[ 464.799836][ T8151] RBP: 00007f0683db4120 R08: 0000000000000000 R09: 0000000000000000
[ 464.799853][ T8151] R10: 0000000000280404 R11: 0000000000000246 R12: 0000000000000002
[ 464.799870][ T8151] R13: 000000000000000b R14: 00007f068319bf80 R15: 00007ffd46c06b58
[ 464.799908][ T8151]
[ 465.338481][ T8153] loop0: detected capacity change from 0 to 32768
[ 465.347018][ T8153] BTRFS: device fsid e417788f-7a09-42b2-9266-8ddc5d5d35d2 devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor.0 (8153)
[ 465.360724][ T8153] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16
[ 465.490349][ T8153] FAULT_INJECTION: forcing a failure.
[ 465.490349][ T8153] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 465.505307][ T8153] CPU: 0 UID: 0 PID: 8153 Comm: syz-executor.0 Not tainted 6.17.0-rc1-syzkaller-g8742b2d8935f #0 PREEMPT(full)
[ 465.505341][ T8153] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025
[ 465.505358][ T8153] Call Trace:
[ 465.505368][ T8153]
[ 465.505379][ T8153] dump_stack_lvl+0x189/0x250
[ 465.505416][ T8153] ? __pfx____ratelimit+0x10/0x10
[ 465.505456][ T8153] ? __pfx_dump_stack_lvl+0x10/0x10
[ 465.505489][ T8153] ? __pfx__printk+0x10/0x10
[ 465.505541][ T8153] should_fail_ex+0x414/0x560
[ 465.505583][ T8153] _copy_to_user+0x31/0xb0
[ 465.505617][ T8153] simple_read_from_buffer+0xe1/0x170
[ 465.505662][ T8153] proc_fail_nth_read+0x1b3/0x220
[ 465.505697][ T8153] ? __pfx_proc_fail_nth_read+0x10/0x10
[ 465.505730][ T8153] ? srso_alias_return_thunk+0x5/0xfbef5
[ 465.505767][ T8153] ? rw_verify_area+0x2a6/0x4d0
[ 465.505800][ T8153] ? __lock_acquire+0xab9/0xd20
[ 465.505837][ T8153] ? __pfx_proc_fail_nth_read+0x10/0x10
[ 465.505868][ T8153] vfs_read+0x200/0xa30
[ 465.505901][ T8153] ? fdget_pos+0x247/0x320
[ 465.505930][ T8153] ? __pfx___mutex_lock+0x10/0x10
[ 465.505969][ T8153] ? __pfx_vfs_read+0x10/0x10
[ 465.506005][ T8153] ? __fget_files+0x2a/0x420
[ 465.506032][ T8153] ? srso_alias_return_thunk+0x5/0xfbef5
[ 465.506061][ T8153] ? __fget_files+0x3a0/0x420
[ 465.506083][ T8153] ? __fget_files+0x2a/0x420
[ 465.506111][ T8153] ? srso_alias_return_thunk+0x5/0xfbef5
[ 465.506145][ T8153] ksys_read+0x145/0x250
[ 465.506183][ T8153] ? __pfx_ksys_read+0x10/0x10
[ 465.506214][ T8153] ? rcu_is_watching+0x15/0xb0
[ 465.506247][ T8153] ? do_syscall_64+0xbe/0x3b0
[ 465.506290][ T8153] do_syscall_64+0xfa/0x3b0
[ 465.506326][ T8153] ? lockdep_hardirqs_on+0x9c/0x150
[ 465.506361][ T8153] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 465.506386][ T8153] ? srso_alias_return_thunk+0x5/0xfbef5
[ 465.506416][ T8153] ? exc_page_fault+0x9f/0xf0
[ 465.506452][ T8153] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 465.506478][ T8153] RIP: 0033:0x7f068307b60c
[ 465.506500][ T8153] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 49 80 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 9f 80 02 00 48
[ 465.506521][ T8153] RSP: 002b:00007f0683db40c0 EFLAGS: 00000246 ORIG_RAX: 0000000000000000
[ 465.506547][ T8153] RAX: ffffffffffffffda RBX: 00007f068319bf80 RCX: 00007f068307b60c
[ 465.506567][ T8153] RDX: 000000000000000f RSI: 00007f0683db4130 RDI: 0000000000000005
[ 465.506585][ T8153] RBP: 00007f0683db4120 R08: 0000000000000000 R09: 0000000000000000
[ 465.506602][ T8153] R10: 0000000000280404 R11: 0000000000000246 R12: 0000000000000002
[ 465.506618][ T8153] R13: 000000000000000b R14: 00007f068319bf80 R15: 00007ffd46c06b58
[ 465.506657][ T8153]
[ 465.997016][ T8156] loop0: detected capacity change from 0 to 32768
[ 466.009655][ T8156] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16
[ 466.021765][ T8156] FAULT_INJECTION: forcing a failure.
