[ 433.544374][ T8869] loop0: detected capacity change from 0 to 32768
[ 433.553001][ T8869] BTRFS: device fsid e417788f-7a09-42b2-9266-8ddc5d5d35d2 devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor.0 (8869)
[ 433.566269][ T8869] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16
[ 433.576930][ T8869] FAULT_INJECTION: forcing a failure.
[ 433.576930][ T8869] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 433.591620][ T8869] CPU: 1 UID: 0 PID: 8869 Comm: syz-executor.0 Not tainted 6.17.0-rc2-syzkaller-gc17b750b3ad9 #0 PREEMPT(full)
[ 433.591648][ T8869] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025
[ 433.591660][ T8869] Call Trace:
[ 433.591667][ T8869]
[ 433.591675][ T8869] dump_stack_lvl+0x16c/0x1f0
[ 433.591699][ T8869] should_fail_ex+0x512/0x640
[ 433.591722][ T8869] _copy_to_user+0x32/0xd0
[ 433.591748][ T8869] simple_read_from_buffer+0xcb/0x170
[ 433.591769][ T8869] proc_fail_nth_read+0x197/0x240
[ 433.591791][ T8869] ? __pfx_proc_fail_nth_read+0x10/0x10
[ 433.591811][ T8869] ? security_file_permission+0x71/0x210
[ 433.591839][ T8869] ? rw_verify_area+0xcf/0x6c0
[ 433.591866][ T8869] ? __pfx_proc_fail_nth_read+0x10/0x10
[ 433.591888][ T8869] vfs_read+0x1e4/0xcf0
[ 433.591908][ T8869] ? __pfx___mutex_lock+0x10/0x10
[ 433.591929][ T8869] ? __pfx_vfs_read+0x10/0x10
[ 433.591946][ T8869] ? __fget_files+0x204/0x3c0
[ 433.591964][ T8869] ? rcu_is_watching+0x12/0xc0
[ 433.591991][ T8869] ? __fget_files+0x20e/0x3c0
[ 433.592015][ T8869] ksys_read+0x12a/0x250
[ 433.592034][ T8869] ? __pfx_ksys_read+0x10/0x10
[ 433.592055][ T8869] do_syscall_64+0xcd/0x4c0
[ 433.592086][ T8869] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 433.592106][ T8869] RIP: 0033:0x7fdbb7e7b7cc
[ 433.592121][ T8869] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 59 81 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 af 81 02 00 48
[ 433.592141][ T8869] RSP: 002b:00007fdbb8bdd0c0 EFLAGS: 00000246 ORIG_RAX: 0000000000000000
[ 433.592158][ T8869] RAX: ffffffffffffffda RBX: 00007fdbb7f9bf80 RCX: 00007fdbb7e7b7cc
[ 433.592170][ T8869] RDX: 000000000000000f RSI: 00007fdbb8bdd130 RDI: 0000000000000005
[ 433.592181][ T8869] RBP: 00007fdbb8bdd120 R08: 0000000000000000 R09: 0000000000000000
[ 433.592192][ T8869] R10: 0000000000280404 R11: 0000000000000246 R12: 0000000000000002
[ 433.592203][ T8869] R13: 000000000000000b R14: 00007fdbb7f9bf80 R15: 00007ffce3de1748
[ 433.592221][ T8869]
[ 433.981469][ T8873] loop0: detected capacity change from 0 to 32768
[ 433.989242][ T8873] BTRFS: device fsid e417788f-7a09-42b2-9266-8ddc5d5d35d2 devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor.0 (8873)
[ 434.003684][ T8873] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16
[ 434.014657][ T8873] FAULT_INJECTION: forcing a failure.
