last executing test programs: 1.369713572s ago: executing program 3 (id=8546): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000140)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00), 0x0, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r4, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r5, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 1.369257152s ago: executing program 3 (id=8548): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000140)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r3, 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r5, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) rt_sigaction(0xd, &(0x7f0000000180)={0x0, 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) 1.298599489s ago: executing program 0 (id=8550): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000140)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r2, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r4, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x0, 0x0) 1.229001356s ago: executing program 1 (id=8551): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000140)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r0, @ANYRES64], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r0, 0x0) ioctl$KVM_X86_SETUP_MCE(r0, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r1, 0x0, 0x0, 0x805, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r2, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r4, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r5, 0x0, 0x118) 1.228766735s ago: executing program 0 (id=8552): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000140)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r3, 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r5, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r6, 0x0, 0x118) 1.207610468s ago: executing program 0 (id=8553): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r4, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) rt_sigaction(0xd, 0x0, 0x0, 0x8, &(0x7f0000000300)) 1.172655992s ago: executing program 0 (id=8554): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000140)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r0, @ANYRES64], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r0, 0x0) ioctl$KVM_X86_SETUP_MCE(r0, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r1, 0x0, 0x0, 0x805, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r3, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) rt_sigaction(0xd, &(0x7f0000000180)={0x0, 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) 773.011142ms ago: executing program 2 (id=8556): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000140)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, 0x0, 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r3, 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r5, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x0, 0x0) 746.484145ms ago: executing program 2 (id=8557): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000140)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00), 0x0, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r3, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') 702.879689ms ago: executing program 2 (id=8558): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x1]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) close_range(r0, 0xffffffffffffffff, 0x2) rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r3, &(0x7f0000000340)=ANY=[@ANYRES8, @ANYRES8=r3, @ANYRES64=r2], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r3, 0x0) ioctl$KVM_X86_SETUP_MCE(r3, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = socket(0x10, 0x803, 0x0) sendto(r4, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r4, &(0x7f0000000380)=[{{0x0, 0x0, 0x0}, 0x9}, {{0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000dc0)=""/4096, 0x1000}], 0x1}, 0x1009}], 0x2, 0x40012160, 0x0) 670.142492ms ago: executing program 2 (id=8559): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000140)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r3, 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r5, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) rt_sigaction(0xd, &(0x7f0000000180)={0x0, 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) 596.88944ms ago: executing program 2 (id=8560): rt_sigaction(0xd, &(0x7f0000000180)={0x0, 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000140)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r3, 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r5, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') 596.60794ms ago: executing program 2 (id=8561): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, 0x0) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x80, 0x0, 0xfcee) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r3, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = socket(0x10, 0x803, 0x0) sendto(r4, &(0x7f0000000740)="120000001200e7ef007b000000000000", 0x10, 0x0, 0x0, 0x0) 535.201666ms ago: executing program 3 (id=8562): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000140)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00), 0x0, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r3, 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r5, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, 0xffffffffffffffff, 0x0) 522.610877ms ago: executing program 1 (id=8563): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000140)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r4, 0x0, 0x0, 0x4) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, 0xffffffffffffffff, 0x0) 244.928055ms ago: executing program 0 (id=8564): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) rt_sigaction(0x40000d, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r2, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20000804) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) socket$inet(0x2, 0x800, 0xffffffff) 183.978642ms ago: executing program 3 (id=8565): setreuid(0x0, 0xee01) syz_clone(0x10000080, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 1) 177.085742ms ago: executing program 1 (id=8566): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000140)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00), 0x0, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r3, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') 160.819274ms ago: executing program 3 (id=8567): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000140)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r3, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r5, 0x0, 0x118) 140.361016ms ago: executing program 1 (id=8568): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r3, &(0x7f0000000340)=ANY=[], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r3, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(r3, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) socket(0xa, 0x3, 0x87) 124.483488ms ago: executing program 3 (id=8569): mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x4000) rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r3, 0x0, 0x0, 0x805, 0x0, 0x0) sendto$inet(r3, 0x0, 0x0, 0x80, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c6) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x19) r4 = openat$rnullb(0xffffffffffffff9c, &(0x7f0000000000), 0x165342, 0x0) write(r4, &(0x7f0000000080)="14771561351bb74197281dcd5af6b14531f7496b6e55cb77ca3ca0e4c371a2158762a94678716213d06d1aa89f17f7e981997041f991aa75a98a3150c4a27e5a57fb0fe0175f6ab34a8aefda2502d0a6b1ddb5e229cd38e009fc6ea93744233dcd8ff9e370e3c0eb30ef5a8fd56299", 0x6f) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) mremap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x1000, 0x7, &(0x7f0000001000/0x1000)=nil) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r6, &(0x7f0000000240)=ANY=[@ANYRESDEC=r0, @ANYRES64=r2], 0x118) sendmsg$IPSET_CMD_GET_BYNAME(r6, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000180)={&(0x7f0000001400)=ANY=[@ANYRES16=r2], 0x3c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4c04) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r6, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f0000000200)={r4, 0x0, 0x7a7}) mmap$IORING_OFF_SQ_RING(&(0x7f00008e1000/0x1000)=nil, 0x1000, 0x2000008, 0x20010, r7, 0x0) ioctl$KVM_X86_SETUP_MCE(r6, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) ioctl$TIOCL_GETKMSGREDIRECT(r6, 0x541c, &(0x7f0000000040)) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x8) write(r4, &(0x7f0000000400)="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", 0x1f000) 91.652671ms ago: executing program 1 (id=8570): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000140)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r3, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') 52.755445ms ago: executing program 1 (id=8571): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000140)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r0, @ANYRES64], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r0, 0x0) ioctl$KVM_X86_SETUP_MCE(r0, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r1, 0x0, 0x0, 0x805, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r2, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r4, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r5, 0x0, 0x118) 0s ago: executing program 0 (id=8572): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x1]}}, 0x0, 0x8, &(0x7f0000000300)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r3, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r3, @ANYRES64=r2], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r3, 0x0) ioctl$KVM_X86_SETUP_MCE(r3, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mount$incfs(&(0x7f00000007c0)='.\x00', &(0x7f0000000800)='./bus\x00', &(0x7f0000000840), 0x1004002, 0x0) chdir(&(0x7f00000001c0)='./bus\x00') rmdir(&(0x7f0000000100)='./bus\x00') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140), 0x101100, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x1) syz_kvm_setup_cpu$x86(r6, r7, &(0x7f0000016000/0x18000)=nil, &(0x7f0000000300)=[@textreal={0x8, 0x0}], 0x1, 0x28, 0x0, 0x0) ioctl$KVM_SET_MSRS(r7, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000000000008c04"]) setreuid(0x0, 0xee01) syz_clone(0x10000080, 0x0, 0x0, 0x0, 0x0, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.225' (ED25519) to the list of known hosts. [ 23.100962][ T36] audit: type=1400 audit(1763155625.170:64): avc: denied { mounton } for pid=282 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 23.102500][ T282] cgroup: Unknown subsys name 'net' [ 23.123825][ T36] audit: type=1400 audit(1763155625.170:65): avc: denied { mount } for pid=282 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 23.151245][ T36] audit: type=1400 audit(1763155625.200:66): avc: denied { unmount } for pid=282 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 23.151568][ T282] cgroup: Unknown subsys name 'devices' [ 23.352412][ T282] cgroup: Unknown subsys name 'hugetlb' [ 23.358068][ T282] cgroup: Unknown subsys name 'rlimit' [ 23.512882][ T36] audit: type=1400 audit(1763155625.580:67): avc: denied { setattr } for pid=282 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 23.536073][ T284] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 23.536090][ T36] audit: type=1400 audit(1763155625.580:68): avc: denied { mounton } for pid=282 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 23.569430][ T36] audit: type=1400 audit(1763155625.580:69): avc: denied { mount } for pid=282 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 23.592607][ T36] audit: type=1400 audit(1763155625.610:70): avc: denied { relabelto } for pid=284 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 23.618014][ T36] audit: type=1400 audit(1763155625.610:71): avc: denied { write } for pid=284 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 23.633142][ T282] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 23.643583][ T36] audit: type=1400 audit(1763155625.690:72): avc: denied { read } for pid=282 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 23.677950][ T36] audit: type=1400 audit(1763155625.690:73): avc: denied { open } for pid=282 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 25.933727][ T289] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.940916][ T289] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.947996][ T289] bridge_slave_0: entered allmulticast mode [ 25.954578][ T289] bridge_slave_0: entered promiscuous mode [ 25.969727][ T289] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.976805][ T289] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.983904][ T289] bridge_slave_1: entered allmulticast mode [ 25.990295][ T289] bridge_slave_1: entered promiscuous mode [ 25.998182][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.005310][ T291] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.012513][ T291] bridge_slave_0: entered allmulticast mode [ 26.018767][ T291] bridge_slave_0: entered promiscuous mode [ 26.026201][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.033313][ T291] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.040436][ T291] bridge_slave_1: entered allmulticast mode [ 26.046651][ T291] bridge_slave_1: entered promiscuous mode [ 26.095837][ T290] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.102928][ T290] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.110025][ T290] bridge_slave_0: entered allmulticast mode [ 26.116369][ T290] bridge_slave_0: entered promiscuous mode [ 26.131366][ T290] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.138442][ T290] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.145604][ T290] bridge_slave_1: entered allmulticast mode [ 26.151944][ T290] bridge_slave_1: entered promiscuous mode [ 26.177921][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.185114][ T292] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.192420][ T292] bridge_slave_0: entered allmulticast mode [ 26.198666][ T292] bridge_slave_0: entered promiscuous mode [ 26.216250][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.223462][ T292] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.230886][ T292] bridge_slave_1: entered allmulticast mode [ 26.237144][ T292] bridge_slave_1: entered promiscuous mode [ 26.378451][ T289] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.385549][ T289] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.392911][ T289] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.400002][ T289] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.408593][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.415702][ T291] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.423029][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.430079][ T291] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.465318][ T290] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.472420][ T290] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.479741][ T290] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.486777][ T290] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.506757][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.513947][ T292] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.521270][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.528308][ T292] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.552822][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.560514][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.567819][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.575211][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.582798][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.590278][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.597542][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.604917][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.618000][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.625115][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.654400][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.661530][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.669755][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.676811][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.684474][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.691545][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.711919][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.718990][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.726922][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.733985][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.760429][ T46] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.767517][ T46] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.775929][ T46] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.783037][ T46] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.816498][ T289] veth0_vlan: entered promiscuous mode [ 26.833951][ T292] veth0_vlan: entered promiscuous mode [ 26.851145][ T291] veth0_vlan: entered promiscuous mode [ 26.858564][ T289] veth1_macvtap: entered promiscuous mode [ 26.880361][ T292] veth1_macvtap: entered promiscuous mode [ 26.911418][ T290] veth0_vlan: entered promiscuous mode [ 26.922943][ T289] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 26.928351][ T291] veth1_macvtap: entered promiscuous mode [ 26.954828][ T290] veth1_macvtap: entered promiscuous mode [ 27.082833][ T346] kvm_intel: L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 27.152044][ T350] FAULT_INJECTION: forcing a failure. [ 27.152044][ T350] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 27.166981][ T350] CPU: 1 UID: 0 PID: 350 Comm: syz.0.7 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 27.167015][ T350] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 27.167038][ T350] Call Trace: [ 27.167045][ T350] [ 27.167055][ T350] __dump_stack+0x21/0x30 [ 27.167099][ T350] dump_stack_lvl+0x10c/0x190 [ 27.167128][ T350] ? __cfi_dump_stack_lvl+0x10/0x10 [ 27.167158][ T350] ? __kasan_check_read+0x15/0x20 [ 27.167199][ T350] dump_stack+0x19/0x20 [ 27.167227][ T350] should_fail_ex+0x3d9/0x530 [ 27.167250][ T350] should_fail+0xf/0x20 [ 27.167269][ T350] should_fail_usercopy+0x1e/0x30 [ 27.167293][ T350] __kvm_read_guest_page+0x177/0x210 [ 27.167317][ T350] kvm_vcpu_read_guest_page+0x31a/0x400 [ 27.167341][ T350] kvm_fetch_guest_virt+0x146/0x190 [ 27.167374][ T350] ? __cfi_kvm_fetch_guest_virt+0x10/0x10 [ 27.167405][ T350] __do_insn_fetch_bytes+0x321/0x730 [ 27.167429][ T350] ? x86_decode_insn+0x4fb0/0x4fb0 [ 27.167450][ T350] ? tdp_iter_restart+0x1c4/0x360 [ 27.167474][ T350] ? kvm_tdp_mmu_fast_pf_get_last_sptep+0x290/0x290 [ 27.167504][ T350] ? tdp_iter_next+0x362/0xa30 [ 27.167528][ T350] x86_decode_insn+0x33b/0x4fb0 [ 27.167549][ T350] ? trace_mark_mmio_spte+0x22/0x130 [ 27.167581][ T350] ? __cfi_x86_decode_insn+0x10/0x10 [ 27.167601][ T350] ? __kasan_check_write+0x18/0x20 [ 27.167633][ T350] ? vmx_read_guest_seg_ar+0x1c8/0x350 [ 27.167660][ T350] ? __asan_memset+0x39/0x50 [ 27.167678][ T350] ? init_decode_cache+0x7c/0x90 [ 27.167699][ T350] ? init_emulate_ctxt+0x410/0x540 [ 27.167723][ T350] ? kvm_inject_realmode_interrupt+0x2e0/0x2e0 [ 27.167749][ T350] ? kvm_mmu_do_page_fault+0x4b0/0x5f0 [ 27.167774][ T350] x86_decode_emulated_instruction+0x66/0x190 [ 27.167800][ T350] x86_emulate_instruction+0x2d3/0x1870 [ 27.167826][ T350] ? kvm_multiple_exception+0x6d8/0xad0 [ 27.167855][ T350] kvm_mmu_page_fault+0x336/0x970 [ 27.167881][ T350] handle_ept_violation+0x21c/0x440 [ 27.167904][ T350] ? vmx_vcpu_run+0x1100/0x2000 [ 27.167936][ T350] ? __cfi_handle_ept_violation+0x10/0x10 [ 27.167960][ T350] vmx_handle_exit+0x12c2/0x1b40 [ 27.167990][ T350] ? kvm_deliver_exception_payload+0xd7/0x200 [ 27.168018][ T350] ? __cfi_vmx_vcpu_run+0x10/0x10 [ 27.168049][ T350] ? vmx_handle_exit_irqoff+0xe9/0x7a0 [ 27.168082][ T350] vcpu_run+0x4bd0/0x7830 [ 27.168124][ T350] ? signal_pending+0xc0/0xc0 [ 27.168154][ T350] ? complete_emulated_mmio+0x4fb/0x790 [ 27.168186][ T350] kvm_arch_vcpu_ioctl_run+0x101a/0x1aa0 [ 27.168214][ T350] ? __cfi_kvm_arch_vcpu_ioctl_run+0x10/0x10 [ 27.168243][ T350] ? kstrtoull+0x13b/0x1e0 [ 27.168262][ T350] ? kstrtouint+0x78/0xf0 [ 27.168279][ T350] ? ioctl_has_perm+0x1aa/0x4d0 [ 27.168303][ T350] ? __asan_memcpy+0x5a/0x80 [ 27.168335][ T350] ? ioctl_has_perm+0x3e0/0x4d0 [ 27.168359][ T350] ? has_cap_mac_admin+0xd0/0xd0 [ 27.168383][ T350] ? __kasan_check_write+0x18/0x20 [ 27.168413][ T350] ? mutex_lock_killable+0x92/0x1c0 [ 27.168434][ T350] ? __cfi_mutex_lock_killable+0x10/0x10 [ 27.168455][ T350] ? proc_fail_nth_write+0x17e/0x210 [ 27.168483][ T350] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 27.168513][ T350] kvm_vcpu_ioctl+0x96f/0xee0 [ 27.168532][ T350] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 27.168552][ T350] ? __cfi_vfs_write+0x10/0x10 [ 27.168573][ T350] ? __kasan_check_write+0x18/0x20 [ 27.168604][ T350] ? mutex_unlock+0x8b/0x240 [ 27.168624][ T350] ? __cfi_mutex_unlock+0x10/0x10 [ 27.168643][ T350] ? __fget_files+0x2c5/0x340 [ 27.168668][ T350] ? __fget_files+0x2c5/0x340 [ 27.168691][ T350] ? bpf_lsm_file_ioctl+0xd/0x20 [ 27.168720][ T350] ? security_file_ioctl+0x34/0xd0 [ 27.168743][ T350] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 27.168762][ T350] __se_sys_ioctl+0x135/0x1b0 [ 27.168786][ T350] __x64_sys_ioctl+0x7f/0xa0 [ 27.168809][ T350] x64_sys_call+0x1878/0x2ee0 [ 27.168843][ T350] do_syscall_64+0x58/0xf0 [ 27.168871][ T350] ? clear_bhb_loop+0x50/0xa0 [ 27.168896][ T350] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 27.168918][ T350] RIP: 0033:0x7f6e1f98f6c9 [ 27.168945][ T350] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 27.168963][ T350] RSP: 002b:00007f6e20791038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 27.168992][ T350] RAX: ffffffffffffffda RBX: 00007f6e1fbe5fa0 RCX: 00007f6e1f98f6c9 [ 27.169009][ T350] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000007 [ 27.169027][ T350] RBP: 00007f6e20791090 R08: 0000000000000000 R09: 0000000000000000 [ 27.169040][ T350] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 27.169052][ T350] R13: 00007f6e1fbe6038 R14: 00007f6e1fbe5fa0 R15: 00007ffdefa53fe8 [ 27.169071][ T350] [ 27.677906][ T380] Zero length message leads to an empty skb [ 27.882651][ T410] FAULT_INJECTION: forcing a failure. [ 27.882651][ T410] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 27.904138][ T410] CPU: 1 UID: 0 PID: 410 Comm: syz.3.37 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 27.904176][ T410] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 27.904189][ T410] Call Trace: [ 27.904196][ T410] [ 27.904204][ T410] __dump_stack+0x21/0x30 [ 27.904239][ T410] dump_stack_lvl+0x10c/0x190 [ 27.904268][ T410] ? __cfi_dump_stack_lvl+0x10/0x10 [ 27.904297][ T410] ? __kasan_check_write+0x18/0x20 [ 27.904331][ T410] ? check_stack_object+0x107/0x140 [ 27.904353][ T410] dump_stack+0x19/0x20 [ 27.904380][ T410] should_fail_ex+0x3d9/0x530 [ 27.904405][ T410] should_fail+0xf/0x20 [ 27.904425][ T410] should_fail_usercopy+0x1e/0x30 [ 27.904450][ T410] _copy_from_user+0x22/0xb0 [ 27.904478][ T410] __x64_sys_sched_setaffinity+0xf8/0x150 [ 27.904506][ T410] ? __cfi___x64_sys_sched_setaffinity+0x10/0x10 [ 27.904534][ T410] ? __kasan_check_read+0x15/0x20 [ 27.904568][ T410] x64_sys_call+0x27b8/0x2ee0 [ 27.904601][ T410] do_syscall_64+0x58/0xf0 [ 27.904631][ T410] ? clear_bhb_loop+0x50/0xa0 [ 27.904656][ T410] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 27.904680][ T410] RIP: 0033:0x7fbd05f8f6c9 [ 27.904697][ T410] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 27.904716][ T410] RSP: 002b:00007fbd06e7a038 EFLAGS: 00000246 ORIG_RAX: 00000000000000cb [ 27.904739][ T410] RAX: ffffffffffffffda RBX: 00007fbd061e5fa0 RCX: 00007fbd05f8f6c9 [ 27.904756][ T410] RDX: 00002000000002c0 RSI: 0000000000000008 RDI: 0000000000000000 [ 27.904770][ T410] RBP: 00007fbd06e7a090 R08: 0000000000000000 R09: 0000000000000000 [ 27.904784][ T410] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 27.904797][ T410] R13: 00007fbd061e6038 R14: 00007fbd061e5fa0 R15: 00007ffd92d478a8 [ 27.904816][ T410] [ 27.988310][ T420] FAULT_INJECTION: forcing a failure. [ 27.988310][ T420] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 28.179428][ T420] CPU: 1 UID: 0 PID: 420 Comm: syz.1.42 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 28.179464][ T420] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 28.179478][ T420] Call Trace: [ 28.179485][ T420] [ 28.179494][ T420] __dump_stack+0x21/0x30 [ 28.179530][ T420] dump_stack_lvl+0x10c/0x190 [ 28.179560][ T420] ? __cfi_dump_stack_lvl+0x10/0x10 [ 28.179591][ T420] ? vfs_write+0x93e/0xf30 [ 28.179612][ T420] dump_stack+0x19/0x20 [ 28.179641][ T420] should_fail_ex+0x3d9/0x530 [ 28.179664][ T420] should_fail+0xf/0x20 [ 28.179685][ T420] should_fail_usercopy+0x1e/0x30 [ 28.179709][ T420] _copy_from_user+0x22/0xb0 [ 28.179738][ T420] __se_sys_prlimit64+0x12a/0x7c0 [ 28.179773][ T420] ? __x64_sys_prlimit64+0xc0/0xc0 [ 28.179805][ T420] ? ksys_write+0x1ef/0x250 [ 28.179825][ T420] ? __cfi_ksys_write+0x10/0x10 [ 28.179847][ T420] __x64_sys_prlimit64+0x9f/0xc0 [ 28.179880][ T420] x64_sys_call+0x1f31/0x2ee0 [ 28.179912][ T420] do_syscall_64+0x58/0xf0 [ 28.179941][ T420] ? clear_bhb_loop+0x50/0xa0 [ 28.179966][ T420] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 28.179989][ T420] RIP: 0033:0x7fdd1c38f6c9 [ 28.180007][ T420] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 28.180025][ T420] RSP: 002b:00007fdd1d1c6038 EFLAGS: 00000246 ORIG_RAX: 000000000000012e [ 28.180049][ T420] RAX: ffffffffffffffda RBX: 00007fdd1c5e5fa0 RCX: 00007fdd1c38f6c9 [ 28.180066][ T420] RDX: 0000200000000040 RSI: 000000000000000e RDI: 0000000000000000 [ 28.180080][ T420] RBP: 00007fdd1d1c6090 R08: 0000000000000000 R09: 0000000000000000 [ 28.180094][ T420] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 28.180107][ T420] R13: 00007fdd1c5e6038 R14: 00007fdd1c5e5fa0 R15: 00007ffd0f1a8b08 [ 28.180125][ T420] [ 28.188863][ T36] kauditd_printk_skb: 43 callbacks suppressed [ 28.188881][ T36] audit: type=1400 audit(1763155630.230:117): avc: denied { create } for pid=427 comm="syz.3.46" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 28.316017][ T436] FAULT_INJECTION: forcing a failure. [ 28.316017][ T436] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 28.331863][ T36] audit: type=1400 audit(1763155630.360:118): avc: denied { create } for pid=434 comm="syz.3.51" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 28.386213][ T436] CPU: 0 UID: 0 PID: 436 Comm: syz.2.50 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 28.386255][ T436] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 28.386271][ T436] Call Trace: [ 28.386278][ T436] [ 28.386289][ T436] __dump_stack+0x21/0x30 [ 28.386329][ T436] dump_stack_lvl+0x10c/0x190 [ 28.386363][ T436] ? __cfi_dump_stack_lvl+0x10/0x10 [ 28.386397][ T436] ? kernel_text_address+0xa9/0xe0 [ 28.386429][ T436] dump_stack+0x19/0x20 [ 28.386461][ T436] should_fail_ex+0x3d9/0x530 [ 28.386486][ T436] should_fail+0xf/0x20 [ 28.386509][ T436] should_fail_usercopy+0x1e/0x30 [ 28.386536][ T436] _copy_from_user+0x22/0xb0 [ 28.386566][ T436] ___sys_sendmsg+0x159/0x2a0 [ 28.386604][ T436] ? __sys_sendmsg+0x280/0x280 [ 28.386639][ T436] ? kstrtouint+0x78/0xf0 [ 28.386671][ T436] __sys_sendmmsg+0x271/0x470 [ 28.386711][ T436] ? __cfi___sys_sendmmsg+0x10/0x10 [ 28.386754][ T436] ? __cfi_ksys_write+0x10/0x10 [ 28.386780][ T436] __x64_sys_sendmmsg+0xa4/0xc0 [ 28.386819][ T436] x64_sys_call+0xfec/0x2ee0 [ 28.386856][ T436] do_syscall_64+0x58/0xf0 [ 28.386886][ T436] ? clear_bhb_loop+0x50/0xa0 [ 28.386913][ T436] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 28.386940][ T436] RIP: 0033:0x7ffa2218f6c9 [ 28.386961][ T436] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 28.386981][ T436] RSP: 002b:00007ffa2309a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 28.387008][ T436] RAX: ffffffffffffffda RBX: 00007ffa223e5fa0 RCX: 00007ffa2218f6c9 [ 28.387027][ T436] RDX: 0000000000000001 RSI: 0000200000005200 RDI: 0000000000000007 [ 28.387044][ T436] RBP: 00007ffa2309a090 R08: 0000000000000000 R09: 0000000000000000 [ 28.387060][ T436] R10: 0000000020048000 R11: 0000000000000246 R12: 0000000000000001 [ 28.387075][ T436] R13: 00007ffa223e6038 R14: 00007ffa223e5fa0 R15: 00007ffc46874448 [ 28.387097][ T436] [ 28.655250][ T36] audit: type=1400 audit(1763155630.370:119): avc: denied { setopt } for pid=434 comm="syz.3.51" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 29.998497][ T498] FAULT_INJECTION: forcing a failure. [ 29.998497][ T498] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 30.017718][ T498] CPU: 0 UID: 0 PID: 498 Comm: syz.1.82 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 30.017750][ T498] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 30.017762][ T498] Call Trace: [ 30.017768][ T498] [ 30.017776][ T498] __dump_stack+0x21/0x30 [ 30.017808][ T498] dump_stack_lvl+0x10c/0x190 [ 30.017834][ T498] ? __cfi_dump_stack_lvl+0x10/0x10 [ 30.017862][ T498] dump_stack+0x19/0x20 [ 30.017887][ T498] should_fail_ex+0x3d9/0x530 [ 30.017907][ T498] should_fail+0xf/0x20 [ 30.017925][ T498] should_fail_usercopy+0x1e/0x30 [ 30.017947][ T498] _copy_from_user+0x22/0xb0 [ 30.017971][ T498] __x64_sys_rt_sigaction+0x152/0x270 [ 30.017992][ T498] ? __cfi___x64_sys_rt_sigaction+0x10/0x10 [ 30.018013][ T498] ? __kasan_check_read+0x15/0x20 [ 30.018043][ T498] x64_sys_call+0x1bed/0x2ee0 [ 30.018071][ T498] do_syscall_64+0x58/0xf0 [ 30.018097][ T498] ? clear_bhb_loop+0x50/0xa0 [ 30.018118][ T498] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 30.018138][ T498] RIP: 0033:0x7fdd1c38f6c9 [ 30.018154][ T498] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 30.018170][ T498] RSP: 002b:00007fdd1d1c6038 EFLAGS: 00000246 ORIG_RAX: 000000000000000d [ 30.018190][ T498] RAX: ffffffffffffffda RBX: 00007fdd1c5e5fa0 RCX: 00007fdd1c38f6c9 [ 30.018205][ T498] RDX: 0000000000000000 RSI: 0000200000000180 RDI: 000000000000000d [ 30.018218][ T498] RBP: 00007fdd1d1c6090 R08: 0000200000000300 R09: 0000000000000000 [ 30.018230][ T498] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000000001 [ 30.018242][ T498] R13: 00007fdd1c5e6038 R14: 00007fdd1c5e5fa0 R15: 00007ffd0f1a8b08 [ 30.018258][ T498] [ 31.473258][ T36] audit: type=1400 audit(1763155633.540:120): avc: denied { read append } for pid=573 comm="syz.1.117" name="event0" dev="devtmpfs" ino=192 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 31.529210][ T36] audit: type=1400 audit(1763155633.540:121): avc: denied { open } for pid=573 comm="syz.1.117" path="/dev/input/event0" dev="devtmpfs" ino=192 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 31.589098][ T36] audit: type=1400 audit(1763155633.570:122): avc: denied { ioctl } for pid=573 comm="syz.1.117" path="/dev/input/event0" dev="devtmpfs" ino=192 ioctlcmd=0x4503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 31.844093][ T590] FAULT_INJECTION: forcing a failure. [ 31.844093][ T590] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 31.889336][ T590] CPU: 1 UID: 0 PID: 590 Comm: syz.0.126 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 31.889373][ T590] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 31.889387][ T590] Call Trace: [ 31.889394][ T590] [ 31.889403][ T590] __dump_stack+0x21/0x30 [ 31.889440][ T590] dump_stack_lvl+0x10c/0x190 [ 31.889470][ T590] ? __cfi_dump_stack_lvl+0x10/0x10 [ 31.889503][ T590] dump_stack+0x19/0x20 [ 31.889531][ T590] should_fail_ex+0x3d9/0x530 [ 31.889555][ T590] should_fail+0xf/0x20 [ 31.889575][ T590] should_fail_usercopy+0x1e/0x30 [ 31.889599][ T590] _copy_from_user+0x22/0xb0 [ 31.889637][ T590] update_filter+0x95/0x500 [ 31.889662][ T590] ? set_offload+0x1f0/0x1f0 [ 31.889685][ T590] ? __cfi_selinux_file_ioctl+0x10/0x10 [ 31.889713][ T590] __tun_chr_ioctl+0xc24/0x1f10 [ 31.889738][ T590] ? tun_flow_create+0x410/0x410 [ 31.889761][ T590] ? __fget_files+0x2c5/0x340 [ 31.889786][ T590] ? __fget_files+0x2c5/0x340 [ 31.889811][ T590] tun_chr_ioctl+0x2e/0x40 [ 31.889833][ T590] ? __cfi_tun_chr_ioctl+0x10/0x10 [ 31.889855][ T590] __se_sys_ioctl+0x135/0x1b0 [ 31.889880][ T590] __x64_sys_ioctl+0x7f/0xa0 [ 31.889904][ T590] x64_sys_call+0x1878/0x2ee0 [ 31.889937][ T590] do_syscall_64+0x58/0xf0 [ 31.889965][ T590] ? clear_bhb_loop+0x50/0xa0 [ 31.889989][ T590] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 31.890012][ T590] RIP: 0033:0x7f6e1f98f6c9 [ 31.890030][ T590] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 31.890049][ T590] RSP: 002b:00007f6e20791038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 31.890073][ T590] RAX: ffffffffffffffda RBX: 00007f6e1fbe5fa0 RCX: 00007f6e1f98f6c9 [ 31.890088][ T590] RDX: 0000000000000000 RSI: 00000000400454d1 RDI: 0000000000000006 [ 31.890101][ T590] RBP: 00007f6e20791090 R08: 0000000000000000 R09: 0000000000000000 [ 31.890114][ T590] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 31.890127][ T590] R13: 00007f6e1fbe6038 R14: 00007f6e1fbe5fa0 R15: 00007ffdefa53fe8 [ 31.890145][ T590] [ 32.692154][ T36] audit: type=1400 audit(1763155634.760:123): avc: denied { setattr } for pid=630 comm="syz.1.146" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 32.797766][ T36] audit: type=1400 audit(1763155634.860:124): avc: denied { setopt } for pid=638 comm="syz.1.150" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 32.849079][ T36] audit: type=1400 audit(1763155634.880:125): avc: denied { ioctl } for pid=638 comm="syz.1.150" path="socket:[5046]" dev="sockfs" ino=5046 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 32.893943][ T36] audit: type=1400 audit(1763155634.880:126): avc: denied { write } for pid=638 comm="syz.1.150" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 33.874057][ T673] FAULT_INJECTION: forcing a failure. [ 33.874057][ T673] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 33.899090][ T673] CPU: 1 UID: 0 PID: 673 Comm: syz.3.166 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 33.899127][ T673] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 33.899141][ T673] Call Trace: [ 33.899148][ T673] [ 33.899157][ T673] __dump_stack+0x21/0x30 [ 33.899192][ T673] dump_stack_lvl+0x10c/0x190 [ 33.899222][ T673] ? __cfi_dump_stack_lvl+0x10/0x10 [ 33.899253][ T673] ? __kasan_check_read+0x15/0x20 [ 33.899289][ T673] dump_stack+0x19/0x20 [ 33.899317][ T673] should_fail_ex+0x3d9/0x530 [ 33.899340][ T673] should_fail+0xf/0x20 [ 33.899360][ T673] should_fail_usercopy+0x1e/0x30 [ 33.899393][ T673] __kvm_read_guest_page+0x177/0x210 [ 33.899416][ T673] kvm_vcpu_read_guest_page+0x31a/0x400 [ 33.899441][ T673] kvm_fetch_guest_virt+0x146/0x190 [ 33.899475][ T673] ? __cfi_kvm_fetch_guest_virt+0x10/0x10 [ 33.899508][ T673] __do_insn_fetch_bytes+0x321/0x730 [ 33.899532][ T673] ? x86_decode_insn+0x4fb0/0x4fb0 [ 33.899556][ T673] x86_decode_insn+0x33b/0x4fb0 [ 33.899581][ T673] ? kernel_text_address+0xa9/0xe0 [ 33.899610][ T673] ? __cfi_x86_decode_insn+0x10/0x10 [ 33.899642][ T673] ? __kasan_check_write+0x18/0x20 [ 33.899673][ T673] ? vmx_read_guest_seg_ar+0x1c8/0x350 [ 33.899700][ T673] ? __asan_memset+0x39/0x50 [ 33.899718][ T673] ? init_decode_cache+0x7c/0x90 [ 33.899739][ T673] ? init_emulate_ctxt+0x410/0x540 [ 33.899763][ T673] ? kvm_inject_realmode_interrupt+0x2e0/0x2e0 [ 33.899790][ T673] x86_decode_emulated_instruction+0x66/0x190 [ 33.899816][ T673] x86_emulate_instruction+0x2d3/0x1870 [ 33.899841][ T673] ? __cfi_rcu_note_context_switch+0x10/0x10 [ 33.899868][ T673] ? __kernel_text_address+0x11/0x40 [ 33.899894][ T673] ? unwind_get_return_address+0x51/0x90 [ 33.899920][ T673] ? clear_bhb_loop+0x50/0xa0 [ 33.899944][ T673] ? clear_bhb_loop+0x50/0xa0 [ 33.899966][ T673] ? clear_bhb_loop+0x50/0xa0 [ 33.899989][ T673] ? clear_bhb_loop+0x50/0xa0 [ 33.900012][ T673] ? clear_bhb_loop+0x12/0xa0 [ 33.900037][ T673] kvm_emulate_instruction+0x26/0x30 [ 33.900061][ T673] handle_io+0x10f/0x150 [ 33.900082][ T673] ? __cfi_handle_io+0x10/0x10 [ 33.900103][ T673] vmx_handle_exit+0x12c2/0x1b40 [ 33.900133][ T673] ? __cfi_vmx_vcpu_run+0x10/0x10 [ 33.900163][ T673] ? kasan_save_track+0x4f/0x80 [ 33.900186][ T673] ? vmx_handle_exit_irqoff+0xe9/0x7a0 [ 33.900218][ T673] vcpu_run+0x4bd0/0x7830 [ 33.900243][ T673] ? x64_sys_call+0xe69/0x2ee0 [ 33.900286][ T673] ? vmx_read_guest_seg_base+0x17c/0x320 [ 33.900315][ T673] ? signal_pending+0xc0/0xc0 [ 33.900342][ T673] ? complete_fast_pio_in+0x213/0x2f0 [ 33.900378][ T673] ? fpregs_mark_activate+0x69/0x160 [ 33.900401][ T673] ? __cfi_complete_fast_pio_in+0x10/0x10 [ 33.900431][ T673] ? fpu_swap_kvm_fpstate+0x93/0x5f0 [ 33.900456][ T673] kvm_arch_vcpu_ioctl_run+0x101a/0x1aa0 [ 33.900486][ T673] ? __cfi_kvm_arch_vcpu_ioctl_run+0x10/0x10 [ 33.900514][ T673] ? kstrtoull+0x13b/0x1e0 [ 33.900534][ T673] ? kstrtouint+0x78/0xf0 [ 33.900552][ T673] ? ioctl_has_perm+0x1aa/0x4d0 [ 33.900578][ T673] ? __asan_memcpy+0x5a/0x80 [ 33.900597][ T673] ? ioctl_has_perm+0x3e0/0x4d0 [ 33.900622][ T673] ? has_cap_mac_admin+0xd0/0xd0 [ 33.900647][ T673] ? __kasan_check_write+0x18/0x20 [ 33.900679][ T673] ? mutex_lock_killable+0x92/0x1c0 [ 33.900700][ T673] ? __cfi_mutex_lock_killable+0x10/0x10 [ 33.900721][ T673] ? proc_fail_nth_write+0x17e/0x210 [ 33.900750][ T673] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 33.900780][ T673] kvm_vcpu_ioctl+0x96f/0xee0 [ 33.900800][ T673] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 33.900820][ T673] ? __cfi_vfs_write+0x10/0x10 [ 33.900839][ T673] ? __kasan_check_write+0x18/0x20 [ 33.900870][ T673] ? mutex_unlock+0x8b/0x240 [ 33.900889][ T673] ? __cfi_mutex_unlock+0x10/0x10 [ 33.900908][ T673] ? __fget_files+0x2c5/0x340 [ 33.900933][ T673] ? __fget_files+0x2c5/0x340 [ 33.900956][ T673] ? bpf_lsm_file_ioctl+0xd/0x20 [ 33.900985][ T673] ? security_file_ioctl+0x34/0xd0 [ 33.901009][ T673] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 33.901028][ T673] __se_sys_ioctl+0x135/0x1b0 [ 33.901052][ T673] __x64_sys_ioctl+0x7f/0xa0 [ 33.901075][ T673] x64_sys_call+0x1878/0x2ee0 [ 33.901106][ T673] do_syscall_64+0x58/0xf0 [ 33.901133][ T673] ? clear_bhb_loop+0x50/0xa0 [ 33.901157][ T673] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 33.901179][ T673] RIP: 0033:0x7fbd05f8f6c9 [ 33.901197][ T673] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 33.901215][ T673] RSP: 002b:00007fbd06e7a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 33.901239][ T673] RAX: ffffffffffffffda RBX: 00007fbd061e5fa0 RCX: 00007fbd05f8f6c9 [ 33.901255][ T673] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000008 [ 33.901269][ T673] RBP: 00007fbd06e7a090 R08: 0000000000000000 R09: 0000000000000000 [ 33.901282][ T673] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 33.901295][ T673] R13: 00007fbd061e6038 R14: 00007fbd061e5fa0 R15: 00007ffd92d478a8 [ 33.901313][ T673] [ 36.191809][ T750] FAULT_INJECTION: forcing a failure. [ 36.191809][ T750] name failslab, interval 1, probability 0, space 0, times 1 [ 36.219118][ T750] CPU: 1 UID: 0 PID: 750 Comm: syz.1.204 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 36.219156][ T750] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 36.219169][ T750] Call Trace: [ 36.219176][ T750] [ 36.219185][ T750] __dump_stack+0x21/0x30 [ 36.219220][ T750] dump_stack_lvl+0x10c/0x190 [ 36.219249][ T750] ? __cfi_dump_stack_lvl+0x10/0x10 [ 36.219280][ T750] ? __kasan_check_write+0x18/0x20 [ 36.219313][ T750] ? proc_fail_nth_write+0x17e/0x210 [ 36.219342][ T750] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 36.219372][ T750] dump_stack+0x19/0x20 [ 36.219400][ T750] should_fail_ex+0x3d9/0x530 [ 36.219432][ T750] should_failslab+0xac/0x100 [ 36.219457][ T750] kmem_cache_alloc_noprof+0x42/0x430 [ 36.219477][ T750] ? getname_flags+0xc6/0x710 [ 36.219500][ T750] getname_flags+0xc6/0x710 [ 36.219521][ T750] ? build_open_flags+0x487/0x600 [ 36.219550][ T750] getname+0x1b/0x30 [ 36.219581][ T750] do_sys_openat2+0xcb/0x1c0 [ 36.219608][ T750] ? fput+0x1a5/0x240 [ 36.219632][ T750] ? do_sys_open+0x100/0x100 [ 36.219659][ T750] ? ksys_write+0x1ef/0x250 [ 36.219678][ T750] ? __cfi_ksys_write+0x10/0x10 [ 36.219699][ T750] __x64_sys_openat+0x13a/0x170 [ 36.219727][ T750] x64_sys_call+0xe69/0x2ee0 [ 36.219758][ T750] do_syscall_64+0x58/0xf0 [ 36.219802][ T750] ? clear_bhb_loop+0x50/0xa0 [ 36.219827][ T750] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 36.219851][ T750] RIP: 0033:0x7fdd1c38df10 [ 36.219869][ T750] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 69 95 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 bc 95 02 00 8b 44 [ 36.219887][ T750] RSP: 002b:00007fdd1d1c5f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 36.219911][ T750] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007fdd1c38df10 [ 36.219927][ T750] RDX: 0000000000000002 RSI: 00007fdd1d1c5fa0 RDI: 00000000ffffff9c [ 36.219942][ T750] RBP: 00007fdd1d1c5fa0 R08: 0000000000000000 R09: 0000000000000000 [ 36.219956][ T750] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 36.219969][ T750] R13: 00007fdd1c5e6038 R14: 00007fdd1c5e5fa0 R15: 00007ffd0f1a8b08 [ 36.219989][ T750] [ 36.772423][ T774] FAULT_INJECTION: forcing a failure. [ 36.772423][ T774] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 36.805892][ T774] CPU: 1 UID: 0 PID: 774 Comm: syz.1.215 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 36.805929][ T774] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 36.805942][ T774] Call Trace: [ 36.805950][ T774] [ 36.805959][ T774] __dump_stack+0x21/0x30 [ 36.805994][ T774] dump_stack_lvl+0x10c/0x190 [ 36.806024][ T774] ? __cfi_dump_stack_lvl+0x10/0x10 [ 36.806055][ T774] ? kstrtoull+0x13b/0x1e0 [ 36.806076][ T774] dump_stack+0x19/0x20 [ 36.806104][ T774] should_fail_ex+0x3d9/0x530 [ 36.806128][ T774] should_fail+0xf/0x20 [ 36.806148][ T774] should_fail_usercopy+0x1e/0x30 [ 36.806173][ T774] _copy_from_user+0x22/0xb0 [ 36.806201][ T774] ___sys_sendmsg+0x159/0x2a0 [ 36.806235][ T774] ? __sys_sendmsg+0x280/0x280 [ 36.806268][ T774] ? proc_fail_nth_write+0x17e/0x210 [ 36.806298][ T774] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 36.806336][ T774] __x64_sys_sendmsg+0x1eb/0x2c0 [ 36.806376][ T774] ? fput+0x1a5/0x240 [ 36.806412][ T774] ? __cfi___x64_sys_sendmsg+0x10/0x10 [ 36.806445][ T774] ? ksys_write+0x1ef/0x250 [ 36.806467][ T774] ? __kasan_check_read+0x15/0x20 [ 36.806508][ T774] x64_sys_call+0x2a4c/0x2ee0 [ 36.806541][ T774] do_syscall_64+0x58/0xf0 [ 36.806569][ T774] ? clear_bhb_loop+0x50/0xa0 [ 36.806594][ T774] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 36.806617][ T774] RIP: 0033:0x7fdd1c38f6c9 [ 36.806636][ T774] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 36.806654][ T774] RSP: 002b:00007fdd1d1c6038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 36.806678][ T774] RAX: ffffffffffffffda RBX: 00007fdd1c5e5fa0 RCX: 00007fdd1c38f6c9 [ 36.806696][ T774] RDX: 0000000000000000 RSI: 0000200000000700 RDI: 0000000000000005 [ 36.806710][ T774] RBP: 00007fdd1d1c6090 R08: 0000000000000000 R09: 0000000000000000 [ 36.806724][ T774] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 36.806738][ T774] R13: 00007fdd1c5e6038 R14: 00007fdd1c5e5fa0 R15: 00007ffd0f1a8b08 [ 36.806757][ T774] [ 39.096759][ T885] FAULT_INJECTION: forcing a failure. [ 39.096759][ T885] name failslab, interval 1, probability 0, space 0, times 0 [ 39.112537][ T36] audit: type=1400 audit(1763155641.180:127): avc: denied { create } for pid=880 comm="syz.1.268" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 39.131444][ T885] CPU: 0 UID: 0 PID: 885 Comm: syz.3.269 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 39.131488][ T885] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 39.131503][ T885] Call Trace: [ 39.131511][ T885] [ 39.131521][ T885] __dump_stack+0x21/0x30 [ 39.131562][ T885] dump_stack_lvl+0x10c/0x190 [ 39.131604][ T885] ? __cfi_dump_stack_lvl+0x10/0x10 [ 39.131642][ T885] dump_stack+0x19/0x20 [ 39.131673][ T885] should_fail_ex+0x3d9/0x530 [ 39.131700][ T885] should_failslab+0xac/0x100 [ 39.131729][ T885] __kmalloc_node_track_caller_noprof+0x68/0x520 [ 39.131763][ T885] ? rust_helper_krealloc+0x33/0xd0 [ 39.131803][ T885] krealloc_noprof+0x8d/0x130 [ 39.131828][ T885] rust_helper_krealloc+0x33/0xd0 [ 39.131865][ T885] ? _RNvMNtNtCs43vyB533jt3_6kernel5alloc9allocatorNtB2_11ReallocFunc4call+0x70/0xc0 [ 39.131900][ T885] _RNvMNtNtCs43vyB533jt3_6kernel5alloc9allocatorNtB2_11ReallocFunc4call+0x8e/0xc0 [ 39.131935][ T885] _RNvMs4_NtCs5gLWsBERDPK_16rust_binder_main7processNtB5_7Process18get_current_thread+0x45a/0x1400 [ 39.131969][ T885] ? inode_init_always_gfp+0x756/0x9e0 [ 39.131997][ T885] ? alloc_inode+0xc5/0x270 [ 39.132025][ T885] ? proc_pident_instantiate+0x6d/0x2c0 [ 39.132054][ T885] ? proc_pident_lookup+0x1c7/0x270 [ 39.132081][ T885] ? path_openat+0x1301/0x34b0 [ 39.132112][ T885] ? do_sys_openat2+0x12c/0x1c0 [ 39.132143][ T885] ? __x64_sys_openat+0x13a/0x170 [ 39.132176][ T885] ? x64_sys_call+0xe69/0x2ee0 [ 39.132224][ T885] ? do_syscall_64+0x58/0xf0 [ 39.132256][ T885] ? entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 39.132286][ T885] ? __cfi__RNvMs4_NtCs5gLWsBERDPK_16rust_binder_main7processNtB5_7Process18get_current_thread+0x10/0x10 [ 39.132321][ T885] ? avc_has_perm_noaudit+0x268/0x360 [ 39.132356][ T885] ? __asan_memcpy+0x5a/0x80 [ 39.132378][ T885] ? avc_has_perm_noaudit+0x286/0x360 [ 39.132414][ T885] ? avc_has_perm+0x144/0x220 [ 39.132448][ T885] ? __cfi_avc_has_perm+0x10/0x10 [ 39.132480][ T885] ? kasan_save_alloc_info+0x40/0x50 [ 39.132519][ T885] ? selinux_file_open+0x457/0x610 [ 39.132549][ T885] _RNvMs6_NtCs5gLWsBERDPK_16rust_binder_main7processNtB5_7Process5ioctl+0x1a7/0x2cf0 [ 39.132585][ T885] ? avc_has_extended_perms+0x7c7/0xdd0 [ 39.132620][ T885] ? __asan_memcpy+0x5a/0x80 [ 39.132641][ T885] ? avc_has_extended_perms+0x921/0xdd0 [ 39.132676][ T885] ? __cfi__RNvMs6_NtCs5gLWsBERDPK_16rust_binder_main7processNtB5_7Process5ioctl+0x10/0x10 [ 39.132711][ T885] ? do_vfs_ioctl+0xeda/0x1e30 [ 39.132738][ T885] ? arch_stack_walk+0x10b/0x170 [ 39.132761][ T885] ? __ia32_compat_sys_ioctl+0x850/0x850 [ 39.132791][ T885] ? _parse_integer+0x2e/0x40 [ 39.132827][ T885] ? ioctl_has_perm+0x384/0x4d0 [ 39.132852][ T885] ? has_cap_mac_admin+0xd0/0xd0 [ 39.132880][ T885] ? proc_fail_nth_write+0x17e/0x210 [ 39.132914][ T885] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 39.132948][ T885] ? selinux_file_ioctl+0x6e0/0x1360 [ 39.132979][ T885] ? vfs_write+0x93e/0xf30 [ 39.133000][ T885] ? __cfi_selinux_file_ioctl+0x10/0x10 [ 39.133032][ T885] ? __cfi_vfs_write+0x10/0x10 [ 39.133055][ T885] ? __kasan_check_write+0x18/0x20 [ 39.133092][ T885] ? mutex_unlock+0x8b/0x240 [ 39.133116][ T885] ? __cfi_mutex_unlock+0x10/0x10 [ 39.133137][ T885] ? __fget_files+0x2c5/0x340 [ 39.133166][ T885] ? __fget_files+0x2c5/0x340 [ 39.133207][ T885] _RNvCs5gLWsBERDPK_16rust_binder_main26rust_binder_unlocked_ioctl+0xa0/0x100 [ 39.133244][ T885] ? __se_sys_ioctl+0x114/0x1b0 [ 39.133271][ T885] ? __cfi__RNvCs5gLWsBERDPK_16rust_binder_main26rust_binder_unlocked_ioctl+0x10/0x10 [ 39.133309][ T885] __se_sys_ioctl+0x135/0x1b0 [ 39.133337][ T885] __x64_sys_ioctl+0x7f/0xa0 [ 39.133362][ T885] x64_sys_call+0x1878/0x2ee0 [ 39.133400][ T885] do_syscall_64+0x58/0xf0 [ 39.133430][ T885] ? clear_bhb_loop+0x50/0xa0 [ 39.133458][ T885] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 39.133484][ T885] RIP: 0033:0x7fbd05f8f6c9 [ 39.133504][ T885] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 39.133524][ T885] RSP: 002b:00007fbd06e7a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 39.133552][ T885] RAX: ffffffffffffffda RBX: 00007fbd061e5fa0 RCX: 00007fbd05f8f6c9 [ 39.133573][ T885] RDX: 0000200000000240 RSI: 00000000c0306201 RDI: 0000000000000006 [ 39.133588][ T885] RBP: 00007fbd06e7a090 R08: 0000000000000000 R09: 0000000000000000 [ 39.133605][ T885] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 39.133620][ T885] R13: 00007fbd061e6038 R14: 00007fbd061e5fa0 R15: 00007ffd92d478a8 [ 39.133641][ T885] [ 39.539232][ T10] usb 3-1: new high-speed USB device number 2 using dummy_hcd [ 39.542133][ T36] audit: type=1400 audit(1763155641.210:128): avc: denied { write } for pid=880 comm="syz.1.268" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 39.619571][ T36] audit: type=1400 audit(1763155641.210:129): avc: denied { read } for pid=880 comm="syz.1.268" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 39.679076][ T10] usb 3-1: device descriptor read/64, error -71 [ 39.879059][ T36] audit: type=1400 audit(1763155641.940:130): avc: denied { ioctl } for pid=946 comm="syz.3.300" path="socket:[7650]" dev="sockfs" ino=7650 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 39.939149][ T10] usb 3-1: device descriptor read/64, error -71 [ 40.191153][ T10] usb 3-1: new high-speed USB device number 3 using dummy_hcd [ 40.258628][ T36] audit: type=1400 audit(1763155642.320:131): avc: denied { create } for pid=992 comm="syz.1.323" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 40.296692][ T36] audit: type=1400 audit(1763155642.320:132): avc: denied { write } for pid=992 comm="syz.1.323" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 40.339132][ T10] usb 3-1: device descriptor read/64, error -71 [ 40.589096][ T10] usb 3-1: device descriptor read/64, error -71 [ 40.712127][ T10] usb usb3-port1: attempt power cycle [ 40.877160][ T36] audit: type=1400 audit(1763155642.940:133): avc: denied { create } for pid=1032 comm="syz.3.341" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 40.928109][ T36] audit: type=1400 audit(1763155642.940:134): avc: denied { write } for pid=1032 comm="syz.3.341" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 41.079095][ T10] usb 3-1: new high-speed USB device number 4 using dummy_hcd [ 41.110157][ T10] usb 3-1: device descriptor read/8, error -71 [ 41.240095][ T10] usb 3-1: device descriptor read/8, error -71 [ 41.479097][ T10] usb 3-1: new high-speed USB device number 5 using dummy_hcd [ 41.510142][ T10] usb 3-1: device descriptor read/8, error -71 [ 41.649766][ T10] usb 3-1: device descriptor read/8, error -71 [ 41.759189][ T10] usb usb3-port1: unable to enumerate USB device [ 42.285625][ T1106] FAULT_INJECTION: forcing a failure. [ 42.285625][ T1106] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 42.299504][ T1106] CPU: 1 UID: 0 PID: 1106 Comm: syz.0.366 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 42.299541][ T1106] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 42.299555][ T1106] Call Trace: [ 42.299562][ T1106] [ 42.299570][ T1106] __dump_stack+0x21/0x30 [ 42.299605][ T1106] dump_stack_lvl+0x10c/0x190 [ 42.299635][ T1106] ? __cfi_dump_stack_lvl+0x10/0x10 [ 42.299665][ T1106] ? check_stack_object+0x12c/0x140 [ 42.299688][ T1106] dump_stack+0x19/0x20 [ 42.299717][ T1106] should_fail_ex+0x3d9/0x530 [ 42.299740][ T1106] should_fail+0xf/0x20 [ 42.299761][ T1106] should_fail_usercopy+0x1e/0x30 [ 42.299785][ T1106] _copy_to_user+0x24/0xa0 [ 42.299812][ T1106] simple_read_from_buffer+0xed/0x160 [ 42.299841][ T1106] proc_fail_nth_read+0x19e/0x210 [ 42.299871][ T1106] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 42.299901][ T1106] ? bpf_lsm_file_permission+0xd/0x20 [ 42.299942][ T1106] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 42.299971][ T1106] vfs_read+0x27d/0xc70 [ 42.299991][ T1106] ? __kasan_check_write+0x18/0x20 [ 42.300025][ T1106] ? __cfi_vfs_read+0x10/0x10 [ 42.300044][ T1106] ? __kasan_check_write+0x18/0x20 [ 42.300076][ T1106] ? mutex_lock+0x92/0x1c0 [ 42.300096][ T1106] ? __cfi_mutex_lock+0x10/0x10 [ 42.300116][ T1106] ? __fget_files+0x2c5/0x340 [ 42.300142][ T1106] ksys_read+0x141/0x250 [ 42.300162][ T1106] ? __cfi_ksys_read+0x10/0x10 [ 42.300183][ T1106] ? __kasan_check_read+0x15/0x20 [ 42.300216][ T1106] __x64_sys_read+0x7f/0x90 [ 42.300236][ T1106] x64_sys_call+0x2638/0x2ee0 [ 42.300269][ T1106] do_syscall_64+0x58/0xf0 [ 42.300297][ T1106] ? clear_bhb_loop+0x50/0xa0 [ 42.300322][ T1106] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 42.300345][ T1106] RIP: 0033:0x7f6e1f98e0dc [ 42.300363][ T1106] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 42.300382][ T1106] RSP: 002b:00007f6e20791030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 42.300406][ T1106] RAX: ffffffffffffffda RBX: 00007f6e1fbe5fa0 RCX: 00007f6e1f98e0dc [ 42.300422][ T1106] RDX: 000000000000000f RSI: 00007f6e207910a0 RDI: 0000000000000007 [ 42.300437][ T1106] RBP: 00007f6e20791090 R08: 0000000000000000 R09: 0000000000000000 [ 42.300451][ T1106] R10: 0000200000000540 R11: 0000000000000246 R12: 0000000000000001 [ 42.300465][ T1106] R13: 00007f6e1fbe6038 R14: 00007f6e1fbe5fa0 R15: 00007ffdefa53fe8 [ 42.300484][ T1106] [ 43.066012][ T1159] FAULT_INJECTION: forcing a failure. [ 43.066012][ T1159] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 43.091851][ T1159] CPU: 1 UID: 0 PID: 1159 Comm: syz.2.401 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 43.091887][ T1159] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 43.091902][ T1159] Call Trace: [ 43.091909][ T1159] [ 43.091918][ T1159] __dump_stack+0x21/0x30 [ 43.091954][ T1159] dump_stack_lvl+0x10c/0x190 [ 43.091984][ T1159] ? __cfi_dump_stack_lvl+0x10/0x10 [ 43.092015][ T1159] ? check_stack_object+0x12c/0x140 [ 43.092037][ T1159] dump_stack+0x19/0x20 [ 43.092065][ T1159] should_fail_ex+0x3d9/0x530 [ 43.092089][ T1159] should_fail+0xf/0x20 [ 43.092109][ T1159] should_fail_usercopy+0x1e/0x30 [ 43.092133][ T1159] _copy_to_user+0x24/0xa0 [ 43.092162][ T1159] simple_read_from_buffer+0xed/0x160 [ 43.092191][ T1159] proc_fail_nth_read+0x19e/0x210 [ 43.092220][ T1159] ? do_sigbus+0x91/0x190 [ 43.092253][ T1159] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 43.092281][ T1159] ? do_user_addr_fault+0xfe4/0x1200 [ 43.092313][ T1159] ? __cfi_blk_mq_flush_plug_list+0x10/0x10 [ 43.092348][ T1159] ? bpf_lsm_file_permission+0xd/0x20 [ 43.092379][ T1159] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 43.092408][ T1159] vfs_read+0x27d/0xc70 [ 43.092428][ T1159] ? exc_page_fault+0x66/0xc0 [ 43.092451][ T1159] ? __cfi_vfs_read+0x10/0x10 [ 43.092470][ T1159] ? __kasan_check_write+0x18/0x20 [ 43.092502][ T1159] ? mutex_lock+0x92/0x1c0 [ 43.092522][ T1159] ? __cfi_mutex_lock+0x10/0x10 [ 43.092542][ T1159] ? __fget_files+0x2c5/0x340 [ 43.092576][ T1159] ksys_read+0x141/0x250 [ 43.092596][ T1159] ? __cfi_ksys_read+0x10/0x10 [ 43.092617][ T1159] ? __kasan_check_read+0x15/0x20 [ 43.092651][ T1159] __x64_sys_read+0x7f/0x90 [ 43.092671][ T1159] x64_sys_call+0x2638/0x2ee0 [ 43.092703][ T1159] do_syscall_64+0x58/0xf0 [ 43.092732][ T1159] ? clear_bhb_loop+0x50/0xa0 [ 43.092757][ T1159] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 43.092780][ T1159] RIP: 0033:0x7ffa2218e0dc [ 43.092798][ T1159] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 43.092818][ T1159] RSP: 002b:00007ffa2309a030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 43.092842][ T1159] RAX: ffffffffffffffda RBX: 00007ffa223e5fa0 RCX: 00007ffa2218e0dc [ 43.092859][ T1159] RDX: 000000000000000f RSI: 00007ffa2309a0a0 RDI: 0000000000000007 [ 43.092873][ T1159] RBP: 00007ffa2309a090 R08: 0000000000000000 R09: 0000000000000000 [ 43.092887][ T1159] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 43.092900][ T1159] R13: 00007ffa223e6038 R14: 00007ffa223e5fa0 R15: 00007ffc46874448 [ 43.092919][ T1159] [ 43.670644][ T36] audit: type=1400 audit(1763155645.740:135): avc: denied { mounton } for pid=1187 comm="syz.2.416" path="/63/file0" dev="tmpfs" ino=441 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 43.715029][ T36] audit: type=1400 audit(1763155645.780:136): avc: denied { unmount } for pid=292 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 43.904534][ T1204] rust_binder: Failure when writing BR_NOOP at beginning of buffer. [ 43.904559][ T1204] rust_binder: Read failure Err(EFAULT) in pid:320 [ 44.209806][ T36] audit: type=1400 audit(1763155646.280:137): avc: denied { create } for pid=1225 comm="syz.3.434" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 44.240154][ T1226] bridge0: entered allmulticast mode [ 44.246633][ T36] audit: type=1400 audit(1763155646.310:138): avc: denied { setopt } for pid=1225 comm="syz.3.434" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 44.247410][ T1226] netlink: 4 bytes leftover after parsing attributes in process `syz.3.434'. [ 44.296993][ T1230] FAULT_INJECTION: forcing a failure. [ 44.296993][ T1230] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 44.297561][ T1226] bridge_slave_1: left allmulticast mode [ 44.320436][ T1230] CPU: 0 UID: 0 PID: 1230 Comm: syz.1.435 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 44.320474][ T1230] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 44.320488][ T1230] Call Trace: [ 44.320496][ T1230] [ 44.320505][ T1230] __dump_stack+0x21/0x30 [ 44.320541][ T1230] dump_stack_lvl+0x10c/0x190 [ 44.320570][ T1230] ? __cfi_dump_stack_lvl+0x10/0x10 [ 44.320600][ T1230] ? check_stack_object+0x12c/0x140 [ 44.320622][ T1230] dump_stack+0x19/0x20 [ 44.320651][ T1230] should_fail_ex+0x3d9/0x530 [ 44.320675][ T1230] should_fail+0xf/0x20 [ 44.320695][ T1230] should_fail_usercopy+0x1e/0x30 [ 44.320728][ T1230] _copy_to_user+0x24/0xa0 [ 44.320757][ T1230] simple_read_from_buffer+0xed/0x160 [ 44.320786][ T1230] proc_fail_nth_read+0x19e/0x210 [ 44.320824][ T1230] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 44.320854][ T1230] ? bpf_lsm_file_permission+0xd/0x20 [ 44.320885][ T1230] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 44.320915][ T1230] vfs_read+0x27d/0xc70 [ 44.320933][ T1230] ? __kasan_check_write+0x18/0x20 [ 44.320967][ T1230] ? __cfi_down_write_killable+0x10/0x10 [ 44.320993][ T1230] ? __cfi_vfs_read+0x10/0x10 [ 44.321012][ T1230] ? __kasan_check_write+0x18/0x20 [ 44.321045][ T1230] ? mutex_lock+0x92/0x1c0 [ 44.321065][ T1230] ? __cfi_mutex_lock+0x10/0x10 [ 44.321085][ T1230] ? __fget_files+0x2c5/0x340 [ 44.321111][ T1230] ksys_read+0x141/0x250 [ 44.321131][ T1230] ? __cfi_ksys_read+0x10/0x10 [ 44.321152][ T1230] ? __kasan_check_read+0x15/0x20 [ 44.321185][ T1230] __x64_sys_read+0x7f/0x90 [ 44.321206][ T1230] x64_sys_call+0x2638/0x2ee0 [ 44.321238][ T1230] do_syscall_64+0x58/0xf0 [ 44.321266][ T1230] ? clear_bhb_loop+0x50/0xa0 [ 44.321291][ T1230] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 44.321315][ T1230] RIP: 0033:0x7fdd1c38e0dc [ 44.321333][ T1230] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 44.321350][ T1230] RSP: 002b:00007fdd1d1c6030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 44.321374][ T1230] RAX: ffffffffffffffda RBX: 00007fdd1c5e5fa0 RCX: 00007fdd1c38e0dc [ 44.321390][ T1230] RDX: 000000000000000f RSI: 00007fdd1d1c60a0 RDI: 0000000000000006 [ 44.321405][ T1230] RBP: 00007fdd1d1c6090 R08: 0000000000000000 R09: 0000000000000000 [ 44.321419][ T1230] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 44.321432][ T1230] R13: 00007fdd1c5e6038 R14: 00007fdd1c5e5fa0 R15: 00007ffd0f1a8b08 [ 44.321468][ T1230] [ 44.339126][ T1226] bridge_slave_1: left promiscuous mode [ 44.371040][ T36] audit: type=1400 audit(1763155646.430:139): avc: denied { listen } for pid=1231 comm="syz.1.436" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 44.372344][ T1226] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.619437][ T1226] bridge_slave_0: left allmulticast mode [ 44.625348][ T1226] bridge_slave_0: left promiscuous mode [ 44.636551][ T1226] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.657118][ T1226] bridge0 (unregistering): left allmulticast mode [ 44.877271][ T1252] FAULT_INJECTION: forcing a failure. [ 44.877271][ T1252] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 44.891595][ T1252] CPU: 1 UID: 0 PID: 1252 Comm: syz.0.446 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 44.891630][ T1252] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 44.891644][ T1252] Call Trace: [ 44.891651][ T1252] [ 44.891670][ T1252] __dump_stack+0x21/0x30 [ 44.891705][ T1252] dump_stack_lvl+0x10c/0x190 [ 44.891735][ T1252] ? __cfi_dump_stack_lvl+0x10/0x10 [ 44.891765][ T1252] ? check_stack_object+0x12c/0x140 [ 44.891786][ T1252] dump_stack+0x19/0x20 [ 44.891813][ T1252] should_fail_ex+0x3d9/0x530 [ 44.891836][ T1252] should_fail+0xf/0x20 [ 44.891856][ T1252] should_fail_usercopy+0x1e/0x30 [ 44.891881][ T1252] _copy_to_user+0x24/0xa0 [ 44.891908][ T1252] simple_read_from_buffer+0xed/0x160 [ 44.891937][ T1252] proc_fail_nth_read+0x19e/0x210 [ 44.891966][ T1252] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 44.891995][ T1252] ? bpf_lsm_file_permission+0xd/0x20 [ 44.892025][ T1252] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 44.892054][ T1252] vfs_read+0x27d/0xc70 [ 44.892075][ T1252] ? __cfi_vfs_read+0x10/0x10 [ 44.892093][ T1252] ? __kasan_check_write+0x18/0x20 [ 44.892126][ T1252] ? mutex_lock+0x92/0x1c0 [ 44.892146][ T1252] ? __cfi_mutex_lock+0x10/0x10 [ 44.892166][ T1252] ? __fget_files+0x2c5/0x340 [ 44.892192][ T1252] ksys_read+0x141/0x250 [ 44.892212][ T1252] ? __cfi_ksys_read+0x10/0x10 [ 44.892233][ T1252] ? __kasan_check_read+0x15/0x20 [ 44.892276][ T1252] __x64_sys_read+0x7f/0x90 [ 44.892294][ T1252] x64_sys_call+0x2638/0x2ee0 [ 44.892327][ T1252] do_syscall_64+0x58/0xf0 [ 44.892354][ T1252] ? clear_bhb_loop+0x50/0xa0 [ 44.892378][ T1252] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 44.892402][ T1252] RIP: 0033:0x7f6e1f98e0dc [ 44.892419][ T1252] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 44.892437][ T1252] RSP: 002b:00007f6e20791030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 44.892461][ T1252] RAX: ffffffffffffffda RBX: 00007f6e1fbe5fa0 RCX: 00007f6e1f98e0dc [ 44.892478][ T1252] RDX: 000000000000000f RSI: 00007f6e207910a0 RDI: 0000000000000009 [ 44.892492][ T1252] RBP: 00007f6e20791090 R08: 0000000000000000 R09: 0000000000000000 [ 44.892506][ T1252] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 44.892519][ T1252] R13: 00007f6e1fbe6038 R14: 00007f6e1fbe5fa0 R15: 00007ffdefa53fe8 [ 44.892538][ T1252] [ 45.385427][ T1291] process 'syz.1.463' launched './file1' with NULL argv: empty string added [ 45.428903][ T36] audit: type=1400 audit(1763155647.490:140): avc: denied { execute_no_trans } for pid=1290 comm="syz.1.463" path="/118/file1" dev="tmpfs" ino=779 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 46.063029][ T1333] FAULT_INJECTION: forcing a failure. [ 46.063029][ T1333] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 46.089113][ T1333] CPU: 1 UID: 0 PID: 1333 Comm: syz.1.484 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 46.089150][ T1333] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 46.089164][ T1333] Call Trace: [ 46.089195][ T1333] [ 46.089204][ T1333] __dump_stack+0x21/0x30 [ 46.089240][ T1333] dump_stack_lvl+0x10c/0x190 [ 46.089271][ T1333] ? __cfi_dump_stack_lvl+0x10/0x10 [ 46.089301][ T1333] ? kstrtoull+0x13b/0x1e0 [ 46.089321][ T1333] dump_stack+0x19/0x20 [ 46.089357][ T1333] should_fail_ex+0x3d9/0x530 [ 46.089380][ T1333] should_fail+0xf/0x20 [ 46.089400][ T1333] should_fail_usercopy+0x1e/0x30 [ 46.089425][ T1333] _copy_from_user+0x22/0xb0 [ 46.089452][ T1333] ___sys_sendmsg+0x159/0x2a0 [ 46.089486][ T1333] ? __sys_sendmsg+0x280/0x280 [ 46.089519][ T1333] ? proc_fail_nth_write+0x17e/0x210 [ 46.089550][ T1333] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 46.089595][ T1333] __x64_sys_sendmsg+0x1eb/0x2c0 [ 46.089628][ T1333] ? fput+0x1a5/0x240 [ 46.089655][ T1333] ? __cfi___x64_sys_sendmsg+0x10/0x10 [ 46.089688][ T1333] ? ksys_write+0x1ef/0x250 [ 46.089710][ T1333] ? __kasan_check_read+0x15/0x20 [ 46.089744][ T1333] x64_sys_call+0x2a4c/0x2ee0 [ 46.089777][ T1333] do_syscall_64+0x58/0xf0 [ 46.089806][ T1333] ? clear_bhb_loop+0x50/0xa0 [ 46.089831][ T1333] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 46.089855][ T1333] RIP: 0033:0x7fdd1c38f6c9 [ 46.089872][ T1333] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 46.089891][ T1333] RSP: 002b:00007fdd1d1c6038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 46.089915][ T1333] RAX: ffffffffffffffda RBX: 00007fdd1c5e5fa0 RCX: 00007fdd1c38f6c9 [ 46.089932][ T1333] RDX: 0000000000044000 RSI: 00002000000000c0 RDI: 0000000000000008 [ 46.089947][ T1333] RBP: 00007fdd1d1c6090 R08: 0000000000000000 R09: 0000000000000000 [ 46.089961][ T1333] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 46.089975][ T1333] R13: 00007fdd1c5e6038 R14: 00007fdd1c5e5fa0 R15: 00007ffd0f1a8b08 [ 46.089994][ T1333] [ 83.171167][ T3879] 9pnet_fd: Insufficient options for proto=fd [ 95.465259][ T4876] bridge0: port 1(bridge_slave_0) entered blocking state [ 95.479081][ T4876] bridge0: port 1(bridge_slave_0) entered disabled state [ 95.486227][ T4876] bridge_slave_0: entered allmulticast mode [ 95.502614][ T4876] bridge_slave_0: entered promiscuous mode [ 95.509956][ T4876] bridge0: port 2(bridge_slave_1) entered blocking state [ 95.517206][ T4876] bridge0: port 2(bridge_slave_1) entered disabled state [ 95.528653][ T4876] bridge_slave_1: entered allmulticast mode [ 95.539428][ T4876] bridge_slave_1: entered promiscuous mode [ 95.749862][ T4876] bridge0: port 2(bridge_slave_1) entered blocking state [ 95.756956][ T4876] bridge0: port 2(bridge_slave_1) entered forwarding state [ 95.764311][ T4876] bridge0: port 1(bridge_slave_0) entered blocking state [ 95.771401][ T4876] bridge0: port 1(bridge_slave_0) entered forwarding state [ 95.836440][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 95.844049][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 95.862665][ T335] bridge0: port 1(bridge_slave_0) entered blocking state [ 95.869779][ T335] bridge0: port 1(bridge_slave_0) entered forwarding state [ 95.889410][ T335] bridge0: port 2(bridge_slave_1) entered blocking state [ 95.896507][ T335] bridge0: port 2(bridge_slave_1) entered forwarding state [ 95.982987][ T329] bridge_slave_1: left allmulticast mode [ 95.988695][ T329] bridge_slave_1: left promiscuous mode [ 95.994876][ T329] bridge0: port 2(bridge_slave_1) entered disabled state [ 96.003504][ T329] bridge_slave_0: left allmulticast mode [ 96.019192][ T329] bridge_slave_0: left promiscuous mode [ 96.024946][ T329] bridge0: port 1(bridge_slave_0) entered disabled state [ 96.112185][ T4876] veth0_vlan: entered promiscuous mode [ 96.136292][ T4876] veth1_macvtap: entered promiscuous mode [ 96.167086][ T329] veth1_macvtap: left promiscuous mode [ 96.179623][ T329] veth0_vlan: left promiscuous mode [ 99.093617][ T5212] bridge0: port 1(bridge_slave_0) entered blocking state [ 99.100785][ T5212] bridge0: port 1(bridge_slave_0) entered disabled state [ 99.107892][ T5212] bridge_slave_0: entered allmulticast mode [ 99.119922][ T5212] bridge_slave_0: entered promiscuous mode [ 99.126568][ T5212] bridge0: port 2(bridge_slave_1) entered blocking state [ 99.137440][ T5212] bridge0: port 2(bridge_slave_1) entered disabled state [ 99.144816][ T5212] bridge_slave_1: entered allmulticast mode [ 99.151489][ T5212] bridge_slave_1: entered promiscuous mode [ 99.217420][ T329] bridge_slave_1: left allmulticast mode [ 99.229087][ T329] bridge_slave_1: left promiscuous mode [ 99.234780][ T329] bridge0: port 2(bridge_slave_1) entered disabled state [ 99.249604][ T329] bridge_slave_0: left allmulticast mode [ 99.255388][ T329] bridge_slave_0: left promiscuous mode [ 99.279131][ T329] bridge0: port 1(bridge_slave_0) entered disabled state [ 99.408781][ T329] veth1_macvtap: left promiscuous mode [ 99.419297][ T329] veth0_vlan: left promiscuous mode [ 99.547562][ T5212] bridge0: port 2(bridge_slave_1) entered blocking state [ 99.554804][ T5212] bridge0: port 2(bridge_slave_1) entered forwarding state [ 99.562177][ T5212] bridge0: port 1(bridge_slave_0) entered blocking state [ 99.569260][ T5212] bridge0: port 1(bridge_slave_0) entered forwarding state [ 99.644999][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 99.654942][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 99.691473][ T335] bridge0: port 1(bridge_slave_0) entered blocking state [ 99.698667][ T335] bridge0: port 1(bridge_slave_0) entered forwarding state [ 99.710841][ T335] bridge0: port 2(bridge_slave_1) entered blocking state [ 99.717929][ T335] bridge0: port 2(bridge_slave_1) entered forwarding state [ 99.765365][ T5212] veth0_vlan: entered promiscuous mode [ 99.792447][ T5212] veth1_macvtap: entered promiscuous mode [ 100.407321][ T5275] bridge0: port 1(bridge_slave_0) entered blocking state [ 100.419126][ T5275] bridge0: port 1(bridge_slave_0) entered disabled state [ 100.426250][ T5275] bridge_slave_0: entered allmulticast mode [ 100.438979][ T5275] bridge_slave_0: entered promiscuous mode [ 100.452405][ T5275] bridge0: port 2(bridge_slave_1) entered blocking state [ 100.466404][ T5275] bridge0: port 2(bridge_slave_1) entered disabled state [ 100.473828][ T5275] bridge_slave_1: entered allmulticast mode [ 100.481523][ T5275] bridge_slave_1: entered promiscuous mode [ 100.640812][ T12] veth1_macvtap: left promiscuous mode [ 100.659113][ T12] veth0_vlan: left promiscuous mode [ 100.829613][ T5275] bridge0: port 2(bridge_slave_1) entered blocking state [ 100.836737][ T5275] bridge0: port 2(bridge_slave_1) entered forwarding state [ 100.844212][ T5275] bridge0: port 1(bridge_slave_0) entered blocking state [ 100.851331][ T5275] bridge0: port 1(bridge_slave_0) entered forwarding state [ 100.910503][ T335] bridge0: port 1(bridge_slave_0) entered disabled state [ 100.929127][ T335] bridge0: port 2(bridge_slave_1) entered disabled state [ 100.941029][ T329] bridge0: port 1(bridge_slave_0) entered blocking state [ 100.948203][ T329] bridge0: port 1(bridge_slave_0) entered forwarding state [ 100.970810][ T335] bridge0: port 2(bridge_slave_1) entered blocking state [ 100.977882][ T335] bridge0: port 2(bridge_slave_1) entered forwarding state [ 101.055434][ T5275] veth0_vlan: entered promiscuous mode [ 101.077187][ T5275] veth1_macvtap: entered promiscuous mode [ 102.014861][ T5426] cgroup: fork rejected by pids controller in /syz2 [ 107.503805][ T5942] 9pnet_fd: Insufficient options for proto=fd [ 108.769171][ T6062] 9pnet_fd: Insufficient options for proto=fd [ 108.976658][ T6086] 9pnet_fd: Insufficient options for proto=fd [ 110.305276][ T6183] 9pnet_fd: Insufficient options for proto=fd [ 110.432613][ T6181] bridge0: port 1(bridge_slave_0) entered blocking state [ 110.440498][ T6181] bridge0: port 1(bridge_slave_0) entered disabled state [ 110.447705][ T6181] bridge_slave_0: entered allmulticast mode [ 110.454965][ T6181] bridge_slave_0: entered promiscuous mode [ 110.469346][ T6181] bridge0: port 2(bridge_slave_1) entered blocking state [ 110.476629][ T6181] bridge0: port 2(bridge_slave_1) entered disabled state [ 110.489754][ T6181] bridge_slave_1: entered allmulticast mode [ 110.496698][ T6181] bridge_slave_1: entered promiscuous mode [ 110.608668][ T12] bridge_slave_1: left allmulticast mode [ 110.614785][ T12] bridge_slave_1: left promiscuous mode [ 110.626849][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 110.636642][ T12] bridge_slave_0: left allmulticast mode [ 110.642554][ T12] bridge_slave_0: left promiscuous mode [ 110.648449][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 110.762579][ T12] veth1_macvtap: left promiscuous mode [ 110.768124][ T12] veth0_vlan: left promiscuous mode [ 110.822150][ T6181] bridge0: port 2(bridge_slave_1) entered blocking state [ 110.829290][ T6181] bridge0: port 2(bridge_slave_1) entered forwarding state [ 110.836623][ T6181] bridge0: port 1(bridge_slave_0) entered blocking state [ 110.843726][ T6181] bridge0: port 1(bridge_slave_0) entered forwarding state [ 110.901520][ T335] bridge0: port 1(bridge_slave_0) entered disabled state [ 110.913295][ T335] bridge0: port 2(bridge_slave_1) entered disabled state [ 110.931971][ T335] bridge0: port 1(bridge_slave_0) entered blocking state [ 110.939094][ T335] bridge0: port 1(bridge_slave_0) entered forwarding state [ 110.948332][ T335] bridge0: port 2(bridge_slave_1) entered blocking state [ 110.955442][ T335] bridge0: port 2(bridge_slave_1) entered forwarding state [ 110.979365][ T6260] 9pnet_fd: Insufficient options for proto=fd [ 111.015809][ T6181] veth0_vlan: entered promiscuous mode [ 111.037845][ T6181] veth1_macvtap: entered promiscuous mode [ 111.183521][ T6281] 9pnet_fd: Insufficient options for proto=fd [ 114.536952][ T6461] 9pnet: Could not find request transport: fd0x0000000000000007 [ 114.675801][ T6479] 9pnet: Could not find request transport: fd0x0000000000000007 [ 115.219492][ T6536] 9pnet_fd: Insufficient options for proto=fd [ 115.582200][ T6552] 9pnet_fd: Insufficient options for proto=fd [ 123.574906][ T7463] 9pnet_fd: Insufficient options for proto=fd [ 124.294314][ T7541] 9pnet_fd: Insufficient options for proto=fd [ 125.196854][ T7585] 9pnet_fd: Insufficient options for proto=fd [ 125.748491][ T7626] 9pnet_fd: Insufficient options for proto=fd [ 126.829835][ T7739] 9pnet_fd: Insufficient options for proto=fd [ 128.447948][ T7874] 9pnet_fd: Insufficient options for proto=fd [ 129.787425][ T7973] 9pnet_fd: Insufficient options for proto=fd [ 130.210407][ T8033] 9pnet_fd: Insufficient options for proto=fd [ 130.263019][ T8036] 9pnet: Could not find request transport: fd0x0000000000000006 [ 130.290275][ T8034] cgroup: fork rejected by pids controller in /syz0 [ 132.489721][ T8148] 9pnet_fd: Insufficient options for proto=fd [ 134.472433][ T8277] netlink: 8 bytes leftover after parsing attributes in process `syz.2.3767'. [ 134.499041][ T36] audit: type=1400 audit(1763155736.560:141): avc: denied { create } for pid=8276 comm="syz.2.3767" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 134.530322][ T8279] FAULT_INJECTION: forcing a failure. [ 134.530322][ T8279] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 134.554626][ T8279] CPU: 1 UID: 0 PID: 8279 Comm: syz.2.3768 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 134.554669][ T8279] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 134.554692][ T8279] Call Trace: [ 134.554699][ T8279] [ 134.554708][ T8279] __dump_stack+0x21/0x30 [ 134.554756][ T8279] dump_stack_lvl+0x10c/0x190 [ 134.554785][ T8279] ? __cfi_dump_stack_lvl+0x10/0x10 [ 134.554824][ T8279] ? kstrtoull+0x13b/0x1e0 [ 134.554845][ T8279] dump_stack+0x19/0x20 [ 134.554872][ T8279] should_fail_ex+0x3d9/0x530 [ 134.554895][ T8279] should_fail+0xf/0x20 [ 134.554914][ T8279] should_fail_usercopy+0x1e/0x30 [ 134.554938][ T8279] _copy_from_user+0x22/0xb0 [ 134.554964][ T8279] ___sys_sendmsg+0x159/0x2a0 [ 134.554997][ T8279] ? __sys_sendmsg+0x280/0x280 [ 134.555029][ T8279] ? proc_fail_nth_write+0x17e/0x210 [ 134.555058][ T8279] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 134.555094][ T8279] __x64_sys_sendmsg+0x1eb/0x2c0 [ 134.555126][ T8279] ? fput+0x1a5/0x240 [ 134.555151][ T8279] ? __cfi___x64_sys_sendmsg+0x10/0x10 [ 134.555183][ T8279] ? ksys_write+0x1ef/0x250 [ 134.555204][ T8279] ? __kasan_check_read+0x15/0x20 [ 134.555238][ T8279] x64_sys_call+0x2a4c/0x2ee0 [ 134.555270][ T8279] do_syscall_64+0x58/0xf0 [ 134.555298][ T8279] ? clear_bhb_loop+0x50/0xa0 [ 134.555340][ T8279] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 134.555364][ T8279] RIP: 0033:0x7fc6a5b8f6c9 [ 134.555389][ T8279] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 134.555407][ T8279] RSP: 002b:00007fc6a6a05038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 134.555432][ T8279] RAX: ffffffffffffffda RBX: 00007fc6a5de5fa0 RCX: 00007fc6a5b8f6c9 [ 134.555448][ T8279] RDX: 0000000000000000 RSI: 0000200000000140 RDI: 0000000000000006 [ 134.555463][ T8279] RBP: 00007fc6a6a05090 R08: 0000000000000000 R09: 0000000000000000 [ 134.555477][ T8279] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 134.555490][ T8279] R13: 00007fc6a5de6038 R14: 00007fc6a5de5fa0 R15: 00007ffc0adff0b8 [ 134.555509][ T8279] [ 135.322206][ T36] audit: type=1400 audit(1763155737.390:142): avc: denied { bind } for pid=8295 comm="syz.3.3777" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 135.322215][ T8296] tipc: Can't bind to reserved service type 2 [ 135.828576][ T36] audit: type=1400 audit(1763155737.890:143): avc: denied { read } for pid=8357 comm="syz.1.3807" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 137.215360][ T8402] FAULT_INJECTION: forcing a failure. [ 137.215360][ T8402] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 137.247019][ T8402] CPU: 0 UID: 0 PID: 8402 Comm: syz.0.3829 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 137.247052][ T8402] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 137.247065][ T8402] Call Trace: [ 137.247072][ T8402] [ 137.247081][ T8402] __dump_stack+0x21/0x30 [ 137.247116][ T8402] dump_stack_lvl+0x10c/0x190 [ 137.247144][ T8402] ? __cfi_dump_stack_lvl+0x10/0x10 [ 137.247173][ T8402] ? check_stack_object+0x12c/0x140 [ 137.247194][ T8402] dump_stack+0x19/0x20 [ 137.247220][ T8402] should_fail_ex+0x3d9/0x530 [ 137.247240][ T8402] should_fail+0xf/0x20 [ 137.247260][ T8402] should_fail_usercopy+0x1e/0x30 [ 137.247281][ T8402] _copy_to_user+0x24/0xa0 [ 137.247308][ T8402] simple_read_from_buffer+0xed/0x160 [ 137.247335][ T8402] proc_fail_nth_read+0x19e/0x210 [ 137.247363][ T8402] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 137.247410][ T8402] ? bpf_lsm_file_permission+0xd/0x20 [ 137.247440][ T8402] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 137.247469][ T8402] vfs_read+0x27d/0xc70 [ 137.247489][ T8402] ? __cfi_vfs_read+0x10/0x10 [ 137.247507][ T8402] ? __kasan_slab_free+0x6a/0x80 [ 137.247533][ T8402] ? putname+0x113/0x150 [ 137.247566][ T8402] ? __kasan_check_read+0x15/0x20 [ 137.247598][ T8402] ksys_read+0x141/0x250 [ 137.247617][ T8402] ? __cfi_ksys_read+0x10/0x10 [ 137.247638][ T8402] ? __kasan_check_read+0x15/0x20 [ 137.247669][ T8402] __x64_sys_read+0x7f/0x90 [ 137.247689][ T8402] x64_sys_call+0x2638/0x2ee0 [ 137.247721][ T8402] do_syscall_64+0x58/0xf0 [ 137.247749][ T8402] ? clear_bhb_loop+0x50/0xa0 [ 137.247773][ T8402] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 137.247794][ T8402] RIP: 0033:0x7f762898e0dc [ 137.247817][ T8402] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 137.247841][ T8402] RSP: 002b:00007f76297f6030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 137.247864][ T8402] RAX: ffffffffffffffda RBX: 00007f7628be5fa0 RCX: 00007f762898e0dc [ 137.247882][ T8402] RDX: 000000000000000f RSI: 00007f76297f60a0 RDI: 0000000000000009 [ 137.247897][ T8402] RBP: 00007f76297f6090 R08: 0000000000000000 R09: 0000000000000000 [ 137.247928][ T8402] R10: 0000000000000081 R11: 0000000000000246 R12: 0000000000000001 [ 137.247945][ T8402] R13: 00007f7628be6038 R14: 00007f7628be5fa0 R15: 00007ffefa40fb08 [ 137.247965][ T8402] [ 137.789964][ T8430] netlink: 4 bytes leftover after parsing attributes in process `syz.0.3841'. [ 137.819137][ T8430] bridge_slave_1: left allmulticast mode [ 137.829386][ T8430] bridge_slave_1: left promiscuous mode [ 137.845332][ T8430] bridge0: port 2(bridge_slave_1) entered disabled state [ 137.856095][ T8430] bridge_slave_0: left allmulticast mode [ 137.869067][ T8430] bridge_slave_0: left promiscuous mode [ 137.886395][ T8430] bridge0: port 1(bridge_slave_0) entered disabled state [ 140.174719][ T8649] FAULT_INJECTION: forcing a failure. [ 140.174719][ T8649] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 140.223064][ T8649] CPU: 1 UID: 0 PID: 8649 Comm: syz.1.3900 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 140.223102][ T8649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 140.223116][ T8649] Call Trace: [ 140.223124][ T8649] [ 140.223132][ T8649] __dump_stack+0x21/0x30 [ 140.223168][ T8649] dump_stack_lvl+0x10c/0x190 [ 140.223215][ T8649] ? __cfi_dump_stack_lvl+0x10/0x10 [ 140.223245][ T8649] ? kstrtoull+0x13b/0x1e0 [ 140.223266][ T8649] dump_stack+0x19/0x20 [ 140.223294][ T8649] should_fail_ex+0x3d9/0x530 [ 140.223317][ T8649] should_fail+0xf/0x20 [ 140.223345][ T8649] should_fail_usercopy+0x1e/0x30 [ 140.223369][ T8649] _copy_from_user+0x22/0xb0 [ 140.223398][ T8649] ___sys_sendmsg+0x159/0x2a0 [ 140.223432][ T8649] ? __sys_sendmsg+0x280/0x280 [ 140.223465][ T8649] ? proc_fail_nth_write+0x17e/0x210 [ 140.223495][ T8649] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 140.223532][ T8649] __x64_sys_sendmsg+0x1eb/0x2c0 [ 140.223563][ T8649] ? fput+0x1a5/0x240 [ 140.223600][ T8649] ? __cfi___x64_sys_sendmsg+0x10/0x10 [ 140.223630][ T8649] ? ksys_write+0x1ef/0x250 [ 140.223651][ T8649] ? __kasan_check_read+0x15/0x20 [ 140.223702][ T8649] x64_sys_call+0x2a4c/0x2ee0 [ 140.223735][ T8649] do_syscall_64+0x58/0xf0 [ 140.223764][ T8649] ? clear_bhb_loop+0x50/0xa0 [ 140.223789][ T8649] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 140.223813][ T8649] RIP: 0033:0x7f338e58f6c9 [ 140.223830][ T8649] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 140.223850][ T8649] RSP: 002b:00007f338f35b038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 140.223874][ T8649] RAX: ffffffffffffffda RBX: 00007f338e7e5fa0 RCX: 00007f338e58f6c9 [ 140.223891][ T8649] RDX: 0000000000000000 RSI: 0000200000000140 RDI: 0000000000000006 [ 140.223905][ T8649] RBP: 00007f338f35b090 R08: 0000000000000000 R09: 0000000000000000 [ 140.223920][ T8649] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 140.223934][ T8649] R13: 00007f338e7e6038 R14: 00007f338e7e5fa0 R15: 00007fff993cf178 [ 140.223953][ T8649] [ 140.770932][ T8690] FAULT_INJECTION: forcing a failure. [ 140.770932][ T8690] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 140.797059][ T8690] CPU: 1 UID: 0 PID: 8690 Comm: syz.1.3919 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 140.797099][ T8690] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 140.797113][ T8690] Call Trace: [ 140.797120][ T8690] [ 140.797129][ T8690] __dump_stack+0x21/0x30 [ 140.797164][ T8690] dump_stack_lvl+0x10c/0x190 [ 140.797194][ T8690] ? __cfi_dump_stack_lvl+0x10/0x10 [ 140.797234][ T8690] ? check_stack_object+0x12c/0x140 [ 140.797257][ T8690] dump_stack+0x19/0x20 [ 140.797285][ T8690] should_fail_ex+0x3d9/0x530 [ 140.797308][ T8690] should_fail+0xf/0x20 [ 140.797329][ T8690] should_fail_usercopy+0x1e/0x30 [ 140.797353][ T8690] _copy_to_user+0x24/0xa0 [ 140.797380][ T8690] simple_read_from_buffer+0xed/0x160 [ 140.797408][ T8690] proc_fail_nth_read+0x19e/0x210 [ 140.797438][ T8690] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 140.797467][ T8690] ? bpf_lsm_file_permission+0xd/0x20 [ 140.797497][ T8690] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 140.797526][ T8690] vfs_read+0x27d/0xc70 [ 140.797545][ T8690] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 140.797566][ T8690] ? __cfi_vfs_read+0x10/0x10 [ 140.797584][ T8690] ? __kasan_check_write+0x18/0x20 [ 140.797617][ T8690] ? mutex_lock+0x92/0x1c0 [ 140.797637][ T8690] ? __cfi_mutex_lock+0x10/0x10 [ 140.797657][ T8690] ? __fget_files+0x2c5/0x340 [ 140.797683][ T8690] ksys_read+0x141/0x250 [ 140.797702][ T8690] ? __cfi_ksys_read+0x10/0x10 [ 140.797723][ T8690] ? __kasan_check_read+0x15/0x20 [ 140.797755][ T8690] __x64_sys_read+0x7f/0x90 [ 140.797776][ T8690] x64_sys_call+0x2638/0x2ee0 [ 140.797807][ T8690] do_syscall_64+0x58/0xf0 [ 140.797835][ T8690] ? clear_bhb_loop+0x50/0xa0 [ 140.797860][ T8690] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 140.797883][ T8690] RIP: 0033:0x7f338e58e0dc [ 140.797901][ T8690] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 140.797920][ T8690] RSP: 002b:00007f338f35b030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 140.797945][ T8690] RAX: ffffffffffffffda RBX: 00007f338e7e5fa0 RCX: 00007f338e58e0dc [ 140.797962][ T8690] RDX: 000000000000000f RSI: 00007f338f35b0a0 RDI: 0000000000000009 [ 140.797977][ T8690] RBP: 00007f338f35b090 R08: 0000000000000000 R09: 0000000000000000 [ 140.797992][ T8690] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 140.798005][ T8690] R13: 00007f338e7e6038 R14: 00007f338e7e5fa0 R15: 00007fff993cf178 [ 140.798025][ T8690] [ 144.420262][ T8906] FAULT_INJECTION: forcing a failure. [ 144.420262][ T8906] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 144.440184][ T8906] CPU: 0 UID: 0 PID: 8906 Comm: syz.2.4025 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 144.440217][ T8906] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 144.440231][ T8906] Call Trace: [ 144.440237][ T8906] [ 144.440245][ T8906] __dump_stack+0x21/0x30 [ 144.440278][ T8906] dump_stack_lvl+0x10c/0x190 [ 144.440304][ T8906] ? __cfi_dump_stack_lvl+0x10/0x10 [ 144.440330][ T8906] ? unwind_get_return_address+0x51/0x90 [ 144.440355][ T8906] ? __cfi_stack_trace_consume_entry+0x10/0x10 [ 144.440386][ T8906] dump_stack+0x19/0x20 [ 144.440411][ T8906] should_fail_ex+0x3d9/0x530 [ 144.440432][ T8906] should_fail+0xf/0x20 [ 144.440450][ T8906] should_fail_usercopy+0x1e/0x30 [ 144.440472][ T8906] _copy_from_user+0x22/0xb0 [ 144.440496][ T8906] ___sys_recvmsg+0x12f/0x510 [ 144.440516][ T8906] ? __sys_recvmsg+0x280/0x280 [ 144.440533][ T8906] ? __cfi_kstrtouint_from_user+0x10/0x10 [ 144.440552][ T8906] ? selinux_file_permission+0x309/0xb30 [ 144.440579][ T8906] ? __fget_files+0x2c5/0x340 [ 144.440601][ T8906] do_recvmmsg+0x326/0x770 [ 144.440621][ T8906] ? __sys_recvmmsg+0x290/0x290 [ 144.440638][ T8906] ? __cfi_vfs_write+0x10/0x10 [ 144.440658][ T8906] ? fput+0x1a5/0x240 [ 144.440683][ T8906] __x64_sys_recvmmsg+0x191/0x240 [ 144.440701][ T8906] ? __cfi___x64_sys_recvmmsg+0x10/0x10 [ 144.440720][ T8906] ? __kasan_check_read+0x15/0x20 [ 144.440750][ T8906] x64_sys_call+0x292c/0x2ee0 [ 144.440801][ T8906] do_syscall_64+0x58/0xf0 [ 144.440828][ T8906] ? clear_bhb_loop+0x50/0xa0 [ 144.440850][ T8906] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 144.440871][ T8906] RIP: 0033:0x7fc6a5b8f6c9 [ 144.440887][ T8906] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 144.440903][ T8906] RSP: 002b:00007fc6a6a05038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 144.440925][ T8906] RAX: ffffffffffffffda RBX: 00007fc6a5de5fa0 RCX: 00007fc6a5b8f6c9 [ 144.440940][ T8906] RDX: 0000000000000002 RSI: 0000200000009800 RDI: 0000000000000007 [ 144.440953][ T8906] RBP: 00007fc6a6a05090 R08: 0000000000000000 R09: 0000000000000000 [ 144.440972][ T8906] R10: 0000000000002142 R11: 0000000000000246 R12: 0000000000000001 [ 144.440985][ T8906] R13: 00007fc6a5de6038 R14: 00007fc6a5de5fa0 R15: 00007ffc0adff0b8 [ 144.441002][ T8906] [ 146.202141][ T36] audit: type=1400 audit(1763155748.270:144): avc: denied { create } for pid=8907 comm="syz.0.4026" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 146.240547][ T36] audit: type=1400 audit(1763155748.290:145): avc: denied { ioctl } for pid=8907 comm="syz.0.4026" path="socket:[58498]" dev="sockfs" ino=58498 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 146.271308][ T36] audit: type=1400 audit(1763155748.290:146): avc: denied { read } for pid=8907 comm="syz.0.4026" path="socket:[58498]" dev="sockfs" ino=58498 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 146.331478][ T36] audit: type=1400 audit(1763155748.400:147): avc: denied { create } for pid=9030 comm="syz.1.4037" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 149.666570][ T9306] netlink: 8 bytes leftover after parsing attributes in process `syz.0.4166'. [ 150.382138][ T36] audit: type=1400 audit(1763155752.450:148): avc: denied { getopt } for pid=9350 comm="syz.1.4189" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 150.683390][ T36] audit: type=1400 audit(1763155752.750:149): avc: denied { name_bind } for pid=9385 comm="syz.3.4205" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 159.051721][ T9787] netlink: 8 bytes leftover after parsing attributes in process `syz.3.4391'. [ 160.729348][ T9899] netlink: 8 bytes leftover after parsing attributes in process `syz.2.4453'. [ 161.668520][ T9954] netlink: 8 bytes leftover after parsing attributes in process `syz.2.4479'. [ 163.166753][T10026] 9pnet_fd: Insufficient options for proto=fd [ 164.097663][T10121] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.130077][T10121] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.137448][T10121] bridge_slave_0: entered allmulticast mode [ 164.146979][T10121] bridge_slave_0: entered promiscuous mode [ 164.160776][T10121] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.168033][T10121] bridge0: port 2(bridge_slave_1) entered disabled state [ 164.175786][T10121] bridge_slave_1: entered allmulticast mode [ 164.182378][T10121] bridge_slave_1: entered promiscuous mode [ 164.327337][T10151] netlink: 8 bytes leftover after parsing attributes in process `syz.2.4575'. [ 164.370469][T10121] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.377614][T10121] bridge0: port 2(bridge_slave_1) entered forwarding state [ 164.384954][T10121] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.392037][T10121] bridge0: port 1(bridge_slave_0) entered forwarding state [ 164.471036][ T12] veth1_macvtap: left promiscuous mode [ 164.476622][ T12] veth0_vlan: left promiscuous mode [ 164.585622][ T335] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.597286][ T335] bridge0: port 2(bridge_slave_1) entered disabled state [ 164.619297][ T329] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.626394][ T329] bridge0: port 1(bridge_slave_0) entered forwarding state [ 164.646784][ T335] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.653893][ T335] bridge0: port 2(bridge_slave_1) entered forwarding state [ 164.716362][T10121] veth0_vlan: entered promiscuous mode [ 164.743907][T10121] veth1_macvtap: entered promiscuous mode [ 164.821547][T10196] netlink: 8 bytes leftover after parsing attributes in process `syz.3.4594'. [ 164.992264][T10237] netlink: 8 bytes leftover after parsing attributes in process `syz.1.4611'. [ 165.821225][T10349] netlink: 8 bytes leftover after parsing attributes in process `syz.0.4668'. [ 165.981294][T10355] netlink: 8 bytes leftover after parsing attributes in process `syz.3.4670'. [ 167.968895][T10489] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.976203][T10489] bridge0: port 1(bridge_slave_0) entered disabled state [ 167.983750][T10489] bridge_slave_0: entered allmulticast mode [ 167.990471][T10489] bridge_slave_0: entered promiscuous mode [ 167.997109][T10489] bridge0: port 2(bridge_slave_1) entered blocking state [ 168.004596][T10489] bridge0: port 2(bridge_slave_1) entered disabled state [ 168.012516][T10489] bridge_slave_1: entered allmulticast mode [ 168.019549][T10489] bridge_slave_1: entered promiscuous mode [ 168.154621][T10489] bridge0: port 2(bridge_slave_1) entered blocking state [ 168.161789][T10489] bridge0: port 2(bridge_slave_1) entered forwarding state [ 168.169245][T10489] bridge0: port 1(bridge_slave_0) entered blocking state [ 168.176306][T10489] bridge0: port 1(bridge_slave_0) entered forwarding state [ 168.229744][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 168.239451][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 168.260121][ T335] bridge0: port 1(bridge_slave_0) entered blocking state [ 168.267222][ T335] bridge0: port 1(bridge_slave_0) entered forwarding state [ 168.286044][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 168.293178][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 168.371492][T10489] veth0_vlan: entered promiscuous mode [ 168.407311][T10489] veth1_macvtap: entered promiscuous mode [ 168.520841][ T329] bridge_slave_1: left allmulticast mode [ 168.526572][ T329] bridge_slave_1: left promiscuous mode [ 168.543743][ T329] bridge0: port 2(bridge_slave_1) entered disabled state [ 168.558852][ T329] bridge_slave_0: left allmulticast mode [ 168.568003][ T329] bridge_slave_0: left promiscuous mode [ 168.579236][ T329] bridge0: port 1(bridge_slave_0) entered disabled state [ 168.729547][T10542] 9p: Unknown Cache mode or invalid value m [ 168.762397][ T329] veth1_macvtap: left promiscuous mode [ 168.767989][ T329] veth0_vlan: left promiscuous mode [ 169.471407][T10591] FAULT_INJECTION: forcing a failure. [ 169.471407][T10591] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 169.499057][T10591] CPU: 1 UID: 0 PID: 10591 Comm: syz.0.4779 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 169.499094][T10591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 169.499107][T10591] Call Trace: [ 169.499114][T10591] [ 169.499122][T10591] __dump_stack+0x21/0x30 [ 169.499157][T10591] dump_stack_lvl+0x10c/0x190 [ 169.499186][T10591] ? __cfi_dump_stack_lvl+0x10/0x10 [ 169.499214][T10591] ? unwind_get_return_address+0x51/0x90 [ 169.499241][T10591] ? __cfi_stack_trace_consume_entry+0x10/0x10 [ 169.499276][T10591] dump_stack+0x19/0x20 [ 169.499302][T10591] should_fail_ex+0x3d9/0x530 [ 169.499324][T10591] should_fail+0xf/0x20 [ 169.499344][T10591] should_fail_usercopy+0x1e/0x30 [ 169.499367][T10591] _copy_from_user+0x22/0xb0 [ 169.499395][T10591] ___sys_recvmsg+0x12f/0x510 [ 169.499415][T10591] ? __sys_recvmsg+0x280/0x280 [ 169.499435][T10591] ? __cfi_kstrtouint_from_user+0x10/0x10 [ 169.499456][T10591] ? selinux_file_permission+0x309/0xb30 [ 169.499485][T10591] ? __fget_files+0x2c5/0x340 [ 169.499511][T10591] do_recvmmsg+0x326/0x770 [ 169.499532][T10591] ? __sys_recvmmsg+0x290/0x290 [ 169.499552][T10591] ? __cfi_vfs_write+0x10/0x10 [ 169.499575][T10591] ? fput+0x1a5/0x240 [ 169.499601][T10591] __x64_sys_recvmmsg+0x191/0x240 [ 169.499622][T10591] ? __cfi___x64_sys_recvmmsg+0x10/0x10 [ 169.499642][T10591] ? __kasan_check_read+0x15/0x20 [ 169.499676][T10591] x64_sys_call+0x292c/0x2ee0 [ 169.499707][T10591] do_syscall_64+0x58/0xf0 [ 169.499734][T10591] ? clear_bhb_loop+0x50/0xa0 [ 169.499758][T10591] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 169.499781][T10591] RIP: 0033:0x7f39f398f6c9 [ 169.499799][T10591] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 169.499825][T10591] RSP: 002b:00007f39f47ae038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 169.499849][T10591] RAX: ffffffffffffffda RBX: 00007f39f3be5fa0 RCX: 00007f39f398f6c9 [ 169.499866][T10591] RDX: 0400000000000284 RSI: 0000200000000040 RDI: 0000000000000007 [ 169.499881][T10591] RBP: 00007f39f47ae090 R08: 0000000000000000 R09: 0000000000000000 [ 169.499896][T10591] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000001 [ 169.499909][T10591] R13: 00007f39f3be6038 R14: 00007f39f3be5fa0 R15: 00007ffdc3c09708 [ 169.499928][T10591] [ 170.423127][T10669] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.443304][T10669] bridge0: port 1(bridge_slave_0) entered disabled state [ 170.459054][T10669] bridge_slave_0: entered allmulticast mode [ 170.468617][T10669] bridge_slave_0: entered promiscuous mode [ 170.493724][T10669] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.520565][T10669] bridge0: port 2(bridge_slave_1) entered disabled state [ 170.527710][T10669] bridge_slave_1: entered allmulticast mode [ 170.549533][T10669] bridge_slave_1: entered promiscuous mode [ 170.619546][ T329] bridge_slave_1: left allmulticast mode [ 170.625248][ T329] bridge_slave_1: left promiscuous mode [ 170.631121][ T329] bridge0: port 2(bridge_slave_1) entered disabled state [ 170.658729][ T329] bridge_slave_0: left allmulticast mode [ 170.664562][ T329] bridge_slave_0: left promiscuous mode [ 170.679290][ T329] bridge0: port 1(bridge_slave_0) entered disabled state [ 170.825739][ T329] veth1_macvtap: left promiscuous mode [ 170.837097][ T329] veth0_vlan: left promiscuous mode [ 170.931033][T10669] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.938142][T10669] bridge0: port 2(bridge_slave_1) entered forwarding state [ 170.945511][T10669] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.952600][T10669] bridge0: port 1(bridge_slave_0) entered forwarding state [ 170.998926][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 171.010258][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 171.025424][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 171.032565][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 