last executing test programs: 39.50545965s ago: executing program 1 (id=1284): syz_io_uring_setup(0x207998, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = dup(r1) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000840)={0x1fe, 0x2, 0x2000, 0x1000, &(0x7f0000003000/0x1000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x1) syz_kvm_setup_cpu$x86(r2, r0, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, 0x0}], 0x1, 0x42, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000180)="666746a100d0a40348b87b0e0000000000000f23c00f21f835020001000f23f836440f0866b815010f00d8660f3882b70c00000066b810010f00d8360f01cab9800000c00f3235002000000f30c744240000000100c7442402ae050000c7442406000000000f01142466ba2100ed", 0x6e}], 0x1, 0x1, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000100)={0x80000000, 0x7fffffffffffffff}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r4 = getpid() sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x6) sync() sync() mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) rmdir(&(0x7f0000000080)='./cgroup/../file0\x00') syz_clone3(&(0x7f0000000240)={0x200a00000, 0x0, 0x0, 0x0, {0x1a}, 0x0, 0x0, 0x0, 0x0, 0x0, {r5}}, 0x58) sync() sync() sync() sync() sync() 39.424431455s ago: executing program 1 (id=1285): r0 = syz_socket_connect_nvme_tcp() (fail_nth: 6) close(r0) 39.357698871s ago: executing program 1 (id=1286): r0 = syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f0000000480)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}, {{0x9, 0x5, 0x81, 0x3, 0x200}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x200}}, {{0x9, 0x5, 0x3, 0x2, 0x200}}}}}}}]}}, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, &(0x7f0000000340)={0x44, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x20, 0x80, 0x1c, {0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10}}, 0x0, 0x0, 0x0, 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002040)='oom_score_adj\x00') exit(0x2) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000010c0)={0x30, 0x5, 0x0, {0x0, 0x2, 0x5, 0x6}}, 0x30) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x4004000) recvmsg$unix(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) syz_usb_connect(0x3, 0x62, &(0x7f0000000080)=ANY=[], 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, &(0x7f0000000080)={0x14, 0x0, &(0x7f0000000040)={0x0, 0x3, 0x1a, {0x1a}}}, 0x0) syz_usb_ep_write(r0, 0x82, 0x5, &(0x7f0000002340)='hello') 36.389780537s ago: executing program 1 (id=1309): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x38, 0x2, 0x1, 0x101, 0x0, 0x0, {0x2, 0x0, 0x7}, [@CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast2}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x4, 0x1, 0x21}}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x84}, 0x4008040) socket$inet6_tcp(0xa, 0x1, 0x0) capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x20000081, 0xffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000600)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000940)=ANY=[@ANYBLOB="020000000000000002000000e0000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000002000000e00000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000064010102000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000e000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002"], 0x310) close_range(r1, 0xffffffffffffffff, 0x0) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000500}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, 0x1, 0x4, 0x401, 0x0, 0x0, {0x1, 0x0, 0x8}, [@NFULA_CFG_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x9}, @NFULA_CFG_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x5a98}, @NFULA_CFG_CMD={0x5, 0x1, 0x1}, @NFULA_CFG_MODE={0xa, 0x2, {0xff, 0x2}}]}, 0x38}, 0x1, 0x0, 0x0, 0x20014800}, 0x5) io_setup(0x8, &(0x7f0000000600)=0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = memfd_create(&(0x7f0000000240)='+\x8b\x8a\xa9\x16\x11\x91J\xbc+ \x18\x17\xc2:}\xa3\x9bO\xdd\xdf\xdf\x92\xd5\xed\xb4\x17\xe5\xd6\x9a\xb2\xd8\x9ba\xde\xb2.F\xc0\x99}|\xaf\xd3\x1d\x84[*_\x9f\x9d\xb0rYP\x1b\x9f \xe0\x9cgq\x103\x89\x11\x87Rv\x169\xdf\xe3>B\x04\x00\x00\x00W\xd3\xec\xfb\xdf?\xa2\x90+\xa4!\xb2\xf2\xff\x90\a\xc3\x12\xc4;\xffh\xf1x=\xb9c\xce\x03h\xdap\x88U\x1788\x82\xd7\xfd\x83\x00Sx\x91%\x99_\xfe\xd4c\x83\x86\x0f\xa4a-\xaf\x9e\xd9\xef\xe0)]\x00F\xfa\x03\xbc4\xc4\x9a\v\x03\x8b\xa4\xf3\x8f\xf4\"\'\xd3\a9\x14H}j&~\xe9\x16\x83o\xbd\xab\xcd[\xbd\xcb\x04\xfc\xe7\xe3\x9e?\x12\xf0\xf4\x83M3\xd88\x92?@\v\xe6\xd1\xd2\xe4\xde\xdaUeJ\x9fR\xd1`\xfa\xc8\v\xed\xfd\x0e\xc8\x89W\x847\x88\x82\x94\x14\xe33\xb7H\xc8b\xd6@3F#\xb7\x04C\x8dm\t\x16a\x0fI\xf4\xfe\xf8\x06j\x19Pz&\xb8\x0f\x98`W\xdb\xc6\"81A\xa4\x8bT\xf1\xcb\xab\xa3\t\xef\xdf&\x0e\xad\x03\x123.\xc2V\xaa\xd5\xf8\xde\x8aV\xa4p{\xcez\xa2\x92\xdb8*wLO\f\x97X\x05\x9a\xc2\xe8\x85\x9d\xcb\xc8\xf0\xc4\x01\x03\xe3?\x9f1\xf4\xfb\xa5y`KB\xdf\xae#\x94C\a\x04\xea\xccG\xf2\b\x8f\xf7\xb1\xe96\x90\xf5P\xa4\'\xce\xe3\xa24\x196\xc5Q\xa1K\x95\xd6\xfal\xe9\xd1\\\r&\xb2c\xb3\x8d\xa7\xb7\xa8\x03S\xbd\xdd\b{\xae\f\x10\xc2\xbb\xd0\xdd*\xa3\xb4\fJ\x00X\xab`N; LF\xa5D\xee\xdf\x7f\x80p\xf6o\x1c\xbdXR\xf2\xa0\x81a\xa1\xe1B\x93Xn\xaf\xfc\x05?\xab\xac\x91x\xa8#\xe1\xbeQ\xd1^\x9b\xb9)\xd3\n\xf7(3!\x18\b\xc0\xaampRl\xfdQ\x03\x8c\xd5\xe4\\\xed\x9a\xd1?\xd21\xc8\x90\x1dl|\xd1\x14\xbc3\xe0\x1e\x0e\xe6\x88Y\x99K\x93\x1c@_P\x8c\xc7\x9eZ\xb74KT:\x8a\xdbJ#w\x18\x14\x00\x93\x86\xa5wo\xf6M\xe7D\xf4*\xe3X\x1d\x19\x83\xa7w\xc7+7\x89s\xed\x8a\xd7O\xdd\rhh`\xc0\xa8$\x06pu\xa0\xd0L\x0ez@I\xb8\x83\xb2f\x93j\a0I\xc8l\xe5\x9b\x06\xb5\xac`d\xa3\xcf/\x14\x10\xab\xab\t\xec\xc1c\fA\xaf\x14\xef\xbap@*7\x86\xdf\',\x03Y\xb1$\xf0\xb5}\xf0\x82%)9`\x8f\x04\x85m\x80\xd2\xcf@\x06}\xea\xe7w`\xa5\x11\x9f\x9b\x9e\x8f\xb7cb\x1a\xe1\xcf\x87\x1c\\\xf5\xc21\xf7\x82C*\xd5;\x00\x00\x00\x00\x03\xba\xe3\xdc\x92\'\x8e\xd5\x7fG\xfd.\x91\x89T\x99t\xd4d,\xd5\x92O\xf1\xafT!Y\x8e\\\xac\xf7\x11R\x05p\x1a\"\r\xe9\xe5\x8b&\x0f\x8c\xfb\xef\xf8\xd5\x18\xde\xeb\xe5\x19\xdd\xebQ8\xc5iS+\x06D\x16\xfe\xf5.\xe5\v\x89\xb0\"\xa3M\xe9\x81\x11P\xdb\xc4\xc2y\x14\x04\x06\xf6\f\xb0\xecz\x8d`\xb5\x9b\xb43\xcc1\xa7\x9e\xa8\xb5\'\xc6MAe\x0f\xd1\xfcG\xc2/\xe8\xe9t\xcaQ\xf1\fI\x1chM\xc1\x92\xe3\xc3\x01M\xc8/\xefJ\xcb\xd0]\f\xff\xf5\x92\xce\x97Z\xea\xe8\x99\xfa\x96\xce\xa7\x02\xad\xa2\xce\x955\xeaNg\x02\xcd\xfd\x1a}.\xd3\"x\x89/8H\xc2\x93B\na)\x86\xa9U\xa0\xb7\x18\xfb\xe9\xd1\x97', 0x3) r6 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000340), 0x802, 0x0) ioctl$UI_DEV_SETUP(r6, 0x405c5503, 0x0) r7 = socket(0x10, 0x3, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r7, 0x10e, 0xc, &(0x7f0000000040)={0x9, 0xffffffff, 0x4e, 0x567}, 0x13) sendmsg$nl_generic(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)=ANY=[@ANYBLOB="1c0000001608010000000000fcdbdf250a00000008002500", @ANYRES32, @ANYBLOB="69ba269e3f90230d37061f3a3dc0"], 0x1c}}, 0x2000c040) write$binfmt_misc(r5, &(0x7f0000000180)="cf", 0x1) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r8, 0x6, 0x19, 0x0, &(0x7f0000001dc0)) sendfile(r4, r5, &(0x7f0000000000), 0xfffb) fcntl$addseals(r5, 0x409, 0x8) r9 = eventfd2(0xc, 0x800) io_submit(r3, 0x1, &(0x7f0000000300)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x6, r5, 0x0, 0x0, 0x6, 0x0, 0x1, r9}]) writev(r5, &(0x7f0000000200)=[{&(0x7f0000000640)="05c4", 0x2}], 0x1) r10 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_linger(r10, 0x1, 0x3d, &(0x7f0000000080), 0x8) getsockopt$sock_timeval(r10, 0x1, 0x14, &(0x7f0000000040), &(0x7f00000000c0)=0x10) 36.341099717s ago: executing program 1 (id=1320): r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={0x0}}, 0x0) r1 = openat$kvm(0xffffff9c, &(0x7f00000000c0), 0x800, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CAP_X86_NOTIFY_VMEXIT(r2, 0x4068aea3, &(0x7f0000000300)={0xdb, 0x0, 0xf9}) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) socket$netlink(0x10, 0x3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) read(r5, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x600140, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x103081, 0x0) syz_usb_connect$uac1(0x3, 0xdc, &(0x7f00000017c0)=ANY=[], 0x0) r8 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r4, r8, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000240)="0f798f0060baf80c66b8f208f58d66efbafc0cb8a600ef0fc72d0f20c06635040000000f22c0baf80c66b80550b08e66efbafc0cb000ee0f7911baf80c66b8ce04c48d66efbafc0ced660fc43206260f1f400066b9500900000f32", 0x5b}], 0x1, 0x10, 0x0, 0x0) 35.815096074s ago: executing program 1 (id=1323): write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x73) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_freezer_state(r0, &(0x7f0000000140), 0x2, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000040)='FROZEN\x00', 0x7) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) fchdir(r0) r2 = openat$cgroup_procs(r0, &(0x7f00000002c0)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000280), 0x12) 20.724047801s ago: executing program 32 (id=1323): write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x73) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_freezer_state(r0, &(0x7f0000000140), 0x2, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000040)='FROZEN\x00', 0x7) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) fchdir(r0) r2 = openat$cgroup_procs(r0, &(0x7f00000002c0)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000280), 0x12) 9.061420595s ago: executing program 0 (id=1431): syz_usb_connect(0x5, 0x132, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0xb9, 0x71, 0x5a, 0x20, 0x1b3d, 0x186, 0x80b, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x120, 0x1, 0x0, 0x0, 0xc0, 0x5, [{{0x9, 0x4, 0xb3, 0x0, 0x1, 0xcc, 0xda, 0xe5, 0x0, [@uac_as={[@format_type_i_discrete={0x8, 0x24, 0x2, 0x1, 0x21, 0x1, 0x26, 0xff}]}], [{{0x9, 0x5, 0x85, 0x3, 0x8, 0x2, 0x5, 0x1, [@generic={0xa5, 0x21, "46d72a8e9b77b8be2fc2663c609f72f1d9af6dfc3f66386cdaaa38c9adb803c2abb2157e4e322d478b40be1ac1c02e43d6b05ad53ce86070a90880021f7dde6c12683afc1e1e91f960fc37b054d3eb891a9178f5997a9d6d62dd3157dd6f7bb4a6b467143df8d50ab4262009f867156776edb75ab3e04db6bf8e3f17e4db745625a51ba49b2747fab03a18158e46b919d9d3a103c592129c665e0e90e64f45cc7ac92c"}, @generic={0x58, 0x2, "fc5454062384cbc4cf48c778523558a27b93249915f78efbc08d9d7a26a0ade07c76470c1a03aaee5cdd1d77f6cd676f7203a5f99dbead756df75690c836e73aba0561cd1c9aed24c7c08bee695e61bf30a70bbdf98b"}]}}]}}]}}]}}, 0x0) openat$binfmt(0xffffffffffffff9c, 0x0, 0x41, 0x1ff) 9.060713035s ago: executing program 2 (id=1432): openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x42, 0x0) socket$inet_udp(0x2, 0x2, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x275a, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x2800, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='freezer.self_freezing\x00', 0x275a, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000af000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000000)="8ee8c9b8ee088ed8660f3801b2d6352ed9ff660f3882040f01cf0fc72d2626652e0f01ca0fc7386635002000000f22e0", 0x30}], 0x1, 0x50, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000000), 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) preadv(r2, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffff23}], 0x1, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x64, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 9.060133685s ago: executing program 3 (id=1433): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000005c0), r1) sendmsg$IEEE802154_LLSEC_ADD_KEY(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x623, 0x70bd2b, 0x2}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x8800) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_LBT_MODE(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000640)=ANY=[@ANYBLOB="14000000d0c871"], 0x14}}, 0x20008000) syz_genetlink_get_family_id$nfc(&(0x7f0000000cc0), r4) r5 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000012c0), r4) sendmsg$NLBL_MGMT_C_LISTALL(r3, &(0x7f0000002300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000022c0)={&(0x7f0000000180)={0x14, r5, 0x1, 0x70bd29, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x20}, 0x48400) sendmsg$NLBL_MGMT_C_ADDDEF(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, r5, 0x200, 0x70bd28, 0x25dfdbfd, {}, [@NLBL_MGMT_A_CLPDOI={0x8}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @multicast1}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40}, 0x40000) r6 = syz_socket_connect_nvme_tcp() close(r6) close(r6) 7.447639707s ago: executing program 0 (id=1434): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0002267bb934aafd7000fddbdf250200000005002d000100000006002800030000004d82231e22d8e85e6aae5cc8179c7800345ed046f6a64b29980320fd5269d9c1982a82263dd5269f219c92c40a82c646ac9ee6892f4c346800"/101], 0x24}, 0x1, 0x0, 0x0, 0x2000000}, 0x4000804) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000040)) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000000)={[0x35, 0x7, 0x3, 0x180, 0x2, 0xfffffffffffffffa, 0xf1, 0x100000001, 0x1, 0x5, 0x0, 0x29, 0x0, 0x6, 0x0, 0xbd9], 0xffff1001, 0x43100}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000003c0)={[0x7, 0x1000000000, 0x0, 0x200000000000043, 0x2000004, 0x0, 0x2004cb, 0x0, 0xa7c, 0x68ff, 0x7, 0x8000000009, 0x803, 0x0, 0x9], 0xeeee8000, 0x202}) ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, &(0x7f00000001c0)={{0x3000, 0x1, 0x4, 0x8, 0xb, 0xe6, 0x40, 0x0, 0x0, 0x81, 0x80}, {0x5000, 0xe000, 0x3, 0x0, 0x45, 0x5, 0x75, 0x6, 0x36, 0x0, 0x2, 0x87}, {0x0, 0xdddd0000, 0xe, 0x5, 0x3, 0x7, 0x0, 0x9, 0x1, 0xa4, 0x5, 0x5}, {0x1, 0xeeee0000, 0x9, 0x6, 0x5, 0x42, 0xb, 0xff, 0x8, 0x7, 0xe}, {0xf000, 0xd000, 0xf, 0x3, 0x16, 0x7, 0xab, 0x8, 0x9, 0x9, 0xf7, 0x97}, {0xeeefa000, 0xdddd0000, 0xe, 0xa0, 0xb1, 0x8, 0x1, 0xa0, 0x82, 0x2f, 0x1, 0x8}, {0x3000, 0x3000, 0xf, 0x5, 0x7, 0x5, 0x7, 0x3, 0x8, 0x4, 0x40, 0x70}, {0x8080000, 0x4000, 0xa, 0x5, 0xcd, 0x7, 0x1, 0x9, 0x2, 0xc, 0xb0, 0x81}, {0xeeee0000, 0xbf4}, {0x8000000, 0x7}, 0x80000031, 0x0, 0x3000, 0x2024, 0x2, 0x0, 0x100000, [0x6800000000000000, 0x4, 0x2, 0x8]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x10012, r1, 0x0) rt_sigtimedwait(&(0x7f0000000040)={[0xfffffffffffffdf9]}, 0x0, 0x0, 0x8) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000540)=ANY=[], 0xb0) sigaltstack(0x0, 0x0) close(0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0002267bb934aafd7000fddbdf250200000005002d000100000006002800030000004d82231e22d8e85e6aae5cc8179c7800345ed046f6a64b29980320fd5269d9c1982a82263dd5269f219c92c40a82c646ac9ee6892f4c346800"/101], 0x24}, 0x1, 0x0, 0x0, 0x2000000}, 0x4000804) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) (async) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, 0x0) (async) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) (async) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) (async) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) (async) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000040)) (async) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000000)={[0x35, 0x7, 0x3, 0x180, 0x2, 0xfffffffffffffffa, 0xf1, 0x100000001, 0x1, 0x5, 0x0, 0x29, 0x0, 0x6, 0x0, 0xbd9], 0xffff1001, 0x43100}) (async) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) (async) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) (async) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000003c0)={[0x7, 0x1000000000, 0x0, 0x200000000000043, 0x2000004, 0x0, 0x2004cb, 0x0, 0xa7c, 0x68ff, 0x7, 0x8000000009, 0x803, 0x0, 0x9], 0xeeee8000, 0x202}) (async) ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, &(0x7f00000001c0)={{0x3000, 0x1, 0x4, 0x8, 0xb, 0xe6, 0x40, 0x0, 0x0, 0x81, 0x80}, {0x5000, 0xe000, 0x3, 0x0, 0x45, 0x5, 0x75, 0x6, 0x36, 0x0, 0x2, 0x87}, {0x0, 0xdddd0000, 0xe, 0x5, 0x3, 0x7, 0x0, 0x9, 0x1, 0xa4, 0x5, 0x5}, {0x1, 0xeeee0000, 0x9, 0x6, 0x5, 0x42, 0xb, 0xff, 0x8, 0x7, 0xe}, {0xf000, 0xd000, 0xf, 0x3, 0x16, 0x7, 0xab, 0x8, 0x9, 0x9, 0xf7, 0x97}, {0xeeefa000, 0xdddd0000, 0xe, 0xa0, 0xb1, 0x8, 0x1, 0xa0, 0x82, 0x2f, 0x1, 0x8}, {0x3000, 0x3000, 0xf, 0x5, 0x7, 0x5, 0x7, 0x3, 0x8, 0x4, 0x40, 0x70}, {0x8080000, 0x4000, 0xa, 0x5, 0xcd, 0x7, 0x1, 0x9, 0x2, 0xc, 0xb0, 0x81}, {0xeeee0000, 0xbf4}, {0x8000000, 0x7}, 0x80000031, 0x0, 0x3000, 0x2024, 0x2, 0x0, 0x100000, [0x6800000000000000, 0x4, 0x2, 0x8]}) (async) ioctl$KVM_RUN(r4, 0xae80, 0x0) (async) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x10012, r1, 0x0) (async) rt_sigtimedwait(&(0x7f0000000040)={[0xfffffffffffffdf9]}, 0x0, 0x0, 0x8) (async) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000540)=ANY=[], 0xb0) (async) sigaltstack(0x0, 0x0) (async) close(0xffffffffffffffff) (async) 7.446721297s ago: executing program 2 (id=1435): madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xe) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='pagemap\x00') mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x110) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280), 0x42, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='fd=', @ANYRESDEC=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESHEX=r1]) mount$incfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x1108000, &(0x7f0000000100)=ANY=[@ANYBLOB="726c6b675f77616b6575705f637e743d3030307f0f3030303030303030303030301a30302c726c6f675f70616765733d30303030303030303030303030303030303030352c00"]) pread64(r0, &(0x7f0000001240)=""/102400, 0x19000, 0x1000000300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000380), 0x900, 0x0) read(r3, &(0x7f00000002c0)=""/107, 0x6b) ioctl$TUNSETTXFILTER(r2, 0x400454ca, &(0x7f0000000000)=ANY=[@ANYBLOB="815e8bcc159cf2ecce9824e800c679c5401be2cf0500329cc85c98d77966d524d3b5f4"]) openat$udambuf(0xffffffffffffff9c, &(0x7f0000000240), 0x2) r4 = memfd_create(&(0x7f0000000540)='y\x105\xfb\xf7u\x83%\x1f\xe09@:r\xc2\xb9x0\x90P\x03\x00\x00\x00\x00\x00\x00\x00\xfe,\x1c\xf1\xdd\xcf]\xac\xbc\t\xbb\xfc\xa4j\x9f\xceX\x8f5=\xaa\xd5\xe9n\xab s\xa5\x00\x8d\tV\t\x91\x18\x06O\xb0=D\xda\xb6F\x1a\xc82\x8b\xc0l\xd0\x89d\xe6\xb7\xd8\x97\xb8\xde\xa3\x89\"%/u\x17\xdam\x8d\x01Lh\x1e^\x9ej\x1c\xc5\xf0\xf6\x92\x05\x9aH\x00\'\xd4\x94d[\v\xfc\xad\x0f\xa8\xc5\xad\x001\x8b%\xaa?\x00\x00\x00\x00\x00\x00\x00\nj\x8c\xef\x90\xc0Z\xfa\x1a\xb3\xf0wVq\xe9d\xf8N\x80\xd1g\xd8e\xc8\x16\xad1\x02\xab\xce3\xb2\xb0\xd1\x11\xf0\xc2Gj+kV', 0x2) ftruncate(r4, 0x10000) fcntl$addseals(r4, 0x409, 0x7) r5 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000180), 0x2) r6 = ioctl$UDMABUF_CREATE(r5, 0x40187542, &(0x7f0000000000)={r4, 0x0, 0x1000, 0xfffff000}) ioctl$DMA_BUF_SET_NAME_A(r6, 0x40086203, &(0x7f0000000080)=',#-^\x00') mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x1) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000340), 0x0, &(0x7f0000000140)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@upperdir={'upperdir', 0x3d, './file1'}}]}) chdir(&(0x7f0000000140)='./bus\x00') newfstatat(0xffffffffffffff9c, &(0x7f0000000400)='./file0\x00', 0x0, 0x0) creat(&(0x7f0000000ac0)='./file0\x00', 0x0) syz_usb_connect(0x1, 0x6b, &(0x7f0000000100)=ANY=[@ANYRESOCT=r0], &(0x7f0000001240)={0xfffffd7b, 0x0, 0x0, 0x0}) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f00000000c0)=0x10000) 7.446503877s ago: executing program 3 (id=1436): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) sendmsg$NL80211_CMD_NEW_INTERFACE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="090d2000000000f0ff000700000008000300", @ANYRES32, @ANYBLOB="0800051d00000000140006"], 0x58}}, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000840)={"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"}) ioctl$BTRFS_IOC_BALANCE_V2(r3, 0xc4009420, &(0x7f00000001c0)={0x11, 0x4, {0xc, @struct={0x4, 0x5}, 0x0, 0x8, 0x8, 0xb, 0x0, 0x4, 0x80, @usage=0x7ff, 0x6, 0x3, [0x46, 0x4, 0x9812, 0x3, 0x44, 0x101]}, {0x230, @struct={0x2, 0x40000000}, 0x0, 0x80000000, 0x3, 0x7, 0x1c000, 0x6, 0x8, @struct={0x0, 0x1d9a0656}, 0x7, 0x38c, [0x3, 0x81, 0x800, 0x5, 0x81, 0x9]}, {0x0, @usage=0x1, 0x0, 0x675, 0x80000000, 0x4, 0x9, 0x5, 0x10, @usage=0x5, 0x3, 0xa28, [0x3, 0x401, 0x80000001, 0x20, 0x100000000, 0x9]}, {0x1, 0xe, 0xfffffffffffffc00}}) ioctl$BTRFS_IOC_DEV_INFO(r4, 0xd000941e, &(0x7f0000000c40)={r5, "8caa81b0d5cffe643052e79dd9fc54af"}) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = memfd_create(&(0x7f0000000180)='\b\x9dF\xd8\b\xb3~u\xa5\"\xdc\xfdq\xf6c\r;\xfcO\x8c=\x81\xb1\x8aWpA\xd4\x98\x85K\x89>N\x8ar\x17O\x0fKR\xe2{mn\xcc\xbf2\xc0\xa7\x14\xd0\xd4\xfe/m\xdf\xb6]\xc2\xaa\x86\xec(\xf7\xcd\xa6\xd9n^.\x13*\xd4\xb8\xe8\xc4\xefb\x14Vx\xc6\xfe\x9e\xee\xe7\xd7E\xe9\t\x83\xdeNX\xec\xe66\x1b\x97$\xee\x84\x14n,B\xd5?\xe5E:+Pm\x1d\xb4\xb8\xeb\xe8Op2\x82\xc7\x0e\x97\x03\xef\x1a\xa5\x00.\x89\b!m\f\xd9\x8b$}\x9f\fX\x81\xa8\xf6\x94\xbc\xed\x80|l]\xe9\xca\xd3\xc9\xa3\x9e\x9cJI\xf1\xa2\xa0\xc4:\x00\x00\x00\x00\x00\x00\b\x00\x00', 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) splice(r8, 0x0, r7, &(0x7f0000000140)=0x8008, 0x4, 0x0) close_range(r6, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff8000}]}) r9 = socket$inet6(0xa, 0x3, 0x88) ioctl$KVM_SET_VAPIC_ADDR(r4, 0x4008ae93, &(0x7f0000000080)=0xfec00000) setsockopt$inet6_IPV6_XFRM_POLICY(r9, 0x29, 0x23, &(0x7f0000000980)={{{@in=@local, @in=@rand_addr=0x64010101, 0xee24, 0x4, 0x0, 0x8001, 0x2}, {0x0, 0x200000006, 0x40000000007, 0x20000a0e1, 0x2, 0x0, 0x200004003, 0x9}, {0x5, 0x0, 0x2, 0x8003}, 0x5, 0x0, 0x1, 0x0, 0x5, 0x3}, {{@in6=@dev={0xfe, 0x80, '\x00', 0x16}, 0x0, 0x6c}, 0x0, @in=@rand_addr=0x64010100, 0x3502, 0x3, 0x8, 0x0, 0x9075, 0x800, 0xc5e}}, 0xe8) close_range(r3, r0, 0x2) 5.733179799s ago: executing program 0 (id=1437): r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'macsec0\x00', 0x200}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'macsec0\x00', 0x1}) r1 = syz_usb_connect(0x5, 0x2d, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000459bb2405804035000000000000109021b000111000000090400000195699b000905", @ANYRES32=r0], 0x0) syz_usb_control_io(r1, 0x0, 0x0) syz_usb_control_io$hid(r1, 0x0, 0x0) syz_usb_control_io$uac1(r1, 0x0, &(0x7f0000000440)={0x44, &(0x7f0000000180)={0x0, 0x0, 0x3, 'Yf\''}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io(r1, 0x0, 0x0) syz_usb_control_io$hid(r1, 0x0, &(0x7f0000001e40)={0x2c, 0x0, 0x0, 0x0, &(0x7f0000001dc0)={0x20, 0x1, 0x34, "712bab"}, 0x0}) syz_usb_control_io(r1, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$binfmt_aout(r2, &(0x7f0000000340)=ANY=[], 0xff2e) ioctl$TCXONC(r2, 0x540a, 0x1) r3 = gettid() timer_create(0x1, &(0x7f0000000800)={0x0, 0x21, 0x4, @tid=r3}, &(0x7f0000000000)=0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x3ed4, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x9) timer_settime(r4, 0x1, &(0x7f0000000040), 0x0) ioctl$TCXONC(r2, 0x540a, 0x3) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)) syz_usb_control_io(r1, 0x0, &(0x7f0000001300)={0x84, &(0x7f0000000e40)={0x0, 0x0, 0x3, "0b3b81"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 5.732147359s ago: executing program 2 (id=1438): getrandom(&(0x7f0000000240)=""/286, 0xffffff9a, 0x0) (async) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) r1 = openat$selinux_policy(0xffffff9c, &(0x7f0000001040), 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000b, 0x12, r1, 0x0) (async) mmap(&(0x7f0000607000/0x1000)=nil, 0x1000, 0x1000002, 0x13, r0, 0xcefbd000) (async) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r2, 0x29, 0x36, &(0x7f00000004c0)=ANY=[], 0x8) write(r2, &(0x7f00000000c0)="8f2a0a65bd8c002b0304000e0580a7b6070d63e2", 0x14) (async) write$selinux_load(r0, &(0x7f0000000000)=ANY=[], 0x2000) (async) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$cgroup_int(r3, &(0x7f0000000540), 0xfffffdd8) madvise(&(0x7f0000000000/0x400000)=nil, 0x40001e, 0x15) (async) syz_kvm_setup_syzos_vm$x86(r3, &(0x7f0000000000/0x400000)=nil) 5.731578479s ago: executing program 3 (id=1439): r0 = syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f0000000480)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}, {{0x9, 0x5, 0x81, 0x3, 0x200}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x200}}, {{0x9, 0x5, 0x3, 0x2, 0x200}}}}}}}]}}, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) r1 = syz_open_procfs$pagemap(0x0, &(0x7f0000000000)) ioctl$PAGEMAP_SCAN(r1, 0xc0606610, &(0x7f0000000140)={0x60, 0x1, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x8001, &(0x7f00000000c0)=[{0x1, 0x7ff, 0x19fa}], 0x1, 0x7f, 0x10, 0x4, 0x60, 0x8}) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, &(0x7f0000000340)={0x44, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x20, 0x80, 0x1c, {0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10}}, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_usb_control_io$printer(0xffffffffffffffff, &(0x7f0000000500)={0x14, &(0x7f0000000640)={0x20, 0x2, 0xf2, {0xf2, 0x30, "2c1921e980bef14615b0b1868d3ecf93f6ce67c67dceefa4b1414eec7b5cbac2322b7dbf21bee12afe9e21a949d21b7c2e7ca3b76666ee9fa039775bbcb5a3149f8a4d17abf5e74c439438e0bcbba3fd8a680e6fea1a93bcdcc14baa3bbe4f19b9ddcecc4716ae1fb61fbcf916aa1d00f55197bf8cc3cc0047273739a4a82e6509220c2ee2d604e26aca946788f2d355293ab631aca62481277458283d65626b7e0f39e841e41bc074f0e39e3d04ae3f60c9746ffbeb68b0fc776c7ea1e5075a8e5afe1fac8b85ce34f5fabdd92bb9f413ce53fc9c45443b4b831d253a4c49cf2da0be457db054f1f5a436b63fea7cdf"}}, &(0x7f0000000400)={0x0, 0x3, 0x10, @string={0x10, 0x3, "2a094414a7f814675de5d07a0575"}}}, &(0x7f0000000b00)={0x34, &(0x7f0000000540)={0x20, 0x10, 0x69, "5e87d17bfdec9b1cb3976e8928a5efc576434c8f76f8f01966c2689ca744d36503524b618cea9608340645373467fc9c2bdac2fa106e48ba37b0a8cfb5e957d25f558647bc7c6fd651a77489b6a90ec645542852d97213412389915bd485600728d66eb75d95d45ee9"}, &(0x7f0000000740)={0x0, 0xa, 0x1}, &(0x7f0000000840)={0x0, 0x8, 0x1, 0x1}, &(0x7f00000009c0)={0x20, 0x0, 0x101, {0xff, "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"}}, &(0x7f0000000880)={0x20, 0x1, 0x1, 0x9}, &(0x7f00000008c0)={0x20, 0x0, 0x1, 0x8}}) ioctl$KVM_CAP_EXCEPTION_PAYLOAD(r3, 0x4068aea3, &(0x7f0000000200)={0xa4, 0x0, 0x1}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r4, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) ioctl$KVM_RUN(r4, 0xae80, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r5 = syz_usb_connect(0x0, 0x36, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x77, 0x29, 0x4, 0x20, 0x424, 0x9901, 0xc257, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x10, 0x0, [{{0x9, 0x4, 0x43, 0x0, 0x2, 0x31, 0x7d, 0x55, 0x0, [], [{{0x9, 0x5, 0x2, 0x2, 0x200, 0x2}}, {{0x9, 0x5, 0x82, 0x2, 0x200}}]}}]}}]}}, 0x0) syz_usb_control_io$uac1(r5, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r7, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x4) fcntl$setpipe(r6, 