[ 434.014657][ T8873] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 434.027835][ T8873] CPU: 0 UID: 0 PID: 8873 Comm: syz-executor.0 Not tainted 6.17.0-rc2-syzkaller-gc17b750b3ad9 #0 PREEMPT(full)
[ 434.027861][ T8873] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025
[ 434.027880][ T8873] Call Trace:
[ 434.027886][ T8873]
[ 434.027893][ T8873] dump_stack_lvl+0x16c/0x1f0
[ 434.027918][ T8873] should_fail_ex+0x512/0x640
[ 434.027942][ T8873] _copy_to_user+0x32/0xd0
[ 434.027967][ T8873] simple_read_from_buffer+0xcb/0x170
[ 434.027988][ T8873] proc_fail_nth_read+0x197/0x240
[ 434.028010][ T8873] ? __pfx_proc_fail_nth_read+0x10/0x10
[ 434.028031][ T8873] ? security_file_permission+0x71/0x210
[ 434.028059][ T8873] ? rw_verify_area+0xcf/0x6c0
[ 434.028091][ T8873] ? __pfx_proc_fail_nth_read+0x10/0x10
[ 434.028110][ T8873] vfs_read+0x1e4/0xcf0
[ 434.028128][ T8873] ? __pfx___mutex_lock+0x10/0x10
[ 434.028149][ T8873] ? __pfx_vfs_read+0x10/0x10
[ 434.028167][ T8873] ? __fget_files+0x204/0x3c0
[ 434.028186][ T8873] ? rcu_is_watching+0x12/0xc0
[ 434.028213][ T8873] ? __fget_files+0x20e/0x3c0
[ 434.028237][ T8873] ksys_read+0x12a/0x250
[ 434.028255][ T8873] ? __pfx_ksys_read+0x10/0x10
[ 434.028279][ T8873] do_syscall_64+0xcd/0x4c0
[ 434.028300][ T8873] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 434.028321][ T8873] RIP: 0033:0x7fdbb7e7b7cc
[ 434.028336][ T8873] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 59 81 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 af 81 02 00 48
[ 434.028355][ T8873] RSP: 002b:00007fdbb8bdd0c0 EFLAGS: 00000246 ORIG_RAX: 0000000000000000
[ 434.028373][ T8873] RAX: ffffffffffffffda RBX: 00007fdbb7f9bf80 RCX: 00007fdbb7e7b7cc
[ 434.028386][ T8873] RDX: 000000000000000f RSI: 00007fdbb8bdd130 RDI: 0000000000000005
[ 434.028398][ T8873] RBP: 00007fdbb8bdd120 R08: 0000000000000000 R09: 0000000000000000
[ 434.028410][ T8873] R10: 0000000000280404 R11: 0000000000000246 R12: 0000000000000002
[ 434.028423][ T8873] R13: 000000000000000b R14: 00007fdbb7f9bf80 R15: 00007ffce3de1748
[ 434.028442][ T8873]
[ 434.400323][ T8876] loop0: detected capacity change from 0 to 32768
[ 434.409404][ T8876] BTRFS: device fsid e417788f-7a09-42b2-9266-8ddc5d5d35d2 devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor.0 (8876)
[ 434.422781][ T8876] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16
[ 434.433638][ T8876] FAULT_INJECTION: forcing a failure.
