1) entered forwarding state [ 420.664652][ T5055] bridge0: port 1(bridge_slave_0) entered blocking state [ 420.674273][ T5055] bridge0: port 1(bridge_slave_0) entered forwarding state [ 420.756231][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 420.765256][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 420.833362][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 420.844991][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 420.874656][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 420.884394][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 420.958482][ T5055] veth0_vlan: entered promiscuous mode [ 420.995919][ T5055] veth1_macvtap: entered promiscuous mode [ 426.064968][ T5369] bridge0: port 1(bridge_slave_0) entered blocking state [ 426.084072][ T5369] bridge0: port 1(bridge_slave_0) entered disabled state [ 426.091221][ T5369] bridge_slave_0: entered allmulticast mode [ 426.097773][ T5369] bridge_slave_0: entered promiscuous mode [ 426.104437][ T12] bridge_slave_1: left allmulticast mode [ 426.114776][ T12] bridge_slave_1: left promiscuous mode [ 426.134354][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 426.164630][ T12] bridge_slave_0: left allmulticast mode [ 426.170339][ T12] bridge_slave_0: left promiscuous mode [ 426.193644][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 426.331355][ T5369] bridge0: port 2(bridge_slave_1) entered blocking state [ 426.344123][ T5369] bridge0: port 2(bridge_slave_1) entered disabled state [ 426.361420][ T5369] bridge_slave_1: entered allmulticast mode [ 426.374577][ T5369] bridge_slave_1: entered promiscuous mode [ 426.403038][ T12] veth1_macvtap: left promiscuous mode [ 426.411233][ T12] veth0_vlan: left promiscuous mode [ 426.683421][ T5369] bridge0: port 2(bridge_slave_1) entered blocking state [ 426.690680][ T5369] bridge0: port 2(bridge_slave_1) entered forwarding state [ 426.698096][ T5369] bridge0: port 1(bridge_slave_0) entered blocking state [ 426.705189][ T5369] bridge0: port 1(bridge_slave_0) entered forwarding state [ 426.787528][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 426.795292][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 426.822198][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 426.829965][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 426.855327][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 426.862869][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 426.922904][ T5369] veth0_vlan: entered promiscuous mode [ 426.965125][ T5369] veth1_macvtap: entered promiscuous mode [ 427.624967][ T5429] bridge0: port 1(bridge_slave_0) entered blocking state [ 427.634591][ T5429] bridge0: port 1(bridge_slave_0) entered disabled state [ 427.654188][ T5429] bridge_slave_0: entered allmulticast mode [ 427.661144][ T5429] bridge_slave_0: entered promiscuous mode [ 427.684985][ T5429] bridge0: port 2(bridge_slave_1) entered blocking state [ 427.696441][ T5429] bridge0: port 2(bridge_slave_1) entered disabled state [ 427.703934][ T5429] bridge_slave_1: entered allmulticast mode [ 427.724661][ T5429] bridge_slave_1: entered promiscuous mode [ 427.839303][ T12] bridge_slave_1: left allmulticast mode [ 427.854143][ T12] bridge_slave_1: left promiscuous mode [ 427.871656][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 427.890891][ T12] bridge_slave_0: left allmulticast mode [ 427.904122][ T12] bridge_slave_0: left promiscuous mode [ 427.922536][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 428.080731][ T12] veth1_macvtap: left promiscuous mode [ 428.087251][ T12] veth0_vlan: left promiscuous mode [ 428.413570][ T330] bridge0: port 1(bridge_slave_0) entered blocking state [ 428.426217][ T330] bridge0: port 1(bridge_slave_0) entered forwarding state [ 428.460108][ T330] bridge0: port 2(bridge_slave_1) entered blocking state [ 428.468135][ T330] bridge0: port 2(bridge_slave_1) entered forwarding state [ 428.497303][ T5429] veth0_vlan: entered promiscuous mode [ 428.529001][ T5429] veth1_macvtap: entered promiscuous mode [ 433.125681][ T5787] FAULT_INJECTION: forcing a failure. [ 433.125681][ T5787] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 433.139161][ T5787] CPU: 0 UID: 0 PID: 5787 Comm: syz.0.2669 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 433.139197][ T5787] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 433.139211][ T5787] Call Trace: [ 433.139219][ T5787] [ 433.139228][ T5787] __dump_stack+0x21/0x30 [ 433.139266][ T5787] dump_stack_lvl+0x10c/0x190 [ 433.139296][ T5787] ? __cfi_dump_stack_lvl+0x10/0x10 [ 433.139327][ T5787] ? check_stack_object+0x12c/0x140 [ 433.139350][ T5787] dump_stack+0x19/0x20 [ 433.139378][ T5787] should_fail_ex+0x3d9/0x530 [ 433.139402][ T5787] should_fail+0xf/0x20 [ 433.139422][ T5787] should_fail_usercopy+0x1e/0x30 [ 433.139447][ T5787] _copy_to_user+0x24/0xa0 [ 433.139475][ T5787] simple_read_from_buffer+0xed/0x160 [ 433.139505][ T5787] proc_fail_nth_read+0x19e/0x210 [ 433.139534][ T5787] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 433.139564][ T5787] ? bpf_lsm_file_permission+0xd/0x20 [ 433.139596][ T5787] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 433.139625][ T5787] vfs_read+0x27d/0xc70 [ 433.139645][ T5787] ? __cfi_vfs_read+0x10/0x10 [ 433.139664][ T5787] ? __kasan_check_write+0x18/0x20 [ 433.139698][ T5787] ? mutex_lock+0x92/0x1c0 [ 433.139718][ T5787] ? __cfi_mutex_lock+0x10/0x10 [ 433.139738][ T5787] ? __fget_files+0x2c5/0x340 [ 433.139764][ T5787] ksys_read+0x141/0x250 [ 433.139783][ T5787] ? fdget+0x189/0x1f0 [ 433.139806][ T5787] ? __cfi_ksys_read+0x10/0x10 [ 433.139825][ T5787] ? __x64_sys_preadv+0x16d/0x2a0 [ 433.139848][ T5787] ? __kasan_check_read+0x15/0x20 [ 433.139882][ T5787] __x64_sys_read+0x7f/0x90 [ 433.139903][ T5787] x64_sys_call+0x2638/0x2ee0 [ 433.139945][ T5787] do_syscall_64+0x58/0xf0 [ 433.139974][ T5787] ? clear_bhb_loop+0x50/0xa0 [ 433.139999][ T5787] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 433.140023][ T5787] RIP: 0033:0x7f523198e0dc [ 433.140042][ T5787] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 433.140060][ T5787] RSP: 002b:00007f52327c4030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 433.140084][ T5787] RAX: ffffffffffffffda RBX: 00007f5231be5fa0 RCX: 00007f523198e0dc [ 433.140101][ T5787] RDX: 000000000000000f RSI: 00007f52327c40a0 RDI: 0000000000000009 [ 433.140115][ T5787] RBP: 00007f52327c4090 R08: 0000000000000000 R09: 0000000000000000 [ 433.140130][ T5787] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000001 [ 433.140143][ T5787] R13: 00007f5231be6038 R14: 00007f5231be5fa0 R15: 00007fff64835488 [ 433.140162][ T5787] [ 433.541813][ T5815] FAULT_INJECTION: forcing a failure. [ 433.541813][ T5815] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 433.556458][ T5815] CPU: 0 UID: 0 PID: 5815 Comm: syz.0.2684 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 433.556492][ T5815] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 433.556506][ T5815] Call Trace: [ 433.556513][ T5815] [ 433.556522][ T5815] __dump_stack+0x21/0x30 [ 433.556558][ T5815] dump_stack_lvl+0x10c/0x190 [ 433.556607][ T5815] ? __cfi_dump_stack_lvl+0x10/0x10 [ 433.556638][ T5815] ? selinux_file_open+0x457/0x610 [ 433.556666][ T5815] dump_stack+0x19/0x20 [ 433.556694][ T5815] should_fail_ex+0x3d9/0x530 [ 433.556717][ T5815] should_fail_alloc_page+0xeb/0x110 [ 433.556744][ T5815] __alloc_pages_noprof+0x19b/0x7b0 [ 433.556774][ T5815] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 433.556812][ T5815] ? is_bpf_text_address+0x17b/0x1a0 [ 433.556838][ T5815] ? __kernel_text_address+0x11/0x40 [ 433.556884][ T5815] ? unwind_get_return_address+0x51/0x90 [ 433.556915][ T5815] ? __cfi_stack_trace_consume_entry+0x10/0x10 [ 433.556962][ T5815] ? arch_stack_walk+0x10b/0x170 [ 433.557004][ T5815] __folio_alloc_noprof+0x14/0x80 [ 433.557035][ T5815] folio_prealloc+0x46/0x240 [ 433.557068][ T5815] do_pte_missing+0x164c/0x4240 [ 433.557101][ T5815] ? _parse_integer+0x2e/0x40 [ 433.557150][ T5815] ? pte_marker_clear+0x1b0/0x1b0 [ 433.557176][ T5815] ? kstrtouint_from_user+0xfb/0x150 [ 433.557203][ T5815] ? __x64_sys_openat+0x13a/0x170 [ 433.557232][ T5815] ? x64_sys_call+0xe69/0x2ee0 [ 433.557270][ T5815] ? selinux_file_permission+0x309/0xb30 [ 433.557302][ T5815] ? __pte_offset_map+0x1b0/0x230 [ 433.557342][ T5815] ? pte_offset_map_rw_nolock+0xba/0x110 [ 433.557388][ T5815] handle_mm_fault+0x1166/0x1b90 [ 433.557434][ T5815] ? __cfi_handle_mm_fault+0x10/0x10 [ 433.557463][ T5815] ? lock_vma_under_rcu+0x49d/0x540 [ 433.557498][ T5815] ? __kasan_check_write+0x18/0x20 [ 433.557547][ T5815] do_user_addr_fault+0x96c/0x1200 [ 433.557592][ T5815] ? __cfi_ksys_write+0x10/0x10 [ 433.557620][ T5815] exc_page_fault+0x59/0xc0 [ 433.557652][ T5815] asm_exc_page_fault+0x2b/0x30 [ 433.557676][ T5815] RIP: 0033:0x7f5231860576 [ 433.557695][ T5815] Code: 00 00 00 00 41 57 31 c0 41 56 49 89 d6 41 55 49 89 f5 48 89 d6 41 54 49 89 fc 48 8d 3d 0c 2f 1b 00 55 53 48 81 ec 88 20 00 00 <48> 89 0c 24 4c 89 44 24 08 e8 ec d9 fe ff 4d 85 f6 0f 84 46 0a 00 [ 433.557713][ T5815] RSP: 002b:00007f52327c1f70 EFLAGS: 00010202 [ 433.557733][ T5815] RAX: 0000000000000000 RBX: 00007f5231be5fa0 RCX: 0000000000000000 [ 433.557760][ T5815] RDX: 0000200000000040 RSI: 0000200000000040 RDI: 00007f5231a13479 [ 433.557781][ T5815] RBP: 00007f52327c4090 R08: 00007f523184e2f0 R09: 0000000000000000 [ 433.557809][ T5815] R10: 0000000000000000 R11: 0000200000000040 R12: 0000000000000000 [ 433.557822][ T5815] R13: 000000000000002d R14: 0000200000000040 R15: 00007fff64835488 [ 433.557852][ T5815] [ 433.557888][ T5815] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 434.074107][ T10] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 434.244125][ T10] usb 1-1: Using ep0 maxpacket: 16 [ 434.254361][ T10] usb 1-1: config 0 interface 0 altsetting 0 has an invalid descriptor for endpoint zero, skipping [ 434.290807][ T10] usb 1-1: New USB device found, idVendor=134c, idProduct=0002, bcdDevice=ec.7e [ 434.305165][ T10] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 434.323905][ T10] usb 1-1: Product: syz [ 434.334066][ T10] usb 1-1: Manufacturer: syz [ 434.339186][ T10] usb 1-1: SerialNumber: syz [ 434.355758][ T10] usb 1-1: config 0 descriptor?? [ 434.366397][ T10] hub 1-1:0.0: bad descriptor, ignoring hub [ 434.367569][ T5896] FAULT_INJECTION: forcing a failure. [ 434.367569][ T5896] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 434.372483][ T10] hub 1-1:0.0: probe with driver hub failed with error -5 [ 434.403161][ T5896] CPU: 1 UID: 0 PID: 5896 Comm: syz.3.2724 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 434.403199][ T5896] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 434.403213][ T5896] Call Trace: [ 434.403220][ T5896] [ 434.403230][ T5896] __dump_stack+0x21/0x30 [ 434.403266][ T5896] dump_stack_lvl+0x10c/0x190 [ 434.403296][ T5896] ? __cfi_dump_stack_lvl+0x10/0x10 [ 434.403328][ T5896] ? check_stack_object+0x12c/0x140 [ 434.403350][ T5896] dump_stack+0x19/0x20 [ 434.403379][ T5896] should_fail_ex+0x3d9/0x530 [ 434.403403][ T5896] should_fail+0xf/0x20 [ 434.403423][ T5896] should_fail_usercopy+0x1e/0x30 [ 434.403447][ T5896] _copy_to_user+0x24/0xa0 [ 434.403486][ T5896] simple_read_from_buffer+0xed/0x160 [ 434.403521][ T5896] proc_fail_nth_read+0x19e/0x210 [ 434.403550][ T5896] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 434.403580][ T5896] ? bpf_lsm_file_permission+0xd/0x20 [ 434.403609][ T5896] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 434.403638][ T5896] vfs_read+0x27d/0xc70 [ 434.403658][ T5896] ? __cfi_vfs_read+0x10/0x10 [ 434.403676][ T5896] ? __kasan_check_write+0x18/0x20 [ 434.403711][ T5896] ? mutex_lock+0x92/0x1c0 [ 434.403731][ T5896] ? __cfi_mutex_lock+0x10/0x10 [ 434.403751][ T5896] ? __fget_files+0x2c5/0x340 [ 434.403777][ T5896] ksys_read+0x141/0x250 [ 434.403797][ T5896] ? __cfi_ksys_read+0x10/0x10 [ 434.403817][ T5896] ? __kasan_check_read+0x15/0x20 [ 434.403851][ T5896] __x64_sys_read+0x7f/0x90 [ 434.403872][ T5896] x64_sys_call+0x2638/0x2ee0 [ 434.403904][ T5896] do_syscall_64+0x58/0xf0 [ 434.403934][ T5896] ? clear_bhb_loop+0x50/0xa0 [ 434.403959][ T5896] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 434.403983][ T5896] RIP: 0033:0x7f062958e0dc [ 434.404002][ T5896] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 434.404021][ T5896] RSP: 002b:00007f062a354030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 434.404042][ T5896] RAX: ffffffffffffffda RBX: 00007f06297e5fa0 RCX: 00007f062958e0dc [ 434.404058][ T5896] RDX: 000000000000000f RSI: 00007f062a3540a0 RDI: 0000000000000008 [ 434.404072][ T5896] RBP: 00007f062a354090 R08: 0000000000000000 R09: 0000000000000000 [ 434.404085][ T5896] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 434.404098][ T5896] R13: 00007f06297e6038 R14: 00007f06297e5fa0 R15: 00007ffe7e4823b8 [ 434.404115][ T5896] [ 434.674514][ T10] usb 1-1: USB disconnect, device number 2 [ 434.866951][ T36] audit: type=1400 audit(1763150305.150:154): avc: denied { read write } for pid=5930 comm="syz.2.2739" name="fuse" dev="devtmpfs" ino=23 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 434.899063][ T5929] FAULT_INJECTION: forcing a failure. [ 434.899063][ T5929] name failslab, interval 1, probability 0, space 0, times 0 [ 434.920679][ T36] audit: type=1400 audit(1763150305.170:155): avc: denied { open } for pid=5930 comm="syz.2.2739" path="/dev/fuse" dev="devtmpfs" ino=23 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 434.957660][ T5929] CPU: 0 UID: 0 PID: 5929 Comm: syz.1.2735 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 434.957697][ T5929] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 434.957710][ T5929] Call Trace: [ 434.957731][ T5929] [ 434.957741][ T5929] __dump_stack+0x21/0x30 [ 434.957777][ T5929] dump_stack_lvl+0x10c/0x190 [ 434.957807][ T5929] ? __cfi_dump_stack_lvl+0x10/0x10 [ 434.957838][ T5929] ? __kasan_check_write+0x18/0x20 [ 434.957872][ T5929] ? proc_fail_nth_write+0x17e/0x210 [ 434.957902][ T5929] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 434.957933][ T5929] dump_stack+0x19/0x20 [ 434.957961][ T5929] should_fail_ex+0x3d9/0x530 [ 434.957985][ T5929] should_failslab+0xac/0x100 [ 434.958010][ T5929] kmem_cache_alloc_noprof+0x42/0x430 [ 434.958031][ T5929] ? getname_flags+0xc6/0x710 [ 434.958054][ T5929] getname_flags+0xc6/0x710 [ 434.958076][ T5929] ? build_open_flags+0x487/0x600 [ 434.958106][ T5929] getname+0x1b/0x30 [ 434.958126][ T5929] do_sys_openat2+0xcb/0x1c0 [ 434.958154][ T5929] ? fput+0x1a5/0x240 [ 434.958180][ T5929] ? do_sys_open+0x100/0x100 [ 434.958208][ T5929] ? ksys_write+0x1ef/0x250 [ 434.958229][ T5929] ? __cfi_ksys_write+0x10/0x10 [ 434.958250][ T5929] __x64_sys_openat+0x13a/0x170 [ 434.958281][ T5929] x64_sys_call+0xe69/0x2ee0 [ 434.958314][ T5929] do_syscall_64+0x58/0xf0 [ 434.958343][ T5929] ? clear_bhb_loop+0x50/0xa0 [ 434.958369][ T5929] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 434.958393][ T5929] RIP: 0033:0x7fb17df8df10 [ 434.958412][ T5929] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 69 95 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 bc 95 02 00 8b 44 [ 434.958430][ T5929] RSP: 002b:00007fb17edbcf10 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 434.958454][ T5929] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007fb17df8df10 [ 434.958470][ T5929] RDX: 0000000000000002 RSI: 00007fb17edbcfa0 RDI: 00000000ffffff9c [ 434.958485][ T5929] RBP: 00007fb17edbcfa0 R08: 0000000000000000 R09: 0000000000000000 [ 434.958499][ T5929] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 434.958512][ T5929] R13: 00007fb17e1e6038 R14: 00007fb17e1e5fa0 R15: 00007ffeb411e518 [ 434.958531][ T5929] [ 435.213846][ T36] audit: type=1400 audit(1763150305.180:156): avc: denied { mounton } for pid=5930 comm="syz.2.2739" path="/dev/binderfs" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 435.239743][ T36] audit: type=1400 audit(1763150305.200:157): avc: denied { unmount } for pid=5429 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 435.488811][ T36] audit: type=1400 audit(1763150305.770:158): avc: denied { read write } for pid=5965 comm="syz.3.2757" name="binder1" dev="binder" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 435.515495][ T36] audit: type=1400 audit(1763150305.800:159): avc: denied { open } for pid=5965 comm="syz.3.2757" path="/dev/binderfs/binder1" dev="binder" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 435.635108][ T36] audit: type=1400 audit(1763150305.910:160): avc: denied { read write } for pid=5982 comm="syz.0.2765" name="uhid" dev="devtmpfs" ino=199 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 435.697189][ T36] audit: type=1400 audit(1763150305.910:161): avc: denied { open } for pid=5982 comm="syz.0.2765" path="/dev/uhid" dev="devtmpfs" ino=199 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 435.781126][ T5983] fuse: Bad value for 'rootmode' [ 436.584140][ T36] audit: type=1400 audit(1763150306.860:162): avc: denied { ioctl } for pid=6042 comm="syz.0.2795" path="/dev/binderfs/binder0" dev="binder" ino=13 ioctlcmd=0x620d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 436.584265][ T6043] rust_binder: Transaction failed: BR_FAILED_REPLY { source: ENOENT } my_pid:269 [ 436.664077][ T36] audit: type=1400 audit(1763150306.860:163): avc: denied { set_context_mgr } for pid=6042 comm="syz.0.2795" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 437.450641][ T6109] FAULT_INJECTION: forcing a failure. [ 437.450641][ T6109] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 437.464957][ T6109] CPU: 0 UID: 0 PID: 6109 Comm: syz.0.2827 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 437.465004][ T6109] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 437.465018][ T6109] Call Trace: [ 437.465025][ T6109] [ 437.465034][ T6109] __dump_stack+0x21/0x30 [ 437.465070][ T6109] dump_stack_lvl+0x10c/0x190 [ 437.465100][ T6109] ? __cfi_dump_stack_lvl+0x10/0x10 [ 437.465132][ T6109] ? check_stack_object+0x107/0x140 [ 437.465159][ T6109] dump_stack+0x19/0x20 [ 437.465189][ T6109] should_fail_ex+0x3d9/0x530 [ 437.465212][ T6109] should_fail+0xf/0x20 [ 437.465233][ T6109] should_fail_usercopy+0x1e/0x30 [ 437.465257][ T6109] _copy_from_user+0x22/0xb0 [ 437.465284][ T6109] core_sys_select+0x30b/0x770 [ 437.465313][ T6109] ? __cfi_core_sys_select+0x10/0x10 [ 437.465346][ T6109] ? __cfi_set_user_sigmask+0x10/0x10 [ 437.465375][ T6109] ? mutex_unlock+0x8b/0x240 [ 437.465396][ T6109] ? __cfi_mutex_unlock+0x10/0x10 [ 437.465416][ T6109] ? __fget_files+0x2c5/0x340 [ 437.465441][ T6109] __se_sys_pselect6+0x27d/0x300 [ 437.465478][ T6109] ? fput+0x1a5/0x240 [ 437.465505][ T6109] ? __x64_sys_pselect6+0x110/0x110 [ 437.465532][ T6109] ? __cfi_ksys_write+0x10/0x10 [ 437.465555][ T6109] __x64_sys_pselect6+0xe9/0x110 [ 437.465583][ T6109] x64_sys_call+0x2980/0x2ee0 [ 437.465623][ T6109] do_syscall_64+0x58/0xf0 [ 437.465651][ T6109] ? clear_bhb_loop+0x50/0xa0 [ 437.465676][ T6109] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 437.465700][ T6109] RIP: 0033:0x7f523198f6c9 [ 437.465718][ T6109] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 437.465745][ T6109] RSP: 002b:00007f52327c4038 EFLAGS: 00000246 ORIG_RAX: 000000000000010e [ 437.465769][ T6109] RAX: ffffffffffffffda RBX: 00007f5231be5fa0 RCX: 00007f523198f6c9 [ 437.465786][ T6109] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000000000000040 [ 437.465801][ T6109] RBP: 00007f52327c4090 R08: 0000000000000000 R09: 0000000000000000 [ 437.465815][ T6109] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 437.465828][ T6109] R13: 00007f5231be6038 R14: 00007f5231be5fa0 R15: 00007fff64835488 [ 437.465847][ T6109] [ 439.044165][ T6177] rust_binder: Transaction failed: BR_FAILED_REPLY { source: ENOENT } my_pid:168 [ 448.758741][ T6871] process 'syz.0.3207' launched '/dev/fd/10' with NULL argv: empty string added [ 448.804777][ T36] audit: type=1400 audit(1763150319.090:164): avc: denied { execute_no_trans } for pid=6870 comm="syz.0.3207" path=2F6D656D66643AA39F6EB4645204693502ACCEE1889D5B4038D7CE1F2039497F151D933DB5E75C274CE6D28EBC294A7454447181CF81BAE531F520C8103EC95C85174CBFCF91DF4DF3025E542A202864656C6574656429 dev="tmpfs" ino=1029 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 459.038339][ T36] audit: type=1400 audit(1763150329.320:165): avc: denied { read } for pid=7509 comm="syz.0.3528" dev="nsfs" ino=4026532831 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 459.091735][ T36] audit: type=1400 audit(1763150329.340:166): avc: denied { open } for pid=7509 comm="syz.0.3528" path="net:[4026532831]" dev="nsfs" ino=4026532831 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 460.195299][ T7549] FAULT_INJECTION: forcing a failure. [ 460.195299][ T7549] name failslab, interval 1, probability 0, space 0, times 0 [ 460.223650][ T7549] CPU: 1 UID: 0 PID: 7549 Comm: syz.3.3546 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 460.223688][ T7549] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 460.223703][ T7549] Call Trace: [ 460.223711][ T7549] [ 460.223720][ T7549] __dump_stack+0x21/0x30 [ 460.223755][ T7549] dump_stack_lvl+0x10c/0x190 [ 460.223784][ T7549] ? __cfi_dump_stack_lvl+0x10/0x10 [ 460.223815][ T7549] ? release_sock+0x171/0x1f0 [ 460.223842][ T7549] dump_stack+0x19/0x20 [ 460.223871][ T7549] should_fail_ex+0x3d9/0x530 [ 460.223894][ T7549] should_failslab+0xac/0x100 [ 460.223920][ T7549] kmem_cache_alloc_node_noprof+0x45/0x440 [ 460.223942][ T7549] ? netlink_data_ready+0x20/0x20 [ 460.223972][ T7549] ? __alloc_skb+0x10c/0x370 [ 460.223999][ T7549] __alloc_skb+0x10c/0x370 [ 460.224030][ T7549] netlink_alloc_large_skb+0xf7/0x1b0 [ 460.224060][ T7549] netlink_sendmsg+0x586/0xaf0 [ 460.224093][ T7549] ? __cfi_netlink_sendmsg+0x10/0x10 [ 460.224126][ T7549] ? bpf_lsm_socket_sendmsg+0xd/0x20 [ 460.224154][ T7549] ? security_socket_sendmsg+0x33/0xd0 [ 460.224177][ T7549] sock_write_iter+0x49c/0x4f0 [ 460.224200][ T7549] ? __cfi_sock_write_iter+0x10/0x10 [ 460.224225][ T7549] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 460.224257][ T7549] vfs_write+0x718/0xf30 [ 460.224278][ T7549] ? __cfi_sock_write_iter+0x10/0x10 [ 460.224301][ T7549] ? __cfi_vfs_write+0x10/0x10 [ 460.224325][ T7549] ksys_write+0x141/0x250 [ 460.224344][ T7549] ? __cfi_ksys_write+0x10/0x10 [ 460.224366][ T7549] ? __kasan_check_read+0x15/0x20 [ 460.224409][ T7549] __x64_sys_write+0x7f/0x90 [ 460.224430][ T7549] x64_sys_call+0x271c/0x2ee0 [ 460.224469][ T7549] do_syscall_64+0x58/0xf0 [ 460.224504][ T7549] ? clear_bhb_loop+0x50/0xa0 [ 460.224529][ T7549] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 460.224552][ T7549] RIP: 0033:0x7f062958f6c9 [ 460.224571][ T7549] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 460.224591][ T7549] RSP: 002b:00007f062a354038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 460.224615][ T7549] RAX: ffffffffffffffda RBX: 00007f06297e5fa0 RCX: 00007f062958f6c9 [ 460.224632][ T7549] RDX: 0000000000000024 RSI: 00002000000000c0 RDI: 0000000000000007 [ 460.224648][ T7549] RBP: 00007f062a354090 R08: 0000000000000000 R09: 0000000000000000 [ 460.224662][ T7549] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 460.224677][ T7549] R13: 00007f06297e6038 R14: 00007f06297e5fa0 R15: 00007ffe7e4823b8 [ 460.224696][ T7549] [ 460.763514][ T7585] FAULT_INJECTION: forcing a failure. [ 460.763514][ T7585] name failslab, interval 1, probability 0, space 0, times 0 [ 460.804078][ T7585] CPU: 0 UID: 0 PID: 7585 Comm: syz.0.3562 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 460.804113][ T7585] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 460.804129][ T7585] Call Trace: [ 460.804135][ T7585] [ 460.804144][ T7585] __dump_stack+0x21/0x30 [ 460.804178][ T7585] dump_stack_lvl+0x10c/0x190 [ 460.804206][ T7585] ? __cfi_dump_stack_lvl+0x10/0x10 [ 460.804236][ T7585] ? avc_has_extended_perms+0x921/0xdd0 [ 460.804270][ T7585] dump_stack+0x19/0x20 [ 460.804298][ T7585] should_fail_ex+0x3d9/0x530 [ 460.804321][ T7585] should_failslab+0xac/0x100 [ 460.804346][ T7585] __kmalloc_cache_node_noprof+0x46/0x450 [ 460.804368][ T7585] ? __get_vm_area_node+0x154/0x3a0 [ 460.804411][ T7585] __get_vm_area_node+0x154/0x3a0 [ 460.804441][ T7585] __vmalloc_node_range_noprof+0x33c/0x1420 [ 460.804473][ T7585] ? kvm_dev_ioctl+0x125/0x14d0 [ 460.804505][ T7585] ? number+0xd21/0xf80 [ 460.804532][ T7585] ? pointer+0xdd0/0xdd0 [ 460.804559][ T7585] ? __cfi___vmalloc_node_range_noprof+0x10/0x10 [ 460.804591][ T7585] ? vsnprintf+0x19b8/0x1aa0 [ 460.804618][ T7585] ? kvm_dev_ioctl+0x125/0x14d0 [ 460.804649][ T7585] __vmalloc_noprof+0xfe/0x1d0 [ 460.804679][ T7585] ? kvm_dev_ioctl+0x125/0x14d0 [ 460.804710][ T7585] ? alloc_fd+0x4e7/0x5a0 [ 460.804732][ T7585] ? __cfi___vmalloc_noprof+0x10/0x10 [ 460.804763][ T7585] kvm_dev_ioctl+0x125/0x14d0 [ 460.804795][ T7585] ? __fget_files+0x2c5/0x340 [ 460.804817][ T7585] ? __cfi_kvm_dev_ioctl+0x10/0x10 [ 460.804848][ T7585] ? bpf_lsm_file_ioctl+0xd/0x20 [ 460.804877][ T7585] ? security_file_ioctl+0x34/0xd0 [ 460.804902][ T7585] ? __cfi_kvm_dev_ioctl+0x10/0x10 [ 460.804933][ T7585] __se_sys_ioctl+0x135/0x1b0 [ 460.804958][ T7585] __x64_sys_ioctl+0x7f/0xa0 [ 460.804981][ T7585] x64_sys_call+0x1878/0x2ee0 [ 460.805031][ T7585] do_syscall_64+0x58/0xf0 [ 460.805069][ T7585] ? clear_bhb_loop+0x50/0xa0 [ 460.805093][ T7585] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 460.805115][ T7585] RIP: 0033:0x7f523198f6c9 [ 460.805132][ T7585] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 460.805151][ T7585] RSP: 002b:00007f52327c4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 460.805175][ T7585] RAX: ffffffffffffffda RBX: 00007f5231be5fa0 RCX: 00007f523198f6c9 [ 460.805191][ T7585] RDX: 0000000000000000 RSI: 000000000000ae01 RDI: 0000000000000007 [ 460.805204][ T7585] RBP: 00007f52327c4090 R08: 0000000000000000 R09: 0000000000000000 [ 460.805218][ T7585] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 460.805232][ T7585] R13: 00007f5231be6038 R14: 00007f5231be5fa0 R15: 00007fff64835488 [ 460.805251][ T7585] [ 460.805261][ T7585] syz.0.3562: vmalloc error: size 39304, vm_struct allocation failed, mode:0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null),cpuset=syz0,mems_allowed=0 [ 461.124096][ T7585] CPU: 0 UID: 0 PID: 7585 Comm: syz.0.3562 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 461.124134][ T7585] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 461.124148][ T7585] Call Trace: [ 461.124155][ T7585] [ 461.124164][ T7585] __dump_stack+0x21/0x30 [ 461.124199][ T7585] dump_stack_lvl+0x10c/0x190 [ 461.124227][ T7585] ? __cfi_dump_stack_lvl+0x10/0x10 [ 461.124257][ T7585] ? _raw_spin_unlock_irqrestore+0x4a/0x70 [ 461.124287][ T7585] dump_stack+0x19/0x20 [ 461.124323][ T7585] warn_alloc+0x1bc/0x2a0 [ 461.124351][ T7585] ? __kasan_kmalloc+0x28/0xb0 [ 461.124376][ T7585] ? __cfi_warn_alloc+0x10/0x10 [ 461.124405][ T7585] ? __get_vm_area_node+0x392/0x3a0 [ 461.124436][ T7585] __vmalloc_node_range_noprof+0x361/0x1420 [ 461.124468][ T7585] ? number+0xd21/0xf80 [ 461.124497][ T7585] ? pointer+0xdd0/0xdd0 [ 461.124524][ T7585] ? __cfi___vmalloc_node_range_noprof+0x10/0x10 [ 461.124557][ T7585] ? vsnprintf+0x19b8/0x1aa0 [ 461.124586][ T7585] ? kvm_dev_ioctl+0x125/0x14d0 [ 461.124617][ T7585] __vmalloc_noprof+0xfe/0x1d0 [ 461.124649][ T7585] ? kvm_dev_ioctl+0x125/0x14d0 [ 461.124681][ T7585] ? alloc_fd+0x4e7/0x5a0 [ 461.124703][ T7585] ? __cfi___vmalloc_noprof+0x10/0x10 [ 461.124736][ T7585] kvm_dev_ioctl+0x125/0x14d0 [ 461.124770][ T7585] ? __fget_files+0x2c5/0x340 [ 461.124793][ T7585] ? __cfi_kvm_dev_ioctl+0x10/0x10 [ 461.124825][ T7585] ? bpf_lsm_file_ioctl+0xd/0x20 [ 461.124855][ T7585] ? security_file_ioctl+0x34/0xd0 [ 461.124881][ T7585] ? __cfi_kvm_dev_ioctl+0x10/0x10 [ 461.124913][ T7585] __se_sys_ioctl+0x135/0x1b0 [ 461.124938][ T7585] __x64_sys_ioctl+0x7f/0xa0 [ 461.124961][ T7585] x64_sys_call+0x1878/0x2ee0 [ 461.124995][ T7585] do_syscall_64+0x58/0xf0 [ 461.125023][ T7585] ? clear_bhb_loop+0x50/0xa0 [ 461.125048][ T7585] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 461.125073][ T7585] RIP: 0033:0x7f523198f6c9 [ 461.125092][ T7585] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 461.125112][ T7585] RSP: 002b:00007f52327c4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 461.125136][ T7585] RAX: ffffffffffffffda RBX: 00007f5231be5fa0 RCX: 00007f523198f6c9 [ 461.125153][ T7585] RDX: 0000000000000000 RSI: 000000000000ae01 RDI: 0000000000000007 [ 461.125167][ T7585] RBP: 00007f52327c4090 R08: 0000000000000000 R09: 0000000000000000 [ 461.125181][ T7585] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 461.125195][ T7585] R13: 00007f5231be6038 R14: 00007f5231be5fa0 R15: 00007fff64835488 [ 461.125214][ T7585] [ 461.125343][ T7585] Mem-Info: [ 461.384219][ T7585] active_anon:24801 inactive_anon:1 isolated_anon:0 [ 461.384219][ T7585] active_file:22344 inactive_file:2285 isolated_file:0 [ 461.384219][ T7585] unevictable:0 dirty:158 writeback:0 [ 461.384219][ T7585] slab_reclaimable:8635 slab_unreclaimable:68948 [ 461.384219][ T7585] mapped:33904 shmem:20254 pagetables:663 [ 461.384219][ T7585] sec_pagetables:0 bounce:0 [ 461.384219][ T7585] kernel_misc_reclaimable:0 [ 461.384219][ T7585] free:1501703 free_pcp:10519 free_cma:0 [ 461.431167][ T7585] Node 0 active_anon:95104kB inactive_anon:4kB active_file:89376kB inactive_file:9140kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:135616kB dirty:632kB writeback:0kB shmem:77016kB shmem_thp:0kB shmem_pmdmapped:0kB anon_thp:0kB writeback_tmp:0kB kernel_stack:4892kB pagetables:2652kB sec_pagetables:0kB all_unreclaimable? no [ 461.463553][ T7585] DMA32 free:2960212kB boost:0kB min:19088kB low:23860kB high:28632kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2965936kB mlocked:0kB bounce:0kB free_pcp:5724kB local_pcp:5724kB free_cma:0kB [ 461.564109][ T7585] lowmem_reserve[]: 0 3921 3921 [ 461.569063][ T7585] Normal free:3047156kB boost:0kB min:25964kB low:32452kB high:38940kB reserved_highatomic:0KB free_highatomic:0KB active_anon:76404kB inactive_anon:4kB active_file:89376kB inactive_file:9140kB unevictable:0kB writepending:632kB present:5242880kB managed:4016120kB mlocked:0kB bounce:0kB free_pcp:58492kB local_pcp:4416kB free_cma:0kB [ 461.626537][ T7585] lowmem_reserve[]: 0 0 0 [ 461.631053][ T7585] DMA32: 5*4kB (M) 4*8kB (M) 4*16kB (M) 5*32kB (M) 3*64kB (M) 3*128kB (M) 4*256kB (M) 4*512kB (M) 5*1024kB (UM) 5*2048kB (M) 718*4096kB (M) = 2960212kB [ 461.651147][ T7585] Normal: 3*4kB (ME) 7*8kB (E) 85*16kB (UME) 673*32kB (UME) 433*64kB (UME) 38*128kB (UM) 73*256kB (UME) 81*512kB (UME) 51*1024kB (UME) 26*2048kB (UME) 701*4096kB (M) = 3092468kB [ 461.669513][ T7585] 41805 total pagecache pages [ 461.683535][ T7585] 1 pages in swap cache [ 461.688005][ T7585] Free swap = 124984kB [ 461.692188][ T7585] Total swap = 124996kB [ 461.696632][ T7585] 2097051 pages RAM [ 461.701157][ T7585] 0 pages HighMem/MovableOnly [ 461.706044][ T7585] 351537 pages reserved [ 461.710262][ T7585] 0 pages cma reserved [ 461.723336][ T7585] Memory allocations: [ 461.735219][ T7585] 0 B 0 init/main.c:1370 func:do_initcalls [ 461.742775][ T7585] 0 B 0 init/do_mounts.c:186 func:mount_root_generic [ 461.752912][ T7585] 0 B 0 init/do_mounts.c:158 func:do_mount_root [ 461.778434][ T7585] 0 B 0 init/do_mounts.c:352 func:mount_nodev_root [ 461.794098][ T7585] 0 B 0 init/do_mounts_rd.c:241 func:rd_load_image [ 461.812366][ T7585] 0 B 0 init/do_mounts_rd.c:72 func:identify_ramdisk_image [ 461.832589][ T7585] 0 B 0 init/initramfs.c:507 func:unpack_to_rootfs [ 461.842714][ T7585] 0 B 0 init/initramfs.c:508 func:unpack_to_rootfs [ 461.862988][ T7585] 0 B 0 init/initramfs.c:509 func:unpack_to_rootfs [ 461.883184][ T7585] 0 B 0 init/initramfs.c:101 func:find_link [ 462.631534][ T36] audit: type=1400 audit(1763150332.910:167): avc: denied { write } for pid=7655 comm="syz.2.3597" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 466.198716][ T36] audit: type=1400 audit(1763150336.480:168): avc: denied { read } for pid=7844 comm="syz.2.3686" name="uinput" dev="devtmpfs" ino=194 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 466.424939][ T36] audit: type=1400 audit(1763150336.710:169): avc: denied { map } for pid=7856 comm="syz.2.3695" path="socket:[50490]" dev="sockfs" ino=50490 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 466.484056][ T36] audit: type=1400 audit(1763150336.730:170): avc: denied { write } for pid=7856 comm="syz.2.3695" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 468.024231][ T36] audit: type=1400 audit(1763150338.300:171): avc: denied { setopt } for pid=7947 comm="syz.0.3738" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 468.098371][ T7957] FAULT_INJECTION: forcing a failure. [ 468.098371][ T7957] name failslab, interval 1, probability 0, space 0, times 0 [ 468.126725][ T7957] CPU: 0 UID: 0 PID: 7957 Comm: syz.1.3740 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 468.126762][ T7957] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 468.126777][ T7957] Call Trace: [ 468.126785][ T7957] [ 468.126794][ T7957] __dump_stack+0x21/0x30 [ 468.126829][ T7957] dump_stack_lvl+0x10c/0x190 [ 468.126860][ T7957] ? __cfi_dump_stack_lvl+0x10/0x10 [ 468.126890][ T7957] ? proc_fail_nth_write+0x17e/0x210 [ 468.126921][ T7957] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 468.126952][ T7957] dump_stack+0x19/0x20 [ 468.126980][ T7957] should_fail_ex+0x3d9/0x530 [ 468.127003][ T7957] should_failslab+0xac/0x100 [ 468.127029][ T7957] kmem_cache_alloc_noprof+0x42/0x430 [ 468.127050][ T7957] ? getname_flags+0xc6/0x710 [ 468.127074][ T7957] getname_flags+0xc6/0x710 [ 468.127095][ T7957] ? __fget_files+0x2c5/0x340 [ 468.127120][ T7957] user_path_at+0x2b/0x60 [ 468.127145][ T7957] __se_sys_mount+0x288/0x480 [ 468.127166][ T7957] ? ksys_write+0x1ef/0x250 [ 468.127187][ T7957] ? __x64_sys_mount+0xf0/0xf0 [ 468.127210][ T7957] __x64_sys_mount+0xc3/0xf0 [ 468.127231][ T7957] x64_sys_call+0x2021/0x2ee0 [ 468.127264][ T7957] do_syscall_64+0x58/0xf0 [ 468.127292][ T7957] ? clear_bhb_loop+0x50/0xa0 [ 468.127317][ T7957] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 468.127341][ T7957] RIP: 0033:0x7fb17df8f6c9 [ 468.127359][ T7957] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 468.127379][ T7957] RSP: 002b:00007fb17edbd038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 468.127404][ T7957] RAX: ffffffffffffffda RBX: 00007fb17e1e5fa0 RCX: 00007fb17df8f6c9 [ 468.127421][ T7957] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 468.127435][ T7957] RBP: 00007fb17edbd090 R08: 0000000000000000 R09: 0000000000000000 [ 468.127450][ T7957] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 468.127464][ T7957] R13: 00007fb17e1e6038 R14: 00007fb17e1e5fa0 R15: 00007ffeb411e518 [ 468.127484][ T7957] [ 474.498206][ T8284] netlink: 4 bytes leftover after parsing attributes in process `syz.0.3903'. [ 475.645727][ T8338] netlink: 28 bytes leftover after parsing attributes in process `syz.3.3930'. [ 475.971168][ T8357] FAULT_INJECTION: forcing a failure. [ 475.971168][ T8357] name failslab, interval 1, probability 0, space 0, times 0 [ 475.994124][ T8357] CPU: 1 UID: 0 PID: 8357 Comm: syz.3.3938 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 475.994162][ T8357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 475.994178][ T8357] Call Trace: [ 475.994185][ T8357] [ 475.994195][ T8357] __dump_stack+0x21/0x30 [ 475.994326][ T8357] dump_stack_lvl+0x10c/0x190 [ 475.994356][ T8357] ? __cfi_dump_stack_lvl+0x10/0x10 [ 475.994387][ T8357] ? avc_has_perm+0x144/0x220 [ 475.994518][ T8357] dump_stack+0x19/0x20 [ 475.994546][ T8357] should_fail_ex+0x3d9/0x530 [ 475.994628][ T8357] should_failslab+0xac/0x100 [ 475.994702][ T8357] __kmalloc_cache_noprof+0x41/0x490 [ 475.994751][ T8357] ? vhost_task_create+0x101/0x350 [ 475.994817][ T8357] ? __cfi_kvm_nx_huge_page_recovery_worker+0x10/0x10 [ 475.994857][ T8357] vhost_task_create+0x101/0x350 [ 475.994879][ T8357] ? __cfi_kvm_nx_huge_page_recovery_worker_kill+0x10/0x10 [ 475.994905][ T8357] ? __cfi_vhost_task_create+0x10/0x10 [ 475.994928][ T8357] ? __cfi_vhost_task_fn+0x10/0x10 [ 475.994950][ T8357] ? __kasan_check_write+0x18/0x20 [ 475.995002][ T8357] ? mutex_lock+0x92/0x1c0 [ 475.995072][ T8357] ? __cfi_mutex_lock+0x10/0x10 [ 475.995092][ T8357] ? kernel_text_address+0xa9/0xe0 [ 475.995145][ T8357] kvm_mmu_post_init_vm+0x156/0x2d0 [ 475.995177][ T8357] kvm_arch_vcpu_ioctl_run+0xd7/0x1aa0 [ 475.995211][ T8357] ? _parse_integer_limit+0x195/0x1e0 [ 475.995288][ T8357] ? __cfi_kvm_arch_vcpu_ioctl_run+0x10/0x10 [ 475.995317][ T8357] ? kstrtoull+0x13b/0x1e0 [ 475.995337][ T8357] ? kstrtouint+0x78/0xf0 [ 475.995357][ T8357] ? ioctl_has_perm+0x1aa/0x4d0 [ 475.995402][ T8357] ? __asan_memcpy+0x5a/0x80 [ 475.995422][ T8357] ? ioctl_has_perm+0x3e0/0x4d0 [ 475.995448][ T8357] ? has_cap_mac_admin+0xd0/0xd0 [ 475.995474][ T8357] ? __kasan_check_write+0x18/0x20 [ 475.995506][ T8357] ? mutex_lock_killable+0x92/0x1c0 [ 475.995528][ T8357] ? __cfi_mutex_lock_killable+0x10/0x10 [ 475.995550][ T8357] ? proc_fail_nth_write+0x17e/0x210 [ 475.995620][ T8357] kvm_vcpu_ioctl+0x96f/0xee0 [ 475.995641][ T8357] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 475.995661][ T8357] ? __cfi_vfs_write+0x10/0x10 [ 475.995711][ T8357] ? __kasan_check_write+0x18/0x20 [ 475.995742][ T8357] ? mutex_unlock+0x8b/0x240 [ 475.995763][ T8357] ? __cfi_mutex_unlock+0x10/0x10 [ 475.995783][ T8357] ? __fget_files+0x2c5/0x340 [ 475.995838][ T8357] ? __fget_files+0x2c5/0x340 [ 475.995863][ T8357] ? bpf_lsm_file_ioctl+0xd/0x20 [ 475.995936][ T8357] ? security_file_ioctl+0x34/0xd0 [ 475.995985][ T8357] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 475.996005][ T8357] __se_sys_ioctl+0x135/0x1b0 [ 475.996067][ T8357] __x64_sys_ioctl+0x7f/0xa0 [ 475.996090][ T8357] x64_sys_call+0x1878/0x2ee0 [ 475.996122][ T8357] do_syscall_64+0x58/0xf0 [ 475.996191][ T8357] ? clear_bhb_loop+0x50/0xa0 [ 475.996244][ T8357] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 475.996268][ T8357] RIP: 0033:0x7f062958f6c9 [ 475.996287][ T8357] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 475.996308][ T8357] RSP: 002b:00007f062a354038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 475.996332][ T8357] RAX: ffffffffffffffda RBX: 00007f06297e5fa0 RCX: 00007f062958f6c9 [ 475.996350][ T8357] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000007 [ 475.996364][ T8357] RBP: 00007f062a354090 R08: 0000000000000000 R09: 0000000000000000 [ 475.996379][ T8357] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 475.996393][ T8357] R13: 00007f06297e6038 R14: 00007f06297e5fa0 R15: 00007ffe7e4823b8 [ 475.996413][ T8357] [ 476.466512][ T36] audit: type=1400 audit(1763150346.730:172): avc: denied { setattr } for pid=8383 comm="syz.1.3953" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 476.504545][ T8384] FAULT_INJECTION: forcing a failure. [ 476.504545][ T8384] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 476.526827][ T8384] CPU: 1 UID: 0 PID: 8384 Comm: syz.1.3953 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 476.526871][ T8384] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 476.526887][ T8384] Call Trace: [ 476.526893][ T8384] [ 476.526902][ T8384] __dump_stack+0x21/0x30 [ 476.526957][ T8384] dump_stack_lvl+0x10c/0x190 [ 476.526988][ T8384] ? __cfi_dump_stack_lvl+0x10/0x10 [ 476.527018][ T8384] ? __kasan_check_read+0x15/0x20 [ 476.527054][ T8384] dump_stack+0x19/0x20 [ 476.527084][ T8384] should_fail_ex+0x3d9/0x530 [ 476.527107][ T8384] should_fail+0xf/0x20 [ 476.527128][ T8384] should_fail_usercopy+0x1e/0x30 [ 476.527153][ T8384] __kvm_read_guest_page+0x177/0x210 [ 476.527177][ T8384] kvm_vcpu_read_guest_page+0x31a/0x400 [ 476.527201][ T8384] kvm_fetch_guest_virt+0x146/0x190 [ 476.527234][ T8384] ? __cfi_kvm_fetch_guest_virt+0x10/0x10 [ 476.527268][ T8384] __do_insn_fetch_bytes+0x321/0x730 [ 476.527293][ T8384] ? x86_decode_insn+0x4fb0/0x4fb0 [ 476.527313][ T8384] ? emulator_read_write+0x410/0x580 [ 476.527338][ T8384] ? tdp_iter_restart+0x1c4/0x360 [ 476.527364][ T8384] ? kvm_tdp_mmu_fast_pf_get_last_sptep+0x290/0x290 [ 476.527394][ T8384] ? tdp_iter_next+0x362/0xa30 [ 476.527419][ T8384] x86_decode_insn+0x33b/0x4fb0 [ 476.527439][ T8384] ? trace_mark_mmio_spte+0x22/0x130 [ 476.527486][ T8384] ? __cfi_x86_decode_insn+0x10/0x10 [ 476.527506][ T8384] ? __kasan_check_write+0x18/0x20 [ 476.527539][ T8384] ? vmx_read_guest_seg_ar+0x1c8/0x350 [ 476.527567][ T8384] ? __asan_memset+0x39/0x50 [ 476.527586][ T8384] ? init_decode_cache+0x7c/0x90 [ 476.527607][ T8384] ? init_emulate_ctxt+0x410/0x540 [ 476.527632][ T8384] ? kvm_inject_realmode_interrupt+0x2e0/0x2e0 [ 476.527658][ T8384] ? kvm_mmu_do_page_fault+0x4b0/0x5f0 [ 476.527685][ T8384] x86_decode_emulated_instruction+0x66/0x190 [ 476.527713][ T8384] x86_emulate_instruction+0x2d3/0x1870 [ 476.527740][ T8384] ? kvm_multiple_exception+0x6d8/0xad0 [ 476.527767][ T8384] kvm_mmu_page_fault+0x336/0x970 [ 476.527793][ T8384] handle_ept_violation+0x21c/0x440 [ 476.527818][ T8384] ? vmx_vcpu_run+0x1100/0x2000 [ 476.527849][ T8384] ? __cfi_handle_ept_violation+0x10/0x10 [ 476.527881][ T8384] vmx_handle_exit+0x12c2/0x1b40 [ 476.527912][ T8384] ? kvm_deliver_exception_payload+0xd7/0x200 [ 476.527940][ T8384] ? __cfi_vmx_vcpu_run+0x10/0x10 [ 476.527971][ T8384] ? vmx_handle_exit_irqoff+0xe9/0x7a0 [ 476.528003][ T8384] vcpu_run+0x4bd0/0x7830 [ 476.528045][ T8384] ? signal_pending+0xc0/0xc0 [ 476.528073][ T8384] ? complete_emulated_mmio+0x4fb/0x790 [ 476.528100][ T8384] kvm_arch_vcpu_ioctl_run+0x101a/0x1aa0 [ 476.528131][ T8384] ? __cfi_kvm_arch_vcpu_ioctl_run+0x10/0x10 [ 476.528159][ T8384] ? kstrtoull+0x13b/0x1e0 [ 476.528178][ T8384] ? kstrtouint+0x78/0xf0 [ 476.528197][ T8384] ? ioctl_has_perm+0x1aa/0x4d0 [ 476.528224][ T8384] ? __asan_memcpy+0x5a/0x80 [ 476.528243][ T8384] ? ioctl_has_perm+0x3e0/0x4d0 [ 476.528269][ T8384] ? has_cap_mac_admin+0xd0/0xd0 [ 476.528295][ T8384] ? __kasan_check_write+0x18/0x20 [ 476.528326][ T8384] ? mutex_lock_killable+0x92/0x1c0 [ 476.528347][ T8384] ? __cfi_mutex_lock_killable+0x10/0x10 [ 476.528369][ T8384] ? proc_fail_nth_write+0x17e/0x210 [ 476.528399][ T8384] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 476.528429][ T8384] kvm_vcpu_ioctl+0x96f/0xee0 [ 476.528450][ T8384] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 476.528470][ T8384] ? __cfi_vfs_write+0x10/0x10 [ 476.528490][ T8384] ? __kasan_check_write+0x18/0x20 [ 476.528522][ T8384] ? mutex_unlock+0x8b/0x240 [ 476.528541][ T8384] ? __cfi_mutex_unlock+0x10/0x10 [ 476.528561][ T8384] ? __fget_files+0x2c5/0x340 [ 476.528584][ T8384] ? __fget_files+0x2c5/0x340 [ 476.528664][ T8384] ? bpf_lsm_file_ioctl+0xd/0x20 [ 476.528695][ T8384] ? security_file_ioctl+0x34/0xd0 [ 476.528721][ T8384] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 476.528741][ T8384] __se_sys_ioctl+0x135/0x1b0 [ 476.528768][ T8384] __x64_sys_ioctl+0x7f/0xa0 [ 476.528791][ T8384] x64_sys_call+0x1878/0x2ee0 [ 476.528825][ T8384] do_syscall_64+0x58/0xf0 [ 476.528854][ T8384] ? clear_bhb_loop+0x50/0xa0 [ 476.528888][ T8384] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 476.528912][ T8384] RIP: 0033:0x7fb17df8f6c9 [ 476.528930][ T8384] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 476.528950][ T8384] RSP: 002b:00007fb17edbd038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 476.528975][ T8384] RAX: ffffffffffffffda RBX: 00007fb17e1e5fa0 RCX: 00007fb17df8f6c9 [ 476.528992][ T8384] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000009 [ 476.529007][ T8384] RBP: 00007fb17edbd090 R08: 0000000000000000 R09: 0000000000000000 [ 476.529022][ T8384] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 476.529035][ T8384] R13: 00007fb17e1e6038 R14: 00007fb17e1e5fa0 R15: 00007ffeb411e518 [ 476.529055][ T8384] [ 477.031849][ T36] audit: type=1400 audit(1763150347.290:173): avc: denied { ioctl } for pid=8387 comm="syz.0.3950" path="/dev/input/event2" dev="devtmpfs" ino=208 ioctlcmd=0x4504 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 478.850134][ T8539] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 478.997965][ T36] audit: type=1400 audit(1763150349.280:174): avc: denied { attach_queue } for pid=8552 comm="syz.0.4034" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 479.033854][ T8559] netlink: 36 bytes leftover after parsing attributes in process `syz.2.4037'. [ 482.314830][ T36] audit: type=1400 audit(1763150352.600:175): avc: denied { write } for pid=8815 comm="syz.1.4165" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 482.364205][ T36] audit: type=1400 audit(1763150352.620:176): avc: denied { nlmsg_write } for pid=8815 comm="syz.1.4165" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 483.364937][ T8857] FAULT_INJECTION: forcing a failure. [ 483.364937][ T8857] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 483.394188][ T8857] CPU: 1 UID: 0 PID: 8857 Comm: syz.2.4184 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 483.394226][ T8857] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 483.394241][ T8857] Call Trace: [ 483.394248][ T8857] [ 483.394257][ T8857] __dump_stack+0x21/0x30 [ 483.394294][ T8857] dump_stack_lvl+0x10c/0x190 [ 483.394329][ T8857] ? __cfi_dump_stack_lvl+0x10/0x10 [ 483.394360][ T8857] ? check_stack_object+0x12c/0x140 [ 483.394464][ T8857] dump_stack+0x19/0x20 [ 483.394492][ T8857] should_fail_ex+0x3d9/0x530 [ 483.394516][ T8857] should_fail+0xf/0x20 [ 483.394536][ T8857] should_fail_usercopy+0x1e/0x30 [ 483.394560][ T8857] _copy_to_user+0x24/0xa0 [ 483.394588][ T8857] simple_read_from_buffer+0xed/0x160 [ 483.394661][ T8857] proc_fail_nth_read+0x19e/0x210 [ 483.394692][ T8857] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 483.394721][ T8857] ? up_write+0x66/0x280 [ 483.394795][ T8857] ? bpf_lsm_file_permission+0xd/0x20 [ 483.394827][ T8857] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 483.394856][ T8857] vfs_read+0x27d/0xc70 [ 483.394876][ T8857] ? __cfi_shmem_file_write_iter+0x10/0x10 [ 483.394947][ T8857] ? __cfi_vfs_read+0x10/0x10 [ 483.394965][ T8857] ? __kasan_check_write+0x18/0x20 [ 483.394998][ T8857] ? mutex_lock+0x92/0x1c0 [ 483.395027][ T8857] ? __cfi_mutex_lock+0x10/0x10 [ 483.395048][ T8857] ? __fget_files+0x2c5/0x340 [ 483.395074][ T8857] ksys_read+0x141/0x250 [ 483.395094][ T8857] ? __cfi_ksys_read+0x10/0x10 [ 483.395116][ T8857] ? __kasan_check_read+0x15/0x20 [ 483.395149][ T8857] __x64_sys_read+0x7f/0x90 [ 483.395170][ T8857] x64_sys_call+0x2638/0x2ee0 [ 483.395203][ T8857] do_syscall_64+0x58/0xf0 [ 483.395232][ T8857] ? clear_bhb_loop+0x50/0xa0 [ 483.395257][ T8857] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 483.395281][ T8857] RIP: 0033:0x7f1e8718e0dc [ 483.395300][ T8857] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 483.395320][ T8857] RSP: 002b:00007f1e87fc6030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 483.395345][ T8857] RAX: ffffffffffffffda RBX: 00007f1e873e5fa0 RCX: 00007f1e8718e0dc [ 483.395362][ T8857] RDX: 000000000000000f RSI: 00007f1e87fc60a0 RDI: 000000000000000b [ 483.395377][ T8857] RBP: 00007f1e87fc6090 R08: 0000000000000000 R09: 0000000000000000 [ 483.395391][ T8857] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 483.395405][ T8857] R13: 00007f1e873e6038 R14: 00007f1e873e5fa0 R15: 00007ffd3d8fccd8 [ 483.395425][ T8857] [ 483.734392][ T8866] FAULT_INJECTION: forcing a failure. [ 483.734392][ T8866] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 483.757805][ T8866] CPU: 1 UID: 0 PID: 8866 Comm: syz.1.4186 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 483.757843][ T8866] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 483.757857][ T8866] Call Trace: [ 483.757864][ T8866] [ 483.757872][ T8866] __dump_stack+0x21/0x30 [ 483.757907][ T8866] dump_stack_lvl+0x10c/0x190 [ 483.757935][ T8866] ? __cfi_dump_stack_lvl+0x10/0x10 [ 483.757966][ T8866] ? check_stack_object+0x12c/0x140 [ 483.757988][ T8866] dump_stack+0x19/0x20 [ 483.758026][ T8866] should_fail_ex+0x3d9/0x530 [ 483.758049][ T8866] should_fail+0xf/0x20 [ 483.758068][ T8866] should_fail_usercopy+0x1e/0x30 [ 483.758092][ T8866] _copy_to_user+0x24/0xa0 [ 483.758118][ T8866] simple_read_from_buffer+0xed/0x160 [ 483.758147][ T8866] proc_fail_nth_read+0x19e/0x210 [ 483.758177][ T8866] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 483.758205][ T8866] ? bpf_lsm_file_permission+0xd/0x20 [ 483.758233][ T8866] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 483.758262][ T8866] vfs_read+0x27d/0xc70 [ 483.758282][ T8866] ? __cfi_vfs_read+0x10/0x10 [ 483.758301][ T8866] ? __kasan_check_write+0x18/0x20 [ 483.758335][ T8866] ? mutex_lock+0x92/0x1c0 [ 483.758356][ T8866] ? __cfi_mutex_lock+0x10/0x10 [ 483.758376][ T8866] ? __fget_files+0x2c5/0x340 [ 483.758403][ T8866] ksys_read+0x141/0x250 [ 483.758423][ T8866] ? __cfi_ksys_read+0x10/0x10 [ 483.758443][ T8866] ? fdget+0x189/0x1f0 [ 483.758467][ T8866] ? __kasan_check_read+0x15/0x20 [ 483.758500][ T8866] __x64_sys_read+0x7f/0x90 [ 483.758521][ T8866] x64_sys_call+0x2638/0x2ee0 [ 483.758554][ T8866] do_syscall_64+0x58/0xf0 [ 483.758581][ T8866] ? clear_bhb_loop+0x50/0xa0 [ 483.758607][ T8866] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 483.758631][ T8866] RIP: 0033:0x7fb17df8e0dc [ 483.758651][ T8866] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 483.758671][ T8866] RSP: 002b:00007fb17edbd030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 483.758696][ T8866] RAX: ffffffffffffffda RBX: 00007fb17e1e5fa0 RCX: 00007fb17df8e0dc [ 483.758713][ T8866] RDX: 000000000000000f RSI: 00007fb17edbd0a0 RDI: 0000000000000008 [ 483.758728][ T8866] RBP: 00007fb17edbd090 R08: 0000000000000000 R09: 0000000000000000 [ 483.758743][ T8866] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 483.758757][ T8866] R13: 00007fb17e1e6038 R14: 00007fb17e1e5fa0 R15: 00007ffeb411e518 [ 483.758777][ T8866] [ 484.632179][ T36] audit: type=1400 audit(1763150354.910:177): avc: denied { name_bind } for pid=8947 comm="syz.0.4224" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 484.633322][ T8946] FAULT_INJECTION: forcing a failure. [ 484.633322][ T8946] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 484.669282][ T36] audit: type=1400 audit(1763150354.910:178): avc: denied { node_bind } for pid=8947 comm="syz.0.4224" saddr=224.0.0.1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 484.680571][ T8946] CPU: 0 UID: 0 PID: 8946 Comm: syz.2.4223 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 484.680617][ T8946] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 484.680633][ T8946] Call Trace: [ 484.680642][ T8946] [ 484.680651][ T8946] __dump_stack+0x21/0x30 [ 484.680693][ T8946] dump_stack_lvl+0x10c/0x190 [ 484.680727][ T8946] ? __cfi_dump_stack_lvl+0x10/0x10 [ 484.680761][ T8946] ? ioctl_has_perm+0x3e0/0x4d0 [ 484.680795][ T8946] dump_stack+0x19/0x20 [ 484.680826][ T8946] should_fail_ex+0x3d9/0x530 [ 484.680852][ T8946] should_fail+0xf/0x20 [ 484.680874][ T8946] should_fail_usercopy+0x1e/0x30 [ 484.680902][ T8946] _copy_from_user+0x22/0xb0 [ 484.680934][ T8946] kvm_vcpu_ioctl+0x43c/0xee0 [ 484.680959][ T8946] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 484.680981][ T8946] ? __cfi_vfs_write+0x10/0x10 [ 484.681005][ T8946] ? __kasan_check_write+0x18/0x20 [ 484.681044][ T8946] ? mutex_unlock+0x8b/0x240 [ 484.681068][ T8946] ? __cfi_mutex_unlock+0x10/0x10 [ 484.681092][ T8946] ? __fget_files+0x2c5/0x340 [ 484.681131][ T8946] ? __fget_files+0x2c5/0x340 [ 484.681161][ T8946] ? bpf_lsm_file_ioctl+0xd/0x20 [ 484.681198][ T8946] ? security_file_ioctl+0x34/0xd0 [ 484.681226][ T8946] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 484.681247][ T8946] __se_sys_ioctl+0x135/0x1b0 [ 484.681276][ T8946] __x64_sys_ioctl+0x7f/0xa0 [ 484.681302][ T8946] x64_sys_call+0x1878/0x2ee0 [ 484.681339][ T8946] do_syscall_64+0x58/0xf0 [ 484.681372][ T8946] ? clear_bhb_loop+0x50/0xa0 [ 484.681401][ T8946] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 484.681427][ T8946] RIP: 0033:0x7f1e8718f6c9 [ 484.681450][ T8946] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 484.681473][ T8946] RSP: 002b:00007f1e87fc6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 484.681502][ T8946] RAX: ffffffffffffffda RBX: 00007f1e873e5fa0 RCX: 00007f1e8718f6c9 [ 484.681521][ T8946] RDX: 0000200000000040 RSI: 000000004004ae99 RDI: 0000000000000008 [ 484.681539][ T8946] RBP: 00007f1e87fc6090 R08: 0000000000000000 R09: 0000000000000000 [ 484.681556][ T8946] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 484.681570][ T8946] R13: 00007f1e873e6038 R14: 00007f1e873e5fa0 R15: 00007ffd3d8fccd8 [ 484.681594][ T8946] [ 485.435377][ T9037] FAULT_INJECTION: forcing a failure. [ 485.435377][ T9037] name failslab, interval 1, probability 0, space 0, times 0 [ 485.469302][ T9037] CPU: 1 UID: 0 PID: 9037 Comm: syz.0.4265 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 485.469342][ T9037] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 485.469357][ T9037] Call Trace: [ 485.469364][ T9037] [ 485.469373][ T9037] __dump_stack+0x21/0x30 [ 485.469409][ T9037] dump_stack_lvl+0x10c/0x190 [ 485.469439][ T9037] ? __cfi_dump_stack_lvl+0x10/0x10 [ 485.469472][ T9037] dump_stack+0x19/0x20 [ 485.469499][ T9037] should_fail_ex+0x3d9/0x530 [ 485.469524][ T9037] should_failslab+0xac/0x100 [ 485.469550][ T9037] __kmalloc_node_track_caller_noprof+0x68/0x520 [ 485.469574][ T9037] ? rust_helper_krealloc+0x33/0xd0 [ 485.469755][ T9037] krealloc_noprof+0x8d/0x130 [ 485.469812][ T9037] rust_helper_krealloc+0x33/0xd0 [ 485.469843][ T9037] ? _RNvMNtNtCs43vyB533jt3_6kernel5alloc9allocatorNtB2_11ReallocFunc4call+0x70/0xc0 [ 485.469936][ T9037] _RNvMNtNtCs43vyB533jt3_6kernel5alloc9allocatorNtB2_11ReallocFunc4call+0x8e/0xc0 [ 485.469967][ T9037] _RNvMs4_NtCs5gLWsBERDPK_16rust_binder_main7processNtB5_7Process18get_current_thread+0x45a/0x1400 [ 485.470049][ T9037] ? inode_init_always_gfp+0x756/0x9e0 [ 485.470085][ T9037] ? alloc_inode+0xc5/0x270 [ 485.470110][ T9037] ? proc_pident_instantiate+0x6d/0x2c0 [ 485.470135][ T9037] ? proc_pident_lookup+0x1c7/0x270 [ 485.470158][ T9037] ? path_openat+0x1301/0x34b0 [ 485.470185][ T9037] ? do_sys_openat2+0x12c/0x1c0 [ 485.470214][ T9037] ? __x64_sys_openat+0x13a/0x170 [ 485.470247][ T9037] ? x64_sys_call+0xe69/0x2ee0 [ 485.470280][ T9037] ? do_syscall_64+0x58/0xf0 [ 485.470309][ T9037] ? entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 485.470335][ T9037] ? __cfi__RNvMs4_NtCs5gLWsBERDPK_16rust_binder_main7processNtB5_7Process18get_current_thread+0x10/0x10 [ 485.470367][ T9037] ? avc_has_perm_noaudit+0x268/0x360 [ 485.470399][ T9037] ? __asan_memcpy+0x5a/0x80 [ 485.470419][ T9037] ? avc_has_perm_noaudit+0x286/0x360 [ 485.470451][ T9037] ? avc_has_perm+0x144/0x220 [ 485.470488][ T9037] ? __cfi_avc_has_perm+0x10/0x10 [ 485.470518][ T9037] ? kasan_save_alloc_info+0x40/0x50 [ 485.470562][ T9037] ? selinux_file_open+0x457/0x610 [ 485.470621][ T9037] _RNvMs6_NtCs5gLWsBERDPK_16rust_binder_main7processNtB5_7Process5ioctl+0x1a7/0x2cf0 [ 485.470654][ T9037] ? avc_has_extended_perms+0x7c7/0xdd0 [ 485.470685][ T9037] ? __asan_memcpy+0x5a/0x80 [ 485.470704][ T9037] ? avc_has_extended_perms+0x921/0xdd0 [ 485.470735][ T9037] ? __cfi__RNvMs6_NtCs5gLWsBERDPK_16rust_binder_main7processNtB5_7Process5ioctl+0x10/0x10 [ 485.470766][ T9037] ? do_vfs_ioctl+0xeda/0x1e30 [ 485.470791][ T9037] ? arch_stack_walk+0x10b/0x170 [ 485.470822][ T9037] ? __ia32_compat_sys_ioctl+0x850/0x850 [ 485.470850][ T9037] ? _parse_integer+0x2e/0x40 [ 485.470887][ T9037] ? ioctl_has_perm+0x384/0x4d0 [ 485.470916][ T9037] ? has_cap_mac_admin+0xd0/0xd0 [ 485.470944][ T9037] ? proc_fail_nth_write+0x17e/0x210 [ 485.470974][ T9037] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 485.471005][ T9037] ? selinux_file_ioctl+0x6e0/0x1360 [ 485.471031][ T9037] ? vfs_write+0x93e/0xf30 [ 485.471050][ T9037] ? __cfi_selinux_file_ioctl+0x10/0x10 [ 485.471085][ T9037] ? __cfi_vfs_write+0x10/0x10 [ 485.471109][ T9037] ? __kasan_check_write+0x18/0x20 [ 485.471142][ T9037] ? mutex_unlock+0x8b/0x240 [ 485.471161][ T9037] ? __cfi_mutex_unlock+0x10/0x10 [ 485.471180][ T9037] ? __fget_files+0x2c5/0x340 [ 485.471206][ T9037] ? __fget_files+0x2c5/0x340 [ 485.471230][ T9037] _RNvCs5gLWsBERDPK_16rust_binder_main26rust_binder_unlocked_ioctl+0xa0/0x100 [ 485.471322][ T9037] ? __se_sys_ioctl+0x114/0x1b0 [ 485.471347][ T9037] ? __cfi__RNvCs5gLWsBERDPK_16rust_binder_main26rust_binder_unlocked_ioctl+0x10/0x10 [ 485.471381][ T9037] __se_sys_ioctl+0x135/0x1b0 [ 485.471405][ T9037] __x64_sys_ioctl+0x7f/0xa0 [ 485.471430][ T9037] x64_sys_call+0x1878/0x2ee0 [ 485.471464][ T9037] do_syscall_64+0x58/0xf0 [ 485.471492][ T9037] ? clear_bhb_loop+0x50/0xa0 [ 485.471518][ T9037] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 485.471541][ T9037] RIP: 0033:0x7f523198f6c9 [ 485.471561][ T9037] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 485.471581][ T9037] RSP: 002b:00007f52327c4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 485.471606][ T9037] RAX: ffffffffffffffda RBX: 00007f5231be5fa0 RCX: 00007f523198f6c9 [ 485.471624][ T9037] RDX: 0000200000000100 RSI: 00000000c0306201 RDI: 0000000000000005 [ 485.471640][ T9037] RBP: 00007f52327c4090 R08: 0000000000000000 R09: 0000000000000000 [ 485.471655][ T9037] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 485.471668][ T9037] R13: 00007f5231be6038 R14: 00007f5231be5fa0 R15: 00007fff64835488 [ 485.471688][ T9037] [ 489.392317][ T36] audit: type=1400 audit(1763150365.669:179): avc: denied { block_suspend } for pid=9303 comm="syz.1.4398" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 497.373183][ T330] bridge_slave_1: left allmulticast mode [ 497.394068][ T330] bridge_slave_1: left promiscuous mode [ 497.399881][ T330] bridge0: port 2(bridge_slave_1) entered disabled state [ 497.434283][ T330] bridge_slave_0: left allmulticast mode [ 497.450217][ T330] bridge_slave_0: left promiscuous mode [ 497.464122][ T330] bridge0: port 1(bridge_slave_0) entered disabled state [ 497.636064][ T330] veth1_macvtap: left promiscuous mode [ 497.651777][ T330] veth0_vlan: left promiscuous mode [ 497.836014][ T9819] bridge0: port 1(bridge_slave_0) entered blocking state [ 497.843183][ T9819] bridge0: port 1(bridge_slave_0) entered disabled state [ 497.884116][ T9819] bridge_slave_0: entered allmulticast mode [ 497.890647][ T9819] bridge_slave_0: entered promiscuous mode [ 497.924972][ T9819] bridge0: port 2(bridge_slave_1) entered blocking state [ 497.932064][ T9819] bridge0: port 2(bridge_slave_1) entered disabled state [ 497.964142][ T9819] bridge_slave_1: entered allmulticast mode [ 497.994559][ T9819] bridge_slave_1: entered promiscuous mode [ 498.177912][ T9819] bridge0: port 2(bridge_slave_1) entered blocking state [ 498.185039][ T9819] bridge0: port 2(bridge_slave_1) entered forwarding state [ 498.192359][ T9819] bridge0: port 1(bridge_slave_0) entered blocking state [ 498.199457][ T9819] bridge0: port 1(bridge_slave_0) entered forwarding state [ 498.285413][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 498.292794][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 498.326224][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 498.333367][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 498.344603][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 498.351713][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 498.397999][ T9819] veth0_vlan: entered promiscuous mode [ 498.418362][ T9819] veth1_macvtap: entered promiscuous mode [ 499.474980][ T9856] bridge0: port 1(bridge_slave_0) entered blocking state [ 499.482068][ T9856] bridge0: port 1(bridge_slave_0) entered disabled state [ 499.514126][ T9856] bridge_slave_0: entered allmulticast mode [ 499.520541][ T9856] bridge_slave_0: entered promiscuous mode [ 499.574101][ T9856] bridge0: port 2(bridge_slave_1) entered blocking state [ 499.581190][ T9856] bridge0: port 2(bridge_slave_1) entered disabled state [ 499.614090][ T9856] bridge_slave_1: entered allmulticast mode [ 499.620553][ T9856] bridge_slave_1: entered promiscuous mode [ 499.667054][ T330] bridge_slave_1: left allmulticast mode [ 499.672956][ T330] bridge_slave_1: left promiscuous mode [ 499.683184][ T330] bridge0: port 2(bridge_slave_1) entered disabled state [ 499.701989][ T330] bridge_slave_0: left allmulticast mode [ 499.707743][ T330] bridge_slave_0: left promiscuous mode [ 499.713406][ T330] bridge0: port 1(bridge_slave_0) entered disabled state [ 499.845933][ T330] veth1_macvtap: left promiscuous mode [ 499.861685][ T330] veth0_vlan: left promiscuous mode [ 500.086513][ T9856] bridge0: port 2(bridge_slave_1) entered blocking state [ 500.093604][ T9856] bridge0: port 2(bridge_slave_1) entered forwarding state [ 500.100961][ T9856] bridge0: port 1(bridge_slave_0) entered blocking state [ 500.108045][ T9856] bridge0: port 1(bridge_slave_0) entered forwarding state [ 500.176020][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 500.204862][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 500.252577][ T329] bridge0: port 1(bridge_slave_0) entered blocking state [ 500.259697][ T329] bridge0: port 1(bridge_slave_0) entered forwarding state [ 500.288356][ T329] bridge0: port 2(bridge_slave_1) entered blocking state [ 500.295478][ T329] bridge0: port 2(bridge_slave_1) entered forwarding state [ 500.375389][ T9856] veth0_vlan: entered promiscuous mode [ 500.402628][ T9856] veth1_macvtap: entered promiscuous mode [ 505.457535][ T13] bridge_slave_1: left allmulticast mode [ 505.483490][ T13] bridge_slave_1: left promiscuous mode [ 505.490208][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 505.508095][ T13] bridge_slave_0: left allmulticast mode [ 505.513801][ T13] bridge_slave_0: left promiscuous mode [ 505.529628][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 505.697383][ T13] veth1_macvtap: left promiscuous mode [ 505.703072][ T13] veth0_vlan: left promiscuous mode [ 505.844872][T10150] bridge0: port 1(bridge_slave_0) entered blocking state [ 505.862118][T10150] bridge0: port 1(bridge_slave_0) entered disabled state [ 505.874379][T10150] bridge_slave_0: entered allmulticast mode [ 505.884702][T10150] bridge_slave_0: entered promiscuous mode [ 505.901569][T10150] bridge0: port 2(bridge_slave_1) entered blocking state [ 505.914076][T10150] bridge0: port 2(bridge_slave_1) entered disabled state [ 505.934124][T10150] bridge_slave_1: entered allmulticast mode [ 505.940690][T10150] bridge_slave_1: entered promiscuous mode [ 506.112324][T10150] bridge0: port 2(bridge_slave_1) entered blocking state [ 506.119445][T10150] bridge0: port 2(bridge_slave_1) entered forwarding state [ 506.126808][T10150] bridge0: port 1(bridge_slave_0) entered blocking state [ 506.133965][T10150] bridge0: port 1(bridge_slave_0) entered forwarding state [ 506.171398][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 506.192590][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 506.219831][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 506.226947][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 506.265329][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 506.272420][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 506.342884][T10150] veth0_vlan: entered promiscuous mode [ 506.369467][T10150] veth1_macvtap: entered promiscuous mode [ 508.346455][ T36] audit: type=1400 audit(1763150384.629:180): avc: denied { bpf } for pid=10255 comm="syz.3.4848" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 509.307101][T10344] FAULT_INJECTION: forcing a failure. [ 509.307101][T10344] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 509.332092][T10344] CPU: 1 UID: 0 PID: 10344 Comm: syz.0.4891 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 509.332129][T10344] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 509.332144][T10344] Call Trace: [ 509.332152][T10344] [ 509.332161][T10344] __dump_stack+0x21/0x30 [ 509.332198][T10344] dump_stack_lvl+0x10c/0x190 [ 509.332228][T10344] ? __cfi_dump_stack_lvl+0x10/0x10 [ 509.332259][T10344] ? proc_fail_nth_write+0x17e/0x210 [ 509.332290][T10344] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 509.332321][T10344] dump_stack+0x19/0x20 [ 509.332350][T10344] should_fail_ex+0x3d9/0x530 [ 509.332374][T10344] should_fail+0xf/0x20 [ 509.332395][T10344] should_fail_usercopy+0x1e/0x30 [ 509.332420][T10344] _copy_from_user+0x22/0xb0 [ 509.332460][T10344] get_itimerspec64+0xa2/0x2f0 [ 509.332582][T10344] ? __cfi_get_itimerspec64+0x10/0x10 [ 509.332606][T10344] ? mutex_unlock+0x8b/0x240 [ 509.332626][T10344] ? __cfi_mutex_unlock+0x10/0x10 [ 509.332646][T10344] ? __fget_files+0x2c5/0x340 [ 509.332672][T10344] __x64_sys_timer_settime+0x143/0x240 [ 509.332749][T10344] ? __cfi___x64_sys_timer_settime+0x10/0x10 [ 509.332782][T10344] ? __kasan_check_read+0x15/0x20 [ 509.332818][T10344] x64_sys_call+0x1cd7/0x2ee0 [ 509.332850][T10344] do_syscall_64+0x58/0xf0 [ 509.332889][T10344] ? clear_bhb_loop+0x50/0xa0 [ 509.332914][T10344] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 509.332937][T10344] RIP: 0033:0x7f555038f6c9 [ 509.332956][T10344] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 509.332975][T10344] RSP: 002b:00007f555128e038 EFLAGS: 00000246 ORIG_RAX: 00000000000000df [ 509.332999][T10344] RAX: ffffffffffffffda RBX: 00007f55505e5fa0 RCX: 00007f555038f6c9 [ 509.333016][T10344] RDX: 0000200000000040 RSI: 0000000000000001 RDI: 0000000000000000 [ 509.333030][T10344] RBP: 00007f555128e090 R08: 0000000000000000 R09: 0000000000000000 [ 509.333045][T10344] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 509.333058][T10344] R13: 00007f55505e6038 R14: 00007f55505e5fa0 R15: 00007ffe51acf638 [ 509.333078][T10344] [ 513.176349][T10599] fuse: Bad value for 'fd' [ 513.268937][T10603] kvm_intel: set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 515.385313][T10700] FAULT_INJECTION: forcing a failure. [ 515.385313][T10700] name failslab, interval 1, probability 0, space 0, times 0 [ 515.414075][T10700] CPU: 1 UID: 0 PID: 10700 Comm: syz.0.5065 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 515.414114][T10700] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 515.414128][T10700] Call Trace: [ 515.414136][T10700] [ 515.414145][T10700] __dump_stack+0x21/0x30 [ 515.414180][T10700] dump_stack_lvl+0x10c/0x190 [ 515.414210][T10700] ? __cfi_dump_stack_lvl+0x10/0x10 [ 515.414239][T10700] ? __kasan_check_write+0x18/0x20 [ 515.414273][T10700] ? proc_fail_nth_write+0x17e/0x210 [ 515.414303][T10700] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 515.414332][T10700] dump_stack+0x19/0x20 [ 515.414361][T10700] should_fail_ex+0x3d9/0x530 [ 515.414391][T10700] should_failslab+0xac/0x100 [ 515.414416][T10700] kmem_cache_alloc_noprof+0x42/0x430 [ 515.414437][T10700] ? getname_flags+0xc6/0x710 [ 515.414461][T10700] getname_flags+0xc6/0x710 [ 515.414482][T10700] ? build_open_flags+0x487/0x600 [ 515.414517][T10700] getname+0x1b/0x30 [ 515.414538][T10700] do_sys_openat2+0xcb/0x1c0 [ 515.414566][T10700] ? fput+0x1a5/0x240 [ 515.414680][T10700] ? do_sys_open+0x100/0x100 [ 515.414708][T10700] ? ksys_write+0x1ef/0x250 [ 515.414729][T10700] ? __cfi_ksys_write+0x10/0x10 [ 515.414755][T10700] __x64_sys_openat+0x13a/0x170 [ 515.414786][T10700] x64_sys_call+0xe69/0x2ee0 [ 515.414819][T10700] do_syscall_64+0x58/0xf0 [ 515.414848][T10700] ? clear_bhb_loop+0x50/0xa0 [ 515.414873][T10700] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 515.414896][T10700] RIP: 0033:0x7f555038f6c9 [ 515.414916][T10700] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 515.414935][T10700] RSP: 002b:00007f555128e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 515.414961][T10700] RAX: ffffffffffffffda RBX: 00007f55505e5fa0 RCX: 00007f555038f6c9 [ 515.414978][T10700] RDX: 000000000000275a RSI: 0000000000000000 RDI: ffffffffffffff9c [ 515.414994][T10700] RBP: 00007f555128e090 R08: 0000000000000000 R09: 0000000000000000 [ 515.415009][T10700] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 515.415023][T10700] R13: 00007f55505e6038 R14: 00007f55505e5fa0 R15: 00007ffe51acf638 [ 515.415043][T10700] [ 517.565107][T10762] bridge0: port 1(bridge_slave_0) entered blocking state [ 517.582846][T10762] bridge0: port 1(bridge_slave_0) entered disabled state [ 517.603132][T10762] bridge_slave_0: entered allmulticast mode [ 517.644582][T10762] bridge_slave_0: entered promiscuous mode [ 517.651276][T10762] bridge0: port 2(bridge_slave_1) entered blocking state [ 517.684094][T10762] bridge0: port 2(bridge_slave_1) entered disabled state [ 517.691235][T10762] bridge_slave_1: entered allmulticast mode [ 517.724554][T10762] bridge_slave_1: entered promiscuous mode [ 517.784457][ T45] bridge_slave_1: left allmulticast mode [ 517.790166][ T45] bridge_slave_1: left promiscuous mode [ 517.796970][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 517.816660][ T45] bridge_slave_0: left allmulticast mode [ 517.822452][ T45] bridge_slave_0: left promiscuous mode [ 517.838330][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 517.960400][ T45] veth1_macvtap: left promiscuous mode [ 517.974156][ T45] veth0_vlan: left promiscuous mode [ 518.154889][T10762] bridge0: port 2(bridge_slave_1) entered blocking state [ 518.162015][T10762] bridge0: port 2(bridge_slave_1) entered forwarding state [ 518.169633][T10762] bridge0: port 1(bridge_slave_0) entered blocking state [ 518.176853][T10762] bridge0: port 1(bridge_slave_0) entered forwarding state [ 518.202265][ T330] bridge0: port 1(bridge_slave_0) entered disabled state [ 518.224144][ T330] bridge0: port 2(bridge_slave_1) entered disabled state [ 518.248432][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 518.255555][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 518.285913][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 518.293011][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 518.338641][T10762] veth0_vlan: entered promiscuous mode [ 518.363228][T10762] veth1_macvtap: entered promiscuous mode [ 534.558553][ T36] audit: type=1400 audit(1763150410.839:181): avc: denied { ioctl } for pid=11520 comm="syz.0.5457" path="socket:[72197]" dev="sockfs" ino=72197 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 536.154105][ T4285] usb 3-1: new full-speed USB device number 2 using dummy_hcd [ 536.305385][ T4285] usb 3-1: config 0 has an invalid interface number: 133 but max is 0 [ 536.326427][ T4285] usb 3-1: config 0 has no interface number 0 [ 536.332847][ T4285] usb 3-1: config 0 interface 133 altsetting 0 has an invalid descriptor for endpoint zero, skipping [ 536.353278][ T4285] usb 3-1: New USB device found, idVendor=06cd, idProduct=0121, bcdDevice=dd.3d [ 536.363356][ T4285] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 536.378407][ T4285] usb 3-1: Product: syz [ 536.382900][ T4285] usb 3-1: Manufacturer: syz [ 536.387939][ T4285] usb 3-1: SerialNumber: syz [ 536.394963][ T4285] usb 3-1: config 0 descriptor?? [ 536.620673][ T4285] usb 3-1: USB disconnect, device number 2 [ 538.284933][T11690] FAULT_INJECTION: forcing a failure. [ 538.284933][T11690] name failslab, interval 1, probability 0, space 0, times 0 [ 538.312801][T11690] CPU: 0 UID: 0 PID: 11690 Comm: syz.2.5536 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 538.312835][T11690] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 538.312849][T11690] Call Trace: [ 538.312857][T11690] [ 538.312866][T11690] __dump_stack+0x21/0x30 [ 538.312920][T11690] dump_stack_lvl+0x10c/0x190 [ 538.312949][T11690] ? __cfi_dump_stack_lvl+0x10/0x10 [ 538.312979][T11690] ? avc_has_perm+0x144/0x220 [ 538.313011][T11690] dump_stack+0x19/0x20 [ 538.313039][T11690] should_fail_ex+0x3d9/0x530 [ 538.313064][T11690] should_failslab+0xac/0x100 [ 538.313089][T11690] __kmalloc_cache_noprof+0x41/0x490 [ 538.313111][T11690] ? vhost_task_create+0x101/0x350 [ 538.313135][T11690] ? __cfi_kvm_nx_huge_page_recovery_worker+0x10/0x10 [ 538.313161][T11690] vhost_task_create+0x101/0x350 [ 538.313182][T11690] ? __cfi_kvm_nx_huge_page_recovery_worker_kill+0x10/0x10 [ 538.313208][T11690] ? __cfi_vhost_task_create+0x10/0x10 [ 538.313251][T11690] ? __cfi_vhost_task_fn+0x10/0x10 [ 538.313272][T11690] ? __kasan_check_write+0x18/0x20 [ 538.313304][T11690] ? mutex_lock+0x92/0x1c0 [ 538.313324][T11690] ? __cfi_mutex_lock+0x10/0x10 [ 538.313343][T11690] ? kernel_text_address+0xa9/0xe0 [ 538.313370][T11690] kvm_mmu_post_init_vm+0x156/0x2d0 [ 