last executing test programs: 17m28.981736398s ago: executing program 2 (id=7334): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000680)={&(0x7f00000000c0)={0x14, 0x24, 0x9, 0x3, 0x25dfdbff, {0x4}}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x20004000) 17m28.969395239s ago: executing program 2 (id=7336): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x1b, &(0x7f0000000000)=0x1, 0x4) 17m28.95709261s ago: executing program 2 (id=7338): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f0000000180)=@req3={0x1000, 0x3a, 0x1000, 0x3a, 0x7fe, 0xf83, 0x8}, 0x1c) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000000)='batadv_slave_1\x00', 0x10) r3 = socket$inet(0x2, 0x801, 0x0) bind$inet(r3, &(0x7f0000000000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) shutdown(r3, 0x1) 17m28.852953751s ago: executing program 2 (id=7346): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000680)={&(0x7f00000000c0)={0x14, 0x24, 0x9, 0x3, 0x25dfdbff, {0x4}}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x20004000) 17m28.793264397s ago: executing program 2 (id=7348): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x9]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000004300), 0x0, 0x0) r2 = dup(r1) ioctl$KVM_CHECK_EXTENSION(r2, 0xae03, 0xc7) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r3, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r3, @ANYRES64=r0], 0x118) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x51) ioctl$FS_IOC_FSSETXATTR(r4, 0x401c5820, &(0x7f0000000080)={0x8}) link(&(0x7f0000000080)='.\x00', &(0x7f00000000c0)='./file0\x00') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r3, 0x0) ioctl$KVM_X86_SETUP_MCE(r3, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r6, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r6, @ANYRES64=r5], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x110, r5, 0x0) ioctl$KVM_X86_SETUP_MCE(r6, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r5, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) keyctl$update(0x2, 0x0, &(0x7f0000001600)='a`', 0x2) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e22, @multicast2}, 0x10) r7 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r7, 0x107, 0x5, &(0x7f0000000180)=@req3={0x1000, 0x3a, 0x1000, 0x3a, 0x7fe, 0xf83, 0x8}, 0x1c) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000000)='batadv_slave_1\x00', 0x10) r8 = socket$inet(0x2, 0x801, 0x0) bind$inet(r8, &(0x7f0000000000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r8, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) shutdown(r8, 0x1) 17m28.793022786s ago: executing program 2 (id=7349): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f00000000c0)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB=',cache=doo']) 17m13.801203192s ago: executing program 32 (id=7349): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f00000000c0)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB=',cache=doo']) 6m37.451570424s ago: executing program 3 (id=25731): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x1]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x0, 0x0}) 6m37.384086441s ago: executing program 3 (id=25732): lsm_list_modules(0x0, 0x0, 0x0) 6m37.309239478s ago: executing program 3 (id=25734): r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000040)="240000001e005f0214f6fffffffffff8070000000000000000000000080009000d000000", 0x24) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f00000000c0), 0x12) close_range(r0, 0xffffffffffffffff, 0x0) rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466fc422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r3, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r3, @ANYRES16=r0], 0x118) r4 = fsopen(&(0x7f0000000040)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r4, 0x6, 0x0, 0x0, 0x0) r5 = fsmount(r4, 0x0, 0x0) fchdir(r5) r6 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x8880, 0x4d) lseek(r6, 0x1, 0x1) getdents64(r6, 0x0, 0x4f) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r3, 0x0) ioctl$KVM_X86_SETUP_MCE(r3, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) pselect6(0x2a, 0x0, 0x0, 0x0, &(0x7f00000003c0), 0x0) 6m37.28461625s ago: executing program 3 (id=25736): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x1]}}, 0x0, 0x8, &(0x7f0000000300)) socket$inet6_tcp(0xa, 0x1, 0x0) (async) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) openat$rnullb(0xffffffffffffff9c, 0x0, 0x20002, 0x0) (async) openat$rnullb(0xffffffffffffff9c, 0x0, 0x20002, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) (async) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000140)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000440)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './bus'}}]}) open(&(0x7f0000000040)='./file0\x00', 0x400, 0x43) chdir(&(0x7f00000003c0)='./bus\x00') mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) (async) rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r3, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r3, @ANYRES64=r2], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r3, 0x0) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r3, 0x0) ioctl$KVM_X86_SETUP_MCE(r3, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) (async) ioctl$KVM_X86_SETUP_MCE(r3, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = getpid() r5 = syz_pidfd_open(r4, 0x0) setns(r5, 0x24020000) (async) setns(r5, 0x24020000) r6 = syz_clone(0xb21e0000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_pidfd_open(r6, 0x0) (async) r7 = syz_pidfd_open(r6, 0x0) setns(r7, 0x24020000) capset(&(0x7f0000000040)={0x20071026}, &(0x7f0000000080)={0x6, 0x6, 0x2, 0x87, 0xffffffff, 0x40}) (async) capset(&(0x7f0000000040)={0x20071026}, &(0x7f0000000080)={0x6, 0x6, 0x2, 0x87, 0xffffffff, 0x40}) fsopen(&(0x7f0000000380)='sysfs\x00', 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) r8 = openat$rnullb(0xffffffffffffff9c, &(0x7f0000000040), 0x165142, 0x0) write(r8, &(0x7f0000000400)="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", 0x12d) 6m37.155053783s ago: executing program 3 (id=25740): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x1]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x0, 0x0}) 6m37.011603187s ago: executing program 3 (id=25742): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, 0xffffffffffffffff, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r1 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f0000001580)=""/193, &(0x7f00000001c0)=0xc1) 6m36.88811681s ago: executing program 33 (id=25742): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, 0xffffffffffffffff, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r1 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f0000001580)=""/193, &(0x7f00000001c0)=0xc1) 2m15.788912623s ago: executing program 1 (id=29983): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x40042, 0x1) close(r2) socket(0x28, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmmsg$inet(r3, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000540)="7ddb889a", 0xfffffcda}], 0x1}}], 0x1, 0x20000054) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480), 0x84, &(0x7f0000000180)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) r4 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0026}]}) close_range(r4, 0xffffffffffffffff, 0x0) 2m15.700788942s ago: executing program 1 (id=29988): rt_sigaction(0xd, 0x0, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r2, 0x29, 0x48, &(0x7f0000000000)=0x1, 0x4) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 2m15.668439655s ago: executing program 1 (id=29990): rt_sigaction(0xd, 0x0, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) mprotect(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x100000c) 2m15.62034473s ago: executing program 1 (id=29992): r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder1\x00', 0x1002, 0x0) (async) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000018c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) (async) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bind$inet6(r2, &(0x7f0000000500)={0xa, 0x4e20, 0xbb6, @loopback, 0x5}, 0x28) (async) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x9, @loopback, 0x106}, 0x1c) setsockopt$inet6_buf(r2, 0x29, 0x39, &(0x7f0000000040)="ff02040000ffffffffffffffff1f2be82db1af0000000000", 0x18) (async) rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) (async, rerun: 64) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) (rerun: 64) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r4, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r4, @ANYRES64=r3], 0x118) (async, rerun: 64) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r4, 0x0) (rerun: 64) ioctl$KVM_X86_SETUP_MCE(r4, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) (async, rerun: 32) r5 = syz_open_dev$loop(&(0x7f0000000000), 0x7, 0x4800) (rerun: 32) ioctl$BLKRASET(r5, 0x1262, 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000006f40)='./file0\x00', 0x190) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000008300), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000002080)='./file0\x00', &(0x7f00000020c0), 0x0, &(0x7f0000002100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r6, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='\x00'/10, @ANYRESDEC=0x0]) (async) syz_fuse_handle_req(r6, &(0x7f00000021c0)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008dd2000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100", 0x2000, &(0x7f00000041c0)={&(0x7f00000001c0)={0x50, 0x0, 0x0, {0x7, 0x29, 0x10007, 0x140008, 0x0, 0x0, 0x1, 0x57, 0x0, 0x0, 0x1}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (async) setxattr$security_capability(&(0x7f0000000240)='./file0/file1\x00', &(0x7f0000000280), 0x0, 0x0, 0x0) (async) umount2(&(0x7f00000002c0)='./file0\x00', 0x9) (async) close_range(r1, 0xffffffffffffffff, 0x0) (async) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$sock_linger(r7, 0x1, 0xd, &(0x7f0000000040)={0x1}, 0x8) (async, rerun: 32) close_range(r0, 0xffffffffffffffff, 0x0) (rerun: 32) 2m15.551922997s ago: executing program 1 (id=29995): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = signalfd4(r0, &(0x7f0000000080)={[0x3]}, 0x8, 0x1800) getsockopt$IP_SET_OP_GET_BYNAME(r1, 0x1, 0x53, &(0x7f00000000c0)={0x6, 0x7, 'syz2\x00'}, &(0x7f0000000100)=0x28) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, 0xffffffffffffffff, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) futex(&(0x7f0000000040), 0x1, 0x1, 0x0, 0x0, 0x1) 2m15.550911147s ago: executing program 1 (id=29997): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x40042, 0x1) close(r2) socket(0x28, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmmsg$inet(r3, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000540)="7ddb889a", 0xfffffcda}], 0x1}}], 0x1, 0x20000054) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480), 0x84, &(0x7f0000000180)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0026}]}) close_range(r4, 0xffffffffffffffff, 0x0) 2m0.52281567s ago: executing program 34 (id=29997): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x40042, 0x1) close(r2) socket(0x28, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmmsg$inet(r3, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000540)="7ddb889a", 0xfffffcda}], 0x1}}], 0x1, 0x20000054) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480), 0x84, &(0x7f0000000180)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0026}]}) close_range(r4, 0xffffffffffffffff, 0x0) 2.692401623s ago: executing program 0 (id=32511): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x1]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, 0x0) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r2 = userfaultfd(0x80001) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa04, &(0x7f0000000000)={{&(0x7f0000fff000/0x1000)=nil, 0x1000}, 0x5, 0x2}) 1.900730562s ago: executing program 4 (id=32518): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x1]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000400)='./binderfs/binder1\x00', 0x800, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) mmap$binder(&(0x7f00000a0000)=nil, 0x2000, 0x1, 0x11, r2, 0x0) r3 = getpid() r4 = syz_pidfd_open(r3, 0x0) setns(r4, 0x24020000) r5 = syz_clone(0xb21e0000, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r5, 0x2) 1.675234394s ago: executing program 4 (id=32521): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x1]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r0, &(0x7f0000000640), 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x26e1, 0x0) close(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$SIOCSIFHWADDR(r2, 0x8b0f, &(0x7f0000000100)={'wg1\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x15}}) 1.443178917s ago: executing program 4 (id=32524): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x1]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) syz_open_procfs(0x0, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) rt_sigtimedwait(&(0x7f0000000040)={[0x4c]}, 0x0, &(0x7f00000001c0), 0x8) 1.162113325s ago: executing program 4 (id=32529): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x1]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000400)='./binderfs/binder1\x00', 0x800, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) mmap$binder(&(0x7f00000a0000)=nil, 0x2000, 0x1, 0x11, r2, 0x0) r3 = getpid() r4 = syz_pidfd_open(r3, 0x0) setns(r4, 0x24020000) r5 = syz_clone(0xb21e0000, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r5, 0x2) 852.123526ms ago: executing program 0 (id=32534): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x1]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r2 = userfaultfd(0x80001) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa04, &(0x7f0000000000)={{&(0x7f0000fff000/0x1000)=nil, 0x1000}, 0x5, 0x2}) 781.560863ms ago: executing program 4 (id=32537): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x1]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) syz_open_procfs(0x0, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) rt_sigtimedwait(&(0x7f0000000040)={[0x4c]}, 0x0, &(0x7f00000001c0), 0x8) 653.334326ms ago: executing program 5 (id=32539): madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xe) rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, 0x0, 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) mlock(&(0x7f0000460000/0x2000)=nil, 0x2000) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) 610.32218ms ago: executing program 6 (id=32540): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x1]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_CAP_DIRTY_LOG_RING_ACQ_REL(r1, 0x4068aea3, &(0x7f0000000040)={0xdf, 0x0, 0x10000}) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder1\x00', 0x0, 0x0) capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)={0x200000, 0x200000, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) syz_clone3(&(0x7f0000000140)={0x4000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2}, 0x7a) 518.990129ms ago: executing program 5 (id=32541): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='pids.events\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, 0x0, 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xec776000) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40a01, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup(r3) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}) write$tun(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="001c000d0700100000004000000060ec97000fc81100fe8000000000000000000000000000aaff020000000000000000000000000001"], 0xffe) 497.587401ms ago: executing program 0 (id=32542): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x1]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_CAP_DIRTY_LOG_RING_ACQ_REL(r1, 0x4068aea3, &(0x7f0000000040)={0xdf, 0x0, 0x10000}) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) syz_clone3(&(0x7f0000000140)={0x4000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2}, 0x7a) 460.259175ms ago: executing program 6 (id=32543): ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)=0x0) (async) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000080)='./binderfs/custom1\x00', 0x2, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r1, 0xc00c620f, &(0x7f00000000c0)={r0}) 384.539562ms ago: executing program 6 (id=32544): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r1, 0xc004ae02, &(0x7f0000000040)={0x1, [0x0]}) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) capset(&(0x7f0000000040)={0x20071026}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x4, 0x94}) r2 = socket$nl_audit(0x10, 0x3, 0x9) bind$netlink(r2, &(0x7f0000000340)={0x10, 0x0, 0x25dfdbfe, 0x4080101}, 0xc) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r3 