0x407, 0x0) setsockopt$inet_tcp_int(r7, 0x6, 0x14, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r7, &(0x7f0000000300)={0x2, 0x0, @remote}, 0x10) sendto$inet(r7, &(0x7f0000000200)="e1", 0xfea8, 0x0, 0x0, 0x0) splice(r7, 0x0, r6, 0x0, 0xfea8, 0xa) close_range(0xffffffffffffffff, r6, 0x0) syz_usb_control_io(r5, 0x0, &(0x7f0000000780)={0x84, &(0x7f0000000000)={0x40, 0xd, 0x4, "fd000000"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$uac1(r5, 0x0, 0x0) syz_usb_control_io(r5, 0x0, &(0x7f0000000d00)={0x84, &(0x7f0000000600)={0x0, 0x3, 0x6, "54aa5370fd00"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io(r5, 0x0, &(0x7f0000000900)={0x84, &(0x7f0000000440)={0x0, 0x13, 0x64, "7156f91725635f3de527e6069a14831636fe64ce8be011f62189fe25ae07195c0599b11e41bd87d83852ac09b19f071455ce204a042a98ee074c1d043d849f1ddacbe93a32bd5d1dcdf9b3b26ee83791317b7dea587b5a3b1b91c71aca259dc7007be35d"}, 0x0, 0x0, &(0x7f00000005c0)={0x20, 0x0, 0x4, {0x1, 0x1}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 3.921303973s ago: executing program 0 (id=1440): mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0xb4065, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140), 0x42000, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000001c40)=0x1) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f0000000040)={0x2d, 0x3}) 3.921084963s ago: executing program 2 (id=1441): openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x42, 0x0) socket$inet_udp(0x2, 0x2, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x275a, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x2800, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='freezer.self_freezing\x00', 0x275a, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000af000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000000)="8ee8c9b8ee088ed8660f3801b2d6352ed9ff660f3882040f01cf0fc72d2626652e0f01ca0fc7386635002000000f22e0", 0x30}], 0x1, 0x50, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000000), 0x208e24b) preadv(r2, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffff23}], 0x1, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x64, 0x0, 0x0) pipe(&(0x7f0000000240)) ioctl$KVM_RUN(r3, 0xae80, 0x0) 3.920376183s ago: executing program 3 (id=1442): r0 = creat(&(0x7f0000000000)='./file0\x00', 0xc) mount$9p_fd(0x7a, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000000, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@msize}]}}) 1.726446291s ago: executing program 3 (id=1443): openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x42, 0x0) socket$inet_udp(0x2, 0x2, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x275a, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x2800, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='freezer.self_freezing\x00', 0x275a, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000af000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000000)="8ee8c9b8ee088ed8660f3801b2d6352ed9ff660f3882040f01cf0fc72d2626652e0f01ca0fc7386635002000000f22e0", 0x30}], 0x1, 0x50, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000000), 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) preadv(r2, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffff23}], 0x1, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x64, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 1.72617521s ago: executing program 0 (id=1444): r0 = openat$sysfs(0xffffff9c, &(0x7f0000000000)='/sys/kernel/profiling', 0x42242, 0x73) pwritev(r0, &(0x7f0000000400)=[{&(0x7f0000000040)='9', 0x1}], 0x1, 0xffffff01, 0xa) (fail_nth: 2) 1.72596175s ago: executing program 2 (id=1445): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe3000/0x18000)=nil, &(0x7f0000000000)=[@text32={0x20, 0x0}], 0x1, 0x2c, 0x0, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x10b643, 0x0) r4 = socket$inet(0x2, 0x80001, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r4, 0x0, 0x61, &(0x7f0000000100)={'filter\x00', 0x2, [{}, {}]}, 0x48) r5 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r5, r6, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000200)=[@textreal={0x8, &(0x7f0000000000)="66b9200001c00f324f3066b9800000c00f326635008000000f300f01d72e363e0f01ca0fbb9d0e0066b9820000c00f32440f20c066350d000000440f22c03e3e0f01c4c1ef00", 0x46}], 0x1, 0x0, 0x0, 0x0) ioctl$XFS_IOC_PATH_TO_FSHANDLE(r0, 0xc0385868, &(0x7f0000000240)={r1, &(0x7f0000000080)='(,\b\x00', 0x3d9000, &(0x7f00000000c0)={@_ha_fsid={[0x5e, 0x5]}, {0x2, 0x2, 0x9, 0x7}}, 0x10, &(0x7f0000000140)={@_ha_fsid}, &(0x7f00000001c0)=0xc8b8}) ioctl$HIDIOCGRAWPHYS(r7, 0x80404805, &(0x7f0000000280)) ioctl$KVM_RUN(r6, 0xae80, 0x0) r8 = openat$sysfs(0xffffff9c, &(0x7f0000000000)='/sys/kernel/profiling', 0x42242, 0x73) r9 = fsopen(&(0x7f0000001340)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r9, 0x6, 0x0, 0x0, 0x0) r10 = fsmount(r9, 0x0, 0x0) r11 = openat$cgroup_procs(r10, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r11, &(0x7f0000000140), 0x12) preadv(r11, &(0x7f0000000440)=[{&(0x7f0000000200)=""/46, 0x2e}], 0x1, 0xf44, 0x2) pwritev(r8, &(0x7f0000000400)=[{&(0x7f0000000040)='9', 0x1}], 0x1, 0xffffff01, 0xa) 936.351µs ago: executing program 0 (id=1446): madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xe) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='pagemap\x00') mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x110) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280), 0x42, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='fd=', @ANYRESDEC=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESHEX=r1]) mount$incfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x1108000, &(0x7f0000000100)=ANY=[@ANYBLOB="726c6b675f77616b6575705f637e743d3030307f0f3030303030303030303030301a30302c726c6f675f70616765733d30303030303030303030303030303030303030352c00"]) pread64(r0, &(0x7f0000001240)=""/102400, 0x19000, 0x1000000300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000380), 0x900, 0x0) read(r3, &(0x7f00000002c0)=""/107, 0x6b) ioctl$TUNSETTXFILTER(r2, 0x400454ca, &(0x7f0000000000)=ANY=[@ANYBLOB="815e8bcc159cf2ecce9824e800c679c5401be2cf0500329cc85c98d77966d524d3b5f4"]) openat$udambuf(0xffffffffffffff9c, &(0x7f0000000240), 0x2) r4 = memfd_create(&(0x7f0000000540)='y\x105\xfb\xf7u\x83%\x1f\xe09@:r\xc2\xb9x0\x90P\x03\x00\x00\x00\x00\x00\x00\x00\xfe,\x1c\xf1\xdd\xcf]\xac\xbc\t\xbb\xfc\xa4j\x9f\xceX\x8f5=\xaa\xd5\xe9n\xab s\xa5\x00\x8d\tV\t\x91\x18\x06O\xb0=D\xda\xb6F\x1a\xc82\x8b\xc0l\xd0\x89d\xe6\xb7\xd8\x97\xb8\xde\xa3\x89\"%/u\x17\xdam\x8d\x01Lh\x1e^\x9ej\x1c\xc5\xf0\xf6\x92\x05\x9aH\x00\'\xd4\x94d[\v\xfc\xad\x0f\xa8\xc5\xad\x001\x8b%\xaa?\x00\x00\x00\x00\x00\x00\x00\nj\x8c\xef\x90\xc0Z\xfa\x1a\xb3\xf0wVq\xe9d\xf8N\x80\xd1g\xd8e\xc8\x16\xad1\x02\xab\xce3\xb2\xb0\xd1\x11\xf0\xc2Gj+kV', 0x2) ftruncate(r4, 0x10000) fcntl$addseals(r4, 0x409, 0x7) r5 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000180), 0x2) r6 = ioctl$UDMABUF_CREATE(r5, 0x40187542, &(0x7f0000000000)={r4, 0x0, 0x1000, 0xfffff000}) ioctl$DMA_BUF_SET_NAME_A(r6, 0x40086203, &(0x7f0000000080)=',#-^\x00') mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x1) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000340), 0x0, &(0x7f0000000140)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@upperdir={'upperdir', 0x3d, './file1'}}]}) chdir(&(0x7f0000000140)='./bus\x00') newfstatat(0xffffffffffffff9c, &(0x7f0000000400)='./file0\x00', 0x0, 0x0) creat(&(0x7f0000000ac0)='./file0\x00', 0x0) syz_usb_connect(0x1, 0x6b, &(0x7f0000000100)=ANY=[@ANYRESOCT=r0], &(0x7f0000001240)={0xfffffd7b, 0x0, 0x0, 0x0}) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f00000000c0)=0x10000) 654.761µs ago: executing program 2 (id=1447): write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000cc0)={'syz1\x00', {0xfff8, 0x4002, 0x248, 0x401}, 0x37, [0xfffffff8, 0x8, 0x5, 0x9, 0x80, 0x155f, 0x6, 0x4, 0x25cd, 0x1, 0xb4, 0x1, 0xa2b9, 0x6, 0x4, 0x7, 0x6, 0xfc000000, 0x3, 0xbbf, 0x4a732f64, 0x2, 0x80000001, 0xa, 0x4, 0x12a3, 0x6, 0x8, 0x2, 0x6, 0x7, 0x81, 0x8a, 0x79, 0x206, 0x10001, 0x0, 0x8f, 0x4, 0x4, 0x16, 0x1, 0x5, 0x401, 0x3, 0x405, 0x200000a7, 0x81, 0x9, 0xf9a2, 0x80000001, 0xff, 0x0, 0x2, 0x2, 0xfffffffe, 0x7, 0x1, 0x7ff, 0x4, 0x4007f, 0xffff, 0x9, 0x4], [0xe56, 0x3, 0x6, 0x9, 0x4, 0xc66, 0xa8a9, 0x20000063, 0x8e, 0xd50, 0x7, 0x5, 0x2, 0x889, 0x4, 0xa6, 0x1000, 0x6, 0x200b398, 0x400001, 0x0, 0x4, 0x1c, 0x7, 0x1, 0x2, 0x3, 0x8, 0xffffff7f, 0x400, 0x6, 0x4c2336d3, 0x4, 0x0, 0xfffffff8, 0x401, 0x46, 0xf1, 0x4, 0xab00060, 0x6, 0x6, 0x2, 0x5, 0x3ff, 0x1ff, 0x1, 0x7, 0x1, 0x1cb, 0x1, 0x1, 0x6, 0x400438, 0x2, 0x9, 0x95, 0x7fffffff, 0x404, 0xfffffff9, 0x1, 0x1000, 0xe, 0x5], [0x2, 0xfffffffe, 0xf, 0xc, 0x2, 0x2e6bf783, 0x80000001, 0x6, 0x18, 0x491, 0x8d3, 0x200006, 0x800d, 0x400, 0x2, 0x400, 0x41, 0x6, 0x1000, 0x2000004, 0x1, 0x8000003, 0x5, 0x9, 0x3, 0x3, 0x9, 0x3, 0xc7, 0xfff, 0x6, 0x10000, 0x3fc, 0x3e55, 0x4, 0xd3, 0x7, 0x3437, 0x3, 0xd, 0x7, 0x600, 0x101, 0xdd80, 0x60a0, 0x7b, 0x9d26, 0x10000, 0x1, 0x2, 0x2, 0x6, 0x8000, 0xf45, 0x3, 0xd500, 0x8, 0x77, 0x9, 0x2, 0x10002, 0xdffffffd, 0x8, 0x1], [0xa772, 0x6, 0x5, 0x1afa, 0xbfc, 0x8, 0x5, 0x7f, 0x5, 0x40, 0x100, 0x1005, 0x1, 0x7, 0x1e, 0x9, 0x0, 0x3, 0x9d86, 0xd, 0x9, 0x8, 0x140f2, 0x5396, 0x3, 0x6, 0x80008001, 0x7777, 0x1, 0x80, 0xfc, 0xd8d2, 0x7fffffff, 0x9, 0xc, 0x30d, 0x5, 0x1ff, 0x2000803, 0xffffffff, 0x10000, 0x800, 0x8004, 0x7fff, 0x3, 0x6, 0xf, 0xe, 0x5337, 0x0, 0x4, 0xfffffff9, 0x4, 0xfffffff9, 0x9, 0x4, 0x9, 0x4, 0xdab, 0x3, 0x8, 0x14000, 0x1, 0x9]}, 0x45c) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x38}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000000)={[0x40000000000035, 0xfff, 0xc, 0x40000000000180, 0xffffffffffffffff, 0x80000000, 0xf2, 0x9, 0xfffffffffffff801, 0x2000000000007, 0x8, 0x7, 0x0, 0x3, 0x4, 0x3], 0x25000, 0x1144}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r5 = dup(r4) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000840)={0x1fe, 0x2, 0x3000, 0x2000, &(0x7f0000003000/0x2000)=nil}) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, &(0x7f00000000c0)="c20000361e0f01c3660fd2eff30f10f1b961020000b80e000000ba000000000f30b98d0200000f320b99f3530000660f6af7c4e2f91d20", 0x37}], 0x1, 0x11, 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000200)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) 0s ago: executing program 3 (id=1448): r0 = syz_usb_connect$hid(0x2, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x17ef, 0x6067, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x3, 0x3, 0x0, 0x2, 0x0, {0x9, 0x21, 0x6, 0x0, 0x1, {0x22, 0x5}}, {{{0x9, 0x5, 0x81, 0x3, 0x20, 0x0, 0x7}}}}}]}}]}}, 0x0) r1 = syz_usb_connect$hid(0x2, 0x36, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x28bd, 0x42, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0xa0, 0x8, [{{0x9, 0x4, 0x0, 0xd, 0x1, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0xfffe, 0xfd, 0x1, {0x22, 0x9}}, {{{0x9, 0x5, 0x81, 0x3, 0x3ff, 0x40, 0x1, 0xa}}}}}]}}]}}, 0x0) syz_usb_control_io$hid(r1, 0x0, 0x0) syz_usb_control_io$hid(r1, &(0x7f0000000180)={0x24, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0022ae"], 0x0}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000040)={0x24, 0x0, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="002214"], 0x0}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') r3 = open_tree(r2, &(0x7f0000000300)='./cgroup\x00', 0x89801) move_mount(r3, 0x0, r3, 0x0, 0x46) mount$tmpfs(0x0, 0x0, 0x0, 0x1, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.109' (ED25519) to the list of known hosts. [ 20.119004][ T36] audit: type=1400 audit(1772205290.639:64): avc: denied { mounton } for pid=282 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 20.120507][ T282] cgroup: Unknown subsys name 'net' [ 20.141763][ T36] audit: type=1400 audit(1772205290.639:65): avc: denied { mount } for pid=282 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.169006][ T36] audit: type=1400 audit(1772205290.669:66): avc: denied { unmount } for pid=282 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.169166][ T282] cgroup: Unknown subsys name 'devices' [ 20.332080][ T282] cgroup: Unknown subsys name 'hugetlb' [ 20.337686][ T282] cgroup: Unknown subsys name 'rlimit' [ 20.510283][ T36] audit: type=1400 audit(1772205291.039:67): avc: denied { setattr } for pid=282 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 20.533484][ T36] audit: type=1400 audit(1772205291.039:68): avc: denied { mounton } for pid=282 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 20.548598][ T284] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 20.558258][ T36] audit: type=1400 audit(1772205291.039:69): avc: denied { mount } for pid=282 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 20.589915][ T36] audit: type=1400 audit(1772205291.089:70): avc: denied { relabelto } for pid=284 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.615972][ T36] audit: type=1400 audit(1772205291.089:71): avc: denied { write } for pid=284 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.644601][ T36] audit: type=1400 audit(1772205291.169:72): avc: denied { read } for pid=282 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.670340][ T36] audit: type=1400 audit(1772205291.169:73): avc: denied { open } for pid=282 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.670552][ T282] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 21.358896][ T289] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.380079][ T289] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.387210][ T289] bridge_slave_0: entered allmulticast mode [ 21.400166][ T289] bridge_slave_0: entered promiscuous mode [ 21.406783][ T289] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.413864][ T289] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.420959][ T289] bridge_slave_1: entered allmulticast mode [ 21.427082][ T289] bridge_slave_1: entered promiscuous mode [ 21.543305][ T295] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.550404][ T295] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.557455][ T295] bridge_slave_0: entered allmulticast mode [ 21.564009][ T295] bridge_slave_0: entered promiscuous mode [ 21.576702][ T295] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.583781][ T295] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.590897][ T295] bridge_slave_1: entered allmulticast mode [ 21.597030][ T295] bridge_slave_1: entered promiscuous mode [ 21.619061][ T293] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.626113][ T293] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.633173][ T293] bridge_slave_0: entered allmulticast mode [ 21.639432][ T293] bridge_slave_0: entered promiscuous mode [ 21.645853][ T293] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.652974][ T293] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.660060][ T293] bridge_slave_1: entered allmulticast mode [ 21.666174][ T293] bridge_slave_1: entered promiscuous mode [ 21.677024][ T289] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.684064][ T289] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.691534][ T289] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.698538][ T289] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.718317][ T294] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.725400][ T294] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.732693][ T294] bridge_slave_0: entered allmulticast mode [ 21.738811][ T294] bridge_slave_0: entered promiscuous mode [ 21.748124][ T294] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.755199][ T294] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.762352][ T294] bridge_slave_1: entered allmulticast mode [ 21.768481][ T294] bridge_slave_1: entered promiscuous mode [ 21.887272][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.894537][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.921498][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.928542][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.939740][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.946799][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.990201][ T46] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.997265][ T46] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.009173][ T46] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.016247][ T46] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.031891][ T46] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.038922][ T46] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.046663][ T46] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.053702][ T46] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.079775][ T289] veth0_vlan: entered promiscuous mode [ 22.088525][ T46] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.095577][ T46] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.103511][ T46] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.110553][ T46] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.137937][ T295] veth0_vlan: entered promiscuous mode [ 22.157855][ T295] veth1_macvtap: entered promiscuous mode [ 22.164901][ T289] veth1_macvtap: entered promiscuous mode [ 22.179944][ T294] veth0_vlan: entered promiscuous mode [ 22.192396][ T293] veth0_vlan: entered promiscuous mode [ 22.214444][ T295] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 22.218091][ T294] veth1_macvtap: entered promiscuous mode [ 22.245423][ T293] veth1_macvtap: entered promiscuous mode [ 22.266181][ T333] kvm_intel: L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 22.600294][ T330] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 22.760267][ T330] usb 1-1: Using ep0 maxpacket: 32 [ 22.767106][ T330] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 22.778095][ T330] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 22.800357][ T330] usb 1-1: New USB device found, idVendor=046d, idProduct=c31c, bcdDevice= 0.40 [ 22.817182][ T361] Zero length message leads to an empty skb [ 22.829697][ T330] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 22.850228][ T330] usb 1-1: config 0 descriptor?? [ 22.859321][ T330] hub 1-1:0.0: USB hub found [ 23.060674][ T330] hub 1-1:0.0: config failed, hub doesn't have any ports! (err -19) [ 23.400070][ T10] usb 3-1: new high-speed USB device number 2 using dummy_hcd [ 23.462792][ T330] hid-generic 0003:046D:C31C.0001: unknown main item tag 0x0 [ 23.471882][ T330] hid-generic 0003:046D:C31C.0001: hidraw0: USB HID v8.00 Device [HID 046d:c31c] on usb-dummy_hcd.0-1/input0 [ 23.571308][ T10] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 23.581186][ T10] usb 3-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 23.594214][ T10] usb 3-1: New USB device found, idVendor=056a, idProduct=0094, bcdDevice= 0.00 [ 23.603285][ T10] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 23.611836][ T10] usb 3-1: config 0 descriptor?? [ 23.930295][ T9] usb 4-1: new high-speed USB device number 2 using dummy_hcd [ 24.019785][ T10] wacom 0003:056A:0094.0002: unknown main item tag 0x0 [ 24.027052][ T10] wacom 0003:056A:0094.0002: unknown main item tag 0x0 [ 24.033981][ T10] wacom 0003:056A:0094.0002: unknown main item tag 0x0 [ 24.041057][ T10] wacom 0003:056A:0094.0002: unknown main item tag 0x0 [ 24.047936][ T10] wacom 0003:056A:0094.0002: unknown main item tag 0x0 [ 24.055010][ T10] wacom 0003:056A:0094.0002: Using device in hidraw-only mode [ 24.081321][ T9] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 24.091140][ T9] usb 4-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 1 [ 24.104475][ T9] usb 4-1: New USB device found, idVendor=0738, idProduct=1705, bcdDevice= 0.00 [ 24.113544][ T9] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 24.122095][ T9] usb 4-1: config 0 descriptor?? [ 24.170137][ T45] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 24.320256][ T45] usb 2-1: Using ep0 maxpacket: 16 [ 24.326477][ T45] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 24.337428][ T45] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 24.347264][ T45] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 9 [ 24.360418][ T45] usb 2-1: New USB device found, idVendor=045e, idProduct=07da, bcdDevice= 0.00 [ 24.369463][ T45] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 24.370300][ T341] usb 1-1: reset high-speed USB device number 2 using dummy_hcd [ 24.386872][ T45] usb 2-1: config 0 descriptor?? [ 24.530525][ T9] saitek 0003:0738:1705.0003: unknown main item tag 0x3 [ 24.540502][ T341] usb 1-1: device firmware changed [ 24.545795][ T330] usb 1-1: USB disconnect, device number 2 [ 24.548659][ T10] wacom 0003:056A:0094.0002: hidraw1: USB HID v88.88 Device [HID 056a:0094] on usb-dummy_hcd.2-1/input0 [ 24.564421][ T9] saitek 0003:0738:1705.0003: hidraw0: USB HID v0.00 Device [HID 0738:1705] on usb-dummy_hcd.3-1/input0 [ 24.583394][ T10] usb 3-1: USB disconnect, device number 2 [ 24.720128][ T330] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 24.731301][ T9] usb 4-1: USB disconnect, device number 2 [ 24.797944][ T45] microsoft 0003:045E:07DA.0004: No inputs registered, leaving [ 24.807420][ T45] microsoft 0003:045E:07DA.0004: hidraw0: USB HID v0.00 Device [HID 045e:07da] on usb-dummy_hcd.1-1/input0 [ 24.818996][ T45] microsoft 0003:045E:07DA.0004: no inputs found [ 24.825699][ T45] microsoft 0003:045E:07DA.0004: could not initialize ff, continuing anyway [ 24.880107][ T330] usb 1-1: Using ep0 maxpacket: 32 [ 24.886399][ T330] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 24.897308][ T330] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 24.907067][ T330] usb 1-1: New USB device found, idVendor=6172, idProduct=2377, bcdDevice= 0.00 [ 24.916099][ T330] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 24.924563][ T330] usb 1-1: config 0 descriptor?? [ 24.930763][ T330] hub 1-1:0.0: USB hub found [ 24.997537][ T9] usb 2-1: USB disconnect, device number 2 [ 25.060194][ T10] usb 3-1: new high-speed USB device number 3 using dummy_hcd [ 25.139470][ T330] hub 1-1:0.0: config failed, can't read hub descriptor (err -22) [ 25.148536][ T330] usbhid 1-1:0.0: can't add hid device: -71 [ 25.154504][ T330] usbhid 1-1:0.0: probe with driver usbhid failed with error -71 [ 25.180556][ T330] usb 1-1: USB disconnect, device number 3 [ 25.210074][ T10] usb 3-1: Using ep0 maxpacket: 8 [ 25.216343][ T10] usb 3-1: New USB device found, idVendor=041e, idProduct=2801, bcdDevice= 0.00 [ 25.225460][ T10] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 25.237271][ T10] usb 3-1: config 0 descriptor?? [ 25.249968][ T36] kauditd_printk_skb: 43 callbacks suppressed [ 25.249984][ T36] audit: type=1400 audit(1772205295.769:117): avc: denied { read } for pid=395 comm="syz.3.22" name="vga_arbiter" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 25.282815][ T36] audit: type=1400 audit(1772205295.769:118): avc: denied { open } for pid=395 comm="syz.3.22" path="/dev/vga_arbiter" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 25.308886][ T36] audit: type=1400 audit(1772205295.809:119): avc: denied { write } for pid=395 comm="syz.3.22" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 25.520153][ T45] usb 4-1: new high-speed USB device number 3 using dummy_hcd [ 25.670065][ T45] usb 4-1: Using ep0 maxpacket: 16 [ 25.676270][ T45] usb 4-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 25.686547][ T45] usb 4-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 25.697182][ T45] usb 4-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 25.709621][ T45] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 25.713261][ T10] prodikeys 0003:041E:2801.0005: hidraw0: USB HID v0.00 Device [HID 041e:2801] on usb-dummy_hcd.2-1/input0 [ 25.719159][ T45] usb 4-1: Product: syz [ 25.750080][ T330] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 25.758038][ T45] usb 4-1: Manufacturer: syz [ 25.762789][ T45] usb 4-1: SerialNumber: syz [ 25.912314][ T388] usb 3-1: USB disconnect, device number 3 [ 25.919934][ T330] usb 2-1: config 0 interface 0 altsetting 1 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 25.931075][ T330] usb 2-1: config 0 interface 0 altsetting 1 endpoint 0x81 has invalid wMaxPacketSize 0 [ 25.941174][ T330] usb 2-1: config 0 interface 0 has no altsetting 0 [ 25.948266][ T330] usb 2-1: New USB device found, idVendor=1a34, idProduct=0802, bcdDevice= 0.00 [ 25.957363][ T330] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 25.965954][ T330] usb 2-1: config 0 descriptor?? [ 25.990097][ T10] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 26.028568][ T45] usb 4-1: 0:2 : does not exist [ 26.035820][ T45] usb 4-1: 5:0: failed to get current value for ch 0 (-22) [ 26.047284][ T45] usb 4-1: USB disconnect, device number 3 [ 26.062316][ T387] udevd[387]: error opening ATTR{/sys/devices/platform/dummy_hcd.3/usb4/4-1/4-1:1.0/sound/card0/controlC0/../uevent} for writing: No such file or directory [ 26.141191][ T10] usb 1-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 26.151367][ T10] usb 1-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 26.160969][ T10] usb 1-1: New USB device found, idVendor=08b7, idProduct=0000, bcdDevice= 0.00 [ 26.170072][ T10] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=3 [ 26.178128][ T10] usb 1-1: SerialNumber: syz [ 26.374060][ T330] acrux 0003:1A34:0802.0006: item fetching failed at offset 0/1 [ 26.381979][ T330] acrux 0003:1A34:0802.0006: parse failed [ 26.388861][ T330] acrux 0003:1A34:0802.0006: probe with driver acrux failed with error -22 [ 26.389574][ T10] usb 1-1: 0:2 : does not exist [ 26.407569][ T10] usb 1-1: USB disconnect, device number 4 [ 26.574781][ T404] usb 2-1: USB disconnect, device number 3 [ 26.656530][ T36] audit: type=1400 audit(1772205297.179:120): avc: denied { create } for pid=409 comm="syz.3.