538.313401][T11690] kvm_arch_vcpu_ioctl_run+0xd7/0x1aa0 [ 538.313429][T11690] ? _parse_integer_limit+0x195/0x1e0 [ 538.313462][T11690] ? __cfi_kvm_arch_vcpu_ioctl_run+0x10/0x10 [ 538.313490][T11690] ? kstrtoull+0x13b/0x1e0 [ 538.313509][T11690] ? kstrtouint+0x78/0xf0 [ 538.313527][T11690] ? ioctl_has_perm+0x1aa/0x4d0 [ 538.313552][T11690] ? __asan_memcpy+0x5a/0x80 [ 538.313571][T11690] ? ioctl_has_perm+0x3e0/0x4d0 [ 538.313595][T11690] ? has_cap_mac_admin+0xd0/0xd0 [ 538.313620][T11690] ? __kasan_check_write+0x18/0x20 [ 538.313651][T11690] ? mutex_lock_killable+0x92/0x1c0 [ 538.313671][T11690] ? __cfi_mutex_lock_killable+0x10/0x10 [ 538.313692][T11690] ? proc_fail_nth_write+0x17e/0x210 [ 538.313722][T11690] kvm_vcpu_ioctl+0x96f/0xee0 [ 538.313743][T11690] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 538.313763][T11690] ? __cfi_vfs_write+0x10/0x10 [ 538.313782][T11690] ? __kasan_check_write+0x18/0x20 [ 538.313812][T11690] ? mutex_unlock+0x8b/0x240 [ 538.313831][T11690] ? __cfi_mutex_unlock+0x10/0x10 [ 538.313850][T11690] ? __fget_files+0x2c5/0x340 [ 538.313873][T11690] ? __fget_files+0x2c5/0x340 [ 538.313896][T11690] ? bpf_lsm_file_ioctl+0xd/0x20 [ 538.313926][T11690] ? security_file_ioctl+0x34/0xd0 [ 538.313950][T11690] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 538.313968][T11690] __se_sys_ioctl+0x135/0x1b0 [ 538.313999][T11690] __x64_sys_ioctl+0x7f/0xa0 [ 538.314021][T11690] x64_sys_call+0x1878/0x2ee0 [ 538.314071][T11690] do_syscall_64+0x58/0xf0 [ 538.314098][T11690] ? clear_bhb_loop+0x50/0xa0 [ 538.314121][T11690] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 538.314143][T11690] RIP: 0033:0x7fcb3d98f6c9 [ 538.314161][T11690] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 538.314180][T11690] RSP: 002b:00007fcb3e772038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 538.314204][T11690] RAX: ffffffffffffffda RBX: 00007fcb3dbe5fa0 RCX: 00007fcb3d98f6c9 [ 538.314221][T11690] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000008 [ 538.314235][T11690] RBP: 00007fcb3e772090 R08: 0000000000000000 R09: 0000000000000000 [ 538.314265][T11690] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 538.314279][T11690] R13: 00007fcb3dbe6038 R14: 00007fcb3dbe5fa0 R15: 00007fffc06e6be8 [ 538.314298][T11690] [ 539.025364][T11726] FAULT_INJECTION: forcing a failure. [ 539.025364][T11726] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 539.059040][T11726] CPU: 1 UID: 0 PID: 11726 Comm: syz.0.5553 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 539.059075][T11726] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 539.059089][T11726] Call Trace: [ 539.059096][T11726] [ 539.059103][T11726] __dump_stack+0x21/0x30 [ 539.059138][T11726] dump_stack_lvl+0x10c/0x190 [ 539.059165][T11726] ? __cfi_dump_stack_lvl+0x10/0x10 [ 539.059201][T11726] ? selinux_file_ioctl+0x6e0/0x1360 [ 539.059227][T11726] dump_stack+0x19/0x20 [ 539.059253][T11726] should_fail_ex+0x3d9/0x530 [ 539.059275][T11726] should_fail+0xf/0x20 [ 539.059294][T11726] should_fail_usercopy+0x1e/0x30 [ 539.059316][T11726] _copy_from_user+0x22/0xb0 [ 539.059342][T11726] vhost_vsock_dev_ioctl+0x188/0xdb0 [ 539.059481][T11726] ? __cfi_vhost_vsock_dev_ioctl+0x10/0x10 [ 539.059508][T11726] ? __fget_files+0x2c5/0x340 [ 539.059531][T11726] ? bpf_lsm_file_ioctl+0xd/0x20 [ 539.059560][T11726] ? security_file_ioctl+0x34/0xd0 [ 539.059582][T11726] ? __cfi_vhost_vsock_dev_ioctl+0x10/0x10 [ 539.059609][T11726] __se_sys_ioctl+0x135/0x1b0 [ 539.059632][T11726] __x64_sys_ioctl+0x7f/0xa0 [ 539.059654][T11726] x64_sys_call+0x1878/0x2ee0 [ 539.059685][T11726] do_syscall_64+0x58/0xf0 [ 539.059711][T11726] ? clear_bhb_loop+0x50/0xa0 [ 539.059735][T11726] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 539.059757][T11726] RIP: 0033:0x7f555038f6c9 [ 539.059774][T11726] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 539.059792][T11726] RSP: 002b:00007f555128e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 539.059814][T11726] RAX: ffffffffffffffda RBX: 00007f55505e5fa0 RCX: 00007f555038f6c9 [ 539.059830][T11726] RDX: 0000200000000040 RSI: 000000004008af60 RDI: 0000000000000007 [ 539.059844][T11726] RBP: 00007f555128e090 R08: 0000000000000000 R09: 0000000000000000 [ 539.059858][T11726] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 539.059870][T11726] R13: 00007f55505e6038 R14: 00007f55505e5fa0 R15: 00007ffe51acf638 [ 539.059888][T11726] [ 539.643848][ T36] audit: type=1400 audit(1763150415.919:182): avc: denied { setopt } for pid=11744 comm="syz.0.5564" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 539.684218][ T36] audit: type=1400 audit(1763150415.959:183): avc: denied { shutdown } for pid=11744 comm="syz.0.5564" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 539.724170][ T36] audit: type=1400 audit(1763150415.959:184): avc: denied { create } for pid=11744 comm="syz.0.5564" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 539.758847][ T36] audit: type=1400 audit(1763150415.959:185): avc: denied { setopt } for pid=11744 comm="syz.0.5564" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 539.793561][ T36] audit: type=1400 audit(1763150415.959:186): avc: denied { read } for pid=11744 comm="syz.0.5564" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 539.830056][ T36] audit: type=1400 audit(1763150415.969:187): avc: denied { ioctl } for pid=11749 comm="syz.2.5565" path="socket:[73939]" dev="sockfs" ino=73939 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 541.040413][T11832] FAULT_INJECTION: forcing a failure. [ 541.040413][T11832] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 541.058976][T11832] CPU: 1 UID: 0 PID: 11832 Comm: syz.2.5593 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 541.059015][T11832] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 541.059030][T11832] Call Trace: [ 541.059038][T11832] [ 541.059047][T11832] __dump_stack+0x21/0x30 [ 541.059084][T11832] dump_stack_lvl+0x10c/0x190 [ 541.059113][T11832] ? __cfi_dump_stack_lvl+0x10/0x10 [ 541.059143][T11832] ? kernel_text_address+0xa9/0xe0 [ 541.059175][T11832] dump_stack+0x19/0x20 [ 541.059204][T11832] should_fail_ex+0x3d9/0x530 [ 541.059229][T11832] should_fail+0xf/0x20 [ 541.059249][T11832] should_fail_usercopy+0x1e/0x30 [ 541.059274][T11832] _copy_from_user+0x22/0xb0 [ 541.059304][T11832] ___sys_sendmsg+0x159/0x2a0 [ 541.059474][T11832] ? __sys_sendmsg+0x280/0x280 [ 541.059508][T11832] ? kstrtouint+0x78/0xf0 [ 541.059536][T11832] __sys_sendmmsg+0x271/0x470 [ 541.059570][T11832] ? __cfi___sys_sendmmsg+0x10/0x10 [ 541.059608][T11832] ? __cfi_ksys_write+0x10/0x10 [ 541.059631][T11832] __x64_sys_sendmmsg+0xa4/0xc0 [ 541.059664][T11832] x64_sys_call+0xfec/0x2ee0 [ 541.059696][T11832] do_syscall_64+0x58/0xf0 [ 541.059725][T11832] ? clear_bhb_loop+0x50/0xa0 [ 541.059749][T11832] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 541.059772][T11832] RIP: 0033:0x7fcb3d98f6c9 [ 541.059799][T11832] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 541.059818][T11832] RSP: 002b:00007fcb3e772038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 541.059843][T11832] RAX: ffffffffffffffda RBX: 00007fcb3dbe5fa0 RCX: 00007fcb3d98f6c9 [ 541.059858][T11832] RDX: 0000000000000001 RSI: 0000200000004c40 RDI: 0000000000000007 [ 541.059873][T11832] RBP: 00007fcb3e772090 R08: 0000000000000000 R09: 0000000000000000 [ 541.059887][T11832] R10: 0000000000004004 R11: 0000000000000246 R12: 0000000000000001 [ 541.059903][T11832] R13: 00007fcb3dbe6038 R14: 00007fcb3dbe5fa0 R15: 00007fffc06e6be8 [ 541.059923][T11832] [ 541.604027][ T36] audit: type=1400 audit(1763150417.879:188): avc: denied { unlink } for pid=11856 comm="syz.3.5616" name="#1" dev="tmpfs" ino=729 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 541.674154][ T36] audit: type=1400 audit(1763150417.879:189): avc: denied { mount } for pid=11856 comm="syz.3.5616" name="/" dev="overlay" ino=724 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 541.717576][ T36] audit: type=1400 audit(1763150417.989:190): avc: denied { unmount } for pid=10762 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 542.623542][ T36] audit: type=1400 audit(1763150418.899:191): avc: denied { mounton } for pid=11908 comm="syz.3.5641" path="/syzcgroup/unified/syz3" dev="cgroup2" ino=57 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=dir permissive=1 [ 548.535149][ T36] audit: type=1400 audit(1763150424.819:192): avc: denied { name_bind } for pid=11956 comm="syz.2.5663" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 549.311352][T12044] FAULT_INJECTION: forcing a failure. [ 549.311352][T12044] name failslab, interval 1, probability 0, space 0, times 0 [ 549.326677][T12044] CPU: 1 UID: 0 PID: 12044 Comm: syz.1.5705 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 549.326712][T12044] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 549.326727][T12044] Call Trace: [ 549.326734][T12044] [ 549.326743][T12044] __dump_stack+0x21/0x30 [ 549.326779][T12044] dump_stack_lvl+0x10c/0x190 [ 549.326810][T12044] ? __cfi_dump_stack_lvl+0x10/0x10 [ 549.326840][T12044] ? avc_has_extended_perms+0x921/0xdd0 [ 549.326874][T12044] dump_stack+0x19/0x20 [ 549.326902][T12044] should_fail_ex+0x3d9/0x530 [ 549.326926][T12044] should_failslab+0xac/0x100 [ 549.326953][T12044] __kmalloc_cache_node_noprof+0x46/0x450 [ 549.326978][T12044] ? __get_vm_area_node+0x154/0x3a0 [ 549.327095][T12044] __get_vm_area_node+0x154/0x3a0 [ 549.327126][T12044] __vmalloc_node_range_noprof+0x33c/0x1420 [ 549.327158][T12044] ? kvm_dev_ioctl+0x125/0x14d0 [ 549.327190][T12044] ? number+0xd21/0xf80 [ 549.327219][T12044] ? pointer+0xdd0/0xdd0 [ 549.327254][T12044] ? __cfi___vmalloc_node_range_noprof+0x10/0x10 [ 549.327287][T12044] ? vsnprintf+0x19b8/0x1aa0 [ 549.327316][T12044] ? kvm_dev_ioctl+0x125/0x14d0 [ 549.327348][T12044] __vmalloc_noprof+0xfe/0x1d0 [ 549.327378][T12044] ? kvm_dev_ioctl+0x125/0x14d0 [ 549.327409][T12044] ? alloc_fd+0x4e7/0x5a0 [ 549.327432][T12044] ? __cfi___vmalloc_noprof+0x10/0x10 [ 549.327465][T12044] kvm_dev_ioctl+0x125/0x14d0 [ 549.327498][T12044] ? __fget_files+0x2c5/0x340 [ 549.327521][T12044] ? __cfi_kvm_dev_ioctl+0x10/0x10 [ 549.327553][T12044] ? bpf_lsm_file_ioctl+0xd/0x20 [ 549.327583][T12044] ? security_file_ioctl+0x34/0xd0 [ 549.327608][T12044] ? __cfi_kvm_dev_ioctl+0x10/0x10 [ 549.327639][T12044] __se_sys_ioctl+0x135/0x1b0 [ 549.327667][T12044] __x64_sys_ioctl+0x7f/0xa0 [ 549.327697][T12044] x64_sys_call+0x1878/0x2ee0 [ 549.327734][T12044] do_syscall_64+0x58/0xf0 [ 549.327767][T12044] ? clear_bhb_loop+0x50/0xa0 [ 549.327797][T12044] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 549.327822][T12044] RIP: 0033:0x7f572d58f6c9 [ 549.327841][T12044] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 549.327860][T12044] RSP: 002b:00007f572e486038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 549.327884][T12044] RAX: ffffffffffffffda RBX: 00007f572d7e5fa0 RCX: 00007f572d58f6c9 [ 549.327901][T12044] RDX: 0000000000000000 RSI: 000000000000ae01 RDI: 0000000000000008 [ 549.327915][T12044] RBP: 00007f572e486090 R08: 0000000000000000 R09: 0000000000000000 [ 549.327929][T12044] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 549.327942][T12044] R13: 00007f572d7e6038 R14: 00007f572d7e5fa0 R15: 00007ffef67b2b38 [ 549.327961][T12044] [ 549.328467][T12044] syz.1.5705: vmalloc error: size 39304, vm_struct allocation failed, mode:0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null),cpuset=syz1,mems_allowed=0 [ 549.612656][T12044] CPU: 1 UID: 0 PID: 12044 Comm: syz.1.5705 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 549.612688][T12044] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 549.612702][T12044] Call Trace: [ 549.612708][T12044] [ 549.612716][T12044] __dump_stack+0x21/0x30 [ 549.612750][T12044] dump_stack_lvl+0x10c/0x190 [ 549.612780][T12044] ? __cfi_dump_stack_lvl+0x10/0x10 [ 549.612811][T12044] ? _raw_spin_unlock_irqrestore+0x4a/0x70 [ 549.612844][T12044] dump_stack+0x19/0x20 [ 549.612872][T12044] warn_alloc+0x1bc/0x2a0 [ 549.612987][T12044] ? __kasan_kmalloc+0x28/0xb0 [ 549.613013][T12044] ? __cfi_warn_alloc+0x10/0x10 [ 549.613043][T12044] ? __get_vm_area_node+0x392/0x3a0 [ 549.613074][T12044] __vmalloc_node_range_noprof+0x361/0x1420 [ 549.613106][T12044] ? number+0xd21/0xf80 [ 549.613133][T12044] ? pointer+0xdd0/0xdd0 [ 549.613160][T12044] ? __cfi___vmalloc_node_range_noprof+0x10/0x10 [ 549.613191][T12044] ? vsnprintf+0x19b8/0x1aa0 [ 549.613219][T12044] ? kvm_dev_ioctl+0x125/0x14d0 [ 549.613250][T12044] __vmalloc_noprof+0xfe/0x1d0 [ 549.613279][T12044] ? kvm_dev_ioctl+0x125/0x14d0 [ 549.613309][T12044] ? alloc_fd+0x4e7/0x5a0 [ 549.613331][T12044] ? __cfi___vmalloc_noprof+0x10/0x10 [ 549.613362][T12044] kvm_dev_ioctl+0x125/0x14d0 [ 549.613394][T12044] ? __fget_files+0x2c5/0x340 [ 549.613417][T12044] ? __cfi_kvm_dev_ioctl+0x10/0x10 [ 549.613448][T12044] ? bpf_lsm_file_ioctl+0xd/0x20 [ 549.613478][T12044] ? security_file_ioctl+0x34/0xd0 [ 549.613503][T12044] ? __cfi_kvm_dev_ioctl+0x10/0x10 [ 549.613533][T12044] __se_sys_ioctl+0x135/0x1b0 [ 549.613558][T12044] __x64_sys_ioctl+0x7f/0xa0 [ 549.613581][T12044] x64_sys_call+0x1878/0x2ee0 [ 549.613613][T12044] do_syscall_64+0x58/0xf0 [ 549.613641][T12044] ? clear_bhb_loop+0x50/0xa0 [ 549.613665][T12044] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 549.613689][T12044] RIP: 0033:0x7f572d58f6c9 [ 549.613707][T12044] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 549.613726][T12044] RSP: 002b:00007f572e486038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 549.613749][T12044] RAX: ffffffffffffffda RBX: 00007f572d7e5fa0 RCX: 00007f572d58f6c9 [ 549.613767][T12044] RDX: 0000000000000000 RSI: 000000000000ae01 RDI: 0000000000000008 [ 549.613780][T12044] RBP: 00007f572e486090 R08: 0000000000000000 R09: 0000000000000000 [ 549.613794][T12044] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 549.613808][T12044] R13: 00007f572d7e6038 R14: 00007f572d7e5fa0 R15: 00007ffef67b2b38 [ 549.613827][T12044] [ 549.613835][T12044] Mem-Info: [ 549.904024][T12044] active_anon:9374 inactive_anon:1 isolated_anon:0 [ 549.904024][T12044] active_file:22498 inactive_file:2329 isolated_file:0 [ 549.904024][T12044] unevictable:0 dirty:229 writeback:0 [ 549.904024][T12044] slab_reclaimable:8202 slab_unreclaimable:68920 [ 549.904024][T12044] mapped:24418 shmem:4868 pagetables:648 [ 549.904024][T12044] sec_pagetables:0 bounce:0 [ 549.904024][T12044] kernel_misc_reclaimable:0 [ 549.904024][T12044] free:1516904 free_pcp:11230 free_cma:0 [ 549.963822][T12070] FAULT_INJECTION: forcing a failure. [ 549.963822][T12070] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 549.977113][T12044] Node 0 active_anon:27696kB inactive_anon:4kB active_file:89992kB inactive_file:9316kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:97772kB dirty:916kB writeback:0kB shmem:9572kB shmem_thp:0kB shmem_pmdmapped:0kB anon_thp:0kB writeback_tmp:0kB kernel_stack:4900kB pagetables:2492kB sec_pagetables:0kB all_unreclaimable? no [ 550.009348][T12070] CPU: 0 UID: 0 PID: 12070 Comm: syz.0.5716 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 550.009379][T12070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 550.009393][T12070] Call Trace: [ 550.009401][T12070] [ 550.009409][T12070] __dump_stack+0x21/0x30 [ 550.009444][T12070] dump_stack_lvl+0x10c/0x190 [ 550.009474][T12070] ? __cfi_dump_stack_lvl+0x10/0x10 [ 550.009504][T12070] ? check_stack_object+0x12c/0x140 [ 550.009526][T12070] dump_stack+0x19/0x20 [ 550.009554][T12070] should_fail_ex+0x3d9/0x530 [ 550.009578][T12070] should_fail+0xf/0x20 [ 550.009598][T12070] should_fail_usercopy+0x1e/0x30 [ 550.009622][T12070] _copy_to_user+0x24/0xa0 [ 550.009650][T12070] simple_read_from_buffer+0xed/0x160 [ 550.009678][T12070] proc_fail_nth_read+0x19e/0x210 [ 550.009709][T12070] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 550.009738][T12070] ? bpf_lsm_file_permission+0xd/0x20 [ 550.009769][T12070] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 550.009799][T12070] vfs_read+0x27d/0xc70 [ 550.009819][T12070] ? __cfi_vfs_read+0x10/0x10 [ 550.009837][T12070] ? __kasan_check_write+0x18/0x20 [ 550.009870][T12070] ? mutex_lock+0x92/0x1c0 [ 550.009890][T12070] ? __cfi_mutex_lock+0x10/0x10 [ 550.009909][T12070] ? __fget_files+0x2c5/0x340 [ 550.009935][T12070] ksys_read+0x141/0x250 [ 550.009955][T12070] ? __cfi_ksys_read+0x10/0x10 [ 550.009974][T12070] ? fdget+0x189/0x1f0 [ 550.009998][T12070] ? __kasan_check_read+0x15/0x20 [ 550.010031][T12070] __x64_sys_read+0x7f/0x90 [ 550.010051][T12070] x64_sys_call+0x2638/0x2ee0 [ 550.010084][T12070] do_syscall_64+0x58/0xf0 [ 550.010111][T12070] ? clear_bhb_loop+0x50/0xa0 [ 550.010137][T12070] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 550.010160][T12070] RIP: 0033:0x7f555038e0dc [ 550.010178][T12070] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 550.010196][T12070] RSP: 002b:00007f555126d030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 550.010220][T12070] RAX: ffffffffffffffda RBX: 00007f55505e6090 RCX: 00007f555038e0dc [ 550.010252][T12070] RDX: 000000000000000f RSI: 00007f555126d0a0 RDI: 0000000000000009 [ 550.010267][T12070] RBP: 00007f555126d090 R08: 0000000000000000 R09: 0000000000000000 [ 550.010282][T12070] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 550.010296][T12070] R13: 00007f55505e6128 R14: 00007f55505e6090 R15: 00007ffe51acf638 [ 550.010316][T12070] [ 550.174076][T12044] DMA32 free:2960212kB boost:0kB min:19088kB low:23860kB high:28632kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2965936kB mlocked:0kB bounce:0kB free_pcp:5724kB local_pcp:0kB free_cma:0kB [ 550.298679][T12044] lowmem_reserve[]: 0 3921 3921 [ 550.303692][T12044] Normal free:3114260kB boost:0kB min:25964kB low:32452kB high:38940kB reserved_highatomic:0KB free_highatomic:0KB active_anon:61424kB inactive_anon:4kB active_file:89992kB inactive_file:9316kB unevictable:0kB writepending:924kB present:5242880kB managed:4016120kB mlocked:0kB bounce:0kB free_pcp:8520kB local_pcp:6776kB free_cma:0kB [ 550.337831][T12044] lowmem_reserve[]: 0 0 0 [ 550.344179][T12044] DMA32: 5*4kB (M) 4*8kB (M) 4*16kB (M) 