171.063159][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 171.070278][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 171.079041][ T36] audit: type=1400 audit(1763155773.140:150): avc: denied { create } for pid=10720 comm="syz.2.4833" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 171.095784][T10669] veth0_vlan: entered promiscuous mode [ 171.127706][T10669] veth1_macvtap: entered promiscuous mode [ 172.565003][T10802] FAULT_INJECTION: forcing a failure. [ 172.565003][T10802] name failslab, interval 1, probability 0, space 0, times 0 [ 172.599060][T10802] CPU: 0 UID: 0 PID: 10802 Comm: syz.0.4873 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 172.599099][T10802] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 172.599113][T10802] Call Trace: [ 172.599120][T10802] [ 172.599129][T10802] __dump_stack+0x21/0x30 [ 172.599164][T10802] dump_stack_lvl+0x10c/0x190 [ 172.599193][T10802] ? __cfi_dump_stack_lvl+0x10/0x10 [ 172.599221][T10802] ? is_bpf_text_address+0x17b/0x1a0 [ 172.599248][T10802] dump_stack+0x19/0x20 [ 172.599276][T10802] should_fail_ex+0x3d9/0x530 [ 172.599299][T10802] should_failslab+0xac/0x100 [ 172.599325][T10802] kmem_cache_alloc_noprof+0x42/0x430 [ 172.599346][T10802] ? dst_alloc+0x13c/0x250 [ 172.599366][T10802] ? avc_has_perm_noaudit+0x286/0x360 [ 172.599399][T10802] dst_alloc+0x13c/0x250 [ 172.599417][T10802] ? avc_has_perm+0x144/0x220 [ 172.599449][T10802] ip_route_output_key_hash_rcu+0x1302/0x1f90 [ 172.599486][T10802] ip_route_output_flow+0xea/0x290 [ 172.599516][T10802] ? __cfi_ip_route_output_flow+0x10/0x10 [ 172.599547][T10802] ? __cfi__raw_spin_lock_bh+0x10/0x10 [ 172.599574][T10802] ? selinux_sk_getsecid+0x2e/0xd0 [ 172.599595][T10802] __ip4_datagram_connect+0x74f/0x1050 [ 172.599622][T10802] ip4_datagram_connect+0x31/0x50 [ 172.599644][T10802] inet_dgram_connect+0x219/0x470 [ 172.599667][T10802] __sys_connect+0x39d/0x440 [ 172.599696][T10802] ? __cfi___sys_connect+0x10/0x10 [ 172.599728][T10802] ? __kasan_check_read+0x15/0x20 [ 172.599762][T10802] __x64_sys_connect+0x7e/0x90 [ 172.599802][T10802] x64_sys_call+0x1c2f/0x2ee0 [ 172.599833][T10802] do_syscall_64+0x58/0xf0 [ 172.599860][T10802] ? clear_bhb_loop+0x50/0xa0 [ 172.599886][T10802] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 172.599909][T10802] RIP: 0033:0x7f39f398f6c9 [ 172.599927][T10802] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 172.599946][T10802] RSP: 002b:00007f39f47ae038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 172.599972][T10802] RAX: ffffffffffffffda RBX: 00007f39f3be5fa0 RCX: 00007f39f398f6c9 [ 172.599990][T10802] RDX: 0000000000000010 RSI: 0000200000000280 RDI: 0000000000000007 [ 172.600006][T10802] RBP: 00007f39f47ae090 R08: 0000000000000000 R09: 0000000000000000 [ 172.600021][T10802] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 172.600036][T10802] R13: 00007f39f3be6038 R14: 00007f39f3be5fa0 R15: 00007ffdc3c09708 [ 172.600055][T10802] [ 172.745704][T10806] netlink: 8 bytes leftover after parsing attributes in process `syz.1.4874'. [ 173.874886][T10872] tmpfs: Bad value for 'huge' [ 173.879069][ T36] audit: type=1400 audit(1763155775.940:151): avc: denied { mounton } for pid=10871 comm="syz.2.4905" path="/syzcgroup/unified/syz2" dev="cgroup2" ino=57 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=dir permissive=1 [ 173.929158][ T36] audit: type=1400 audit(1763155775.980:152): avc: denied { write } for pid=10871 comm="syz.2.4905" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 173.969059][ T36] audit: type=1400 audit(1763155775.980:153): avc: denied { nlmsg_write } for pid=10871 comm="syz.2.4905" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 175.354746][ T36] audit: type=1400 audit(1763155777.420:154): avc: denied { ioctl } for pid=10924 comm="syz.2.4921" path="socket:[71387]" dev="sockfs" ino=71387 ioctlcmd=0x8902 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 175.406519][T10932] netlink: 8 bytes leftover after parsing attributes in process `syz.3.4932'. [ 175.708892][ T36] audit: type=1400 audit(1763155777.760:155): avc: denied { read write } for pid=10969 comm="syz.2.4950" name="uhid" dev="devtmpfs" ino=199 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 175.758497][ T36] audit: type=1400 audit(1763155777.760:156): avc: denied { open } for pid=10969 comm="syz.2.4950" path="/dev/uhid" dev="devtmpfs" ino=199 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 175.956950][T11006] netlink: 8 bytes leftover after parsing attributes in process `syz.0.4951'. [ 176.097960][T11032] netlink: 8 bytes leftover after parsing attributes in process `syz.3.4980'. [ 176.832867][T11071] bridge0: port 1(bridge_slave_0) entered blocking state [ 176.859008][T11071] bridge0: port 1(bridge_slave_0) entered disabled state [ 176.889333][T11071] bridge_slave_0: entered allmulticast mode [ 176.895787][T11071] bridge_slave_0: entered promiscuous mode [ 176.933785][T11071] bridge0: port 2(bridge_slave_1) entered blocking state [ 176.962140][T11071] bridge0: port 2(bridge_slave_1) entered disabled state [ 176.979092][T11071] bridge_slave_1: entered allmulticast mode [ 176.985527][T11071] bridge_slave_1: entered promiscuous mode [ 177.055490][ T329] bridge_slave_1: left allmulticast mode [ 177.062937][ T329] bridge_slave_1: left promiscuous mode [ 177.068653][ T329] bridge0: port 2(bridge_slave_1) entered disabled state [ 177.077540][ T329] bridge_slave_0: left allmulticast mode [ 177.083380][ T329] bridge_slave_0: left promiscuous mode [ 177.091425][ T329] bridge0: port 1(bridge_slave_0) entered disabled state [ 177.185318][T11099] netlink: 8 bytes leftover after parsing attributes in process `syz.3.5011'. [ 177.214975][ T329] veth1_macvtap: left promiscuous mode [ 177.221114][ T329] veth0_vlan: left promiscuous mode [ 177.358423][T11071] bridge0: port 2(bridge_slave_1) entered blocking state [ 177.365520][T11071] bridge0: port 2(bridge_slave_1) entered forwarding state [ 177.372843][T11071] bridge0: port 1(bridge_slave_0) entered blocking state [ 177.379915][T11071] bridge0: port 1(bridge_slave_0) entered forwarding state [ 177.423353][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 177.437859][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 177.459342][ T46] bridge0: port 1(bridge_slave_0) entered blocking state [ 177.466509][ T46] bridge0: port 1(bridge_slave_0) entered forwarding state [ 177.484469][ T46] bridge0: port 2(bridge_slave_1) entered blocking state [ 177.491592][ T46] bridge0: port 2(bridge_slave_1) entered forwarding state [ 177.553828][T11071] veth0_vlan: entered promiscuous mode [ 177.584166][T11071] veth1_macvtap: entered promiscuous mode [ 177.751480][ T36] audit: type=1400 audit(1763155779.820:157): avc: denied { unlink } for pid=11172 comm="syz.2.5044" name="#1" dev="tmpfs" ino=45 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 177.809186][ T36] audit: type=1400 audit(1763155779.820:158): avc: denied { mount } for pid=11172 comm="syz.2.5044" name="/" dev="overlay" ino=40 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 178.212297][ T36] audit: type=1400 audit(1763155780.280:159): avc: denied { write } for pid=11194 comm="syz.2.5055" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 178.510561][T11209] 9pnet_fd: Insufficient options for proto=fd [ 179.013217][T11245] FAULT_INJECTION: forcing a failure. [ 179.013217][T11245] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 179.051439][T11245] CPU: 0 UID: 0 PID: 11245 Comm: syz.0.5080 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 179.051480][T11245] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 179.051496][T11245] Call Trace: [ 179.051504][T11245] [ 179.051513][T11245] __dump_stack+0x21/0x30 [ 179.051550][T11245] dump_stack_lvl+0x10c/0x190 [ 179.051582][T11245] ? __cfi_dump_stack_lvl+0x10/0x10 [ 179.051613][T11245] ? check_stack_object+0x12c/0x140 [ 179.051637][T11245] dump_stack+0x19/0x20 [ 179.051666][T11245] should_fail_ex+0x3d9/0x530 [ 179.051691][T11245] should_fail+0xf/0x20 [ 179.051711][T11245] should_fail_usercopy+0x1e/0x30 [ 179.051736][T11245] _copy_to_user+0x24/0xa0 [ 179.051765][T11245] simple_read_from_buffer+0xed/0x160 [ 179.051793][T11245] proc_fail_nth_read+0x19e/0x210 [ 179.051824][T11245] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 179.051855][T11245] ? bpf_lsm_file_permission+0xd/0x20 [ 179.051887][T11245] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 179.051917][T11245] vfs_read+0x27d/0xc70 [ 179.051937][T11245] ? ep_destroy_wakeup_source+0x70/0x70 [ 179.051968][T11245] ? __cfi_vfs_read+0x10/0x10 [ 179.051987][T11245] ? __kasan_check_write+0x18/0x20 [ 179.052022][T11245] ? mutex_lock+0x92/0x1c0 [ 179.052044][T11245] ? __cfi_mutex_lock+0x10/0x10 [ 179.052072][T11245] ? __fget_files+0x2c5/0x340 [ 179.052099][T11245] ksys_read+0x141/0x250 [ 179.052119][T11245] ? xfd_validate_state+0x68/0x150 [ 179.052150][T11245] ? __cfi_ksys_read+0x10/0x10 [ 179.052171][T11245] ? __kasan_check_write+0x18/0x20 [ 179.052205][T11245] ? fpregs_restore_userregs+0x11d/0x260 [ 179.052232][T11245] __x64_sys_read+0x7f/0x90 [ 179.052254][T11245] x64_sys_call+0x2638/0x2ee0 [ 179.052287][T11245] do_syscall_64+0x58/0xf0 [ 179.052318][T11245] ? clear_bhb_loop+0x50/0xa0 [ 179.052343][T11245] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 179.052367][T11245] RIP: 0033:0x7f39f398e0dc [ 179.052386][T11245] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 179.052407][T11245] RSP: 002b:00007f39f47ae030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 179.052432][T11245] RAX: ffffffffffffffda RBX: 00007f39f3be5fa0 RCX: 00007f39f398e0dc [ 179.052450][T11245] RDX: 000000000000000f RSI: 00007f39f47ae0a0 RDI: 0000000000000007 [ 179.052465][T11245] RBP: 00007f39f47ae090 R08: 0000000000000000 R09: 0000000000000000 [ 179.052479][T11245] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000000000001 [ 179.052494][T11245] R13: 00007f39f3be6038 R14: 00007f39f3be5fa0 R15: 00007ffdc3c09708 [ 179.052514][T11245] [ 179.939209][T11278] 9pnet_fd: Insufficient options for proto=fd [ 180.449784][T11352] 9pnet_fd: Insufficient options for proto=fd [ 180.505128][T11360] netlink: 8 bytes leftover after parsing attributes in process `syz.3.5136'. [ 180.659201][T11381] netlink: 8 bytes leftover after parsing attributes in process `syz.3.5147'. [ 181.845227][T11468] 9pnet_fd: Insufficient options for proto=fd [ 182.115874][T11486] 9pnet_fd: Insufficient options for proto=fd [ 183.971127][T11558] netlink: 8 bytes leftover after parsing attributes in process `syz.1.5233'. [ 185.400792][T11652] 9pnet_fd: Insufficient options for proto=fd [ 186.253324][T11724] netlink: 8 bytes leftover after parsing attributes in process `syz.0.5307'. [ 186.460611][T11752] netlink: 8 bytes leftover after parsing attributes in process `syz.1.5330'. [ 186.831384][T11776] netlink: 8 bytes leftover after parsing attributes in process `syz.3.5342'. [ 187.893815][T11834] netlink: 8 bytes leftover after parsing attributes in process `syz.2.5371'. [ 188.299113][T11888] netlink: 8 bytes leftover after parsing attributes in process `syz.3.5399'. [ 190.871313][T12008] netlink: 8 bytes leftover after parsing attributes in process `syz.2.5459'. [ 192.097832][T12081] netlink: 8 bytes leftover after parsing attributes in process `syz.1.5494'. [ 194.418710][T12231] netlink: 8 bytes leftover after parsing attributes in process `syz.0.5570'. [ 197.728646][T12487] netlink: 8 bytes leftover after parsing attributes in process `syz.3.5697'. [ 199.048301][T12563] netlink: 8 bytes leftover after parsing attributes in process `syz.1.5736'. [ 199.752733][T12609] netlink: 8 bytes leftover after parsing attributes in process `syz.2.5758'. [ 200.091572][T12625] netlink: 8 bytes leftover after parsing attributes in process `syz.2.5767'. [ 200.306464][T12643] netlink: 8 bytes leftover after parsing attributes in process `syz.2.5776'. [ 201.729282][T12719] netlink: 8 bytes leftover after parsing attributes in process `syz.3.5816'. [ 203.248213][T12789] netlink: 8 bytes leftover after parsing attributes in process `syz.0.5848'. [ 204.270940][T12953] netlink: 8 bytes leftover after parsing attributes in process `syz.0.5929'. [ 204.553469][T12975] netlink: 8 bytes leftover after parsing attributes in process `syz.0.5941'. [ 204.873158][T12997] netlink: 8 bytes leftover after parsing attributes in process `syz.0.5953'. [ 205.617252][T13039] netlink: 8 bytes leftover after parsing attributes in process `syz.1.5974'. [ 215.677598][T13477] netlink: 8 bytes leftover after parsing attributes in process `syz.1.6192'. [ 217.972988][T13580] netlink: 8 bytes leftover after parsing attributes in process `syz.3.6244'. [ 245.479515][T15247] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.486618][T15247] bridge0: port 1(bridge_slave_0) entered disabled state [ 245.493789][T15247] bridge_slave_0: entered allmulticast mode [ 245.500262][T15247] bridge_slave_0: entered promiscuous mode [ 245.507000][T15247] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.514153][T15247] bridge0: port 2(bridge_slave_1) entered disabled state [ 245.521274][T15247] bridge_slave_1: entered allmulticast mode [ 245.527753][T15247] bridge_slave_1: entered promiscuous mode [ 245.598431][ T46] bridge_slave_1: left allmulticast mode [ 245.604200][ T46] bridge_slave_1: left promiscuous mode [ 245.625654][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 245.639546][ T46] bridge_slave_0: left allmulticast mode [ 245.645266][ T46] bridge_slave_0: left promiscuous mode [ 245.659079][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 245.812871][ T46] veth1_macvtap: left promiscuous mode [ 245.828672][ T46] veth0_vlan: left promiscuous mode [ 245.991471][T15247] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.998592][T15247] bridge0: port 2(bridge_slave_1) entered forwarding state [ 246.005955][T15247] bridge0: port 1(bridge_slave_0) entered blocking state [ 246.013032][T15247] bridge0: port 1(bridge_slave_0) entered forwarding state [ 246.100417][ T329] bridge0: port 1(bridge_slave_0) entered disabled state [ 246.108066][ T329] bridge0: port 2(bridge_slave_1) entered disabled state [ 246.132815][ T329] bridge0: port 1(bridge_slave_0) entered blocking state [ 246.139933][ T329] bridge0: port 1(bridge_slave_0) entered forwarding state [ 246.164907][ T329] bridge0: port 2(bridge_slave_1) entered blocking state [ 246.172041][ T329] bridge0: port 2(bridge_slave_1) entered forwarding state [ 246.227217][T15247] veth0_vlan: entered promiscuous mode [ 246.253783][T15247] veth1_macvtap: entered promiscuous mode [ 247.559732][ T329] bridge_slave_1: left allmulticast mode [ 247.565444][ T329] bridge_slave_1: left promiscuous mode [ 247.582316][ T329] bridge0: port 2(bridge_slave_1) entered disabled state [ 247.601947][ T329] bridge_slave_0: left allmulticast mode [ 247.607651][ T329] bridge_slave_0: left promiscuous mode [ 247.637663][ T329] bridge0: port 1(bridge_slave_0) entered disabled state [ 247.794263][ T329] veth1_macvtap: left promiscuous mode [ 247.809267][ T329] veth0_vlan: left promiscuous mode [ 248.011955][T15327] bridge0: port 1(bridge_slave_0) entered blocking state [ 248.019126][T15327] bridge0: port 1(bridge_slave_0) entered disabled state [ 248.026229][T15327] bridge_slave_0: entered allmulticast mode [ 248.032871][T15327] bridge_slave_0: entered promiscuous mode [ 248.039622][T15327] bridge0: port 2(bridge_slave_1) entered blocking state [ 248.046971][T15327] bridge0: port 2(bridge_slave_1) entered disabled state [ 248.054098][T15327] bridge_slave_1: entered allmulticast mode [ 248.060570][T15327] bridge_slave_1: entered promiscuous mode [ 248.269755][T15327] bridge0: port 2(bridge_slave_1) entered blocking state [ 248.276946][T15327] bridge0: port 2(bridge_slave_1) entered forwarding state [ 248.284287][T15327] bridge0: port 1(bridge_slave_0) entered blocking state [ 248.291378][T15327] bridge0: port 1(bridge_slave_0) entered forwarding state [ 248.353834][ T329] bridge0: port 1(bridge_slave_0) entered disabled state [ 248.372624][ T329] bridge0: port 2(bridge_slave_1) entered disabled state [ 248.391381][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 248.398494][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 248.427977][ T329] bridge0: port 2(bridge_slave_1) entered blocking state [ 248.435102][ T329] bridge0: port 2(bridge_slave_1) entered forwarding state [ 248.514214][T15327] veth0_vlan: entered promiscuous mode [ 248.546122][T15327] veth1_macvtap: entered promiscuous mode [ 249.772777][ T329] bridge_slave_1: left allmulticast mode [ 249.778484][ T329] bridge_slave_1: left promiscuous mode [ 249.794392][ T329] bridge0: port 2(bridge_slave_1) entered disabled state [ 249.814788][ T329] bridge_slave_0: left allmulticast mode [ 249.829011][ T329] bridge_slave_0: left promiscuous mode [ 249.834692][ T329] bridge0: port 1(bridge_slave_0) entered disabled state [ 249.978693][ T329] veth1_macvtap: left promiscuous mode [ 249.989408][ T329] veth0_vlan: left promiscuous mode [ 250.210247][T15429] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.217421][T15429] bridge0: port 1(bridge_slave_0) entered disabled state [ 250.224569][T15429] bridge_slave_0: entered allmulticast mode [ 250.231082][T15429] bridge_slave_0: entered promiscuous mode [ 250.237751][T15429] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.245223][T15429] bridge0: port 2(bridge_slave_1) entered disabled state [ 250.252548][T15429] bridge_slave_1: entered allmulticast mode [ 250.259218][T15429] bridge_slave_1: entered promiscuous mode [ 250.503460][T15429] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.510572][T15429] bridge0: port 2(bridge_slave_1) entered forwarding state [ 250.517921][T15429] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.525016][T15429] bridge0: port 1(bridge_slave_0) entered forwarding state [ 250.607882][ T329] bridge0: port 1(bridge_slave_0) entered disabled state [ 250.617122][ T329] bridge0: port 2(bridge_slave_1) entered disabled state [ 250.640258][ T46] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.647345][ T46] bridge0: port 1(bridge_slave_0) entered forwarding state [ 250.680024][ T46] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.687147][ T46] bridge0: port 2(bridge_slave_1) entered forwarding state [ 250.779117][T15429] veth0_vlan: entered promiscuous mode [ 250.802339][T15429] veth1_macvtap: entered promiscuous mode [ 256.130722][T15764] netlink: 8 bytes leftover after parsing attributes in process `syz.3.7319'. [ 260.012952][ T12] bridge_slave_1: left allmulticast mode [ 260.018673][ T12] bridge_slave_1: left promiscuous mode [ 260.024658][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 260.032627][ T12] bridge_slave_0: left allmulticast mode [ 260.038408][ T12] bridge_slave_0: left promiscuous mode [ 260.044445][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 260.171541][ T12] veth1_macvtap: left promiscuous mode [ 260.182207][ T12] veth0_vlan: left promiscuous mode [ 260.265767][T16004] bridge0: port 1(bridge_slave_0) entered blocking state [ 260.281191][T16004] bridge0: port 1(bridge_slave_0) entered disabled state [ 260.298513][T16004] bridge_slave_0: entered allmulticast mode [ 260.321015][T16004] bridge_slave_0: entered promiscuous mode [ 260.346302][T16004] bridge0: port 2(bridge_slave_1) entered blocking state [ 260.363568][T16004] bridge0: port 2(bridge_slave_1) entered disabled state [ 260.381989][T16004] bridge_slave_1: entered allmulticast mode [ 260.393934][T16004] bridge_slave_1: entered promiscuous mode [ 260.533407][T16004] bridge0: port 2(bridge_slave_1) entered blocking state [ 260.540536][T16004] bridge0: port 2(bridge_slave_1) entered forwarding state [ 260.547865][T16004] bridge0: port 1(bridge_slave_0) entered blocking state [ 260.554965][T16004] bridge0: port 1(bridge_slave_0) entered forwarding state [ 260.616366][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 260.623996][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 260.650091][ T329] bridge0: port 1(bridge_slave_0) entered blocking state [ 260.657182][ T329] bridge0: port 1(bridge_slave_0) entered forwarding state [ 260.679378][ T329] bridge0: port 2(bridge_slave_1) entered blocking state [ 260.686473][ T329] bridge0: port 2(bridge_slave_1) entered forwarding state [ 260.742985][T16004] veth0_vlan: entered promiscuous mode [ 260.769993][T16004] veth1_macvtap: entered promiscuous mode [ 302.252298][ T36] audit: type=1400 audit(1763155904.320:160): avc: denied { write } for pid=18284 comm="syz.0.8572" name="/" dev="incremental-fs" ino=2150 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 302.279175][T15429] ------------[ cut here ]------------ [ 302.284713][T15429] WARNING: CPU: 1 PID: 15429 at fs/inode.c:340 drop_nlink+0xce/0x110 [ 302.292897][T15429] Modules linked in: [ 302.296836][T15429] CPU: 1 UID: 0 PID: 15429 Comm: syz-executor Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 302.308999][ T36] audit: type=1400 audit(1763155904.320:161): avc: denied { remove_name } for pid=18284 comm="syz.0.8572" name="bus" dev="incremental-fs" ino=2157 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 302.312065][T15429] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 302.345739][T15429] RIP: 0010:drop_nlink+0xce/0x110 [ 302.350865][T15429] Code: 04 00 00 be 08 00 00 00 e8 cf 54 ee ff f0 48 ff 83 b8 04 00 00 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc cc e8 32 e4 97 ff <0f> 0b eb 81 44 89 f1 80 e1 07 80 c1 03 38 c1 0f 8c 59 ff ff ff 4c [ 302.370564][T15429] RSP: 0018:ffffc9000f177c60 EFLAGS: 00010293 [ 302.373220][ T36] audit: type=1400 audit(1763155904.320:162): avc: denied { rmdir } for pid=18284 comm="syz.0.8572" name="bus" dev="incremental-fs" ino=2157 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 302.376663][T15429] RAX: ffffffff81ee1a7e RBX: ffff88810ffdb838 RCX: ffff888119783900 [ 302.376685][T15429] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 302.415680][T15429] RBP: ffffc9000f177c88 R08: 0000000000000003 R09: 0000000000000004 [ 302.423722][T15429] R10: dffffc0000000000 R11: fffff52001e2ef7c R12: dffffc0000000000 [ 302.431755][T15429] R13: 1ffff11021ffb710 R14: ffff88810ffdb880 R15: 0000000000000000 [ 302.439796][T15429] FS: 0000555594f05500(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 302.448760][T15429] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 302.454322][ T36] audit: type=1400 audit(1763155904.510:163): avc: denied { read write } for pid=18275 comm="syz.3.8569" name="rnullb0" dev="devtmpfs" ino=31 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 302.455408][T15429] CR2: 0000555594f284e8 CR3: 0000000114b04000 CR4: 00000000003526b0 [ 302.486558][T15429] Call Trace: [ 302.489909][T15429] [ 302.492879][T15429] shmem_rmdir+0x5f/0x90 [ 302.497170][T15429] vfs_rmdir+0x3dd/0x560 [ 302.501475][T15429] incfs_kill_sb+0x109/0x230 [ 302.506115][T15429] deactivate_locked_super+0xd5/0x2a0 [ 302.511565][T15429] deactivate_super+0xb8/0xe0 [ 302.516283][T15429] cleanup_mnt+0x3f1/0x480 [ 302.520773][T15429] __cleanup_mnt+0x1d/0x40 [ 302.525290][T15429] task_work_run+0x1e0/0x250 [ 302.529971][T15429] ? __cfi_task_work_run+0x10/0x10 [ 302.530165][ T36] audit: type=1400 audit(1763155904.510:164): avc: denied { open } for pid=18275 comm="syz.3.8569" path="/dev/rnullb0" dev="devtmpfs" ino=31 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 302.535154][T15429] ? __x64_sys_umount+0x126/0x170 [ 302.563597][T15429] ? __cfi___x64_sys_umount+0x10/0x10 [ 302.569047][T15429] ? __kasan_check_read+0x15/0x20 [ 302.574114][T15429] resume_user_mode_work+0x36/0x50 [ 302.579289][T15429] syscall_exit_to_user_mode+0x64/0xb0 [ 302.584790][T15429] do_syscall_64+0x64/0xf0 [ 302.589288][T15429] ? clear_bhb_loop+0x50/0xa0 [ 302.594022][T15429] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 302.599968][T15429] RIP: 0033:0x7fa3a93909f7 [ 302.604410][T15429] Code: a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 a8 ff ff ff f7 d8 64 89 02 b8 [ 302.624113][T15429] RSP: 002b:00007ffcdcfa60b8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 302.632606][T15429] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fa3a93909f7 [ 302.640635][T15429] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffcdcfa6170 [ 302.648640][T15429] RBP: 00007ffcdcfa6170 R08: 0000000000000000 R09: 0000000000000000 [ 302.656693][T15429] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007ffcdcfa7200 [ 302.664735][T15429] R13: 00007fa3a9411d7d R14: 0000000000049ca0 R15: 00007ffcdcfa7240 [ 302.672782][T15429] [ 302.675826][T15429] ---[ end trace 0000000000000000 ]--- [ 302.681496][T15429] ================================================================== [ 302.689608][T15429] BUG: KASAN: null-ptr-deref in ihold+0x24/0x70 [ 302.695887][T15429] Write of size 4 at addr 0000000000000168 by task syz-executor/15429 [ 302.704083][T15429] [ 302.706442][T15429] CPU: 1 UID: 0 PID: 15429 Comm: syz-executor Tainted: G W syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 302.706493][T15429] Tainted: [W]=WARN [ 302.706502][T15429] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 302.706516][T15429] Call Trace: [ 302.706523][T15429] [ 302.706532][T15429] __dump_stack+0x21/0x30 [ 302.706568][T15429] dump_stack_lvl+0x10c/0x190 [ 302.706598][T15429] ? __cfi_dump_stack_lvl+0x10/0x10 [ 302.706630][T15429] print_report+0x3d/0x70 [ 302.706655][T15429] kasan_report+0x163/0x1a0 [ 302.706682][T15429] ? ihold+0x24/0x70 [ 302.706708][T15429] ? _raw_spin_unlock+0x45/0x60 [ 302.706738][T15429] ? ihold+0x24/0x70 [ 302.706761][T15429] kasan_check_range+0x299/0x2a0 [ 302.706789][T15429] __kasan_check_write+0x18/0x20 [ 302.706824][T15429] ihold+0x24/0x70 [ 302.706847][T15429] vfs_rmdir+0x26a/0x560 [ 302.706877][T15429] incfs_kill_sb+0x109/0x230 [ 302.706911][T15429] deactivate_locked_super+0xd5/0x2a0 [ 302.706941][T15429] deactivate_super+0xb8/0xe0 [ 302.706970][T15429] cleanup_mnt+0x3f1/0x480 [ 302.706996][T15429] __cleanup_mnt+0x1d/0x40 [ 302.707020][T15429] task_work_run+0x1e0/0x250 [ 302.707048][T15429] ? __cfi_task_work_run+0x10/0x10 [ 302.707075][T15429] ? __x64_sys_umount+0x126/0x170 [ 302.707106][T15429] ? __cfi___x64_sys_umount+0x10/0x10 [ 302.707138][T15429] ? __kasan_check_read+0x15/0x20 [ 302.707172][T15429] resume_user_mode_work+0x36/0x50 [ 302.707200][T15429] syscall_exit_to_user_mode+0x64/0xb0 [ 302.707225][T15429] do_syscall_64+0x64/0xf0 [ 302.707278][T15429] ? clear_bhb_loop+0x50/0xa0 [ 302.707304][T15429] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 302.707328][T15429] RIP: 0033:0x7fa3a93909f7 [ 302.707348][T15429] Code: a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 a8 ff ff ff f7 d8 64 89 02 b8 [ 302.707368][T15429] RSP: 002b:00007ffcdcfa60b8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 302.707393][T15429] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fa3a93909f7 [ 302.707408][T15429] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffcdcfa6170 [ 302.707423][T15429] RBP: 00007ffcdcfa6170 R08: 0000000000000000 R09: 0000000000000000 [ 302.707438][T15429] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007ffcdcfa7200 [ 302.707454][T15429] R13: 00007fa3a9411d7d R14: 0000000000049ca0 R15: 00007ffcdcfa7240 [ 302.707473][T15429] [ 302.707490][T15429] ================================================================== [ 302.952674][T15429] Disabling lock debugging due to kernel taint [ 302.958886][T15429] BUG: kernel NULL pointer dereference, address: 0000000000000168 [ 302.966733][T15429] #PF: supervisor write access in kernel mode [ 302.972827][T15429] #PF: error_code(0x0002) - not-present page [ 302.978828][T15429] PGD 8000000130311067 P4D 8000000130311067 PUD 0 [ 302.985380][T15429] Oops: Oops: 0002 [#1] PREEMPT SMP KASAN PTI [ 302.991574][T15429] CPU: 1 UID: 0 PID: 15429 Comm: syz-executor Tainted: G B W syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 303.004906][T15429] Tainted: [B]=BAD_PAGE, [W]=WARN [ 303.009951][T15429] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 303.020127][T15429] RIP: 0010:ihold+0x2a/0x70 [ 303.024764][T15429] Code: f3 0f 1e fa 55 48 89 e5 41 56 53 48 89 fb e8 1d db 97 ff 48 8d bb 68 01 00 00 be 04 00 00 00 e8 8c 4b ee ff 41 be 01 00 00 00 44 0f c1 b3 68 01 00 00 41 ff c6 bf 02 00 00 00 44 89 f6 e8 2d [ 303.044412][T15429] RSP: 0018:ffffc9000f177ca0 EFLAGS: 00010246 [ 303.050522][T15429] RAX: ffff888119783900 RBX: 0000000000000000 RCX: ffff888119783900 [ 303.058534][T15429] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 303.066543][T15429] RBP: ffffc9000f177cb0 R08: ffffffff88972947 R09: 1ffffffff112e528 [ 303.074552][T15429] R10: dffffc0000000000 R11: fffffbfff112e529 R12: ffff88810ffdb844 [ 303.082651][T15429] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 [ 303.090660][T15429] FS: 0000555594f05500(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 303.099721][T15429] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 303.106332][T15429] CR2: 0000000000000168 CR3: 0000000114b04000 CR4: 00000000003526b0 [ 303.114340][T15429] Call Trace: [ 303.117646][T15429] [ 303.120603][T15429] vfs_rmdir+0x26a/0x560 [ 303.124894][T15429] incfs_kill_sb+0x109/0x230 [ 303.129522][T15429] deactivate_locked_super+0xd5/0x2a0 [ 303.135016][T15429] deactivate_super+0xb8/0xe0 [ 303.139820][T15429] cleanup_mnt+0x3f1/0x480 [ 303.144355][T15429] __cleanup_mnt+0x1d/0x40 [ 303.148800][T15429] task_work_run+0x1e0/0x250 [ 303.153421][T15429] ? __cfi_task_work_run+0x10/0x10 [ 303.158560][T15429] ? __x64_sys_umount+0x126/0x170 [ 303.163622][T15429] ? __cfi___x64_sys_umount+0x10/0x10 [ 303.169048][T15429] ? __kasan_check_read+0x15/0x20 [ 303.174127][T15429] resume_user_mode_work+0x36/0x50 [ 303.179282][T15429] syscall_exit_to_user_mode+0x64/0xb0 [ 303.184785][T15429] do_syscall_64+0x64/0xf0 [ 303.189240][T15429] ? clear_bhb_loop+0x50/0xa0 [ 303.193951][T15429] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 303.199876][T15429] RIP: 0033:0x7fa3a93909f7 [ 303.204321][T15429] Code: a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 a8 ff ff ff f7 d8 64 89 02 b8 [ 303.223956][T15429] RSP: 002b:00007ffcdcfa60b8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 303.232501][T15429] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fa3a93909f7 [ 303.240585][T15429] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffcdcfa6170 [ 303.248585][T15429] RBP: 00007ffcdcfa6170 R08: 0000000000000000 R09: 0000000000000000 [ 303.256585][T15429] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007ffcdcfa7200 [ 303.264575][T15429] R13: 00007fa3a9411d7d R14: 0000000000049ca0 R15: 00007ffcdcfa7240 [ 303.272735][T15429] [ 303.275750][T15429] Modules linked in: [ 303.279655][T15429] CR2: 0000000000000168 [ 303.283801][T15429] ---[ end trace 0000000000000000 ]--- [ 303.289346][T15429] RIP: 0010:ihold+0x2a/0x70 [ 303.293887][T15429] Code: f3 0f 1e fa 55 48 89 e5 41 56 53 48 89 fb e8 1d db 97 ff 48 8d bb 68 01 00 00 be 04 00 00 00 e8 8c 4b ee ff 41 be 01 00 00 00 44 0f c1 b3 68 01 00 00 41 ff c6 bf 02 00 00 00 44 89 f6 e8 2d [ 303.313499][T15429] RSP: 0018:ffffc9000f177ca0 EFLAGS: 00010246 [ 303.319569][T15429] RAX: ffff888119783900 RBX: 0000000000000000 RCX: ffff888119783900 [ 303.327547][T15429] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 303.335521][T15429] RBP: ffffc9000f177cb0 R08: ffffffff88972947 R09: 1ffffffff112e528 [ 303.343497][T15429] R10: dffffc0000000000 R11: fffffbfff112e529 R12: ffff88810ffdb844 [ 303.351516][T15429] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 [ 303.359491][T15429] FS: 0000555594f05500(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 303.368554][T15429] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 303.375134][T15429] CR2: 0000000000000168 CR3: 0000000114b04000 CR4: 00000000003526b0 [ 303.383128][T15429] Kernel panic - not syncing: Fatal exception [ 303.389540][T15429] Kernel Offset: disabled [ 303.393869][T15429] Rebooting in 86400 seconds..