[ 466.021765][ T8156] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 466.036285][ T8156] CPU: 1 UID: 0 PID: 8156 Comm: syz-executor.0 Not tainted 6.17.0-rc1-syzkaller-g8742b2d8935f #0 PREEMPT(full)
[ 466.036320][ T8156] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025
[ 466.036335][ T8156] Call Trace:
[ 466.036346][ T8156]
[ 466.036357][ T8156] dump_stack_lvl+0x189/0x250
[ 466.036393][ T8156] ? __pfx____ratelimit+0x10/0x10
[ 466.036430][ T8156] ? __pfx_dump_stack_lvl+0x10/0x10
[ 466.036461][ T8156] ? __pfx__printk+0x10/0x10
[ 466.036513][ T8156] should_fail_ex+0x414/0x560
[ 466.036554][ T8156] _copy_to_user+0x31/0xb0
[ 466.036587][ T8156] simple_read_from_buffer+0xe1/0x170
[ 466.036631][ T8156] proc_fail_nth_read+0x1b3/0x220
[ 466.036666][ T8156] ? __pfx_proc_fail_nth_read+0x10/0x10
[ 466.036699][ T8156] ? srso_alias_return_thunk+0x5/0xfbef5
[ 466.036737][ T8156] ? rw_verify_area+0x2a6/0x4d0
[ 466.036770][ T8156] ? __lock_acquire+0xab9/0xd20
[ 466.036807][ T8156] ? __pfx_proc_fail_nth_read+0x10/0x10
[ 466.036839][ T8156] vfs_read+0x200/0xa30
[ 466.036872][ T8156] ? fdget_pos+0x247/0x320
[ 466.036901][ T8156] ? __pfx___mutex_lock+0x10/0x10
[ 466.036941][ T8156] ? __pfx_vfs_read+0x10/0x10
[ 466.036977][ T8156] ? __fget_files+0x2a/0x420
[ 466.037005][ T8156] ? srso_alias_return_thunk+0x5/0xfbef5
[ 466.037036][ T8156] ? __fget_files+0x3a0/0x420
[ 466.037058][ T8156] ? __fget_files+0x2a/0x420
[ 466.037086][ T8156] ? srso_alias_return_thunk+0x5/0xfbef5
[ 466.037122][ T8156] ksys_read+0x145/0x250
[ 466.037160][ T8156] ? __pfx_ksys_read+0x10/0x10
[ 466.037192][ T8156] ? rcu_is_watching+0x15/0xb0
[ 466.037225][ T8156] ? do_syscall_64+0xbe/0x3b0
[ 466.037269][ T8156] do_syscall_64+0xfa/0x3b0
[ 466.037306][ T8156] ? lockdep_hardirqs_on+0x9c/0x150
[ 466.037347][ T8156] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 466.037372][ T8156] ? srso_alias_return_thunk+0x5/0xfbef5
[ 466.037402][ T8156] ? exc_page_fault+0x9f/0xf0
[ 466.037439][ T8156] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 466.037465][ T8156] RIP: 0033:0x7f068307b60c
[ 466.037487][ T8156] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 49 80 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 9f 80 02 00 48
[ 466.037510][ T8156] RSP: 002b:00007f0683db40c0 EFLAGS: 00000246 ORIG_RAX: 0000000000000000
[ 466.037537][ T8156] RAX: ffffffffffffffda RBX: 00007f068319bf80 RCX: 00007f068307b60c
[ 466.037556][ T8156] RDX: 000000000000000f RSI: 00007f0683db4130 RDI: 0000000000000005
[ 466.037573][ T8156] RBP: 00007f0683db4120 R08: 0000000000000000 R09: 0000000000000000
[ 466.037590][ T8156] R10: 0000000000280404 R11: 0000000000000246 R12: 0000000000000002
[ 466.037607][ T8156] R13: 000000000000000b R14: 00007f068319bf80 R15: 00007ffd46c06b58
[ 466.037646][ T8156]
[ 466.648237][ T1143] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 466.735434][ T1143] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 466.784281][ T1143] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 466.859011][ T1143] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 466.982974][ T1143] bridge_slave_1: left allmulticast mode
[ 466.989654][ T1143] bridge_slave_1: left promiscuous mode
[ 466.996391][ T1143] bridge0: port 2(bridge_slave_1) entered disabled state
[ 467.006272][ T1143] bridge_slave_0: left allmulticast mode
[ 467.011970][ T1143] bridge_slave_0: left promiscuous mode
[ 467.018169][ T1143] bridge0: port 1(bridge_slave_0) entered disabled state
[ 467.237063][ T1143] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
[ 467.248007][ T1143] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
[ 467.258519][ T1143] bond0 (unregistering): Released all slaves
[ 467.489661][ T1143] hsr_slave_0: left promiscuous mode
[ 467.497278][ T1143] hsr_slave_1: left promiscuous mode
[ 467.503347][ T1143] batman_adv: batadv0: Interface deactivated: batadv_slave_0
[ 467.510731][ T1143] batman_adv: batadv0: Removing interface: batadv_slave_0
[ 467.522107][ T1143] batman_adv: batadv0: Interface deactivated: batadv_slave_1
[ 467.529513][ T1143] batman_adv: batadv0: Removing interface: batadv_slave_1
[ 467.554624][ T1143] veth1_macvtap: left promiscuous mode
[ 467.560209][ T1143] veth0_macvtap: left promiscuous mode
[ 467.566122][ T1143] veth1_vlan: left promiscuous mode
[ 467.571455][ T1143] veth0_vlan: left promiscuous mode
[ 467.957417][ T1143] team0 (unregistering): Port device team_slave_1 removed
[ 467.988139][ T1143] team0 (unregistering): Port device team_slave_0 removed
Warning: Permanently added '10.128.0.208' (ED25519) to the list of known hosts.