5*32kB (M) 3*64kB (M) 3*128kB (M) 4*256kB (M) 4*512kB (M) 5*1024kB (UM) 5*2048kB (M) 718*4096kB (M) = 2960212kB [ 550.361643][T12044] Normal: 223*4kB (UE) 205*8kB (UE) 390*16kB (UME) 115*32kB (UE) 696*64kB (UME) 297*128kB (UME) 176*256kB (UME) 90*512kB (UME) 37*1024kB (UME) 20*2048kB (UME) 693*4096kB (M) = 3103524kB [ 550.380540][T12044] 37893 total pagecache pages [ 550.385413][T12044] 1 pages in swap cache [ 550.389588][T12044] Free swap = 124984kB [ 550.393756][T12044] Total swap = 124996kB [ 550.399940][T12044] 2097051 pages RAM [ 550.403780][T12044] 0 pages HighMem/MovableOnly [ 550.408628][T12044] 351537 pages reserved [ 550.412793][T12044] 0 pages cma reserved [ 550.426677][T12044] Memory allocations: [ 550.430698][T12044] 0 B 0 init/main.c:1370 func:do_initcalls [ 550.438553][T12044] 0 B 0 init/do_mounts.c:186 func:mount_root_generic [ 550.446920][T12044] 0 B 0 init/do_mounts.c:158 func:do_mount_root [ 550.454886][T12044] 0 B 0 init/do_mounts.c:352 func:mount_nodev_root [ 550.463002][T12044] 0 B 0 init/do_mounts_rd.c:241 func:rd_load_image [ 550.472251][T12044] 0 B 0 init/do_mounts_rd.c:72 func:identify_ramdisk_image [ 550.481321][T12044] 0 B 0 init/initramfs.c:507 func:unpack_to_rootfs [ 550.489826][T12044] 0 B 0 init/initramfs.c:508 func:unpack_to_rootfs [ 550.498157][T12044] 0 B 0 init/initramfs.c:509 func:unpack_to_rootfs [ 550.506421][T12044] 0 B 0 init/initramfs.c:101 func:find_link [ 550.644216][T12101] rust_binder: Transaction failed: BR_FAILED_REPLY { source: EINVAL } my_pid:512 [ 550.840444][ T36] audit: type=1400 audit(1763150427.119:193): avc: denied { sqpoll } for pid=12117 comm="syz.0.5739" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 550.904428][T12123] FAULT_INJECTION: forcing a failure. [ 550.904428][T12123] name failslab, interval 1, probability 0, space 0, times 0 [ 550.921439][T12123] CPU: 0 UID: 0 PID: 12123 Comm: syz.1.5740 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 550.921476][T12123] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 550.921489][T12123] Call Trace: [ 550.921496][T12123] [ 550.921504][T12123] __dump_stack+0x21/0x30 [ 550.921539][T12123] dump_stack_lvl+0x10c/0x190 [ 550.921568][T12123] ? __cfi_dump_stack_lvl+0x10/0x10 [ 550.921598][T12123] ? avc_has_perm+0x144/0x220 [ 550.921630][T12123] dump_stack+0x19/0x20 [ 550.921658][T12123] should_fail_ex+0x3d9/0x530 [ 550.921681][T12123] should_failslab+0xac/0x100 [ 550.921708][T12123] __kmalloc_cache_noprof+0x41/0x490 [ 550.921729][T12123] ? vhost_task_create+0x101/0x350 [ 550.921752][T12123] ? __cfi_kvm_nx_huge_page_recovery_worker+0x10/0x10 [ 550.921779][T12123] vhost_task_create+0x101/0x350 [ 550.921801][T12123] ? __cfi_kvm_nx_huge_page_recovery_worker_kill+0x10/0x10 [ 550.921857][T12123] ? __cfi_vhost_task_create+0x10/0x10 [ 550.921882][T12123] ? __cfi_vhost_task_fn+0x10/0x10 [ 550.921904][T12123] ? __kasan_check_write+0x18/0x20 [ 550.921938][T12123] ? mutex_lock+0x92/0x1c0 [ 550.921960][T12123] ? __cfi_mutex_lock+0x10/0x10 [ 550.921980][T12123] ? kernel_text_address+0xa9/0xe0 [ 550.922010][T12123] kvm_mmu_post_init_vm+0x156/0x2d0 [ 550.922043][T12123] kvm_arch_vcpu_ioctl_run+0xd7/0x1aa0 [ 550.922080][T12123] ? _parse_integer_limit+0x195/0x1e0 [ 550.922117][T12123] ? __cfi_kvm_arch_vcpu_ioctl_run+0x10/0x10 [ 550.922147][T12123] ? kstrtoull+0x13b/0x1e0 [ 550.922167][T12123] ? kstrtouint+0x78/0xf0 [ 550.922187][T12123] ? ioctl_has_perm+0x1aa/0x4d0 [ 550.922213][T12123] ? __asan_memcpy+0x5a/0x80 [ 550.922233][T12123] ? ioctl_has_perm+0x3e0/0x4d0 [ 550.922304][T12123] ? has_cap_mac_admin+0xd0/0xd0 [ 550.922330][T12123] ? __kasan_check_write+0x18/0x20 [ 550.922362][T12123] ? mutex_lock_killable+0x92/0x1c0 [ 550.922383][T12123] ? __cfi_mutex_lock_killable+0x10/0x10 [ 550.922405][T12123] ? proc_fail_nth_write+0x17e/0x210 [ 550.922442][T12123] kvm_vcpu_ioctl+0x96f/0xee0 [ 550.922463][T12123] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 550.922482][T12123] ? __cfi_vfs_write+0x10/0x10 [ 550.922503][T12123] ? __kasan_check_write+0x18/0x20 [ 550.922536][T12123] ? mutex_unlock+0x8b/0x240 [ 550.922557][T12123] ? __cfi_mutex_unlock+0x10/0x10 [ 550.922577][T12123] ? __fget_files+0x2c5/0x340 [ 550.922601][T12123] ? __fget_files+0x2c5/0x340 [ 550.922623][T12123] ? bpf_lsm_file_ioctl+0xd/0x20 [ 550.922653][T12123] ? security_file_ioctl+0x34/0xd0 [ 550.922678][T12123] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 550.922697][T12123] __se_sys_ioctl+0x135/0x1b0 [ 550.922721][T12123] __x64_sys_ioctl+0x7f/0xa0 [ 550.922742][T12123] x64_sys_call+0x1878/0x2ee0 [ 550.922773][T12123] do_syscall_64+0x58/0xf0 [ 550.922798][T12123] ? clear_bhb_loop+0x50/0xa0 [ 550.922821][T12123] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 550.922844][T12123] RIP: 0033:0x7f572d58f6c9 [ 550.922861][T12123] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 550.922881][T12123] RSP: 002b:00007f572e486038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 550.922904][T12123] RAX: ffffffffffffffda RBX: 00007f572d7e5fa0 RCX: 00007f572d58f6c9 [ 550.922921][T12123] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000009 [ 550.922934][T12123] RBP: 00007f572e486090 R08: 0000000000000000 R09: 0000000000000000 [ 550.922947][T12123] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 550.922961][T12123] R13: 00007f572d7e6038 R14: 00007f572d7e5fa0 R15: 00007ffef67b2b38 [ 550.922992][T12123] [ 551.825593][T12184] FAULT_INJECTION: forcing a failure. [ 551.825593][T12184] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 551.863197][T12184] CPU: 0 UID: 0 PID: 12184 Comm: syz.1.5769 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 551.863233][T12184] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 551.863246][T12184] Call Trace: [ 551.863253][T12184] [ 551.863262][T12184] __dump_stack+0x21/0x30 [ 551.863299][T12184] dump_stack_lvl+0x10c/0x190 [ 551.863329][T12184] ? __cfi_dump_stack_lvl+0x10/0x10 [ 551.863360][T12184] ? __kasan_check_read+0x15/0x20 [ 551.863395][T12184] dump_stack+0x19/0x20 [ 551.863423][T12184] should_fail_ex+0x3d9/0x530 [ 551.863446][T12184] should_fail+0xf/0x20 [ 551.863466][T12184] should_fail_usercopy+0x1e/0x30 [ 551.863490][T12184] __kvm_read_guest_page+0x177/0x210 [ 551.863512][T12184] kvm_vcpu_read_guest_page+0x31a/0x400 [ 551.863535][T12184] kvm_fetch_guest_virt+0x146/0x190 [ 551.863568][T12184] ? __cfi_kvm_fetch_guest_virt+0x10/0x10 [ 551.863600][T12184] __do_insn_fetch_bytes+0x321/0x730 [ 551.863624][T12184] ? x86_decode_insn+0x4fb0/0x4fb0 [ 551.863646][T12184] ? tdp_iter_restart+0x1c4/0x360 [ 551.863670][T12184] ? kvm_tdp_mmu_fast_pf_get_last_sptep+0x290/0x290 [ 551.863701][T12184] ? tdp_iter_next+0x362/0xa30 [ 551.863725][T12184] x86_decode_insn+0x33b/0x4fb0 [ 551.863745][T12184] ? trace_mark_mmio_spte+0x22/0x130 [ 551.863779][T12184] ? __cfi_x86_decode_insn+0x10/0x10 [ 551.863799][T12184] ? __kasan_check_write+0x18/0x20 [ 551.863832][T12184] ? vmx_read_guest_seg_ar+0x1c8/0x350 [ 551.863870][T12184] ? __asan_memset+0x39/0x50 [ 551.863889][T12184] ? init_decode_cache+0x7c/0x90 [ 551.863910][T12184] ? init_emulate_ctxt+0x410/0x540 [ 551.863935][T12184] ? kvm_inject_realmode_interrupt+0x2e0/0x2e0 [ 551.863962][T12184] ? kvm_mmu_do_page_fault+0x4b0/0x5f0 [ 551.863995][T12184] x86_decode_emulated_instruction+0x66/0x190 [ 551.864023][T12184] x86_emulate_instruction+0x2d3/0x1870 [ 551.864050][T12184] ? kvm_multiple_exception+0x6d8/0xad0 [ 551.864079][T12184] kvm_mmu_page_fault+0x336/0x970 [ 551.864106][T12184] handle_ept_violation+0x21c/0x440 [ 551.864128][T12184] ? vmx_vcpu_run+0x1100/0x2000 [ 551.864160][T12184] ? __cfi_handle_ept_violation+0x10/0x10 [ 551.864184][T12184] vmx_handle_exit+0x12c2/0x1b40 [ 551.864215][T12184] ? kvm_deliver_exception_payload+0xd7/0x200 [ 551.864245][T12184] ? __cfi_vmx_vcpu_run+0x10/0x10 [ 551.864278][T12184] ? vmx_handle_exit_irqoff+0xe9/0x7a0 [ 551.864311][T12184] vcpu_run+0x4bd0/0x7830 [ 551.864339][T12184] ? x64_sys_call+0xe69/0x2ee0 [ 551.864388][T12184] ? signal_pending+0xc0/0xc0 [ 551.864415][T12184] ? __kasan_check_write+0x18/0x20 [ 551.864449][T12184] ? xfd_validate_state+0x68/0x150 [ 551.864479][T12184] ? fpu_swap_kvm_fpstate+0x93/0x5f0 [ 551.864505][T12184] ? __kasan_check_write+0x18/0x20 [ 551.864538][T12184] ? fpregs_mark_activate+0x69/0x160 [ 551.864563][T12184] ? fpu_swap_kvm_fpstate+0x44d/0x5f0 [ 551.864589][T12184] ? fpu_swap_kvm_fpstate+0x93/0x5f0 [ 551.864615][T12184] kvm_arch_vcpu_ioctl_run+0x101a/0x1aa0 [ 551.864647][T12184] ? __cfi_kvm_arch_vcpu_ioctl_run+0x10/0x10 [ 551.864676][T12184] ? kstrtoull+0x13b/0x1e0 [ 551.864697][T12184] ? kstrtouint+0x78/0xf0 [ 551.864717][T12184] ? ioctl_has_perm+0x1aa/0x4d0 [ 551.864744][T12184] ? __asan_memcpy+0x5a/0x80 [ 551.864764][T12184] ? ioctl_has_perm+0x3e0/0x4d0 [ 551.864790][T12184] ? has_cap_mac_admin+0xd0/0xd0 [ 551.864817][T12184] ? __kasan_check_write+0x18/0x20 [ 551.864856][T12184] ? mutex_lock_killable+0x92/0x1c0 [ 551.864879][T12184] ? __cfi_mutex_lock_killable+0x10/0x10 [ 551.864901][T12184] ? proc_fail_nth_write+0x17e/0x210 [ 551.864932][T12184] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 551.864962][T12184] kvm_vcpu_ioctl+0x96f/0xee0 [ 551.864984][T12184] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 551.865005][T12184] ? __cfi_vfs_write+0x10/0x10 [ 551.865026][T12184] ? __kasan_check_write+0x18/0x20 [ 551.865059][T12184] ? mutex_unlock+0x8b/0x240 [ 551.865079][T12184] ? __cfi_mutex_unlock+0x10/0x10 [ 551.865099][T12184] ? __fget_files+0x2c5/0x340 [ 551.865125][T12184] ? __fget_files+0x2c5/0x340 [ 551.865150][T12184] ? bpf_lsm_file_ioctl+0xd/0x20 [ 551.865180][T12184] ? security_file_ioctl+0x34/0xd0 [ 551.865206][T12184] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 551.865226][T12184] __se_sys_ioctl+0x135/0x1b0 [ 551.865251][T12184] __x64_sys_ioctl+0x7f/0xa0 [ 551.865276][T12184] x64_sys_call+0x1878/0x2ee0 [ 551.865308][T12184] do_syscall_64+0x58/0xf0 [ 551.865337][T12184] ? clear_bhb_loop+0x50/0xa0 [ 551.865363][T12184] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 551.865386][T12184] RIP: 0033:0x7f572d58f6c9 [ 551.865406][T12184] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 551.865427][T12184] RSP: 002b:00007f572e486038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 551.865452][T12184] RAX: ffffffffffffffda RBX: 00007f572d7e5fa0 RCX: 00007f572d58f6c9 [ 551.865470][T12184] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000009 [ 551.865485][T12184] RBP: 00007f572e486090 R08: 0000000000000000 R09: 0000000000000000 [ 551.865500][T12184] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 551.865514][T12184] R13: 00007f572d7e6038 R14: 00007f572d7e5fa0 R15: 00007ffef67b2b38 [ 551.865535][T12184] [ 552.558753][ T36] audit: type=1400 audit(1763150428.839:194): avc: denied { ioctl } for pid=12198 comm="syz.3.5776" path="socket:[76511]" dev="sockfs" ino=76511 ioctlcmd=0x8916 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 552.709206][ T36] audit: type=1400 audit(1763150428.989:195): avc: denied { unmount } for pid=12206 comm="syz.0.5779" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 554.401061][ T36] audit: type=1400 audit(1763150430.679:196): avc: denied { getopt } for pid=12285 comm="syz.1.5816" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 555.257742][T12341] FAULT_INJECTION: forcing a failure. [ 555.257742][T12341] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 555.272421][T12341] CPU: 0 UID: 0 PID: 12341 Comm: syz.1.5841 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 555.272459][T12341] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 555.272475][T12341] Call Trace: [ 555.272482][T12341] [ 555.272491][T12341] __dump_stack+0x21/0x30 [ 555.272528][T12341] dump_stack_lvl+0x10c/0x190 [ 555.272568][T12341] ? __cfi_dump_stack_lvl+0x10/0x10 [ 555.272599][T12341] ? proc_fail_nth_write+0x17e/0x210 [ 555.272630][T12341] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 555.272661][T12341] dump_stack+0x19/0x20 [ 555.272691][T12341] should_fail_ex+0x3d9/0x530 [ 555.272715][T12341] should_fail+0xf/0x20 [ 555.272735][T12341] should_fail_usercopy+0x1e/0x30 [ 555.272760][T12341] _copy_from_user+0x22/0xb0 [ 555.272788][T12341] get_itimerspec64+0xa2/0x2f0 [ 555.272814][T12341] ? __cfi_get_itimerspec64+0x10/0x10 [ 555.272838][T12341] ? mutex_unlock+0x8b/0x240 [ 555.272860][T12341] ? __cfi_mutex_unlock+0x10/0x10 [ 555.272881][T12341] ? __fget_files+0x2c5/0x340 [ 555.272907][T12341] __x64_sys_timer_settime+0x143/0x240 [ 555.272940][T12341] ? __cfi___x64_sys_timer_settime+0x10/0x10 [ 555.272974][T12341] ? __kasan_check_read+0x15/0x20 [ 555.273009][T12341] x64_sys_call+0x1cd7/0x2ee0 [ 555.273042][T12341] do_syscall_64+0x58/0xf0 [ 555.273071][T12341] ? clear_bhb_loop+0x50/0xa0 [ 555.273097][T12341] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 555.273121][T12341] RIP: 0033:0x7f572d58f6c9 [ 555.273140][T12341] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 555.273161][T12341] RSP: 002b:00007f572e486038 EFLAGS: 00000246 ORIG_RAX: 00000000000000df [ 555.273186][T12341] RAX: ffffffffffffffda RBX: 00007f572d7e5fa0 RCX: 00007f572d58f6c9 [ 555.273204][T12341] RDX: 0000200000000040 RSI: 0000000000000001 RDI: 0000000000000000 [ 555.273219][T12341] RBP: 00007f572e486090 R08: 0000000000000000 R09: 0000000000000000 [ 555.273234][T12341] R10: 0000200000000100 R11: 0000000000000246 R12: 0000000000000001 [ 555.273248][T12341] R13: 00007f572d7e6038 R14: 00007f572d7e5fa0 R15: 00007ffef67b2b38 [ 555.273268][T12341] [ 555.637777][T12351] FAULT_INJECTION: forcing a failure. [ 555.637777][T12351] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 555.676808][T12351] CPU: 1 UID: 0 PID: 12351 Comm: syz.0.5847 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 555.676849][T12351] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 555.676863][T12351] Call Trace: [ 555.676871][T12351] [ 555.676880][T12351] __dump_stack+0x21/0x30 [ 555.676918][T12351] dump_stack_lvl+0x10c/0x190 [ 555.676948][T12351] ? __cfi_dump_stack_lvl+0x10/0x10 [ 555.676980][T12351] ? check_stack_object+0x107/0x140 [ 555.677003][T12351] dump_stack+0x19/0x20 [ 555.677031][T12351] should_fail_ex+0x3d9/0x530 [ 555.677055][T12351] should_fail+0xf/0x20 [ 555.677076][T12351] should_fail_usercopy+0x1e/0x30 [ 555.677101][T12351] _copy_from_user+0x22/0xb0 [ 555.677129][T12351] __sys_connect+0x136/0x440 [ 555.677160][T12351] ? __cfi___sys_connect+0x10/0x10 [ 555.677192][T12351] ? __kasan_check_read+0x15/0x20 [ 555.677226][T12351] __x64_sys_connect+0x7e/0x90 [ 555.677256][T12351] x64_sys_call+0x1c2f/0x2ee0 [ 555.677289][T12351] do_syscall_64+0x58/0xf0 [ 555.677318][T12351] ? clear_bhb_loop+0x50/0xa0 [ 555.677344][T12351] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 555.677369][T12351] RIP: 0033:0x7f555038f6c9 [ 555.677387][T12351] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 555.677455][T12351] RSP: 002b:00007f555128e038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 555.677480][T12351] RAX: ffffffffffffffda RBX: 00007f55505e5fa0 RCX: 00007f555038f6c9 [ 555.677498][T12351] RDX: 0000000000000010 RSI: 0000200000000280 RDI: 0000000000000006 [ 555.677513][T12351] RBP: 00007f555128e090 R08: 0000000000000000 R09: 0000000000000000 [ 555.677528][T12351] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 555.677543][T12351] R13: 00007f55505e6038 R14: 00007f55505e5fa0 R15: 00007ffe51acf638 [ 555.677563][T12351] [ 557.148857][ T36] audit: type=1400 audit(1763150433.429:197): avc: denied { connect } for pid=12422 comm="syz.0.5872" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 558.002354][T12450] netlink: 'syz.0.5894': attribute type 29 has an invalid length. [ 558.458311][T12478] rust_binder: BC_REQUEST_DEATH_NOTIFICATION invalid ref 3 [ 558.515344][T12480] FAULT_INJECTION: forcing a failure. [ 558.515344][T12480] name failslab, interval 1, probability 0, space 0, times 0 [ 558.544021][T12480] CPU: 1 UID: 0 PID: 12480 Comm: syz.0.5907 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 558.544060][T12480] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 558.544074][T12480] Call Trace: [ 558.544080][T12480] [ 558.544090][T12480] __dump_stack+0x21/0x30 [ 558.544126][T12480] dump_stack_lvl+0x10c/0x190 [ 558.544156][T12480] ? __cfi_dump_stack_lvl+0x10/0x10 [ 558.544189][T12480] dump_stack+0x19/0x20 [ 558.544218][T12480] should_fail_ex+0x3d9/0x530 [ 558.544242][T12480] should_failslab+0xac/0x100 [ 558.544269][T12480] __kmalloc_node_track_caller_noprof+0x68/0x520 [ 558.544294][T12480] ? rust_helper_krealloc+0x33/0xd0 [ 558.544331][T12480] krealloc_noprof+0x8d/0x130 [ 558.544354][T12480] rust_helper_krealloc+0x33/0xd0 [ 558.544387][T12480] ? _RNvMNtNtCs43vyB533jt3_6kernel5alloc9allocatorNtB2_11ReallocFunc4call+0x70/0xc0 [ 558.544432][T12480] _RNvMNtNtCs43vyB533jt3_6kernel5alloc9allocatorNtB2_11ReallocFunc4call+0x8e/0xc0 [ 558.544463][T12480] _RNvMs4_NtCs5gLWsBERDPK_16rust_binder_main7processNtB5_7Process18get_current_thread+0x45a/0x1400 [ 558.544496][T12480] ? inode_init_always_gfp+0x756/0x9e0 [ 558.544522][T12480] ? alloc_inode+0xc5/0x270 [ 558.544546][T12480] ? proc_pident_instantiate+0x6d/0x2c0 [ 558.544572][T12480] ? proc_pident_lookup+0x1c7/0x270 [ 558.544597][T12480] ? path_openat+0x1301/0x34b0 [ 558.544624][T12480] ? do_sys_openat2+0x12c/0x1c0 [ 558.544659][T12480] ? __x64_sys_openat+0x13a/0x170 [ 558.544688][T12480] ? x64_sys_call+0xe69/0x2ee0 [ 558.544720][T12480] ? do_syscall_64+0x58/0xf0 [ 558.544749][T12480] ? entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 558.544776][T12480] ? __cfi__RNvMs4_NtCs5gLWsBERDPK_16rust_binder_main7processNtB5_7Process18get_current_thread+0x10/0x10 [ 558.544808][T12480] ? avc_has_perm_noaudit+0x268/0x360 [ 558.544838][T12480] ? __asan_memcpy+0x5a/0x80 [ 558.544857][T12480] ? avc_has_perm_noaudit+0x286/0x360 [ 558.544888][T12480] ? avc_has_perm+0x144/0x220 [ 558.544917][T12480] ? __cfi_avc_has_perm+0x10/0x10 [ 558.544946][T12480] ? kasan_save_alloc_info+0x40/0x50 [ 558.544978][T12480] ? selinux_file_open+0x457/0x610 [ 558.545004][T12480] _RNvMs6_NtCs5gLWsBERDPK_16rust_binder_main7processNtB5_7Process5ioctl+0x1a7/0x2cf0 [ 558.545036][T12480] ? avc_has_extended_perms+0x7c7/0xdd0 [ 558.545066][T12480] ? __asan_memcpy+0x5a/0x80 [ 558.545086][T12480] ? avc_has_extended_perms+0x921/0xdd0 [ 558.545115][T12480] ? __cfi__RNvMs6_NtCs5gLWsBERDPK_16rust_binder_main7processNtB5_7Process5ioctl+0x10/0x10 [ 558.545145][T12480] ? do_vfs_ioctl+0xeda/0x1e30 [ 558.545169][T12480] ? arch_stack_walk+0x10b/0x170 [ 558.545189][T12480] ? __ia32_compat_sys_ioctl+0x850/0x850 [ 558.545215][T12480] ? _parse_integer+0x2e/0x40 [ 558.545251][T12480] ? ioctl_has_perm+0x384/0x4d0 [ 558.545276][T12480] ? has_cap_mac_admin+0xd0/0xd0 [ 558.545302][T12480] ? proc_fail_nth_write+0x17e/0x210 [ 558.545331][T12480] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 558.545362][T12480] ? selinux_file_ioctl+0x6e0/0x1360 [ 558.545388][T12480] ? vfs_write+0x93e/0xf30 [ 558.545417][T12480] ? __cfi_selinux_file_ioctl+0x10/0x10 [ 558.545444][T12480] ? __cfi_vfs_write+0x10/0x10 [ 558.545464][T12480] ? __kasan_check_write+0x18/0x20 [ 558.545497][T12480] ? mutex_unlock+0x8b/0x240 [ 558.545518][T12480] ? __cfi_mutex_unlock+0x10/0x10 [ 558.545538][T12480] ? __fget_files+0x2c5/0x340 [ 558.545564][T12480] ? __fget_files+0x2c5/0x340 [ 558.545589][T12480] _RNvCs5gLWsBERDPK_16rust_binder_main26rust_binder_unlocked_ioctl+0xa0/0x100 [ 558.545624][T12480] ? __se_sys_ioctl+0x114/0x1b0 [ 558.545648][T12480] ? __cfi__RNvCs5gLWsBERDPK_16rust_binder_main26rust_binder_unlocked_ioctl+0x10/0x10 [ 558.545682][T12480] __se_sys_ioctl+0x135/0x1b0 [ 558.545706][T12480] __x64_sys_ioctl+0x7f/0xa0 [ 558.545730][T12480] x64_sys_call+0x1878/0x2ee0 [ 558.545764][T12480] do_syscall_64+0x58/0xf0 [ 558.545792][T12480] ? clear_bhb_loop+0x50/0xa0 [ 558.545817][T12480] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 558.545840][T12480] RIP: 0033:0x7f555038f6c9 [ 558.545859][T12480] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 558.545879][T12480] RSP: 002b:00007f555128e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 558.545905][T12480] RAX: ffffffffffffffda RBX: 00007f55505e5fa0 RCX: 00007f555038f6c9 [ 558.545923][T12480] RDX: 0000200000000100 RSI: 00000000c0306201 RDI: 0000000000000007 [ 558.545938][T12480] RBP: 00007f555128e090 R08: 0000000000000000 R09: 0000000000000000 [ 558.545952][T12480] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 558.545965][T12480] R13: 00007f55505e6038 R14: 00007f55505e5fa0 R15: 00007ffe51acf638 [ 558.545983][T12480] [ 559.034323][T12482] rust_binder: BC_REQUEST_DEATH_NOTIFICATION invalid ref 3 [ 560.112818][T12541] FAULT_INJECTION: forcing a failure. [ 560.112818][T12541] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 560.144056][T12541] CPU: 0 UID: 0 PID: 12541 Comm: syz.2.5937 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 560.144096][T12541] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 560.144111][T12541] Call Trace: [ 560.144119][T12541] [ 560.144129][T12541] __dump_stack+0x21/0x30 [ 560.144165][T12541] dump_stack_lvl+0x10c/0x190 [ 560.144195][T12541] ? __cfi_dump_stack_lvl+0x10/0x10 [ 560.144226][T12541] ? __kasan_check_read+0x15/0x20 [ 560.144261][T12541] dump_stack+0x19/0x20 [ 560.144290][T12541] should_fail_ex+0x3d9/0x530 [ 560.144314][T12541] should_fail+0xf/0x20 [ 560.144335][T12541] should_fail_usercopy+0x1e/0x30 [ 560.144360][T12541] __kvm_read_guest_page+0x177/0x210 [ 560.144383][T12541] kvm_vcpu_read_guest_page+0x31a/0x400 [ 560.144409][T12541] kvm_fetch_guest_virt+0x146/0x190 [ 560.144444][T12541] ? __cfi_kvm_fetch_guest_virt+0x10/0x10 [ 560.144476][T12541] __do_insn_fetch_bytes+0x321/0x730 [ 560.144501][T12541] ? x86_decode_insn+0x4fb0/0x4fb0 [ 560.144522][T12541] ? emulator_read_write+0x410/0x580 [ 560.144546][T12541] ? tdp_iter_restart+0x1c4/0x360 [ 560.144571][T12541] ? kvm_tdp_mmu_fast_pf_get_last_sptep+0x290/0x290 [ 560.144602][T12541] ? tdp_iter_next+0x362/0xa30 [ 560.144626][T12541] x86_decode_insn+0x33b/0x4fb0 [ 560.144647][T12541] ? trace_mark_mmio_spte+0x22/0x130 [ 560.144682][T12541] ? __cfi_x86_decode_insn+0x10/0x10 [ 560.144703][T12541] ? __kasan_check_write+0x18/0x20 [ 560.144736][T12541] ? vmx_read_guest_seg_ar+0x1c8/0x350 [ 560.144764][T12541] ? __asan_memset+0x39/0x50 [ 560.144783][T12541] ? init_decode_cache+0x7c/0x90 [ 560.144804][T12541] ? init_emulate_ctxt+0x410/0x540 [ 560.144829][T12541] ? kvm_inject_realmode_interrupt+0x2e0/0x2e0 [ 560.144855][T12541] ? kvm_mmu_do_page_fault+0x4b0/0x5f0 [ 560.144889][T12541] x86_decode_emulated_instruction+0x66/0x190 [ 560.144916][T12541] x86_emulate_instruction+0x2d3/0x1870 [ 560.144943][T12541] ? kvm_multiple_exception+0x6d8/0xad0 [ 560.144972][T12541] kvm_mmu_page_fault+0x336/0x970 [ 560.144999][T12541] handle_ept_violation+0x21c/0x440 [ 560.145034][T12541] ? vmx_vcpu_run+0x1100/0x2000 [ 560.145066][T12541] ? __cfi_handle_ept_violation+0x10/0x10 [ 560.145091][T12541] vmx_handle_exit+0x12c2/0x1b40 [ 560.145122][T12541] ? kvm_deliver_exception_payload+0xd7/0x200 [ 560.145151][T12541] ? __cfi_vmx_vcpu_run+0x10/0x10 [ 560.145183][T12541] ? vmx_handle_exit_irqoff+0xe9/0x7a0 [ 560.145217][T12541] vcpu_run+0x4bd0/0x7830 [ 560.145259][T12541] ? signal_pending+0xc0/0xc0 [ 560.145290][T12541] ? complete_emulated_mmio+0x4fb/0x790 [ 560.145317][T12541] kvm_arch_vcpu_ioctl_run+0x101a/0x1aa0 [ 560.145348][T12541] ? __cfi_kvm_arch_vcpu_ioctl_run+0x10/0x10 [ 560.145379][T12541] ? kstrtoull+0x13b/0x1e0 [ 560.145400][T12541] ? kstrtouint+0x78/0xf0 [ 560.145420][T12541] ? ioctl_has_perm+0x1aa/0x4d0 [ 560.145446][T12541] ? __asan_memcpy+0x5a/0x80 [ 560.145467][T12541] ? ioctl_has_perm+0x3e0/0x4d0 [ 560.145494][T12541] ? has_cap_mac_admin+0xd0/0xd0 [ 560.145520][T12541] ? __kasan_check_write+0x18/0x20 [ 560.145554][T12541] ? mutex_lock_killable+0x92/0x1c0 [ 560.145583][T12541] ? __cfi_mutex_lock_killable+0x10/0x10 [ 560.145605][T12541] ? proc_fail_nth_write+0x17e/0x210 [ 560.145635][T12541] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 560.145671][T12541] kvm_vcpu_ioctl+0x96f/0xee0 [ 560.145691][T12541] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 560.145712][T12541] ? __cfi_vfs_write+0x10/0x10 [ 560.145733][T12541] ? __kasan_check_write+0x18/0x20 [ 560.145766][T12541] ? mutex_unlock+0x8b/0x240 [ 560.145786][T12541] ? __cfi_mutex_unlock+0x10/0x10 [ 560.145806][T12541] ? __fget_files+0x2c5/0x340 [ 560.145832][T12541] ? __fget_files+0x2c5/0x340 [ 560.145856][T12541] ? bpf_lsm_file_ioctl+0xd/0x20 [ 560.145886][T12541] ? security_file_ioctl+0x34/0xd0 [ 560.145911][T12541] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 560.145931][T12541] __se_sys_ioctl+0x135/0x1b0 [ 560.145956][T12541] __x64_sys_ioctl+0x7f/0xa0 [ 560.145979][T12541] x64_sys_call+0x1878/0x2ee0 [ 560.146020][T12541] do_syscall_64+0x58/0xf0 [ 560.146049][T12541] ? clear_bhb_loop+0x50/0xa0 [ 560.146075][T12541] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 560.146099][T12541] RIP: 0033:0x7fcb3d98f6c9 [ 560.146119][T12541] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 560.146139][T12541] RSP: 002b:00007fcb3e772038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 560.146164][T12541] RAX: ffffffffffffffda RBX: 00007fcb3dbe5fa0 RCX: 00007fcb3d98f6c9 [ 560.146182][T12541] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000007 [ 560.146196][T12541] RBP: 00007fcb3e772090 R08: 0000000000000000 R09: 0000000000000000 [ 560.146216][T12541] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 560.146230][T12541] R13: 00007fcb3dbe6038 R14: 00007fcb3dbe5fa0 R15: 00007fffc06e6be8 [ 560.146250][T12541] [ 560.760887][ T36] audit: type=1400 audit(1763150437.039:198): avc: denied { setattr } for pid=12566 comm="syz.1.5949" name="" dev="pipefs" ino=79066 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 563.669982][ T36] audit: type=1400 audit(1763150439.949:199): avc: denied { map } for pid=12690 comm="syz.3.6009" path="/194" dev="tmpfs" ino=1240 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 563.714027][ T36] audit: type=1400 audit(1763150439.979:200): avc: denied { execute } for pid=12690 comm="syz.3.6009" path="/194" dev="tmpfs" ino=1240 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 564.945598][T12809] FAULT_INJECTION: forcing a failure. [ 564.945598][T12809] name failslab, interval 1, probability 0, space 0, times 0 [ 564.984048][T12809] CPU: 1 UID: 0 PID: 12809 Comm: syz.3.6061 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 564.984089][T12809] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 564.984104][T12809] Call Trace: [ 564.984111][T12809] [ 564.984120][T12809] __dump_stack+0x21/0x30 [ 564.984157][T12809] dump_stack_lvl+0x10c/0x190 [ 564.984186][T12809] ? __cfi_dump_stack_lvl+0x10/0x10 [ 564.984217][T12809] ? __kasan_check_write+0x18/0x20 [ 564.984251][T12809] ? proc_fail_nth_write+0x17e/0x210 [ 564.984281][T12809] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 564.984311][T12809] dump_stack+0x19/0x20 [ 564.984339][T12809] should_fail_ex+0x3d9/0x530 [ 564.984363][T12809] should_failslab+0xac/0x100 [ 564.984388][T12809] kmem_cache_alloc_noprof+0x42/0x430 [ 564.984410][T12809] ? getname_flags+0xc6/0x710 [ 564.984433][T12809] getname_flags+0xc6/0x710 [ 564.984454][T12809] ? build_open_flags+0x487/0x600 [ 564.984484][T12809] getname+0x1b/0x30 [ 564.984504][T12809] do_sys_openat2+0xcb/0x1c0 [ 564.984532][T12809] ? fput+0x1a5/0x240 [ 564.984563][T12809] ? do_sys_open+0x100/0x100 [ 564.984591][T12809] ? ksys_write+0x1ef/0x250 [ 564.984611][T12809] ? __cfi_ksys_write+0x10/0x10 [ 564.984634][T12809] __x64_sys_open+0x120/0x150 [ 564.984664][T12809] x64_sys_call+0x131a/0x2ee0 [ 564.984695][T12809] do_syscall_64+0x58/0xf0 [ 564.984725][T12809] ? clear_bhb_loop+0x50/0xa0 [ 564.984750][T12809] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 564.984774][T12809] RIP: 0033:0x7f205598f6c9 [ 564.984792][T12809] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 564.984813][T12809] RSP: 002b:00007f20567aa038 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 564.984838][T12809] RAX: ffffffffffffffda RBX: 00007f2055be5fa0 RCX: 00007f205598f6c9 [ 564.984856][T12809] RDX: 0000000000000020 RSI: 000000000014927e RDI: 00002000000001c0 [ 564.984871][T12809] RBP: 00007f20567aa090 R08: 0000000000000000 R09: 0000000000000000 [ 564.984886][T12809] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 564.984901][T12809] R13: 00007f2055be6038 R14: 00007f2055be5fa0 R15: 00007ffe6186cf88 [ 564.984928][T12809] [ 565.249488][T12819] FAULT_INJECTION: forcing a failure. [ 565.249488][T12819] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 565.267808][T12819] CPU: 1 UID: 0 PID: 12819 Comm: syz.1.6066 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 565.267847][T12819] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 565.267863][T12819] Call Trace: [ 565.267870][T12819] [ 565.267887][T12819] __dump_stack+0x21/0x30 [ 565.267924][T12819] dump_stack_lvl+0x10c/0x190 [ 565.267954][T12819] ? __cfi_dump_stack_lvl+0x10/0x10 [ 565.267987][T12819] ? check_stack_object+0x12c/0x140 [ 565.268010][T12819] dump_stack+0x19/0x20 [ 565.268038][T12819] should_fail_ex+0x3d9/0x530 [ 565.268062][T12819] should_fail+0xf/0x20 [ 565.268082][T12819] should_fail_usercopy+0x1e/0x30 [ 565.268107][T12819] _copy_to_user+0x24/0xa0 [ 565.268135][T12819] simple_read_from_buffer+0xed/0x160 [ 565.268165][T12819] proc_fail_nth_read+0x19e/0x210 [ 565.268195][T12819] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 565.268226][T12819] ? bpf_lsm_file_permission+0xd/0x20 [ 565.268258][T12819] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 565.268287][T12819] vfs_read+0x27d/0xc70 [ 565.268308][T12819] ? __cfi_vfs_read+0x10/0x10 [ 565.268327][T12819] ? __kasan_check_write+0x18/0x20 [ 565.268360][T12819] ? mutex_lock+0x92/0x1c0 [ 565.268381][T12819] ? __cfi_mutex_lock+0x10/0x10 [ 565.268402][T12819] ? __fget_files+0x2c5/0x340 [ 565.268428][T12819] ksys_read+0x141/0x250 [ 565.268448][T12819] ? __cfi_ksys_read+0x10/0x10 [ 565.268468][T12819] ? fdget_raw+0x134/0x180 [ 565.268491][T12819] ? __kasan_check_read+0x15/0x20 [ 565.268538][T12819] __x64_sys_read+0x7f/0x90 [ 565.268559][T12819] x64_sys_call+0x2638/0x2ee0 [ 565.268594][T12819] do_syscall_64+0x58/0xf0 [ 565.268623][T12819] ? clear_bhb_loop+0x50/0xa0 [ 565.268649][T12819] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 565.268674][T12819] RIP: 0033:0x7f572d58e0dc [ 565.268693][T12819] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 565.268714][T12819] RSP: 002b:00007f572e486030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 565.268740][T12819] RAX: ffffffffffffffda RBX: 00007f572d7e5fa0 RCX: 00007f572d58e0dc [ 565.268771][T12819] RDX: 000000000000000f RSI: 00007f572e4860a0 RDI: 0000000000000006 [ 565.268792][T12819] RBP: 00007f572e486090 R08: 0000000000000000 R09: 0000000000000000 [ 565.268808][T12819] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 565.268835][T12819] R13: 00007f572d7e6038 R14: 00007f572d7e5fa0 R15: 00007ffef67b2b38 [ 565.268856][T12819] [ 565.663097][T12833] FAULT_INJECTION: forcing a failure. [ 565.663097][T12833] name failslab, interval 1, probability 0, space 0, times 0 [ 565.694044][T12833] CPU: 0 UID: 0 PID: 12833 Comm: syz.1.6072 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 565.694085][T12833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 565.694101][T12833] Call Trace: [ 565.694108][T12833] [ 565.694117][T12833] __dump_stack+0x21/0x30 [ 565.694156][T12833] dump_stack_lvl+0x10c/0x190 [ 565.694188][T12833] ? __cfi_dump_stack_lvl+0x10/0x10 [ 565.694221][T12833] ? avc_has_perm+0x144/0x220 [ 565.694256][T12833] dump_stack+0x19/0x20 [ 565.694286][T12833] should_fail_ex+0x3d9/0x530 [ 565.694324][T12833] should_failslab+0xac/0x100 [ 565.694352][T12833] __kmalloc_cache_noprof+0x41/0x490 [ 565.694375][T12833] ? vhost_task_create+0x101/0x350 [ 565.694400][T12833] ? __cfi_kvm_nx_huge_page_recovery_worker+0x10/0x10 [ 565.694427][T12833] vhost_task_create+0x101/0x350 [ 565.694449][T12833] ? __cfi_kvm_nx_huge_page_recovery_worker_kill+0x10/0x10 [ 565.694475][T12833] ? __cfi_vhost_task_create+0x10/0x10 [ 565.694499][T12833] ? __cfi_vhost_task_fn+0x10/0x10 [ 565.694522][T12833] ? __kasan_check_write+0x18/0x20 [ 565.694605][T12833] ? mutex_lock+0x92/0x1c0 [ 565.694627][T12833] ? __cfi_mutex_lock+0x10/0x10 [ 565.694648][T12833] ? kernel_text_address+0xa9/0xe0 [ 565.694678][T12833] kvm_mmu_post_init_vm+0x156/0x2d0 [ 565.694712][T12833] kvm_arch_vcpu_ioctl_run+0xd7/0x1aa0 [ 565.694742][T12833] ? _parse_integer_limit+0x195/0x1e0 [ 565.694779][T12833] ? __cfi_kvm_arch_vcpu_ioctl_run+0x10/0x10 [ 565.694809][T12833] ? kstrtoull+0x13b/0x1e0 [ 565.694827][T12833] ? kstrtouint+0x78/0xf0 [ 565.694845][T12833] ? ioctl_has_perm+0x1aa/0x4d0 [ 565.694870][T12833] ? __asan_memcpy+0x5a/0x80 [ 565.694889][T12833] ? ioctl_has_perm+0x3e0/0x4d0 [ 565.694915][T12833] ? has_cap_mac_admin+0xd0/0xd0 [ 565.694941][T12833] ? __kasan_check_write+0x18/0x20 [ 565.694974][T12833] ? mutex_lock_killable+0x92/0x1c0 [ 565.694995][T12833] ? __cfi_mutex_lock_killable+0x10/0x10 [ 565.695017][T12833] ? proc_fail_nth_write+0x17e/0x210 [ 565.695049][T12833] kvm_vcpu_ioctl+0x96f/0xee0 [ 565.695071][T12833] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 565.695092][T12833] ? __cfi_vfs_write+0x10/0x10 [ 565.695127][T12833] ? __kasan_check_write+0x18/0x20 [ 565.695162][T12833] ? mutex_unlock+0x8b/0x240 [ 565.695182][T12833] ? __cfi_mutex_unlock+0x10/0x10 [ 565.695202][T12833] ? __fget_files+0x2c5/0x340 [ 565.695227][T12833] ? __fget_files+0x2c5/0x340 [ 565.695252][T12833] ? bpf_lsm_file_ioctl+0xd/0x20 [ 565.695283][T12833] ? security_file_ioctl+0x34/0xd0 [ 565.695308][T12833] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 565.695328][T12833] __se_sys_ioctl+0x135/0x1b0 [ 565.695353][T12833] __x64_sys_ioctl+0x7f/0xa0 [ 565.695377][T12833] x64_sys_call+0x1878/0x2ee0 [ 565.695411][T12833] do_syscall_64+0x58/0xf0 [ 565.695439][T12833] ? clear_bhb_loop+0x50/0xa0 [ 565.695464][T12833] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 565.695489][T12833] RIP: 0033:0x7f572d58f6c9 [ 565.695508][T12833] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 565.695527][T12833] RSP: 002b:00007f572e486038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 565.695560][T12833] RAX: ffffffffffffffda RBX: 00007f572d7e5fa0 RCX: 00007f572d58f6c9 [ 565.695577][T12833] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000009 [ 565.695591][T12833] RBP: 00007f572e486090 R08: 0000000000000000 R09: 0000000000000000 [ 565.695605][T12833] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 565.695618][T12833] R13: 00007f572d7e6038 R14: 00007f572d7e5fa0 R15: 00007ffef67b2b38 [ 565.695639][T12833] [ 566.102388][T12847] FAULT_INJECTION: forcing a failure. [ 566.102388][T12847] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 566.116403][T12847] CPU: 1 UID: 0 PID: 12847 Comm: syz.2.6080 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 566.116441][T12847] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 566.116457][T12847] Call Trace: [ 566.116465][T12847] [ 566.116474][T12847] __dump_stack+0x21/0x30 [ 566.116510][T12847] dump_stack_lvl+0x10c/0x190 [ 566.116541][T12847] ? __cfi_dump_stack_lvl+0x10/0x10 [ 566.116578][T12847] ? kernel_text_address+0xa9/0xe0 [ 566.116608][T12847] dump_stack+0x19/0x20 [ 566.116637][T12847] should_fail_ex+0x3d9/0x530 [ 566.116660][T12847] should_fail+0xf/0x20 [ 566.116681][T12847] should_fail_usercopy+0x1e/0x30 [ 566.116705][T12847] _copy_from_user+0x22/0xb0 [ 566.116734][T12847] ___sys_sendmsg+0x159/0x2a0 [ 566.116769][T12847] ? __sys_sendmsg+0x280/0x280 [ 566.116802][T12847] ? kstrtouint+0x78/0xf0 [ 566.116830][T12847] __sys_sendmmsg+0x271/0x470 [ 566.116865][T12847] ? __cfi___sys_sendmmsg+0x10/0x10 [ 566.116902][T12847] ? __cfi_ksys_write+0x10/0x10 [ 566.116924][T12847] ? __secure_computing+0xef/0x2b0 [ 566.116946][T12847] __x64_sys_sendmmsg+0xa4/0xc0 [ 566.116979][T12847] x64_sys_call+0xfec/0x2ee0 [ 566.117012][T12847] do_syscall_64+0x58/0xf0 [ 566.117040][T12847] ? clear_bhb_loop+0x50/0xa0 [ 566.117066][T12847] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 566.117090][T12847] RIP: 0033:0x7fcb3d98f6c9 [ 566.117109][T12847] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 