last executing test programs: 2.123662437s ago: executing program 1 (id=16732): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r0, @ANYRES64], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r1, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r2, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) sendmmsg$inet6(r1, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x1, &(0x7f0000000040), 0x4) 1.19453235s ago: executing program 2 (id=16746): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f00000002c0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="899979fcaf395aa0af6186d4b805962b9355432de397f14f235670d9094b3a9b508464d009678506a9495eb44e2179fff7cc48fe47469e35d6de67014196e800092fe692ececfd80149f811b78f9", 0x4e}, {&(0x7f0000000540)="777df3f4a3c6da6f30e5ea4e9804f0c25150903fad7222dac3da52201257fde1f387d903eb451744059b3c6b7ec85abf1de1c363e4c522e5c6982d011e39ae7277f9842fefdf2338bd7fb6af3d9fd8c7895f47f09215c7d87ab513044765f9300f89abae550b1a57ad17295751b65d5074a24c2c70aa93187cd6375607be6541ad889af4f88a26f64355ec8e5f43d5ebf3b8782c5c7a45d8395814689fb9b4584367b834b3610699ee7ca0d92127c3a8f6bb43b5278c02b6fe53140cddc23f5b12abf1c8ff2ba1340000b52af3fa5ec35636", 0xd2}, {&(0x7f0000000140)="a198e4267b402943edd46efd74002b1567b8286657cd532e06", 0x19}, {&(0x7f0000000a00)="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"/399, 0x18f}, {&(0x7f0000000700)="9840631f11c103dab577ba42d8af28315334041c905ac2f91cb4381803bf587b4bc894b9d2140bad2c71c6a8338c0f6b60ab139669e10910014565105b4e5c4628223ef0c70da176ba128877c02f0a4ca3e4b44d336daceab7f9b9fced0906037560aa383e0f5e3f6c263e822430976ceef3edf16e704472fca7da77877e5df8948e9a65ad15975b43ff9c6f663866064d3e07d05d6465e088c2121a4703ae6cef1cd93e56053eb2cfaa9b8a4cfb", 0xae}, {&(0x7f00000007c0)="b03bf3f22c964f84572d62689aa6790b124586751899a57efdd9e3735ff7646d871ce977e583b08471be00ac8ecdf60005dc6424da93cb8ff993172cb70a6eacacfa6298111eac58eb6499c56ad1a7555ffe05fd84c5c0811eff90abb9aa0d8760cac367025419a18df17055dcf78e2b84438ec83eb0ce1474624f425b100fd99b3c3605ff85b54044ee9ddf8993ced0a2589b305ed99336f889bafceaada01b1315f769f36a1bbb924ce08b29cfc301fb271b0668210ef150e8359dc62b2dc71d56667bf337ea4123249197300d59ac490698e23670701331a7db2cb271575758e5d13f312f38f3272617af907b53dabb3b7cd08879", 0xf6}, {&(0x7f0000000bc0)="2869e89b31b4b817c64c27d5a11bba45da82a4059b0c896f22fcfd0b888ec7760af4baca03a1be2e927886df0c75eb7d8b07fe3f11e5e7d91377e8d1679c794104738d9f7ef103f65d9a5c38736787b2444d2378aeb07bb90b3a0ce915613a393886466b8111755ee122fbdd2853697ea710ef0b376fd820467099a563eb14c8e75f2bf4df1a7708cf1a364db6645c9064addbe8adfeec5b70e971ed348b5341dd58504c308054dd1bad7110bcbfd547ed", 0xb1}], 0x7}}], 0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r2, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) syz_clone(0x2000, &(0x7f00000001c0)="51307d9339e660630155ee5ae5a9420efebc26d3d03b4f18e29b1297124521cec307bec3b45f9cc271def429911032129db9b6cbd74bbb85b35237c76781cdebef91f74c87d9febab547f65c7bcd536fee13609c5d33218c1641e5b51c091993448c0c881177cb50f24694509f2f563af5c898c3e196563609a6940225d05039a19ad3adf09b5a0c003222bd0e6e9fdfe4d227b2a79f7f549768405908b2b75ed36b7767912385700a7a719e26d647f102702daebb8176ff387f241efe34e063557e7bca09adc9436b5699b8f1b2a0cf12b5f876ca703b95e7770b06b5700f8a2843b1a021c88da15ec8be675b157815", 0xf0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="fc5a739fc8da5053dea8ce882bc01e1c76f57104e65f81f3058bfddc83e21ac71fd9c95e8261979e747cf99b26238439989a0995f36d80ecdc3651e5c8a636a74d466aecb7eafec517811f39fc8e341e098bad59fc75699f5714c9b37b4fc44df20ac56952317f1543b8a129a0d111dc58c7f705e5c4f13538fa5e83e9d33a573518470219c4db5b4da61b3527e02d70d6c7f2a071f0939ab3c92360f7dfdf36f8acbfa29100d386b239af47") 1.057203703s ago: executing program 3 (id=16748): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r1, &(0x7f00000002c0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="899979fcaf395aa0af6186d4b805962b9355432de397f14f235670d9094b3a9b508464d009678506a9495eb44e2179fff7cc48fe47469e35d6de67014196e800092fe692ececfd80149f811b78f9", 0x4e}, {&(0x7f0000000540)="777df3f4a3c6da6f30e5ea4e9804f0c25150903fad7222dac3da52201257fde1f387d903eb451744059b3c6b7ec85abf1de1c363e4c522e5c6982d011e39ae7277f9842fefdf2338bd7fb6af3d9fd8c7895f47f09215c7d87ab513044765f9300f89abae550b1a57ad17295751b65d5074a24c2c70aa93187cd6375607be6541ad889af4f88a26f64355ec8e5f43d5ebf3b8782c5c7a45d8395814689fb9b4584367b834b3610699ee7ca0d92127c3a8f6bb43b5278c02b6fe53140cddc23f5b12abf1c8ff2ba1340000b52af3fa5ec35636", 0xd2}, {&(0x7f0000000140)="a198e4267b402943edd46efd74002b1567b8286657cd532e06", 0x19}, {&(0x7f0000000a00)="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"/399, 0x18f}, {&(0x7f0000000700)="9840631f11c103dab577ba42d8af28315334041c905ac2f91cb4381803bf587b4bc894b9d2140bad2c71c6a8338c0f6b60ab139669e10910014565105b4e5c4628223ef0c70da176ba128877c02f0a4ca3e4b44d336daceab7f9b9fced0906037560aa383e0f5e3f6c263e822430976ceef3edf16e704472fca7da77877e5df8948e9a65ad15975b43ff9c6f663866064d3e07d05d6465e088c2121a4703ae6cef1cd93e56053eb2cfaa9b8a4cfb", 0xae}, {&(0x7f00000007c0)="b03bf3f22c964f84572d62689aa6790b124586751899a57efdd9e3735ff7646d871ce977e583b08471be00ac8ecdf60005dc6424da93cb8ff993172cb70a6eacacfa6298111eac58eb6499c56ad1a7555ffe05fd84c5c0811eff90abb9aa0d8760cac367025419a18df17055dcf78e2b84438ec83eb0ce1474624f425b100fd99b3c3605ff85b54044ee9ddf8993ced0a2589b305ed99336f889bafceaada01b1315f769f36a1bbb924ce08b29cfc301fb271b0668210ef150e8359dc62b2dc71d56667bf337ea4123249197300d59ac490698e23670701331a7db2cb271575758e5d13f312f38f3272617af907b53dabb3b7cd08879", 0xf6}, {&(0x7f0000000bc0)="2869e89b31b4b817c64c27d5a11bba45da82a4059b0c896f22fcfd0b888ec7760af4baca03a1be2e927886df0c75eb7d8b07fe3f11e5e7d91377e8d1679c794104738d9f7ef103f65d9a5c38736787b2444d2378aeb07bb90b3a0ce915613a393886466b8111755ee122fbdd2853697ea710ef0b376fd820467099a563eb14c8e75f2bf4df1a7708cf1a364db6645c9064addbe8adfeec5b70e971ed348b5341dd58504c308054dd1bad7110bcbfd547ed", 0xb1}], 0x7}}], 0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r2, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) sendmmsg$inet6(r1, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) syz_clone(0x2000, &(0x7f00000001c0)="51307d9339e660630155ee5ae5a9420efebc26d3d03b4f18e29b1297124521cec307bec3b45f9cc271def429911032129db9b6cbd74bbb85b35237c76781cdebef91f74c87d9febab547f65c7bcd536fee13609c5d33218c1641e5b51c091993448c0c881177cb50f24694509f2f563af5c898c3e196563609a6940225d05039a19ad3adf09b5a0c003222bd0e6e9fdfe4d227b2a79f7f549768405908b2b75ed36b7767912385700a7a719e26d647f102702daebb8176ff387f241efe34e063557e7bca09adc9436b5699b8f1b2a0cf12b5f876ca703b95e7770b06b5700f8a2843b1a021c88da15ec8be675b157815", 0xf0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="fc5a739fc8da5053dea8ce882bc01e1c76f57104e65f81f3058bfddc83e21ac71fd9c95e8261979e747cf99b26238439989a0995f36d80ecdc3651e5c8a636a74d466aecb7eafec517811f39fc8e341e098bad59fc75699f5714c9b37b4fc44df20ac56952317f1543b8a129a0d111dc58c7f705e5c4f13538fa5e83e9d33a573518470219c4db5b4da61b3527e02d70d6c7f2a071f0939ab3c92360f7dfdf36f8acbfa29100d386b239af47") 1.040721865s ago: executing program 2 (id=16749): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r4, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r4, 0x29, 0x1, &(0x7f0000000100), 0x4) 900.922739ms ago: executing program 3 (id=16751): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x80, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) userfaultfd(0x80801) rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r5, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r5, @ANYRES64=r4], 0x118) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x49) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r5, 0x0) mount$fuse(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000480), 0x1808800, &(0x7f0000000900)={{'fd', 0x3d, r6}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 896.701399ms ago: executing program 1 (id=16752): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r5, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) rt_sigaction(0xd, 0x0, 0x0, 0x0, 0x0) (fail_nth: 1) 680.813351ms ago: executing program 0 (id=16754): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r5, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r6, 0x0, 0x0) 671.861962ms ago: executing program 2 (id=16755): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r5, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r6, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r6, 0x29, 0x1, &(0x7f0000000100), 0x4) 597.058429ms ago: executing program 0 (id=16756): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8=0x0, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00), 0x0, 0x4) futex(&(0x7f00000000c0), 0x6, 0x1, 0x0, &(0x7f00000001c0)=0x2, 0x2) 594.95099ms ago: executing program 0 (id=16757): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r2, &(0x7f00000002c0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="899979fcaf395aa0af6186d4b805962b9355432de397f14f235670d9094b3a9b508464d009678506a9495eb44e2179fff7cc48fe47469e35d6de67014196e800092fe692ececfd80149f811b78f9", 0x4e}, {&(0x7f0000000540)="777df3f4a3c6da6f30e5ea4e9804f0c25150903fad7222dac3da52201257fde1f387d903eb451744059b3c6b7ec85abf1de1c363e4c522e5c6982d011e39ae7277f9842fefdf2338bd7fb6af3d9fd8c7895f47f09215c7d87ab513044765f9300f89abae550b1a57ad17295751b65d5074a24c2c70aa93187cd6375607be6541ad889af4f88a26f64355ec8e5f43d5ebf3b8782c5c7a45d8395814689fb9b4584367b834b3610699ee7ca0d92127c3a8f6bb43b5278c02b6fe53140cddc23f5b12abf1c8ff2ba1340000b52af3fa5ec35636", 0xd2}, {&(0x7f0000000140)="a198e4267b402943edd46efd74002b1567b8286657cd532e06", 0x19}, {&(0x7f0000000a00)="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"/399, 0x18f}, {&(0x7f0000000700)="9840631f11c103dab577ba42d8af28315334041c905ac2f91cb4381803bf587b4bc894b9d2140bad2c71c6a8338c0f6b60ab139669e10910014565105b4e5c4628223ef0c70da176ba128877c02f0a4ca3e4b44d336daceab7f9b9fced0906037560aa383e0f5e3f6c263e822430976ceef3edf16e704472fca7da77877e5df8948e9a65ad15975b43ff9c6f663866064d3e07d05d6465e088c2121a4703ae6cef1cd93e56053eb2cfaa9b8a4cfb", 0xae}, {&(0x7f00000007c0)="b03bf3f22c964f84572d62689aa6790b124586751899a57efdd9e3735ff7646d871ce977e583b08471be00ac8ecdf60005dc6424da93cb8ff993172cb70a6eacacfa6298111eac58eb6499c56ad1a7555ffe05fd84c5c0811eff90abb9aa0d8760cac367025419a18df17055dcf78e2b84438ec83eb0ce1474624f425b100fd99b3c3605ff85b54044ee9ddf8993ced0a2589b305ed99336f889bafceaada01b1315f769f36a1bbb924ce08b29cfc301fb271b0668210ef150e8359dc62b2dc71d56667bf337ea4123249197300d59ac490698e23670701331a7db2cb271575758e5d13f312f38f3272617af907b53dabb3b7cd08879", 0xf6}, {&(0x7f0000000bc0)="2869e89b31b4b817c64c27d5a11bba45da82a4059b0c896f22fcfd0b888ec7760af4baca03a1be2e927886df0c75eb7d8b07fe3f11e5e7d91377e8d1679c794104738d9f7ef103f65d9a5c38736787b2444d2378aeb07bb90b3a0ce915613a393886466b8111755ee122fbdd2853697ea710ef0b376fd820467099a563eb14c8e75f2bf4df1a7708cf1a364db6645c9064addbe8adfeec5b70e971ed348b5341dd58504c308054dd1bad7110bcbfd547ed", 0xb1}], 0x7}}], 0x1, 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) syz_clone(0x2000, &(0x7f00000001c0)="51307d9339e660630155ee5ae5a9420efebc26d3d03b4f18e29b1297124521cec307bec3b45f9cc271def429911032129db9b6cbd74bbb85b35237c76781cdebef91f74c87d9febab547f65c7bcd536fee13609c5d33218c1641e5b51c091993448c0c881177cb50f24694509f2f563af5c898c3e196563609a6940225d05039a19ad3adf09b5a0c003222bd0e6e9fdfe4d227b2a79f7f549768405908b2b75ed36b7767912385700a7a719e26d647f102702daebb8176ff387f241efe34e063557e7bca09adc9436b5699b8f1b2a0cf12b5f876ca703b95e7770b06b5700f8a2843b1a021c88da15ec8be675b157815", 0xf0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)="fc5a739fc8da5053dea8ce882bc01e1c76f57104e65f81f3058bfddc83e21ac71fd9c95e8261979e747cf99b26238439989a0995f36d80ecdc3651e5c8a636a74d466aecb7eafec517811f39fc8e341e098bad59fc75699f5714c9b37b4fc44df20ac56952317f1543b8a129a0d111dc58c7f705e5c4f13538fa5e83e9d33a573518470219c4db5b4da61b3527e02d70d6c7f2a071f0939ab3c92360f7dfdf36f8acbfa29100d386b239af47") 584.906981ms ago: executing program 3 (id=16758): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) creat(&(0x7f0000000040)='./file0\x00', 0x4) 547.471334ms ago: executing program 2 (id=16759): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0xffffffffffffff82, 0x0}}], 0x1, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r5, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r7, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r7, @ANYRES64=r6], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r7, 0x0) ioctl$KVM_X86_SETUP_MCE(r7, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r6, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r8, 0x6, 0x3, &(0x7f0000000180)=0x100000001, 0x51) rt_sigaction(0xd, &(0x7f0000000180)={0x0, 0x94000000, 0x0, {[0xfff7ffffffffffff]}}, 0x0, 0x8, &(0x7f0000000300)) 430.171936ms ago: executing program 2 (id=16760): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) syz_clone3(&(0x7f0000000840)={0x4002000, 0x0, 0x0, 0x0, {0xf}, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x0], 0x1}, 0x58) r5 = openat$cgroup_ro(r1, &(0x7f00000004c0)='blkio.bfq.io_queued_recursive\x00', 0x275a, 0x0) write$UHID_CREATE2(r5, &(0x7f0000000240)=ANY=[@ANYRESDEC=r2, @ANYRES8, @ANYRES16=r3, @ANYRES64, @ANYRES64=0x0, @ANYBLOB="ac1bd1308ee419e6bffbbfd4739acf132b5e15cd226d6772c4e23327e1f870f02be7feebbd6d67f6f271574123d902854b98582c96f4f88455f45131296c2cf147"], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$SMC_PNETID_GET(r5, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0a072cbd7000fbdbdf25010000000900030073797a310000000009f9cb9dd4b9e600010073797a320000000009fe46e5fa797a310000000005000400050000001400020073797a5f74756e0000000000000000000500"], 0x5c}, 0x1, 0x0, 0x0, 0x4000004}, 0x40880) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r6, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r7, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_wireguard(r8, 0x8933, &(0x7f00000002c0)={'wg2\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(r9, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="31807657f8d6d63bec1616deabfd11f0e808c01c0be938c9b24e114c40786529fd620b134996646d28acac5963d0abd0e02c", @ANYRES16=r10, @ANYBLOB="05002abd7000fddbdf25010000004c0008804800008024000100d1732899f611cd8994034d7f413dc957630e5493c285aca40065cb6311be696b200004000a004e2000000001ff0100000000000000000000000000010200000008000100", @ANYRES32=r11, @ANYBLOB="4e600d0680711f032b768edc394e1b1bfbf760628e2c9e78c731214d5b79034eb15a6485497ce5fc0f943724fec7eb6d170793297bd30d30168d6011b023d9d9825a5b2841a9774547d3a64eb5a6df447103904aa16d521df3139cc7722454892f871099db4afe11cd4d325686be9a2364e20e2eab6599bc1da2ad517176"], 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x40) 390.93349ms ago: executing program 3 (id=16761): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)=@rc={0x1f, @none}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000380)=""/239, 0xef}, {&(0x7f00000001c0)=""/191, 0xbf}], 0x2, &(0x7f0000000540)=""/172, 0xac}, 0x40000001) 252.300364ms ago: executing program 1 (id=16762): socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f00000000c0)={'bond0\x00', &(0x7f00000001c0)=@ethtool_rx_ntuple={0x35, {0x12, @udp_ip4_spec={@empty, @loopback, 0x4e27, 0x4e21, 0x7}, @tcp_ip4_spec={@multicast1, @multicast2, 0x4e23, 0x4e24, 0xf}, 0x4, 0x6, 0xfffffffffffffff7, 0x2, 0xffffffffffffffff}}}) write$UHID_CREATE2(r2, &(0x7f0000000340)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYRES8, @ANYRES8=r2, @ANYRES64=r1], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r2, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x13, 0x2, {0x40, 0x3, 0x1}}, 0x14) setsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, &(0x7f0000000100), 0x4) iopl(0x3) r5 = syz_clone(0x84198180, 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000280)=ANY=[@ANYRESOCT, @ANYRES32=r2, @ANYRESDEC=r3, @ANYRES16=r5, @ANYRES8, @ANYRESOCT, @ANYRES16], 0x118) rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000005, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) socket$inet6_tcp(0xa, 0x1, 0x0) rt_sigaction(0xd, &(0x7f0000000380)={&(0x7f0000000400)="660fe71341ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c12020c4e166531422", 0x40000003, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = openat$cgroup_ro(r0, &(0x7f0000000440)='net_prio.prioidx\x00', 0x275a, 0x0) write$UHID_CREATE2(r7, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r7, @ANYRES64=r6], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r7, 0x0) ioctl$KVM_X86_SETUP_MCE(r0, 0x4008ae9c, &(0x7f0000000000)={0xd, 0x0, 0x4}) sendmmsg$inet6(r6, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) ioctl$KVM_X86_SETUP_MCE(r7, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) r8 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r8, 0x0, 0x0, 0x805, 0x0, 0x0) r9 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r9, 0x10f, 0x87, &(0x7f0000000900)={0x41, 0x4}, 0x10) 251.265584ms ago: executing program 0 (id=16763): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) rt_sigaction(0xd, 0x0, 0x0, 0x0, 0x0) 200.940829ms ago: executing program 3 (id=16764): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r0, &(0x7f00000001c0)=ANY=[@ANYRES8, @ANYRES8, @ANYRES8=r0, @ANYBLOB="c14522a6be7959c33bb433d662ac80fbbb5206b37ae1b1806e1c4e32b901363718187f20b14dd313b9d0928949cbc51114a8401f7ce4ee4a197f6c2249df1c564c44cf7790ecb4d80a1a847380f9ec7d21d014057a3c60c0ac12242198035c4f0bb0767b8c95fdd94cd63286b17a651d1663ae19da112eb60a200bf7db4c8218695de615c754abdaa210c08f0faab205ac6db30af7d3745b0f73503aea31a6ae8c0510e56107e6b736ab8ed54f8161d5b36449a72135cc356e1fc5"], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r1, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r3, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r3, @ANYRES64=r2], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r3, 0x0) ioctl$KVM_X86_SETUP_MCE(r3, 