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) r4 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) 383.702182ms ago: executing program 0 (id=32545): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x1]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000400)='./binderfs/binder1\x00', 0x800, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) mmap$binder(&(0x7f00000a0000)=nil, 0x2000, 0x1, 0x11, r2, 0x0) r3 = getpid() r4 = syz_pidfd_open(r3, 0x0) setns(r4, 0x24020000) r5 = syz_clone(0xb21e0000, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r5, 0x2) 372.643703ms ago: executing program 5 (id=32546): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) open(&(0x7f0000000040)='./bus\x00', 0x143142, 0x80) mount(0x0, &(0x7f0000000080)='./bus\x00', 0x0, 0x80c000, &(0x7f0000000580)='dax,always') 316.961559ms ago: executing program 4 (id=32547): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x1c0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./bus\x00', 0x0) r2 = socket$inet(0x2, 0x2, 0x1) sendmsg$inet(r2, &(0x7f0000000200)={&(0x7f0000000000)={0x2, 0x3, @empty}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000002100)="0800a9fc0da6b30a", 0x8}], 0x1, &(0x7f0000001d00)=ANY=[@ANYBLOB="30000000000000000000000007000000890704"], 0x30}, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r4, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0x1000, 0x8, '9P2000.u'}, 0x15) r5 = dup(r4) write$FUSE_BMAP(r5, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_INIT(r5, &(0x7f0000001740)={0x50, 0x0, 0x0, {0x7, 0x21, 0x0, 0x14210000, 0x7d, 0x1005, 0x0, 0x3}}, 0x50) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000004380), 0x1814800, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@afid={'afid', 0x3d, 0x8}}], [], 0x6b}}) read$FUSE(r5, &(0x7f00000043c0)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r7 = syz_open_procfs(r6, &(0x7f00000003c0)='mountinfo\x00') r8 = open(&(0x7f0000000200)='./bus\x00', 0x141a42, 0x0) sendfile(r8, r7, 0x0, 0xffffffff) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file1/file0\x00', 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f00000003c0), 0x0, &(0x7f00000004c0)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, './file1/file0'}}, {@upperdir={'upperdir', 0x3d, './file1'}}]}) 316.490679ms ago: executing program 6 (id=32548): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) 255.316875ms ago: executing program 5 (id=32549): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='pids.events\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6f, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) capset(&(0x7f0000000100)={0x20080522}, &(0x7f0000000080)={0x4, 0x10ffff, 0xfffffffd}) prctl$PR_CAP_AMBIENT(0x2f, 0x2, 0x0) 207.29545ms ago: executing program 0 (id=32550): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = syz_init_net_socket$bt_rfcomm(0x1f, 0x1, 0x3) setsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f0000000240)=0x2, 0x4) 149.452396ms ago: executing program 6 (id=32551): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6f, 0x11, 0xffffffffffffffff, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) capset(&(0x7f0000000100)={0x20080522}, &(0x7f0000000080)={0x4, 0x10ffff, 0xfffffffd}) r1 = socket$inet6(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000100)={'ip6_vti0\x00', &(0x7f0000000200)={'ip6_vti0\x00', 0x0, 0x29, 0x2, 0x6, 0x2, 0x20, @private1, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1, 0x80, 0x2a, 0x4}}) 149.262395ms ago: executing program 5 (id=32552): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='pids.events\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xec776000) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40a01, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup(r3) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}) write$tun(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="001c000d0700100000004000000060ec97000fc81100fe8000000000000000000000000000aaff020000000000000000000000000001"], 0xffe) 75.443413ms ago: executing program 6 (id=32553): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1a, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xff}}}, 0x1c) rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r4, &(0x7f0000000380)=ANY=[@ANYBLOB="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", @ANYRES8, @ANYRES8=r4, @ANYRES64=r3], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r4, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) ioperm(0x9, 0x7ff, 0x100000000) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r7, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r7, @ANYRES64=r6], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000007, 0x30, r7, 0x0) ioctl$KVM_X86_SETUP_MCE(r7, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r6, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r8, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r8, @ANYRES64=r5], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r8, 0x0) 60.995514ms ago: executing program 0 (id=32554): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x1]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_CAP_DIRTY_LOG_RING_ACQ_REL(r1, 0x4068aea3, &(0x7f0000000040)={0xdf, 0x0, 0x10000}) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) syz_clone3(&(0x7f0000000140)={0x4000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2}, 0x7a) 0s ago: executing program 5 (id=32555): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x1]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000400)='./binderfs/binder1\x00', 0x800, 0x0) mmap$binder(&(0x7f00000a0000)=nil, 0x2000, 0x1, 0x11, r2, 0x0) r3 = getpid() r4 = syz_pidfd_open(r3, 0x0) setns(r4, 0x24020000) syz_clone(0xb21e0000, 0x0, 0x0, 0x0, 0x0, 0x0) kernel console output (not intermixed with test programs): _check_read+0x15/0x20 [ 1228.811010][ T4306] __x64_sys_write+0x7f/0x90 [ 1228.811026][ T4306] x64_sys_call+0x271c/0x2ee0 [ 1228.811051][ T4306] do_syscall_64+0x58/0xf0 [ 1228.811073][ T4306] ? clear_bhb_loop+0x50/0xa0 [ 1228.811094][ T4306] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 1228.811114][ T4306] RIP: 0033:0x7f68c6b8f6c9 [ 1228.811130][ T4306] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1228.811146][ T4306] RSP: 002b:00007f68c79a6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1228.811166][ T4306] RAX: ffffffffffffffda RBX: 00007f68c6de5fa0 RCX: 00007f68c6b8f6c9 [ 1228.811181][ T4306] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 1228.811193][ T4306] RBP: 00007f68c79a6090 R08: 0000000000000000 R09: 0000000000000000 [ 1228.811206][ T4306] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1228.811219][ T4306] R13: 00007f68c6de6038 R14: 00007f68c6de5fa0 R15: 00007fffb5b9fc48 [ 1228.811235][ T4306] [ 1228.838622][ T4312] netlink: 4 bytes leftover after parsing attributes in process `syz.0.30717'. [ 1228.956405][ T4317] rust_binder: 150: no such ref 1 [ 1229.189282][ T4327] netlink: 'syz.4.30725': attribute type 6 has an invalid length. [ 1229.463988][ T4349] netlink: 4 bytes leftover after parsing attributes in process `syz.5.30735'. [ 1229.506794][ T4348] rust_binder: Failed to allocate buffer. len:4096, is_oneway:false [ 1229.943997][ T31] usb 5-1: new high-speed USB device number 67 using dummy_hcd [ 1230.113960][ T31] usb 5-1: Using ep0 maxpacket: 8 [ 1230.153962][ T31] usb 5-1: config 179 has an invalid interface number: 65 but max is 0 [ 1230.162247][ T31] usb 5-1: config 179 has no interface number 0 [ 1230.183956][ T31] usb 5-1: config 179 interface 65 altsetting 0 endpoint 0xF has an invalid bInterval 0, changing to 7 [ 1230.203986][ T31] usb 5-1: config 179 interface 65 altsetting 0 endpoint 0xF has invalid maxpacket 1025, setting to 1024 [ 1230.223949][ T31] usb 5-1: config 179 interface 65 altsetting 0 endpoint 0x83 has an invalid bInterval 0, changing to 7 [ 1230.243945][ T31] usb 5-1: config 179 interface 65 altsetting 0 endpoint 0x83 has invalid maxpacket 41728, setting to 1024 [ 1230.263977][ T31] usb 5-1: config 179 interface 65 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 23 [ 1230.293955][ T31] usb 5-1: New USB device found, idVendor=12ab, idProduct=90a3, bcdDevice=1e.eb [ 1230.303020][ T31] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1230.333660][ T4363] raw-gadget.0 gadget.4: fail, usb_ep_enable returned -22 [ 1230.548351][ T31] input: Generic X-Box pad as /devices/platform/dummy_hcd.4/usb5/5-1/5-1:179.65/input/input93 [ 1230.935515][T31851] usb 5-1: USB disconnect, device number 67 [ 1230.935522][ C1] xpad 5-1:179.65: xpad_irq_in - usb_submit_urb failed with result -19 [ 1230.935552][ C1] xpad 5-1:179.65: xpad_irq_out - usb_submit_urb failed with result -19 [ 1230.958004][T31851] xpad 5-1:179.65: xpad_try_sending_next_out_packet - usb_submit_urb failed with result -19 [ 1231.311981][ T4411] netlink: 12 bytes leftover after parsing attributes in process `syz.0.30765'. [ 1231.425255][ T4415] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=57113 sclass=netlink_route_socket pid=4415 comm=syz.0.30766 [ 1231.498357][ T4415] SELinux: Context system_u:object_r:console_device_t:s0 is not valid (left unmapped). [ 1231.760390][ T4422] rust_binder: 682: no such ref 1 [ 1232.384490][ T4444] rust_binder: 696: no such ref 1 [ 1232.603999][ T4460] rust_binder: 223: no such ref 1 [ 1232.698086][ T4467] rust_binder: 225: no such ref 1 [ 1232.829902][ T36] kauditd_printk_skb: 541 callbacks suppressed [ 1232.829920][ T36] audit: type=1400 audit(2000000885.280:64145): avc: denied { execute } for pid=4473 comm="syz.4.30796" path="/272/cpuacct.usage_percpu" dev="tmpfs" ino=1675 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1232.891161][ T36] audit: type=1400 audit(2000000885.290:64146): avc: denied { read write } for pid=3617 comm="syz-executor" name="loop6" dev="devtmpfs" ino=55 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1232.963954][ T36] audit: type=1400 audit(2000000885.290:64147): avc: denied { read write open } for pid=3617 comm="syz-executor" path="/dev/loop6" dev="devtmpfs" ino=55 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1233.003959][T13524] usb 1-1: new full-speed USB device number 100 using dummy_hcd [ 1233.013949][ T36] audit: type=1400 audit(2000000885.290:64148): avc: denied { ioctl } for pid=3617 comm="syz-executor" path="/dev/loop6" dev="devtmpfs" ino=55 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1233.081670][ T36] audit: type=1400 audit(2000000885.320:64149): avc: denied { read write } for pid=2259 comm="syz-executor" name="loop4" dev="devtmpfs" ino=53 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1233.105980][ T36] audit: type=1400 audit(2000000885.320:64150): avc: denied { read write open } for pid=2259 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=53 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1233.131019][ T36] audit: type=1400 audit(2000000885.320:64151): avc: denied { ioctl } for pid=2259 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=53 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1233.157290][ T36] audit: type=1400 audit(2000000885.330:64152): avc: denied { ioctl } for pid=4469 comm="syz.0.30794" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1233.193242][ T36] audit: type=1400 audit(2000000885.330:64153): avc: denied { execute } for pid=4475 comm="syz.6.30797" path="/113/cpuacct.usage_percpu" dev="tmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1233.226025][T13524] usb 1-1: too many endpoints for config 1 interface 0 altsetting 0: 255, using maximum allowed: 30 [ 1233.243949][ T36] audit: type=1400 audit(2000000885.340:64154): avc: denied { read } for pid=4477 comm="syz.4.30798" name="usbmon0" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 1233.243963][T13524] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 10 [ 1233.308651][T13524] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x82 has invalid maxpacket 1024, setting to 64 [ 1233.349907][T13524] usb 1-1: config 1 interface 0 altsetting 0 has 3 endpoint descriptors, different from the interface descriptor's value: 255 [ 1233.384786][T13524] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1233.394269][T13524] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=1 [ 1233.402285][T13524] usb 1-1: SerialNumber: syz [ 1233.418800][ T4470] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 1233.654135][T13524] cdc_acm 1-1:1.0: ttyACM0: USB ACM device [ 1233.684086][T13524] usb 1-1: USB disconnect, device number 100 [ 1235.304284][ T4549] rust_binder: 248: no such ref 1 [ 1237.978456][ T36] kauditd_printk_skb: 315 callbacks suppressed [ 1237.978474][ T36] audit: type=1400 audit(2000000890.430:64470): avc: denied { read write } for pid=2259 comm="syz-executor" name="loop4" dev="devtmpfs" ino=53 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1238.052879][ T36] audit: type=1400 audit(2000000890.430:64471): avc: denied { read write open } for pid=2259 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=53 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1238.106798][ T36] audit: type=1400 audit(2000000890.430:64472): avc: denied { ioctl } for pid=2259 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=53 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1238.162810][ T36] audit: type=1400 audit(2000000890.470:64473): avc: denied { execute } for pid=4615 comm="syz.4.30865" path="/299/cpuacct.usage_percpu" dev="tmpfs" ino=1848 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1238.227517][ T36] audit: type=1400 audit(2000000890.500:64474): avc: denied { read write } for pid=2259 comm="syz-executor" name="loop4" dev="devtmpfs" ino=53 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1238.267769][ T36] audit: type=1400 audit(2000000890.500:64475): avc: denied { read write open } for pid=2259 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=53 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1238.313961][ T36] audit: type=1400 audit(2000000890.500:64476): avc: denied { ioctl } for pid=2259 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=53 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1238.398862][ T36] audit: type=1400 audit(2000000890.590:64477): avc: denied { execute } for pid=4617 comm="syz.4.30866" path="/300/cpuacct.usage_percpu" dev="tmpfs" ino=1854 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1238.552171][ T36] audit: type=1400 audit(2000000891.000:64478): avc: denied { read write } for pid=3684 comm="syz-executor" name="loop5" dev="devtmpfs" ino=54 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1238.594237][ T36] audit: type=1400 audit(2000000891.050:64479): avc: denied { read write open } for pid=3684 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=54 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1238.704396][ T4625] netlink: 'syz.6.30869': attribute type 6 has an invalid length. [ 1238.963968][ T714] usb 6-1: new full-speed USB device number 41 using dummy_hcd [ 1239.126318][ T714] usb 6-1: too many endpoints for config 1 interface 0 altsetting 0: 255, using maximum allowed: 30 [ 1239.138574][ T714] usb 6-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 10 [ 1239.166098][ T714] usb 6-1: config 1 interface 0 altsetting 0 endpoint 0x82 has invalid maxpacket 1024, setting to 64 [ 1239.183277][ T714] usb 6-1: config 1 interface 0 altsetting 0 has 3 endpoint descriptors, different from the interface descriptor's value: 255 [ 1239.199876][ T714] usb 6-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1239.213936][ T714] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=1 [ 1239.233691][ T714] usb 6-1: SerialNumber: syz [ 1239.247676][ T4626] raw-gadget.0 gadget.5: fail, usb_ep_enable returned -22 [ 1239.475250][ T714] cdc_acm 6-1:1.0: ttyACM0: USB ACM device [ 1239.502046][ T714] usb 6-1: USB disconnect, device number 41 [ 1239.541641][ T4658] rust_binder: Write failure EFAULT in pid:742 [ 1240.306498][ T4695] netlink: 140 bytes leftover after parsing attributes in process `syz.6.30902'. [ 1240.460945][ T4700] netlink: 4 bytes leftover after parsing attributes in process `syz.6.30904'. [ 1240.705741][ T4709] FAULT_INJECTION: forcing a failure. [ 1240.705741][ T4709] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1240.783940][ T4709] CPU: 1 UID: 0 PID: 4709 Comm: syz.6.30910 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 1240.783975][ T4709] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1240.783987][ T4709] Call Trace: [ 1240.783994][ T4709] [ 1240.784003][ T4709] __dump_stack+0x21/0x30 [ 1240.784032][ T4709] dump_stack_lvl+0x10c/0x190 [ 1240.784056][ T4709] ? __cfi_dump_stack_lvl+0x10/0x10 [ 1240.784082][ T4709] ? unwind_get_return_address+0x51/0x90 [ 1240.784105][ T4709] ? __cfi_stack_trace_consume_entry+0x10/0x10 [ 1240.784134][ T4709] dump_stack+0x19/0x20 [ 