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 26.681800][ T36] audit: type=1400 audit(1772205297.179:121): avc: denied { setopt } for pid=409 comm="syz.3.28" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 26.701909][ T36] audit: type=1400 audit(1772205297.179:122): avc: denied { connect } for pid=409 comm="syz.3.28" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 26.722578][ T36] audit: type=1400 audit(1772205297.179:123): avc: denied { write } for pid=409 comm="syz.3.28" laddr=fe80::2c50:a9ff:fefe:905f lport=58 faddr=ff02::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 26.733435][ T412] 9pnet: p9_errstr2errno: server reported unknown error ÿ [ 26.792525][ T36] audit: type=1400 audit(1772205297.319:124): avc: denied { setattr } for pid=416 comm="syz.3.31" name="tun" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 26.822898][ T36] audit: type=1400 audit(1772205297.349:125): avc: denied { write } for pid=418 comm="syz.3.32" name="mcfilter" dev="proc" ino=4026532520 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 26.930486][ T425] tmpfs: Unknown parameter 'fscon18446744073709551615' [ 26.938044][ T36] audit: type=1400 audit(1772205297.459:126): avc: denied { write } for pid=424 comm="syz.0.34" name="001" dev="devtmpfs" ino=111 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 28.263134][ T488] syzkaller1: entered promiscuous mode [ 28.268672][ T488] syzkaller1: entered allmulticast mode [ 28.976294][ T506] capability: warning: `syz.3.70' uses 32-bit capabilities (legacy support in use) [ 29.140068][ T54] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 30.333221][ T36] kauditd_printk_skb: 126 callbacks suppressed [ 30.333238][ T36] audit: type=1400 audit(1772205300.859:253): avc: denied { read write } for pid=294 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 30.363544][ T36] audit: type=1400 audit(1772205300.859:254): avc: denied { read write } for pid=294 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 30.387544][ T36] audit: type=1400 audit(1772205300.859:255): avc: denied { read write } for pid=544 comm="syz.2.89" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 30.508681][ T36] audit: type=1400 audit(1772205301.029:256): avc: denied { read write } for pid=293 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 30.534999][ T36] audit: type=1400 audit(1772205301.059:257): avc: denied { create } for pid=546 comm="syz.0.90" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 30.558356][ T36] audit: type=1400 audit(1772205301.079:258): avc: denied { read write } for pid=293 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 30.582545][ T36] audit: type=1400 audit(1772205301.089:259): avc: denied { read } for pid=548 comm="syz.0.91" name="binder1" dev="binder" ino=11 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 [ 30.605072][ T36] audit: type=1400 audit(1772205301.089:260): avc: denied { read write } for pid=293 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 30.629294][ T36] audit: type=1400 audit(1772205301.109:261): avc: denied { read write } for pid=293 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 30.715224][ T36] audit: type=1400 audit(1772205301.239:262): avc: denied { read write } for pid=289 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 31.943005][ T601] syzkaller0: tun_chr_ioctl cmd 1074025676 [ 31.948827][ T601] syzkaller0: owner set to 0 [ 33.391527][ T13] Bluetooth: hci0: Frame reassembly failed (-84) [ 33.753409][ T744] netlink: 'syz.2.187': attribute type 4 has an invalid length. [ 35.324425][ T46] Bluetooth: hci1: Frame reassembly failed (-84) [ 35.343618][ T36] kauditd_printk_skb: 282 callbacks suppressed [ 35.343633][ T36] audit: type=1400 audit(1772205305.869:545): avc: denied { read write } for pid=293 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 35.374283][ T36] audit: type=1400 audit(1772205305.869:546): avc: denied { read write } for pid=821 comm="syz.0.225" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 35.398794][ T36] audit: type=1400 audit(1772205305.879:547): avc: denied { read write } for pid=293 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 35.422940][ T36] audit: type=1400 audit(1772205305.899:548): avc: denied { read } for pid=823 comm="syz.0.226" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 35.445945][ T36] audit: type=1400 audit(1772205305.899:549): avc: denied { read write } for pid=293 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 35.469945][ T820] Bluetooth: hci0: command 0x1003 tx timeout [ 35.472443][ T54] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 35.475974][ T36] audit: type=1400 audit(1772205305.949:550): avc: denied { read write } for pid=294 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 35.531943][ T36] audit: type=1400 audit(1772205305.949:551): avc: denied { mounton } for pid=827 comm="syz.2.228" path="/84/file0" dev="tmpfs" ino=451 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 35.556360][ T36] audit: type=1400 audit(1772205305.949:552): avc: denied { read write } for pid=294 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 35.580776][ T36] audit: type=1400 audit(1772205305.969:553): avc: denied { mounton } for pid=825 comm="syz.0.227" path="/49/file0" dev="tmpfs" ino=277 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 35.603651][ T36] audit: type=1400 audit(1772205305.969:554): avc: denied { mounton } for pid=825 comm="syz.0.227" path="/49/file0" dev="tmpfs" ino=277 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 36.156415][ T876] netlink: 'syz.2.252': attribute type 9 has an invalid length. [ 37.380087][ T820] Bluetooth: hci1: command 0x1003 tx timeout [ 37.380083][ T434] Bluetooth: hci1: Opcode 0x1003 failed: -110 [ 38.759022][ T13] Bluetooth: hci1: Frame reassembly failed (-84) [ 39.220069][ T820] Bluetooth: hci0: command 0x1003 tx timeout [ 39.220069][ T54] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 40.398806][ T36] kauditd_printk_skb: 328 callbacks suppressed [ 40.398903][ T36] audit: type=1400 audit(1772205310.919:883): avc: denied { read write } for pid=294 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 40.429152][ T36] audit: type=1400 audit(1772205310.929:884): avc: denied { read } for pid=1074 comm="syz.2.350" name="ashmem" dev="devtmpfs" ino=201 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 40.452863][ T36] audit: type=1400 audit(1772205310.939:885): avc: denied { read write } for pid=294 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 40.476793][ T36] audit: type=1400 audit(1772205310.979:886): avc: denied { read write } for pid=1076 comm="syz.2.351" name="fuse" dev="devtmpfs" ino=23 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=0 [ 40.499930][ T36] audit: type=1400 audit(1772205310.979:887): avc: denied { mounton } for pid=1076 comm="syz.2.351" path="/123/file0" dev="tmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 40.522660][ T36] audit: type=1400 audit(1772205310.999:888): avc: denied { read write } for pid=294 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 40.546747][ T36] audit: type=1400 audit(1772205311.019:889): avc: denied { read } for pid=1078 comm="syz.2.352" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 40.569193][ T36] audit: type=1400 audit(1772205311.019:890): avc: denied { read write } for pid=294 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 40.593230][ T36] audit: type=1400 audit(1772205311.049:891): avc: denied { read write } for pid=1080 comm="syz.2.353" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 40.617526][ T36] audit: type=1400 audit(1772205311.119:892): avc: denied { read write } for pid=294 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 40.820071][ T434] Bluetooth: hci1: Opcode 0x1003 failed: -110 [ 40.820079][ T54] Bluetooth: hci1: command 0x1003 tx timeout [ 44.664448][ T1320] TCP: TCP_TX_DELAY enabled [ 45.559945][ T36] kauditd_printk_skb: 382 callbacks suppressed [ 45.559961][ T36] audit: type=1400 audit(1772205316.079:1275): avc: denied { read write } for pid=289 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 45.590428][ T36] audit: type=1400 audit(1772205316.089:1276): avc: denied { read write } for pid=1352 comm="syz.1.486" name="udmabuf" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 45.613632][ T36] audit: type=1400 audit(1772205316.099:1277): avc: denied { read write } for pid=289 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 45.637990][ T36] audit: type=1400 audit(1772205316.119:1278): avc: denied { read } for pid=1354 comm="syz.1.487" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 45.660584][ T36] audit: type=1400 audit(1772205316.119:1279): avc: denied { read write } for pid=289 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 45.684709][ T36] audit: type=1400 audit(1772205316.139:1280): avc: denied { read write } for pid=1356 comm="syz.1.488" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 45.708054][ T36] audit: type=1400 audit(1772205316.149:1281): avc: denied { read write } for pid=289 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 45.732289][ T36] audit: type=1400 audit(1772205316.159:1282): avc: denied { read } for pid=1358 comm="syz.1.489" dev="nsfs" ino=4026532297 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 45.753973][ T36] audit: type=1400 audit(1772205316.239:1283): avc: denied { read write } for pid=293 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 45.778496][ T36] audit: type=1400 audit(1772205316.239:1284): avc: denied { read write } for pid=1361 comm="syz.0.490" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 47.700092][ T54] Bluetooth: hci0: command 0x1003 tx timeout [ 47.700100][ T434] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 48.323891][ T334] Bluetooth: hci0: Frame reassembly failed (-84) [ 49.456645][ T1498] netlink: 679 bytes leftover after parsing attributes in process `syz.1.557'. [ 50.003148][ T1510] netlink: 'syz.1.563': attribute type 4 has an invalid length. [ 50.340117][ T54] Bluetooth: hci0: command 0x1003 tx timeout [ 50.340185][ T434] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 50.665743][ T36] kauditd_printk_skb: 208 callbacks suppressed [ 50.665759][ T36] audit: type=1400 audit(1772205321.189:1493): avc: denied { read write } for pid=295 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 50.696164][ T36] audit: type=1400 audit(1772205321.199:1494): avc: denied { create } for pid=1526 comm="syz.3.571" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 50.716785][ T36] audit: type=1400 audit(1772205321.199:1495): avc: denied { create } for pid=1526 comm="syz.3.571" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 50.737616][ T36] audit: type=1400 audit(1772205321.199:1496): avc: denied { read write } for pid=295 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 50.763053][ T36] audit: type=1400 audit(1772205321.219:1497): avc: denied { read write } for pid=1528 comm="syz.3.572" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 50.786134][ T36] audit: type=1400 audit(1772205321.219:1498): avc: denied { execmem } for pid=1528 comm="syz.3.572" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 50.805573][ T36] audit: type=1400 audit(1772205321.219:1499): avc: denied { read write } for pid=295 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 50.830469][ T36] audit: type=1400 audit(1772205321.259:1500): avc: denied { mount } for pid=1530 comm="syz.3.573" name="/" dev="configfs" ino=2493 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=0 [ 50.854223][ T36] audit: type=1400 audit(1772205321.259:1501): avc: denied { read write } for pid=295 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 50.880219][ T36] audit: type=1400 audit(1772205321.309:1502): avc: denied { mount } for pid=1532 comm="syz.3.574" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=0 [ 50.977419][ T46] Bluetooth: hci0: Frame reassembly failed (-84) [ 51.484226][ T334] Bluetooth: hci1: Frame reassembly failed (-84) [ 52.447153][ T1607] netlink: 'syz.0.609': attribute type 4 has an invalid length. [ 52.979988][ T434] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 52.979997][ T820] Bluetooth: hci0: command 0x1003 tx timeout [ 53.539984][ T54] Bluetooth: hci1: Opcode 0x1003 failed: -110 [ 53.543758][ T434] Bluetooth: hci1: command 0x1003 tx timeout [ 53.597950][ T1652] netlink: 'syz.3.630': attribute type 33 has an invalid length. [ 55.672239][ T36] kauditd_printk_skb: 271 callbacks suppressed [ 55.672256][ T36] audit: type=1400 audit(1772205326.200:1774): avc: denied { read write } for pid=1744 comm="syz.3.671" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 55.701953][ T36] audit: type=1400 audit(1772205326.220:1775): avc: denied { read write } for pid=293 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 55.725954][ T36] audit: type=1400 audit(1772205326.230:1776): avc: denied { create } for pid=1746 comm="syz.0.672" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=0 [ 55.745384][ T36] audit: type=1400 audit(1772205326.230:1777): avc: denied { name_bind } for pid=1746 comm="syz.0.672" src=24097 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=0 [ 55.766988][ T36] audit: type=1400 audit(1772205326.230:1778): avc: denied { name_bind } for pid=1746 comm="syz.0.672" src=24097 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=0 [ 55.788549][ T36] audit: type=1400 audit(1772205326.230:1779): avc: denied { read write } for pid=293 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 55.812540][ T36] audit: type=1400 audit(1772205326.240:1780): avc: denied { read } for pid=1748 comm="syz.0.673" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 55.835165][ T36] audit: type=1400 audit(1772205326.240:1781): avc: denied { read write } for pid=1748 comm="syz.0.673" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 55.858334][ T36] audit: type=1400 audit(1772205326.240:1782): avc: denied { read write } for pid=293 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 55.882915][ T36] audit: type=1400 audit(1772205326.250:1783): avc: denied { read write } for pid=1750 comm="syz.0.674" name="udmabuf" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 57.871548][ T1941] netlink: 'syz.0.766': attribute type 27 has an invalid length. [ 57.885267][ T1941] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.892437][ T1941] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.954297][ T1950] netlink: 4 bytes leftover after parsing attributes in process `syz.3.770'. [ 60.405267][ T2077] mmap: syz.1.828 (2077) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 60.417354][ T2077] ªªªªªª: renamed from vlan0 (while UP) [ 60.542149][ T2081] syzkaller0: entered promiscuous mode [ 60.547765][ T2081] syzkaller0: entered allmulticast mode [ 60.704908][ T36] kauditd_printk_skb: 476 callbacks suppressed [ 60.704924][ T36] audit: type=1400 audit(1772205331.230:2260): avc: denied { read write } for pid=289 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 60.735124][ T36] audit: type=1400 audit(1772205331.230:2261): avc: denied { read } for pid=2090 comm="syz.1.834" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 60.757884][ T36] audit: type=1400 audit(1772205331.240:2262): avc: denied { append } for pid=2090 comm="syz.1.834" name="ptp0" dev="devtmpfs" ino=196 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=0 [ 60.781908][ T36] audit: type=1400 audit(1772205331.240:2263): avc: denied { read write } for pid=289 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 60.806679][ T36] audit: type=1400 audit(1772205331.250:2264): avc: denied { name_bind } for pid=2092 comm="syz.1.835" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 60.828614][ T36] audit: type=1400 audit(1772205331.260:2265): avc: denied { read write } for pid=289 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 60.853105][ T36] audit: type=1400 audit(1772205331.260:2266): avc: denied { read write } for pid=2094 comm="syz.1.836" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 60.876858][ T36] audit: type=1400 audit(1772205331.290:2267): avc: denied { read write } for pid=293 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 60.907489][ T36] audit: type=1400 audit(1772205331.300:2268): avc: denied { read write } for pid=2096 comm="syz.0.837" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 60.930944][ T36] audit: type=1400 audit(1772205331.300:2269): avc: denied { read } for pid=2096 comm="syz.0.837" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 63.849117][ T2241] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=2241 comm=syz.1.904 [ 63.860341][ T2243] bridge0: port 1(bridge_slave_0) entered disabled state [ 63.942269][ T2257] syz.2.911 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 65.097338][ T2299] GUP no longer grows the stack in syz.3.930 (2299): 200000005000-200000008000 (200000004000) [ 65.107698][ T2299] CPU: 0 UID: 0 PID: 2299 Comm: syz.3.930 Not tainted syzkaller #0 0f1aaf4ea31c6587efab90ed4dfa0b6225873f33 [ 65.107724][ T2299] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 65.107732][ T2299] Call Trace: [ 65.107737][ T2299] [ 65.107742][ T2299] __dump_stack+0x21/0x30 [ 65.107762][ T2299] dump_stack_lvl+0x140/0x1c0 [ 65.107775][ T2299] ? __cfi_dump_stack_lvl+0x10/0x10 [ 65.107788][ T2299] ? futex_lock_pi_atomic+0xe3/0xcd0 [ 65.107802][ T2299] dump_stack+0x19/0x20 [ 65.107813][ T2299] fixup_user_fault+0x62a/0x6b0 [ 65.107828][ T2299] fault_in_user_writeable+0x75/0xe0 [ 65.107839][ T2299] futex_lock_pi+0x2d7/0xa70 [ 65.107851][ T2299] ? __cfi_futex_lock_pi+0x10/0x10 [ 65.107864][ T2299] ? __cfi_futex_wake_mark+0x10/0x10 [ 65.107877][ T2299] ? futex_setup_timer+0xb4/0xd0 [ 65.107887][ T2299] ? __cfi_futex_wake_mark+0x10/0x10 [ 65.107900][ T2299] ? __cfi_userfaultfd_unmap_complete+0x10/0x10 [ 65.107913][ T2299] ? mas_find+0x358/0x5f0 [ 65.107926][ T2299] do_futex+0x270/0x510 [ 65.107936][ T2299] ? do_vmi_munmap+0x245/0x2e0 [ 65.107949][ T2299] ? __cfi_do_futex+0x10/0x10 [ 65.107960][ T2299] ? __vm_munmap+0x2de/0x390 [ 65.107973][ T2299] __se_sys_futex+0x13c/0x320 [ 65.107985][ T2299] ? __x64_sys_futex+0x110/0x110 [ 65.107997][ T2299] ? __kasan_check_write+0x18/0x20 [ 65.108009][ T2299] __x64_sys_futex+0xe9/0x110 [ 65.108021][ T2299] x64_sys_call+0x227f/0x2ee0 [ 65.108034][ T2299] do_syscall_64+0x57/0xf0 [ 65.108080][ T2299] ? clear_bhb_loop+0x50/0xa0 [ 65.108090][ T2299] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 65.108107][ T2299] RIP: 0033:0x7fd91a99c799 [ 65.108121][ T2299] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 65.108130][ T2299] RSP: 002b:00007fd91b812028 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 65.108147][ T2299] RAX: ffffffffffffffda RBX: 00007fd91ac15fa0 RCX: 00007fd91a99c799 [ 65.108155][ T2299] RDX: 0000000000000000 RSI: 000000000000008d RDI: 0000200000004000 [ 65.108163][ T2299] RBP: 00007fd91aa32bd9 R08: 0000000000000000 R09: 0000000000000000 [ 65.108170][ T2299] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 65.108176][ T2299] R13: 00007fd91ac16038 R14: 00007fd91ac15fa0 R15: 00007ffcbed708e8 [ 65.108185][ T2299] [ 65.346234][ T2308] kernel profiling enabled (shift: 63) [ 65.351766][ T2308] profiling shift: 63 too large [ 65.357768][ T2308] kernel profiling enabled (shift: 0) [ 65.742373][ T36] kauditd_printk_skb: 344 callbacks suppressed [ 65.742390][ T36] audit: type=1400 audit(1772205336.270:2614): avc: denied { read write } for pid=293 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 65.772720][ T36] audit: type=1400 audit(1772205336.270:2615): avc: denied { read write } for pid=2315 comm="syz.0.936" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 65.795821][ T36] audit: type=1400 audit(1772205336.270:2616): avc: denied { create } for pid=2315 comm="syz.0.936" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 65.816200][ T36] audit: type=1400 audit(1772205336.270:2617): avc: denied { create } for pid=2315 comm="syz.0.936" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 65.836601][ T36] audit: type=1400 audit(1772205336.270:2618): avc: denied { create } for pid=2315 comm="syz.0.936" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 [ 65.855923][ T36] audit: type=1400 audit(1772205336.290:2619): avc: denied { read } for pid=2315 comm="syz.0.936" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 65.878598][ T36] audit: type=1400 audit(1772205336.290:2620): avc: denied { mounton } for pid=2315 comm="syz.0.936" path="/244/file0" dev="tmpfs" ino=1312 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 65.901125][ T36] audit: type=1400 audit(1772205336.300:2621): avc: denied { read write } for pid=293 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 65.925092][ T36] audit: type=1400 audit(1772205336.310:2622): avc: denied { create } for pid=2317 comm="syz.0.937" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 65.944886][ T36] audit: type=1400 audit(1772205336.310:2623): avc: denied { read } for pid=2317 comm="syz.0.937" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 66.044123][ T2320] netlink: 4 bytes leftover after parsing attributes in process `syz.1.938'. [ 67.393668][ T2351] syzkaller0: entered promiscuous mode [ 67.399176][ T2351] syzkaller0: entered allmulticast mode [ 67.409287][ T2353] netlink: 'syz.0.951': attribute type 33 has an invalid length. [ 68.162028][ T2369] FAULT_INJECTION: forcing a failure. [ 68.162028][ T2369] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 68.175348][ T2369] CPU: 1 UID: 0 PID: 2369 Comm: syz.2.958 Not tainted syzkaller #0 0f1aaf4ea31c6587efab90ed4dfa0b6225873f33 [ 68.175378][ T2369] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 68.175390][ T2369] Call Trace: [ 68.175397][ T2369] [ 68.175403][ T2369] __dump_stack+0x21/0x30 [ 68.175431][ T2369] dump_stack_lvl+0x140/0x1c0 [ 68.175453][ T2369] ? __cfi_dump_stack_lvl+0x10/0x10 [ 68.175476][ T2369] ? check_stack_object+0x12b/0x150 [ 68.175498][ T2369] dump_stack+0x19/0x20 [ 68.175515][ T2369] should_fail_ex+0x3d7/0x530 [ 68.175535][ T2369] should_fail+0xf/0x20 [ 68.175551][ T2369] should_fail_usercopy+0x1e/0x30 [ 68.175570][ T2369] _copy_to_user+0x24/0xa0 [ 68.175591][ T2369] simple_read_from_buffer+0xed/0x160 [ 68.175617][ T2369] proc_fail_nth_read+0x1aa/0x220 [ 68.175634][ T2369] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 68.175650][ T2369] ? bpf_lsm_file_permission+0xd/0x20 [ 68.175666][ T2369] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 68.175683][ T2369] vfs_read+0x289/0xcb0 [ 68.175704][ T2369] ? __cfi_vfs_read+0x10/0x10 [ 68.175722][ T2369] ? __kasan_check_write+0x18/0x20 [ 68.175742][ T2369] ? mutex_lock+0x97/0x1d0 [ 68.175763][ T2369] ? __cfi_mutex_lock+0x10/0x10 [ 68.175782][ T2369] ? __fget_files+0x2c5/0x340 [ 68.175805][ T2369] ksys_read+0x145/0x260 [ 68.175825][ T2369] ? __cfi_ksys_read+0x10/0x10 [ 68.175853][ T2369] ? __kasan_check_read+0x15/0x20 [ 68.175873][ T2369] __x64_sys_read+0x7f/0x90 [ 68.175894][ T2369] x64_sys_call+0x2638/0x2ee0 [ 68.175919][ T2369] do_syscall_64+0x57/0xf0 [ 68.175936][ T2369] ? clear_bhb_loop+0x50/0xa0 [ 68.175955][ T2369] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 68.175982][ T2369] RIP: 0033:0x7fe2f975cfce [ 68.175998][ T2369] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 68.176013][ T2369] RSP: 002b:00007fe2fa6f0fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 68.176034][ T2369] RAX: ffffffffffffffda RBX: 00007fe2fa6f16c0 RCX: 00007fe2f975cfce [ 68.176049][ T2369] RDX: 000000000000000f RSI: 00007fe2fa6f10a0 RDI: 0000000000000003 [ 68.176061][ T2369] RBP: 00007fe2fa6f1090 R08: 0000000000000000 R09: 0000000000000000 [ 68.176073][ T2369] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 68.176085][ T2369] R13: 00007fe2f9a16038 R14: 00007fe2f9a15fa0 R15: 00007ffc65e68578 [ 68.176100][ T2369] [ 68.245529][ T2381] FAULT_INJECTION: forcing a failure. [ 68.245529][ T2381] name failslab, interval 1, probability 0, space 0, times 1 [ 68.427766][ T2381] CPU: 1 UID: 0 PID: 2381 Comm: syz.0.964 Not tainted syzkaller #0 0f1aaf4ea31c6587efab90ed4dfa0b6225873f33 [ 68.427798][ T2381] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 68.427808][ T2381] Call Trace: [ 68.427813][ T2381] [ 68.427820][ T2381] __dump_stack+0x21/0x30 [ 68.427846][ T2381] dump_stack_lvl+0x140/0x1c0 [ 68.427865][ T2381] ? __cfi_dump_stack_lvl+0x10/0x10 [ 68.427884][ T2381] ? kmem_cache_alloc_noprof+0x1bf/0x410 [ 68.427904][ T2381] ? inode_init_always_gfp+0x756/0x9e0 [ 68.427927][ T2381] ? alloc_inode+0xc5/0x270 [ 68.427949][ T2381] ? new_inode+0x25/0x1e0 [ 68.427971][ T2381] ? proc_pident_instantiate+0x6d/0x2c0 [ 68.427995][ T2381] dump_stack+0x19/0x20 [ 68.428018][ T2381] should_fail_ex+0x3d7/0x530 [ 68.428031][ T2381] should_failslab+0xac/0x100 [ 68.428045][ T2381] kmem_cache_alloc_noprof+0x42/0x410 [ 68.428057][ T2381] ? vm_area_dup+0x42/0x570 [ 68.428067][ T2381] ? avc_has_perm_noaudit+0x26c/0x360 [ 68.428081][ T2381] vm_area_dup+0x42/0x570 [ 68.428090][ T2381] __split_vma+0x1d5/0xab0 [ 68.428110][ T2381] ? vms_gather_munmap_vmas+0xdd0/0xdd0 [ 68.428123][ T2381] ? mas_find+0x3f1/0x5f0 [ 68.428137][ T2381] vms_gather_munmap_vmas+0x428/0xdd0 [ 68.428152][ T2381] do_vmi_align_munmap+0x251/0x610 [ 68.428166][ T2381] ? __cfi_do_vmi_align_munmap+0x10/0x10 [ 68.428179][ T2381] ? mas_walk+0x3f7/0x650 [ 68.428192][ T2381] ? mas_find+0x358/0x5f0 [ 68.428204][ T2381] do_vmi_munmap+0x245/0x2e0 [ 68.428217][ T2381] do_munmap+0xfc/0x160 [ 68.428230][ T2381] ? __cfi_do_munmap+0x10/0x10 [ 68.428243][ T2381] ? __cfi_mtree_load+0x10/0x10 [ 68.428256][ T2381] mremap_to+0x326/0x610 [ 68.428267][ T2381] __se_sys_mremap+0x5af/0xfe0 [ 68.428277][ T2381] ? __cfi_vfs_write+0x10/0x10 [ 68.428290][ T2381] ? __x64_sys_mremap+0xf0/0xf0 [ 68.428299][ T2381] ? __kasan_check_write+0x18/0x20 [ 68.428311][ T2381] ? mutex_unlock+0x90/0x240 [ 68.428322][ T2381] ? __cfi_mutex_unlock+0x10/0x10 [ 68.428334][ T2381] ? __fget_files+0x2c5/0x340 [ 68.428348][ T2381] ? __kasan_check_write+0x18/0x20 [ 68.428359][ T2381] ? fput+0x1a4/0x240 [ 68.428368][ T2381] ? ksys_write+0x1f3/0x260 [ 68.428380][ T2381] ? __cfi_ksys_write+0x10/0x10 [ 68.428392][ T2381] __x64_sys_mremap+0xc3/0xf0 [ 68.428402][ T2381] x64_sys_call+0x2ac4/0x2ee0 [ 68.428416][ T2381] do_syscall_64+0x57/0xf0 [ 68.428425][ T2381] ? clear_bhb_loop+0x50/0xa0 [ 68.428435][ T2381] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 68.428451][ T2381] RIP: 0033:0x7f633d39c799 [ 68.428461][ T2381] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 68.428470][ T2381] RSP: 002b:00007f633e1f3028 EFLAGS: 00000246 ORIG_RAX: 0000000000000019 [ 68.428482][ T2381] RAX: ffffffffffffffda RBX: 00007f633d615fa0 RCX: 00007f633d39c799 [ 68.428490][ T2381] RDX: 0000000000400000 RSI: 0000000000001000 RDI: 0000200000a96000 [ 68.428497][ T2381] RBP: 00007f633e1f3090 R08: 0000200000000000 R09: 0000000000000000 [ 68.428505][ T2381] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000001 [ 68.428511][ T2381] R13: 00007f633d616038 R14: 00007f633d615fa0 R15: 00007ffec25e7aa8 [ 68.428520][ T2381] [ 68.439500][ T2394] FAULT_INJECTION: forcing a failure. [ 68.439500][ T2394] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 68.755512][ T2394] CPU: 1 UID: 0 PID: 2394 Comm: syz.0.970 Not tainted syzkaller #0 