0x4008ae9c, &(0x7f0000000000)={0x6, 0x526d630517582f22}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r5, &(0x7f0000000340)=ANY=[@ANYRES32=r3, @ANYRES8, @ANYRES8=r5, @ANYRES64=r4], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r5, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f00000000c0)={0x0, 0x526d630517582f25, 0x8}) sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) r6 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r6, 0x0, 0x0, 0x885, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) 198.69467ms ago: executing program 1 (id=16765): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8=0x0, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00), 0x0, 0x4) futex(&(0x7f00000000c0), 0x6, 0x1, 0x0, &(0x7f00000001c0)=0x2, 0x2) 129.726217ms ago: executing program 1 (id=16766): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) mkdirat(0xffffffffffffff9c, 0x0, 0x1c0) 126.864787ms ago: executing program 0 (id=16767): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r5, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r6, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r6, 0x29, 0x1, &(0x7f0000000100), 0x4) 68.405762ms ago: executing program 1 (id=16768): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r0, @ANYRES64], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r0, 0x0) ioctl$KVM_X86_SETUP_MCE(r0, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r1, 0x0, 0x0, 0x805, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x1c1341, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'bridge_slave_1\x00', 0x2}) 12.472578ms ago: executing program 0 (id=16769): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) creat(&(0x7f0000000040)='./file0\x00', 0x4) 397.719µs ago: executing program 2 (id=16770): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x80, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) userfaultfd(0x80801) rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r5, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r5, @ANYRES64=r4], 0x118) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x49) mount$fuse(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000480), 0x1808800, &(0x7f0000000900)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 0s ago: executing program 3 (id=16771): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) (async) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) (async) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) (async) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) (async) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) (async, rerun: 64) timer_settime(0x0, 0x1, &(0x7f0000000040), &(0x7f00000000c0)) (async, rerun: 64) sendto$inet(r2, 0x0, 0x0, 0x80, 0x0, 0x0) (async) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) (async) sendto(r0, 0x0, 0x0, 0x40, 0x0, 0x0) kernel console output (not intermixed with test programs): 504.842979][ T63] usb 4-1: USB disconnect, device number 45 [ 510.236972][ T63] usb 3-1: new high-speed USB device number 45 using dummy_hcd [ 510.387008][ T63] usb 3-1: Using ep0 maxpacket: 16 [ 510.406294][ T63] usb 3-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 510.420585][ T63] usb 3-1: config 0 has 1 interface, different from the descriptor's value: 6 [ 510.436985][ T63] usb 3-1: config 0 interface 0 altsetting 4 has 0 endpoint descriptors, different from the interface descriptor's value: 1 [ 510.457313][ T63] usb 3-1: config 0 interface 0 has no altsetting 0 [ 510.473078][ T63] usb 3-1: New USB device found, idVendor=044f, idProduct=b304, bcdDevice= 0.00 [ 510.486836][ T63] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 510.497454][ T63] usb 3-1: config 0 descriptor?? [ 510.507865][ T63] usbhid 3-1:0.0: couldn't find an input interrupt endpoint [ 510.707008][T18181] usb 3-1: USB disconnect, device number 45 [ 525.377021][ T6159] usb 1-1: new high-speed USB device number 53 using dummy_hcd [ 525.536986][ T6159] usb 1-1: Using ep0 maxpacket: 16 [ 525.547867][ T6159] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 525.566978][ T6159] usb 1-1: config 0 has 1 interface, different from the descriptor's value: 6 [ 525.586986][ T6159] usb 1-1: config 0 interface 0 altsetting 4 has 0 endpoint descriptors, different from the interface descriptor's value: 1 [ 525.607001][ T6159] usb 1-1: config 0 interface 0 has no altsetting 0 [ 525.613667][ T6159] usb 1-1: New USB device found, idVendor=044f, idProduct=b304, bcdDevice= 0.00 [ 525.636977][ T6159] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 525.657207][ T6159] usb 1-1: config 0 descriptor?? [ 525.664633][ T6159] usbhid 1-1:0.0: couldn't find an input interrupt endpoint [ 525.864830][ T6159] usb 1-1: USB disconnect, device number 53 [ 535.356977][T18181] usb 3-1: new high-speed USB device number 46 using dummy_hcd [ 535.517000][T18181] usb 3-1: Using ep0 maxpacket: 16 [ 535.532564][T18181] usb 3-1: config 0 has 1 interface, different from the descriptor's value: 6 [ 535.542513][T18181] usb 3-1: config 0 interface 0 altsetting 4 has 0 endpoint descriptors, different from the interface descriptor's value: 1 [ 535.561495][T18181] usb 3-1: config 0 interface 0 has no altsetting 0 [ 535.574490][T18181] usb 3-1: New USB device found, idVendor=044f, idProduct=b304, bcdDevice= 0.00 [ 535.583965][T18181] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 535.604061][T18181] usb 3-1: config 0 descriptor?? [ 535.614915][T18181] usbhid 3-1:0.0: couldn't find an input interrupt endpoint [ 535.816283][T18181] usb 3-1: USB disconnect, device number 46 [ 541.175610][ T329] bridge_slave_1: left allmulticast mode [ 541.181788][ T329] bridge_slave_1: left promiscuous mode [ 541.191575][ T329] bridge0: port 2(bridge_slave_1) entered disabled state [ 541.211892][ T329] bridge_slave_0: left allmulticast mode [ 541.231884][ T329] bridge_slave_0: left promiscuous mode [ 541.242058][ T329] bridge0: port 1(bridge_slave_0) entered disabled state [ 541.398191][ T329] veth1_macvtap: left promiscuous mode [ 541.403755][ T329] veth0_vlan: left promiscuous mode [ 541.577714][T30382] bridge0: port 1(bridge_slave_0) entered blocking state [ 541.584794][T30382] bridge0: port 1(bridge_slave_0) entered disabled state [ 541.597368][T30382] bridge_slave_0: entered allmulticast mode [ 541.603825][T30382] bridge_slave_0: entered promiscuous mode [ 541.610614][T30382] bridge0: port 2(bridge_slave_1) entered blocking state [ 541.617888][T30382] bridge0: port 2(bridge_slave_1) entered disabled state [ 541.624989][T30382] bridge_slave_1: entered allmulticast mode [ 541.631832][T30382] bridge_slave_1: entered promiscuous mode [ 541.810970][T30382] bridge0: port 2(bridge_slave_1) entered blocking state [ 541.818091][T30382] bridge0: port 2(bridge_slave_1) entered forwarding state [ 541.825378][T30382] bridge0: port 1(bridge_slave_0) entered blocking state [ 541.832450][T30382] bridge0: port 1(bridge_slave_0) entered forwarding state [ 541.908936][ T329] bridge0: port 1(bridge_slave_0) entered disabled state [ 541.927212][ T329] bridge0: port 2(bridge_slave_1) entered disabled state [ 541.941896][ T329] bridge0: port 1(bridge_slave_0) entered blocking state [ 541.948989][ T329] bridge0: port 1(bridge_slave_0) entered forwarding state [ 541.977282][ T329] bridge0: port 2(bridge_slave_1) entered blocking state [ 541.984353][ T329] bridge0: port 2(bridge_slave_1) entered forwarding state [ 542.027841][T30382] veth0_vlan: entered promiscuous mode [ 542.053922][T30382] veth1_macvtap: entered promiscuous mode [ 543.231974][ T1048] bridge_slave_1: left allmulticast mode [ 543.237703][ T1048] bridge_slave_1: left promiscuous mode [ 543.243332][ T1048] bridge0: port 2(bridge_slave_1) entered disabled state [ 543.267606][ T1048] bridge_slave_0: left allmulticast mode [ 543.273310][ T1048] bridge_slave_0: left promiscuous mode [ 543.287019][ T1048] bridge0: port 1(bridge_slave_0) entered disabled state [ 543.478378][ T1048] veth1_macvtap: left promiscuous mode [ 543.483973][ T1048] veth0_vlan: left promiscuous mode [ 543.603748][T30488] bridge0: port 1(bridge_slave_0) entered blocking state [ 543.611058][T30488] bridge0: port 1(bridge_slave_0) entered disabled state [ 543.630405][T30488] bridge_slave_0: entered allmulticast mode [ 543.647790][T30488] bridge_slave_0: entered promiscuous mode [ 543.657995][T30488] bridge0: port 2(bridge_slave_1) entered blocking state [ 543.666096][T30488] bridge0: port 2(bridge_slave_1) entered disabled state [ 543.673677][T30488] bridge_slave_1: entered allmulticast mode [ 543.681588][T30488] bridge_slave_1: entered promiscuous mode [ 543.807718][T30488] bridge0: port 2(bridge_slave_1) entered blocking state [ 543.814906][T30488] bridge0: port 2(bridge_slave_1) entered forwarding state [ 543.822226][T30488] bridge0: port 1(bridge_slave_0) entered blocking state [ 543.829278][T30488] bridge0: port 1(bridge_slave_0) entered forwarding state [ 543.874420][ T329] bridge0: port 1(bridge_slave_0) entered disabled state [ 543.882173][ T329] bridge0: port 2(bridge_slave_1) entered disabled state [ 543.898091][ T329] bridge0: port 1(bridge_slave_0) entered blocking state [ 543.905183][ T329] bridge0: port 1(bridge_slave_0) entered forwarding state [ 543.916290][ T329] bridge0: port 2(bridge_slave_1) entered blocking state [ 543.923362][ T329] bridge0: port 2(bridge_slave_1) entered forwarding state [ 543.969731][T30488] veth0_vlan: entered promiscuous mode [ 543.993932][T30488] veth1_macvtap: entered promiscuous mode [ 550.506500][ T349] hid (null): unknown global tag 0xd [ 550.512291][ T36] audit: type=1400 audit(1763436641.740:247): avc: denied { ioctl } for pid=30959 comm="syz.3.14422" path="/dev/uhid" dev="devtmpfs" ino=199 ioctlcmd=0x6607 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 550.517841][ T349] hid (null): unknown global tag 0xe [ 550.565873][ T349] hid-generic 0005:0005:3FF80000.0002: unknown main item tag 0x2 [ 550.593786][ T36] audit: type=1400 audit(1763436641.740:248): avc: denied { shutdown } for pid=30959 comm="syz.3.14422" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 550.596980][ T349] hid-generic 0005:0005:3FF80000.0002: collection stack underflow [ 550.641789][ T349] hid-generic 0005:0005:3FF80000.0002: item 0 1 0 12 parsing failed [ 550.657170][ T349] hid-generic 0005:0005:3FF80000.0002: probe with driver hid-generic failed with error -22 [ 551.805950][ T36] audit: type=1400 audit(1763436643.030:249): avc: denied { bind } for pid=31037 comm="syz.1.14456" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 552.657863][T31129] FAULT_INJECTION: forcing a failure. [ 552.657863][T31129] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 552.696977][T31129] CPU: 0 UID: 0 PID: 31129 Comm: syz.2.14499 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 552.697011][T31129] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 552.697025][T31129] Call Trace: [ 552.697033][T31129] [ 552.697041][T31129] __dump_stack+0x21/0x30 [ 552.697074][T31129] dump_stack_lvl+0x10c/0x190 [ 552.697101][T31129] ? __cfi_dump_stack_lvl+0x10/0x10 [ 552.697131][T31129] dump_stack+0x19/0x20 [ 552.697156][T31129] should_fail_ex+0x3d9/0x530 [ 552.697178][T31129] should_fail+0xf/0x20 [ 552.697197][T31129] should_fail_usercopy+0x1e/0x30 [ 552.697220][T31129] strncpy_from_user+0x28/0x270 [ 552.697242][T31129] getname_flags+0x102/0x710 [ 552.697263][T31129] ? build_open_flags+0x487/0x600 [ 552.697290][T31129] getname+0x1b/0x30 [ 552.697309][T31129] do_sys_openat2+0xcb/0x1c0 [ 552.697334][T31129] ? fput+0x1a5/0x240 [ 552.697357][T31129] ? do_sys_open+0x100/0x100 [ 552.697383][T31129] ? ksys_write+0x1ef/0x250 [ 552.697401][T31129] ? __cfi_ksys_write+0x10/0x10 [ 552.697421][T31129] __x64_sys_openat+0x13a/0x170 [ 552.697449][T31129] x64_sys_call+0xe69/0x2ee0 [ 552.697478][T31129] do_syscall_64+0x58/0xf0 [ 552.697504][T31129] ? clear_bhb_loop+0x50/0xa0 [ 552.697527][T31129] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 552.697567][T31129] RIP: 0033:0x7f4bcc18f6c9 [ 552.697587][T31129] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 552.697607][T31129] RSP: 002b:00007f4bccf82038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 552.697632][T31129] RAX: ffffffffffffffda RBX: 00007f4bcc3e5fa0 RCX: 00007f4bcc18f6c9 [ 552.697650][T31129] RDX: 000000000000275a RSI: 0000200000000080 RDI: ffffffffffffff9c [ 552.697666][T31129] RBP: 00007f4bccf82090 R08: 0000000000000000 R09: 0000000000000000 [ 552.697682][T31129] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 552.697696][T31129] R13: 00007f4bcc3e6038 R14: 00007f4bcc3e5fa0 R15: 00007ffd81566258 [ 552.697715][T31129] [ 553.192720][ T36] audit: type=1400 audit(1763436644.420:250): avc: denied { accept } for pid=31163 comm="syz.2.14515" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 553.235570][ T36] audit: type=1400 audit(1763436644.420:251): avc: denied { write } for pid=31163 comm="syz.2.14515" path="socket:[163632]" dev="sockfs" ino=163632 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 553.267088][ T36] audit: type=1400 audit(1763436644.420:252): avc: denied { read } for pid=31163 comm="syz.2.14515" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 555.018333][T31251] FAULT_INJECTION: forcing a failure. [ 555.018333][T31251] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 555.046978][T31251] CPU: 1 UID: 0 PID: 31251 Comm: syz.3.14553 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 555.047015][T31251] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 555.047029][T31251] Call Trace: [ 555.047037][T31251] [ 555.047046][T31251] __dump_stack+0x21/0x30 [ 555.047081][T31251] dump_stack_lvl+0x10c/0x190 [ 555.047111][T31251] ? __cfi_dump_stack_lvl+0x10/0x10 [ 555.047143][T31251] dump_stack+0x19/0x20 [ 555.047171][T31251] should_fail_ex+0x3d9/0x530 [ 555.047194][T31251] should_fail+0xf/0x20 [ 555.047214][T31251] should_fail_usercopy+0x1e/0x30 [ 555.047238][T31251] strncpy_from_user+0x28/0x270 [ 555.047261][T31251] getname_flags+0x102/0x710 [ 555.047283][T31251] ? build_open_flags+0x487/0x600 [ 555.047313][T31251] getname+0x1b/0x30 [ 555.047333][T31251] do_sys_openat2+0xcb/0x1c0 [ 555.047362][T31251] ? fput+0x1a5/0x240 [ 555.047387][T31251] ? do_sys_open+0x100/0x100 [ 555.047415][T31251] ? ksys_write+0x1ef/0x250 [ 555.047435][T31251] ? __cfi_ksys_write+0x10/0x10 [ 555.047457][T31251] __x64_sys_openat+0x13a/0x170 [ 555.047487][T31251] x64_sys_call+0xe69/0x2ee0 [ 555.047519][T31251] do_syscall_64+0x58/0xf0 [ 555.047556][T31251] ? clear_bhb_loop+0x50/0xa0 [ 555.047582][T31251] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 555.047605][T31251] RIP: 0033:0x7f391bd8f6c9 [ 555.047625][T31251] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 555.047644][T31251] RSP: 002b:00007f391cbfe038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 555.047670][T31251] RAX: ffffffffffffffda RBX: 00007f391bfe5fa0 RCX: 00007f391bd8f6c9 [ 555.047688][T31251] RDX: 0000000000000002 RSI: 0000200000000180 RDI: ffffffffffffff9c [ 555.047705][T31251] RBP: 00007f391cbfe090 R08: 0000000000000000 R09: 0000000000000000 [ 555.047720][T31251] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 555.047735][T31251] R13: 00007f391bfe6038 R14: 00007f391bfe5fa0 R15: 00007ffd03c4b508 [ 555.047755][T31251] [ 555.338389][T31261] FAULT_INJECTION: forcing a failure. [ 555.338389][T31261] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 555.383678][T31261] CPU: 0 UID: 0 PID: 31261 Comm: syz.3.14558 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 555.383715][T31261] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 555.383730][T31261] Call Trace: [ 555.383738][T31261] [ 555.383747][T31261] __dump_stack+0x21/0x30 [ 555.383793][T31261] dump_stack_lvl+0x10c/0x190 [ 555.383824][T31261] ? __cfi_dump_stack_lvl+0x10/0x10 [ 555.383855][T31261] ? check_stack_object+0x12c/0x140 [ 555.383879][T31261] dump_stack+0x19/0x20 [ 555.383908][T31261] should_fail_ex+0x3d9/0x530 [ 555.383932][T31261] should_fail+0xf/0x20 [ 555.383953][T31261] should_fail_usercopy+0x1e/0x30 [ 555.383978][T31261] _copy_to_user+0x24/0xa0 [ 555.384006][T31261] simple_read_from_buffer+0xed/0x160 [ 555.384035][T31261] proc_fail_nth_read+0x19e/0x210 [ 555.384064][T31261] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 555.384094][T31261] ? bpf_lsm_file_permission+0xd/0x20 [ 555.384126][T31261] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 555.384155][T31261] vfs_read+0x27d/0xc70 [ 555.384174][T31261] ? fdget+0x189/0x1f0 [ 555.384198][T31261] ? __cfi_vfs_read+0x10/0x10 [ 555.384218][T31261] ? __kasan_check_write+0x18/0x20 [ 555.384250][T31261] ? mutex_lock+0x92/0x1c0 [ 555.384271][T31261] ? __cfi_mutex_lock+0x10/0x10 [ 555.384291][T31261] ? __fget_files+0x2c5/0x340 [ 555.384317][T31261] ksys_read+0x141/0x250 [ 555.384337][T31261] ? __cfi_ksys_read+0x10/0x10 [ 555.384358][T31261] ? __kasan_check_read+0x15/0x20 [ 555.384411][T31261] __x64_sys_read+0x7f/0x90 [ 555.384432][T31261] x64_sys_call+0x2638/0x2ee0 [ 555.384465][T31261] do_syscall_64+0x58/0xf0 [ 555.384493][T31261] ? clear_bhb_loop+0x50/0xa0 [ 555.384518][T31261] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 555.384542][T31261] RIP: 0033:0x7f391bd8e0dc [ 555.384561][T31261] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 555.384581][T31261] RSP: 002b:00007f391cbfe030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 555.384607][T31261] RAX: ffffffffffffffda RBX: 00007f391bfe5fa0 RCX: 00007f391bd8e0dc [ 555.384624][T31261] RDX: 000000000000000f RSI: 00007f391cbfe0a0 RDI: 0000000000000008 [ 555.384640][T31261] RBP: 00007f391cbfe090 R08: 0000000000000000 R09: 0000000000000000 [ 555.384655][T31261] R10: 0000000040000160 R11: 0000000000000246 R12: 0000000000000001 [ 555.384671][T31261] R13: 00007f391bfe6038 R14: 00007f391bfe5fa0 R15: 00007ffd03c4b508 [ 555.384691][T31261] [ 555.689807][T31277] FAULT_INJECTION: forcing a failure. [ 555.689807][T31277] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 