1240.784158][ T4709] should_fail_ex+0x3d9/0x530 [ 1240.784179][ T4709] should_fail+0xf/0x20 [ 1240.784197][ T4709] should_fail_usercopy+0x1e/0x30 [ 1240.784217][ T4709] _copy_from_user+0x22/0xb0 [ 1240.784240][ T4709] ___sys_recvmsg+0x12f/0x510 [ 1240.784260][ T4709] ? __sys_recvmsg+0x280/0x280 [ 1240.784279][ T4709] ? __cfi_kstrtouint_from_user+0x10/0x10 [ 1240.784298][ T4709] ? selinux_file_permission+0x309/0xb30 [ 1240.784323][ T4709] ? __fget_files+0x2c5/0x340 [ 1240.784346][ T4709] do_recvmmsg+0x326/0x770 [ 1240.784366][ T4709] ? __sys_recvmmsg+0x290/0x290 [ 1240.784385][ T4709] ? __cfi_vfs_write+0x10/0x10 [ 1240.784406][ T4709] ? fput+0x1a5/0x240 [ 1240.784429][ T4709] __x64_sys_recvmmsg+0x191/0x240 [ 1240.784449][ T4709] ? __cfi___x64_sys_recvmmsg+0x10/0x10 [ 1240.784468][ T4709] ? __kasan_check_read+0x15/0x20 [ 1240.784496][ T4709] x64_sys_call+0x292c/0x2ee0 [ 1240.784522][ T4709] do_syscall_64+0x58/0xf0 [ 1240.784546][ T4709] ? clear_bhb_loop+0x50/0xa0 [ 1240.784568][ T4709] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 1240.784588][ T4709] RIP: 0033:0x7fd58938f6c9 [ 1240.784605][ T4709] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1240.784623][ T4709] RSP: 002b:00007fd587df7038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1240.784645][ T4709] RAX: ffffffffffffffda RBX: 00007fd5895e5fa0 RCX: 00007fd58938f6c9 [ 1240.784662][ T4709] RDX: 0000000000000001 RSI: 0000200000004e80 RDI: 0000000000000005 [ 1240.784676][ T4709] RBP: 00007fd587df7090 R08: 0000000000000000 R09: 0000000000000000 [ 1240.784691][ T4709] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1240.784704][ T4709] R13: 00007fd5895e6038 R14: 00007fd5895e5fa0 R15: 00007fff05d2fd68 [ 1240.784723][ T4709] [ 1241.241329][ T4718] netlink: 140 bytes leftover after parsing attributes in process `syz.6.30913'. [ 1242.563206][ T4764] netlink: 4 bytes leftover after parsing attributes in process `syz.5.30934'. [ 1242.644124][ T4767] Bluetooth: hci0: received HCILL_GO_TO_SLEEP_ACK in state 2 [ 1242.994207][ T36] kauditd_printk_skb: 332 callbacks suppressed [ 1242.994223][ T36] audit: type=1400 audit(2000000895.450:64810): avc: denied { read write open } for pid=3684 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=54 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1243.043956][ T36] audit: type=1400 audit(2000000895.480:64811): avc: denied { ioctl } for pid=3684 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=54 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1243.103970][ T36] audit: type=1400 audit(2000000895.530:64812): avc: denied { execute } for pid=4782 comm="syz.5.30944" path="/111/pids.events" dev="tmpfs" ino=694 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1243.163953][ T36] audit: type=1400 audit(2000000895.590:64813): avc: denied { read write } for pid=3684 comm="syz-executor" name="loop5" dev="devtmpfs" ino=54 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1243.213940][ T36] audit: type=1400 audit(2000000895.590:64814): avc: denied { read write open } for pid=3684 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=54 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1243.257867][ T36] audit: type=1400 audit(2000000895.590:64815): avc: denied { ioctl } for pid=3684 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=54 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1243.303942][ T36] audit: type=1400 audit(2000000895.700:64816): avc: denied { read } for pid=4784 comm="syz.5.30945" dev="nsfs" ino=4026532805 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1243.343945][ T36] audit: type=1400 audit(2000000895.700:64817): avc: denied { read open } for pid=4784 comm="syz.5.30945" path="net:[4026532805]" dev="nsfs" ino=4026532805 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1243.408296][ T36] audit: type=1400 audit(2000000895.700:64818): avc: denied { create } for pid=4784 comm="syz.5.30945" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 1243.453950][ T36] audit: type=1400 audit(2000000895.710:64819): avc: denied { getopt } for pid=4784 comm="syz.5.30945" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 1243.608895][ T4792] netlink: 4 bytes leftover after parsing attributes in process `syz.5.30947'. [ 1243.933747][ T4813] netlink: 4 bytes leftover after parsing attributes in process `syz.4.30959'. [ 1244.126083][ T4821] netlink: 'syz.5.30963': attribute type 6 has an invalid length. [ 1244.279372][ T4831] netlink: 108 bytes leftover after parsing attributes in process `syz.4.30968'. [ 1244.372295][ T4837] rust_binder: 690: no such ref 1 [ 1244.531421][ T4841] netlink: 140 bytes leftover after parsing attributes in process `syz.4.30973'. [ 1244.684087][ T54] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 1244.784221][ T4849] netlink: 'syz.0.30975': attribute type 6 has an invalid length. [ 1244.945533][ T4862] /dev/loop0: Can't lookup blockdev [ 1244.963591][ T4862] rust_binder: 324: no such ref 0 [ 1244.975217][ T4862] rust_binder: Transaction failed: BR_FAILED_REPLY { source: ENOENT } my_pid:324 [ 1245.254932][ T4874] netlink: 'syz.6.30990': attribute type 6 has an invalid length. [ 1245.374903][ T4876] netlink: 'syz.0.30991': attribute type 4 has an invalid length. [ 1245.403969][ T4876] netlink: 17 bytes leftover after parsing attributes in process `syz.0.30991'. [ 1245.435763][ T4882] netlink: 'syz.0.30991': attribute type 1 has an invalid length. [ 1245.444000][ T4882] netlink: 'syz.0.30991': attribute type 2 has an invalid length. [ 1246.464989][ T4930] netlink: 108 bytes leftover after parsing attributes in process `syz.6.31015'. [ 1246.853748][ T4947] rust_binder: 711: no such ref 1 [ 1246.967127][ T4951] netlink: 108 bytes leftover after parsing attributes in process `syz.4.31027'. [ 1247.450253][ T4973] netlink: 140 bytes leftover after parsing attributes in process `syz.5.31037'. [ 1247.699725][ T4983] rust_binder: Failure when writing BR_NOOP at beginning of buffer. [ 1247.699747][ T4983] rust_binder: Read failure Err(EFAULT) in pid:287 [ 1248.020402][ T36] kauditd_printk_skb: 424 callbacks suppressed [ 1248.020420][ T36] audit: type=1400 audit(2000000900.470:65244): avc: denied { execute } for pid=4995 comm="syz.5.31049" path="/143/cpuacct.usage_percpu" dev="tmpfs" ino=888 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1248.103953][ T36] audit: type=1400 audit(2000000900.480:65245): avc: denied { execute } for pid=4996 comm="syz.0.31050" path="/396/cpuacct.usage_percpu" dev="tmpfs" ino=2431 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1248.158637][ T36] audit: type=1400 audit(2000000900.540:65246): avc: denied { read write } for pid=3684 comm="syz-executor" name="loop5" dev="devtmpfs" ino=54 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1248.218425][ T36] audit: type=1400 audit(2000000900.540:65247): avc: denied { read write open } for pid=3684 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=54 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1248.251761][ T36] audit: type=1400 audit(2000000900.560:65248): avc: denied { execute } for pid=4999 comm="syz.0.31051" path="/397/cpuacct.usage_percpu" dev="tmpfs" ino=2437 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1248.320197][ T36] audit: type=1400 audit(2000000900.570:65249): avc: denied { mounton } for pid=4999 comm="syz.0.31051" path="/397/file0" dev="tmpfs" ino=2438 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1248.384313][ T36] audit: type=1400 audit(2000000900.570:65250): avc: denied { mount } for pid=4999 comm="syz.0.31051" name="/" dev="incremental-fs" ino=2438 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 1248.458333][ T36] audit: type=1400 audit(2000000900.570:65251): avc: denied { ioctl } for pid=3684 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=54 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1248.508740][ T36] audit: type=1400 audit(2000000900.580:65252): avc: denied { remount } for pid=4999 comm="syz.0.31051" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 1248.535876][ T36] audit: type=1400 audit(2000000900.600:65253): avc: denied { unmount } for pid=1759 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 1248.850614][ T5037] netlink: 'syz.0.31070': attribute type 6 has an invalid length. [ 1249.178788][ T5058] FAULT_INJECTION: forcing a failure. [ 1249.178788][ T5058] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1249.220509][ T5058] CPU: 0 UID: 