[ 434.433638][ T8876] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 434.447013][ T8876] CPU: 1 UID: 0 PID: 8876 Comm: syz-executor.0 Not tainted 6.17.0-rc2-syzkaller-gc17b750b3ad9 #0 PREEMPT(full)
[ 434.447041][ T8876] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025
[ 434.447052][ T8876] Call Trace:
[ 434.447059][ T8876]
[ 434.447066][ T8876] dump_stack_lvl+0x16c/0x1f0
[ 434.447090][ T8876] should_fail_ex+0x512/0x640
[ 434.447113][ T8876] _copy_to_user+0x32/0xd0
[ 434.447137][ T8876] simple_read_from_buffer+0xcb/0x170
[ 434.447158][ T8876] proc_fail_nth_read+0x197/0x240
[ 434.447178][ T8876] ? __pfx_proc_fail_nth_read+0x10/0x10
[ 434.447197][ T8876] ? security_file_permission+0x71/0x210
[ 434.447224][ T8876] ? rw_verify_area+0xcf/0x6c0
[ 434.447249][ T8876] ? __pfx_proc_fail_nth_read+0x10/0x10
[ 434.447269][ T8876] vfs_read+0x1e4/0xcf0
[ 434.447287][ T8876] ? __pfx___mutex_lock+0x10/0x10
[ 434.447306][ T8876] ? __pfx_vfs_read+0x10/0x10
[ 434.447322][ T8876] ? __fget_files+0x204/0x3c0
[ 434.447341][ T8876] ? rcu_is_watching+0x12/0xc0
[ 434.447366][ T8876] ? __fget_files+0x20e/0x3c0
[ 434.447387][ T8876] ksys_read+0x12a/0x250
[ 434.447404][ T8876] ? __pfx_ksys_read+0x10/0x10
[ 434.447424][ T8876] do_syscall_64+0xcd/0x4c0
[ 434.447445][ T8876] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 434.447466][ T8876] RIP: 0033:0x7fdbb7e7b7cc
[ 434.447481][ T8876] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 59 81 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 af 81 02 00 48
[ 434.447499][ T8876] RSP: 002b:00007fdbb8bdd0c0 EFLAGS: 00000246 ORIG_RAX: 0000000000000000
[ 434.447517][ T8876] RAX: ffffffffffffffda RBX: 00007fdbb7f9bf80 RCX: 00007fdbb7e7b7cc
[ 434.447531][ T8876] RDX: 000000000000000f RSI: 00007fdbb8bdd130 RDI: 0000000000000005
[ 434.447543][ T8876] RBP: 00007fdbb8bdd120 R08: 0000000000000000 R09: 0000000000000000
[ 434.447555][ T8876] R10: 0000000000280404 R11: 0000000000000246 R12: 0000000000000002
[ 434.447568][ T8876] R13: 000000000000000b R14: 00007fdbb7f9bf80 R15: 00007ffce3de1748
[ 434.447583][ T8876]
[ 434.865951][ T2916] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 434.915647][ T2916] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 434.975468][ T2916] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 435.015843][ T2916] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 435.105621][ T2916] bridge_slave_1: left allmulticast mode
[ 435.111270][ T2916] bridge_slave_1: left promiscuous mode
[ 435.120293][ T2916] bridge0: port 2(bridge_slave_1) entered disabled state
[ 435.132902][ T2916] bridge_slave_0: left allmulticast mode
[ 435.138614][ T2916] bridge_slave_0: left promiscuous mode
[ 435.144497][ T2916] bridge0: port 1(bridge_slave_0) entered disabled state
[ 435.215091][ T2916] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
[ 435.224770][ T2916] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
[ 435.234167][ T2916] bond0 (unregistering): Released all slaves
[ 435.417468][ T2916] hsr_slave_0: left promiscuous mode
[ 435.424839][ T2916] hsr_slave_1: left promiscuous mode
[ 435.430500][ T2916] batman_adv: batadv0: Interface deactivated: batadv_slave_0
[ 435.438264][ T2916] batman_adv: batadv0: Removing interface: batadv_slave_0
[ 435.447419][ T2916] batman_adv: batadv0: Interface deactivated: batadv_slave_1
[ 435.454818][ T2916] batman_adv: batadv0: Removing interface: batadv_slave_1
[ 435.464132][ T2916] veth1_macvtap: left promiscuous mode
[ 435.469624][ T2916] veth0_macvtap: left promiscuous mode
[ 435.475880][ T2916] veth1_vlan: left promiscuous mode
[ 435.481083][ T2916] veth0_vlan: left promiscuous mode
[ 435.548712][ T2916] team0 (unregistering): Port device team_slave_1 removed
[ 435.563110][ T2916] team0 (unregistering): Port device team_slave_0 removed
Warning: Permanently added '10.128.1.24' (ED25519) to the list of known hosts.