555.725249][T31277] CPU: 1 UID: 0 PID: 31277 Comm: syz.0.14565 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 555.725285][T31277] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 555.725299][T31277] Call Trace: [ 555.725307][T31277] [ 555.725316][T31277] __dump_stack+0x21/0x30 [ 555.725349][T31277] dump_stack_lvl+0x10c/0x190 [ 555.725376][T31277] ? __cfi_dump_stack_lvl+0x10/0x10 [ 555.725405][T31277] ? __x64_sys_openat+0x13a/0x170 [ 555.725452][T31277] ? do_syscall_64+0x58/0xf0 [ 555.725480][T31277] ? entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 555.725511][T31277] dump_stack+0x19/0x20 [ 555.725539][T31277] should_fail_ex+0x3d9/0x530 [ 555.725562][T31277] should_fail_alloc_page+0xeb/0x110 [ 555.725606][T31277] __alloc_pages_noprof+0x19b/0x7b0 [ 555.725637][T31277] ? avc_has_perm_noaudit+0x286/0x360 [ 555.725668][T31277] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 555.725706][T31277] ? avc_has_perm+0x144/0x220 [ 555.725738][T31277] ? kasan_save_alloc_info+0x40/0x50 [ 555.725772][T31277] __folio_alloc_noprof+0x14/0x80 [ 555.725803][T31277] shmem_alloc_and_add_folio+0x452/0x1050 [ 555.725834][T31277] ? put_swap_device+0x130/0x130 [ 555.725861][T31277] ? shmem_huge_global_enabled+0x2da/0x360 [ 555.725888][T31277] ? shmem_allowable_huge_orders+0x1f7/0x430 [ 555.725912][T31277] ? is_bpf_text_address+0x17b/0x1a0 [ 555.725939][T31277] shmem_get_folio_gfp+0x5f0/0x1380 [ 555.725966][T31277] ? shmem_get_folio+0xc0/0xc0 [ 555.725991][T31277] ? inode_to_bdi+0x6d/0x100 [ 555.726023][T31277] shmem_write_begin+0xf4/0x270 [ 555.726051][T31277] generic_perform_write+0x330/0x960 [ 555.726087][T31277] ? __cfi_generic_perform_write+0x10/0x10 [ 555.726120][T31277] ? down_write+0xe9/0x2a0 [ 555.726145][T31277] ? file_update_time+0xa3/0x220 [ 555.726175][T31277] shmem_file_write_iter+0x105/0x130 [ 555.726206][T31277] vfs_write+0x718/0xf30 [ 555.726228][T31277] ? __cfi_shmem_file_write_iter+0x10/0x10 [ 555.726259][T31277] ? __cfi_vfs_write+0x10/0x10 [ 555.726281][T31277] ? __cfi_mutex_lock+0x10/0x10 [ 555.726305][T31277] ksys_write+0x141/0x250 [ 555.726326][T31277] ? __cfi_ksys_write+0x10/0x10 [ 555.726348][T31277] ? __kasan_check_read+0x15/0x20 [ 555.726383][T31277] __x64_sys_write+0x7f/0x90 [ 555.726404][T31277] x64_sys_call+0x271c/0x2ee0 [ 555.726436][T31277] do_syscall_64+0x58/0xf0 [ 555.726464][T31277] ? clear_bhb_loop+0x50/0xa0 [ 555.726488][T31277] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 555.726559][T31277] RIP: 0033:0x7fea0798f6c9 [ 555.726578][T31277] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 555.726598][T31277] RSP: 002b:00007fea087c5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 555.726623][T31277] RAX: ffffffffffffffda RBX: 00007fea07be5fa0 RCX: 00007fea0798f6c9 [ 555.726641][T31277] RDX: 0000000000000118 RSI: 0000200000000340 RDI: 000000000000000a [ 555.726657][T31277] RBP: 00007fea087c5090 R08: 0000000000000000 R09: 0000000000000000 [ 555.726672][T31277] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 555.726686][T31277] R13: 00007fea07be6038 R14: 00007fea07be5fa0 R15: 00007ffe174a84a8 [ 555.726717][T31277] [ 556.095535][T31298] FAULT_INJECTION: forcing a failure. [ 556.095535][T31298] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 556.121167][T31298] CPU: 0 UID: 0 PID: 31298 Comm: syz.1.14572 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 556.121203][T31298] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 556.121218][T31298] Call Trace: [ 556.121226][T31298] [ 556.121236][T31298] __dump_stack+0x21/0x30 [ 556.121271][T31298] dump_stack_lvl+0x10c/0x190 [ 556.121301][T31298] ? __cfi_dump_stack_lvl+0x10/0x10 [ 556.121332][T31298] ? check_stack_object+0x12c/0x140 [ 556.121356][T31298] dump_stack+0x19/0x20 [ 556.121385][T31298] should_fail_ex+0x3d9/0x530 [ 556.121409][T31298] should_fail+0xf/0x20 [ 556.121429][T31298] should_fail_usercopy+0x1e/0x30 [ 556.121454][T31298] _copy_to_user+0x24/0xa0 [ 556.121483][T31298] simple_read_from_buffer+0xed/0x160 [ 556.121512][T31298] proc_fail_nth_read+0x19e/0x210 [ 556.121542][T31298] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 556.121572][T31298] ? bpf_lsm_file_permission+0xd/0x20 [ 556.121603][T31298] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 556.121632][T31298] vfs_read+0x27d/0xc70 [ 556.121653][T31298] ? __cfi_vfs_read+0x10/0x10 [ 556.121672][T31298] ? __kasan_check_write+0x18/0x20 [ 556.121706][T31298] ? mutex_lock+0x92/0x1c0 [ 556.121753][T31298] ? __cfi_mutex_lock+0x10/0x10 [ 556.121775][T31298] ? __fget_files+0x2c5/0x340 [ 556.121802][T31298] ksys_read+0x141/0x250 [ 556.121823][T31298] ? __cfi_ksys_read+0x10/0x10 [ 556.121844][T31298] ? __sys_socketpair+0xfb/0x5c0 [ 556.121873][T31298] ? __kasan_check_read+0x15/0x20 [ 556.121909][T31298] __x64_sys_read+0x7f/0x90 [ 556.121930][T31298] x64_sys_call+0x2638/0x2ee0 [ 556.121962][T31298] do_syscall_64+0x58/0xf0 [ 556.121990][T31298] ? clear_bhb_loop+0x50/0xa0 [ 556.122014][T31298] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 556.122037][T31298] RIP: 0033:0x7f970218e0dc [ 556.122057][T31298] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 556.122078][T31298] RSP: 002b:00007f9702f85030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 556.122104][T31298] RAX: ffffffffffffffda RBX: 00007f97023e5fa0 RCX: 00007f970218e0dc [ 556.122123][T31298] RDX: 000000000000000f RSI: 00007f9702f850a0 RDI: 000000000000000b [ 556.122151][T31298] RBP: 00007f9702f85090 R08: 0000000000000000 R09: 0000000000000000 [ 556.122167][T31298] R10: 0000200000000040 R11: 0000000000000246 R12: 0000000000000001 [ 556.122182][T31298] R13: 00007f97023e6038 R14: 00007f97023e5fa0 R15: 00007ffe73023888 [ 556.122202][T31298] [ 556.395637][T31321] FAULT_INJECTION: forcing a failure. [ 556.395637][T31321] name failslab, interval 1, probability 0, space 0, times 0 [ 556.408315][T31321] CPU: 0 UID: 0 PID: 31321 Comm: syz.1.14583 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 556.408352][T31321] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 556.408367][T31321] Call Trace: [ 556.408375][T31321] [ 556.408384][T31321] __dump_stack+0x21/0x30 [ 556.408419][T31321] dump_stack_lvl+0x10c/0x190 [ 556.408477][T31321] ? __cfi_dump_stack_lvl+0x10/0x10 [ 556.408507][T31321] ? avc_has_perm+0x144/0x220 [ 556.408556][T31321] dump_stack+0x19/0x20 [ 556.408585][T31321] should_fail_ex+0x3d9/0x530 [ 556.408608][T31321] should_failslab+0xac/0x100 [ 556.408635][T31321] kmem_cache_alloc_lru_noprof+0x44/0x430 [ 556.408658][T31321] ? selinux_socket_create+0x181/0x290 [ 556.408691][T31321] ? sock_alloc_inode+0x48/0x150 [ 556.408716][T31321] sock_alloc_inode+0x48/0x150 [ 556.408741][T31321] ? __cfi_sock_alloc_inode+0x10/0x10 [ 556.408765][T31321] alloc_inode+0x7a/0x270 [ 556.408790][T31321] ? bpf_lsm_socket_create+0xd/0x20 [ 556.408822][T31321] new_inode_pseudo+0x19/0x40 [ 556.408848][T31321] __sock_create+0x130/0x810 [ 556.408876][T31321] __sys_socketpair+0x1ab/0x5c0 [ 556.408905][T31321] __x64_sys_socketpair+0x9f/0xc0 [ 556.408933][T31321] x64_sys_call+0x2081/0x2ee0 [ 556.408965][T31321] do_syscall_64+0x58/0xf0 [ 556.408994][T31321] ? clear_bhb_loop+0x50/0xa0 [ 556.409019][T31321] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 556.409043][T31321] RIP: 0033:0x7f970218f6c9 [ 556.409062][T31321] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 556.409083][T31321] RSP: 002b:00007f9702f85038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 556.409108][T31321] RAX: ffffffffffffffda RBX: 00007f97023e5fa0 RCX: 00007f970218f6c9 [ 556.409126][T31321] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000001 [ 556.409141][T31321] RBP: 00007f9702f85090 R08: 0000000000000000 R09: 0000000000000000 [ 556.409157][T31321] R10: 0000200000000040 R11: 0000000000000246 R12: 0000000000000001 [ 556.409172][T31321] R13: 00007f97023e6038 R14: 00007f97023e5fa0 R15: 00007ffe73023888 [ 556.409192][T31321] [ 556.409203][T31321] socket: no more sockets [ 556.968145][T31364] FAULT_INJECTION: forcing a failure. [ 556.968145][T31364] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 557.007217][T31364] CPU: 1 UID: 0 PID: 31364 Comm: syz.3.14600 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 557.007255][T31364] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 557.007270][T31364] Call Trace: [ 557.007277][T31364] [ 557.007286][T31364] __dump_stack+0x21/0x30 [ 557.007322][T31364] dump_stack_lvl+0x10c/0x190 [ 557.007351][T31364] ? __cfi_dump_stack_lvl+0x10/0x10 [ 557.007382][T31364] ? check_stack_object+0x12c/0x140 [ 557.007405][T31364] dump_stack+0x19/0x20 [ 557.007433][T31364] should_fail_ex+0x3d9/0x530 [ 557.007457][T31364] should_fail+0xf/0x20 [ 557.007478][T31364] should_fail_usercopy+0x1e/0x30 [ 557.007502][T31364] _copy_to_user+0x24/0xa0 [ 557.007531][T31364] simple_read_from_buffer+0xed/0x160 [ 557.007571][T31364] proc_fail_nth_read+0x19e/0x210 [ 557.007599][T31364] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 557.007632][T31364] ? __bad_area_nosemaphore+0xb4/0x670 [ 557.007664][T31364] ? bpf_lsm_file_permission+0xd/0x20 [ 557.007694][T31364] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 557.007722][T31364] vfs_read+0x27d/0xc70 [ 557.007742][T31364] ? __cfi_vfs_read+0x10/0x10 [ 557.007759][T31364] ? __kasan_check_write+0x18/0x20 [ 557.007790][T31364] ? mutex_lock+0x92/0x1c0 [ 557.007827][T31364] ? __cfi_mutex_lock+0x10/0x10 [ 557.007847][T31364] ? __fget_files+0x2c5/0x340 [ 557.007873][T31364] ksys_read+0x141/0x250 [ 557.007892][T31364] ? __cfi_ksys_read+0x10/0x10 [ 557.007913][T31364] ? __sys_socketpair+0xfb/0x5c0 [ 557.007942][T31364] ? __kasan_check_read+0x15/0x20 [ 557.007975][T31364] __x64_sys_read+0x7f/0x90 [ 557.007996][T31364] x64_sys_call+0x2638/0x2ee0 [ 557.008028][T31364] do_syscall_64+0x58/0xf0 [ 557.008056][T31364] ? clear_bhb_loop+0x50/0xa0 [ 557.008082][T31364] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 557.008105][T31364] RIP: 0033:0x7f391bd8e0dc [ 557.008124][T31364] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 557.008145][T31364] RSP: 002b:00007f391cbfe030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 557.008170][T31364] RAX: ffffffffffffffda RBX: 00007f391bfe5fa0 RCX: 00007f391bd8e0dc [ 557.008187][T31364] RDX: 000000000000000f RSI: 00007f391cbfe0a0 RDI: 000000000000000a [ 557.008202][T31364] RBP: 00007f391cbfe090 R08: 0000000000000000 R09: 0000000000000000 [ 557.008217][T31364] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 557.008232][T31364] R13: 00007f391bfe6038 R14: 00007f391bfe5fa0 R15: 00007ffd03c4b508 [ 557.008252][T31364] [ 559.004647][T31463] FAULT_INJECTION: forcing a failure. [ 559.004647][T31463] name failslab, interval 1, probability 0, space 0, times 0 [ 559.036973][T31463] CPU: 0 UID: 0 PID: 31463 Comm: syz.0.14646 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 559.037007][T31463] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 559.037022][T31463] Call Trace: [ 559.037029][T31463] [ 559.037038][T31463] __dump_stack+0x21/0x30 [ 559.037070][T31463] dump_stack_lvl+0x10c/0x190 [ 559.037096][T31463] ? __cfi_dump_stack_lvl+0x10/0x10 [ 559.037126][T31463] dump_stack+0x19/0x20 [ 559.037170][T31463] should_fail_ex+0x3d9/0x530 [ 559.037211][T31463] should_failslab+0xac/0x100 [ 559.037237][T31463] kmem_cache_alloc_noprof+0x42/0x430 [ 559.037258][T31463] ? prepare_creds+0x48/0x6b0 [ 559.037282][T31463] prepare_creds+0x48/0x6b0 [ 559.037306][T31463] cap_task_prctl+0x520/0x9c0 [ 559.037334][T31463] security_task_prctl+0x97/0x230 [ 559.037365][T31463] __se_sys_prctl+0xca/0x1460 [ 559.037386][T31463] ? ksys_write+0x1ef/0x250 [ 559.037407][T31463] ? __x64_sys_prctl+0xf0/0xf0 [ 559.037428][T31463] __x64_sys_prctl+0xc3/0xf0 [ 559.037449][T31463] x64_sys_call+0x2614/0x2ee0 [ 559.037481][T31463] do_syscall_64+0x58/0xf0 [ 559.037510][T31463] ? clear_bhb_loop+0x50/0xa0 [ 559.037536][T31463] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 559.037560][T31463] RIP: 0033:0x7fea0798f6c9 [ 559.037579][T31463] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 559.037600][T31463] RSP: 002b:00007fea087c5038 EFLAGS: 00000246 ORIG_RAX: 000000000000009d [ 559.037625][T31463] RAX: ffffffffffffffda RBX: 00007fea07be5fa0 RCX: 00007fea0798f6c9 [ 559.037644][T31463] RDX: 0000000000000016 RSI: 0000000000000003 RDI: 000000000000002f [ 559.037658][T31463] RBP: 00007fea087c5090 R08: 0000000000000000 R09: 0000000000000000 [ 559.037674][T31463] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 559.037688][T31463] R13: 00007fea07be6038 R14: 00007fea07be5fa0 R15: 00007ffe174a84a8 [ 559.037709][T31463] [ 559.388217][T31474] FAULT_INJECTION: forcing a failure. [ 559.388217][T31474] name failslab, interval 1, probability 0, space 0, times 0 [ 559.436368][T31474] CPU: 1 UID: 0 PID: 31474 Comm: syz.1.14651 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 559.436414][T31474] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 559.436430][T31474] Call Trace: [ 559.436438][T31474] [ 559.436448][T31474] __dump_stack+0x21/0x30 [ 559.436485][T31474] dump_stack_lvl+0x10c/0x190 [ 559.436516][T31474] ? __cfi_dump_stack_lvl+0x10/0x10 [ 559.436547][T31474] ? handle_mm_fault+0x169b/0x1b90 [ 559.436575][T31474] dump_stack+0x19/0x20 [ 559.436605][T31474] should_fail_ex+0x3d9/0x530 [ 559.436629][T31474] should_failslab+0xac/0x100 [ 559.436668][T31474] kmem_cache_alloc_noprof+0x42/0x430 [ 559.436689][T31474] ? lock_vma_under_rcu+0x49d/0x540 [ 559.436714][T31474] ? getname_flags+0xc6/0x710 [ 559.436738][T31474] getname_flags+0xc6/0x710 [ 559.436759][T31474] ? build_open_flags+0x487/0x600 [ 559.436789][T31474] getname+0x1b/0x30 [ 559.436809][T31474] do_sys_openat2+0xcb/0x1c0 [ 559.436838][T31474] ? do_sys_open+0x100/0x100 [ 559.436867][T31474] ? __kasan_check_write+0x18/0x20 [ 559.436900][T31474] ? do_user_addr_fault+0xbc4/0x1200 [ 559.436935][T31474] ? __cfi_ksys_write+0x10/0x10 [ 559.436957][T31474] __x64_sys_openat+0x13a/0x170 [ 559.436987][T31474] x64_sys_call+0xe69/0x2ee0 [ 559.437019][T31474] do_syscall_64+0x58/0xf0 [ 559.437049][T31474] ? clear_bhb_loop+0x50/0xa0 [ 559.437074][T31474] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 559.437098][T31474] RIP: 0033:0x7f970218df10 [ 559.437117][T31474] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 69 95 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 bc 95 02 00 8b 44 [ 559.437137][T31474] RSP: 002b:00007f9702f84b70 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 559.437162][T31474] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f970218df10 [ 559.437179][T31474] RDX: 0000000000000000 RSI: 00007f9702f84c10 RDI: 00000000ffffff9c [ 559.437195][T31474] RBP: 00007f9702f84c10 R08: 0000000000000000 R09: 00236e6f6d627375 [ 559.437211][T31474] R10: 0000000000000000 R11: 0000000000000293 R12: cccccccccccccccd [ 559.437227][T31474] R13: 00007f97023e6038 R14: 00007f97023e5fa0 R15: 00007ffe73023888 [ 559.437247][T31474] [ 559.678142][T31493] FAULT_INJECTION: forcing a failure. [ 559.678142][T31493] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 559.697806][T31493] CPU: 0 UID: 0 PID: 31493 Comm: syz.0.14658 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 559.697842][T31493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 559.697857][T31493] Call Trace: [ 559.697865][T31493] [ 559.697875][T31493] __dump_stack+0x21/0x30 [ 559.697911][T31493] dump_stack_lvl+0x10c/0x190 [ 559.697942][T31493] ? __cfi_dump_stack_lvl+0x10/0x10 [ 559.697974][T31493] ? check_stack_object+0x12c/0x140 [ 559.697998][T31493] dump_stack+0x19/0x20 [ 559.698027][T31493] should_fail_ex+0x3d9/0x530 [ 559.698051][T31493] should_fail+0xf/0x20 [ 559.698072][T31493] should_fail_usercopy+0x1e/0x30 [ 559.698097][T31493] _copy_to_user+0x24/0xa0 [ 559.698137][T31493] simple_read_from_buffer+0xed/0x160 [ 559.698167][T31493] proc_fail_nth_read+0x19e/0x210 [ 559.698197][T31493] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 559.698226][T31493] ? bpf_lsm_file_permission+0xd/0x20 [ 559.698256][T31493] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 559.698285][T31493] vfs_read+0x27d/0xc70 [ 559.698304][T31493] ? __cfi_vfs_read+0x10/0x10 [ 559.698322][T31493] ? __kasan_check_write+0x18/0x20 [ 559.698355][T31493] ? mutex_lock+0x92/0x1c0 [ 559.698374][T31493] ? __cfi_mutex_lock+0x10/0x10 [ 559.698393][T31493] ? __fget_files+0x2c5/0x340 [ 559.698418][T31493] ksys_read+0x141/0x250 [ 559.698438][T31493] ? __cfi_ksys_read+0x10/0x10 [ 559.698459][T31493] ? __kasan_check_read+0x15/0x20 [ 559.698492][T31493] __x64_sys_read+0x7f/0x90 [ 559.698512][T31493] x64_sys_call+0x2638/0x2ee0 [ 559.698544][T31493] do_syscall_64+0x58/0xf0 [ 559.698572][T31493] ? clear_bhb_loop+0x50/0xa0 [ 559.698598][T31493] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 559.698622][T31493] RIP: 0033:0x7fea0798e0dc [ 559.698641][T31493] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 559.698660][T31493] RSP: 002b:00007fea087c5030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 559.698684][T31493] RAX: ffffffffffffffda RBX: 00007fea07be5fa0 RCX: 00007fea0798e0dc [ 559.698702][T31493] RDX: 000000000000000f RSI: 00007fea087c50a0 RDI: 0000000000000007 [ 559.698718][T31493] RBP: 00007fea087c5090 R08: 0000000000000000 R09: 0000000000000000 [ 559.698734][T31493] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 559.698748][T31493] R13: 00007fea07be6038 R14: 00007fea07be5fa0 R15: 00007ffe174a84a8 [ 559.698770][T31493] [ 560.197307][T31537] FAULT_INJECTION: forcing a failure. [ 560.197307][T31537] name failslab, interval 1, probability 0, space 0, times 0 [ 560.237951][T31537] CPU: 1 UID: 0 PID: 31537 Comm: syz.3.14674 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 560.237990][T31537] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 560.238006][T31537] Call Trace: [ 560.238014][T31537] [ 560.238024][T31537] __dump_stack+0x21/0x30 [ 560.238062][T31537] dump_stack_lvl+0x10c/0x190 [ 560.238093][T31537] ? __cfi_dump_stack_lvl+0x10/0x10 [ 