0 PID: 5058 Comm: syz.5.31078 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 1249.220539][ T5058] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1249.220551][ T5058] Call Trace: [ 1249.220558][ T5058] [ 1249.220566][ T5058] __dump_stack+0x21/0x30 [ 1249.220602][ T5058] dump_stack_lvl+0x10c/0x190 [ 1249.220632][ T5058] ? __cfi_dump_stack_lvl+0x10/0x10 [ 1249.220656][ T5058] ? check_stack_object+0x12c/0x140 [ 1249.220674][ T5058] dump_stack+0x19/0x20 [ 1249.220696][ T5058] should_fail_ex+0x3d9/0x530 [ 1249.220715][ T5058] should_fail+0xf/0x20 [ 1249.220733][ T5058] should_fail_usercopy+0x1e/0x30 [ 1249.220752][ T5058] _copy_to_user+0x24/0xa0 [ 1249.220775][ T5058] simple_read_from_buffer+0xed/0x160 [ 1249.220798][ T5058] proc_fail_nth_read+0x19e/0x210 [ 1249.220821][ T5058] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 1249.220844][ T5058] ? bpf_lsm_file_permission+0xd/0x20 [ 1249.220869][ T5058] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 1249.220891][ T5058] vfs_read+0x27d/0xc70 [ 1249.220908][ T5058] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 1249.220925][ T5058] ? __cfi_vfs_read+0x10/0x10 [ 1249.220941][ T5058] ? __kasan_check_write+0x18/0x20 [ 1249.220965][ T5058] ? mutex_lock+0x92/0x1c0 [ 1249.220983][ T5058] ? __cfi_mutex_lock+0x10/0x10 [ 1249.221000][ T5058] ? __fget_files+0x2c5/0x340 [ 1249.221020][ T5058] ksys_read+0x141/0x250 [ 1249.221037][ T5058] ? __cfi_ksys_read+0x10/0x10 [ 1249.221054][ T5058] ? __kasan_check_read+0x15/0x20 [ 1249.221080][ T5058] __x64_sys_read+0x7f/0x90 [ 1249.221097][ T5058] x64_sys_call+0x2638/0x2ee0 [ 1249.221122][ T5058] do_syscall_64+0x58/0xf0 [ 1249.221144][ T5058] ? clear_bhb_loop+0x50/0xa0 [ 1249.221164][ T5058] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 1249.221183][ T5058] RIP: 0033:0x7f68c6b8e0dc [ 1249.221199][ T5058] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 1249.221215][ T5058] RSP: 002b:00007f68c79a6030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1249.221234][ T5058] RAX: ffffffffffffffda RBX: 00007f68c6de5fa0 RCX: 00007f68c6b8e0dc [ 1249.221249][ T5058] RDX: 000000000000000f RSI: 00007f68c79a60a0 RDI: 0000000000000008 [ 1249.221261][ T5058] RBP: 00007f68c79a6090 R08: 0000000000000000 R09: 0000000000000000 [ 1249.221272][ T5058] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1249.221283][ T5058] R13: 00007f68c6de6038 R14: 00007f68c6de5fa0 R15: 00007fffb5b9fc48 [ 1249.221301][ T5058] [ 1249.257799][ T5068] netlink: 'syz.4.31084': attribute type 6 has an invalid length. [ 1249.778870][ T5097] netlink: 'syz.5.31098': attribute type 6 has an invalid length. [ 1249.816566][ T5100] netlink: 108 bytes leftover after parsing attributes in process `syz.0.31099'. [ 1249.825769][ T340] usb 5-1: new full-speed USB device number 68 using dummy_hcd [ 1249.992138][ T340] usb 5-1: too many endpoints for config 1 interface 0 altsetting 0: 255, using maximum allowed: 30 [ 1250.013215][ T340] usb 5-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 10 [ 1250.026757][ T340] usb 5-1: config 1 interface 0 altsetting 0 endpoint 0x82 has invalid maxpacket 1024, setting to 64 [ 1250.039184][ T340] usb 5-1: config 1 interface 0 altsetting 0 has 3 endpoint descriptors, different from the interface descriptor's value: 255 [ 1250.054427][ T340] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1250.073605][ T340] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=1 [ 1250.088486][ T340] usb 5-1: SerialNumber: syz [ 1250.111960][ T5081] raw-gadget.0 gadget.4: fail, usb_ep_enable returned -22 [ 1250.117087][ T5119] netlink: 'syz.0.31108': attribute type 6 has an invalid length. [ 1250.127133][T29125] usb 6-1: new high-speed USB device number 42 using dummy_hcd [ 1250.296198][T29125] usb 6-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 18 [ 1250.327792][ T340] cdc_acm 5-1:1.0: ttyACM0: USB ACM device [ 1250.340196][T29125] usb 6-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1250.345190][ T340] usb 5-1: USB disconnect, device number 68 [ 1250.364594][T29125] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=1 [ 1250.372598][T29125] usb 6-1: SerialNumber: syz [ 1250.508313][ T5140] netlink: 108 bytes leftover after parsing attributes in process `syz.0.31118'. [ 1250.570417][ T5144] netlink: 140 bytes leftover after parsing attributes in process `syz.0.31120'. [ 1250.810432][ T5103] rust_binder: Error while translating object. [ 1250.810509][ T5103] rust_binder: Failure in copy_transaction_data: BR_FAILED_REPLY { source: ENOENT } [ 1250.816926][ T5103] rust_binder: Transaction failed: BR_FAILED_REPLY { source: ENOENT } my_pid:323 [ 1250.829684][T29125] cdc_ether 6-1:1.0: probe with driver cdc_ether failed with error -71 [ 1250.859312][T29125] usb 6-1: USB disconnect, device number 42 [ 1250.979857][ T5148] incfs: Backing dir is not set, filesystem can't be mounted. [ 1250.987401][ T5148] incfs: mount failed -2 [ 1251.089067][ T5158] netlink: 108 bytes leftover after parsing attributes in process `syz.0.31127'. [ 1251.208413][ T5165] veth1_macvtap: left promiscuous mode [ 1251.214001][ T5165] macsec0: entered promiscuous mode [ 1251.219386][ T5165] macsec0: entered allmulticast mode [ 1251.228992][ T5165] veth1_macvtap: entered promiscuous mode [ 1251.234825][ T5165] veth1_macvtap: entered allmulticast mode [ 1251.240755][ T5165] macsec0: left promiscuous mode [ 1251.250675][ T5165] macsec0: left allmulticast mode [ 1251.255785][ T5165] veth1_macvtap: left allmulticast mode [ 1251.472301][ T5184] sit0: entered promiscuous mode [ 1251.478220][ T5184] netlink: 'syz.0.31139': attribute type 1 has an invalid length. [ 1251.486064][ T5184] netlink: 1 bytes leftover after parsing attributes in process `syz.0.31139'. [ 1251.562010][ T5191] rust_binder: 914: no such ref 1 [ 1251.799019][ T5209] veth1_macvtap: left promiscuous mode [ 1251.804563][ T5209] macsec0: entered promiscuous mode [ 1251.809927][ T5209] macsec0: entered allmulticast mode [ 1251.817113][ T5209] veth1_macvtap: entered promiscuous mode [ 1251.822847][ T5209] veth1_macvtap: entered allmulticast mode [ 1251.828816][ T5209] macsec0: left promiscuous mode [ 1251.833800][ T5209] macsec0: left allmulticast mode [ 1251.838870][ T5209] veth1_macvtap: left allmulticast mode [ 1251.865545][ T5211] veth1_macvtap: left promiscuous mode [ 1251.871097][ T5211] macsec0: entered promiscuous mode [ 1251.876514][ T5211] macsec0: entered allmulticast mode [ 1251.912000][ T5213] veth1_macvtap: entered promiscuous mode [ 1251.913986][ T340] usb 1-1: new high-speed USB device number 101 using dummy_hcd [ 1251.917809][ T5213] veth1_macvtap: entered allmulticast mode [ 1251.931814][ T5213] macsec0: left promiscuous mode [ 1251.936929][ T5213] macsec0: left allmulticast mode [ 1251.941979][ T5213] veth1_macvtap: left allmulticast mode [ 1252.076174][ T340] usb 1-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 18 [ 1252.091542][ T340] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1252.101749][ T340] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=1 [ 1252.110416][ T340] usb 1-1: SerialNumber: syz [ 1252.286462][ T5234] veth1_macvtap: left promiscuous mode [ 1252.292087][ T5234] macsec0: entered promiscuous mode [ 1252.299606][ T5234] macsec0: entered allmulticast mode [ 1252.320210][ T5234] veth1_macvtap: entered promiscuous mode [ 1252.333890][ T5234] veth1_macvtap: entered allmulticast mode [ 1252.340776][ T5234] macsec0: left promiscuous mode [ 1252.346879][ T5234] macsec0: left allmulticast mode [ 1252.365741][ T5234] veth1_macvtap: left allmulticast mode [ 1252.378396][ T5238] netlink: 140 bytes leftover after parsing attributes in process `syz.5.31165'. [ 1252.550724][ T5201] rust_binder: Error while translating object. [ 1252.550777][ T5201] rust_binder: Failure in copy_transaction_data: BR_FAILED_REPLY { source: ENOENT } [ 1252.557473][ T5201] rust_binder: Transaction failed: BR_FAILED_REPLY { source: ENOENT } my_pid:924 [ 1252.594638][ T340] cdc_ether 1-1:1.0: probe with driver cdc_ether failed with error -71 [ 1252.634892][ T340] usb 1-1: USB disconnect, device number 101 [ 1253.035512][ T36] kauditd_printk_skb: 577 callbacks suppressed [ 1253.035529][ T36] audit: type=1400 audit(2000000905.490:65831): avc: denied { read write } for pid=3684 comm="syz-executor" name="loop5" dev="devtmpfs" ino=54 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1253.079533][ T36] audit: type=1400 