566.117130][T12847] RSP: 002b:00007fcb3e772038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 566.117155][T12847] RAX: ffffffffffffffda RBX: 00007fcb3dbe5fa0 RCX: 00007fcb3d98f6c9 [ 566.117172][T12847] RDX: 0000000000000001 RSI: 0000200000003c00 RDI: 0000000000000008 [ 566.117188][T12847] RBP: 00007fcb3e772090 R08: 0000000000000000 R09: 0000000000000000 [ 566.117202][T12847] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 566.117217][T12847] R13: 00007fcb3dbe6038 R14: 00007fcb3dbe5fa0 R15: 00007fffc06e6be8 [ 566.117236][T12847] [ 566.655963][ T36] audit: type=1400 audit(1763150442.939:201): avc: denied { ioctl } for pid=12850 comm="syz.3.6079" path="/dev/rnullb0" dev="devtmpfs" ino=31 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 566.805901][T12884] FAULT_INJECTION: forcing a failure. [ 566.805901][T12884] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 566.820895][T12884] CPU: 0 UID: 0 PID: 12884 Comm: syz.1.6094 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 566.820932][T12884] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 566.820946][T12884] Call Trace: [ 566.820953][T12884] [ 566.820962][T12884] __dump_stack+0x21/0x30 [ 566.820997][T12884] dump_stack_lvl+0x10c/0x190 [ 566.821028][T12884] ? __cfi_dump_stack_lvl+0x10/0x10 [ 566.821060][T12884] ? check_stack_object+0x12c/0x140 [ 566.821083][T12884] dump_stack+0x19/0x20 [ 566.821111][T12884] should_fail_ex+0x3d9/0x530 [ 566.821135][T12884] should_fail+0xf/0x20 [ 566.821155][T12884] should_fail_usercopy+0x1e/0x30 [ 566.821180][T12884] _copy_to_user+0x24/0xa0 [ 566.821207][T12884] simple_read_from_buffer+0xed/0x160 [ 566.821236][T12884] proc_fail_nth_read+0x19e/0x210 [ 566.821265][T12884] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 566.821297][T12884] ? bpf_lsm_file_permission+0xd/0x20 [ 566.821329][T12884] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 566.821358][T12884] vfs_read+0x27d/0xc70 [ 566.821377][T12884] ? __cfi_selinux_file_ioctl+0x10/0x10 [ 566.821406][T12884] ? __cfi_vfs_read+0x10/0x10 [ 566.821426][T12884] ? __kasan_check_write+0x18/0x20 [ 566.821459][T12884] ? mutex_lock+0x92/0x1c0 [ 566.821480][T12884] ? __cfi_mutex_lock+0x10/0x10 [ 566.821500][T12884] ? __fget_files+0x2c5/0x340 [ 566.821526][T12884] ksys_read+0x141/0x250 [ 566.821546][T12884] ? __cfi_ksys_read+0x10/0x10 [ 566.821568][T12884] ? __kasan_check_read+0x15/0x20 [ 566.821601][T12884] __x64_sys_read+0x7f/0x90 [ 566.821622][T12884] x64_sys_call+0x2638/0x2ee0 [ 566.821653][T12884] do_syscall_64+0x58/0xf0 [ 566.821692][T12884] ? clear_bhb_loop+0x50/0xa0 [ 566.821718][T12884] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 566.821743][T12884] RIP: 0033:0x7f572d58e0dc [ 566.821762][T12884] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 566.821783][T12884] RSP: 002b:00007f572e486030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 566.821807][T12884] RAX: ffffffffffffffda RBX: 00007f572d7e5fa0 RCX: 00007f572d58e0dc [ 566.821824][T12884] RDX: 000000000000000f RSI: 00007f572e4860a0 RDI: 0000000000000008 [ 566.821839][T12884] RBP: 00007f572e486090 R08: 0000000000000000 R09: 0000000000000000 [ 566.821854][T12884] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 566.821868][T12884] R13: 00007f572d7e6038 R14: 00007f572d7e5fa0 R15: 00007ffef67b2b38 [ 566.821888][T12884] [ 567.290437][ T36] audit: type=1400 audit(1763150443.569:202): avc: denied { write } for pid=12926 comm="syz.2.6113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 567.329414][ T36] audit: type=1400 audit(1763150443.569:203): avc: denied { map } for pid=12926 comm="syz.2.6113" path="/dev/binderfs/binder1" dev="binder" ino=11 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 567.375544][T12934] FAULT_INJECTION: forcing a failure. [ 567.375544][T12934] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 567.389610][T12934] CPU: 1 UID: 0 PID: 12934 Comm: syz.1.6115 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 567.389646][T12934] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 567.389660][T12934] Call Trace: [ 567.389667][T12934] [ 567.389676][T12934] __dump_stack+0x21/0x30 [ 567.389712][T12934] dump_stack_lvl+0x10c/0x190 [ 567.389741][T12934] ? __cfi_dump_stack_lvl+0x10/0x10 [ 567.389771][T12934] ? __kasan_check_read+0x15/0x20 [ 567.389805][T12934] dump_stack+0x19/0x20 [ 567.389832][T12934] should_fail_ex+0x3d9/0x530 [ 567.389855][T12934] should_fail+0xf/0x20 [ 567.389874][T12934] should_fail_usercopy+0x1e/0x30 [ 567.389898][T12934] __kvm_read_guest_page+0x177/0x210 [ 567.389921][T12934] kvm_vcpu_read_guest_page+0x31a/0x400 [ 567.389944][T12934] kvm_fetch_guest_virt+0x146/0x190 [ 567.389977][T12934] ? __cfi_kvm_fetch_guest_virt+0x10/0x10 [ 567.390009][T12934] __do_insn_fetch_bytes+0x321/0x730 [ 567.390033][T12934] ? x86_decode_insn+0x4fb0/0x4fb0 [ 567.390053][T12934] ? emulator_read_write+0x410/0x580 [ 567.390077][T12934] ? tdp_iter_restart+0x1c4/0x360 [ 567.390101][T12934] ? kvm_tdp_mmu_fast_pf_get_last_sptep+0x290/0x290 [ 567.390130][T12934] ? tdp_iter_next+0x362/0xa30 [ 567.390158][T12934] x86_decode_insn+0x33b/0x4fb0 [ 567.390183][T12934] ? trace_mark_mmio_spte+0x22/0x130 [ 567.390222][T12934] ? __cfi_x86_decode_insn+0x10/0x10 [ 567.390248][T12934] ? __kasan_check_write+0x18/0x20 [ 567.390287][T12934] ? vmx_read_guest_seg_ar+0x1c8/0x350 [ 567.390317][T12934] ? __asan_memset+0x39/0x50 [ 567.390348][T12934] ? init_decode_cache+0x7c/0x90 [ 567.390369][T12934] ? init_emulate_ctxt+0x410/0x540 [ 567.390394][T12934] ? kvm_inject_realmode_interrupt+0x2e0/0x2e0 [ 567.390420][T12934] ? kvm_mmu_do_page_fault+0x4b0/0x5f0 [ 567.390446][T12934] x86_decode_emulated_instruction+0x66/0x190 [ 567.390466][T12934] x86_emulate_instruction+0x2d3/0x1870 [ 567.390485][T12934] ? kvm_multiple_exception+0x6d8/0xad0 [ 567.390505][T12934] kvm_mmu_page_fault+0x336/0x970 [ 567.390524][T12934] handle_ept_violation+0x21c/0x440 [ 567.390541][T12934] ? vmx_vcpu_run+0x1100/0x2000 [ 567.390564][T12934] ? __cfi_handle_ept_violation+0x10/0x10 [ 567.390580][T12934] vmx_handle_exit+0x12c2/0x1b40 [ 567.390602][T12934] ? kvm_deliver_exception_payload+0xd7/0x200 [ 567.390623][T12934] ? __cfi_vmx_vcpu_run+0x10/0x10 [ 567.390646][T12934] ? vmx_handle_exit_irqoff+0xe9/0x7a0 [ 567.390669][T12934] vcpu_run+0x4bd0/0x7830 [ 567.390700][T12934] ? signal_pending+0xc0/0xc0 [ 567.390721][T12934] ? complete_emulated_mmio+0x4fb/0x790 [ 567.390741][T12934] kvm_arch_vcpu_ioctl_run+0x101a/0x1aa0 [ 567.390763][T12934] ? __cfi_kvm_arch_vcpu_ioctl_run+0x10/0x10 [ 567.390783][T12934] ? kstrtoull+0x13b/0x1e0 [ 567.390797][T12934] ? kstrtouint+0x78/0xf0 [ 567.390811][T12934] ? ioctl_has_perm+0x1aa/0x4d0 [ 567.390830][T12934] ? __asan_memcpy+0x5a/0x80 [ 567.390844][T12934] ? ioctl_has_perm+0x3e0/0x4d0 [ 567.390862][T12934] ? has_cap_mac_admin+0xd0/0xd0 [ 567.390881][T12934] ? __kasan_check_write+0x18/0x20 [ 567.390904][T12934] ? mutex_lock_killable+0x92/0x1c0 [ 567.390920][T12934] ? __cfi_mutex_lock_killable+0x10/0x10 [ 567.390935][T12934] ? proc_fail_nth_write+0x17e/0x210 [ 567.390956][T12934] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 567.390977][T12934] kvm_vcpu_ioctl+0x96f/0xee0 [ 567.390992][T12934] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 567.391006][T12934] ? __cfi_vfs_write+0x10/0x10 [ 567.391021][T12934] ? __kasan_check_write+0x18/0x20 [ 567.391044][T12934] ? mutex_unlock+0x8b/0x240 [ 567.391058][T12934] ? __cfi_mutex_unlock+0x10/0x10 [ 567.391071][T12934] ? __fget_files+0x2c5/0x340 [ 567.391089][T12934] ? __fget_files+0x2c5/0x340 [ 567.391106][T12934] ? bpf_lsm_file_ioctl+0xd/0x20 [ 567.391127][T12934] ? security_file_ioctl+0x34/0xd0 [ 567.391145][T12934] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 567.391158][T12934] __se_sys_ioctl+0x135/0x1b0 [ 567.391176][T12934] __x64_sys_ioctl+0x7f/0xa0 [ 567.391192][T12934] x64_sys_call+0x1878/0x2ee0 [ 567.391215][T12934] do_syscall_64+0x58/0xf0 [ 567.391235][T12934] ? clear_bhb_loop+0x50/0xa0 [ 567.391253][T12934] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 567.391270][T12934] RIP: 0033:0x7f572d58f6c9 [ 567.391283][T12934] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 567.391297][T12934] RSP: 002b:00007f572e486038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 567.391314][T12934] RAX: ffffffffffffffda RBX: 00007f572d7e5fa0 RCX: 00007f572d58f6c9 [ 567.391372][T12934] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000007 [ 567.391383][T12934] RBP: 00007f572e486090 R08: 0000000000000000 R09: 0000000000000000 [ 567.391393][T12934] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 567.391402][T12934] R13: 00007f572d7e6038 R14: 00007f572d7e5fa0 R15: 00007ffef67b2b38 [ 567.391416][T12934] [ 567.986019][T12963] FAULT_INJECTION: forcing a failure. [ 567.986019][T12963] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 568.008456][T12963] CPU: 1 UID: 0 PID: 12963 Comm: syz.3.6127 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 568.008492][T12963] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 568.008507][T12963] Call Trace: [ 568.008514][T12963] [ 568.008522][T12963] __dump_stack+0x21/0x30 [ 568.008626][T12963] dump_stack_lvl+0x10c/0x190 [ 568.008657][T12963] ? __cfi_dump_stack_lvl+0x10/0x10 [ 568.008687][T12963] ? check_stack_object+0x12c/0x140 [ 568.008710][T12963] dump_stack+0x19/0x20 [ 568.008736][T12963] should_fail_ex+0x3d9/0x530 [ 568.008759][T12963] should_fail+0xf/0x20 [ 568.008777][T12963] should_fail_usercopy+0x1e/0x30 [ 568.008800][T12963] _copy_to_user+0x24/0xa0 [ 568.008826][T12963] simple_read_from_buffer+0xed/0x160 [ 568.008855][T12963] proc_fail_nth_read+0x19e/0x210 [ 568.008884][T12963] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 568.008912][T12963] ? bpf_lsm_file_permission+0xd/0x20 [ 568.008946][T12963] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 568.008980][T12963] vfs_read+0x27d/0xc70 [ 568.009004][T12963] ? __cfi_selinux_file_ioctl+0x10/0x10 [ 568.009038][T12963] ? __cfi_vfs_read+0x10/0x10 [ 568.009060][T12963] ? __kasan_check_write+0x18/0x20 [ 568.009099][T12963] ? mutex_lock+0x92/0x1c0 [ 568.009120][T12963] ? __cfi_mutex_lock+0x10/0x10 [ 568.009148][T12963] ? __fget_files+0x2c5/0x340 [ 568.009179][T12963] ksys_read+0x141/0x250 [ 568.009199][T12963] ? __cfi_ksys_read+0x10/0x10 [ 568.009219][T12963] ? __kasan_check_read+0x15/0x20 [ 568.009252][T12963] __x64_sys_read+0x7f/0x90 [ 568.009272][T12963] x64_sys_call+0x2638/0x2ee0 [ 568.009316][T12963] do_syscall_64+0x58/0xf0 [ 568.009344][T12963] ? clear_bhb_loop+0x50/0xa0 [ 568.009369][T12963] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 568.009392][T12963] RIP: 0033:0x7f205598e0dc [ 568.009411][T12963] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 568.009432][T12963] RSP: 002b:00007f20567aa030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 568.009456][T12963] RAX: ffffffffffffffda RBX: 00007f2055be5fa0 RCX: 00007f205598e0dc [ 568.009474][T12963] RDX: 000000000000000f RSI: 00007f20567aa0a0 RDI: 0000000000000008 [ 568.009489][T12963] RBP: 00007f20567aa090 R08: 0000000000000000 R09: 0000000000000000 [ 568.009504][T12963] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 568.009519][T12963] R13: 00007f2055be6038 R14: 00007f2055be5fa0 R15: 00007ffe6186cf88 [ 568.009546][T12963] [ 568.356941][T12983] FAULT_INJECTION: forcing a failure. [ 568.356941][T12983] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 568.389680][T12983] CPU: 0 UID: 0 PID: 12983 Comm: syz.3.6134 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 568.389719][T12983] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 568.389734][T12983] Call Trace: [ 568.389741][T12983] [ 568.389750][T12983] __dump_stack+0x21/0x30 [ 568.389786][T12983] dump_stack_lvl+0x10c/0x190 [ 568.389816][T12983] ? __cfi_dump_stack_lvl+0x10/0x10 [ 568.389846][T12983] ? __kasan_check_read+0x15/0x20 [ 568.389882][T12983] dump_stack+0x19/0x20 [ 568.389911][T12983] should_fail_ex+0x3d9/0x530 [ 568.389935][T12983] should_fail+0xf/0x20 [ 568.389955][T12983] should_fail_usercopy+0x1e/0x30 [ 568.389980][T12983] __kvm_read_guest_page+0x177/0x210 [ 568.390004][T12983] kvm_vcpu_read_guest_page+0x31a/0x400 [ 568.390029][T12983] kvm_fetch_guest_virt+0x146/0x190 [ 568.390062][T12983] ? __cfi_kvm_fetch_guest_virt+0x10/0x10 [ 568.390095][T12983] __do_insn_fetch_bytes+0x321/0x730 [ 568.390120][T12983] ? x86_decode_insn+0x4fb0/0x4fb0 [ 568.390142][T12983] ? tdp_iter_restart+0x1c4/0x360 [ 568.390168][T12983] ? kvm_tdp_mmu_fast_pf_get_last_sptep+0x290/0x290 [ 568.390197][T12983] ? tdp_iter_next+0x362/0xa30 [ 568.390223][T12983] x86_decode_insn+0x33b/0x4fb0 [ 568.390244][T12983] ? trace_mark_mmio_spte+0x22/0x130 [ 568.390293][T12983] ? __cfi_x86_decode_insn+0x10/0x10 [ 568.390314][T12983] ? __kasan_check_write+0x18/0x20 [ 568.390347][T12983] ? vmx_read_guest_seg_ar+0x1c8/0x350 [ 568.390380][T12983] ? __asan_memset+0x39/0x50 [ 568.390400][T12983] ? init_decode_cache+0x7c/0x90 [ 568.390421][T12983] ? init_emulate_ctxt+0x410/0x540 [ 568.390446][T12983] ? kvm_inject_realmode_interrupt+0x2e0/0x2e0 [ 568.390473][T12983] ? kvm_mmu_do_page_fault+0x4b0/0x5f0 [ 568.390500][T12983] x86_decode_emulated_instruction+0x66/0x190 [ 568.390534][T12983] x86_emulate_instruction+0x2d3/0x1870 [ 568.390562][T12983] ? kvm_multiple_exception+0x6d8/0xad0 [ 568.390591][T12983] kvm_mmu_page_fault+0x336/0x970 [ 568.390618][T12983] handle_ept_violation+0x21c/0x440 [ 568.390642][T12983] ? vmx_vcpu_run+0x1100/0x2000 [ 568.390675][T12983] ? __cfi_handle_ept_violation+0x10/0x10 [ 568.390699][T12983] vmx_handle_exit+0x12c2/0x1b40 [ 568.390731][T12983] ? kvm_deliver_exception_payload+0xd7/0x200 [ 568.390760][T12983] ? __cfi_vmx_vcpu_run+0x10/0x10 [ 568.390792][T12983] ? vmx_handle_exit_irqoff+0xe9/0x7a0 [ 568.390825][T12983] vcpu_run+0x4bd0/0x7830 [ 568.390853][T12983] ? x64_sys_call+0xe69/0x2ee0 [ 568.390901][T12983] ? signal_pending+0xc0/0xc0 [ 568.390928][T12983] ? __kasan_check_write+0x18/0x20 [ 568.390962][T12983] ? xfd_validate_state+0x68/0x150 [ 568.390991][T12983] ? fpu_swap_kvm_fpstate+0x93/0x5f0 [ 568.391016][T12983] ? __kasan_check_write+0x18/0x20 [ 568.391049][T12983] ? fpregs_mark_activate+0x69/0x160 [ 568.391074][T12983] ? fpu_swap_kvm_fpstate+0x44d/0x5f0 [ 568.391099][T12983] ? fpu_swap_kvm_fpstate+0x93/0x5f0 [ 568.391125][T12983] kvm_arch_vcpu_ioctl_run+0x101a/0x1aa0 [ 568.391156][T12983] ? __cfi_kvm_arch_vcpu_ioctl_run+0x10/0x10 [ 568.391186][T12983] ? kstrtoull+0x13b/0x1e0 [ 568.391207][T12983] ? kstrtouint+0x78/0xf0 [ 568.391227][T12983] ? ioctl_has_perm+0x1aa/0x4d0 [ 568.391253][T12983] ? __asan_memcpy+0x5a/0x80 [ 568.391281][T12983] ? ioctl_has_perm+0x3e0/0x4d0 [ 568.391307][T12983] ? has_cap_mac_admin+0xd0/0xd0 [ 568.391334][T12983] ? __kasan_check_write+0x18/0x20 [ 568.391367][T12983] ? mutex_lock_killable+0x92/0x1c0 [ 568.391391][T12983] ? __cfi_mutex_lock_killable+0x10/0x10 [ 568.391412][T12983] ? proc_fail_nth_write+0x17e/0x210 [ 568.391442][T12983] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 568.391474][T12983] kvm_vcpu_ioctl+0x96f/0xee0 [ 568.391495][T12983] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 568.391516][T12983] ? __cfi_vfs_write+0x10/0x10 [ 568.391537][T12983] ? __kasan_check_write+0x18/0x20 [ 568.391571][T12983] ? mutex_unlock+0x8b/0x240 [ 568.391591][T12983] ? __cfi_mutex_unlock+0x10/0x10 [ 568.391611][T12983] ? __fget_files+0x2c5/0x340 [ 568.391636][T12983] ? __fget_files+0x2c5/0x340 [ 568.391661][T12983] ? bpf_lsm_file_ioctl+0xd/0x20 [ 568.391691][T12983] ? security_file_ioctl+0x34/0xd0 [ 568.391716][T12983] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 568.391735][T12983] __se_sys_ioctl+0x135/0x1b0 [ 568.391761][T12983] __x64_sys_ioctl+0x7f/0xa0 [ 568.391784][T12983] x64_sys_call+0x1878/0x2ee0 [ 568.391817][T12983] do_syscall_64+0x58/0xf0 [ 568.391846][T12983] ? clear_bhb_loop+0x50/0xa0 [ 568.391871][T12983] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 568.391895][T12983] RIP: 0033:0x7f205598f6c9 [ 568.391914][T12983] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 568.391935][T12983] RSP: 002b:00007f20567aa038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 568.391960][T12983] RAX: ffffffffffffffda RBX: 00007f2055be5fa0 RCX: 00007f205598f6c9 [ 568.391978][T12983] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 000000000000000a [ 568.391992][T12983] RBP: 00007f20567aa090 R08: 0000000000000000 R09: 0000000000000000 [ 568.392008][T12983] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 568.392030][T12983] R13: 00007f2055be6038 R14: 00007f2055be5fa0 R15: 00007ffe6186cf88 [ 568.392051][T12983] [ 568.501139][T12986] SELinux: security_context_str_to_sid () failed with errno=-22 [ 569.142287][T13027] incfs_lookup_dentry err:-13 [ 569.154170][T13027] incfs: Can't find or create .index dir in ./bus [ 569.164325][T13027] incfs: mount failed -13 [ 569.175502][ T36] audit: type=1400 audit(1763150445.459:204): avc: denied { setopt } for pid=13026 comm="syz.1.6153" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 570.004228][T13094] SELinux: security_context_str_to_sid () failed with errno=-22 [ 570.519917][T13126] SELinux: security_context_str_to_sid () failed with errno=-22 [ 571.018177][T13178] SELinux: security_context_str_to_sid () failed with errno=-22 [ 571.195109][T13207] SELinux: security_context_str_to_sid () failed with errno=-22 [ 571.571971][T13258] SELinux: security_context_str_to_sid () failed with errno=-22 [ 572.397593][T13333] SELinux: security_context_str_to_sid () failed with errno=-22 [ 573.048226][T13385] SELinux: security_context_str_to_sid () failed with errno=-22 [ 573.575530][T13458] SELinux: security_context_str_to_sid () failed with errno=-22 [ 574.174961][T13518] SELinux: security_context_str_to_sid () failed with errno=-22 [ 574.708534][T13565] SELinux: security_context_str_to_sid () failed with errno=-22 [ 578.177476][T13721] SELinux: security_context_str_to_sid () failed with errno=-22 [ 581.519346][T13830] SELinux: security_context_str_to_sid () failed with errno=-22 [ 583.879252][T13946] SELinux: security_context_str_to_sid () failed with errno=-22 Connection to us-central1-ssh-serialport.googleapis.com closed by remote host.