560.238135][T31537] dump_stack+0x19/0x20 [ 560.238165][T31537] should_fail_ex+0x3d9/0x530 [ 560.238190][T31537] should_failslab+0xac/0x100 [ 560.238217][T31537] kmem_cache_alloc_node_noprof+0x45/0x440 [ 560.238241][T31537] ? dup_task_struct+0xbc/0xc50 [ 560.238269][T31537] dup_task_struct+0xbc/0xc50 [ 560.238296][T31537] ? __kasan_check_write+0x18/0x20 [ 560.238330][T31537] ? _raw_spin_lock_irq+0x8d/0x120 [ 560.238361][T31537] ? copy_process+0x3220/0x3220 [ 560.238388][T31537] ? __kasan_check_write+0x18/0x20 [ 560.238423][T31537] copy_process+0x538/0x3220 [ 560.238454][T31537] ? __cfi_copy_process+0x10/0x10 [ 560.238480][T31537] ? proc_fail_nth_write+0x17e/0x210 [ 560.238514][T31537] kernel_clone+0x23f/0x830 [ 560.238542][T31537] ? __cfi_kernel_clone+0x10/0x10 [ 560.238572][T31537] __x64_sys_clone+0x18c/0x1f0 [ 560.238600][T31537] ? __cfi___x64_sys_clone+0x10/0x10 [ 560.238633][T31537] ? __kasan_check_read+0x15/0x20 [ 560.238668][T31537] x64_sys_call+0x2b3c/0x2ee0 [ 560.238701][T31537] do_syscall_64+0x58/0xf0 [ 560.238730][T31537] ? clear_bhb_loop+0x50/0xa0 [ 560.238756][T31537] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 560.238780][T31537] RIP: 0033:0x7f391bd8f6c9 [ 560.238799][T31537] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 560.238819][T31537] RSP: 002b:00007f391cbfdfe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 560.238845][T31537] RAX: ffffffffffffffda RBX: 00007f391bfe5fa0 RCX: 00007f391bd8f6c9 [ 560.238863][T31537] RDX: 0000000000000000 RSI: 0000000000000060 RDI: 00000000640c7000 [ 560.238879][T31537] RBP: 00007f391cbfe090 R08: 0000000000000000 R09: 0000000000000000 [ 560.238895][T31537] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 560.238910][T31537] R13: 00007f391bfe6038 R14: 00007f391bfe5fa0 R15: 00007ffd03c4b508 [ 560.238930][T31537] [ 560.549993][ T329] bridge_slave_1: left allmulticast mode [ 560.555690][ T329] bridge_slave_1: left promiscuous mode [ 560.561388][ T329] bridge0: port 2(bridge_slave_1) entered disabled state [ 560.573809][ T329] bridge_slave_0: left allmulticast mode [ 560.579532][ T329] bridge_slave_0: left promiscuous mode [ 560.585166][ T329] bridge0: port 1(bridge_slave_0) entered disabled state [ 560.712585][T31581] FAULT_INJECTION: forcing a failure. [ 560.712585][T31581] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 560.725871][T31581] CPU: 1 UID: 0 PID: 31581 Comm: syz.3.14693 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 560.725906][T31581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 560.725921][T31581] Call Trace: [ 560.725929][T31581] [ 560.725939][T31581] __dump_stack+0x21/0x30 [ 560.725973][T31581] dump_stack_lvl+0x10c/0x190 [ 560.726002][T31581] ? __cfi_dump_stack_lvl+0x10/0x10 [ 560.726032][T31581] ? vfs_write+0x93e/0xf30 [ 560.726052][T31581] dump_stack+0x19/0x20 [ 560.726079][T31581] should_fail_ex+0x3d9/0x530 [ 560.726103][T31581] should_fail+0xf/0x20 [ 560.726141][T31581] should_fail_usercopy+0x1e/0x30 [ 560.726166][T31581] _copy_from_user+0x22/0xb0 [ 560.726194][T31581] do_sock_getsockopt+0x1d7/0x6d0 [ 560.726228][T31581] ? __cfi_do_sock_getsockopt+0x10/0x10 [ 560.726261][T31581] ? __fget_files+0x2c5/0x340 [ 560.726287][T31581] __x64_sys_getsockopt+0x1d5/0x280 [ 560.726322][T31581] x64_sys_call+0x10db/0x2ee0 [ 560.726362][T31581] do_syscall_64+0x58/0xf0 [ 560.726391][T31581] ? clear_bhb_loop+0x50/0xa0 [ 560.726417][T31581] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 560.726441][T31581] RIP: 0033:0x7f391bd8f6c9 [ 560.726460][T31581] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 560.726480][T31581] RSP: 002b:00007f391cbfe038 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 560.726505][T31581] RAX: ffffffffffffffda RBX: 00007f391bfe5fa0 RCX: 00007f391bd8f6c9 [ 560.726523][T31581] RDX: 000000000000001d RSI: 0000000000000006 RDI: 0000000000000003 [ 560.726538][T31581] RBP: 00007f391cbfe090 R08: 00002000000000c0 R09: 0000000000000000 [ 560.726554][T31581] R10: 0000200000000040 R11: 0000000000000246 R12: 0000000000000001 [ 560.726570][T31581] R13: 00007f391bfe6038 R14: 00007f391bfe5fa0 R15: 00007ffd03c4b508 [ 560.726591][T31581] [ 560.927452][T31541] bridge0: port 1(bridge_slave_0) entered blocking state [ 560.938569][T31541] bridge0: port 1(bridge_slave_0) entered disabled state [ 560.958039][ T36] audit: type=1400 audit(1763436652.170:253): avc: denied { read } for pid=31598 comm="syz.2.14701" name="usbmon0" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 560.981526][T31541] bridge_slave_0: entered allmulticast mode [ 560.997436][T31541] bridge_slave_0: entered promiscuous mode [ 561.004192][T31541] bridge0: port 2(bridge_slave_1) entered blocking state [ 561.016951][T31541] bridge0: port 2(bridge_slave_1) entered disabled state [ 561.026969][ T36] audit: type=1400 audit(1763436652.170:254): avc: denied { open } for pid=31598 comm="syz.2.14701" path="/dev/usbmon0" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 561.056989][T31541] bridge_slave_1: entered allmulticast mode [ 561.063734][T31541] bridge_slave_1: entered promiscuous mode [ 561.071143][ T329] veth1_macvtap: left promiscuous mode [ 561.076686][ T329] veth0_vlan: left promiscuous mode [ 561.117098][ T36] audit: type=1400 audit(1763436652.180:255): avc: denied { map } for pid=31598 comm="syz.2.14701" path="/dev/usbmon0" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 561.275048][T31541] bridge0: port 2(bridge_slave_1) entered blocking state [ 561.282169][T31541] bridge0: port 2(bridge_slave_1) entered forwarding state [ 561.289504][T31541] bridge0: port 1(bridge_slave_0) entered blocking state [ 561.296551][T31541] bridge0: port 1(bridge_slave_0) entered forwarding state [ 561.352756][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 561.360509][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 561.383888][ T1048] bridge0: port 1(bridge_slave_0) entered blocking state [ 561.391004][ T1048] bridge0: port 1(bridge_slave_0) entered forwarding state [ 561.408961][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 561.416022][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 561.489717][T31541] veth0_vlan: entered promiscuous mode [ 561.513509][T31541] veth1_macvtap: entered promiscuous mode [ 563.468013][T31704] bridge0: port 1(bridge_slave_0) entered blocking state [ 563.475117][T31704] bridge0: port 1(bridge_slave_0) entered disabled state [ 563.522171][T31704] bridge_slave_0: entered allmulticast mode [ 563.528672][T31704] bridge_slave_0: entered promiscuous mode [ 563.538345][T31704] bridge0: port 2(bridge_slave_1) entered blocking state [ 563.548394][T31704] bridge0: port 2(bridge_slave_1) entered disabled state [ 563.555490][T31704] bridge_slave_1: entered allmulticast mode [ 563.564861][T31704] bridge_slave_1: entered promiscuous mode [ 563.658636][ T1048] bridge_slave_1: left allmulticast mode [ 563.676950][ T1048] bridge_slave_1: left promiscuous mode [ 563.682652][ T1048] bridge0: port 2(bridge_slave_1) entered disabled state [ 563.717270][ T1048] bridge_slave_0: left allmulticast mode [ 563.728314][ T1048] bridge_slave_0: left promiscuous mode [ 563.747028][ T1048] bridge0: port 1(bridge_slave_0) entered disabled state [ 563.917213][ T1048] veth1_macvtap: left promiscuous mode [ 563.922782][ T1048] veth0_vlan: left promiscuous mode [ 564.153490][T31704] bridge0: port 2(bridge_slave_1) entered blocking state [ 564.160614][T31704] bridge0: port 2(bridge_slave_1) entered forwarding state [ 564.167961][T31704] bridge0: port 1(bridge_slave_0) entered blocking state [ 564.175013][T31704] bridge0: port 1(bridge_slave_0) entered forwarding state [ 564.204264][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 564.218376][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 564.234726][ T46] bridge0: port 1(bridge_slave_0) entered blocking state [ 564.241848][ T46] bridge0: port 1(bridge_slave_0) entered forwarding state [ 564.266041][ T46] bridge0: port 2(bridge_slave_1) entered blocking state [ 564.273160][ T46] bridge0: port 2(bridge_slave_1) entered forwarding state [ 564.347473][T31704] veth0_vlan: entered promiscuous mode [ 564.376692][T31704] veth1_macvtap: entered promiscuous mode [ 566.265999][T31870] FAULT_INJECTION: forcing a failure. [ 566.265999][T31870] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 566.292958][T31870] CPU: 1 UID: 0 PID: 31870 Comm: syz.3.14818 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 566.292996][T31870] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 566.293011][T31870] Call Trace: [ 566.293019][T31870] [ 566.293028][T31870] __dump_stack+0x21/0x30 [ 566.293064][T31870] dump_stack_lvl+0x10c/0x190 [ 566.293094][T31870] ? __cfi_dump_stack_lvl+0x10/0x10 [ 566.293125][T31870] ? vfs_write+0x93e/0xf30 [ 566.293146][T31870] dump_stack+0x19/0x20 [ 566.293175][T31870] should_fail_ex+0x3d9/0x530 [ 566.293199][T31870] should_fail+0xf/0x20 [ 566.293219][T31870] should_fail_usercopy+0x1e/0x30 [ 566.293244][T31870] _copy_from_user+0x22/0xb0 [ 566.293272][T31870] do_sock_getsockopt+0x1d7/0x6d0 [ 566.293306][T31870] ? __cfi_do_sock_getsockopt+0x10/0x10 [ 566.293338][T31870] ? __fget_files+0x2c5/0x340 [ 566.293365][T31870] __x64_sys_getsockopt+0x1d5/0x280 [ 566.293399][T31870] x64_sys_call+0x10db/0x2ee0 [ 566.293432][T31870] do_syscall_64+0x58/0xf0 [ 566.293460][T31870] ? clear_bhb_loop+0x50/0xa0 [ 566.293486][T31870] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 566.293509][T31870] RIP: 0033:0x7f29b6d8f6c9 [ 566.293528][T31870] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 566.293549][T31870] RSP: 002b:00007f29b7b63038 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 566.293574][T31870] RAX: ffffffffffffffda RBX: 00007f29b6fe5fa0 RCX: 00007f29b6d8f6c9 [ 566.293591][T31870] RDX: 000000000000001d RSI: 0000000000000006 RDI: 0000000000000003 [ 566.293606][T31870] RBP: 00007f29b7b63090 R08: 00002000000000c0 R09: 0000000000000000 [ 566.293621][T31870] R10: 0000200000000040 R11: 0000000000000246 R12: 0000000000000001 [ 566.293637][T31870] R13: 00007f29b6fe6038 R14: 00007f29b6fe5fa0 R15: 00007fffa7a696e8 [ 566.293656][T31870] [ 567.139952][T31915] overlayfs: missing 'lowerdir' [ 567.325473][T31927] FAULT_INJECTION: forcing a failure. [ 567.325473][T31927] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 567.376980][T31927] CPU: 1 UID: 0 PID: 31927 Comm: syz.3.14842 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 567.377013][T31927] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 567.377028][T31927] Call Trace: [ 567.377035][T31927] [ 567.377044][T31927] __dump_stack+0x21/0x30 [ 567.377078][T31927] dump_stack_lvl+0x10c/0x190 [ 567.377106][T31927] ? __cfi_dump_stack_lvl+0x10/0x10 [ 567.377136][T31927] ? check_stack_object+0x12c/0x140 [ 567.377157][T31927] dump_stack+0x19/0x20 [ 567.377184][T31927] should_fail_ex+0x3d9/0x530 [ 567.377206][T31927] should_fail+0xf/0x20 [ 567.377226][T31927] should_fail_usercopy+0x1e/0x30 [ 567.377249][T31927] _copy_to_user+0x24/0xa0 [ 567.377276][T31927] simple_read_from_buffer+0xed/0x160 [ 567.377307][T31927] proc_fail_nth_read+0x19e/0x210 [ 567.377335][T31927] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 567.377362][T31927] ? bpf_lsm_file_permission+0xd/0x20 [ 567.377411][T31927] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 567.377441][T31927] vfs_read+0x27d/0xc70 [ 567.377462][T31927] ? __cfi_ashmem_memfd_ioctl+0x10/0x10 [ 567.377507][T31927] ? __cfi_vfs_read+0x10/0x10 [ 567.377525][T31927] ? __kasan_check_write+0x18/0x20 [ 567.377556][T31927] ? mutex_lock+0x92/0x1c0 [ 567.377575][T31927] ? __cfi_mutex_lock+0x10/0x10 [ 567.377594][T31927] ? __fget_files+0x2c5/0x340 [ 567.377618][T31927] ksys_read+0x141/0x250 [ 567.377636][T31927] ? __cfi_ksys_read+0x10/0x10 [ 567.377656][T31927] ? __kasan_check_read+0x15/0x20 [ 567.377689][T31927] __x64_sys_read+0x7f/0x90 [ 567.377709][T31927] x64_sys_call+0x2638/0x2ee0 [ 567.377767][T31927] do_syscall_64+0x58/0xf0 [ 567.377794][T31927] ? clear_bhb_loop+0x50/0xa0 [ 567.377818][T31927] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 567.377841][T31927] RIP: 0033:0x7f29b6d8e0dc [ 567.377860][T31927] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 567.377879][T31927] RSP: 002b:00007f29b7b63030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 567.377903][T31927] RAX: ffffffffffffffda RBX: 00007f29b6fe5fa0 RCX: 00007f29b6d8e0dc [ 567.377920][T31927] RDX: 000000000000000f RSI: 00007f29b7b630a0 RDI: 000000000000000a [ 567.377934][T31927] RBP: 00007f29b7b63090 R08: 0000000000000000 R09: 0000000000000000 [ 567.377949][T31927] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 567.377963][T31927] R13: 00007f29b6fe6038 R14: 00007f29b6fe5fa0 R15: 00007fffa7a696e8 [ 567.377982][T31927] [ 567.461295][T31946] FAULT_INJECTION: forcing a failure. [ 567.461295][T31946] name failslab, interval 1, probability 0, space 0, times 0 [ 567.653458][T31946] CPU: 0 UID: 0 PID: 31946 Comm: syz.2.14849 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 567.653492][T31946] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 567.653507][T31946] Call Trace: [ 567.653514][T31946] [ 567.653523][T31946] __dump_stack+0x21/0x30 [ 567.653556][T31946] dump_stack_lvl+0x10c/0x190 [ 567.653582][T31946] ? __cfi_dump_stack_lvl+0x10/0x10 [ 567.653613][T31946] dump_stack+0x19/0x20 [ 567.653638][T31946] should_fail_ex+0x3d9/0x530 [ 567.653661][T31946] should_failslab+0xac/0x100 [ 567.653685][T31946] kmem_cache_alloc_noprof+0x42/0x430 [ 567.653705][T31946] ? prepare_creds+0x48/0x6b0 [ 567.653728][T31946] prepare_creds+0x48/0x6b0 [ 567.653750][T31946] cap_task_prctl+0x520/0x9c0 [ 567.653776][T31946] security_task_prctl+0x97/0x230 [ 567.653804][T31946] __se_sys_prctl+0xca/0x1460 [ 567.653823][T31946] ? ksys_write+0x1ef/0x250 [ 567.653843][T31946] ? __x64_sys_prctl+0xf0/0xf0 [ 567.653864][T31946] __x64_sys_prctl+0xc3/0xf0 [ 567.653881][T31946] x64_sys_call+0x2614/0x2ee0 [ 567.653908][T31946] do_syscall_64+0x58/0xf0 [ 567.653935][T31946] ? clear_bhb_loop+0x50/0xa0 [ 567.653959][T31946] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 567.653980][T31946] RIP: 0033:0x7f4bcc18f6c9 [ 567.653997][T31946] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 567.654017][T31946] RSP: 002b:00007f4bccf82038 EFLAGS: 00000246 ORIG_RAX: 000000000000009d [ 567.654039][T31946] RAX: ffffffffffffffda RBX: 00007f4bcc3e5fa0 RCX: 00007f4bcc18f6c9 [ 567.654056][T31946] RDX: 0000000000000016 RSI: 0000000000000003 RDI: 000000000000002f [ 567.654069][T31946] RBP: 00007f4bccf82090 R08: 0000000000000000 R09: 0000000000000000 [ 567.654084][T31946] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 567.654099][T31946] R13: 00007f4bcc3e6038 R14: 00007f4bcc3e5fa0 R15: 00007ffd81566258 [ 567.654117][T31946] [ 567.912968][T31966] FAULT_INJECTION: forcing a failure. [ 567.912968][T31966] name failslab, interval 1, probability 0, space 0, times 0 [ 567.960683][T31966] CPU: 1 UID: 0 PID: 31966 Comm: syz.2.14859 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 567.960719][T31966] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 567.960732][T31966] Call Trace: [ 567.960739][T31966] [ 567.960749][T31966] __dump_stack+0x21/0x30 [ 567.960781][T31966] dump_stack_lvl+0x10c/0x190 [ 567.960810][T31966] ? __cfi_dump_stack_lvl+0x10/0x10 [ 567.960838][T31966] ? __kasan_check_write+0x18/0x20 [ 567.960871][T31966] ? proc_fail_nth_write+0x17e/0x210 [ 567.960898][T31966] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 567.960927][T31966] dump_stack+0x19/0x20 [ 567.960953][T31966] should_fail_ex+0x3d9/0x530 [ 567.960976][T31966] should_failslab+0xac/0x100 [ 567.961000][T31966] kmem_cache_alloc_noprof+0x42/0x430 [ 567.961019][T31966] ? getname_flags+0xc6/0x710 [ 567.961041][T31966] getname_flags+0xc6/0x710 [ 567.961061][T31966] ? build_open_flags+0x487/0x600 [ 567.961089][T31966] getname+0x1b/0x30 [ 567.961127][T31966] do_sys_openat2+0xcb/0x1c0 [ 567.961155][T31966] ? fput+0x1a5/0x240 [ 567.961181][T31966] ? do_sys_open+0x100/0x100 [ 567.961209][T31966] ? ksys_write+0x1ef/0x250 [ 567.961230][T31966] ? __cfi_ksys_write+0x10/0x10 [ 567.961252][T31966] __x64_sys_openat+0x13a/0x170 [ 567.961282][T31966] x64_sys_call+0xe69/0x2ee0 [ 567.961315][T31966] do_syscall_64+0x58/0xf0 [ 567.961344][T31966] ? clear_bhb_loop+0x50/0xa0 [ 567.961369][T31966] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 567.961393][T31966] RIP: 0033:0x7f4bcc18f6c9 [ 567.961412][T31966] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 567.961431][T31966] RSP: 002b:00007f4bccf82038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 567.961455][T31966] RAX: ffffffffffffffda RBX: 00007f4bcc3e5fa0 RCX: 00007f4bcc18f6c9 [ 567.961473][T31966] RDX: 000000000000275a RSI: 0000200000000280 RDI: ffffffffffffff9c [ 567.961489][T31966] RBP: 00007f4bccf82090 R08: 0000000000000000 R09: 0000000000000000 [ 567.961505][T31966] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 567.961519][T31966] R13: 00007f4bcc3e6038 R14: 00007f4bcc3e5fa0 R15: 00007ffd81566258 [ 567.961539][T31966] [ 568.281371][T31985] FAULT_INJECTION: forcing a failure. [ 568.281371][T31985] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 568.337018][T31985] CPU: 0 UID: 0 PID: 31985 Comm: syz.3.14866 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 568.337055][T31985] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 568.337070][T31985] Call Trace: [ 568.337077][T31985] [ 568.337087][T31985] __dump_stack+0x21/0x30 [ 568.337120][T31985] dump_stack_lvl+0x10c/0x190 [ 568.337148][T31985] ? __cfi_dump_stack_lvl+0x10/0x10 [ 568.337177][T31985] ? __x64_sys_openat+0x13a/0x170 [ 568.337205][T31985] ? do_syscall_64+0x58/0xf0 [ 568.337232][T31985] ? entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 568.337257][T31985] dump_stack+0x19/0x20 [ 568.337284][T31985] should_fail_ex+0x3d9/0x530 [ 568.337305][T31985] should_fail_alloc_page+0xeb/0x110 [ 568.337331][T31985] __alloc_pages_noprof+0x19b/0x7b0 [ 568.337360][T31985] ? avc_has_perm_noaudit+0x286/0x360 [ 568.337389][T31985] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 568.337419][T31985] ? avc_has_perm+0x144/0x220 [ 568.337447][T31985] ? kasan_save_alloc_info+0x40/0x50 [ 568.337479][T31985] __folio_alloc_noprof+0x14/0x80 [ 568.337508][T31985] shmem_alloc_and_add_folio+0x452/0x1050 [ 568.337536][T31985] ? put_swap_device+0x130/0x130 [ 568.337561][T31985] ? shmem_huge_global_enabled+0x2da/0x360 [ 568.337585][T31985] ? shmem_allowable_huge_orders+0x1f7/0x430 [ 568.337617][T31985] ? is_bpf_text_address+0x17b/0x1a0 [ 568.337642][T31985] shmem_get_folio_gfp+0x5f0/0x1380 [ 568.337667][T31985] ? shmem_get_folio+0xc0/0xc0 [ 568.337690][T31985] ? inode_to_bdi+0x6d/0x100 [ 568.337719][T31985] shmem_write_begin+0xf4/0x270 [ 568.337745][T31985] generic_perform_write+0x330/0x960 [ 568.337779][T31985] ? __cfi_generic_perform_write+0x10/0x10 [ 568.337809][T31985] ? down_write+0xe9/0x2a0 [ 568.337832][T31985] ? file_update_time+0xa3/0x220 [ 568.337860][T31985] shmem_file_write_iter+0x105/0x130 [ 568.337889][T31985] vfs_write+0x718/0xf30 [ 568.337907][T31985] ? __cfi_shmem_file_write_iter+0x10/0x10 [ 568.337935][T31985] ? __cfi_vfs_write+0x10/0x10 [ 568.337954][T31985] ? __cfi_mutex_lock+0x10/0x10 [ 568.337976][T31985] ksys_write+0x141/0x250 [ 568.337995][T31985] ? __cfi_ksys_write+0x10/0x10 [ 568.338019][T31985] ? __kasan_check_read+0x15/0x20 [ 568.338050][T31985] __x64_sys_write+0x7f/0x90 [ 568.338070][T31985] x64_sys_call+0x271c/0x2ee0 [ 568.338101][T31985] do_syscall_64+0x58/0xf0 [ 568.338126][T31985] ? clear_bhb_loop+0x50/0xa0 [ 568.338150][T31985] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 568.338172][T31985] RIP: 0033:0x7f29b6d8f6c9 [ 568.338190][T31985] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 568.338208][T31985] RSP: 002b:00007f29b7b42038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 568.338231][T31985] RAX: ffffffffffffffda RBX: 00007f29b6fe6090 RCX: 00007f29b6d8f6c9 [ 568.338247][T31985] RDX: 0000000000000118 RSI: 0000200000000340 RDI: 000000000000000a [ 568.338262][T31985] RBP: 00007f29b7b42090 R08: 0000000000000000 R09: 0000000000000000 [ 568.338276][T31985] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 568.338290][T31985] R13: 00007f29b6fe6128 R14: 00007f29b6fe6090 R15: 00007fffa7a696e8 [ 568.338309][T31985] [ 569.128408][T32042] FAULT_INJECTION: forcing a failure. [ 569.128408][T32042] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 569.156969][T32042] CPU: 0 UID: 0 PID: 32042 Comm: syz.1.14893 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 569.157003][T32042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 569.157017][T32042] Call Trace: [ 569.157024][T32042] [ 569.157033][T32042] __dump_stack+0x21/0x30 [ 569.157066][T32042] dump_stack_lvl+0x10c/0x190 [ 569.157094][T32042] ? __cfi_dump_stack_lvl+0x10/0x10 [ 569.157122][T32042] ? check_stack_object+0x12c/0x140 [ 569.157142][T32042] dump_stack+0x19/0x20 [ 569.157167][T32042] should_fail_ex+0x3d9/0x530 [ 569.157187][T32042] should_fail+0xf/0x20 [ 569.157204][T32042] should_fail_usercopy+0x1e/0x30 [ 569.157227][T32042] _copy_to_user+0x24/0xa0 [ 569.157252][T32042] simple_read_from_buffer+0xed/0x160 [ 569.157279][T32042] proc_fail_nth_read+0x19e/0x210 [ 569.157306][T32042] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 569.157334][T32042] ? bpf_lsm_file_permission+0xd/0x20 [ 569.157363][T32042] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 569.157390][T32042] vfs_read+0x27d/0xc70 [ 569.157409][T32042] ? __cfi_vfs_read+0x10/0x10 [ 569.157426][T32042] ? __kasan_check_write+0x18/0x20 [ 569.157457][T32042] ? mutex_lock+0x92/0x1c0 [ 569.157475][T32042] ? __cfi_mutex_lock+0x10/0x10 [ 569.157494][T32042] ? __fget_files+0x2c5/0x340 [ 569.157519][T32042] ksys_read+0x141/0x250 [ 569.157545][T32042] ? __cfi_ksys_read+0x10/0x10 [ 569.157563][T32042] ? __kasan_check_read+0x15/0x20 [ 569.157591][T32042] __x64_sys_read+0x7f/0x90 [ 569.157609][T32042] x64_sys_call+0x2638/0x2ee0 [ 569.157640][T32042] do_syscall_64+0x58/0xf0 [ 569.157667][T32042] ? clear_bhb_loop+0x50/0xa0 [ 569.157691][T32042] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 569.157713][T32042] RIP: 0033:0x7f970218e0dc [ 569.157730][T32042] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 569.157750][T32042] RSP: 002b:00007f9702f85030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 569.157774][T32042] RAX: ffffffffffffffda RBX: 00007f97023e5fa0 RCX: 00007f970218e0dc [ 569.157791][T32042] RDX: 000000000000000f RSI: 00007f9702f850a0 RDI: 0000000000000008 [ 569.157805][T32042] RBP: 00007f9702f85090 R08: 0000000000000000 R09: 0000000000000000 [ 569.157819][T32042] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 569.157832][T32042] R13: 00007f97023e6038 R14: 00007f97023e5fa0 R15: 00007ffe73023888 [ 569.157851][T32042] [ 569.626966][ T36] audit: type=1400 audit(1763436660.850:256): avc: denied { create } for pid=32100 comm="syz.2.14919" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 576.800452][ T36] audit: type=1400 audit(1763436668.030:257): avc: denied { map } for pid=32516 comm="syz.3.15113" path="socket:[170591]" dev="sockfs" ino=170591 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 576.856964][ T36] audit: type=1400 audit(1763436668.030:258): avc: denied { read } for pid=32516 comm="syz.3.15113" path="socket:[170591]" dev="sockfs" ino=170591 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 578.829200][T32598] FAULT_INJECTION: forcing a failure. [ 578.829200][T32598] name failslab, interval 1, probability 0, space 0, times 0 [ 578.863599][T32598] CPU: 1 UID: 0 PID: 32598 Comm: syz.1.15150 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 578.863639][T32598] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 578.863654][T32598] Call Trace: [ 578.863662][T32598] [ 578.863671][T32598] __dump_stack+0x21/0x30 [ 578.863707][T32598] dump_stack_lvl+0x10c/0x190 [ 578.863737][T32598] ? __cfi_dump_stack_lvl+0x10/0x10 [ 578.863766][T32598] ? __kasan_check_write+0x18/0x20 [ 578.863800][T32598] ? proc_fail_nth_write+0x17e/0x210 [ 578.863830][T32598] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 578.863860][T32598] dump_stack+0x19/0x20 [ 578.863888][T32598] should_fail_ex+0x3d9/0x530 [ 578.863911][T32598] should_failslab+0xac/0x100 [ 578.863936][T32598] kmem_cache_alloc_noprof+0x42/0x430 [ 578.863957][T32598] ? getname_flags+0xc6/0x710 [ 578.863981][T32598] getname_flags+0xc6/0x710 [ 578.864001][T32598] ? build_open_flags+0x487/0x600 [ 578.864032][T32598] getname+0x1b/0x30 [ 578.864052][T32598] do_sys_openat2+0xcb/0x1c0 [ 578.864089][T32598] ? fput+0x1a5/0x240 [ 578.864112][T32598] ? do_sys_open+0x100/0x100 [ 578.864137][T32598] ? ksys_write+0x1ef/0x250 [ 578.864155][T32598] ? __cfi_ksys_write+0x10/0x10 [ 578.864174][T32598] __x64_sys_openat+0x13a/0x170 [ 578.864200][T32598] x64_sys_call+0xe69/0x2ee0 [ 578.864228][T32598] do_syscall_64+0x58/0xf0 [ 578.864252][T32598] ? clear_bhb_loop+0x50/0xa0 [ 578.864273][T32598] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 578.864312][T32598] RIP: 0033:0x7f970218f6c9 [ 578.864331][T32598] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 578.864351][T32598] RSP: 002b:00007f9702f85038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 578.864376][T32598] RAX: ffffffffffffffda RBX: 00007f97023e5fa0 RCX: 00007f970218f6c9 [ 578.864395][T32598] RDX: 000000000000275a RSI: 0000200000000280 RDI: ffffffffffffff9c [ 578.864418][T32598] RBP: 00007f9702f85090 R08: 0000000000000000 R09: 0000000000000000 [ 578.864433][T32598] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 578.864448][T32598] R13: 00007f97023e6038 R14: 00007f97023e5fa0 R15: 00007ffe73023888 [ 578.864468][T32598] [ 584.643730][ T402] overlayfs: missing 'lowerdir' [ 584.756852][ T414] FAULT_INJECTION: forcing a failure. [ 584.756852][ T414] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 584.780767][ T414] CPU: 1 UID: 0 PID: 414 Comm: syz.2.15279 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 584.780807][ T414] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 584.780823][ T414] Call Trace: [ 584.780831][ T414] [ 584.780841][ T414] __dump_stack+0x21/0x30 [ 584.780878][ T414] dump_stack_lvl+0x10c/0x190 [ 584.780909][ T414] ? __cfi_dump_stack_lvl+0x10/0x10 [ 584.780943][ T414] ? check_stack_object+0x12c/0x140 [ 584.780966][ T414] dump_stack+0x19/0x20 [ 584.780995][ T414] should_fail_ex+0x3d9/0x530 [ 584.781020][ T414] should_fail+0xf/0x20 [ 584.781041][ T414] should_fail_usercopy+0x1e/0x30 [ 584.781066][ T414] _copy_to_user+0x24/0xa0 [ 584.781095][ T414] simple_read_from_buffer+0xed/0x160 [ 584.781126][ T414] proc_fail_nth_read+0x19e/0x210 [ 584.781162][ T414] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 584.781194][ T414] ? bpf_lsm_file_permission+0xd/0x20 [ 584.781226][ T414] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 584.781257][ T414] vfs_read+0x27d/0xc70 [ 584.781279][ T414] ? __cfi_vfs_read+0x10/0x10 [ 584.781299][ T414] ? __kasan_check_write+0x18/0x20 [ 584.781333][ T414] ? mutex_lock+0x92/0x1c0 [ 584.781354][ T414] ? __cfi_mutex_lock+0x10/0x10 [ 584.781375][ T414] ? __fget_files+0x2c5/0x340 [ 584.781401][ T414] ksys_read+0x141/0x250 [ 584.781422][ T414] ? __cfi_ksys_read+0x10/0x10 [ 584.781443][ T414] ? __kasan_check_read+0x15/0x20 [ 584.781478][ T414] __x64_sys_read+0x7f/0x90 [ 584.781499][ T414] x64_sys_call+0x2638/0x2ee0 [ 584.781533][ T414] do_syscall_64+0x58/0xf0 [ 584.781561][ T414] ? clear_bhb_loop+0x50/0xa0 [ 584.781587][ T414] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 584.781612][ T414] RIP: 0033:0x7f4bcc18e0dc [ 584.781630][ T414] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 584.781651][ T414] RSP: 002b:00007f4bccf82030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 584.781676][ T414] RAX: ffffffffffffffda RBX: 00007f4bcc3e5fa0 RCX: 00007f4bcc18e0dc [ 584.781695][ T414] RDX: 000000000000000f RSI: 00007f4bccf820a0 RDI: 0000000000000007 [ 584.781710][ T414] RBP: 00007f4bccf82090 R08: 0000000000000000 R09: 0000000000000000 [ 584.781726][ T414] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 584.781740][ T414] R13: 00007f4bcc3e6038 R14: 00007f4bcc3e5fa0 R15: 00007ffd81566258 [ 584.781780][ T414] [ 586.749193][ T500] FAULT_INJECTION: forcing a failure. [ 586.749193][ T500] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 586.772486][ T500] CPU: 1 UID: 0 PID: 500 Comm: syz.1.15318 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 586.772525][ T500] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 586.772542][ T500] Call Trace: [ 586.772550][ T500] [ 586.772571][ T500] __dump_stack+0x21/0x30 [ 586.772625][ T500] dump_stack_lvl+0x10c/0x190 [ 586.772657][ T500] ? __cfi_dump_stack_lvl+0x10/0x10 [ 586.772689][ T500] ? check_stack_object+0x12c/0x140 [ 586.772713][ T500] dump_stack+0x19/0x20 [ 586.772742][ T500] should_fail_ex+0x3d9/0x530 [ 586.772766][ T500] should_fail+0xf/0x20 [ 586.772788][ T500] should_fail_usercopy+0x1e/0x30 [ 586.772813][ T500] _copy_to_user+0x24/0xa0 [ 586.772842][ T500] simple_read_from_buffer+0xed/0x160 [ 586.772872][ T500] proc_fail_nth_read+0x19e/0x210 [ 586.772904][ T500] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 586.772936][ T500] ? bpf_lsm_file_permission+0xd/0x20 [ 586.772968][ T500] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 586.772999][ T500] vfs_read+0x27d/0xc70 [ 586.773028][ T500] ? __cfi_ashmem_memfd_ioctl+0x10/0x10 [ 586.773062][ T500] ? __cfi_vfs_read+0x10/0x10 [ 586.773083][ T500] ? __kasan_check_write+0x18/0x20 [ 586.773129][ T500] ? mutex_lock+0x92/0x1c0 [ 586.773151][ T500] ? __cfi_mutex_lock+0x10/0x10 [ 586.773171][ T500] ? __fget_files+0x2c5/0x340 [ 586.773197][ T500] ksys_read+0x141/0x250 [ 586.773217][ T500] ? __cfi_ksys_read+0x10/0x10 [ 586.773238][ T500] ? __kasan_check_read+0x15/0x20 [ 586.773270][ T500] __x64_sys_read+0x7f/0x90 [ 586.773310][ T500] x64_sys_call+0x2638/0x2ee0 [ 586.773344][ T500] do_syscall_64+0x58/0xf0 [ 586.773374][ T500] ? clear_bhb_loop+0x50/0xa0 [ 586.773399][ T500] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 586.773424][ T500] RIP: 0033:0x7f970218e0dc [ 586.773444][ T500] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 586.773468][ T500] RSP: 002b:00007f9702f85030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 586.773494][ T500] RAX: ffffffffffffffda RBX: 00007f97023e5fa0 RCX: 00007f970218e0dc [ 586.773513][ T500] RDX: 000000000000000f RSI: 00007f9702f850a0 RDI: 000000000000000b [ 586.773528][ T500] RBP: 00007f9702f85090 R08: 0000000000000000 R09: 0000000000000000 [ 586.773544][ T500] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 586.773559][ T500] R13: 00007f97023e6038 R14: 00007f97023e5fa0 R15: 00007ffe73023888 [ 586.773580][ T500] [ 589.401413][ T684] FAULT_INJECTION: forcing a failure. [ 589.401413][ T684] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 589.426954][ T684] CPU: 0 UID: 0 PID: 684 Comm: syz.0.15407 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 589.426991][ T684] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 589.427006][ T684] Call Trace: [ 589.427014][ T684] [ 589.427023][ T684] __dump_stack+0x21/0x30 [ 589.427060][ T684] dump_stack_lvl+0x10c/0x190 [ 589.427091][ T684] ? __cfi_dump_stack_lvl+0x10/0x10 [ 589.427124][ T684] ? vfs_write+0x93e/0xf30 [ 589.427146][ T684] dump_stack+0x19/0x20 [ 589.427174][ T684] should_fail_ex+0x3d9/0x530 [ 589.427198][ T684] should_fail+0xf/0x20 [ 589.427219][ T684] should_fail_usercopy+0x1e/0x30 [ 589.427244][ T684] _copy_from_user+0x22/0xb0 [ 589.427272][ T684] do_sock_getsockopt+0x1d7/0x6d0 [ 589.427306][ T684] ? __cfi_do_sock_getsockopt+0x10/0x10 [ 589.427339][ T684] ? __fget_files+0x2c5/0x340 [ 589.427364][ T684] __x64_sys_getsockopt+0x1d5/0x280 [ 589.427398][ T684] x64_sys_call+0x10db/0x2ee0 [ 589.427431][ T684] do_syscall_64+0x58/0xf0 [ 589.427469][ T684] ? clear_bhb_loop+0x50/0xa0 [ 589.427496][ T684] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 589.427519][ T684] RIP: 0033:0x7f7c2978f6c9 [ 589.427539][ T684] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 589.427560][ T684] RSP: 002b:00007f7c2a651038 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 589.427587][ T684] RAX: ffffffffffffffda RBX: 00007f7c299e5fa0 RCX: 00007f7c2978f6c9 [ 589.427605][ T684] RDX: 000000000000001d RSI: 0000000000000006 RDI: 0000000000000003 [ 589.427619][ T684] RBP: 00007f7c2a651090 R08: 00002000000000c0 R09: 0000000000000000 [ 589.427635][ T684] R10: 0000200000000040 R11: 0000000000000246 R12: 0000000000000001 [ 589.427650][ T684] R13: 00007f7c299e6038 R14: 00007f7c299e5fa0 R15: 00007fff074614d8 [ 589.427670][ T684] [ 589.986892][ T795] netlink: 28 bytes leftover after parsing attributes in process `syz.1.15461'. [ 590.044083][ T808] FAULT_INJECTION: forcing a failure. [ 590.044083][ T808] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 590.057697][ T808] CPU: 0 UID: 0 PID: 808 Comm: syz.0.15467 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 590.057733][ T808] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 590.057748][ T808] Call Trace: [ 590.057756][ T808] [ 590.057766][ T808] __dump_stack+0x21/0x30 [ 590.057802][ T808] dump_stack_lvl+0x10c/0x190 [ 590.057832][ T808] ? __cfi_dump_stack_lvl+0x10/0x10 [ 590.057863][ T808] ? vfs_write+0x93e/0xf30 [ 590.057885][ T808] dump_stack+0x19/0x20 [ 590.057926][ T808] should_fail_ex+0x3d9/0x530 [ 590.057949][ T808] should_fail+0xf/0x20 [ 590.057969][ T808] should_fail_usercopy+0x1e/0x30 [ 590.057992][ T808] _copy_from_user+0x22/0xb0 [ 590.058019][ T808] do_sock_getsockopt+0x1d7/0x6d0 [ 590.058050][ T808] ? __cfi_do_sock_getsockopt+0x10/0x10 [ 590.058081][ T808] ? __fget_files+0x2c5/0x340 [ 590.058106][ T808] __x64_sys_getsockopt+0x1d5/0x280 [ 590.058137][ T808] x64_sys_call+0x10db/0x2ee0 [ 590.058169][ T808] do_syscall_64+0x58/0xf0 [ 590.058197][ T808] ? clear_bhb_loop+0x50/0xa0 [ 590.058221][ T808] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 590.058244][ T808] RIP: 0033:0x7f7c2978f6c9 [ 590.058262][ T808] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 590.058283][ T808] RSP: 002b:00007f7c2a651038 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 590.058309][ T808] RAX: ffffffffffffffda RBX: 00007f7c299e5fa0 RCX: 00007f7c2978f6c9 [ 590.058326][ T808] RDX: 000000000000001d RSI: 0000000000000006 RDI: 0000000000000003 [ 590.058340][ T808] RBP: 00007f7c2a651090 R08: 00002000000000c0 R09: 0000000000000000 [ 590.058355][ T808] R10: 0000200000000040 R11: 0000000000000246 R12: 0000000000000001 [ 590.058369][ T808] R13: 00007f7c299e6038 R14: 00007f7c299e5fa0 R15: 00007fff074614d8 [ 590.058388][ T808] [ 605.756141][ T1856] FAULT_INJECTION: forcing a failure. [ 605.756141][ T1856] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 605.786931][ T1856] CPU: 0 UID: 0 PID: 1856 Comm: syz.2.15984 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 605.786969][ T1856] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 605.786983][ T1856] Call Trace: [ 605.786991][ T1856] [ 605.787009][ T1856] __dump_stack+0x21/0x30 [ 605.787045][ T1856] dump_stack_lvl+0x10c/0x190 [ 605.787075][ T1856] ? __cfi_dump_stack_lvl+0x10/0x10 [ 605.787106][ T1856] ? check_stack_object+0x12c/0x140 [ 605.787128][ T1856] dump_stack+0x19/0x20 [ 605.787156][ T1856] should_fail_ex+0x3d9/0x530 [ 605.787178][ T1856] should_fail+0xf/0x20 [ 605.787198][ T1856] should_fail_usercopy+0x1e/0x30 [ 605.787221][ T1856] _copy_to_user+0x24/0xa0 [ 605.787246][ T1856] simple_read_from_buffer+0xed/0x160 [ 605.787275][ T1856] proc_fail_nth_read+0x19e/0x210 [ 605.787306][ T1856] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 605.787336][ T1856] ? bpf_lsm_file_permission+0xd/0x20 [ 605.787367][ T1856] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 605.787396][ T1856] vfs_read+0x27d/0xc70 [ 605.787416][ T1856] ? __cfi_vfs_read+0x10/0x10 [ 605.787435][ T1856] ? __kasan_check_write+0x18/0x20 [ 605.787468][ T1856] ? mutex_lock+0x92/0x1c0 [ 