0f1aaf4ea31c6587efab90ed4dfa0b6225873f33 [ 68.755540][ T2394] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 68.755550][ T2394] Call Trace: [ 68.755556][ T2394] [ 68.755562][ T2394] __dump_stack+0x21/0x30 [ 68.755587][ T2394] dump_stack_lvl+0x140/0x1c0 [ 68.755604][ T2394] ? __cfi_dump_stack_lvl+0x10/0x10 [ 68.755623][ T2394] ? check_stack_object+0x12b/0x150 [ 68.755642][ T2394] dump_stack+0x19/0x20 [ 68.755659][ T2394] should_fail_ex+0x3d7/0x530 [ 68.755678][ T2394] should_fail+0xf/0x20 [ 68.755692][ T2394] should_fail_usercopy+0x1e/0x30 [ 68.755709][ T2394] _copy_to_user+0x24/0xa0 [ 68.755729][ T2394] simple_read_from_buffer+0xed/0x160 [ 68.755754][ T2394] proc_fail_nth_read+0x1aa/0x220 [ 68.755772][ T2394] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 68.755788][ T2394] ? bpf_lsm_file_permission+0xd/0x20 [ 68.755805][ T2394] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 68.755821][ T2394] vfs_read+0x289/0xcb0 [ 68.755842][ T2394] ? __cfi_vfs_read+0x10/0x10 [ 68.755860][ T2394] ? __kasan_check_write+0x18/0x20 [ 68.755881][ T2394] ? mutex_lock+0x97/0x1d0 [ 68.755902][ T2394] ? __cfi_mutex_lock+0x10/0x10 [ 68.755923][ T2394] ? __fget_files+0x2c5/0x340 [ 68.755949][ T2394] ksys_read+0x145/0x260 [ 68.755969][ T2394] ? __cfi_ksys_read+0x10/0x10 [ 68.755991][ T2394] ? __kasan_check_read+0x15/0x20 [ 68.756017][ T2394] __x64_sys_read+0x7f/0x90 [ 68.756038][ T2394] x64_sys_call+0x2638/0x2ee0 [ 68.756063][ T2394] do_syscall_64+0x57/0xf0 [ 68.756086][ T2394] ? clear_bhb_loop+0x50/0xa0 [ 68.756104][ T2394] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 68.756130][ T2394] RIP: 0033:0x7f633d35cfce [ 68.756146][ T2394] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 68.756160][ T2394] RSP: 002b:00007f633e1f2fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 68.756181][ T2394] RAX: ffffffffffffffda RBX: 00007f633e1f36c0 RCX: 00007f633d35cfce [ 68.756195][ T2394] RDX: 000000000000000f RSI: 00007f633e1f30a0 RDI: 0000000000000003 [ 68.756207][ T2394] RBP: 00007f633e1f3090 R08: 0000000000000000 R09: 0000000000000000 [ 68.756218][ T2394] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 68.756230][ T2394] R13: 00007f633d616038 R14: 00007f633d615fa0 R15: 00007ffec25e7aa8 [ 68.756246][ T2394] [ 69.102783][ T2414] FAULT_INJECTION: forcing a failure. [ 69.102783][ T2414] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 69.115920][ T2414] CPU: 0 UID: 0 PID: 2414 Comm: syz.3.979 Not tainted syzkaller #0 0f1aaf4ea31c6587efab90ed4dfa0b6225873f33 [ 69.115950][ T2414] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 69.115960][ T2414] Call Trace: [ 69.115968][ T2414] [ 69.115975][ T2414] __dump_stack+0x21/0x30 [ 69.115996][ T2414] dump_stack_lvl+0x140/0x1c0 [ 69.116008][ T2414] ? __cfi_dump_stack_lvl+0x10/0x10 [ 69.116024][ T2414] dump_stack+0x19/0x20 [ 69.116036][ T2414] should_fail_ex+0x3d7/0x530 [ 69.116047][ T2414] should_fail+0xf/0x20 [ 69.116056][ T2414] should_fail_usercopy+0x1e/0x30 [ 69.116067][ T2414] _copy_from_user+0x20/0xa0 [ 69.116080][ T2414] sk_setsockopt+0x2b5/0x2ab0 [ 69.116095][ T2414] ? __cfi_sk_setsockopt+0x10/0x10 [ 69.116108][ T2414] ? selinux_socket_setsockopt+0x324/0x3d0 [ 69.116123][ T2414] ? bpf_lsm_file_permission+0xd/0x20 [ 69.116133][ T2414] ? vfs_write+0x9a4/0xf90 [ 69.116146][ T2414] ? __cfi_vfs_write+0x10/0x10 [ 69.116158][ T2414] sock_setsockopt+0x5e/0x70 [ 69.116171][ T2414] do_sock_setsockopt+0x211/0x410 [ 69.116186][ T2414] ? __cfi_do_sock_setsockopt+0x10/0x10 [ 69.116201][ T2414] __x64_sys_setsockopt+0x1b7/0x250 [ 69.116216][ T2414] x64_sys_call+0x2adc/0x2ee0 [ 69.116230][ T2414] do_syscall_64+0x57/0xf0 [ 69.116240][ T2414] ? clear_bhb_loop+0x50/0xa0 [ 69.116250][ T2414] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 69.116265][ T2414] RIP: 0033:0x7fd91a99c799 [ 69.116275][ T2414] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 69.116290][ T2414] RSP: 002b:00007fd91b812028 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 69.116303][ T2414] RAX: ffffffffffffffda RBX: 00007fd91ac15fa0 RCX: 00007fd91a99c799 [ 69.116311][ T2414] RDX: 0000000000000015 RSI: 0000000000000001 RDI: 0000000000000003 [ 69.116318][ T2414] RBP: 00007fd91b812090 R08: 0000000000000010 R09: 0000000000000000 [ 69.116325][ T2414] R10: 0000200000000100 R11: 0000000000000246 R12: 0000000000000001 [ 69.116332][ T2414] R13: 00007fd91ac16038 R14: 00007fd91ac15fa0 R15: 00007ffcbed708e8 [ 69.116341][ T2414] [ 69.440189][ T2439] FAULT_INJECTION: forcing a failure. [ 69.440189][ T2439] name failslab, interval 1, probability 0, space 0, times 0 [ 69.452865][ T2439] CPU: 0 UID: 0 PID: 2439 Comm: syz.3.990 Not tainted syzkaller #0 0f1aaf4ea31c6587efab90ed4dfa0b6225873f33 [ 69.452884][ T2439] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 69.452890][ T2439] Call Trace: [ 69.452894][ T2439] [ 69.452899][ T2439] __dump_stack+0x21/0x30 [ 69.452918][ T2439] dump_stack_lvl+0x140/0x1c0 [ 69.452930][ T2439] ? __cfi_dump_stack_lvl+0x10/0x10 [ 69.452943][ T2439] ? avc_has_perm_noaudit+0x28a/0x360 [ 69.452957][ T2439] dump_stack+0x19/0x20 [ 69.452969][ T2439] should_fail_ex+0x3d7/0x530 [ 69.452980][ T2439] should_failslab+0xac/0x100 [ 69.452994][ T2439] __kmalloc_node_noprof+0x6c/0x4f0 [ 69.453008][ T2439] ? downgrade_write+0x460/0x460 [ 69.453022][ T2439] ? __kvmalloc_node_noprof+0x128/0x300 [ 69.453040][ T2439] __kvmalloc_node_noprof+0x128/0x300 [ 69.453051][ T2439] ? __cfi___kvmalloc_node_noprof+0x10/0x10 [ 69.453063][ T2439] ? __kasan_check_write+0x18/0x20 [ 69.453075][ T2439] keyctl_read_key+0x26a/0x540 [ 69.453088][ T2439] __se_sys_keyctl+0x6c8/0xe50 [ 69.453101][ T2439] ? __x64_sys_keyctl+0xf0/0xf0 [ 69.453114][ T2439] ? __kasan_check_write+0x18/0x20 [ 69.453125][ T2439] ? mutex_unlock+0x90/0x240 [ 69.453138][ T2439] ? __cfi_mutex_unlock+0x10/0x10 [ 69.453149][ T2439] ? __fget_files+0x2c5/0x340 [ 69.453164][ T2439] ? __kasan_check_write+0x18/0x20 [ 69.453175][ T2439] ? fput+0x1a4/0x240 [ 69.453184][ T2439] ? ksys_write+0x1f3/0x260 [ 69.453197][ T2439] ? __cfi_ksys_write+0x10/0x10 [ 69.453209][ T2439] __x64_sys_keyctl+0xc3/0xf0 [ 69.453222][ T2439] x64_sys_call+0x996/0x2ee0 [ 69.453235][ T2439] do_syscall_64+0x57/0xf0 [ 69.453244][ T2439] ? clear_bhb_loop+0x50/0xa0 [ 69.453255][ T2439] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 69.453270][ T2439] RIP: 0033:0x7fd91a99c799 [ 69.453280][ T2439] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 69.453289][ T2439] RSP: 002b:00007fd91b812028 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 69.453301][ T2439] RAX: ffffffffffffffda RBX: 00007fd91ac15fa0 RCX: 00007fd91a99c799 [ 69.453309][ T2439] RDX: 0000200000000280 RSI: 00000000271dd210 RDI: 000000000000000b [ 69.453317][ T2439] RBP: 00007fd91b812090 R08: 0000000000000000 R09: 0000000000000000 [ 69.453323][ T2439] R10: 0000000000001001 R11: 0000000000000246 R12: 0000000000000001 [ 69.453330][ T2439] R13: 00007fd91ac16038 R14: 00007fd91ac15fa0 R15: 00007ffcbed708e8 [ 69.453339][ T2439] [ 69.558303][ T2442] netlink: 1343 bytes leftover after parsing attributes in process `syz.2.992'. [ 69.732234][ T2448] FAULT_INJECTION: forcing a failure. [ 69.732234][ T2448] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 69.745323][ T2448] CPU: 0 UID: 0 PID: 2448 Comm: syz.2.994 Not tainted syzkaller #0 0f1aaf4ea31c6587efab90ed4dfa0b6225873f33 [ 69.745351][ T2448] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 69.745362][ T2448] Call Trace: [ 69.745367][ T2448] [ 69.745371][ T2448] __dump_stack+0x21/0x30 [ 69.745390][ T2448] dump_stack_lvl+0x140/0x1c0 [ 69.745402][ T2448] ? __cfi_dump_stack_lvl+0x10/0x10 [ 69.745416][ T2448] dump_stack+0x19/0x20 [ 69.745427][ T2448] should_fail_ex+0x3d7/0x530 [ 69.745438][ T2448] should_fail+0xf/0x20 [ 69.745447][ T2448] should_fail_usercopy+0x1e/0x30 [ 69.745458][ T2448] _copy_from_user+0x20/0xa0 [ 69.745471][ T2448] sk_setsockopt+0x2b5/0x2ab0 [ 69.745485][ T2448] ? __cfi_sk_setsockopt+0x10/0x10 [ 69.745498][ T2448] ? selinux_socket_setsockopt+0x324/0x3d0 [ 69.745513][ T2448] ? bpf_lsm_file_permission+0xd/0x20 [ 69.745523][ T2448] ? vfs_write+0x9a4/0xf90 [ 69.745536][ T2448] ? __cfi_vfs_write+0x10/0x10 [ 69.745548][ T2448] sock_setsockopt+0x5e/0x70 [ 69.745561][ T2448] do_sock_setsockopt+0x211/0x410 [ 69.745577][ T2448] ? __cfi_do_sock_setsockopt+0x10/0x10 [ 69.745592][ T2448] __x64_sys_setsockopt+0x1b7/0x250 [ 69.745606][ T2448] x64_sys_call+0x2adc/0x2ee0 [ 69.745620][ T2448] do_syscall_64+0x57/0xf0 [ 69.745629][ T2448] ? clear_bhb_loop+0x50/0xa0 [ 69.745640][ T2448] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 69.745655][ T2448] RIP: 0033:0x7fe2f979c799 [ 69.745665][ T2448] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 69.745674][ T2448] RSP: 002b:00007fe2fa6f1028 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 69.745686][ T2448] RAX: ffffffffffffffda RBX: 00007fe2f9a15fa0 RCX: 00007fe2f979c799 [ 69.745694][ T2448] RDX: 0000000000000050 RSI: 0000000000000001 RDI: 0000000000000003 [ 69.745701][ T2448] RBP: 00007fe2fa6f1090 R08: 0000000000000004 R09: 0000000000000000 [ 69.745707][ T2448] R10: 0000200000002900 R11: 0000000000000246 R12: 0000000000000001 [ 69.745714][ T2448] R13: 00007fe2f9a16038 R14: 00007fe2f9a15fa0 R15: 00007ffc65e68578 [ 69.745723][ T2448] [ 69.990952][ T2460] FAULT_INJECTION: forcing a failure. [ 69.990952][ T2460] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 70.004079][ T2460] CPU: 0 UID: 0 PID: 2460 Comm: syz.0.1000 Not tainted syzkaller #0 0f1aaf4ea31c6587efab90ed4dfa0b6225873f33 [ 70.004106][ T2460] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 70.004115][ T2460] Call Trace: [ 70.004118][ T2460] [ 70.004123][ T2460] __dump_stack+0x21/0x30 [ 70.004141][ T2460] dump_stack_lvl+0x140/0x1c0 [ 70.004153][ T2460] ? __cfi_dump_stack_lvl+0x10/0x10 [ 70.004166][ T2460] ? check_stack_object+0x12b/0x150 [ 70.004180][ T2460] dump_stack+0x19/0x20 [ 70.004191][ T2460] should_fail_ex+0x3d7/0x530 [ 70.004203][ T2460] should_fail+0xf/0x20 [ 70.004212][ T2460] should_fail_usercopy+0x1e/0x30 [ 70.004223][ T2460] _copy_to_user+0x24/0xa0 [ 70.004236][ T2460] simple_read_from_buffer+0xed/0x160 [ 70.004252][ T2460] proc_fail_nth_read+0x1aa/0x220 [ 70.004263][ T2460] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 70.004273][ T2460] ? selinux_socket_setsockopt+0x324/0x3d0 [ 70.004288][ T2460] ? bpf_lsm_file_permission+0xd/0x20 [ 70.004298][ T2460] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 70.004308][ T2460] vfs_read+0x289/0xcb0 [ 70.004321][ T2460] ? __cfi_vfs_read+0x10/0x10 [ 70.004332][ T2460] ? __kasan_check_write+0x18/0x20 [ 70.004349][ T2460] ? mutex_lock+0x97/0x1d0 [ 70.004362][ T2460] ? __cfi_mutex_lock+0x10/0x10 [ 70.004373][ T2460] ? __fget_files+0x2c5/0x340 [ 70.004388][ T2460] ksys_read+0x145/0x260 [ 70.004404][ T2460] ? __cfi_ksys_read+0x10/0x10 [ 70.004415][ T2460] ? __kasan_check_write+0x18/0x20 [ 70.004427][ T2460] ? __kasan_check_read+0x15/0x20 [ 70.004439][ T2460] __x64_sys_read+0x7f/0x90 [ 70.004451][ T2460] x64_sys_call+0x2638/0x2ee0 [ 70.004465][ T2460] do_syscall_64+0x57/0xf0 [ 70.004474][ T2460] ? clear_bhb_loop+0x50/0xa0 [ 70.004484][ T2460] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 70.004499][ T2460] RIP: 0033:0x7f633d35cfce [ 70.004508][ T2460] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 70.004517][ T2460] RSP: 002b:00007f633e1f2fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 70.004530][ T2460] RAX: ffffffffffffffda RBX: 00007f633e1f36c0 RCX: 00007f633d35cfce [ 70.004538][ T2460] RDX: 000000000000000f RSI: 00007f633e1f30a0 RDI: 0000000000000004 [ 70.004546][ T2460] RBP: 00007f633e1f3090 R08: 0000000000000000 R09: 0000000000000000 [ 70.004552][ T2460] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 70.004559][ T2460] R13: 00007f633d616038 R14: 00007f633d615fa0 R15: 00007ffec25e7aa8 [ 70.004568][ T2460] [ 70.266271][ T2468] FAULT_INJECTION: forcing a failure. [ 70.266271][ T2468] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 70.279373][ T2468] CPU: 1 UID: 0 PID: 2468 Comm: syz.2.1004 Not tainted syzkaller #0 0f1aaf4ea31c6587efab90ed4dfa0b6225873f33 [ 70.279398][ T2468] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 70.279405][ T2468] Call Trace: [ 70.279409][ T2468] [ 70.279414][ T2468] __dump_stack+0x21/0x30 [ 70.279432][ T2468] dump_stack_lvl+0x140/0x1c0 [ 70.279445][ T2468] ? __cfi_dump_stack_lvl+0x10/0x10 [ 70.279458][ T2468] ? check_stack_object+0x12b/0x150 [ 70.279471][ T2468] dump_stack+0x19/0x20 [ 70.279483][ T2468] should_fail_ex+0x3d7/0x530 [ 70.279494][ T2468] should_fail+0xf/0x20 [ 70.279503][ T2468] should_fail_usercopy+0x1e/0x30 [ 70.279514][ T2468] _copy_to_user+0x24/0xa0 [ 70.279527][ T2468] simple_read_from_buffer+0xed/0x160 [ 70.279543][ T2468] proc_fail_nth_read+0x1aa/0x220 [ 70.279554][ T2468] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 70.279564][ T2468] ? bpf_lsm_file_permission+0xd/0x20 [ 70.279574][ T2468] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 70.279584][ T2468] vfs_read+0x289/0xcb0 [ 70.279596][ T2468] ? __cfi_vfs_read+0x10/0x10 [ 70.279607][ T2468] ? __kasan_check_write+0x18/0x20 [ 70.279620][ T2468] ? mutex_lock+0x97/0x1d0 [ 70.279633][ T2468] ? __cfi_mutex_lock+0x10/0x10 [ 70.279644][ T2468] ? __fget_files+0x2c5/0x340 [ 70.279658][ T2468] ksys_read+0x145/0x260 [ 70.279670][ T2468] ? __fget_files+0x2c5/0x340 [ 70.279683][ T2468] ? __cfi_ksys_read+0x10/0x10 [ 70.279708][ T2468] ? __kasan_check_read+0x15/0x20 [ 70.279720][ T2468] __x64_sys_read+0x7f/0x90 [ 70.279737][ T2468] x64_sys_call+0x2638/0x2ee0 [ 70.279751][ T2468] do_syscall_64+0x57/0xf0 [ 70.279760][ T2468] ? clear_bhb_loop+0x50/0xa0 [ 70.279770][ T2468] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 70.279785][ T2468] RIP: 0033:0x7fe2f975cfce [ 70.279795][ T2468] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 70.279804][ T2468] RSP: 002b:00007fe2fa6f0fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 70.279817][ T2468] RAX: ffffffffffffffda RBX: 00007fe2fa6f16c0 RCX: 00007fe2f975cfce [ 70.279825][ T2468] RDX: 000000000000000f RSI: 00007fe2fa6f10a0 RDI: 0000000000000003 [ 70.279832][ T2468] RBP: 00007fe2fa6f1090 R08: 0000000000000000 R09: 0000000000000000 [ 70.279839][ T2468] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 70.279845][ T2468] R13: 00007fe2f9a16038 R14: 00007fe2f9a15fa0 R15: 00007ffc65e68578 [ 70.279854][ T2468] [ 70.651276][ T2478] FAULT_INJECTION: forcing a failure. [ 70.651276][ T2478] name failslab, interval 1, probability 0, space 0, times 0 [ 70.667066][ T2478] CPU: 0 UID: 0 PID: 2478 Comm: syz.3.1009 Not tainted syzkaller #0 0f1aaf4ea31c6587efab90ed4dfa0b6225873f33 [ 70.667095][ T2478] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 70.667107][ T2478] Call Trace: [ 70.667112][ T2478] [ 70.667119][ T2478] __dump_stack+0x21/0x30 [ 70.667146][ T2478] dump_stack_lvl+0x140/0x1c0 [ 70.667166][ T2478] ? __cfi_dump_stack_lvl+0x10/0x10 [ 70.667187][ T2478] ? __kasan_check_write+0x18/0x20 [ 70.667208][ T2478] ? proc_fail_nth_write+0x184/0x220 [ 70.667226][ T2478] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 70.667244][ T2478] dump_stack+0x19/0x20 [ 70.667264][ T2478] should_fail_ex+0x3d7/0x530 [ 70.667282][ T2478] should_failslab+0xac/0x100 [ 70.667305][ T2478] kmem_cache_alloc_noprof+0x42/0x410 [ 70.667327][ T2478] ? getname_flags+0xc5/0x700 [ 70.667350][ T2478] getname_flags+0xc5/0x700 [ 70.667372][ T2478] ? __cfi_mutex_unlock+0x10/0x10 [ 70.667395][ T2478] getname+0x1b/0x30 [ 70.667416][ T2478] do_sys_openat2+0xda/0x1d0 [ 70.667433][ T2478] ? fput+0x1a4/0x240 [ 70.667450][ T2478] ? do_sys_open+0x100/0x100 [ 70.667466][ T2478] ? ksys_write+0x1f3/0x260 [ 70.667487][ T2478] ? __cfi_ksys_write+0x10/0x10 [ 70.667509][ T2478] __x64_sys_openat+0x13a/0x170 [ 70.667528][ T2478] x64_sys_call+0xe69/0x2ee0 [ 70.667552][ T2478] do_syscall_64+0x57/0xf0 [ 70.667568][ T2478] ? clear_bhb_loop+0x50/0xa0 [ 70.667585][ T2478] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 70.667611][ T2478] RIP: 0033:0x7fd91a95cfce [ 70.667626][ T2478] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 70.667641][ T2478] RSP: 002b:00007fd91b811f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 70.667661][ T2478] RAX: ffffffffffffffda RBX: 00007fd91b8126c0 RCX: 00007fd91a95cfce [ 70.667675][ T2478] RDX: 0000000000000000 RSI: 00007fd91aa32270 RDI: ffffffffffffff9c [ 70.667687][ T2478] RBP: 00007fd91b812090 R08: 0000000000000000 R09: 0000000000000000 [ 70.667699][ T2478] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 70.667710][ T2478] R13: 00007fd91ac16038 R14: 00007fd91ac15fa0 R15: 00007ffcbed708e8 [ 70.667725][ T2478] [ 70.891932][ T36] kauditd_printk_skb: 230 callbacks suppressed [ 70.891947][ T36] audit: type=1400 audit(2000000001.832:2854): avc: denied { read write } for pid=295 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 70.922135][ T36] audit: type=1400 audit(2000000001.842:2855): avc: denied { read } for pid=2483 comm="syz.3.1011" name="ppp" dev="devtmpfs" ino=86 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=0 [ 70.923368][ T2488] FAULT_INJECTION: forcing a failure. [ 70.923368][ T2488] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 70.944830][ T36] audit: type=1400 audit(2000000001.842:2856): avc: denied { read write } for pid=295 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 70.958119][ T2488] CPU: 0 UID: 0 PID: 2488 Comm: syz.3.1013 Not tainted syzkaller #0 0f1aaf4ea31c6587efab90ed4dfa0b6225873f33 [ 70.958146][ T2488] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 70.958156][ T2488] Call Trace: [ 70.958163][ T2488] [ 70.958170][ T2488] __dump_stack+0x21/0x30 [ 70.958197][ T2488] dump_stack_lvl+0x140/0x1c0 [ 70.958218][ T2488] ? __cfi_dump_stack_lvl+0x10/0x10 [ 70.958245][ T2488] ? __cfi_avc_has_perm+0x10/0x10 [ 70.958267][ T2488] ? kasan_save_alloc_info+0x40/0x50 [ 70.958288][ T2488] dump_stack+0x19/0x20 [ 70.958308][ T2488] should_fail_ex+0x3d7/0x530 [ 70.958327][ T2488] should_fail+0xf/0x20 [ 70.958343][ T2488] should_fail_usercopy+0x1e/0x30 [ 70.958365][ T2488] _copy_from_user+0x20/0xa0 [ 70.958386][ T2488] do_mcast_group_source+0x262/0x560 [ 70.958405][ T2488] ? ip_mcast_join_leave+0x280/0x280 [ 70.958425][ T2488] ? is_bpf_text_address+0x17b/0x1a0 [ 70.958447][ T2488] ? kernel_text_address+0xa9/0xe0 [ 70.958472][ T2488] ? __kasan_check_write+0x18/0x20 [ 70.958492][ T2488] ? mutex_lock+0x97/0x1d0 [ 70.958512][ T2488] ? __cfi_mutex_lock+0x10/0x10 [ 70.958532][ T2488] ? avc_has_perm_noaudit+0x28a/0x360 [ 70.958554][ T2488] do_ip_setsockopt+0x177d/0x2a90 [ 70.958581][ T2488] ? __cfi_do_ip_setsockopt+0x10/0x10 [ 70.958607][ T2488] ? selinux_socket_setsockopt+0x324/0x3d0 [ 70.958632][ T2488] ? __cfi_selinux_socket_setsockopt+0x10/0x10 [ 70.958655][ T2488] ? bpf_lsm_file_permission+0xd/0x20 [ 70.958673][ T2488] ? vfs_write+0x9a4/0xf90 [ 70.958701][ T2488] ip_setsockopt+0x63/0x100 [ 70.958717][ T2488] udp_setsockopt+0xa3/0xc0 [ 70.958743][ T2488] sock_common_setsockopt+0xb8/0xd0 [ 70.958762][ T2488] ? __cfi_sock_common_setsockopt+0x10/0x10 [ 70.958782][ T2488] do_sock_setsockopt+0x27f/0x410 [ 70.958807][ T2488] ? __cfi_do_sock_setsockopt+0x10/0x10 [ 70.958833][ T2488] __x64_sys_setsockopt+0x1b7/0x250 [ 70.958858][ T2488] x64_sys_call+0x2adc/0x2ee0 [ 70.958881][ T2488] do_syscall_64+0x57/0xf0 [ 70.958896][ T2488] ? clear_bhb_loop+0x50/0xa0 [ 70.958914][ T2488] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 70.958939][ T2488] RIP: 0033:0x7fd91a99c799 [ 70.958962][ T2488] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 70.958976][ T2488] RSP: 002b:00007fd91b812028 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 70.958996][ T2488] RAX: ffffffffffffffda RBX: 00007fd91ac15fa0 RCX: 00007fd91a99c799 [ 70.959011][ T2488] RDX: 000000000000002c RSI: 0000000000000000 RDI: 0000000000000003 [ 70.959022][ T2488] RBP: 00007fd91b812090 R08: 0000000000000108 R09: 0000000000000000 [ 70.959034][ T2488] R10: 0000200000000480 R11: 0000000000000246 R12: 0000000000000001 [ 70.959045][ T2488] R13: 00007fd91ac16038 R14: 00007fd91ac15fa0 R15: 00007ffcbed708e8 [ 70.959061][ T2488] [ 71.020319][ T2492] FAULT_INJECTION: forcing a failure. [ 71.020319][ T2492] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 71.038150][ T36] audit: type=1400 audit(2000000001.852:2857): avc: denied { read write } for pid=295 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 71.046589][ T2492] CPU: 0 UID: 0 PID: 2492 Comm: syz.1.1015 Not tainted syzkaller #0 0f1aaf4ea31c6587efab90ed4dfa0b6225873f33 [ 71.046618][ T2492] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 71.046629][ T2492] Call Trace: [ 71.046635][ T2492] [ 71.046642][ T2492] __dump_stack+0x21/0x30 [ 71.046669][ T2492] dump_stack_lvl+0x140/0x1c0 [ 71.046698][ T2492] ? __cfi_dump_stack_lvl+0x10/0x10 [ 71.046720][ T2492] ? proc_fail_nth_write+0x184/0x220 [ 71.046738][ T2492] ? check_stack_object+0x106/0x150 [ 71.046761][ T2492] dump_stack+0x19/0x20 [ 71.046781][ T2492] should_fail_ex+0x3d7/0x530 [ 71.046799][ T2492] should_fail+0xf/0x20 [ 71.046815][ T2492] should_fail_usercopy+0x1e/0x30 [ 71.046834][ T2492] _copy_from_user+0x20/0xa0 [ 71.046856][ T2492] __tun_chr_ioctl+0x21e/0x1f60 [ 71.046880][ T2492] ? __kasan_check_write+0x18/0x20 [ 71.046900][ T2492] ? tun_flow_create+0x400/0x400 [ 71.046922][ T2492] ? __fget_files+0x2c5/0x340 [ 71.046946][ T2492] ? __fget_files+0x2c5/0x340 [ 71.046970][ T2492] tun_chr_ioctl+0x2e/0x40 [ 71.046991][ T2492] ? __cfi_tun_chr_ioctl+0x10/0x10 [ 71.047011][ T2492] __se_sys_ioctl+0x135/0x1b0 [ 71.047037][ T2492] __x64_sys_ioctl+0x7f/0xa0 [ 71.047060][ T2492] x64_sys_call+0x1878/0x2ee0 [ 71.047083][ T2492] do_syscall_64+0x57/0xf0 [ 71.047099][ T2492] ? clear_bhb_loop+0x50/0xa0 [ 71.047117][ T2492] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 71.047143][ T2492] RIP: 0033:0x7fda2b19c799 [ 71.047159][ T2492] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 71.047176][ T2492] RSP: 002b:00007fda2bf95028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 71.047197][ T2492] RAX: ffffffffffffffda RBX: 00007fda2b415fa0 RCX: 00007fda2b19c799 [ 71.047211][ T2492] RDX: 0000200000000100 RSI: 00000000400454ca RDI: 0000000000000003 [ 71.047225][ T2492] RBP: 00007fda2bf95090 R08: 0000000000000000 R09: 0000000000000000 [ 71.047237][ T2492] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 71.047248][ T2492] R13: 00007fda2b416038 R14: 00007fda2b415fa0 R15: 00007ffe6143c478 [ 71.047265][ T2492] [ 71.064653][ T2496] FAULT_INJECTION: forcing a failure. [ 71.064653][ T2496] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 71.080666][ T36] audit: type=1400 audit(2000000001.902:2858): avc: denied { read write } for pid=295 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 71.082959][ T2496] CPU: 0 UID: 0 PID: 2496 Comm: syz.1.1018 Not tainted syzkaller #0 0f1aaf4ea31c6587efab90ed4dfa0b6225873f33 [ 71.082986][ T2496] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 71.082998][ T2496] Call Trace: [ 71.083004][ T2496] [ 71.083012][ T2496] __dump_stack+0x21/0x30 [ 71.083038][ T2496] dump_stack_lvl+0x140/0x1c0 [ 71.083060][ T2496] ? __cfi_dump_stack_lvl+0x10/0x10 [ 71.083081][ T2496] ? check_stack_object+0x12b/0x150 [ 71.083104][ T2496] dump_stack+0x19/0x20 [ 71.083125][ T2496] should_fail_ex+0x3d7/0x530 [ 71.083144][ T2496] should_fail+0xf/0x20 [ 71.083160][ T2496] should_fail_usercopy+0x1e/0x30 [ 71.083179][ T2496] _copy_to_user+0x24/0xa0 [ 71.083201][ T2496] simple_read_from_buffer+0xed/0x160 [ 71.083228][ T2496] proc_fail_nth_read+0x1aa/0x220 [ 71.083247][ T2496] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 71.083265][ T2496] ? bpf_lsm_file_permission+0xd/0x20 [ 71.083283][ T2496] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 71.083302][ T2496] vfs_read+0x289/0xcb0 [ 71.083323][ T2496] ? __cfi_vfs_read+0x10/0x10 [ 71.083343][ T2496] ? __kasan_check_write+0x18/0x20 [ 71.083363][ T2496] ? mutex_lock+0x97/0x1d0 [ 71.083383][ T2496] ? __cfi_mutex_lock+0x10/0x10 [ 71.083403][ T2496] ? __fget_files+0x2c5/0x340 [ 71.083428][ T2496] ksys_read+0x145/0x260 [ 71.083448][ T2496] ? __cfi_ksys_read+0x10/0x10 [ 71.083469][ T2496] ? __kasan_check_read+0x15/0x20 [ 71.083490][ T2496] __x64_sys_read+0x7f/0x90 [ 71.083510][ T2496] x64_sys_call+0x2638/0x2ee0 [ 71.083534][ T2496] do_syscall_64+0x57/0xf0 [ 71.083550][ T2496] ? clear_bhb_loop+0x50/0xa0 [ 71.083566][ T2496] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 71.083592][ T2496] RIP: 0033:0x7fda2b15cfce [ 71.083607][ T2496] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 71.083623][ T2496] RSP: 002b:00007fda2bf94fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 71.083643][ T2496] RAX: ffffffffffffffda RBX: 00007fda2bf956c0 RCX: 00007fda2b15cfce [ 71.083657][ T2496] RDX: 000000000000000f RSI: 00007fda2bf950a0 RDI: 0000000000000003 [ 71.083675][ T2496] RBP: 00007fda2bf95090 R08: 0000000000000000 R09: 0000000000000000 [ 71.083688][ T2496] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 71.083700][ T2496] R13: 00007fda2b416038 R14: 00007fda2b415fa0 R15: 00007ffe6143c478 [ 71.083716][ T2496] [ 71.119694][ T2500] audit: audit_backlog=65 > audit_backlog_limit=64 [ 71.133692][ T36] audit: type=1400 audit(2000000001.912:2859): avc: denied { create } for pid=2479 comm="syz.1.1010" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 71.137469][ T2500] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 [ 71.138653][ T36] audit: type=1400 audit(2000000001.912:2860): avc: denied { read write } for pid=2479 comm="syz.1.1010" name="fuse" dev="devtmpfs" ino=23 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=0 [ 71.143855][ T2500] audit: backlog limit exceeded [ 71.296024][ T2520] FAULT_INJECTION: forcing a failure. [ 71.296024][ T2520] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 71.301266][ T2522] netlink: 'syz.2.1025': attribute type 6 has an invalid length. [ 71.309561][ T2520] CPU: 1 UID: 0 PID: 2520 Comm: syz.1.1023 Not tainted syzkaller #0 0f1aaf4ea31c6587efab90ed4dfa0b6225873f33 [ 71.309590][ T2520] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 71.309602][ T2520] Call Trace: [ 71.309609][ T2520] [ 71.309616][ T2520] __dump_stack+0x21/0x30 [ 71.309644][ T2520] dump_stack_lvl+0x140/0x1c0 [ 71.309665][ T2520] ? __cfi_dump_stack_lvl+0x10/0x10 [ 71.309688][ T2520] ? check_stack_object+0x12b/0x150 [ 71.309710][ T2520] dump_stack+0x19/0x20 [ 71.309731][ T2520] should_fail_ex+0x3d7/0x530 [ 71.309749][ T2520] should_fail+0xf/0x20 [ 71.309766][ T2520] should_fail_usercopy+0x1e/0x30 [ 71.309785][ T2520] _copy_to_user+0x24/0xa0 [ 71.309807][ T2520] simple_read_from_buffer+0xed/0x160 [ 71.309834][ T2520] proc_fail_nth_read+0x1aa/0x220 [ 71.309858][ T2520] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 71.309876][ T2520] ? prepare_signal+0x142b/0x1720 [ 71.309897][ T2520] ? bpf_lsm_file_permission+0xd/0x20 [ 71.309920][ T2520] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 71.309938][ T2520] vfs_read+0x289/0xcb0 [ 71.309959][ T2520] ? __send_signal_locked+0x884/0xb90 [ 71.309977][ T2520] ? __cfi_vfs_read+0x10/0x10 [ 71.309997][ T2520] ? __kasan_check_write+0x18/0x20 [ 71.310018][ T2520] ? mutex_lock+0x97/0x1d0 [ 71.310038][ T2520] ? __cfi_mutex_lock+0x10/0x10 [ 71.310058][ T2520] ? __fget_files+0x2c5/0x340 [ 71.310082][ T2520] ksys_read+0x145/0x260 [ 71.310103][ T2520] ? __cfi_ksys_read+0x10/0x10 [ 71.310124][ T2520] ? __kasan_check_read+0x15/0x20 [ 71.310144][ T2520] __x64_sys_read+0x7f/0x90 [ 71.310164][ T2520] x64_sys_call+0x2638/0x2ee0 [ 71.310187][ T2520] do_syscall_64+0x57/0xf0 [ 71.310204][ T2520] ? clear_bhb_loop+0x50/0xa0 [ 71.310221][ T2520] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 71.310246][ T2520] RIP: 0033:0x7fda2b15cfce [ 71.310261][ T2520] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 71.310277][ T2520] RSP: 002b:00007fda2bf94fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 71.310297][ T2520] RAX: ffffffffffffffda RBX: 00007fda2bf956c0 RCX: 00007fda2b15cfce [ 71.310312][ T2520] RDX: 000000000000000f RSI: 00007fda2bf950a0 RDI: 0000000000000003 [ 71.310324][ T2520] RBP: 00007fda2bf95090 R08: 0000000000000000 R09: 0000000000000000 [ 71.310336][ T2520] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 71.310348][ T2520] R13: 00007fda2b416038 R14: 00007fda2b415fa0 R15: 00007ffe6143c478 [ 71.310363][ T2520] [ 71.335681][ T2526] FAULT_INJECTION: forcing a failure. [ 71.335681][ T2526] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 72.128870][ T2526] CPU: 0 UID: 0 PID: 2526 Comm: syz.1.1027 Not tainted syzkaller #0 0f1aaf4ea31c6587efab90ed4dfa0b6225873f33 [ 72.128897][ T2526] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 72.128907][ T2526] Call Trace: [ 72.128914][ T2526] [ 72.128922][ T2526] __dump_stack+0x21/0x30 [ 72.128947][ T2526] dump_stack_lvl+0x140/0x1c0 [ 72.128966][ T2526] ? __cfi_dump_stack_lvl+0x10/0x10 [ 72.128986][ T2526] ? kmem_cache_free+0x1bd/0x4f0 [ 72.129010][ T2526] ? putname+0x113/0x150 [ 72.129032][ T2526] dump_stack+0x19/0x20 [ 72.129051][ T2526] should_fail_ex+0x3d7/0x530 [ 72.129068][ T2526] should_fail+0xf/0x20 [ 72.129085][ T2526] should_fail_usercopy+0x1e/0x30 [ 72.129103][ T2526] _copy_from_user+0x20/0xa0 [ 72.129125][ T2526] __x64_sys_signalfd4+0x118/0x1a0 [ 72.129142][ T2526] ? __cfi___x64_sys_signalfd4+0x10/0x10 [ 72.129161][ T2526] ? __kasan_check_read+0x15/0x20 [ 72.129183][ T2526] x64_sys_call+0x29a4/0x2ee0 [ 72.129207][ T2526] do_syscall_64+0x57/0xf0 [ 72.129223][ T2526] ? clear_bhb_loop+0x50/0xa0 [ 72.129239][ T2526] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 72.129265][ T2526] RIP: 0033:0x7fda2b19c799 [ 72.129281][ T2526] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 72.129296][ T2526] RSP: 002b:00007fda2bf95028 EFLAGS: 00000246 ORIG_RAX: 0000000000000121 [ 72.129317][ T2526] RAX: ffffffffffffffda RBX: 00007fda2b415fa0 RCX: 00007fda2b19c799 [ 72.129332][ T2526] RDX: 0000000000000008 RSI: 0000200000000000 RDI: 0000000000000003 [ 72.129341][ T2526] RBP: 00007fda2bf95090 R08: 0000000000000000 R09: 0000000000000000 [ 72.129352][ T2526] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 72.129363][ T2526] R13: 00007fda2b416038 R14: 00007fda2b415fa0 R15: 00007ffe6143c478 [ 72.129379][ T2526] [ 72.828385][ T2554] FAULT_INJECTION: forcing a failure. [ 72.828385][ T2554] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 72.841494][ T2554] CPU: 1 UID: 0 PID: 2554 Comm: syz.1.1037 Not tainted syzkaller #0 0f1aaf4ea31c6587efab90ed4dfa0b6225873f33 [ 72.841531][ T2554] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 72.841544][ T2554] Call Trace: [ 72.841550][ T2554] [ 72.841558][ T2554] __dump_stack+0x21/0x30 [ 72.841586][ T2554] dump_stack_lvl+0x140/0x1c0 [ 72.841608][ T2554] ? __cfi_dump_stack_lvl+0x10/0x10 [ 72.841631][ T2554] ? kasan_save_alloc_info+0x40/0x50 [ 72.841653][ T2554] dump_stack+0x19/0x20 [ 72.841674][ T2554] should_fail_ex+0x3d7/0x530 [ 72.841695][ T2554] should_fail+0xf/0x20 [ 72.841713][ T2554] should_fail_usercopy+0x1e/0x30 [ 72.841733][ T2554] _copy_from_iter+0x1a9/0x1510 [ 72.841758][ T2554] ? __cfi__copy_from_iter+0x10/0x10 [ 72.841781][ T2554] tun_get_user+0x235/0x36c0 [ 72.841806][ T2554] ? __kernel_text_address+0x11/0x40 [ 72.841829][ T2554] ? arch_stack_walk+0x10a/0x170 [ 72.841857][ T2554] ? _parse_integer_limit+0x195/0x1e0 [ 72.841886][ T2554] ? ptr_ring_consume+0x430/0x430 [ 72.841909][ T2554] ? _parse_integer+0x2e/0x40 [ 72.841936][ T2554] ? kstrtoull+0x13b/0x1e0 [ 72.841953][ T2554] ? __kasan_check_write+0x18/0x20 [ 72.841975][ T2554] ? ref_tracker_alloc+0x30d/0x590 [ 72.841997][ T2554] ? __cfi_ref_tracker_alloc+0x10/0x10 [ 72.842019][ T2554] ? selinux_file_permission+0x318/0xb60 [ 72.842041][ T2554] ? __kasan_check_write+0x18/0x20 [ 72.842064][ T2554] tun_chr_write_iter+0x1fc/0x310 [ 72.842089][ T2554] vfs_write+0x764/0xf90 [ 72.842113][ T2554] ? __cfi_vfs_write+0x10/0x10 [ 72.842138][ T2554] ksys_write+0x145/0x260 [ 72.842160][ T2554] ? __cfi_ksys_write+0x10/0x10 [ 72.842184][ T2554] ? __kasan_check_read+0x15/0x20 [ 72.842206][ T2554] __x64_sys_write+0x7f/0x90 [ 72.842229][ T2554] x64_sys_call+0x271c/0x2ee0 [ 72.842254][ T2554] do_syscall_64+0x57/0xf0 [ 72.842273][ T2554] ? clear_bhb_loop+0x50/0xa0 [ 72.842291][ T2554] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 72.842319][ T2554] RIP: 0033:0x7fda2b19c799 [ 72.842336][ T2554] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 72.842352][ T2554] RSP: 002b:00007fda2bf95028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 72.842374][ T2554] RAX: ffffffffffffffda RBX: 00007fda2b415fa0 RCX: 00007fda2b19c799 [ 72.842390][ T2554] RDX: 0000000000000016 RSI: 0000200000000100 RDI: 0000000000000003 [ 72.842403][ T2554] RBP: 00007fda2bf95090 R08: 0000000000000000 R09: 0000000000000000 [ 72.842417][ T2554] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 72.842429][ T2554] R13: 00007fda2b416038 R14: 00007fda2b415fa0 R15: 00007ffe6143c478 [ 72.842447][ T2554] [ 73.684493][ T2583] FAULT_INJECTION: forcing a failure. [ 73.684493][ T2583] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 73.697624][ T2583] CPU: 1 UID: 0 PID: 2583 Comm: syz.2.1051 Not tainted syzkaller #0 0f1aaf4ea31c6587efab90ed4dfa0b6225873f33 [ 73.697653][ T2583] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 73.697665][ T2583] Call Trace: [ 73.697671][ T2583] [ 73.697679][ T2583] __dump_stack+0x21/0x30 [ 73.697706][ T2583] dump_stack_lvl+0x140/0x1c0 [ 73.697728][ T2583] ? __cfi_dump_stack_lvl+0x10/0x10 [ 73.697751][ T2583] ? check_stack_object+0x12b/0x150 [ 73.697774][ T2583] dump_stack+0x19/0x20 [ 73.697795][ T2583] should_fail_ex+0x3d7/0x530 [ 73.697814][ T2583] should_fail+0xf/0x20 [ 73.697831][ T2583] should_fail_usercopy+0x1e/0x30 [ 73.697852][ T2583] _copy_to_user+0x24/0xa0 [ 73.697875][ T2583] simple_read_from_buffer+0xed/0x160 [ 73.697903][ T2583] proc_fail_nth_read+0x1aa/0x220 [ 73.697922][ T2583] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 73.697941][ T2583] ? selinux_socket_setsockopt+0x324/0x3d0 [ 73.697965][ T2583] ? bpf_lsm_file_permission+0xd/0x20 [ 73.697983][ T2583] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 73.698002][ T2583] vfs_read+0x289/0xcb0 [ 73.698024][ T2583] ? __cfi_vfs_read+0x10/0x10 [ 73.698044][ T2583] ? __kasan_check_write+0x18/0x20 [ 73.698065][ T2583] ? mutex_lock+0x97/0x1d0 [ 73.698087][ T2583] ? __cfi_mutex_lock+0x10/0x10 [ 73.698108][ T2583] ? __fget_files+0x2c5/0x340 [ 73.698134][ T2583] ksys_read+0x145/0x260 [ 73.698155][ T2583] ? __cfi_ksys_read+0x10/0x10 [ 73.698176][ T2583] ? __kasan_check_write+0x18/0x20 [ 73.698198][ T2583] ? __kasan_check_read+0x15/0x20 [ 73.698219][ T2583] __x64_sys_read+0x7f/0x90 [ 73.698241][ T2583] x64_sys_call+0x2638/0x2ee0 [ 73.698265][ T2583] do_syscall_64+0x57/0xf0 [ 73.698282][ T2583] ? clear_bhb_loop+0x50/0xa0 [ 73.698300][ T2583] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 73.698326][ T2583] RIP: 0033:0x7fe2f975cfce [ 73.698341][ T2583] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 73.698358][ T2583] RSP: 002b:00007fe2fa6f0fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 73.698380][ T2583] RAX: ffffffffffffffda RBX: 00007fe2fa6f16c0 RCX: 00007fe2f975cfce [ 73.698395][ T2583] RDX: 000000000000000f RSI: 00007fe2fa6f10a0 RDI: 0000000000000004 [ 73.698408][ T2583] RBP: 00007fe2fa6f1090 R08: 0000000000000000 R09: 0000000000000000 [ 73.698421][ T2583] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 73.698434][ T2583] R13: 00007fe2f9a16038 R14: 00007fe2f9a15fa0 R15: 00007ffc65e68578 [ 73.698451][ T2583] [ 74.071331][ T2597] netlink: 12 bytes leftover after parsing attributes in process `syz.3.1055'. [ 74.635331][ T2634] FAULT_INJECTION: forcing a failure. [ 74.635331][ T2634] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 74.648618][ T2634] CPU: 0 UID: 0 PID: 2634 Comm: syz.0.1073 Not tainted syzkaller #0 0f1aaf4ea31c6587efab90ed4dfa0b6225873f33 [ 74.648645][ T2634] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 74.648653][ T2634] Call Trace: [ 74.648657][ T2634] [ 74.648684][ T2634] __dump_stack+0x21/0x30 [ 74.648703][ T2634] dump_stack_lvl+0x140/0x1c0 [ 74.648716][ T2634] ? __cfi_dump_stack_lvl+0x10/0x10 [ 74.648730][ T2634] dump_stack+0x19/0x20 [ 74.648741][ T2634] should_fail_ex+0x3d7/0x530 [ 74.648753][ T2634] should_fail+0xf/0x20 [ 74.648764][ T2634] should_fail_usercopy+0x1e/0x30 [ 74.648782][ T2634] strncpy_from_user+0x29/0x270 [ 74.648793][ T2634] getname_flags+0x101/0x700 [ 74.648807][ T2634] ? __cfi_mutex_unlock+0x10/0x10 [ 74.648819][ T2634] getname+0x1b/0x30 [ 74.648833][ T2634] do_sys_openat2+0xda/0x1d0 [ 74.648844][ T2634] ? fput+0x1a4/0x240 [ 74.648853][ T2634] ? do_sys_open+0x100/0x100 [ 74.648868][ T2634] ? ksys_write+0x1f3/0x260 [ 74.648880][ T2634] ? __cfi_ksys_write+0x10/0x10 [ 74.648896][ T2634] __x64_sys_openat+0x13a/0x170 [ 74.648907][ T2634] x64_sys_call+0xe69/0x2ee0 [ 74.648921][ T2634] do_syscall_64+0x57/0xf0 [ 74.648930][ T2634] ? clear_bhb_loop+0x50/0xa0 [ 74.648940][ T2634] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 74.648959][ T2634] RIP: 0033:0x7f633d35cfce [ 74.648970][ T2634] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 74.648979][ T2634] RSP: 002b:00007f633e1f2f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 74.648991][ T2634] RAX: ffffffffffffffda RBX: 00007f633e1f36c0 RCX: 00007f633d35cfce [ 74.649000][ T2634] RDX: 0000000000000000 RSI: 00007f633d432270 RDI: ffffffffffffff9c [ 74.649008][ T2634] RBP: 00007f633e1f3090 R08: 0000000000000000 R09: 0000000000000000 [ 74.649015][ T2634] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 74.649021][ T2634] R13: 00007f633d616038 R14: 00007f633d615fa0 R15: 00007ffec25e7aa8 [ 74.649030][ T2634] [ 74.903567][ T2646] FAULT_INJECTION: forcing a failure. [ 74.903567][ T2646] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 74.916846][ T2646] CPU: 1 UID: 0 PID: 2646 Comm: syz.0.1078 Not tainted syzkaller #0 0f1aaf4ea31c6587efab90ed4dfa0b6225873f33 [ 74.916877][ T2646] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 74.916889][ T2646] Call Trace: [ 74.916895][ T2646] [ 74.916900][ T2646] __dump_stack+0x21/0x30 [ 74.916918][ T2646] dump_stack_lvl+0x140/0x1c0 [ 74.916931][ T2646] ? __cfi_dump_stack_lvl+0x10/0x10 [ 74.916945][ T2646] dump_stack+0x19/0x20 [ 74.916956][ T2646] should_fail_ex+0x3d7/0x530 [ 74.916968][ T2646] should_fail_alloc_page+0xec/0x110 [ 74.916983][ T2646] __alloc_pages_noprof+0x1c0/0x7e0 [ 74.916994][ T2646] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 74.917006][ T2646] __pud_alloc+0xb0/0x8f0 [ 74.917021][ T2646] ? __cfi___pud_alloc+0x10/0x10 [ 74.917035][ T2646] ? kernel_text_address+0xa9/0xe0 [ 74.917048][ T2646] handle_mm_fault+0x1906/0x1bf0 [ 74.917063][ T2646] ? __cfi_handle_mm_fault+0x10/0x10 [ 74.917076][ T2646] ? find_vma+0xd3/0x120 [ 74.917089][ T2646] ? lock_mm_and_find_vma+0xb8/0x390 [ 74.917103][ T2646] do_user_addr_fault+0x4c9/0x11e0 [ 74.917119][ T2646] exc_page_fault+0x58/0xc0 [ 74.917133][ T2646] asm_exc_page_fault+0x2b/0x30 [ 74.917148][ T2646] RIP: 0010:rep_movs_alternative+0x4a/0xa0 [ 74.917163][ T2646] Code: 75 f1 c3 cc cc cc cc 66 0f 1f 84 00 00 00 00 00 48 8b 06 48 89 07 48 83 c6 08 48 83 c7 08 83 e9 08 74 df 83 f9 08 73 e8 eb c9 a4 e9 4f 68 03 00 48 8b 06 48 89 07 48 8d 47 08 48 83 e0 f8 48 [ 74.917172][ T2646] RSP: 0018:ffffc900010ef790 EFLAGS: 00050202 [ 74.917183][ T2646] RAX: 00007ffffffff001 RBX: 0000000000000108 RCX: 0000000000000108 [ 74.917191][ T2646] RDX: 0000000000000001 RSI: 0000200000000480 RDI: ffffc900010ef950 [ 74.917199][ T2646] RBP: ffffc900010ef7b0 R08: ffffc900010efa57 R09: 1ffff9200021df4a [ 74.917207][ T2646] R10: dffffc0000000000 R11: fffff5200021df4b R12: f8f8f8f8f8f8f8f8 [ 74.917215][ T2646] R13: ffff88810e3b4c10 R14: ffffc900010ef950 R15: 0000200000000480 [ 74.917224][ T2646] ? _copy_from_user+0x6d/0xa0 [ 74.917237][ T2646] do_mcast_group_source+0x262/0x560 [ 74.917248][ T2646] ? ip_mcast_join_leave+0x280/0x280 [ 74.917259][ T2646] ? is_bpf_text_address+0x17b/0x1a0 [ 74.917272][ T2646] ? kernel_text_address+0xa9/0xe0 [ 74.917286][ T2646] ? __kasan_check_write+0x18/0x20 [ 74.917298][ T2646] ? mutex_lock+0x97/0x1d0 [ 74.917309][ T2646] ? __cfi_mutex_lock+0x10/0x10 [ 74.917321][ T2646] ? avc_has_perm_noaudit+0x28a/0x360 [ 74.917334][ T2646] do_ip_setsockopt+0x177d/0x2a90 [ 74.917350][ T2646] ? __cfi_do_ip_setsockopt+0x10/0x10 [ 74.917366][ T2646] ? selinux_socket_setsockopt+0x324/0x3d0 [ 74.917381][ T2646] ? __cfi_selinux_socket_setsockopt+0x10/0x10 [ 74.917395][ T2646] ? bpf_lsm_file_permission+0xd/0x20 [ 74.917411][ T2646] ? vfs_write+0x9a4/0xf90 [ 74.917423][ T2646] ip_setsockopt+0x63/0x100 [ 74.917433][ T2646] udp_setsockopt+0xa3/0xc0 [ 74.917448][ T2646] sock_common_setsockopt+0xb8/0xd0 [ 74.917460][ T2646] ? __cfi_sock_common_setsockopt+0x10/0x10 [ 74.917472][ T2646] do_sock_setsockopt+0x27f/0x410 [ 74.917487][ T2646] ? __cfi_do_sock_setsockopt+0x10/0x10 [ 74.917503][ T2646] __x64_sys_setsockopt+0x1b7/0x250 [ 74.917518][ T2646] x64_sys_call+0x2adc/0x2ee0 [ 74.917532][ T2646] do_syscall_64+0x57/0xf0 [ 74.917541][ T2646] ? clear_bhb_loop+0x50/0xa0 [ 74.917551][ T2646] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 74.917565][ T2646] RIP: 0033:0x7f633d39c799 [ 74.917574][ T2646] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 74.917583][ T2646] RSP: 002b:00007f633e1f3028 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 74.917594][ T2646] RAX: ffffffffffffffda RBX: 00007f633d615fa0 RCX: 00007f633d39c799 [ 74.917602][ T2646] RDX: 000000000000002c RSI: 0000000000000000 RDI: 0000000000000003 [ 74.917608][ T2646] RBP: 00007f633e1f3090 R08: 0000000000000108 R09: 0000000000000000 [ 74.917616][ T2646] R10: 0000200000000480 R11: 0000000000000246 R12: 0000000000000001 [ 74.917623][ T2646] R13: 00007f633d616038 R14: 00007f633d615fa0 R15: 00007ffec25e7aa8 [ 74.917632][ T2646] [ 75.327474][ T2650] FAULT_INJECTION: forcing a failure. [ 75.327474][ T2650] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 75.341516][ T2650] CPU: 0 UID: 0 PID: 2650 Comm: syz.0.1080 Not tainted syzkaller #0 0f1aaf4ea31c6587efab90ed4dfa0b6225873f33 [ 75.341548][ T2650] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 75.341560][ T2650] Call Trace: [ 75.341566][ T2650] [ 75.341572][ T2650] __dump_stack+0x21/0x30 [ 75.341598][ T2650] dump_stack_lvl+0x140/0x1c0 [ 75.341621][ T2650] ? __cfi_dump_stack_lvl+0x10/0x10 [ 75.341653][ T2650] ? vsnprintf+0x7b4/0x1ad0 [ 75.341679][ T2650] ? check_stack_object+0x106/0x150 [ 75.341702][ T2650] dump_stack+0x19/0x20 [ 75.341724][ T2650] should_fail_ex+0x3d7/0x530 [ 75.341743][ T2650] should_fail+0xf/0x20 [ 75.341758][ T2650] should_fail_usercopy+0x1e/0x30 [ 75.341777][ T2650] _copy_from_user+0x20/0xa0 [ 75.341799][ T2650] kstrtouint_from_user+0xde/0x170 [ 75.341817][ T2650] ? __cfi_kstrtouint_from_user+0x10/0x10 [ 75.341835][ T2650] ? selinux_file_permission+0x318/0xb60 [ 75.341856][ T2650] ? __cfi_selinux_file_permission+0x10/0x10 [ 75.341876][ T2650] proc_fail_nth_write+0x8f/0x220 [ 75.341895][ T2650] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 75.341915][ T2650] ? bpf_lsm_file_permission+0xd/0x20 [ 75.341933][ T2650] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 75.341951][ T2650] vfs_write+0x3c5/0xf90 [ 75.341973][ T2650] ? __cfi_vfs_write+0x10/0x10 [ 75.341992][ T2650] ? __kasan_check_write+0x18/0x20 [ 75.342013][ T2650] ? mutex_lock+0x97/0x1d0 [ 75.342033][ T2650] ? __cfi_mutex_lock+0x10/0x10 [ 75.342052][ T2650] ? __fget_files+0x2c5/0x340 [ 75.342076][ T2650] ksys_write+0x145/0x260 [ 75.342098][ T2650] ? __cfi_ksys_write+0x10/0x10 [ 75.342118][ T2650] ? fdget+0x188/0x1e0 [ 75.342142][ T2650] ? __kasan_check_read+0x15/0x20 [ 75.342163][ T2650] __x64_sys_write+0x7f/0x90 [ 75.342184][ T2650] x64_sys_call+0x271c/0x2ee0 [ 75.342207][ T2650] do_syscall_64+0x57/0xf0 [ 75.342222][ T2650] ? clear_bhb_loop+0x50/0xa0 [ 75.342237][ T2650] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 75.342262][ T2650] RIP: 0033:0x7f633d35cfce [ 75.342277][ T2650] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 75.342293][ T2650] RSP: 002b:00007f633e1f2fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 75.342313][ T2650] RAX: ffffffffffffffda RBX: 00007f633e1f36c0 RCX: 00007f633d35cfce [ 75.342327][ T2650] RDX: 0000000000000001 RSI: 00007f633e1f30a0 RDI: 0000000000000003 [ 75.342338][ T2650] RBP: 00007f633e1f3090 R08: 0000000000000000 R09: 0000000000000000 [ 75.342350][ T2650] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 75.342361][ T2650] R13: 00007f633d616038 R14: 00007f633d615fa0 R15: 00007ffec25e7aa8 [ 75.342375][ T2650] [ 75.757903][ T2670] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1087'. [ 75.770899][ T36] kauditd_printk_skb: 269 callbacks suppressed [ 75.770915][ T36] audit: type=1400 audit(2000000006.843:3130): avc: denied { read write } for pid=295 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 75.801143][ T36] audit: type=1400 audit(2000000006.843:3131): avc: denied { read } for pid=2672 comm="syz.3.1088" dev="nsfs" ino=4026532448 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 75.822295][ T36] audit: type=1400 audit(2000000006.853:3132): avc: denied { read write } for pid=295 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 75.846616][ T36] audit: type=1400 audit(2000000006.863:3133): avc: denied { read write } for pid=295 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 75.870630][ T36] audit: type=1400 audit(2000000006.873:3134): avc: denied { read } for pid=2676 comm="syz.3.1090" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 75.894820][ T36] audit: type=1400 audit(2000000006.873:3135): avc: denied { read } for pid=2676 comm="syz.3.1090" dev="nsfs" ino=4026532448 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 75.916025][ T36] audit: type=1400 audit(2000000006.873:3136): avc: denied { read write } for pid=2676 comm="syz.3.1090" name="uhid" dev="devtmpfs" ino=199 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=0 [ 75.939458][ T36] audit: type=1400 audit(2000000006.873:3137): avc: denied { create } for pid=2676 comm="syz.3.1090" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 75.959915][ T36] audit: type=1400 audit(2000000006.873:3138): avc: denied { create } for pid=2676 comm="syz.3.1090" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 75.984725][ T36] audit: type=1400 audit(2000000007.058:3139): avc: denied { read write } for pid=295 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 76.577130][ T2696] FAULT_INJECTION: forcing a failure. [ 76.577130][ T2696] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 76.590238][ T2696] CPU: 0 UID: 0 PID: 2696 Comm: syz.3.1099 Not tainted syzkaller #0 0f1aaf4ea31c6587efab90ed4dfa0b6225873f33 [ 76.590257][ T2696] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 76.590264][ T2696] Call Trace: [ 76.590268][ T2696] [ 76.590272][ T2696] __dump_stack+0x21/0x30 [ 76.590291][ T2696] dump_stack_lvl+0x140/0x1c0 [ 76.590304][ T2696] ? __cfi_dump_stack_lvl+0x10/0x10 [ 76.590319][ T2696] ? check_stack_object+0x12b/0x150 [ 76.590334][ T2696] dump_stack+0x19/0x20 [ 76.590345][ T2696] should_fail_ex+0x3d7/0x530 [ 76.590356][ T2696] should_fail+0xf/0x20 [ 76.590366][ T2696] should_fail_usercopy+0x1e/0x30 [ 76.590377][ T2696] _copy_to_user+0x24/0xa0 [ 76.590390][ T2696] simple_read_from_buffer+0xed/0x160 [ 76.590406][ T2696] proc_fail_nth_read+0x1aa/0x220 [ 76.590417][ T2696] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 76.590428][ T2696] ? bpf_lsm_file_permission+0xd/0x20 [ 76.590438][ T2696] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 76.590448][ T2696] vfs_read+0x289/0xcb0 [ 76.590460][ T2696] ? __cfi_vfs_read+0x10/0x10 [ 76.590472][ T2696] ? __kasan_slab_free+0x6a/0x80 [ 76.590486][ T2696] ? kmem_cache_free+0x1bd/0x4f0 [ 76.590505][ T2696] ? putname+0x113/0x150 [ 76.590519][ T2696] ? __kasan_check_read+0x15/0x20 [ 76.590531][ T2696] ksys_read+0x145/0x260 [ 76.590543][ T2696] ? __cfi_ksys_read+0x10/0x10 [ 76.590554][ T2696] ? __x64_sys_signalfd4+0x15b/0x1a0 [ 76.590570][ T2696] ? __kasan_check_read+0x15/0x20 [ 76.590582][ T2696] __x64_sys_read+0x7f/0x90 [ 76.590594][ T2696] x64_sys_call+0x2638/0x2ee0 [ 76.590608][ T2696] do_syscall_64+0x57/0xf0 [ 76.590618][ T2696] ? clear_bhb_loop+0x50/0xa0 [ 76.590629][ T2696] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 76.590644][ T2696] RIP: 0033:0x7fd91a95cfce [ 76.590654][ T2696] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 76.590664][ T2696] RSP: 002b:00007fd91b811fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 76.590677][ T2696] RAX: ffffffffffffffda RBX: 00007fd91b8126c0 RCX: 00007fd91a95cfce [ 76.590685][ T2696] RDX: 000000000000000f RSI: 00007fd91b8120a0 RDI: 0000000000000004 [ 76.590693][ T2696] RBP: 00007fd91b812090 R08: 0000000000000000 R09: 0000000000000000 [ 76.590700][ T2696] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 76.590707][ T2696] R13: 00007fd91ac16038 R14: 00007fd91ac15fa0 R15: 00007ffcbed708e8 [ 76.590716][ T2696] [ 77.372693][ T54] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 77.372821][ T434] Bluetooth: hci0: command 0x1003 tx timeout [ 77.854881][ T2713] capability: warning: `syz.2.1107' uses deprecated v2 capabilities in a way that may be insecure [ 78.066776][ T2720] FAULT_INJECTION: forcing a failure. [ 78.066776][ T2720] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 78.080092][ T2720] CPU: 0 UID: 0 PID: 2720 Comm: syz.3.1110 Not tainted syzkaller #0 0f1aaf4ea31c6587efab90ed4dfa0b6225873f33 [ 78.080113][ T2720] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 78.080120][ T2720] Call Trace: [ 78.080123][ T2720] [ 78.080127][ T2720] __dump_stack+0x21/0x30 [ 78.080146][ T2720] dump_stack_lvl+0x140/0x1c0 [ 78.080158][ T2720] ? __cfi_dump_stack_lvl+0x10/0x10 [ 78.080171][ T2720] ? entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 78.080189][ T2720] dump_stack+0x19/0x20 [ 78.080208][ T2720] should_fail_ex+0x3d7/0x530 [ 78.080219][ T2720] should_fail+0xf/0x20 [ 78.080228][ T2720] should_fail_usercopy+0x1e/0x30 [ 78.080240][ T2720] _copy_from_iter+0x1a9/0x1510 [ 78.080261][ T2720] ? __cfi__copy_from_iter+0x10/0x10 [ 78.080280][ T2720] ? __check_object_size+0x527/0x830 [ 78.080302][ T2720] ? __cfi___check_object_size+0x10/0x10 [ 78.080316][ T2720] ? __kasan_check_write+0x18/0x20 [ 78.080328][ T2720] ? __build_skb_around+0x2a4/0x590 [ 78.080342][ T2720] skb_copy_datagram_from_iter+0x100/0x700 [ 78.080356][ T2720] ? __cfi_mutex_lock+0x10/0x10 [ 78.080370][ T2720] tun_get_user+0x16ef/0x36c0 [ 78.080385][ T2720] ? _parse_integer_limit+0x195/0x1e0 [ 78.080401][ T2720] ? ptr_ring_consume+0x430/0x430 [ 78.080415][ T2720] ? _parse_integer+0x2e/0x40 [ 78.080429][ T2720] ? kstrtoull+0x13b/0x1e0 [ 78.080439][ T2720] ? __kasan_check_write+0x18/0x20 [ 78.080454][ T2720] ? ref_tracker_alloc+0x30d/0x590 [ 78.080465][ T2720] ? __cfi_ref_tracker_alloc+0x10/0x10 [ 78.080477][ T2720] ? selinux_file_permission+0x318/0xb60 [ 78.080489][ T2720] ? __kasan_check_write+0x18/0x20 [ 78.080501][ T2720] tun_chr_write_iter+0x1fc/0x310 [ 78.080514][ T2720] vfs_write+0x764/0xf90 [ 78.080528][ T2720] ? __cfi_vfs_write+0x10/0x10 [ 78.080541][ T2720] ksys_write+0x145/0x260 [ 78.080553][ T2720] ? __cfi_ksys_write+0x10/0x10 [ 78.080565][ T2720] ? __kasan_check_read+0x15/0x20 [ 78.080577][ T2720] __x64_sys_write+0x7f/0x90 [ 78.080589][ T2720] x64_sys_call+0x271c/0x2ee0 [ 78.080603][ T2720] do_syscall_64+0x57/0xf0 [ 78.080612][ T2720] ? clear_bhb_loop+0x50/0xa0 [ 78.080622][ T2720] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 78.080636][ T2720] RIP: 0033:0x7fd91a99c799 [ 78.080646][ T2720] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 78.080656][ T2720] RSP: 002b:00007fd91b812028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 78.080668][ T2720] RAX: ffffffffffffffda RBX: 00007fd91ac15fa0 RCX: 00007fd91a99c799 [ 78.080677][ T2720] RDX: 0000000000000016 RSI: 0000200000000100 RDI: 0000000000000003 [ 78.080684][ T2720] RBP: 00007fd91b812090 R08: 0000000000000000 R09: 0000000000000000 [ 78.080691][ T2720] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 78.080698][ T2720] R13: 00007fd91ac16038 R14: 00007fd91ac15fa0 R15: 00007ffcbed708e8 [ 78.080707][ T2720] [ 78.398532][ T2726] netlink: 12 bytes leftover after parsing attributes in process `syz.2.1113'. [ 78.430755][ T13] Bluetooth: hci0: Frame reassembly failed (-84) [ 78.495129][ T2736] Bluetooth: hci0: Frame reassembly failed (-84) [ 78.511750][ T2740] FAULT_INJECTION: forcing a failure. [ 78.511750][ T2740] name failslab, interval 1, probability 0, space 0, times 0 [ 78.524403][ T2740] CPU: 1 UID: 0 PID: 2740 Comm: syz.3.1119 Not tainted syzkaller #0 0f1aaf4ea31c6587efab90ed4dfa0b6225873f33 [ 78.524433][ T2740] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 78.524445][ T2740] Call Trace: [ 78.524449][ T2740] [ 78.524454][ T2740] __dump_stack+0x21/0x30 [ 78.524473][ T2740] dump_stack_lvl+0x140/0x1c0 [ 78.524486][ T2740] ? __cfi_dump_stack_lvl+0x10/0x10 [ 78.524499][ T2740] ? check_stack_object+0x81/0x150 [ 78.524517][ T2740] ? __virt_addr_valid+0x2a6/0x380 [ 78.524528][ T2740] dump_stack+0x19/0x20 [ 78.524540][ T2740] should_fail_ex+0x3d7/0x530 [ 78.524551][ T2740] should_failslab+0xac/0x100 [ 78.524566][ T2740] __kmalloc_cache_noprof+0x41/0x470 [ 78.524580][ T2740] ? memdup_user+0xb1/0x170 [ 78.524591][ T2740] ? __se_sys_mount+0x15f/0x480 [ 78.524605][ T2740] __se_sys_mount+0x15f/0x480 [ 78.524617][ T2740] ? ksys_write+0x1f3/0x260 [ 78.524629][ T2740] ? __x64_sys_mount+0xf0/0xf0 [ 78.524642][ T2740] __x64_sys_mount+0xc3/0xf0 [ 78.524655][ T2740] x64_sys_call+0x2021/0x2ee0 [ 78.524669][ T2740] do_syscall_64+0x57/0xf0 [ 78.524679][ T2740] ? clear_bhb_loop+0x50/0xa0 [ 78.524689][ T2740] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 78.524705][ T2740] RIP: 0033:0x7fd91a99c799 [ 78.524714][ T2740] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 78.524724][ T2740] RSP: 002b:00007fd91b812028 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 78.524737][ T2740] RAX: ffffffffffffffda RBX: 00007fd91ac15fa0 RCX: 00007fd91a99c799 [ 78.524746][ T2740] RDX: 00002000000000c0 RSI: 0000200000000080 RDI: 0000000000000000 [ 78.524753][ T2740] RBP: 00007fd91b812090 R08: 0000200000000100 R09: 0000000000000000 [ 78.524761][ T2740] R10: 0000000002000000 R11: 0000000000000246 R12: 0000000000000001 [ 78.524768][ T2740] R13: 00007fd91ac16038 R14: 00007fd91ac15fa0 R15: 00007ffcbed708e8 [ 78.524776][ T2740] [ 79.048920][ T2762] FAULT_INJECTION: forcing a failure. [ 79.048920][ T2762] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 79.062144][ T2762] CPU: 0 UID: 0 PID: 2762 Comm: syz.1.1129 Not tainted syzkaller #0 0f1aaf4ea31c6587efab90ed4dfa0b6225873f33 [ 79.062165][ T2762] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 79.062173][ T2762] Call Trace: [ 79.062178][ T2762] [ 79.062183][ T2762] __dump_stack+0x21/0x30 [ 79.062202][ T2762] dump_stack_lvl+0x140/0x1c0 [ 79.062215][ T2762] ? __cfi_dump_stack_lvl+0x10/0x10 [ 79.062228][ T2762] ? __kvmalloc_node_noprof+0x128/0x300 [ 79.062241][ T2762] ? check_stack_object+0x81/0x150 [ 79.062253][ T2762] ? __virt_addr_valid+0x2a6/0x380 [ 79.062265][ T2762] dump_stack+0x19/0x20 [ 79.062277][ T2762] should_fail_ex+0x3d7/0x530 [ 79.062288][ T2762] should_fail+0xf/0x20 [ 79.062297][ T2762] should_fail_usercopy+0x1e/0x30 [ 79.062309][ T2762] _copy_from_user+0x20/0xa0 [ 79.062322][ T2762] vmemdup_user+0x7d/0x190 [ 79.062333][ T2762] ? __se_sys_fsetxattr+0x2fe/0x500 [ 79.062346][ T2762] __se_sys_fsetxattr+0x338/0x500 [ 79.062358][ T2762] ? __x64_sys_fsetxattr+0xf0/0xf0 [ 79.062374][ T2762] ? __cfi_ksys_write+0x10/0x10 [ 79.062387][ T2762] __x64_sys_fsetxattr+0xc3/0xf0 [ 79.062398][ T2762] x64_sys_call+0x1a16/0x2ee0 [ 79.062412][ T2762] do_syscall_64+0x57/0xf0 [ 79.062422][ T2762] ? clear_bhb_loop+0x50/0xa0 [ 79.062432][ T2762] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 79.062448][ T2762] RIP: 0033:0x7fda2b19c799 [ 79.062458][ T2762] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 79.062468][ T2762] RSP: 002b:00007fda2bf95028 EFLAGS: 00000246 ORIG_RAX: 00000000000000be [ 79.062481][ T2762] RAX: ffffffffffffffda RBX: 00007fda2b415fa0 RCX: 00007fda2b19c799 [ 79.062489][ T2762] RDX: 00002000000003c0 RSI: 0000200000000380 RDI: 0000000000000003 [ 79.062497][ T2762] RBP: 00007fda2bf95090 R08: 0000000000000000 R09: 0000000000000000 [ 79.062504][ T2762] R10: 0000000000000024 R11: 0000000000000246 R12: 0000000000000001 [ 79.062511][ T2762] R13: 00007fda2b416038 R14: 00007fda2b415fa0 R15: 00007ffe6143c478 [ 79.062520][ T2762] [ 79.904384][ T2791] FAULT_INJECTION: forcing a failure. [ 79.904384][ T2791] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 79.953225][ T2791] CPU: 1 UID: 0 PID: 2791 Comm: syz.0.1141 Not tainted syzkaller #0 0f1aaf4ea31c6587efab90ed4dfa0b6225873f33 [ 79.953260][ T2791] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 79.953272][ T2791] Call Trace: [ 79.953278][ T2791] [ 79.953286][ T2791] __dump_stack+0x21/0x30 [ 79.953315][ T2791] dump_stack_lvl+0x140/0x1c0 [ 79.953337][ T2791] ? __cfi_dump_stack_lvl+0x10/0x10 [ 79.953360][ T2791] ? avc_has_perm_noaudit+0x28a/0x360 [ 79.953386][ T2791] dump_stack+0x19/0x20 [ 79.953407][ T2791] should_fail_ex+0x3d7/0x530 [ 79.953427][ T2791] should_fail+0xf/0x20 [ 79.953444][ T2791] should_fail_usercopy+0x1e/0x30 [ 79.953465][ T2791] _copy_from_user+0x20/0xa0 [ 79.953486][ T2791] ipv6_get_msfilter+0x151/0x370 [ 79.953511][ T2791] ? compat_ipv6_get_msfilter+0x460/0x460 [ 79.953541][ T2791] ? __kasan_check_write+0x18/0x20 [ 79.953564][ T2791] do_ipv6_getsockopt+0xe2a/0x2200 [ 79.953589][ T2791] ? __cfi_do_ipv6_getsockopt+0x10/0x10 [ 79.953613][ T2791] ? bpf_lsm_kernfs_init_security+0x20/0x20 [ 79.953633][ T2791] ? _parse_integer_limit+0x195/0x1e0 [ 79.953660][ T2791] ? _parse_integer+0x2e/0x40 [ 79.953686][ T2791] ? avc_has_perm_noaudit+0x26c/0x360 [ 79.953708][ T2791] ? __asan_memcpy+0x5a/0x80 [ 79.953729][ T2791] ? avc_has_perm_noaudit+0x28a/0x360 [ 79.953752][ T2791] ? avc_has_perm+0x155/0x240 [ 79.953774][ T2791] ? __cfi_avc_has_perm+0x10/0x10 [ 79.953798][ T2791] ipv6_getsockopt+0xbe/0x2a0 [ 79.953822][ T2791] ? bpf_lsm_kernfs_init_security+0x20/0x20 [ 79.953841][ T2791] ? bpf_lsm_kernfs_init_security+0x20/0x20 [ 79.953860][ T2791] ? __cfi_ipv6_getsockopt+0x10/0x10 [ 79.953883][ T2791] ? vfs_write+0x9a4/0xf90 [ 79.953906][ T2791] tcp_getsockopt+0x106/0x130 [ 79.953924][ T2791] ? __cfi_vfs_write+0x10/0x10 [ 79.953946][ T2791] sock_common_getsockopt+0xb2/0xd0 [ 79.953966][ T2791] ? __cfi_sock_common_getsockopt+0x10/0x10 [ 79.953987][ T2791] do_sock_getsockopt+0x3a4/0x6c0 [ 79.954014][ T2791] ? __cfi_do_sock_getsockopt+0x10/0x10 [ 79.954038][ T2791] ? __fget_files+0x2c5/0x340 [ 79.954063][ T2791] __x64_sys_getsockopt+0x1d4/0x280 [ 79.954097][ T2791] x64_sys_call+0x10db/0x2ee0 [ 79.954123][ T2791] do_syscall_64+0x57/0xf0 [ 79.954140][ T2791] ? clear_bhb_loop+0x50/0xa0 [ 79.954159][ T2791] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 79.954187][ T2791] RIP: 0033:0x7f633d39c799 [ 79.954204][ T2791] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 79.954220][ T2791] RSP: 002b:00007f633e1f3028 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 79.954243][ T2791] RAX: ffffffffffffffda RBX: 00007f633d615fa0 RCX: 00007f633d39c799 [ 79.954258][ T2791] RDX: 0010000000000030 RSI: 0000000000000029 RDI: 0000000000000003 [ 79.954272][ T2791] RBP: 00007f633e1f3090 R08: 0000200000e5f000 R09: 0000000000000000 [ 79.954285][ T2791] R10: 0000200000034000 R11: 0000000000000246 R12: 0000000000000001 [ 79.954298][ T2791] R13: 00007f633d616038 R14: 00007f633d615fa0 R15: 00007ffec25e7aa8 [ 79.954314][ T2791] [ 79.980248][ T2793] syzkaller1: entered promiscuous mode [ 80.148501][ T2796] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8192 sclass=netlink_route_socket pid=2796 comm=syz.0.1142 [ 80.151096][ T2793] syzkaller1: entered allmulticast mode [ 80.420051][ T2811] FAULT_INJECTION: forcing a failure. [ 80.420051][ T2811] name failslab, interval 1, probability 0, space 0, times 0 [ 80.432784][ T2811] CPU: 0 UID: 0 PID: 2811 Comm: syz.1.1148 Not tainted syzkaller #0 0f1aaf4ea31c6587efab90ed4dfa0b6225873f33 [ 80.432816][ T2811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 80.432828][ T2811] Call Trace: [ 80.432835][ T2811] [ 80.432842][ T2811] __dump_stack+0x21/0x30 [ 80.432870][ T2811] dump_stack_lvl+0x140/0x1c0 [ 80.432892][ T2811] ? __cfi_dump_stack_lvl+0x10/0x10 [ 80.432915][ T2811] ? __asan_set_shadow_00+0x12/0x20 [ 80.432933][ T2811] ? do_vfs_ioctl+0x182d/0x2010 [ 80.432959][ T2811] dump_stack+0x19/0x20 [ 80.432980][ T2811] should_fail_ex+0x3d7/0x530 [ 80.433001][ T2811] should_failslab+0xac/0x100 [ 80.433027][ T2811] __kmalloc_cache_noprof+0x41/0x470 [ 80.433055][ T2811] ? ___kmalloc_large_node+0xf5/0x210 [ 80.433077][ T2811] ? __hw_addr_add_ex+0x208/0x7d0 [ 80.433105][ T2811] __hw_addr_add_ex+0x208/0x7d0 [ 80.433130][ T2811] dev_addr_init+0x15f/0x240 [ 80.433154][ T2811] ? __kasan_check_write+0x18/0x20 [ 80.433176][ T2811] ? __cfi_dev_addr_init+0x10/0x10 [ 80.433201][ T2811] ? avc_perm_nonode+0x1d0/0x1d0 [ 80.433226][ T2811] alloc_netdev_mqs+0x2f0/0x13c0 [ 80.433248][ T2811] ? __cfi_tun_setup+0x10/0x10 [ 80.433270][ T2811] tun_set_iff+0x55c/0xee0 [ 80.433300][ T2811] __tun_chr_ioctl+0x861/0x1f60 [ 80.433323][ T2811] ? __kasan_check_write+0x18/0x20 [ 80.433344][ T2811] ? tun_flow_create+0x400/0x400 [ 80.433366][ T2811] ? __fget_files+0x2c5/0x340 [ 80.433393][ T2811] ? __fget_files+0x2c5/0x340 [ 80.433418][ T2811] tun_chr_ioctl+0x2e/0x40 [ 80.433441][ T2811] ? __cfi_tun_chr_ioctl+0x10/0x10 [ 80.433464][ T2811] __se_sys_ioctl+0x135/0x1b0 [ 80.433489][ T2811] __x64_sys_ioctl+0x7f/0xa0 [ 80.433513][ T2811] x64_sys_call+0x1878/0x2ee0 [ 80.433532][ T2811] do_syscall_64+0x57/0xf0 [ 80.433542][ T2811] ? clear_bhb_loop+0x50/0xa0 [ 80.433552][ T2811] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 80.433568][ T2811] RIP: 0033:0x7fda2b19c799 [ 80.433577][ T2811] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 80.433587][ T2811] RSP: 002b:00007fda2bf95028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 80.433600][ T2811] RAX: ffffffffffffffda RBX: 00007fda2b415fa0 RCX: 00007fda2b19c799 [ 80.433608][ T2811] RDX: 0000200000000100 RSI: 00000000400454ca RDI: 0000000000000003 [ 80.433617][ T2811] RBP: 00007fda2bf95090 R08: 0000000000000000 R09: 0000000000000000 [ 80.433628][ T2811] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 80.433639][ T2811] R13: 00007fda2b416038 R14: 00007fda2b415fa0 R15: 00007ffe6143c478 [ 80.433654][ T2811] [ 80.690696][ T434] Bluetooth: hci0: command 0x1003 tx timeout [ 80.696713][ T54] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 80.713719][ T36] kauditd_printk_skb: 187 callbacks suppressed [ 80.713738][ T36] audit: type=1400 audit(2000000011.872:3327): avc: denied { sys_module } for pid=2805 comm="syz.3.1146" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 80.724241][ T2816] audit: audit_backlog=65 > audit_backlog_limit=64 [ 80.741857][ T36] audit: type=1400 audit(2000000011.872:3328): avc: denied { sys_module } for pid=2805 comm="syz.3.1146" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 80.751323][ T2816] audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 [ 80.768876][ T36] audit: type=1400 audit(2000000011.872:3329): avc: denied { sys_module } for pid=2805 comm="syz.3.1146" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 80.778480][ T2817] audit: audit_backlog=65 > audit_backlog_limit=64 [ 80.797654][ T36] audit: type=1400 audit(2000000011.872:3330): avc: denied { sys_module } for pid=2805 comm="syz.3.1146" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 80.805294][ T2816] audit: backlog limit exceeded [ 80.826014][ T36] audit: type=1400 audit(2000000011.872:3331): avc: denied { sys_module } for pid=2805 comm="syz.3.1146" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 80.839330][ T2817] audit: audit_lost=3 audit_rate_limit=0 audit_backlog_limit=64 [ 80.887623][ T2826] FAULT_INJECTION: forcing a failure. [ 80.887623][ T2826] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 80.900769][ T2826] CPU: 1 UID: 0 PID: 2826 Comm: syz.1.1154 Not tainted syzkaller #0 0f1aaf4ea31c6587efab90ed4dfa0b6225873f33 [ 80.900798][ T2826] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 80.900811][ T2826] Call Trace: [ 80.900817][ T2826] [ 80.900824][ T2826] __dump_stack+0x21/0x30 [ 80.900850][ T2826] dump_stack_lvl+0x140/0x1c0 [ 80.900863][ T2826] ? __cfi_dump_stack_lvl+0x10/0x10 [ 80.900877][ T2826] dump_stack+0x19/0x20 [ 80.900888][ T2826] should_fail_ex+0x3d7/0x530 [ 80.900900][ T2826] should_fail+0xf/0x20 [ 80.900909][ T2826] should_fail_usercopy+0x1e/0x30 [ 80.900920][ T2826] _copy_to_user+0x24/0xa0 [ 80.900933][ T2826] do_tcp_getsockopt+0x186e/0x2820 [ 80.900945][ T2826] ? __cfi_do_tcp_getsockopt+0x10/0x10 [ 80.900956][ T2826] ? kernel_write+0x680/0x6d0 [ 80.900969][ T2826] ? _parse_integer_limit+0x195/0x1e0 [ 80.900986][ T2826] ? _parse_integer+0x2e/0x40 [ 80.901000][ T2826] ? avc_has_perm_noaudit+0x26c/0x360 [ 80.901014][ T2826] ? __asan_memcpy+0x5a/0x80 [ 80.901026][ T2826] ? avc_has_perm_noaudit+0x28a/0x360 [ 80.901042][ T2826] ? avc_has_perm+0x155/0x240 [ 80.901054][ T2826] ? __cfi_avc_has_perm+0x10/0x10 [ 80.901067][ T2826] ? selinux_socket_getsockopt+0x281/0x380 [ 80.901083][ T2826] ? __cfi_selinux_socket_getsockopt+0x10/0x10 [ 80.901096][ T2826] ? bpf_lsm_file_permission+0xd/0x20 [ 80.901107][ T2826] ? vfs_write+0x9a4/0xf90 [ 80.901119][ T2826] tcp_getsockopt+0x77/0x130 [ 80.901129][ T2826] ? kernel_write+0x680/0x6d0 [ 80.901140][ T2826] ? kernel_write+0x680/0x6d0 [ 80.901152][ T2826] sock_common_getsockopt+0xb2/0xd0 [ 80.901165][ T2826] ? __cfi_sock_common_getsockopt+0x10/0x10 [ 80.901176][ T2826] do_sock_getsockopt+0x3a4/0x6c0 [ 80.901192][ T2826] ? __cfi_do_sock_getsockopt+0x10/0x10 [ 80.901207][ T2826] ? __fget_files+0x2c5/0x340 [ 80.901222][ T2826] __x64_sys_getsockopt+0x1d4/0x280 [ 80.901237][ T2826] x64_sys_call+0x10db/0x2ee0 [ 80.901251][ T2826] do_syscall_64+0x57/0xf0 [ 80.901261][ T2826] ? clear_bhb_loop+0x50/0xa0 [ 80.901271][ T2826] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 80.901296][ T2826] RIP: 0033:0x7fda2b19c799 [ 80.901305][ T2826] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 80.901315][ T2826] RSP: 002b:00007fda2bf95028 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 80.901328][ T2826] RAX: ffffffffffffffda RBX: 00007fda2b415fa0 RCX: 00007fda2b19c799 [ 80.901337][ T2826] RDX: 0000000000000015 RSI: 0000000000000006 RDI: 0000000000000003 [ 80.901344][ T2826] RBP: 00007fda2bf95090 R08: 0000200000000280 R09: 0000000000000000 [ 80.901351][ T2826] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 80.901358][ T2826] R13: 00007fda2b416038 R14: 00007fda2b415fa0 R15: 00007ffe6143c478 [ 80.901367][ T2826] [ 81.226032][ T2844] netlink: 16 bytes leftover after parsing attributes in process `syz.0.1161'. [ 81.250262][ T2846] EXT4-fs: Value of option "test_dummy_encryption" is unrecognized [ 81.937154][ T2883] FAULT_INJECTION: forcing a failure. [ 81.937154][ T2883] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 81.950223][ T2883] CPU: 0 UID: 0 PID: 2883 Comm: syz.1.1177 Not tainted syzkaller #0 0f1aaf4ea31c6587efab90ed4dfa0b6225873f33 [ 81.950251][ T2883] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 81.950258][ T2883] Call Trace: [ 81.950262][ T2883] [ 81.950267][ T2883] __dump_stack+0x21/0x30 [ 81.950285][ T2883] dump_stack_lvl+0x140/0x1c0 [ 81.950298][ T2883] ? __cfi_dump_stack_lvl+0x10/0x10 [ 81.950312][ T2883] dump_stack+0x19/0x20 [ 81.950324][ T2883] should_fail_ex+0x3d7/0x530 [ 81.950335][ T2883] should_fail+0xf/0x20 [ 81.950345][ T2883] should_fail_usercopy+0x1e/0x30 [ 81.950356][ T2883] _copy_from_user+0x20/0xa0 [ 81.950369][ T2883] __se_sys_mount+0x182/0x480 [ 81.950382][ T2883] ? ksys_write+0x1f3/0x260 [ 81.950395][ T2883] ? __x64_sys_mount+0xf0/0xf0 [ 81.950408][ T2883] __x64_sys_mount+0xc3/0xf0 [ 81.950420][ T2883] x64_sys_call+0x2021/0x2ee0 [ 81.950434][ T2883] do_syscall_64+0x57/0xf0 [ 81.950444][ T2883] ? clear_bhb_loop+0x50/0xa0 [ 81.950455][ T2883] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 81.950470][ T2883] RIP: 0033:0x7fda2b19c799 [ 81.950480][ T2883] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 81.950490][ T2883] RSP: 002b:00007fda2bf95028 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 81.950502][ T2883] RAX: ffffffffffffffda RBX: 00007fda2b415fa0 RCX: 00007fda2b19c799 [ 81.950511][ T2883] RDX: 00002000000000c0 RSI: 0000200000000080 RDI: 0000000000000000 [ 81.950519][ T2883] RBP: 00007fda2bf95090 R08: 0000200000000100 R09: 0000000000000000 [ 81.950526][ T2883] R10: 0000000002000000 R11: 0000000000000246 R12: 0000000000000001 [ 81.950533][ T2883] R13: 00007fda2b416038 R14: 00007fda2b415fa0 R15: 00007ffe6143c478 [ 81.950541][ T2883] [ 82.142373][ T2887] FAULT_INJECTION: forcing a failure. [ 82.142373][ T2887] name failslab, interval 1, probability 0, space 0, times 0 [ 82.155066][ T2887] CPU: 0 UID: 0 PID: 2887 Comm: syz.1.1179 Not tainted syzkaller #0 0f1aaf4ea31c6587efab90ed4dfa0b6225873f33 [ 82.155098][ T2887] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 82.155109][ T2887] Call Trace: [ 82.155116][ T2887] [ 82.155122][ T2887] __dump_stack+0x21/0x30 [ 82.155141][ T2887] dump_stack_lvl+0x140/0x1c0 [ 82.155154][ T2887] ? __cfi_dump_stack_lvl+0x10/0x10 [ 82.155167][ T2887] dump_stack+0x19/0x20 [ 82.155179][ T2887] should_fail_ex+0x3d7/0x530 [ 82.155190][ T2887] should_failslab+0xac/0x100 [ 82.155205][ T2887] kmem_cache_alloc_noprof+0x42/0x410 [ 82.155218][ T2887] ? mas_alloc_nodes+0x254/0x9d0 [ 82.155239][ T2887] mas_alloc_nodes+0x254/0x9d0 [ 82.155252][ T2887] mas_preallocate+0x783/0xcb0 [ 82.155265][ T2887] ? _raw_spin_unlock+0x45/0x60 [ 82.155275][ T2887] ? __cfi_mas_preallocate+0x10/0x10 [ 82.155288][ T2887] ? swake_up_one_online_ipi+0x30/0x30 [ 82.155302][ T2887] commit_merge+0x4be/0xeb0 [ 82.155320][ T2887] ? vma_expand+0x5b0/0x5b0 [ 82.155332][ T2887] ? mtree_range_walk+0x573/0x730 [ 82.155344][ T2887] ? __kasan_check_read+0x15/0x20 [ 82.155357][ T2887] vma_expand+0x358/0x5b0 [ 82.155369][ T2887] vma_merge_new_range+0x5c3/0x850 [ 82.155383][ T2887] copy_vma+0x45a/0x940 [ 82.155397][ T2887] ? __cfi_copy_vma+0x10/0x10 [ 82.155412][ T2887] ? __kasan_check_read+0x15/0x20 [ 82.155423][ T2887] ? __vm_enough_memory+0x11f/0x380 [ 82.155438][ T2887] move_vma+0x4fe/0x11c0 [ 82.155448][ T2887] ? __cfi_arch_get_unmapped_area_topdown+0x10/0x10 [ 82.155464][ T2887] ? do_munmap+0xfc/0x160 [ 82.155477][ T2887] ? vma_expandable+0x100/0x100 [ 82.155487][ T2887] ? cap_mmap_addr+0x169/0x2e0 [ 82.155498][ T2887] ? security_mmap_addr+0x31/0xe0 [ 82.155508][ T2887] mremap_to+0x546/0x610 [ 82.155519][ T2887] __se_sys_mremap+0x5af/0xfe0 [ 82.155529][ T2887] ? __cfi_vfs_write+0x10/0x10 [ 82.155541][ T2887] ? __x64_sys_mremap+0xf0/0xf0 [ 82.155551][ T2887] ? __kasan_check_write+0x18/0x20 [ 82.155563][ T2887] ? mutex_unlock+0x90/0x240 [ 82.155574][ T2887] ? __cfi_mutex_unlock+0x10/0x10 [ 82.155586][ T2887] ? __fget_files+0x2c5/0x340 [ 82.155600][ T2887] ? __kasan_check_write+0x18/0x20 [ 82.155612][ T2887] ? fput+0x1a4/0x240 [ 82.155621][ T2887] ? ksys_write+0x1f3/0x260 [ 82.155633][ T2887] ? __cfi_ksys_write+0x10/0x10 [ 82.155645][ T2887] __x64_sys_mremap+0xc3/0xf0 [ 82.155656][ T2887] x64_sys_call+0x2ac4/0x2ee0 [ 82.155669][ T2887] do_syscall_64+0x57/0xf0 [ 82.155679][ T2887] ? clear_bhb_loop+0x50/0xa0 [ 82.155689][ T2887] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 82.155704][ T2887] RIP: 0033:0x7fda2b19c799 [ 82.155715][ T2887] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 82.155724][ T2887] RSP: 002b:00007fda2bf95028 EFLAGS: 00000246 ORIG_RAX: 0000000000000019 [ 82.155737][ T2887] RAX: ffffffffffffffda RBX: 00007fda2b415fa0 RCX: 00007fda2b19c799 [ 82.155746][ T2887] RDX: 0000000000400000 RSI: 0000000000001000 RDI: 0000200000a96000 [ 82.155753][ T2887] RBP: 00007fda2bf95090 R08: 0000200000000000 R09: 0000000000000000 [ 82.155761][ T2887] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000001 [ 82.155767][ T2887] R13: 00007fda2b416038 R14: 00007fda2b415fa0 R15: 00007ffe6143c478 [ 82.155776][ T2887] [ 83.235721][ T2920] FAULT_INJECTION: forcing a failure. [ 83.235721][ T2920] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 83.248850][ T2920] CPU: 0 UID: 0 PID: 2920 Comm: syz.3.1194 Not tainted syzkaller #0 0f1aaf4ea31c6587efab90ed4dfa0b6225873f33 [ 83.248871][ T2920] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 83.248880][ T2920] Call Trace: [ 83.248884][ T2920] [ 83.248888][ T2920] __dump_stack+0x21/0x30 [ 83.248907][ T2920] dump_stack_lvl+0x140/0x1c0 [ 83.248920][ T2920] ? __cfi_dump_stack_lvl+0x10/0x10 [ 83.248937][ T2920] ? restore_altstack+0x2d3/0x4d0 [ 83.248953][ T2920] dump_stack+0x19/0x20 [ 83.248965][ T2920] should_fail_ex+0x3d7/0x530 [ 83.248976][ T2920] should_fail+0xf/0x20 [ 83.248986][ T2920] should_fail_usercopy+0x1e/0x30 [ 83.248997][ T2920] _copy_from_user+0x20/0xa0 [ 83.249010][ T2920] __ia32_sys_rt_sigreturn+0x2ed/0x850 [ 83.249025][ T2920] ? recalc_sigpending+0x16c/0x1d0 [ 83.249035][ T2920] ? _raw_spin_unlock_irq+0x45/0x70 [ 83.249046][ T2920] ? __cfi___x64_sys_rt_sigreturn+0x10/0x10 [ 83.249062][ T2920] ? __kasan_check_read+0x15/0x20 [ 83.249076][ T2920] x64_sys_call+0x2c14/0x2ee0 [ 83.249090][ T2920] do_syscall_64+0x57/0xf0 [ 83.249099][ T2920] ? clear_bhb_loop+0x50/0xa0 [ 83.249110][ T2920] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 83.249131][ T2920] RIP: 0033:0x7fd91a93db19 [ 83.249141][ T2920] Code: 11 06 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 90 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 c7 c0 0f 00 00 00 0f 05 <0f> 1f 80 00 00 00 00 48 81 ec 48 01 00 00 49 89 d0 64 48 8b 0c 25 [ 83.249150][ T2920] RSP: 002b:00007fd91b811a80 EFLAGS: 00000246 ORIG_RAX: 000000000000000f [ 83.249163][ T2920] RAX: ffffffffffffffda RBX: 00007fd91ac15fa0 RCX: 00007fd91a93db19 [ 83.249172][ T2920] RDX: 00007fd91b811a80 RSI: 00007fd91b811bb0 RDI: 0000000000000011 [ 83.249179][ T2920] RBP: 00007fd91b812090 R08: 0000000000000000 R09: 0000000000000000 [ 83.249186][ T2920] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 83.249193][ T2920] R13: 00007fd91ac16038 R14: 00007fd91ac15fa0 R15: 00007ffcbed708e8 [ 83.249202][ T2920] [ 83.477751][ T2932] netlink: 24 bytes leftover after parsing attributes in process `syz.3.1199'. [ 83.991526][ T2946] FAULT_INJECTION: forcing a failure. [ 83.991526][ T2946] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 84.004664][ T2946] CPU: 1 UID: 0 PID: 2946 Comm: syz.2.1205 Not tainted syzkaller #0 0f1aaf4ea31c6587efab90ed4dfa0b6225873f33 [ 84.004696][ T2946] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 84.004708][ T2946] Call Trace: [ 84.004715][ T2946] [ 84.004723][ T2946] __dump_stack+0x21/0x30 [ 84.004751][ T2946] dump_stack_lvl+0x140/0x1c0 [ 84.004774][ T2946] ? __cfi_dump_stack_lvl+0x10/0x10 [ 84.004799][ T2946] dump_stack+0x19/0x20 [ 84.004820][ T2946] should_fail_ex+0x3d7/0x530 [ 84.004840][ T2946] should_fail+0xf/0x20 [ 84.004858][ T2946] should_fail_usercopy+0x1e/0x30 [ 84.004878][ T2946] _copy_to_user+0x24/0xa0 [ 84.004901][ T2946] do_tcp_getsockopt+0x1915/0x2820 [ 84.004924][ T2946] ? __cfi_do_tcp_getsockopt+0x10/0x10 [ 84.004944][ T2946] ? kernel_write+0x680/0x6d0 [ 84.004966][ T2946] ? _parse_integer_limit+0x195/0x1e0 [ 84.004994][ T2946] ? _parse_integer+0x2e/0x40 [ 84.005021][ T2946] ? avc_has_perm_noaudit+0x26c/0x360 [ 84.005045][ T2946] ? __asan_memcpy+0x5a/0x80 [ 84.005067][ T2946] ? avc_has_perm_noaudit+0x28a/0x360 [ 84.005097][ T2946] ? avc_has_perm+0x155/0x240 [ 84.005120][ T2946] ? __cfi_avc_has_perm+0x10/0x10 [ 84.005144][ T2946] ? selinux_socket_getsockopt+0x281/0x380 [ 84.005172][ T2946] ? __cfi_selinux_socket_getsockopt+0x10/0x10 [ 84.005198][ T2946] ? bpf_lsm_file_permission+0xd/0x20 [ 84.005217][ T2946] ? vfs_write+0x9a4/0xf90 [ 84.005238][ T2946] tcp_getsockopt+0x77/0x130 [ 84.005254][ T2946] ? kernel_write+0x680/0x6d0 [ 84.005273][ T2946] ? kernel_write+0x680/0x6d0 [ 84.005292][ T2946] sock_common_getsockopt+0xb2/0xd0 [ 84.005312][ T2946] ? __cfi_sock_common_getsockopt+0x10/0x10 [ 84.005333][ T2946] do_sock_getsockopt+0x3a4/0x6c0 [ 84.005359][ T2946] ? __cfi_do_sock_getsockopt+0x10/0x10 [ 84.005384][ T2946] ? __fget_files+0x2c5/0x340 [ 84.005410][ T2946] __x64_sys_getsockopt+0x1d4/0x280 [ 84.005438][ T2946] x64_sys_call+0x10db/0x2ee0 [ 84.005464][ T2946] do_syscall_64+0x57/0xf0 [ 84.005482][ T2946] ? clear_bhb_loop+0x50/0xa0 [ 84.005501][ T2946] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 84.005529][ T2946] RIP: 0033:0x7fe2f979c799 [ 84.005546][ T2946] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 84.005563][ T2946] RSP: 002b:00007fe2fa6f1028 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 84.005585][ T2946] RAX: ffffffffffffffda RBX: 00007fe2f9a15fa0 RCX: 00007fe2f979c799 [ 84.005601][ T2946] RDX: 0000000000000015 RSI: 0000000000000006 RDI: 0000000000000003 [ 84.005614][ T2946] RBP: 00007fe2fa6f1090 R08: 0000200000000280 R09: 0000000000000000 [ 84.005628][ T2946] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 84.005641][ T2946] R13: 00007fe2f9a16038 R14: 00007fe2f9a15fa0 R15: 00007ffc65e68578 [ 84.005659][ T2946] [ 84.854125][ T2980] FAULT_INJECTION: forcing a failure. [ 84.854125][ T2980] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 84.867190][ T2980] CPU: 1 UID: 0 PID: 2980 Comm: syz.3.1220 Not tainted syzkaller #0 0f1aaf4ea31c6587efab90ed4dfa0b6225873f33 [ 84.867219][ T2980] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 84.867232][ T2980] Call Trace: [ 84.867237][ T2980] [ 84.867242][ T2980] __dump_stack+0x21/0x30 [ 84.867265][ T2980] dump_stack_lvl+0x140/0x1c0 [ 84.867278][ T2980] ? __cfi_dump_stack_lvl+0x10/0x10 [ 84.867291][ T2980] ? vsnprintf+0x7b4/0x1ad0 [ 84.867306][ T2980] ? check_stack_object+0x106/0x150 [ 84.867320][ T2980] dump_stack+0x19/0x20 [ 84.867332][ T2980] should_fail_ex+0x3d7/0x530 [ 84.867343][ T2980] should_fail+0xf/0x20 [ 84.867352][ T2980] should_fail_usercopy+0x1e/0x30 [ 84.867364][ T2980] _copy_from_user+0x20/0xa0 [ 84.867377][ T2980] kstrtouint_from_user+0xde/0x170 [ 84.867387][ T2980] ? __cfi_kstrtouint_from_user+0x10/0x10 [ 84.867397][ T2980] ? selinux_file_permission+0x318/0xb60 [ 84.867409][ T2980] ? __cfi_selinux_file_permission+0x10/0x10 [ 84.867420][ T2980] proc_fail_nth_write+0x8f/0x220 [ 84.867431][ T2980] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 84.867441][ T2980] ? bpf_lsm_file_permission+0xd/0x20 [ 84.867451][ T2980] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 84.867461][ T2980] vfs_write+0x3c5/0xf90 [ 84.867474][ T2980] ? __cfi_vfs_write+0x10/0x10 [ 84.867486][ T2980] ? __kasan_check_write+0x18/0x20 [ 84.867498][ T2980] ? mutex_lock+0x97/0x1d0 [ 84.867510][ T2980] ? __cfi_mutex_lock+0x10/0x10 [ 84.867521][ T2980] ? __fget_files+0x2c5/0x340 [ 84.867536][ T2980] ksys_write+0x145/0x260 [ 84.867548][ T2980] ? __cfi_ksys_write+0x10/0x10 [ 84.867560][ T2980] ? __kasan_check_read+0x15/0x20 [ 84.867572][ T2980] __x64_sys_write+0x7f/0x90 [ 84.867584][ T2980] x64_sys_call+0x271c/0x2ee0 [ 84.867599][ T2980] do_syscall_64+0x57/0xf0 [ 84.867608][ T2980] ? clear_bhb_loop+0x50/0xa0 [ 84.867618][ T2980] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 84.867634][ T2980] RIP: 0033:0x7fd91a95cfce [ 84.867644][ T2980] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 84.867654][ T2980] RSP: 002b:00007fd91b811fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 84.867666][ T2980] RAX: ffffffffffffffda RBX: 00007fd91b8126c0 RCX: 00007fd91a95cfce [ 84.867675][ T2980] RDX: 0000000000000001 RSI: 00007fd91b8120a0 RDI: 0000000000000006 [ 84.867682][ T2980] RBP: 00007fd91b812090 R08: 0000000000000000 R09: 0000000000000000 [ 84.867689][ T2980] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 84.867696][ T2980] R13: 00007fd91ac16038 R14: 00007fd91ac15fa0 R15: 00007ffcbed708e8 [ 84.867705][ T2980] [ 85.552823][ T3000] FAULT_INJECTION: forcing a failure. [ 85.552823][ T3000] name failslab, interval 1, probability 0, space 0, times 0 [ 85.565483][ T3000] CPU: 1 UID: 0 PID: 3000 Comm: syz.0.1229 Not tainted syzkaller #0 0f1aaf4ea31c6587efab90ed4dfa0b6225873f33 [ 85.565517][ T3000] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 85.565524][ T3000] Call Trace: [ 85.565528][ T3000] [ 85.565533][ T3000] __dump_stack+0x21/0x30 [ 85.565551][ T3000] dump_stack_lvl+0x140/0x1c0 [ 85.565563][ T3000] ? __cfi_dump_stack_lvl+0x10/0x10 [ 85.565576][ T3000] ? do_user_addr_fault+0xbbb/0x11e0 [ 85.565591][ T3000] dump_stack+0x19/0x20 [ 85.565603][ T3000] should_fail_ex+0x3d7/0x530 [ 85.565614][ T3000] should_failslab+0xac/0x100 [ 85.565629][ T3000] kmem_cache_alloc_noprof+0x42/0x410 [ 85.565642][ T3000] ? getname_flags+0xc5/0x700 [ 85.565655][ T3000] ? asm_exc_page_fault+0x2b/0x30 [ 85.565671][ T3000] getname_flags+0xc5/0x700 [ 85.565689][ T3000] user_path_at+0x2b/0x60 [ 85.565703][ T3000] __se_sys_mount+0x28a/0x480 [ 85.565716][ T3000] ? ksys_write+0x1f3/0x260 [ 85.565729][ T3000] ? __x64_sys_mount+0xf0/0xf0 [ 85.565742][ T3000] __x64_sys_mount+0xc3/0xf0 [ 85.565754][ T3000] x64_sys_call+0x2021/0x2ee0 [ 85.565768][ T3000] do_syscall_64+0x57/0xf0 [ 85.565777][ T3000] ? clear_bhb_loop+0x50/0xa0 [ 85.565787][ T3000] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 85.565802][ T3000] RIP: 0033:0x7f633d39c799 [ 85.565812][ T3000] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 85.565820][ T3000] RSP: 002b:00007f633e1f3028 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 85.565834][ T3000] RAX: ffffffffffffffda RBX: 00007f633d615fa0 RCX: 00007f633d39c799 [ 85.565842][ T3000] RDX: 00002000000000c0 RSI: 0000200000000080 RDI: 0000000000000000 [ 85.565849][ T3000] RBP: 00007f633e1f3090 R08: 0000200000000100 R09: 0000000000000000 [ 85.565856][ T3000] R10: 0000000002000000 R11: 0000000000000246 R12: 0000000000000001 [ 85.565863][ T3000] R13: 00007f633d616038 R14: 00007f633d615fa0 R15: 00007ffec25e7aa8 [ 85.565872][ T3000] [ 85.726393][ T36] kauditd_printk_skb: 338 callbacks suppressed [ 85.726409][ T36] audit: type=1400 audit(2000000016.965:3669): avc: denied { mounton } for pid=3001 comm="syz.3.1230" path="/329/file0" dev="tmpfs" ino=1764 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 85.761689][ T3005] FAULT_INJECTION: forcing a failure. [ 85.761689][ T3005] name failslab, interval 1, probability 0, space 0, times 0 [ 85.762619][ T36] audit: type=1400 audit(2000000016.965:3670): avc: denied { read write } for pid=293 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 85.765364][ T3005] CPU: 1 UID: 0 PID: 3005 Comm: syz.0.1231 Not tainted syzkaller #0 0f1aaf4ea31c6587efab90ed4dfa0b6225873f33 [ 85.765390][ T3005] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 85.765402][ T3005] Call Trace: [ 85.765408][ T3005] [ 85.765415][ T3005] __dump_stack+0x21/0x30 [ 85.765441][ T3005] dump_stack_lvl+0x140/0x1c0 [ 85.765462][ T3005] ? __cfi_dump_stack_lvl+0x10/0x10 [ 85.765485][ T3005] dump_stack+0x19/0x20 [ 85.765504][ T3005] should_fail_ex+0x3d7/0x530 [ 85.765523][ T3005] should_failslab+0xac/0x100 [ 85.765548][ T3005] kmem_cache_alloc_noprof+0x42/0x410 [ 85.765569][ T3005] ? vm_area_dup+0x42/0x570 [ 85.765590][ T3005] vm_area_dup+0x42/0x570 [ 85.765605][ T3005] __split_vma+0x1d5/0xab0 [ 85.765627][ T3005] ? commit_merge+0xd15/0xeb0 [ 85.765649][ T3005] ? vms_gather_munmap_vmas+0xdd0/0xdd0 [ 85.765681][ T3005] vms_gather_munmap_vmas+0x273/0xdd0 [ 85.765703][ T3005] ? __kasan_check_read+0x15/0x20 [ 85.765723][ T3005] ? khugepaged_enter_vma+0x3ac/0x430 [ 85.765749][ T3005] ? vma_merge_new_range+0x6db/0x850 [ 85.765772][ T3005] do_vmi_align_munmap+0x251/0x610 [ 85.765796][ T3005] ? __cfi_do_vmi_align_munmap+0x10/0x10 [ 85.765819][ T3005] ? mas_walk+0x3f7/0x650 [ 85.765842][ T3005] ? mas_find+0x358/0x5f0 [ 85.765863][ T3005] do_vmi_munmap+0x245/0x2e0 [ 85.765886][ T3005] move_vma+0xaab/0x11c0 [ 85.765904][ T3005] ? vma_expandable+0x100/0x100 [ 85.765921][ T3005] ? cap_mmap_addr+0x169/0x2e0 [ 85.765940][ T3005] ? security_mmap_addr+0x31/0xe0 [ 85.765958][ T3005] mremap_to+0x546/0x610 [ 85.765976][ T3005] __se_sys_mremap+0x5af/0xfe0 [ 85.765994][ T3005] ? __cfi_vfs_write+0x10/0x10 [ 85.766014][ T3005] ? __x64_sys_mremap+0xf0/0xf0 [ 85.766031][ T3005] ? __kasan_check_write+0x18/0x20 [ 85.766051][ T3005] ? mutex_unlock+0x90/0x240 [ 85.766070][ T3005] ? __cfi_mutex_unlock+0x10/0x10 [ 85.766090][ T3005] ? __fget_files+0x2c5/0x340 [ 85.766114][ T3005] ? __kasan_check_write+0x18/0x20 [ 85.766133][ T3005] ? fput+0x1a4/0x240 [ 85.766148][ T3005] ? ksys_write+0x1f3/0x260 [ 85.766169][ T3005] ? __cfi_ksys_write+0x10/0x10 [ 85.766190][ T3005] __x64_sys_mremap+0xc3/0xf0 [ 85.766207][ T3005] x64_sys_call+0x2ac4/0x2ee0 [ 85.766231][ T3005] do_syscall_64+0x57/0xf0 [ 85.766246][ T3005] ? clear_bhb_loop+0x50/0xa0 [ 85.766263][ T3005] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 85.766288][ T3005] RIP: 0033:0x7f633d39c799 [ 85.766303][ T3005] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 85.766319][ T3005] RSP: 002b:00007f633e1f3028 EFLAGS: 00000246 ORIG_RAX: 0000000000000019 [ 85.766339][ T3005] RAX: ffffffffffffffda RBX: 00007f633d615fa0 RCX: 00007f633d39c799 [ 85.766352][ T3005] RDX: 0000000000400000 RSI: 0000000000001000 RDI: 0000200000a96000 [ 85.766365][ T3005] RBP: 00007f633e1f3090 R08: 0000200000000000 R09: 0000000000000000 [ 85.766377][ T3005] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000001 [ 85.766388][ T3005] R13: 00007f633d616038 R14: 00007f633d615fa0 R15: 00007ffec25e7aa8 [ 85.766404][ T3005] [ 85.791271][ T3009] syz.0.1233 uses obsolete (PF_INET,SOCK_PACKET) [ 85.794128][ T36] audit: type=1400 audit(2000000017.016:3671): avc: denied { read write } for pid=293 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 86.165707][ T36] audit: type=1400 audit(2000000017.016:3672): avc: denied { read write } for pid=293 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 86.190186][ T36] audit: type=1400 audit(2000000017.016:3673): avc: denied { create } for pid=3008 comm="syz.0.1233" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 86.210873][ T36] audit: type=1400 audit(2000000017.016:3674): avc: denied { read write } for pid=3008 comm="syz.0.1233" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 86.234150][ T36] audit: type=1400 audit(2000000017.046:3675): avc: denied { create } for pid=3008 comm="syz.0.1233" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 86.253888][ T36] audit: type=1400 audit(2000000017.046:3676): avc: denied { read } for pid=3008 comm="syz.0.1233" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 86.255351][ T3020] tun0: tun_chr_ioctl cmd 1074025675 [ 86.277541][ T36] audit: type=1400 audit(2000000017.046:3677): avc: denied { create } for pid=3008 comm="syz.0.1233" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 86.295944][ T3020] tun0: persist enabled [ 86.303050][ T36] audit: type=1400 audit(2000000017.046:3678): avc: denied { read write } for pid=293 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 86.310098][ T3022] tun0: tun_chr_ioctl cmd 1074025675 [ 86.336141][ T3022] tun0: persist enabled [ 86.443755][ T3036] FAULT_INJECTION: forcing a failure. [ 86.443755][ T3036] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 86.456896][ T3036] CPU: 1 UID: 0 PID: 3036 Comm: syz.0.1242 Not tainted syzkaller #0 0f1aaf4ea31c6587efab90ed4dfa0b6225873f33 [ 86.456933][ T3036] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 86.456946][ T3036] Call Trace: [ 86.456953][ T3036] [ 86.456960][ T3036] __dump_stack+0x21/0x30 [ 86.456989][ T3036] dump_stack_lvl+0x140/0x1c0 [ 86.457011][ T3036] ? __cfi_dump_stack_lvl+0x10/0x10 [ 86.457035][ T3036] ? check_stack_object+0x12b/0x150 [ 86.457060][ T3036] dump_stack+0x19/0x20 [ 86.457081][ T3036] should_fail_ex+0x3d7/0x530 [ 86.457105][ T3036] should_fail+0xf/0x20 [ 86.457123][ T3036] should_fail_usercopy+0x1e/0x30 [ 86.457143][ T3036] _copy_to_user+0x24/0xa0 [ 86.457166][ T3036] simple_read_from_buffer+0xed/0x160 [ 86.457193][ T3036] proc_fail_nth_read+0x1aa/0x220 [ 86.457214][ T3036] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 86.457234][ T3036] ? bpf_lsm_file_permission+0xd/0x20 [ 86.457253][ T3036] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 86.457272][ T3036] vfs_read+0x289/0xcb0 [ 86.457294][ T3036] ? fput+0x1a4/0x240 [ 86.457311][ T3036] ? __cfi_vfs_read+0x10/0x10 [ 86.457332][ T3036] ? __kasan_check_write+0x18/0x20 [ 86.457354][ T3036] ? mutex_lock+0x97/0x1d0 [ 86.457377][ T3036] ? __cfi_mutex_lock+0x10/0x10 [ 86.457398][ T3036] ? __fget_files+0x2c5/0x340 [ 86.457425][ T3036] ksys_read+0x145/0x260 [ 86.457448][ T3036] ? __cfi_ksys_read+0x10/0x10 [ 86.457470][ T3036] ? __kasan_check_read+0x15/0x20 [ 86.457492][ T3036] __x64_sys_read+0x7f/0x90 [ 86.457515][ T3036] x64_sys_call+0x2638/0x2ee0 [ 86.457540][ T3036] do_syscall_64+0x57/0xf0 [ 86.457557][ T3036] ? clear_bhb_loop+0x50/0xa0 [ 86.457576][ T3036] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 86.457604][ T3036] RIP: 0033:0x7f633d35cfce [ 86.457620][ T3036] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 86.457637][ T3036] RSP: 002b:00007f633e1f2fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 86.457659][ T3036] RAX: ffffffffffffffda RBX: 00007f633e1f36c0 RCX: 00007f633d35cfce [ 86.457675][ T3036] RDX: 000000000000000f RSI: 00007f633e1f30a0 RDI: 0000000000000004 [ 86.457688][ T3036] RBP: 00007f633e1f3090 R08: 0000000000000000 R09: 0000000000000000 [ 86.457701][ T3036] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 86.457714][ T3036] R13: 00007f633d616038 R14: 00007f633d615fa0 R15: 00007ffec25e7aa8 [ 86.457731][ T3036] [ 86.743053][ T3043] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1245'. [ 86.752161][ T3043] erspan0: default FDB implementation only supports local addresses [ 88.105440][ T3068] FAULT_INJECTION: forcing a failure. [ 88.105440][ T3068] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 88.128720][ T3068] CPU: 1 UID: 0 PID: 3068 Comm: syz.2.1256 Not tainted syzkaller #0 0f1aaf4ea31c6587efab90ed4dfa0b6225873f33 [ 88.128755][ T3068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 88.128773][ T3068] Call Trace: [ 88.128780][ T3068] [ 88.128787][ T3068] __dump_stack+0x21/0x30 [ 88.128816][ T3068] dump_stack_lvl+0x140/0x1c0 [ 88.128839][ T3068] ? __cfi_dump_stack_lvl+0x10/0x10 [ 88.128863][ T3068] ? check_stack_object+0x12b/0x150 [ 88.128887][ T3068] dump_stack+0x19/0x20 [ 88.128909][ T3068] should_fail_ex+0x3d7/0x530 [ 88.128933][ T3068] should_fail+0xf/0x20 [ 88.128950][ T3068] should_fail_usercopy+0x1e/0x30 [ 88.128971][ T3068] _copy_to_user+0x24/0xa0 [ 88.128994][ T3068] copy_to_sockptr_offset+0x7a/0xa0 [ 88.129021][ T3068] ipv6_get_msfilter+0x2a5/0x370 [ 88.129046][ T3068] ? compat_ipv6_get_msfilter+0x460/0x460 [ 88.129078][ T3068] ? __kasan_check_write+0x18/0x20 [ 88.129101][ T3068] do_ipv6_getsockopt+0xe2a/0x2200 [ 88.129127][ T3068] ? __cfi_do_ipv6_getsockopt+0x10/0x10 [ 88.129152][ T3068] ? bpf_lsm_kernfs_init_security+0x20/0x20 [ 88.129172][ T3068] ? _parse_integer_limit+0x195/0x1e0 [ 88.129200][ T3068] ? _parse_integer+0x2e/0x40 [ 88.129227][ T3068] ? avc_has_perm_noaudit+0x26c/0x360 [ 88.129251][ T3068] ? __asan_memcpy+0x5a/0x80 [ 88.129273][ T3068] ? avc_has_perm_noaudit+0x28a/0x360 [ 88.129297][ T3068] ? avc_has_perm+0x155/0x240 [ 88.129320][ T3068] ? __cfi_avc_has_perm+0x10/0x10 [ 88.129345][ T3068] ipv6_getsockopt+0xbe/0x2a0 [ 88.129369][ T3068] ? bpf_lsm_kernfs_init_security+0x20/0x20 [ 88.129388][ T3068] ? bpf_lsm_kernfs_init_security+0x20/0x20 [ 88.129406][ T3068] ? __cfi_ipv6_getsockopt+0x10/0x10 [ 88.129432][ T3068] ? vfs_write+0x9a4/0xf90 [ 88.129455][ T3068] tcp_getsockopt+0x106/0x130 [ 88.129470][ T3068] ? __cfi_vfs_write+0x10/0x10 [ 88.129489][ T3068] sock_common_getsockopt+0xb2/0xd0 [ 88.129510][ T3068] ? __cfi_sock_common_getsockopt+0x10/0x10 [ 88.129531][ T3068] do_sock_getsockopt+0x3a4/0x6c0 [ 88.129559][ T3068] ? __cfi_do_sock_getsockopt+0x10/0x10 [ 88.129586][ T3068] ? __fget_files+0x2c5/0x340 [ 88.129613][ T3068] __x64_sys_getsockopt+0x1d4/0x280 [ 88.129645][ T3068] x64_sys_call+0x10db/0x2ee0 [ 88.129671][ T3068] do_syscall_64+0x57/0xf0 [ 88.129688][ T3068] ? clear_bhb_loop+0x50/0xa0 [ 88.129707][ T3068] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 88.129735][ T3068] RIP: 0033:0x7fe2f979c799 [ 88.129751][ T3068] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 88.129773][ T3068] RSP: 002b:00007fe2fa6f1028 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 88.129794][ T3068] RAX: ffffffffffffffda RBX: 00007fe2f9a15fa0 RCX: 00007fe2f979c799 [ 88.129810][ T3068] RDX: 0010000000000030 RSI: 0000000000000029 RDI: 0000000000000003 [ 88.129824][ T3068] RBP: 00007fe2fa6f1090 R08: 0000200000e5f000 R09: 0000000000000000 [ 88.129838][ T3068] R10: 0000200000034000 R11: 0000000000000246 R12: 0000000000000001 [ 88.129852][ T3068] R13: 00007fe2f9a16038 R14: 00007fe2f9a15fa0 R15: 00007ffc65e68578 [ 88.129869][ T3068] [ 88.657794][ T3085] FAULT_INJECTION: forcing a failure. [ 88.657794][ T3085] name failslab, interval 1, probability 0, space 0, times 0 [ 88.670515][ T3085] CPU: 0 UID: 0 PID: 3085 Comm: syz.1.1264 Not tainted syzkaller #0 0f1aaf4ea31c6587efab90ed4dfa0b6225873f33 [ 88.670545][ T3085] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 88.670557][ T3085] Call Trace: [ 88.670564][ T3085] [ 88.670571][ T3085] __dump_stack+0x21/0x30 [ 88.670600][ T3085] dump_stack_lvl+0x140/0x1c0 [ 88.670622][ T3085] ? __cfi_dump_stack_lvl+0x10/0x10 [ 88.670647][ T3085] dump_stack+0x19/0x20 [ 88.670669][ T3085] should_fail_ex+0x3d7/0x530 [ 88.670690][ T3085] should_failslab+0xac/0x100 [ 88.670723][ T3085] __kmalloc_node_noprof+0x6c/0x4f0 [ 88.670748][ T3085] ? __kvmalloc_node_noprof+0x128/0x300 [ 88.670771][ T3085] __kvmalloc_node_noprof+0x128/0x300 [ 88.670793][ T3085] ? __cfi_dev_addr_init+0x10/0x10 [ 88.670820][ T3085] ? __cfi___kvmalloc_node_noprof+0x10/0x10 [ 88.670843][ T3085] ? __asan_memset+0x39/0x50 [ 88.670864][ T3085] alloc_netdev_mqs+0xaf7/0x13c0 [ 88.670888][ T3085] tun_set_iff+0x55c/0xee0 [ 88.670914][ T3085] __tun_chr_ioctl+0x861/0x1f60 [ 88.670939][ T3085] ? __kasan_check_write+0x18/0x20 [ 88.670961][ T3085] ? tun_flow_create+0x400/0x400 [ 88.670985][ T3085] ? __fget_files+0x2c5/0x340 [ 88.671011][ T3085] ? __fget_files+0x2c5/0x340 [ 88.671037][ T3085] tun_chr_ioctl+0x2e/0x40 [ 88.671060][ T3085] ? __cfi_tun_chr_ioctl+0x10/0x10 [ 88.671083][ T3085] __se_sys_ioctl+0x135/0x1b0 [ 88.671109][ T3085] __x64_sys_ioctl+0x7f/0xa0 [ 88.671134][ T3085] x64_sys_call+0x1878/0x2ee0 [ 88.671160][ T3085] do_syscall_64+0x57/0xf0 [ 88.671178][ T3085] ? clear_bhb_loop+0x50/0xa0 [ 88.671196][ T3085] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 88.671223][ T3085] RIP: 0033:0x7fda2b19c799 [ 88.671240][ T3085] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 88.671257][ T3085] RSP: 002b:00007fda2bf95028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 88.671279][ T3085] RAX: ffffffffffffffda RBX: 00007fda2b415fa0 RCX: 00007fda2b19c799 [ 88.671294][ T3085] RDX: 0000200000000100 RSI: 00000000400454ca RDI: 0000000000000003 [ 88.671308][ T3085] RBP: 00007fda2bf95090 R08: 0000000000000000 R09: 0000000000000000 [ 88.671321][ T3085] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 88.671333][ T3085] R13: 00007fda2b416038 R14: 00007fda2b415fa0 R15: 00007ffe6143c478 [ 88.671351][ T3085] [ 88.908387][ T3083] netlink: 4096 bytes leftover after parsing attributes in process `syz.2.1263'. [ 88.917627][ T3083] netlink: 4096 bytes leftover after parsing attributes in process `syz.2.1263'. [ 88.926807][ T3083] netlink: 4096 bytes leftover after parsing attributes in process `syz.2.1263'. [ 88.935983][ T3083] netlink: 4096 bytes leftover after parsing attributes in process `syz.2.1263'. [ 88.945152][ T3083] netlink: 4096 bytes leftover after parsing attributes in process `syz.2.1263'. [ 88.954324][ T3083] netlink: 4096 bytes leftover after parsing attributes in process `syz.2.1263'. [ 88.963499][ T3083] netlink: 4096 bytes leftover after parsing attributes in process `syz.2.1263'. [ 88.972850][ T3083] netlink: 4096 bytes leftover after parsing attributes in process `syz.2.1263'. [ 89.054197][ T3096] FAULT_INJECTION: forcing a failure. [ 89.054197][ T3096] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 89.088518][ T3096] CPU: 1 UID: 0 PID: 3096 Comm: syz.0.1269 Not tainted syzkaller #0 0f1aaf4ea31c6587efab90ed4dfa0b6225873f33 [ 89.088577][ T3096] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 89.088590][ T3096] Call Trace: [ 89.088597][ T3096] [ 89.088604][ T3096] __dump_stack+0x21/0x30 [ 89.088633][ T3096] dump_stack_lvl+0x140/0x1c0 [ 89.088656][ T3096] ? __cfi_dump_stack_lvl+0x10/0x10 [ 89.088680][ T3096] dump_stack+0x19/0x20 [ 89.088701][ T3096] should_fail_ex+0x3d7/0x530 [ 89.088718][ T3096] should_fail+0xf/0x20 [ 89.088736][ T3096] should_fail_usercopy+0x1e/0x30 [ 89.088759][ T3096] strncpy_from_user+0x29/0x270 [ 89.088779][ T3096] getname_flags+0x101/0x700 [ 89.088804][ T3096] user_path_at+0x2b/0x60 [ 89.088830][ T3096] __se_sys_mount+0x28a/0x480 [ 89.088850][ T3096] ? ksys_write+0x1f3/0x260 [ 89.088870][ T3096] ? __x64_sys_mount+0xf0/0xf0 [ 89.088894][ T3096] __x64_sys_mount+0xc3/0xf0 [ 89.088917][ T3096] x64_sys_call+0x2021/0x2ee0 [ 89.088942][ T3096] do_syscall_64+0x57/0xf0 [ 89.088959][ T3096] ? clear_bhb_loop+0x50/0xa0 [ 89.088978][ T3096] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 89.089006][ T3096] RIP: 0033:0x7f633d39c799 [ 89.089023][ T3096] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 89.089040][ T3096] RSP: 002b:00007f633e1f3028 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 89.089062][ T3096] RAX: ffffffffffffffda RBX: 00007f633d615fa0 RCX: 00007f633d39c799 [ 89.089077][ T3096] RDX: 00002000000000c0 RSI: 0000200000000080 RDI: 0000000000000000 [ 89.089092][ T3096] RBP: 00007f633e1f3090 R08: 0000200000000100 R09: 0000000000000000 [ 89.089105][ T3096] R10: 0000000002000000 R11: 0000000000000246 R12: 0000000000000001 [ 89.089118][ T3096] R13: 00007f633d616038 R14: 00007f633d615fa0 R15: 00007ffec25e7aa8 [ 89.089136][ T3096] [ 89.292000][ T3101] FAULT_INJECTION: forcing a failure. [ 89.292000][ T3101] name failslab, interval 1, probability 0, space 0, times 0 [ 89.304726][ T3101] CPU: 1 UID: 0 PID: 3101 Comm: syz.0.1271 Not tainted syzkaller #0 0f1aaf4ea31c6587efab90ed4dfa0b6225873f33 [ 89.304758][ T3101] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 89.304770][ T3101] Call Trace: [ 89.304777][ T3101] [ 89.304784][ T3101] __dump_stack+0x21/0x30 [ 89.304820][ T3101] dump_stack_lvl+0x140/0x1c0 [ 89.304842][ T3101] ? __cfi_dump_stack_lvl+0x10/0x10 [ 89.304866][ T3101] ? kasan_save_track+0x4f/0x80 [ 89.304896][ T3101] ? kasan_save_track+0x3e/0x80 [ 89.304919][ T3101] ? kasan_save_alloc_info+0x40/0x50 [ 89.304940][ T3101] ? kmem_cache_alloc_noprof+0x1bf/0x410 [ 89.304963][ T3101] dump_stack+0x19/0x20 [ 89.304985][ T3101] should_fail_ex+0x3d7/0x530 [ 89.305005][ T3101] should_failslab+0xac/0x100 [ 89.305030][ T3101] kmem_cache_alloc_noprof+0x42/0x410 [ 89.305053][ T3101] ? mas_alloc_nodes+0x254/0x9d0 [ 89.305077][ T3101] mas_alloc_nodes+0x254/0x9d0 [ 89.305101][ T3101] mas_preallocate+0x783/0xcb0 [ 89.305124][ T3101] ? mas_store_prealloc+0xc49/0x1230 [ 89.305146][ T3101] ? kasan_save_alloc_info+0x40/0x50 [ 89.305167][ T3101] ? __cfi_mas_preallocate+0x10/0x10 [ 89.305189][ T3101] ? __kasan_check_read+0x15/0x20 [ 89.305211][ T3101] ? anon_vma_name+0x51/0xa0 [ 89.305231][ T3101] ? vm_area_dup+0x41c/0x570 [ 89.305249][ T3101] __split_vma+0x3ff/0xab0 [ 89.305272][ T3101] ? commit_merge+0xd15/0xeb0 [ 89.305296][ T3101] ? vms_gather_munmap_vmas+0xdd0/0xdd0 [ 89.305322][ T3101] vms_gather_munmap_vmas+0x273/0xdd0 [ 89.305347][ T3101] ? __kasan_check_read+0x15/0x20 [ 89.305368][ T3101] ? khugepaged_enter_vma+0x3ac/0x430 [ 89.305396][ T3101] ? vma_merge_new_range+0x6db/0x850 [ 89.305420][ T3101] do_vmi_align_munmap+0x251/0x610 [ 89.305454][ T3101] ? __cfi_do_vmi_align_munmap+0x10/0x10 [ 89.305478][ T3101] ? mas_walk+0x3f7/0x650 [ 89.305501][ T3101] ? mas_find+0x358/0x5f0 [ 89.305524][ T3101] do_vmi_munmap+0x245/0x2e0 [ 89.305548][ T3101] move_vma+0xaab/0x11c0 [ 89.305568][ T3101] ? vma_expandable+0x100/0x100 [ 89.305586][ T3101] ? cap_mmap_addr+0x169/0x2e0 [ 89.305606][ T3101] ? security_mmap_addr+0x31/0xe0 [ 89.305626][ T3101] mremap_to+0x546/0x610 [ 89.305645][ T3101] __se_sys_mremap+0x5af/0xfe0 [ 89.305664][ T3101] ? __cfi_vfs_write+0x10/0x10 [ 89.305686][ T3101] ? __x64_sys_mremap+0xf0/0xf0 [ 89.305704][ T3101] ? __kasan_check_write+0x18/0x20 [ 89.305725][ T3101] ? mutex_unlock+0x90/0x240 [ 89.305745][ T3101] ? __cfi_mutex_unlock+0x10/0x10 [ 89.305765][ T3101] ? __fget_files+0x2c5/0x340 [ 89.305791][ T3101] ? __kasan_check_write+0x18/0x20 [ 89.305812][ T3101] ? fput+0x1a4/0x240 [ 89.305829][ T3101] ? ksys_write+0x1f3/0x260 [ 89.305850][ T3101] ? __cfi_ksys_write+0x10/0x10 [ 89.305873][ T3101] __x64_sys_mremap+0xc3/0xf0 [ 89.305892][ T3101] x64_sys_call+0x2ac4/0x2ee0 [ 89.305916][ T3101] do_syscall_64+0x57/0xf0 [ 89.305933][ T3101] ? clear_bhb_loop+0x50/0xa0 [ 89.305951][ T3101] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 89.305979][ T3101] RIP: 0033:0x7f633d39c799 [ 89.306001][ T3101] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 89.306017][ T3101] RSP: 002b:00007f633e1f3028 EFLAGS: 00000246 ORIG_RAX: 0000000000000019 [ 89.306043][ T3101] RAX: ffffffffffffffda RBX: 00007f633d615fa0 RCX: 00007f633d39c799 [ 89.306058][ T3101] RDX: 0000000000400000 RSI: 0000000000001000 RDI: 0000200000a96000 [ 89.306075][ T3101] RBP: 00007f633e1f3090 R08: 0000200000000000 R09: 0000000000000000 [ 89.306088][ T3101] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000001 [ 89.306100][ T3101] R13: 00007f633d616038 R14: 00007f633d615fa0 R15: 00007ffec25e7aa8 [ 89.306117][ T3101] [ 90.658738][ T3133] FAULT_INJECTION: forcing a failure. [ 90.658738][ T3133] name failslab, interval 1, probability 0, space 0, times 0 [ 90.671424][ T3133] CPU: 1 UID: 0 PID: 3133 Comm: syz.1.1285 Not tainted syzkaller #0 0f1aaf4ea31c6587efab90ed4dfa0b6225873f33 [ 90.671454][ T3133] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 90.671461][ T3133] Call Trace: [ 90.671466][ T3133] [ 90.671470][ T3133] __dump_stack+0x21/0x30 [ 90.671489][ T3133] dump_stack_lvl+0x140/0x1c0 [ 90.671502][ T3133] ? __cfi_dump_stack_lvl+0x10/0x10 [ 90.671515][ T3133] ? unwind_get_return_address+0x51/0x90 [ 90.671527][ T3133] ? __cfi_stack_trace_consume_entry+0x10/0x10 [ 90.671539][ T3133] dump_stack+0x19/0x20 [ 90.671550][ T3133] should_fail_ex+0x3d7/0x530 [ 90.671561][ T3133] should_failslab+0xac/0x100 [ 90.671576][ T3133] kmem_cache_alloc_lru_noprof+0x44/0x410 [ 90.671590][ T3133] ? __d_alloc+0x42/0x8e0 [ 90.671602][ T3133] __d_alloc+0x42/0x8e0 [ 90.671613][ T3133] ? kfree_link+0x19/0x30 [ 90.671622][ T3133] ? link_path_walk+0x724/0xec0 [ 90.671637][ T3133] ? path_openat+0x287/0x34f0 [ 90.671651][ T3133] ? do_filp_open+0x1f5/0x440 [ 90.671666][ T3133] d_alloc_parallel+0xe4/0x1320 [ 90.671679][ T3133] ? avc_has_perm_noaudit+0x26c/0x360 [ 90.671693][ T3133] ? __cfi_d_alloc_parallel+0x10/0x10 [ 90.671705][ T3133] ? __kasan_check_write+0x18/0x20 [ 90.671717][ T3133] ? rwsem_read_trylock+0x274/0x5b0 [ 90.671731][ T3133] ? downgrade_write+0x460/0x460 [ 90.671744][ T3133] __lookup_slow+0x150/0x420 [ 90.671758][ T3133] ? lookup_one_len+0x300/0x300 [ 90.671771][ T3133] ? down_read+0x7f/0xe0 [ 90.671785][ T3133] lookup_slow+0x57/0x80 [ 90.671799][ T3133] link_path_walk+0x990/0xec0 [ 90.671812][ T3133] path_openat+0x287/0x34f0 [ 90.671826][ T3133] ? stack_depot_save_flags+0x38/0x800 [ 90.671838][ T3133] ? kasan_save_track+0x3e/0x80 [ 90.671851][ T3133] ? kasan_save_alloc_info+0x40/0x50 [ 90.671863][ T3133] ? do_sys_openat2+0xda/0x1d0 [ 90.671873][ T3133] ? __x64_sys_openat+0x13a/0x170 [ 90.671882][ T3133] ? x64_sys_call+0xe69/0x2ee0 [ 90.671896][ T3133] ? entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 90.671912][ T3133] ? do_filp_open+0x440/0x440 [ 90.671928][ T3133] do_filp_open+0x1f5/0x440 [ 90.671943][ T3133] ? __cfi_do_filp_open+0x10/0x10 [ 90.671959][ T3133] ? __cfi_kfree_link+0x10/0x10 [ 90.671969][ T3133] ? alloc_fd+0x4e6/0x5a0 [ 90.671982][ T3133] do_sys_openat2+0x134/0x1d0 [ 90.671992][ T3133] ? fput+0x1a4/0x240 [ 90.672001][ T3133] ? do_sys_open+0x100/0x100 [ 90.672010][ T3133] ? ksys_write+0x1f3/0x260 [ 90.672022][ T3133] ? __cfi_ksys_write+0x10/0x10 [ 90.672035][ T3133] __x64_sys_openat+0x13a/0x170 [ 90.672045][ T3133] x64_sys_call+0xe69/0x2ee0 [ 90.672060][ T3133] do_syscall_64+0x57/0xf0 [ 90.672076][ T3133] ? clear_bhb_loop+0x50/0xa0 [ 90.672092][ T3133] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 90.672117][ T3133] RIP: 0033:0x7fda2b15cfce [ 90.672126][ T3133] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 90.672136][ T3133] RSP: 002b:00007fda2bf94f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 90.672148][ T3133] RAX: ffffffffffffffda RBX: 00007fda2bf956c0 RCX: 00007fda2b15cfce [ 90.672156][ T3133] RDX: 0000000000000000 RSI: 00007fda2b232270 RDI: ffffffffffffff9c [ 90.672164][ T3133] RBP: 00007fda2bf95090 R08: 0000000000000000 R09: 0000000000000000 [ 90.672170][ T3133] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 90.672177][ T3133] R13: 00007fda2b416038 R14: 00007fda2b415fa0 R15: 00007ffe6143c478 [ 90.672186][ T3133] [ 90.734112][ T36] kauditd_printk_skb: 240 callbacks suppressed [ 90.734128][ T36] audit: type=1400 audit(2000000021.987:3919): avc: denied { read write } for pid=3134 comm="syz.1.1286" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 91.043409][ T36] audit: type=1400 audit(2000000022.300:3920): avc: denied { read write } for pid=294 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 91.067864][ T36] audit: type=1400 audit(2000000022.310:3921): avc: denied { create } for pid=3137 comm="syz.2.1287" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 [ 91.087924][ T36] audit: type=1400 audit(2000000022.310:3922): avc: denied { create } for pid=3137 comm="syz.2.1287" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 91.107976][ T36] audit: type=1400 audit(2000000022.310:3923): avc: denied { read } for pid=3137 comm="syz.2.1287" dev="nsfs" ino=4026532412 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 91.130417][ T36] audit: type=1400 audit(2000000022.310:3924): avc: denied { read write } for pid=294 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 91.154019][ T3144] cgroup: fork rejected by pids controller in /syz2 [ 91.155675][ T36] audit: type=1400 audit(2000000022.310:3925): avc: denied { read } for pid=3139 comm="syz.2.1288" dev="nsfs" ino=4026532412 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 91.182989][ T36] audit: type=1400 audit(2000000022.310:3926): avc: denied { create } for pid=3139 comm="syz.2.1288" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 91.203447][ T36] audit: type=1400 audit(2000000022.310:3927): avc: denied { create } for pid=3139 comm="syz.2.1288" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 91.224147][ T36] audit: type=1400 audit(2000000022.341:3928): avc: denied { block_suspend } for pid=3139 comm="syz.2.1288" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 92.369707][ T3233] FAULT_INJECTION: forcing a failure. [ 92.369707][ T3233] name failslab, interval 1, probability 0, space 0, times 0 [ 92.382362][ T3233] CPU: 0 UID: 0 PID: 3233 Comm: syz.2.1299 Not tainted syzkaller #0 0f1aaf4ea31c6587efab90ed4dfa0b6225873f33 [ 92.382388][ T3233] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 92.382396][ T3233] Call Trace: [ 92.382400][ T3233] [ 92.382405][ T3233] __dump_stack+0x21/0x30 [ 92.382426][ T3233] dump_stack_lvl+0x140/0x1c0 [ 92.382439][ T3233] ? __cfi_dump_stack_lvl+0x10/0x10 [ 92.382452][ T3233] dump_stack+0x19/0x20 [ 92.382464][ T3233] should_fail_ex+0x3d7/0x530 [ 92.382475][ T3233] should_failslab+0xac/0x100 [ 92.382490][ T3233] kmem_cache_alloc_lru_noprof+0x44/0x410 [ 92.382510][ T3233] ? __d_alloc+0x42/0x8e0 [ 92.382523][ T3233] __d_alloc+0x42/0x8e0 [ 92.382534][ T3233] d_alloc+0x4c/0x1c0 [ 92.382545][ T3233] ? lookup_one_qstr_excl+0xba/0x280 [ 92.382559][ T3233] lookup_one_qstr_excl+0xcf/0x280 [ 92.382572][ T3233] do_renameat2+0x3da/0xc40 [ 92.382583][ T3233] ? __virt_addr_valid+0x2a6/0x380 [ 92.382596][ T3233] ? __cfi_do_renameat2+0x10/0x10 [ 92.382607][ T3233] ? __kasan_check_write+0x18/0x20 [ 92.382619][ T3233] ? getname_flags+0x208/0x700 [ 92.382632][ T3233] __x64_sys_rename+0x86/0xa0 [ 92.382643][ T3233] x64_sys_call+0x150b/0x2ee0 [ 92.382660][ T3233] do_syscall_64+0x57/0xf0 [ 92.382671][ T3233] ? clear_bhb_loop+0x50/0xa0 [ 92.382681][ T3233] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 92.382696][ T3233] RIP: 0033:0x7fe2f979c799 [ 92.382706][ T3233] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 92.382715][ T3233] RSP: 002b:00007fe2fa6f1028 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 92.382728][ T3233] RAX: ffffffffffffffda RBX: 00007fe2f9a15fa0 RCX: 00007fe2f979c799 [ 92.382736][ T3233] RDX: 0000000000000000 RSI: 0000200000000100 RDI: 0000200000000040 [ 92.382744][ T3233] RBP: 00007fe2fa6f1090 R08: 0000000000000000 R09: 0000000000000000 [ 92.382750][ T3233] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 92.382757][ T3233] R13: 00007fe2f9a16038 R14: 00007fe2f9a15fa0 R15: 00007ffc65e68578 [ 92.382766][ T3233] [ 92.915181][ T3237] FAULT_INJECTION: forcing a failure. [ 92.915181][ T3237] name failslab, interval 1, probability 0, space 0, times 0 [ 92.927850][ T3237] CPU: 0 UID: 0 PID: 3237 Comm: syz.3.1301 Not tainted syzkaller #0 0f1aaf4ea31c6587efab90ed4dfa0b6225873f33 [ 92.927882][ T3237] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 92.927894][ T3237] Call Trace: [ 92.927900][ T3237] [ 92.927909][ T3237] __dump_stack+0x21/0x30 [ 92.927928][ T3237] dump_stack_lvl+0x140/0x1c0 [ 92.927941][ T3237] ? __cfi_dump_stack_lvl+0x10/0x10 [ 92.927954][ T3237] ? __kasan_kmalloc+0x96/0xb0 [ 92.927969][ T3237] ? __kmalloc_node_noprof+0x255/0x4f0 [ 92.927983][ T3237] dump_stack+0x19/0x20 [ 92.927994][ T3237] should_fail_ex+0x3d7/0x530 [ 92.928005][ T3237] should_failslab+0xac/0x100 [ 92.928020][ T3237] __kmalloc_cache_noprof+0x41/0x470 [ 92.928032][ T3237] ? __asan_memset+0x39/0x50 [ 92.928044][ T3237] ? alloc_netdev_mqs+0xc3a/0x13c0 [ 92.928057][ T3237] ? __xdp_rxq_info_reg+0x16c/0x2e0 [ 92.928073][ T3237] alloc_netdev_mqs+0xc3a/0x13c0 [ 92.928085][ T3237] tun_set_iff+0x55c/0xee0 [ 92.928100][ T3237] __tun_chr_ioctl+0x861/0x1f60 [ 92.928113][ T3237] ? __kasan_check_write+0x18/0x20 [ 92.928125][ T3237] ? tun_flow_create+0x400/0x400 [ 92.928137][ T3237] ? __fget_files+0x2c5/0x340 [ 92.928152][ T3237] ? __fget_files+0x2c5/0x340 [ 92.928166][ T3237] tun_chr_ioctl+0x2e/0x40 [ 92.928178][ T3237] ? __cfi_tun_chr_ioctl+0x10/0x10 [ 92.928191][ T3237] __se_sys_ioctl+0x135/0x1b0 [ 92.928206][ T3237] __x64_sys_ioctl+0x7f/0xa0 [ 92.928221][ T3237] x64_sys_call+0x1878/0x2ee0 [ 92.928236][ T3237] do_syscall_64+0x57/0xf0 [ 92.928246][ T3237] ? clear_bhb_loop+0x50/0xa0 [ 92.928262][ T3237] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 92.928277][ T3237] RIP: 0033:0x7fd91a99c799 [ 92.928287][ T3237] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 92.928296][ T3237] RSP: 002b:00007fd91b812028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 92.928308][ T3237] RAX: ffffffffffffffda RBX: 00007fd91ac15fa0 RCX: 00007fd91a99c799 [ 92.928316][ T3237] RDX: 0000200000000100 RSI: 00000000400454ca RDI: 0000000000000003 [ 92.928324][ T3237] RBP: 00007fd91b812090 R08: 0000000000000000 R09: 0000000000000000 [ 92.928330][ T3237] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 92.928337][ T3237] R13: 00007fd91ac16038 R14: 00007fd91ac15fa0 R15: 00007ffcbed708e8 [ 92.928346][ T3237] [ 93.665103][ T3256] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2070 sclass=netlink_route_socket pid=3256 comm=syz.1.1309 [ 94.215579][ T3276] syzkaller0: tun_chr_ioctl cmd 1074025676 [ 94.222308][ T3276] syzkaller0: owner set to 0 [ 94.227447][ T3280] netlink: 'syz.0.1317': attribute type 4 has an invalid length. [ 94.859140][ T3313] FAULT_INJECTION: forcing a failure. [ 94.859140][ T3313] name failslab, interval 1, probability 0, space 0, times 0 [ 94.871778][ T3313] CPU: 1 UID: 0 PID: 3313 Comm: syz.0.1332 Not tainted syzkaller #0 0f1aaf4ea31c6587efab90ed4dfa0b6225873f33 [ 94.871807][ T3313] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 94.871819][ T3313] Call Trace: [ 94.871826][ T3313] [ 94.871832][ T3313] __dump_stack+0x21/0x30 [ 94.871849][ T3313] dump_stack_lvl+0x140/0x1c0 [ 94.871862][ T3313] ? __cfi_dump_stack_lvl+0x10/0x10 [ 94.871875][ T3313] dump_stack+0x19/0x20 [ 94.871887][ T3313] should_fail_ex+0x3d7/0x530 [ 94.871898][ T3313] should_failslab+0xac/0x100 [ 94.871913][ T3313] kmem_cache_alloc_lru_noprof+0x44/0x410 [ 94.871926][ T3313] ? __d_lookup_rcu+0x334/0x3c0 [ 94.871939][ T3313] ? proc_alloc_inode+0x48/0x150 [ 94.871951][ T3313] proc_alloc_inode+0x48/0x150 [ 94.871962][ T3313] ? __cfi_proc_alloc_inode+0x10/0x10 [ 94.871973][ T3313] alloc_inode+0x7d/0x270 [ 94.871987][ T3313] new_inode+0x25/0x1e0 [ 94.872002][ T3313] proc_pid_make_inode+0x25/0x140 [ 94.872015][ T3313] proc_pident_instantiate+0x6d/0x2c0 [ 94.872029][ T3313] proc_pident_lookup+0x1c7/0x270 [ 94.872044][ T3313] proc_tgid_base_lookup+0x2f/0x40 [ 94.872058][ T3313] __lookup_slow+0x2e5/0x420 [ 94.872078][ T3313] ? lookup_one_len+0x300/0x300 [ 94.872092][ T3313] ? down_read+0x7f/0xe0 [ 94.872106][ T3313] lookup_slow+0x57/0x80 [ 94.872119][ T3313] link_path_walk+0x990/0xec0 [ 94.872132][ T3313] path_openat+0x287/0x34f0 [ 94.872147][ T3313] ? stack_depot_save_flags+0x38/0x800 [ 94.872160][ T3313] ? kasan_save_track+0x3e/0x80 [ 94.872173][ T3313] ? kasan_save_alloc_info+0x40/0x50 [ 94.872184][ T3313] ? do_sys_openat2+0xda/0x1d0 [ 94.872194][ T3313] ? __x64_sys_openat+0x13a/0x170 [ 94.872204][ T3313] ? x64_sys_call+0xe69/0x2ee0 [ 94.872218][ T3313] ? entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 94.872235][ T3313] ? do_filp_open+0x440/0x440 [ 94.872251][ T3313] do_filp_open+0x1f5/0x440 [ 94.872266][ T3313] ? __cfi_do_filp_open+0x10/0x10 [ 94.872281][ T3313] ? __cfi_kfree_link+0x10/0x10 [ 94.872292][ T3313] ? alloc_fd+0x4e6/0x5a0 [ 94.872306][ T3313] do_sys_openat2+0x134/0x1d0 [ 94.872317][ T3313] ? fput+0x1a4/0x240 [ 94.872326][ T3313] ? do_sys_open+0x100/0x100 [ 94.872336][ T3313] ? ksys_write+0x1f3/0x260 [ 94.872347][ T3313] ? __cfi_ksys_write+0x10/0x10 [ 94.872359][ T3313] __x64_sys_openat+0x13a/0x170 [ 94.872370][ T3313] x64_sys_call+0xe69/0x2ee0 [ 94.872383][ T3313] do_syscall_64+0x57/0xf0 [ 94.872393][ T3313] ? clear_bhb_loop+0x50/0xa0 [ 94.872402][ T3313] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 94.872424][ T3313] RIP: 0033:0x7f633d35cfce [ 94.872439][ T3313] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 94.872454][ T3313] RSP: 002b:00007f633e1f2f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 94.872476][ T3313] RAX: ffffffffffffffda RBX: 00007f633e1f36c0 RCX: 00007f633d35cfce [ 94.872486][ T3313] RDX: 0000000000000000 RSI: 00007f633d432270 RDI: ffffffffffffff9c [ 94.872493][ T3313] RBP: 00007f633e1f3090 R08: 0000000000000000 R09: 0000000000000000 [ 94.872500][ T3313] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 94.872507][ T3313] R13: 00007f633d616038 R14: 00007f633d615fa0 R15: 00007ffec25e7aa8 [ 94.872516][ T3313] [ 95.660368][ T3356] netlink: 'syz.3.1343': attribute type 33 has an invalid length. [ 95.702356][ T36] kauditd_printk_skb: 274 callbacks suppressed [ 95.702372][ T36] audit: type=1400 audit(2000000027.025:4203): avc: denied { read write } for pid=293 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 95.709429][ T3358] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3358 comm=syz.0.1350 [ 95.801673][ T36] audit: type=1400 audit(2000000027.126:4204): avc: denied { read write } for pid=293 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 95.826148][ T36] audit: type=1400 audit(2000000027.156:4205): avc: denied { create } for pid=3359 comm="syz.0.1352" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 95.846822][ T36] audit: type=1400 audit(2000000027.176:4206): avc: denied { create } for pid=3359 comm="syz.0.1352" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 95.867284][ T36] audit: type=1400 audit(2000000027.186:4207): avc: denied { read } for pid=3359 comm="syz.0.1352" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 95.889919][ T36] audit: type=1400 audit(2000000027.186:4208): avc: denied { read } for pid=3359 comm="syz.0.1352" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 95.912544][ T36] audit: type=1400 audit(2000000027.186:4209): avc: denied { read } for pid=3359 comm="syz.0.1352" name="vga_arbiter" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=0 [ 95.936629][ T36] audit: type=1400 audit(2000000027.186:4210): avc: denied { create } for pid=3359 comm="syz.0.1352" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 95.957093][ T36] audit: type=1400 audit(2000000027.186:4211): avc: denied { read } for pid=3359 comm="syz.0.1352" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 95.979704][ T36] audit: type=1400 audit(2000000027.186:4212): avc: denied { write } for pid=3359 comm="syz.0.1352" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 97.660352][ T3435] syzkaller0: entered promiscuous mode [ 97.665886][ T3435] syzkaller0: entered allmulticast mode [ 109.363774][ T36] kauditd_printk_skb: 121 callbacks suppressed [ 109.363791][ T36] audit: type=1400 audit(2000000040.754:4334): avc: denied { read } for pid=3445 comm="syz.3.1393" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 109.397140][ T36] audit: type=1400 audit(2000000040.764:4335): avc: denied { read write } for pid=295 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 109.421421][ T36] audit: type=1400 audit(2000000040.764:4336): avc: denied { read } for pid=3448 comm="syz.3.1394" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 109.447548][ T36] audit: type=1400 audit(2000000040.774:4337): avc: denied { read write } for pid=295 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 109.471823][ T36] audit: type=1400 audit(2000000040.774:4338): avc: denied { create } for pid=3450 comm="syz.3.1395" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 109.492346][ T36] audit: type=1400 audit(2000000040.784:4339): avc: denied { create } for pid=3444 comm="syz.0.1400" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 109.511951][ T36] audit: type=1400 audit(2000000040.784:4340): avc: denied { create } for pid=3450 comm="syz.3.1395" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 109.532391][ T36] audit: type=1400 audit(2000000040.784:4341): avc: denied { read } for pid=3450 comm="syz.3.1395" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 109.555014][ T36] audit: type=1400 audit(2000000040.784:4342): avc: denied { read } for pid=3450 comm="syz.3.1395" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 109.577768][ T36] audit: type=1400 audit(2000000040.784:4343): avc: denied { read } for pid=3450 comm="syz.3.1395" name="vga_arbiter" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=0 [ 112.502333][ T3490] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3490 comm=syz.0.1408 [ 114.424461][ T36] kauditd_printk_skb: 63 callbacks suppressed [ 114.424480][ T36] audit: type=1400 audit(2000000045.815:4407): avc: denied { mount } for pid=3505 comm="syz.0.1414" name="/" dev="ramfs" ino=14480 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=0 [ 114.446443][ T3512] FAULT_INJECTION: forcing a failure. [ 114.446443][ T3512] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 114.464890][ T36] audit: type=1400 audit(2000000045.815:4408): avc: denied { read } for pid=3504 comm="syz.2.1415" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 114.468070][ T3512] CPU: 1 UID: 0 PID: 3512 Comm: syz.2.1417 Not tainted syzkaller #0 0f1aaf4ea31c6587efab90ed4dfa0b6225873f33 [ 114.468099][ T3512] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 114.468111][ T3512] Call Trace: [ 114.468117][ T3512] [ 114.468124][ T3512] __dump_stack+0x21/0x30 [ 114.468151][ T3512] dump_stack_lvl+0x140/0x1c0 [ 114.468171][ T3512] ? __cfi_dump_stack_lvl+0x10/0x10 [ 114.468193][ T3512] ? check_stack_object+0x12b/0x150 [ 114.468217][ T3512] dump_stack+0x19/0x20 [ 114.468236][ T3512] should_fail_ex+0x3d7/0x530 [ 114.468254][ T3512] should_fail+0xf/0x20 [ 114.468271][ T3512] should_fail_usercopy+0x1e/0x30 [ 114.468289][ T3512] _copy_to_user+0x24/0xa0 [ 114.468311][ T3512] simple_read_from_buffer+0xed/0x160 [ 114.468338][ T3512] proc_fail_nth_read+0x1aa/0x220 [ 114.468357][ T3512] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 114.468374][ T3512] ? bpf_lsm_file_permission+0xd/0x20 [ 114.468392][ T3512] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 114.468410][ T3512] vfs_read+0x289/0xcb0 [ 114.468429][ T3512] ? sock_show_fdinfo+0xd0/0xd0 [ 114.468449][ T3512] ? __cfi_vfs_read+0x10/0x10 [ 114.468468][ T3512] ? __kasan_check_write+0x18/0x20 [ 114.468489][ T3512] ? mutex_lock+0x97/0x1d0 [ 114.468509][ T3512] ? __cfi_mutex_lock+0x10/0x10 [ 114.468528][ T3512] ? __fget_files+0x2c5/0x340 [ 114.468553][ T3512] ksys_read+0x145/0x260 [ 114.468573][ T3512] ? __cfi_ksys_read+0x10/0x10 [ 114.468594][ T3512] ? __kasan_check_read+0x15/0x20 [ 114.468614][ T3512] __x64_sys_read+0x7f/0x90 [ 114.468634][ T3512] x64_sys_call+0x2638/0x2ee0 [ 114.468658][ T3512] do_syscall_64+0x57/0xf0 [ 114.468674][ T3512] ? clear_bhb_loop+0x50/0xa0 [ 114.468692][ T3512] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 114.468717][ T3512] RIP: 0033:0x7fe2f975cfce [ 114.468733][ T3512] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 114.468756][ T3512] RSP: 002b:00007fe2fa6f0fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 114.468776][ T3512] RAX: ffffffffffffffda RBX: 00007fe2fa6f16c0 RCX: 00007fe2f975cfce [ 114.468790][ T3512] RDX: 000000000000000f RSI: 00007fe2fa6f10a0 RDI: 0000000000000004 [ 114.468802][ T3512] RBP: 00007fe2fa6f1090 R08: 0000000000000000 R09: 0000000000000000 [ 114.468815][ T3512] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 114.468827][ T3512] R13: 00007fe2f9a16038 R14: 00007fe2f9a15fa0 R15: 00007ffc65e68578 [ 114.468843][ T3512] [ 114.730595][ T36] audit: type=1400 audit(2000000045.815:4409): avc: denied { mount } for pid=3505 comm="syz.0.1414" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=0 [ 114.752459][ T36] audit: type=1400 audit(2000000045.815:4410): avc: denied { read } for pid=3503 comm="syz.3.1416" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 114.775130][ T36] audit: type=1400 audit(2000000045.835:4411): avc: denied { read write } for pid=294 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 114.799149][ T36] audit: type=1400 audit(2000000045.835:4412): avc: denied { read write } for pid=293 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 114.823124][ T36] audit: type=1400 audit(2000000045.845:4413): avc: denied { execmem } for pid=3502 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 114.842492][ T36] audit: type=1400 audit(2000000045.845:4414): avc: denied { read write } for pid=295 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 114.866456][ T36] audit: type=1400 audit(2000000045.865:4415): avc: denied { read write } for pid=294 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 114.890427][ T36] audit: type=1400 audit(2000000045.865:4416): avc: denied { read } for pid=3513 comm="syz.0.1418" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 115.580285][ T3519] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3519 comm=syz.3.1419 [ 118.103369][ T3536] veth1_macvtap: left promiscuous mode [ 118.108867][ T3536] macsec0: entered allmulticast mode [ 118.117942][ T3536] veth1_macvtap: entered promiscuous mode [ 118.123747][ T3536] veth1_macvtap: entered allmulticast mode [ 118.129671][ T3536] macsec0: left allmulticast mode [ 118.134758][ T3536] veth1_macvtap: left allmulticast mode [ 119.508404][ T36] kauditd_printk_skb: 36 callbacks suppressed [ 119.508422][ T36] audit: type=1400 audit(2000000050.913:4453): avc: denied { read } for pid=3540 comm="syz.0.1428" dev="nsfs" ino=4026532584 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 119.549442][ T36] audit: type=1400 audit(2000000050.923:4454): avc: denied { execmem } for pid=3539 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 119.568911][ T36] audit: type=1400 audit(2000000050.923:4455): avc: denied { read } for pid=3541 comm="syz.3.1430" dev="nsfs" ino=4026532448 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 119.590040][ T36] audit: type=1400 audit(2000000050.964:4456): avc: denied { read write } for pid=293 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 119.614036][ T36] audit: type=1400 audit(2000000050.964:4457): avc: denied { read write } for pid=3541 comm="syz.3.1430" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 119.704510][ T36] audit: type=1400 audit(2000000051.114:4458): avc: denied { read write } for pid=294 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 120.059227][ T36] audit: type=1400 audit(2000000051.464:4459): avc: denied { read write } for pid=295 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 121.020053][ T36] audit: type=1400 audit(2000000052.425:4460): avc: denied { read write } for pid=3549 comm="syz.0.1431" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 121.043870][ T36] audit: type=1400 audit(2000000052.435:4461): avc: denied { execmem } for pid=3548 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 121.064615][ T36] audit: type=1400 audit(2000000052.435:4462): avc: denied { read } for pid=3550 comm="syz.3.1433" dev="nsfs" ino=4026532448 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 124.355303][ T3569] macsec0: entered allmulticast mode [ 124.363385][ T3569] veth1_macvtap: entered allmulticast mode [ 124.369219][ T3569] macsec0: left allmulticast mode [ 124.374268][ T3569] veth1_macvtap: left allmulticast mode [ 124.869068][ T36] kauditd_printk_skb: 37 callbacks suppressed [ 124.869086][ T36] audit: type=1400 audit(2000000056.280:4500): avc: denied { read write } for pid=295 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 125.021487][ T36] audit: type=1400 audit(2000000056.440:4501): avc: denied { read write } for pid=293 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 126.167026][ T36] audit: type=1400 audit(2000000057.581:4502): avc: denied { execmem } for pid=3577 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 126.186601][ T36] audit: type=1400 audit(2000000057.581:4503): avc: denied { read write } for pid=295 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 126.210610][ T36] audit: type=1400 audit(2000000057.581:4504): avc: denied { read } for pid=3582 comm="syz.0.1440" name="ppp" dev="devtmpfs" ino=86 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=0 [ 126.240287][ T36] audit: type=1400 audit(2000000057.591:4505): avc: denied { read write } for pid=293 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 126.264465][ T36] audit: type=1400 audit(2000000057.591:4506): avc: denied { read write } for pid=3578 comm="syz.2.1441" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 126.287729][ T36] audit: type=1400 audit(2000000057.591:4507): avc: denied { read } for pid=3578 comm="syz.2.1441" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 126.344410][ T36] audit: type=1400 audit(2000000057.761:4508): avc: denied { read write } for pid=294 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 128.072943][ T36] audit: type=1400 audit(2000000059.492:4509): avc: denied { execmem } for pid=3585 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 128.087974][ T3591] FAULT_INJECTION: forcing a failure. [ 128.087974][ T3591] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 128.105627][ T3591] CPU: 0 UID: 0 PID: 3591 Comm: syz.0.1444 Not tainted syzkaller #0 0f1aaf4ea31c6587efab90ed4dfa0b6225873f33 [ 128.105657][ T3591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 128.105670][ T3591] Call Trace: [ 128.105676][ T3591] [ 128.105684][ T3591] __dump_stack+0x21/0x30 [ 128.105712][ T3591] dump_stack_lvl+0x140/0x1c0 [ 128.105734][ T3591] ? __cfi_dump_stack_lvl+0x10/0x10 [ 128.105759][ T3591] dump_stack+0x19/0x20 [ 128.105780][ T3591] should_fail_ex+0x3d7/0x530 [ 128.105800][ T3591] should_fail+0xf/0x20 [ 128.105818][ T3591] should_fail_usercopy+0x1e/0x30 [ 128.105848][ T3591] _copy_from_iter+0x1a9/0x1510 [ 128.105873][ T3591] ? __virt_addr_valid+0x2a6/0x380 [ 128.105892][ T3591] ? __cfi__copy_from_iter+0x10/0x10 [ 128.105914][ T3591] ? __check_object_size+0x527/0x830 [ 128.105938][ T3591] ? __cfi___check_object_size+0x10/0x10 [ 128.105960][ T3591] ? __kmalloc_noprof+0x1b0/0x500 [ 128.105983][ T3591] ? kernfs_fop_write_iter+0x162/0x510 [ 128.106004][ T3591] kernfs_fop_write_iter+0x1ad/0x510 [ 128.106024][ T3591] do_iter_readv_writev+0x62f/0x820 [ 128.106048][ T3591] ? vfs_iter_read+0x5f0/0x5f0 [ 128.106072][ T3591] ? bpf_lsm_file_permission+0xd/0x20 [ 128.106090][ T3591] vfs_writev+0x4a8/0xe50 [ 128.106117][ T3591] ? do_writev+0x2e0/0x2e0 [ 128.106143][ T3591] ? __cfi_mutex_unlock+0x10/0x10 [ 128.106168][ T3591] __x64_sys_pwritev+0x1a6/0x2c0 [ 128.106193][ T3591] ? __cfi___x64_sys_pwritev+0x10/0x10 [ 128.106217][ T3591] ? __kasan_check_read+0x15/0x20 [ 128.106240][ T3591] x64_sys_call+0x29bc/0x2ee0 [ 128.106265][ T3591] do_syscall_64+0x57/0xf0 [ 128.106282][ T3591] ? clear_bhb_loop+0x50/0xa0 [ 128.106301][ T3591] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 128.106327][ T3591] RIP: 0033:0x7f633d39c799 [ 128.106343][ T3591] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 128.106359][ T3591] RSP: 002b:00007f633e1f3028 EFLAGS: 00000246 ORIG_RAX: 0000000000000128 [ 128.106380][ T3591] RAX: ffffffffffffffda RBX: 00007f633d615fa0 RCX: 00007f633d39c799 [ 128.106395][ T3591] RDX: 0000000000000001 RSI: 0000200000000400 RDI: 0000000000000003 [ 128.106408][ T3591] RBP: 00007f633e1f3090 R08: 000000000000000a R09: 0000000000000000 [ 128.106421][ T3591] R10: 00000000ffffff01 R11: 0000000000000246 R12: 0000000000000001 [ 128.106434][ T3591] R13: 00007f633d616038 R14: 00007f633d615fa0 R15: 00007ffec25e7aa8 [ 128.106451][ T3591] [ 130.081126][ T36] kauditd_printk_skb: 8 callbacks suppressed [ 130.081154][ T36] audit: type=1400 audit(2000000061.494:4518): avc: denied { read write } for pid=3594 comm="syz.3.1448" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 130.121085][ T36] audit: type=1400 audit(2000000061.494:4519): avc: denied { execmem } for pid=3593 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 130.167350][ T36] audit: type=1400 audit(2000000061.494:4520): avc: denied { read write } for pid=3594 comm="syz.3.1448" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 130.216374][ T36] audit: type=1400 audit(2000000061.494:4521): avc: denied { write } for pid=282 comm="syz-executor" path="pipe:[1459]" dev="pipefs" ino=1459 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0 [ 130.239621][ T36] audit: type=1400 audit(2000000061.494:4522): avc: denied { write } for pid=282 comm="syz-executor" path="pipe:[1459]" dev="pipefs" ino=1459 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0 [ 130.266282][ T36] audit: type=1400 audit(2000000061.494:4523): avc: denied { write } for pid=282 comm="syz-executor" path="pipe:[1459]" dev="pipefs" ino=1459 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0 [ 130.290242][ T36] audit: type=1400 audit(2000000061.494:4524): avc: denied { write } for pid=282 comm="syz-executor" path="pipe:[1459]" dev="pipefs" ino=1459 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0 [ 130.313328][ T36] audit: type=1400 audit(2000000061.494:4525): avc: denied { write } for pid=282 comm="syz-executor" path="pipe:[1459]" dev="pipefs" ino=1459 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0 [ 130.337389][ T329] bridge_slave_1: left allmulticast mode [ 130.343014][ T329] bridge_slave_1: left promiscuous mode [ 130.348656][ T329] bridge0: port 2(bridge_slave_1) entered disabled state [ 130.356072][ T329] bridge_slave_0: left allmulticast mode [ 130.361802][ T329] bridge_slave_0: left promiscuous mode [ 130.367465][ T329] bridge0: port 1(bridge_slave_0) entered disabled state [ 130.469514][ T329] veth1_macvtap: left promiscuous mode [ 130.475004][ T329] veth0_vlan: left promiscuous mode [ 130.757885][ T329] bridge_slave_1: left allmulticast mode [ 130.763528][ T329] bridge_slave_1: left promiscuous mode [ 130.769157][ T329] bridge0: port 2(bridge_slave_1) entered disabled state [ 130.776542][ T329] bridge_slave_0: left allmulticast mode [ 130.782333][ T329] bridge_slave_0: left promiscuous mode [ 130.787988][ T329] bridge0: port 1(bridge_slave_0) entered disabled state [ 130.918596][ T329] veth1_macvtap: left promiscuous mode [ 130.924297][ T329] veth0_vlan: left promiscuous mode