605.787489][ T1856] ? __cfi_mutex_lock+0x10/0x10 [ 605.787510][ T1856] ? __fget_files+0x2c5/0x340 [ 605.787537][ T1856] ksys_read+0x141/0x250 [ 605.787558][ T1856] ? __cfi_ksys_read+0x10/0x10 [ 605.787578][ T1856] ? __kasan_check_read+0x15/0x20 [ 605.787612][ T1856] __x64_sys_read+0x7f/0x90 [ 605.787632][ T1856] x64_sys_call+0x2638/0x2ee0 [ 605.787664][ T1856] do_syscall_64+0x58/0xf0 [ 605.787692][ T1856] ? clear_bhb_loop+0x50/0xa0 [ 605.787717][ T1856] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 605.787740][ T1856] RIP: 0033:0x7f4bcc18e0dc [ 605.787759][ T1856] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 605.787778][ T1856] RSP: 002b:00007f4bccf82030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 605.787802][ T1856] RAX: ffffffffffffffda RBX: 00007f4bcc3e5fa0 RCX: 00007f4bcc18e0dc [ 605.787820][ T1856] RDX: 000000000000000f RSI: 00007f4bccf820a0 RDI: 000000000000000a [ 605.787835][ T1856] RBP: 00007f4bccf82090 R08: 0000000000000000 R09: 0000000000000000 [ 605.787850][ T1856] R10: 0000000000000011 R11: 0000000000000246 R12: 0000000000000001 [ 605.787864][ T1856] R13: 00007f4bcc3e6038 R14: 00007f4bcc3e5fa0 R15: 00007ffd81566258 [ 605.787884][ T1856] [ 606.208399][ T1875] FAULT_INJECTION: forcing a failure. [ 606.208399][ T1875] name failslab, interval 1, probability 0, space 0, times 0 [ 606.261539][ T1875] CPU: 1 UID: 0 PID: 1875 Comm: syz.3.15994 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 606.261575][ T1875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 606.261590][ T1875] Call Trace: [ 606.261597][ T1875] [ 606.261606][ T1875] __dump_stack+0x21/0x30 [ 606.261640][ T1875] dump_stack_lvl+0x10c/0x190 [ 606.261667][ T1875] ? __cfi_dump_stack_lvl+0x10/0x10 [ 606.261696][ T1875] ? __kasan_check_write+0x18/0x20 [ 606.261729][ T1875] dump_stack+0x19/0x20 [ 606.261755][ T1875] should_fail_ex+0x3d9/0x530 [ 606.261777][ T1875] should_failslab+0xac/0x100 [ 606.261801][ T1875] kmem_cache_alloc_noprof+0x42/0x430 [ 606.261820][ T1875] ? getname_flags+0xc6/0x710 [ 606.261841][ T1875] ? __cfi_ksys_write+0x10/0x10 [ 606.261861][ T1875] getname_flags+0xc6/0x710 [ 606.261882][ T1875] __x64_sys_mkdirat+0x7e/0xa0 [ 606.261909][ T1875] x64_sys_call+0x2ba8/0x2ee0 [ 606.261939][ T1875] do_syscall_64+0x58/0xf0 [ 606.261966][ T1875] ? clear_bhb_loop+0x50/0xa0 [ 606.261998][ T1875] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 606.262021][ T1875] RIP: 0033:0x7f29b6d8f6c9 [ 606.262038][ T1875] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 606.262057][ T1875] RSP: 002b:00007f29b7b63038 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 606.262079][ T1875] RAX: ffffffffffffffda RBX: 00007f29b6fe5fa0 RCX: 00007f29b6d8f6c9 [ 606.262096][ T1875] RDX: 00000000000001c0 RSI: 0000200000000040 RDI: ffffffffffffff9c [ 606.262111][ T1875] RBP: 00007f29b7b63090 R08: 0000000000000000 R09: 0000000000000000 [ 606.262125][ T1875] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 606.262139][ T1875] R13: 00007f29b6fe6038 R14: 00007f29b6fe5fa0 R15: 00007fffa7a696e8 [ 606.262158][ T1875] [ 607.067143][ T1922] FAULT_INJECTION: forcing a failure. [ 607.067143][ T1922] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 607.095136][ T1922] CPU: 1 UID: 0 PID: 1922 Comm: syz.0.16016 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 607.095172][ T1922] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 607.095187][ T1922] Call Trace: [ 607.095194][ T1922] [ 607.095202][ T1922] __dump_stack+0x21/0x30 [ 607.095236][ T1922] dump_stack_lvl+0x10c/0x190 [ 607.095263][ T1922] ? __cfi_dump_stack_lvl+0x10/0x10 [ 607.095292][ T1922] ? vfs_write+0x93e/0xf30 [ 607.095312][ T1922] dump_stack+0x19/0x20 [ 607.095339][ T1922] should_fail_ex+0x3d9/0x530 [ 607.095361][ T1922] should_fail+0xf/0x20 [ 607.095381][ T1922] should_fail_usercopy+0x1e/0x30 [ 607.095403][ T1922] _copy_from_user+0x22/0xb0 [ 607.095430][ T1922] do_sock_getsockopt+0x1d7/0x6d0 [ 607.095463][ T1922] ? __cfi_do_sock_getsockopt+0x10/0x10 [ 607.095493][ T1922] ? __fget_files+0x2c5/0x340 [ 607.095517][ T1922] __x64_sys_getsockopt+0x1d5/0x280 [ 607.095568][ T1922] x64_sys_call+0x10db/0x2ee0 [ 607.095601][ T1922] do_syscall_64+0x58/0xf0 [ 607.095630][ T1922] ? clear_bhb_loop+0x50/0xa0 [ 607.095655][ T1922] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 607.095678][ T1922] RIP: 0033:0x7f7c2978f6c9 [ 607.095697][ T1922] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 607.095717][ T1922] RSP: 002b:00007f7c2a651038 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 607.095742][ T1922] RAX: ffffffffffffffda RBX: 00007f7c299e5fa0 RCX: 00007f7c2978f6c9 [ 607.095759][ T1922] RDX: 000000000000001d RSI: 0000000000000006 RDI: 0000000000000003 [ 607.095773][ T1922] RBP: 00007f7c2a651090 R08: 00002000000000c0 R09: 0000000000000000 [ 607.095789][ T1922] R10: 0000200000000040 R11: 0000000000000246 R12: 0000000000000001 [ 607.095805][ T1922] R13: 00007f7c299e6038 R14: 00007f7c299e5fa0 R15: 00007fff074614d8 [ 607.095825][ T1922] [ 608.352156][ T2013] FAULT_INJECTION: forcing a failure. [ 608.352156][ T2013] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 608.387046][ T2013] CPU: 0 UID: 0 PID: 2013 Comm: syz.2.16061 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 608.387083][ T2013] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 608.387099][ T2013] Call Trace: [ 608.387107][ T2013] [ 608.387117][ T2013] __dump_stack+0x21/0x30 [ 608.387153][ T2013] dump_stack_lvl+0x10c/0x190 [ 608.387183][ T2013] ? __cfi_dump_stack_lvl+0x10/0x10 [ 608.387214][ T2013] dump_stack+0x19/0x20 [ 608.387243][ T2013] should_fail_ex+0x3d9/0x530 [ 608.387267][ T2013] should_fail+0xf/0x20 [ 608.387287][ T2013] should_fail_usercopy+0x1e/0x30 [ 608.387312][ T2013] _copy_from_user+0x22/0xb0 [ 608.387340][ T2013] __x64_sys_rt_sigaction+0x152/0x270 [ 608.387364][ T2013] ? __cfi___x64_sys_rt_sigaction+0x10/0x10 [ 608.387388][ T2013] ? __kasan_check_read+0x15/0x20 [ 608.387422][ T2013] x64_sys_call+0x1bed/0x2ee0 [ 608.387455][ T2013] do_syscall_64+0x58/0xf0 [ 608.387484][ T2013] ? clear_bhb_loop+0x50/0xa0 [ 608.387510][ T2013] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 608.387533][ T2013] RIP: 0033:0x7f4bcc18f6c9 [ 608.387552][ T2013] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 608.387571][ T2013] RSP: 002b:00007f4bccf82038 EFLAGS: 00000246 ORIG_RAX: 000000000000000d [ 608.387596][ T2013] RAX: ffffffffffffffda RBX: 00007f4bcc3e5fa0 RCX: 00007f4bcc18f6c9 [ 608.387613][ T2013] RDX: 0000000000000000 RSI: 0000200000000180 RDI: 000000000000000d [ 608.387628][ T2013] RBP: 00007f4bccf82090 R08: 0000200000000300 R09: 0000000000000000 [ 608.387644][ T2013] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000000001 [ 608.387658][ T2013] R13: 00007f4bcc3e6038 R14: 00007f4bcc3e5fa0 R15: 00007ffd81566258 [ 608.387677][ T2013] [ 610.456533][ T2174] FAULT_INJECTION: forcing a failure. [ 610.456533][ T2174] name failslab, interval 1, probability 0, space 0, times 0 [ 610.476925][ T2174] CPU: 1 UID: 0 PID: 2174 Comm: syz.1.16138 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 610.476959][ T2174] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 610.476973][ T2174] Call Trace: [ 610.476981][ T2174] [ 610.476990][ T2174] __dump_stack+0x21/0x30 [ 610.477026][ T2174] dump_stack_lvl+0x10c/0x190 [ 610.477056][ T2174] ? __cfi_dump_stack_lvl+0x10/0x10 [ 610.477087][ T2174] ? __kasan_check_write+0x18/0x20 [ 610.477120][ T2174] dump_stack+0x19/0x20 [ 610.477148][ T2174] should_fail_ex+0x3d9/0x530 [ 610.477171][ T2174] should_failslab+0xac/0x100 [ 610.477195][ T2174] kmem_cache_alloc_noprof+0x42/0x430 [ 610.477215][ T2174] ? getname_flags+0xc6/0x710 [ 610.477238][ T2174] ? __cfi_ksys_write+0x10/0x10 [ 610.477259][ T2174] getname_flags+0xc6/0x710 [ 610.477282][ T2174] __x64_sys_mkdirat+0x7e/0xa0 [ 610.477310][ T2174] x64_sys_call+0x2ba8/0x2ee0 [ 610.477343][ T2174] do_syscall_64+0x58/0xf0 [ 610.477372][ T2174] ? clear_bhb_loop+0x50/0xa0 [ 610.477397][ T2174] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 610.477422][ T2174] RIP: 0033:0x7f970218f6c9 [ 610.477440][ T2174] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 610.477461][ T2174] RSP: 002b:00007f9702f85038 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 610.477486][ T2174] RAX: ffffffffffffffda RBX: 00007f97023e5fa0 RCX: 00007f970218f6c9 [ 610.477505][ T2174] RDX: 00000000000001c0 RSI: 0000200000000040 RDI: ffffffffffffff9c [ 610.477522][ T2174] RBP: 00007f9702f85090 R08: 0000000000000000 R09: 0000000000000000 [ 610.477536][ T2174] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 610.477551][ T2174] R13: 00007f97023e6038 R14: 00007f97023e5fa0 R15: 00007ffe73023888 [ 610.477571][ T2174] [ 611.918499][ T2222] FAULT_INJECTION: forcing a failure. [ 611.918499][ T2222] name failslab, interval 1, probability 0, space 0, times 0 [ 611.946924][ T2222] CPU: 0 UID: 0 PID: 2222 Comm: syz.3.16164 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 611.946959][ T2222] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 611.946974][ T2222] Call Trace: [ 611.946981][ T2222] [ 611.946990][ T2222] __dump_stack+0x21/0x30 [ 611.947027][ T2222] dump_stack_lvl+0x10c/0x190 [ 611.947059][ T2222] ? __cfi_dump_stack_lvl+0x10/0x10 [ 611.947090][ T2222] ? __kasan_check_write+0x18/0x20 [ 611.947125][ T2222] ? proc_fail_nth_write+0x17e/0x210 [ 611.947157][ T2222] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 611.947189][ T2222] dump_stack+0x19/0x20 [ 611.947219][ T2222] should_fail_ex+0x3d9/0x530 [ 611.947243][ T2222] should_failslab+0xac/0x100 [ 611.947269][ T2222] kmem_cache_alloc_noprof+0x42/0x430 [ 611.947291][ T2222] ? getname_flags+0xc6/0x710 [ 611.947315][ T2222] getname_flags+0xc6/0x710 [ 611.947338][ T2222] ? build_open_flags+0x487/0x600 [ 611.947369][ T2222] getname+0x1b/0x30 [ 611.947391][ T2222] do_sys_openat2+0xcb/0x1c0 [ 611.947420][ T2222] ? fput+0x1a5/0x240 [ 611.947458][ T2222] ? do_sys_open+0x100/0x100 [ 611.947488][ T2222] ? ksys_write+0x1ef/0x250 [ 611.947509][ T2222] ? __cfi_ksys_write+0x10/0x10 [ 611.947532][ T2222] __x64_sys_openat+0x13a/0x170 [ 611.947564][ T2222] x64_sys_call+0xe69/0x2ee0 [ 611.947598][ T2222] do_syscall_64+0x58/0xf0 [ 611.947628][ T2222] ? clear_bhb_loop+0x50/0xa0 [ 611.947654][ T2222] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 611.947679][ T2222] RIP: 0033:0x7f29b6d8f6c9 [ 611.947699][ T2222] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 611.947721][ T2222] RSP: 002b:00007f29b7b63038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 611.947748][ T2222] RAX: ffffffffffffffda RBX: 00007f29b6fe5fa0 RCX: 00007f29b6d8f6c9 [ 611.947767][ T2222] RDX: 0000000000000002 RSI: 0000200000000040 RDI: ffffffffffffff9c [ 611.947784][ T2222] RBP: 00007f29b7b63090 R08: 0000000000000000 R09: 0000000000000000 [ 611.947801][ T2222] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 611.947816][ T2222] R13: 00007f29b6fe6038 R14: 00007f29b6fe5fa0 R15: 00007fffa7a696e8 [ 611.947837][ T2222] [ 612.410118][ T2248] FAULT_INJECTION: forcing a failure. [ 612.410118][ T2248] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 612.437000][ T2248] CPU: 1 UID: 0 PID: 2248 Comm: syz.2.16173 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 612.437040][ T2248] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 612.437055][ T2248] Call Trace: [ 612.437063][ T2248] [ 612.437073][ T2248] __dump_stack+0x21/0x30 [ 612.437109][ T2248] dump_stack_lvl+0x10c/0x190 [ 612.437139][ T2248] ? __cfi_dump_stack_lvl+0x10/0x10 [ 612.437171][ T2248] ? check_stack_object+0x12c/0x140 [ 612.437195][ T2248] dump_stack+0x19/0x20 [ 612.437225][ T2248] should_fail_ex+0x3d9/0x530 [ 612.437249][ T2248] should_fail+0xf/0x20 [ 612.437270][ T2248] should_fail_usercopy+0x1e/0x30 [ 612.437296][ T2248] _copy_to_user+0x24/0xa0 [ 612.437324][ T2248] simple_read_from_buffer+0xed/0x160 [ 612.437355][ T2248] proc_fail_nth_read+0x19e/0x210 [ 612.437387][ T2248] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 612.437416][ T2248] ? bpf_lsm_file_permission+0xd/0x20 [ 612.437447][ T2248] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 612.437477][ T2248] vfs_read+0x27d/0xc70 [ 612.437496][ T2248] ? __cfi_ashmem_memfd_ioctl+0x10/0x10 [ 612.437531][ T2248] ? __cfi_vfs_read+0x10/0x10 [ 612.437551][ T2248] ? __kasan_check_write+0x18/0x20 [ 612.437585][ T2248] ? mutex_lock+0x92/0x1c0 [ 612.437606][ T2248] ? __cfi_mutex_lock+0x10/0x10 [ 612.437627][ T2248] ? __fget_files+0x2c5/0x340 [ 612.437655][ T2248] ksys_read+0x141/0x250 [ 612.437682][ T2248] ? __cfi_ksys_read+0x10/0x10 [ 612.437703][ T2248] ? __kasan_check_read+0x15/0x20 [ 612.437748][ T2248] __x64_sys_read+0x7f/0x90 [ 612.437768][ T2248] x64_sys_call+0x2638/0x2ee0 [ 612.437801][ T2248] do_syscall_64+0x58/0xf0 [ 612.437829][ T2248] ? clear_bhb_loop+0x50/0xa0 [ 612.437866][ T2248] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 612.437888][ T2248] RIP: 0033:0x7f4bcc18e0dc [ 612.437906][ T2248] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 612.437926][ T2248] RSP: 002b:00007f4bccf82030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 612.437949][ T2248] RAX: ffffffffffffffda RBX: 00007f4bcc3e5fa0 RCX: 00007f4bcc18e0dc [ 612.437966][ T2248] RDX: 000000000000000f RSI: 00007f4bccf820a0 RDI: 000000000000000a [ 612.437979][ T2248] RBP: 00007f4bccf82090 R08: 0000000000000000 R09: 0000000000000000 [ 612.437993][ T2248] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 612.438006][ T2248] R13: 00007f4bcc3e6038 R14: 00007f4bcc3e5fa0 R15: 00007ffd81566258 [ 612.438025][ T2248] [ 612.796803][ T2271] FAULT_INJECTION: forcing a failure. [ 612.796803][ T2271] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 612.833566][ T2271] CPU: 0 UID: 0 PID: 2271 Comm: syz.0.16183 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 612.833603][ T2271] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 612.833617][ T2271] Call Trace: [ 612.833625][ T2271] [ 612.833635][ T2271] __dump_stack+0x21/0x30 [ 612.833680][ T2271] dump_stack_lvl+0x10c/0x190 [ 612.833709][ T2271] ? __cfi_dump_stack_lvl+0x10/0x10 [ 612.833737][ T2271] ? __x64_sys_openat+0x13a/0x170 [ 612.833784][ T2271] ? do_syscall_64+0x58/0xf0 [ 612.833812][ T2271] ? entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 612.833838][ T2271] dump_stack+0x19/0x20 [ 612.833866][ T2271] should_fail_ex+0x3d9/0x530 [ 612.833890][ T2271] should_fail_alloc_page+0xeb/0x110 [ 612.833917][ T2271] __alloc_pages_noprof+0x19b/0x7b0 [ 612.833948][ T2271] ? avc_has_perm_noaudit+0x286/0x360 [ 612.833979][ T2271] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 612.834010][ T2271] ? avc_has_perm+0x144/0x220 [ 612.834040][ T2271] ? kasan_save_alloc_info+0x40/0x50 [ 612.834074][ T2271] __folio_alloc_noprof+0x14/0x80 [ 612.834103][ T2271] shmem_alloc_and_add_folio+0x452/0x1050 [ 612.834133][ T2271] ? put_swap_device+0x130/0x130 [ 612.834160][ T2271] ? shmem_huge_global_enabled+0x2da/0x360 [ 612.834186][ T2271] ? shmem_allowable_huge_orders+0x1f7/0x430 [ 612.834209][ T2271] ? is_bpf_text_address+0x17b/0x1a0 [ 612.834235][ T2271] shmem_get_folio_gfp+0x5f0/0x1380 [ 612.834262][ T2271] ? shmem_get_folio+0xc0/0xc0 [ 612.834286][ T2271] ? inode_to_bdi+0x6d/0x100 [ 612.834317][ T2271] shmem_write_begin+0xf4/0x270 [ 612.834344][ T2271] generic_perform_write+0x330/0x960 [ 612.834388][ T2271] ? __cfi_generic_perform_write+0x10/0x10 [ 612.834420][ T2271] ? down_write+0xe9/0x2a0 [ 612.834444][ T2271] ? file_update_time+0xa3/0x220 [ 612.834474][ T2271] shmem_file_write_iter+0x105/0x130 [ 612.834504][ T2271] vfs_write+0x718/0xf30 [ 612.834525][ T2271] ? __cfi_shmem_file_write_iter+0x10/0x10 [ 612.834555][ T2271] ? __cfi_vfs_write+0x10/0x10 [ 612.834576][ T2271] ? __cfi_mutex_lock+0x10/0x10 [ 612.834600][ T2271] ksys_write+0x141/0x250 [ 612.834621][ T2271] ? __cfi_ksys_write+0x10/0x10 [ 612.834643][ T2271] ? __kasan_check_read+0x15/0x20 [ 612.834677][ T2271] __x64_sys_write+0x7f/0x90 [ 612.834698][ T2271] x64_sys_call+0x271c/0x2ee0 [ 612.834730][ T2271] do_syscall_64+0x58/0xf0 [ 612.834758][ T2271] ? clear_bhb_loop+0x50/0xa0 [ 612.834794][ T2271] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 612.834817][ T2271] RIP: 0033:0x7f7c2978f6c9 [ 612.834834][ T2271] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 612.834853][ T2271] RSP: 002b:00007f7c2a651038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 612.834876][ T2271] RAX: ffffffffffffffda RBX: 00007f7c299e5fa0 RCX: 00007f7c2978f6c9 [ 612.834893][ T2271] RDX: 0000000000000118 RSI: 0000200000000340 RDI: 0000000000000009 [ 612.834907][ T2271] RBP: 00007f7c2a651090 R08: 0000000000000000 R09: 0000000000000000 [ 612.834922][ T2271] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 612.834935][ T2271] R13: 00007f7c299e6038 R14: 00007f7c299e5fa0 R15: 00007fff074614d8 [ 612.834954][ T2271] [ 613.258434][ T2285] FAULT_INJECTION: forcing a failure. [ 613.258434][ T2285] name failslab, interval 1, probability 0, space 0, times 0 [ 613.306991][ T2285] CPU: 1 UID: 0 PID: 2285 Comm: syz.0.16190 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 613.307034][ T2285] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 613.307049][ T2285] Call Trace: [ 613.307057][ T2285] [ 613.307067][ T2285] __dump_stack+0x21/0x30 [ 613.307102][ T2285] dump_stack_lvl+0x10c/0x190 [ 613.307132][ T2285] ? __cfi_dump_stack_lvl+0x10/0x10 [ 613.307172][ T2285] ? __kasan_check_write+0x18/0x20 [ 613.307204][ T2285] ? proc_fail_nth_write+0x17e/0x210 [ 613.307231][ T2285] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 613.307259][ T2285] dump_stack+0x19/0x20 [ 613.307286][ T2285] should_fail_ex+0x3d9/0x530 [ 613.307308][ T2285] should_failslab+0xac/0x100 [ 613.307338][ T2285] kmem_cache_alloc_noprof+0x42/0x430 [ 613.307359][ T2285] ? getname_flags+0xc6/0x710 [ 613.307380][ T2285] getname_flags+0xc6/0x710 [ 613.307401][ T2285] ? build_open_flags+0x487/0x600 [ 613.307429][ T2285] getname+0x1b/0x30 [ 613.307466][ T2285] do_sys_openat2+0xcb/0x1c0 [ 613.307494][ T2285] ? fput+0x1a5/0x240 [ 613.307520][ T2285] ? do_sys_open+0x100/0x100 [ 613.307548][ T2285] ? ksys_write+0x1ef/0x250 [ 613.307568][ T2285] ? __cfi_ksys_write+0x10/0x10 [ 613.307591][ T2285] __x64_sys_openat+0x13a/0x170 [ 613.307621][ T2285] x64_sys_call+0xe69/0x2ee0 [ 613.307653][ T2285] do_syscall_64+0x58/0xf0 [ 613.307682][ T2285] ? clear_bhb_loop+0x50/0xa0 [ 613.307706][ T2285] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 613.307730][ T2285] RIP: 0033:0x7f7c2978f6c9 [ 613.307749][ T2285] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 613.307769][ T2285] RSP: 002b:00007f7c2a651038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 613.307793][ T2285] RAX: ffffffffffffffda RBX: 00007f7c299e5fa0 RCX: 00007f7c2978f6c9 [ 613.307811][ T2285] RDX: 000000000000275a RSI: 0000200000000280 RDI: ffffffffffffff9c [ 613.307828][ T2285] RBP: 00007f7c2a651090 R08: 0000000000000000 R09: 0000000000000000 [ 613.307842][ T2285] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 613.307856][ T2285] R13: 00007f7c299e6038 R14: 00007f7c299e5fa0 R15: 00007fff074614d8 [ 613.307876][ T2285] [ 614.706135][ T2320] FAULT_INJECTION: forcing a failure. [ 614.706135][ T2320] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 614.729412][ T2320] CPU: 0 UID: 0 PID: 2320 Comm: syz.2.16207 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 614.729449][ T2320] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 614.729464][ T2320] Call Trace: [ 614.729473][ T2320] [ 614.729482][ T2320] __dump_stack+0x21/0x30 [ 614.729516][ T2320] dump_stack_lvl+0x10c/0x190 [ 614.729545][ T2320] ? __cfi_dump_stack_lvl+0x10/0x10 [ 614.729576][ T2320] ? check_stack_object+0x12c/0x140 [ 614.729599][ T2320] dump_stack+0x19/0x20 [ 614.729626][ T2320] should_fail_ex+0x3d9/0x530 [ 614.729650][ T2320] should_fail+0xf/0x20 [ 614.729670][ T2320] should_fail_usercopy+0x1e/0x30 [ 614.729694][ T2320] _copy_to_user+0x24/0xa0 [ 614.729721][ T2320] simple_read_from_buffer+0xed/0x160 [ 614.729750][ T2320] proc_fail_nth_read+0x19e/0x210 [ 614.729780][ T2320] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 614.729809][ T2320] ? bpf_lsm_file_permission+0xd/0x20 [ 614.729840][ T2320] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 614.729878][ T2320] vfs_read+0x27d/0xc70 [ 614.729897][ T2320] ? __cfi_ashmem_memfd_ioctl+0x10/0x10 [ 614.729930][ T2320] ? __cfi_vfs_read+0x10/0x10 [ 614.729948][ T2320] ? __kasan_check_write+0x18/0x20 [ 614.729980][ T2320] ? mutex_lock+0x92/0x1c0 [ 614.730000][ T2320] ? __cfi_mutex_lock+0x10/0x10 [ 614.730020][ T2320] ? __fget_files+0x2c5/0x340 [ 614.730045][ T2320] ksys_read+0x141/0x250 [ 614.730065][ T2320] ? __cfi_ksys_read+0x10/0x10 [ 614.730085][ T2320] ? __kasan_check_read+0x15/0x20 [ 614.730117][ T2320] __x64_sys_read+0x7f/0x90 [ 614.730138][ T2320] x64_sys_call+0x2638/0x2ee0 [ 614.730169][ T2320] do_syscall_64+0x58/0xf0 [ 614.730197][ T2320] ? clear_bhb_loop+0x50/0xa0 [ 614.730227][ T2320] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 614.730251][ T2320] RIP: 0033:0x7f4bcc18e0dc [ 614.730269][ T2320] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 614.730288][ T2320] RSP: 002b:00007f4bccf82030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 614.730312][ T2320] RAX: ffffffffffffffda RBX: 00007f4bcc3e5fa0 RCX: 00007f4bcc18e0dc [ 614.730329][ T2320] RDX: 000000000000000f RSI: 00007f4bccf820a0 RDI: 0000000000000009 [ 614.730344][ T2320] RBP: 00007f4bccf82090 R08: 0000000000000000 R09: 0000000000000000 [ 614.730358][ T2320] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 614.730371][ T2320] R13: 00007f4bcc3e6038 R14: 00007f4bcc3e5fa0 R15: 00007ffd81566258 [ 614.730391][ T2320] [ 617.344111][ T2490] 9pnet_fd: p9_fd_create_unix (2490): problem connecting socket: ./file0: -2 [ 617.409844][ T2503] FAULT_INJECTION: forcing a failure. [ 617.409844][ T2503] name failslab, interval 1, probability 0, space 0, times 0 [ 617.430721][ T2503] CPU: 1 UID: 0 PID: 2503 Comm: syz.3.16295 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 617.430755][ T2503] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 617.430768][ T2503] Call Trace: [ 617.430776][ T2503] [ 617.430784][ T2503] __dump_stack+0x21/0x30 [ 617.430818][ T2503] dump_stack_lvl+0x10c/0x190 [ 617.430846][ T2503] ? __cfi_dump_stack_lvl+0x10/0x10 [ 617.430876][ T2503] ? __kasan_check_write+0x18/0x20 [ 617.430908][ T2503] dump_stack+0x19/0x20 [ 617.430936][ T2503] should_fail_ex+0x3d9/0x530 [ 617.430959][ T2503] should_failslab+0xac/0x100 [ 617.430983][ T2503] kmem_cache_alloc_noprof+0x42/0x430 [ 617.431004][ T2503] ? getname_flags+0xc6/0x710 [ 617.431026][ T2503] ? __cfi_ksys_write+0x10/0x10 [ 617.431046][ T2503] getname_flags+0xc6/0x710 [ 617.431068][ T2503] __x64_sys_mkdirat+0x7e/0xa0 [ 617.431095][ T2503] x64_sys_call+0x2ba8/0x2ee0 [ 617.431126][ T2503] do_syscall_64+0x58/0xf0 [ 617.431152][ T2503] ? clear_bhb_loop+0x50/0xa0 [ 617.431176][ T2503] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 617.431199][ T2503] RIP: 0033:0x7f29b6d8f6c9 [ 617.431217][ T2503] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 617.431236][ T2503] RSP: 002b:00007f29b7b63038 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 617.431267][ T2503] RAX: ffffffffffffffda RBX: 00007f29b6fe5fa0 RCX: 00007f29b6d8f6c9 [ 617.431285][ T2503] RDX: 00000000000001c0 RSI: 0000200000000040 RDI: ffffffffffffff9c [ 617.431301][ T2503] RBP: 00007f29b7b63090 R08: 0000000000000000 R09: 0000000000000000 [ 617.431315][ T2503] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 617.431329][ T2503] R13: 00007f29b6fe6038 R14: 00007f29b6fe5fa0 R15: 00007fffa7a696e8 [ 617.431348][ T2503] [ 617.747728][ T2548] FAULT_INJECTION: forcing a failure. [ 617.747728][ T2548] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 617.760835][ T2548] CPU: 1 UID: 0 PID: 2548 Comm: syz.3.16317 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 617.760869][ T2548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 617.760884][ T2548] Call Trace: [ 617.760892][ T2548] [ 617.760901][ T2548] __dump_stack+0x21/0x30 [ 617.760935][ T2548] dump_stack_lvl+0x10c/0x190 [ 617.760964][ T2548] ? __cfi_dump_stack_lvl+0x10/0x10 [ 617.760996][ T2548] ? vfs_write+0x93e/0xf30 [ 617.761017][ T2548] dump_stack+0x19/0x20 [ 617.761046][ T2548] should_fail_ex+0x3d9/0x530 [ 617.761069][ T2548] should_fail+0xf/0x20 [ 617.761089][ T2548] should_fail_usercopy+0x1e/0x30 [ 617.761113][ T2548] _copy_from_user+0x22/0xb0 [ 617.761141][ T2548] do_sock_getsockopt+0x1d7/0x6d0 [ 617.761175][ T2548] ? __cfi_do_sock_getsockopt+0x10/0x10 [ 617.761206][ T2548] ? __fget_files+0x2c5/0x340 [ 617.761238][ T2548] __x64_sys_getsockopt+0x1d5/0x280 [ 617.761271][ T2548] x64_sys_call+0x10db/0x2ee0 [ 617.761320][ T2548] do_syscall_64+0x58/0xf0 [ 617.761349][ T2548] ? clear_bhb_loop+0x50/0xa0 [ 617.761374][ T2548] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 617.761398][ T2548] RIP: 0033:0x7f29b6d8f6c9 [ 617.761429][ T2548] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 617.761449][ T2548] RSP: 002b:00007f29b7b63038 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 617.761473][ T2548] RAX: ffffffffffffffda RBX: 00007f29b6fe5fa0 RCX: 00007f29b6d8f6c9 [ 617.761490][ T2548] RDX: 000000000000001d RSI: 0000000000000006 RDI: 0000000000000003 [ 617.761504][ T2548] RBP: 00007f29b7b63090 R08: 00002000000000c0 R09: 0000000000000000 [ 617.761520][ T2548] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 617.761534][ T2548] R13: 00007f29b6fe6038 R14: 00007f29b6fe5fa0 R15: 00007fffa7a696e8 [ 617.761554][ T2548] [ 618.419769][ T2639] FAULT_INJECTION: forcing a failure. [ 618.419769][ T2639] name failslab, interval 1, probability 0, space 0, times 0 [ 618.467008][ T2639] CPU: 0 UID: 0 PID: 2639 Comm: syz.2.16360 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 618.467044][ T2639] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 618.467058][ T2639] Call Trace: [ 618.467065][ T2639] [ 618.467074][ T2639] __dump_stack+0x21/0x30 [ 618.467107][ T2639] dump_stack_lvl+0x10c/0x190 [ 618.467135][ T2639] ? __cfi_dump_stack_lvl+0x10/0x10 [ 618.467164][ T2639] ? __kasan_check_write+0x18/0x20 [ 618.467196][ T2639] dump_stack+0x19/0x20 [ 618.467223][ T2639] should_fail_ex+0x3d9/0x530 [ 618.467249][ T2639] should_failslab+0xac/0x100 [ 618.467272][ T2639] kmem_cache_alloc_noprof+0x42/0x430 [ 618.467292][ T2639] ? getname_flags+0xc6/0x710 [ 618.467313][ T2639] ? __cfi_ksys_write+0x10/0x10 [ 618.467333][ T2639] getname_flags+0xc6/0x710 [ 618.467354][ T2639] __x64_sys_mkdirat+0x7e/0xa0 [ 618.467381][ T2639] x64_sys_call+0x2ba8/0x2ee0 [ 618.467411][ T2639] do_syscall_64+0x58/0xf0 [ 618.467438][ T2639] ? clear_bhb_loop+0x50/0xa0 [ 618.467461][ T2639] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 618.467483][ T2639] RIP: 0033:0x7f4bcc18f6c9 [ 618.467501][ T2639] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 618.467519][ T2639] RSP: 002b:00007f4bccf82038 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 618.467543][ T2639] RAX: ffffffffffffffda RBX: 00007f4bcc3e5fa0 RCX: 00007f4bcc18f6c9 [ 618.467559][ T2639] RDX: 00000000000001c0 RSI: 0000200000000040 RDI: ffffffffffffff9c [ 618.467574][ T2639] RBP: 00007f4bccf82090 R08: 0000000000000000 R09: 0000000000000000 [ 618.467589][ T2639] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 618.467602][ T2639] R13: 00007f4bcc3e6038 R14: 00007f4bcc3e5fa0 R15: 00007ffd81566258 [ 618.467621][ T2639] [ 618.586961][ T6159] usb 4-1: new high-speed USB device number 46 using dummy_hcd [ 618.947973][ T6159] usb 4-1: config 0 interface 0 altsetting 0 bulk endpoint 0x1 has invalid maxpacket 16 [ 618.966988][ T6159] usb 4-1: config 0 interface 0 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 64 [ 618.988118][ T6159] usb 4-1: New USB device found, idVendor=0a46, idProduct=9621, bcdDevice=4f.32 [ 619.016928][ T6159] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 619.025063][ T6159] usb 4-1: Product: syz [ 619.056938][ T6159] usb 4-1: Manufacturer: syz [ 619.061581][ T6159] usb 4-1: SerialNumber: syz [ 619.080757][ T6159] usb 4-1: config 0 descriptor?? [ 619.086173][ T2628] raw-gadget.0 gadget.3: fail, usb_ep_enable returned -22 [ 619.106986][ T2628] raw-gadget.0 gadget.3: fail, usb_ep_enable returned -22 [ 619.317680][ T2628] raw-gadget.0 gadget.3: fail, usb_ep_enable returned -22 [ 619.329915][ T2628] raw-gadget.0 gadget.3: fail, usb_ep_enable returned -22 [ 619.354609][ T6159] Error reading MAC address [ 619.378415][ T6159] usb 4-1: USB disconnect, device number 46 [ 620.188883][ T2731] netlink: 'syz.2.16402': attribute type 4 has an invalid length. [ 620.196754][ T2731] netlink: 'syz.2.16402': attribute type 5 has an invalid length. [ 620.236977][ T2731] netlink: 3657 bytes leftover after parsing attributes in process `syz.2.16402'. [ 621.668736][ T2827] FAULT_INJECTION: forcing a failure. [ 621.668736][ T2827] name failslab, interval 1, probability 0, space 0, times 0 [ 621.746972][ T2827] CPU: 1 UID: 0 PID: 2827 Comm: syz.2.16446 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 621.747007][ T2827] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 621.747021][ T2827] Call Trace: [ 621.747029][ T2827] [ 621.747038][ T2827] __dump_stack+0x21/0x30 [ 621.747071][ T2827] dump_stack_lvl+0x10c/0x190 [ 621.747099][ T2827] ? __cfi_dump_stack_lvl+0x10/0x10 [ 621.747128][ T2827] ? __kasan_check_write+0x18/0x20 [ 621.747160][ T2827] dump_stack+0x19/0x20 [ 621.747187][ T2827] should_fail_ex+0x3d9/0x530 [ 621.747208][ T2827] should_failslab+0xac/0x100 [ 621.747233][ T2827] kmem_cache_alloc_noprof+0x42/0x430 [ 621.747253][ T2827] ? getname_flags+0xc6/0x710 [ 621.747273][ T2827] ? __cfi_ksys_write+0x10/0x10 [ 621.747293][ T2827] getname_flags+0xc6/0x710 [ 621.747314][ T2827] __x64_sys_mkdirat+0x7e/0xa0 [ 621.747339][ T2827] x64_sys_call+0x2ba8/0x2ee0 [ 621.747370][ T2827] do_syscall_64+0x58/0xf0 [ 621.747396][ T2827] ? clear_bhb_loop+0x50/0xa0 [ 621.747420][ T2827] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 621.747443][ T2827] RIP: 0033:0x7f4bcc18f6c9 [ 621.747459][ T2827] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 621.747478][ T2827] RSP: 002b:00007f4bccf82038 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 621.747501][ T2827] RAX: ffffffffffffffda RBX: 00007f4bcc3e5fa0 RCX: 00007f4bcc18f6c9 [ 621.747518][ T2827] RDX: 00000000000001c0 RSI: 0000000000000000 RDI: ffffffffffffff9c [ 621.747533][ T2827] RBP: 00007f4bccf82090 R08: 0000000000000000 R09: 0000000000000000 [ 621.747547][ T2827] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 621.747560][ T2827] R13: 00007f4bcc3e6038 R14: 00007f4bcc3e5fa0 R15: 00007ffd81566258 [ 621.747579][ T2827] [ 623.001488][ T12] bridge_slave_1: left allmulticast mode [ 623.010813][ T12] bridge_slave_1: left promiscuous mode [ 623.016464][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 623.057515][ T12] bridge_slave_0: left allmulticast mode [ 623.063202][ T12] bridge_slave_0: left promiscuous mode [ 623.096997][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 623.251832][ T12] veth1_macvtap: left promiscuous mode [ 623.287009][ T12] veth0_vlan: left promiscuous mode [ 623.480663][ T2849] bridge0: port 1(bridge_slave_0) entered blocking state [ 623.496943][ T2849] bridge0: port 1(bridge_slave_0) entered disabled state [ 623.511196][ T2849] bridge_slave_0: entered allmulticast mode [ 623.521771][ T2849] bridge_slave_0: entered promiscuous mode [ 623.556533][ T2849] bridge0: port 2(bridge_slave_1) entered blocking state [ 623.563781][ T2849] bridge0: port 2(bridge_slave_1) entered disabled state [ 623.570964][ T2849] bridge_slave_1: entered allmulticast mode [ 623.577436][ T2849] bridge_slave_1: entered promiscuous mode [ 623.670305][ T36] audit: type=1400 audit(1763436714.900:259): avc: denied { create } for pid=2872 comm="syz.1.16467" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 623.716418][ T2849] bridge0: port 2(bridge_slave_1) entered blocking state [ 623.723532][ T2849] bridge0: port 2(bridge_slave_1) entered forwarding state [ 623.730894][ T2849] bridge0: port 1(bridge_slave_0) entered blocking state [ 623.737961][ T2849] bridge0: port 1(bridge_slave_0) entered forwarding state [ 623.829644][ T2849] veth0_vlan: entered promiscuous mode [ 623.850604][ T2849] veth1_macvtap: entered promiscuous mode [ 623.878407][ T2889] ======================================================= [ 623.878407][ T2889] WARNING: The mand mount option has been deprecated and [ 623.878407][ T2889] and is ignored by this kernel. Remove the mand [ 623.878407][ T2889] option from the mount to silence this warning. [ 623.878407][ T2889] ======================================================= [ 623.881081][ T36] audit: type=1400 audit(1763436715.110:260): avc: denied { remount } for pid=2888 comm="syz.1.16473" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 623.965489][ T2889] binder: Unknown parameter 'c' [ 624.336201][ T2937] FAULT_INJECTION: forcing a failure. [ 624.336201][ T2937] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 624.367639][ T2937] CPU: 1 UID: 0 PID: 2937 Comm: syz.3.16495 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 624.367678][ T2937] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 624.367694][ T2937] Call Trace: [ 624.367702][ T2937] [ 624.367713][ T2937] __dump_stack+0x21/0x30 [ 624.367748][ T2937] dump_stack_lvl+0x10c/0x190 [ 624.367777][ T2937] ? __cfi_dump_stack_lvl+0x10/0x10 [ 624.367811][ T2937] dump_stack+0x19/0x20 [ 624.367840][ T2937] should_fail_ex+0x3d9/0x530 [ 624.367864][ T2937] should_fail+0xf/0x20 [ 624.367885][ T2937] should_fail_usercopy+0x1e/0x30 [ 624.367910][ T2937] _copy_from_user+0x22/0xb0 [ 624.367939][ T2937] __se_sys_mount+0x182/0x480 [ 624.367962][ T2937] ? ksys_write+0x1ef/0x250 [ 624.367984][ T2937] ? __x64_sys_mount+0xf0/0xf0 [ 624.368007][ T2937] __x64_sys_mount+0xc3/0xf0 [ 624.368027][ T2937] x64_sys_call+0x2021/0x2ee0 [ 624.368059][ T2937] do_syscall_64+0x58/0xf0 [ 624.368089][ T2937] ? clear_bhb_loop+0x50/0xa0 [ 624.368114][ T2937] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 624.368137][ T2937] RIP: 0033:0x7f29b6d8f6c9 [ 624.368156][ T2937] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 624.368177][ T2937] RSP: 002b:00007f29b7b63038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 624.368202][ T2937] RAX: ffffffffffffffda RBX: 00007f29b6fe5fa0 RCX: 00007f29b6d8f6c9 [ 624.368220][ T2937] RDX: 0000000000000000 RSI: 0000200000000080 RDI: 0000000000000000 [ 624.368236][ T2937] RBP: 00007f29b7b63090 R08: 0000200000000200 R09: 0000000000000000 [ 624.368252][ T2937] R10: 0000000002010860 R11: 0000000000000246 R12: 0000000000000001 [ 624.368267][ T2937] R13: 00007f29b6fe6038 R14: 00007f29b6fe5fa0 R15: 00007fffa7a696e8 [ 624.368287][ T2937] [ 624.373211][ T2937] binder: Unknown parameter 'c' [ 625.266641][ T46] bridge_slave_1: left allmulticast mode [ 625.276992][ T46] bridge_slave_1: left promiscuous mode [ 625.282661][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 625.327453][ T46] bridge_slave_0: left allmulticast mode [ 625.333148][ T46] bridge_slave_0: left promiscuous mode [ 625.347183][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 625.539361][ T46] veth1_macvtap: left promiscuous mode [ 625.544935][ T46] veth0_vlan: left promiscuous mode [ 625.672006][ T2992] bridge0: port 1(bridge_slave_0) entered blocking state [ 625.693092][ T2992] bridge0: port 1(bridge_slave_0) entered disabled state [ 625.715877][ T2992] bridge_slave_0: entered allmulticast mode [ 625.732606][ T2992] bridge_slave_0: entered promiscuous mode [ 625.747210][ T3003] FAULT_INJECTION: forcing a failure. [ 625.747210][ T3003] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 625.761311][ T2992] bridge0: port 2(bridge_slave_1) entered blocking state [ 625.778860][ T2992] bridge0: port 2(bridge_slave_1) entered disabled state [ 625.785959][ T2992] bridge_slave_1: entered allmulticast mode [ 625.807063][ T3003] CPU: 0 UID: 0 PID: 3003 Comm: syz.0.16525 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 625.807101][ T3003] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 625.807116][ T3003] Call Trace: [ 625.807125][ T3003] [ 625.807135][ T3003] __dump_stack+0x21/0x30 [ 625.807172][ T3003] dump_stack_lvl+0x10c/0x190 [ 625.807208][ T3003] ? __cfi_dump_stack_lvl+0x10/0x10 [ 625.807248][ T3003] dump_stack+0x19/0x20 [ 625.807278][ T3003] should_fail_ex+0x3d9/0x530 [ 625.807302][ T3003] should_fail+0xf/0x20 [ 625.807324][ T3003] should_fail_usercopy+0x1e/0x30 [ 625.807349][ T3003] strncpy_from_user+0x28/0x270 [ 625.807372][ T3003] getname_flags+0x102/0x710 [ 625.807395][ T3003] ? build_open_flags+0x487/0x600 [ 625.807426][ T3003] getname+0x1b/0x30 [ 625.807447][ T3003] do_sys_openat2+0xcb/0x1c0 [ 625.807478][ T3003] ? fput+0x1a5/0x240 [ 625.807504][ T3003] ? do_sys_open+0x100/0x100 [ 625.807533][ T3003] ? ksys_write+0x1ef/0x250 [ 625.807554][ T3003] ? __cfi_ksys_write+0x10/0x10 [ 625.807576][ T3003] __x64_sys_openat+0x13a/0x170 [ 625.807607][ T3003] x64_sys_call+0xe69/0x2ee0 [ 625.807640][ T3003] do_syscall_64+0x58/0xf0 [ 625.807668][ T3003] ? clear_bhb_loop+0x50/0xa0 [ 625.807693][ T3003] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 625.807718][ T3003] RIP: 0033:0x7f7c2978f6c9 [ 625.807737][ T3003] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 625.807757][ T3003] RSP: 002b:00007f7c2a651038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 625.807783][ T3003] RAX: ffffffffffffffda RBX: 00007f7c299e5fa0 RCX: 00007f7c2978f6c9 [ 625.807802][ T3003] RDX: 000000000000275a RSI: 0000200000000080 RDI: ffffffffffffff9c [ 625.807819][ T3003] RBP: 00007f7c2a651090 R08: 0000000000000000 R09: 0000000000000000 [ 625.807835][ T3003] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 625.807850][ T3003] R13: 00007f7c299e6038 R14: 00007f7c299e5fa0 R15: 00007fff074614d8 [ 625.807871][ T3003] [ 626.018241][ T2992] bridge_slave_1: entered promiscuous mode [ 626.140921][ T36] audit: type=1400 audit(1763436717.340:261): avc: denied { create } for pid=3012 comm="syz.0.16530" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 626.206954][ T36] audit: type=1400 audit(1763436717.340:262): avc: denied { write } for pid=3012 comm="syz.0.16530" name="file0" dev="tmpfs" ino=2675 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 626.268879][ T36] audit: type=1400 audit(1763436717.340:263): avc: denied { open } for pid=3012 comm="syz.0.16530" path="/437/file0" dev="tmpfs" ino=2675 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 626.295830][ T2992] bridge0: port 2(bridge_slave_1) entered blocking state [ 626.302929][ T2992] bridge0: port 2(bridge_slave_1) entered forwarding state [ 626.310277][ T2992] bridge0: port 1(bridge_slave_0) entered blocking state [ 626.317342][ T2992] bridge0: port 1(bridge_slave_0) entered forwarding state [ 626.318383][ T36] audit: type=1400 audit(1763436717.340:264): avc: denied { ioctl } for pid=3012 comm="syz.0.16530" path="/437/file0" dev="tmpfs" ino=2675 ioctlcmd=0x1273 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 626.355903][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 626.363463][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 626.382132][ T36] audit: type=1400 audit(1763436717.610:265): avc: denied { unlink } for pid=31541 comm="syz-executor" name="file0" dev="tmpfs" ino=2675 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 626.458412][ T329] bridge0: port 1(bridge_slave_0) entered blocking state [ 626.465488][ T329] bridge0: port 1(bridge_slave_0) entered forwarding state [ 626.487454][ T1048] bridge0: port 2(bridge_slave_1) entered blocking state [ 626.494524][ T1048] bridge0: port 2(bridge_slave_1) entered forwarding state [ 626.547305][ T2992] veth0_vlan: entered promiscuous mode [ 626.573871][ T2992] veth1_macvtap: entered promiscuous mode [ 627.318531][ T3075] FAULT_INJECTION: forcing a failure. [ 627.318531][ T3075] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 627.343254][ T3075] CPU: 1 UID: 0 PID: 3075 Comm: syz.1.16557 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 627.343294][ T3075] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 627.343309][ T3075] Call Trace: [ 627.343317][ T3075] [ 627.343326][ T3075] __dump_stack+0x21/0x30 [ 627.343371][ T3075] dump_stack_lvl+0x10c/0x190 [ 627.343401][ T3075] ? __cfi_dump_stack_lvl+0x10/0x10 [ 627.343432][ T3075] ? check_stack_object+0x12c/0x140 [ 627.343455][ T3075] dump_stack+0x19/0x20 [ 627.343484][ T3075] should_fail_ex+0x3d9/0x530 [ 627.343508][ T3075] should_fail+0xf/0x20 [ 627.343529][ T3075] should_fail_usercopy+0x1e/0x30 [ 627.343554][ T3075] _copy_to_user+0x24/0xa0 [ 627.343582][ T3075] simple_read_from_buffer+0xed/0x160 [ 627.343612][ T3075] proc_fail_nth_read+0x19e/0x210 [ 627.343643][ T3075] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 627.343673][ T3075] ? bpf_lsm_file_permission+0xd/0x20 [ 627.343706][ T3075] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 627.343736][ T3075] vfs_read+0x27d/0xc70 [ 627.343757][ T3075] ? __cfi_vfs_read+0x10/0x10 [ 627.343777][ T3075] ? __kasan_check_write+0x18/0x20 [ 627.343811][ T3075] ? mutex_lock+0x92/0x1c0 [ 627.343833][ T3075] ? __cfi_mutex_lock+0x10/0x10 [ 627.343854][ T3075] ? __fget_files+0x2c5/0x340 [ 627.343881][ T3075] ksys_read+0x141/0x250 [ 627.343902][ T3075] ? __cfi_ksys_read+0x10/0x10 [ 627.343923][ T3075] ? __kasan_check_read+0x15/0x20 [ 627.343957][ T3075] __x64_sys_read+0x7f/0x90 [ 627.343978][ T3075] x64_sys_call+0x2638/0x2ee0 [ 627.344012][ T3075] do_syscall_64+0x58/0xf0 [ 627.344041][ T3075] ? clear_bhb_loop+0x50/0xa0 [ 627.344067][ T3075] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 627.344094][ T3075] RIP: 0033:0x7fee1758e0dc [ 627.344112][ T3075] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 627.344134][ T3075] RSP: 002b:00007fee18499030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 627.344159][ T3075] RAX: ffffffffffffffda RBX: 00007fee177e5fa0 RCX: 00007fee1758e0dc [ 627.344177][ T3075] RDX: 000000000000000f RSI: 00007fee184990a0 RDI: 000000000000000a [ 627.344193][ T3075] RBP: 00007fee18499090 R08: 0000000000000000 R09: 0000000000000000 [ 627.344208][ T3075] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 627.344223][ T3075] R13: 00007fee177e6038 R14: 00007fee177e5fa0 R15: 00007ffcf96e09c8 [ 627.344243][ T3075] [ 627.960432][ T3118] FAULT_INJECTION: forcing a failure. [ 627.960432][ T3118] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 627.983900][ T3118] CPU: 1 UID: 0 PID: 3118 Comm: syz.1.16577 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 627.983934][ T3118] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 627.983949][ T3118] Call Trace: [ 627.983957][ T3118] [ 627.983965][ T3118] __dump_stack+0x21/0x30 [ 627.984060][ T3118] dump_stack_lvl+0x10c/0x190 [ 627.984088][ T3118] ? __cfi_dump_stack_lvl+0x10/0x10 [ 627.984116][ T3118] ? check_stack_object+0x12c/0x140 [ 627.984137][ T3118] dump_stack+0x19/0x20 [ 627.984162][ T3118] should_fail_ex+0x3d9/0x530 [ 627.984183][ T3118] should_fail+0xf/0x20 [ 627.984201][ T3118] should_fail_usercopy+0x1e/0x30 [ 627.984225][ T3118] _copy_to_user+0x24/0xa0 [ 627.984251][ T3118] simple_read_from_buffer+0xed/0x160 [ 627.984278][ T3118] proc_fail_nth_read+0x19e/0x210 [ 627.984306][ T3118] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 627.984333][ T3118] ? bpf_lsm_file_permission+0xd/0x20 [ 627.984362][ T3118] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 627.984397][ T3118] vfs_read+0x27d/0xc70 [ 627.984435][ T3118] ? __cfi_vfs_read+0x10/0x10 [ 627.984454][ T3118] ? __kasan_check_write+0x18/0x20 [ 627.984487][ T3118] ? mutex_lock+0x92/0x1c0 [ 627.984507][ T3118] ? __cfi_mutex_lock+0x10/0x10 [ 627.984527][ T3118] ? __fget_files+0x2c5/0x340 [ 627.984553][ T3118] ksys_read+0x141/0x250 [ 627.984573][ T3118] ? __cfi_ksys_read+0x10/0x10 [ 627.984594][ T3118] ? __kasan_check_read+0x15/0x20 [ 627.984627][ T3118] __x64_sys_read+0x7f/0x90 [ 627.984648][ T3118] x64_sys_call+0x2638/0x2ee0 [ 627.984681][ T3118] do_syscall_64+0x58/0xf0 [ 627.984708][ T3118] ? clear_bhb_loop+0x50/0xa0 [ 627.984733][ T3118] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 627.984756][ T3118] RIP: 0033:0x7fee1758e0dc [ 627.984775][ T3118] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 627.984795][ T3118] RSP: 002b:00007fee18499030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 627.984820][ T3118] RAX: ffffffffffffffda RBX: 00007fee177e5fa0 RCX: 00007fee1758e0dc [ 627.984837][ T3118] RDX: 000000000000000f RSI: 00007fee184990a0 RDI: 000000000000000a [ 627.984851][ T3118] RBP: 00007fee18499090 R08: 0000000000000000 R09: 0000000000000000 [ 627.984866][ T3118] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 627.984880][ T3118] R13: 00007fee177e6038 R14: 00007fee177e5fa0 R15: 00007ffcf96e09c8 [ 627.984899][ T3118] [ 629.231442][ T36] audit: type=1400 audit(1763436720.460:266): avc: denied { write } for pid=3182 comm="syz.0.16611" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 629.277019][ T36] audit: type=1400 audit(1763436720.460:267): avc: denied { listen } for pid=3182 comm="syz.0.16611" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 [ 629.446922][ T36] audit: type=1400 audit(1763436720.670:268): avc: denied { lock } for pid=3193 comm="syz.0.16615" path="socket:[187034]" dev="sockfs" ino=187034 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 630.592198][ T3245] FAULT_INJECTION: forcing a failure. [ 630.592198][ T3245] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 630.646954][ T3245] CPU: 1 UID: 0 PID: 3245 Comm: syz.2.16638 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 630.646995][ T3245] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 630.647011][ T3245] Call Trace: [ 630.647020][ T3245] [ 630.647029][ T3245] __dump_stack+0x21/0x30 [ 630.647074][ T3245] dump_stack_lvl+0x10c/0x190 [ 630.647104][ T3245] ? __cfi_dump_stack_lvl+0x10/0x10 [ 630.647136][ T3245] ? vfs_write+0x93e/0xf30 [ 630.647157][ T3245] dump_stack+0x19/0x20 [ 630.647185][ T3245] should_fail_ex+0x3d9/0x530 [ 630.647220][ T3245] should_fail+0xf/0x20 [ 630.647239][ T3245] should_fail_usercopy+0x1e/0x30 [ 630.647262][ T3245] _copy_from_user+0x22/0xb0 [ 630.647288][ T3245] do_sock_getsockopt+0x1d7/0x6d0 [ 630.647319][ T3245] ? __cfi_do_sock_getsockopt+0x10/0x10 [ 630.647349][ T3245] ? __fget_files+0x2c5/0x340 [ 630.647374][ T3245] __x64_sys_getsockopt+0x1d5/0x280 [ 630.647406][ T3245] x64_sys_call+0x10db/0x2ee0 [ 630.647437][ T3245] do_syscall_64+0x58/0xf0 [ 630.647464][ T3245] ? clear_bhb_loop+0x50/0xa0 [ 630.647488][ T3245] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 630.647529][ T3245] RIP: 0033:0x7efe7618f6c9 [ 630.647547][ T3245] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 630.647568][ T3245] RSP: 002b:00007efe74be3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 630.647593][ T3245] RAX: ffffffffffffffda RBX: 00007efe763e5fa0 RCX: 00007efe7618f6c9 [ 630.647611][ T3245] RDX: 000000000000001d RSI: 0000000000000006 RDI: 0000000000000003 [ 630.647626][ T3245] RBP: 00007efe74be3090 R08: 00002000000000c0 R09: 0000000000000000 [ 630.647642][ T3245] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 630.647657][ T3245] R13: 00007efe763e6038 R14: 00007efe763e5fa0 R15: 00007ffe262210b8 [ 630.647688][ T3245] [ 631.952534][ T3249] FAULT_INJECTION: forcing a failure. [ 631.952534][ T3249] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 631.987144][ T3249] CPU: 0 UID: 0 PID: 3249 Comm: syz.0.16641 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 631.987177][ T3249] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 631.987190][ T3249] Call Trace: [ 631.987198][ T3249] [ 631.987206][ T3249] __dump_stack+0x21/0x30 [ 631.987237][ T3249] dump_stack_lvl+0x10c/0x190 [ 631.987263][ T3249] ? __cfi_dump_stack_lvl+0x10/0x10 [ 631.987290][ T3249] ? vfs_write+0x93e/0xf30 [ 631.987309][ T3249] dump_stack+0x19/0x20 [ 631.987334][ T3249] should_fail_ex+0x3d9/0x530 [ 631.987355][ T3249] should_fail+0xf/0x20 [ 631.987373][ T3249] should_fail_usercopy+0x1e/0x30 [ 631.987394][ T3249] _copy_from_user+0x22/0xb0 [ 631.987419][ T3249] do_sock_getsockopt+0x1d7/0x6d0 [ 631.987447][ T3249] ? __cfi_do_sock_getsockopt+0x10/0x10 [ 631.987475][ T3249] ? __fget_files+0x2c5/0x340 [ 631.987497][ T3249] __x64_sys_getsockopt+0x1d5/0x280 [ 631.987527][ T3249] x64_sys_call+0x10db/0x2ee0 [ 631.987572][ T3249] do_syscall_64+0x58/0xf0 [ 631.987599][ T3249] ? clear_bhb_loop+0x50/0xa0 [ 631.987622][ T3249] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 631.987644][ T3249] RIP: 0033:0x7f7c2978f6c9 [ 631.987662][ T3249] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 631.987681][ T3249] RSP: 002b:00007f7c2a651038 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 631.987702][ T3249] RAX: ffffffffffffffda RBX: 00007f7c299e5fa0 RCX: 00007f7c2978f6c9 [ 631.987719][ T3249] RDX: 000000000000001d RSI: 0000000000000006 RDI: 0000000000000003 [ 631.987732][ T3249] RBP: 00007f7c2a651090 R08: 00002000000000c0 R09: 0000000000000000 [ 631.987747][ T3249] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 631.987760][ T3249] R13: 00007f7c299e6038 R14: 00007f7c299e5fa0 R15: 00007fff074614d8 [ 631.987778][ T3249] [ 633.607481][ T36] audit: type=1326 audit(1763436724.840:269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3354 comm="syz.1.16692" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7fee1758f6c9 code=0x0 [ 634.921348][ T3425] FAULT_INJECTION: forcing a failure. [ 634.921348][ T3425] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 634.971349][ T3425] CPU: 1 UID: 0 PID: 3425 Comm: syz.1.16721 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 634.971395][ T3425] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 634.971409][ T3425] Call Trace: [ 634.971416][ T3425] [ 634.971424][ T3425] __dump_stack+0x21/0x30 [ 634.971458][ T3425] dump_stack_lvl+0x10c/0x190 [ 634.971485][ T3425] ? __cfi_dump_stack_lvl+0x10/0x10 [ 634.971515][ T3425] ? vfs_write+0x93e/0xf30 [ 634.971535][ T3425] dump_stack+0x19/0x20 [ 634.971561][ T3425] should_fail_ex+0x3d9/0x530 [ 634.971583][ T3425] should_fail+0xf/0x20 [ 634.971602][ T3425] should_fail_usercopy+0x1e/0x30 [ 634.971624][ T3425] _copy_from_user+0x22/0xb0 [ 634.971650][ T3425] do_sock_getsockopt+0x1d7/0x6d0 [ 634.971681][ T3425] ? __cfi_do_sock_getsockopt+0x10/0x10 [ 634.971711][ T3425] ? __fget_files+0x2c5/0x340 [ 634.971734][ T3425] __x64_sys_getsockopt+0x1d5/0x280 [ 634.971765][ T3425] x64_sys_call+0x10db/0x2ee0 [ 634.971794][ T3425] do_syscall_64+0x58/0xf0 [ 634.971820][ T3425] ? clear_bhb_loop+0x50/0xa0 [ 634.971843][ T3425] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 634.971865][ T3425] RIP: 0033:0x7fee1758f6c9 [ 634.971882][ T3425] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 634.971900][ T3425] RSP: 002b:00007fee18499038 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 634.971923][ T3425] RAX: ffffffffffffffda RBX: 00007fee177e5fa0 RCX: 00007fee1758f6c9 [ 634.971938][ T3425] RDX: 000000000000001d RSI: 0000000000000006 RDI: 0000000000000003 [ 634.971952][ T3425] RBP: 00007fee18499090 R08: 00002000000000c0 R09: 0000000000000000 [ 634.971966][ T3425] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 634.971979][ T3425] R13: 00007fee177e6038 R14: 00007fee177e5fa0 R15: 00007ffcf96e09c8 [ 634.971998][ T3425] [ 637.207249][ T3503] FAULT_INJECTION: forcing a failure. [ 637.207249][ T3503] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 637.240552][ T3503] CPU: 0 UID: 0 PID: 3503 Comm: syz.1.16752 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 637.240587][ T3503] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 637.240601][ T3503] Call Trace: [ 637.240609][ T3503] [ 637.240617][ T3503] __dump_stack+0x21/0x30 [ 637.240649][ T3503] dump_stack_lvl+0x10c/0x190 [ 637.240676][ T3503] ? __cfi_dump_stack_lvl+0x10/0x10 [ 637.240703][ T3503] ? check_stack_object+0x12c/0x140 [ 637.240722][ T3503] dump_stack+0x19/0x20 [ 637.240746][ T3503] should_fail_ex+0x3d9/0x530 [ 637.240766][ T3503] should_fail+0xf/0x20 [ 637.240783][ T3503] should_fail_usercopy+0x1e/0x30 [ 637.240804][ T3503] _copy_to_user+0x24/0xa0 [ 637.240829][ T3503] simple_read_from_buffer+0xed/0x160 [ 637.240854][ T3503] proc_fail_nth_read+0x19e/0x210 [ 637.240881][ T3503] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 637.240908][ T3503] ? bpf_lsm_file_permission+0xd/0x20 [ 637.240936][ T3503] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 637.240962][ T3503] vfs_read+0x27d/0xc70 [ 637.240982][ T3503] ? __cfi_vfs_read+0x10/0x10 [ 637.240999][ T3503] ? __kasan_check_write+0x18/0x20 [ 637.241030][ T3503] ? mutex_lock+0x92/0x1c0 [ 637.241049][ T3503] ? __cfi_mutex_lock+0x10/0x10 [ 637.241066][ T3503] ? __fget_files+0x2c5/0x340 [ 637.241088][ T3503] ksys_read+0x141/0x250 [ 637.241106][ T3503] ? __cfi_ksys_read+0x10/0x10 [ 637.241125][ T3503] ? __kasan_check_read+0x15/0x20 [ 637.241155][ T3503] __x64_sys_read+0x7f/0x90 [ 637.241205][ T3503] x64_sys_call+0x2638/0x2ee0 [ 637.241250][ T3503] do_syscall_64+0x58/0xf0 [ 637.241276][ T3503] ? clear_bhb_loop+0x50/0xa0 [ 637.241299][ T3503] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 637.241321][ T3503] RIP: 0033:0x7fee1758e0dc [ 637.241339][ T3503] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 637.241357][ T3503] RSP: 002b:00007fee18499030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 637.241380][ T3503] RAX: ffffffffffffffda RBX: 00007fee177e5fa0 RCX: 00007fee1758e0dc [ 637.241396][ T3503] RDX: 000000000000000f RSI: 00007fee184990a0 RDI: 0000000000000009 [ 637.241409][ T3503] RBP: 00007fee18499090 R08: 0000000000000000 R09: 0000000000000000 [ 637.241423][ T3503] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 637.241436][ T3503] R13: 00007fee177e6038 R14: 00007fee177e5fa0 R15: 00007ffcf96e09c8 [ 637.241454][ T3503] [ 637.848118][ T3531] fuse: Bad value for 'fd'