audit(2000000905.490:65832): avc: denied { read write } for pid=2259 comm="syz-executor" name="loop4" dev="devtmpfs" ino=53 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1253.124116][ T36] audit: type=1400 audit(2000000905.490:65833): avc: denied { read write open } for pid=2259 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=53 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1253.159061][ T36] audit: type=1400 audit(2000000905.500:65834): avc: denied { ioctl } for pid=2259 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=53 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1253.191085][ T36] audit: type=1400 audit(2000000905.510:65835): avc: denied { execute } for pid=5243 comm="syz.4.31169" path="/373/cpuacct.usage_percpu" dev="tmpfs" ino=2297 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1253.255709][ T36] audit: type=1400 audit(2000000905.520:65836): avc: denied { read write open } for pid=3684 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=54 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1253.281471][ T36] audit: type=1400 audit(2000000905.520:65837): avc: denied { ioctl } for pid=3684 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=54 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1253.309270][ T36] audit: type=1400 audit(2000000905.530:65838): avc: denied { read write } for pid=2259 comm="syz-executor" name="loop4" dev="devtmpfs" ino=53 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1253.374609][ T36] audit: type=1400 audit(2000000905.530:65839): avc: denied { read write open } for pid=2259 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=53 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1253.401663][ T36] audit: type=1400 audit(2000000905.540:65840): avc: denied { ioctl } for pid=2259 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=53 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1253.462219][ T5258] netlink: 'syz.0.31175': attribute type 6 has an invalid length. [ 1253.735697][ T5274] veth1_macvtap: left promiscuous mode [ 1253.741186][ T5274] macsec0: entered promiscuous mode [ 1253.747440][ T5274] macsec0: entered allmulticast mode [ 1253.754567][ T5276] veth1_macvtap: left promiscuous mode [ 1253.762804][ T5276] macsec0: entered promiscuous mode [ 1253.775208][ T5276] macsec0: entered allmulticast mode [ 1253.782203][ T5274] veth1_macvtap: entered promiscuous mode [ 1253.790641][ T5274] veth1_macvtap: entered allmulticast mode [ 1253.798397][ T5274] macsec0: left promiscuous mode [ 1253.803426][ T5274] macsec0: left allmulticast mode [ 1253.810118][ T5274] veth1_macvtap: left allmulticast mode [ 1253.816704][ T5276] veth1_macvtap: entered promiscuous mode [ 1253.822543][ T5276] veth1_macvtap: entered allmulticast mode [ 1253.832274][ T5276] macsec0: left promiscuous mode [ 1253.843417][ T5276] macsec0: left allmulticast mode [ 1253.859252][ T5276] veth1_macvtap: left allmulticast mode [ 1253.946184][ T5283] netlink: 'syz.5.31186': attribute type 6 has an invalid length. [ 1254.167544][ T5296] veth1_macvtap: left promiscuous mode [ 1254.173040][ T5296] macsec0: entered promiscuous mode [ 1254.178345][ T5296] macsec0: entered allmulticast mode [ 1254.187403][ T5296] veth1_macvtap: entered promiscuous mode [ 1254.197832][ T5296] veth1_macvtap: entered allmulticast mode [ 1254.204142][ T5296] macsec0: left promiscuous mode [ 1254.209902][ T5296] macsec0: left allmulticast mode [ 1254.215017][ T5296] veth1_macvtap: left allmulticast mode [ 1254.241518][ T5298] veth1_macvtap: left promiscuous mode [ 1254.264618][ T5298] macsec0: entered promiscuous mode [ 1254.273930][ T5298] macsec0: entered allmulticast mode [ 1254.289002][ T5298] veth1_macvtap: entered promiscuous mode [ 1254.301994][ T5298] veth1_macvtap: entered allmulticast mode [ 1254.311859][ T5298] macsec0: left promiscuous mode [ 1254.324018][ T5298] macsec0: left allmulticast mode [ 1254.333931][ T5298] veth1_macvtap: left allmulticast mode [ 1254.423952][ T5307] veth1_macvtap: left promiscuous mode [ 1254.444261][ T5307] macsec0: entered promiscuous mode [ 1254.449482][ T5307] macsec0: entered allmulticast mode [ 1254.473948][ T5309] veth1_macvtap: left promiscuous mode [ 1254.483986][ T5309] macsec0: entered promiscuous mode [ 1254.489198][ T5309] macsec0: entered allmulticast mode [ 1254.510168][ T5310] veth1_macvtap: entered promiscuous mode [ 1254.522907][ T5310] veth1_macvtap: entered allmulticast mode [ 1254.530960][ T5310] macsec0: left promiscuous mode [ 1254.540454][ T5310] macsec0: left allmulticast mode [ 1254.546631][ T5310] veth1_macvtap: left allmulticast mode [ 1254.552781][ T5312] veth1_macvtap: entered promiscuous mode [ 1254.558616][ T5312] veth1_macvtap: entered allmulticast mode [ 1254.580297][ T5312] macsec0: left promiscuous mode [ 1254.599055][ T5312] macsec0: left allmulticast mode [ 1254.607934][ T5312] veth1_macvtap: left allmulticast mode [ 1254.627345][ T5316] veth1_macvtap: left promiscuous mode [ 1254.632821][ T5316] macsec0: entered promiscuous mode [ 1254.641159][ T5316] macsec0: entered allmulticast mode [ 1254.650024][ T5316] veth1_macvtap: entered promiscuous mode [ 1254.655869][ T5316] veth1_macvtap: entered allmulticast mode [ 1254.661770][ T5316] macsec0: left promiscuous mode [ 1254.666848][ T5316] macsec0: left allmulticast mode [ 1254.671874][ T5316] veth1_macvtap: left allmulticast mode [ 1254.980286][ T5333] veth1_macvtap: left promiscuous mode [ 1254.985916][ T5333] macsec0: entered promiscuous mode [ 1254.991233][ T5333] macsec0: entered allmulticast mode [ 1255.023610][ T5333] veth1_macvtap: entered promiscuous mode [ 1255.041888][ T5333] veth1_macvtap: entered allmulticast mode [ 1255.062168][ T5333] macsec0: left promiscuous mode [ 1255.067601][ T5333] macsec0: left allmulticast mode [ 1255.078355][ T5333] veth1_macvtap: left allmulticast mode [ 1255.413968][ T5359] veth1_macvtap: left promiscuous mode [ 1255.423949][ T5359] macsec0: entered promiscuous mode [ 1255.429157][ T5359] macsec0: entered allmulticast mode [ 1255.936480][ T5380] veth1_macvtap: left promiscuous mode [ 1255.941994][ T5380] macsec0: entered promiscuous mode [ 1255.969820][ T5380] macsec0: entered allmulticast mode [ 1255.985777][ T5380] veth1_macvtap: entered promiscuous mode [ 1255.991536][ T5380] veth1_macvtap: entered allmulticast mode [ 1256.014278][ T5380] macsec0: left promiscuous mode [ 1256.019314][ T5380] macsec0: left allmulticast mode [ 1256.046021][ T5380] veth1_macvtap: left allmulticast mode [ 1257.000011][ T5409] netlink: 108 bytes leftover after parsing attributes in process `syz.4.31246'. [ 1257.572609][ T5430] netlink: 108 bytes leftover after parsing attributes in process `syz.4.31257'. [ 1258.063846][ T36] kauditd_printk_skb: 561 callbacks suppressed [ 1258.063863][ T36] audit: type=1400 audit(2000000910.510:66403): avc: denied { read write } for pid=3617 comm="syz-executor" name="loop6" dev="devtmpfs" ino=55 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1258.154521][ T36] audit: type=1400 audit(2000000910.510:66402): avc: denied { execute } for pid=5456 comm="syz.4.31269" path="/400/cpuacct.usage_percpu" dev="tmpfs" ino=2465 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1258.212813][ T36] audit: type=1400 audit(2000000910.530:66404): avc: denied { read write open } for pid=3617 comm="syz-executor" path="/dev/loop6" dev="devtmpfs" ino=55 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1258.263947][ T36] audit: type=1400 audit(2000000910.530:66405): avc: denied { ioctl } for pid=3617 comm="syz-executor" path="/dev/loop6" dev="devtmpfs" ino=55 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1258.339473][ T36] audit: type=1400 audit(2000000910.570:66406): avc: denied { execute } for pid=5458 comm="syz.6.31270" path="/211/cpuacct.usage_percpu" dev="tmpfs" ino=1317 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1258.393939][ T36] audit: type=1400 audit(2000000910.590:66407): avc: denied { read write } for pid=2259 comm="syz-executor" name="loop4" dev="devtmpfs" ino=53 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1258.418261][ T5465] veth1_macvtap: left promiscuous mode [ 1258.423740][ T5465] macsec0: entered promiscuous mode [ 1258.440378][ T36] audit: type=1400 audit(2000000910.590:66408): avc: denied { read write open } for pid=2259 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=53 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1258.443938][ T5465] macsec0: entered allmulticast mode [ 1258.510420][ T36] audit: type=1400 audit(2000000910.590:66409): avc: denied { ioctl } for pid=2259 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=53 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1258.594184][ T36] audit: type=1400 audit(2000000910.590:66410): avc: denied { read write } for pid=3617 comm="syz-executor" name="loop6" dev="devtmpfs" ino=55 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1258.663942][ T36] audit: type=1400 audit(2000000910.590:66411): avc: denied { read write open } for pid=3617 comm="syz-executor" path="/dev/loop6" dev="devtmpfs" ino=55 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1258.933961][ T5475] veth1_macvtap: left promiscuous mode [ 1258.939475][ T5475] macsec0: entered promiscuous mode [ 1258.963946][ T5475] macsec0: entered allmulticast mode [ 1259.206301][ T5479] veth1_macvtap: entered promiscuous mode [ 1259.212080][ T5479] veth1_macvtap: entered allmulticast mode [ 1259.234041][ T5479] macsec0: left promiscuous mode [ 1259.244020][ T5479] macsec0: left allmulticast mode [ 1259.249072][ T5479] veth1_macvtap: left allmulticast mode [ 1259.788157][ T5495] netlink: 140 bytes leftover after parsing attributes in process `syz.0.31289'. [ 1260.932639][ T5521] veth1_macvtap: entered promiscuous mode [ 1260.938891][ T5521] veth1_macvtap: entered allmulticast mode [ 1260.945817][ T5521] macsec0: left promiscuous mode [ 1260.950892][ T5521] macsec0: left allmulticast mode [ 1260.956986][ T5521] veth1_macvtap: left allmulticast mode [ 1261.864152][T29125] usb 6-1: new high-speed USB device number 43 using dummy_hcd [ 1262.016448][T29125] usb 6-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 18 [ 1262.054034][T29125] usb 6-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1262.063111][T29125] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=1 [ 1262.083932][T29125] usb 6-1: SerialNumber: syz [ 1262.087282][ T5571] netlink: 92 bytes leftover after parsing attributes in process `syz.0.31325'. [ 1262.472876][ T5599] veth1_macvtap: left promiscuous mode [ 1262.478402][ T5599] macsec0: entered promiscuous mode [ 1262.483702][ T5599] macsec0: entered allmulticast mode [ 1262.517958][T29125] cdc_ether 6-1:1.0: probe with driver cdc_ether failed with error -71 [ 1262.537923][T29125] usb 6-1: USB disconnect, device number 43 [ 1263.082125][ T36] kauditd_printk_skb: 330 callbacks suppressed [ 1263.082142][ T36] audit: type=1400 audit(2000000915.530:66742): avc: denied { execute } for pid=5612 comm="syz.5.31347" path="/200/cpuacct.usage_percpu" dev="tmpfs" ino=1234 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1263.173934][ T36] audit: type=1400 audit(2000000915.570:66743): avc: denied { read } for pid=5612 comm="syz.5.31347" dev="nsfs" ino=4026532805 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1263.238754][ T36] audit: type=1400 audit(2000000915.570:66744): avc: denied { read open } for pid=5612 comm="syz.5.31347" path="net:[4026532805]" dev="nsfs" ino=4026532805 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1263.315141][ T36] audit: type=1400 audit(2000000915.570:66745): avc: denied { create } for pid=5612 comm="syz.5.31347" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 1263.361949][ T36] audit: type=1400 audit(2000000915.570:66746): avc: denied { write } for pid=5612 comm="syz.5.31347" path="socket:[388486]" dev="sockfs" ino=388486 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 1263.435745][ T36] audit: type=1400 audit(2000000915.580:66747): avc: denied { write } for pid=5612 comm="syz.5.31347" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 1263.463866][ T5625] netlink: 140 bytes leftover after parsing attributes in process `syz.4.31352'. [ 1263.513946][ T36] audit: type=1400 audit(2000000915.580:66748): avc: denied { execute } for pid=5610 comm="syz.6.31346" path="/219/cpuacct.usage_percpu" dev="tmpfs" ino=1365 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1263.560668][ T5629] netlink: 92 bytes leftover after parsing attributes in process `syz.5.31354'. [ 1263.588278][ T36] audit: type=1400 audit(2000000915.600:66749): avc: denied { read write } for pid=3684 comm="syz-executor" name="loop5" dev="devtmpfs" ino=54 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1263.662114][ T36] audit: type=1400 audit(2000000915.600:66750): avc: denied { read write open } for pid=3684 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=54 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1263.730916][ T36] audit: type=1400 audit(2000000915.600:66751): avc: denied { ioctl } for pid=3684 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=54 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1263.833952][ T5643] SELinux: policydb magic number 0x2 does not match expected magic number 0xf97cff8c [ 1263.852427][ T5643] SELinux: failed to load policy [ 1263.894626][ T5650] netlink: 140 bytes leftover after parsing attributes in process `syz.5.31363'. [ 1264.123936][ T4992] usb 5-1: new high-speed USB device number 69 using dummy_hcd [ 1264.223942][T29125] usb 6-1: new high-speed USB device number 44 using dummy_hcd [ 1264.230650][ T5674] netlink: 140 bytes leftover after parsing attributes in process `syz.0.31374'. [ 1264.286431][ T4992] usb 5-1: config 0 has an invalid interface number: 1 but max is 0 [ 1264.309059][ T4992] usb 5-1: config 0 has no interface number 0 [ 1264.317923][ T4992] usb 5-1: config 0 interface 1 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1264.330018][ T4992] usb 5-1: config 0 interface 1 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1264.341043][ T4992] usb 5-1: New USB device found, idVendor=256c, idProduct=006d, bcdDevice= 0.00 [ 1264.351158][ T4992] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1264.363541][ T4992] usb 5-1: config 0 descriptor?? [ 1264.376629][T29125] usb 6-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 18 [ 1264.404128][T29125] usb 6-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1264.423728][T29125] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=1 [ 1264.444547][T29125] usb 6-1: SerialNumber: syz [ 1264.476404][ T5682] netlink: 92 bytes leftover after parsing attributes in process `syz.0.31379'. [ 1264.776471][ T4992] uclogic 0003:256C:006D.0024: unknown main item tag 0x0 [ 1264.794378][ T4992] uclogic 0003:256C:006D.0024: unknown main item tag 0x0 [ 1264.819923][ T4992] uclogic 0003:256C:006D.0024: unknown main item tag 0x0 [ 1264.827212][ T4992] uclogic 0003:256C:006D.0024: unknown main item tag 0x0 [ 1264.834540][ T4992] uclogic 0003:256C:006D.0024: unknown main item tag 0x0 [ 1264.841946][ T4992] uclogic 0003:256C:006D.0024: No inputs registered, leaving [ 1264.843115][ T5705] netlink: 92 bytes leftover after parsing attributes in process `syz.0.31389'. [ 1264.863032][ T5656] rust_binder: Error while translating object. [ 1264.863098][ T5656] rust_binder: Failure in copy_transaction_data: BR_FAILED_REPLY { source: ENOENT } [ 1264.874230][ T5656] rust_binder: Transaction failed: BR_FAILED_REPLY { source: ENOENT } my_pid:429 [ 1264.885195][ T4992] uclogic 0003:256C:006D.0024: hidraw0: USB HID v0.00 Device [HID 256c:006d] on usb-dummy_hcd.4-1/input1 [ 1264.927052][T29125] cdc_ether 6-1:1.0: probe with driver cdc_ether failed with error -71 [ 1264.937217][T29125] usb 6-1: USB disconnect, device number 44 [ 1265.005809][ T9] usb 5-1: USB disconnect, device number 69 [ 1265.272174][ T5723] rust_binder: Error while translating object. [ 1265.272221][ T5723] rust_binder: Failure in copy_transaction_data: BR_FAILED_REPLY { source: EFAULT } [ 1265.279191][ T5723] rust_binder: Transaction failed: BR_FAILED_REPLY { source: EFAULT } my_pid:484 [ 1265.373293][ T5727] netlink: 92 bytes leftover after parsing attributes in process `syz.0.31399'. [ 1265.683302][ T5742] FAULT_INJECTION: forcing a failure. [ 1265.683302][ T5742] name failslab, interval 1, probability 0, space 0, times 0 [ 1265.707705][ T5742] CPU: 1 UID: 0 PID: 5742 Comm: syz.6.31406 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 1265.707738][ T5742] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1265.707750][ T5742] Call Trace: [ 1265.707756][ T5742] [ 1265.707762][ T5742] __dump_stack+0x21/0x30 [ 1265.707790][ T5742] dump_stack_lvl+0x10c/0x190 [ 1265.707813][ T5742] ? __cfi_dump_stack_lvl+0x10/0x10 [ 1265.707837][ T5742] dump_stack+0x19/0x20 [ 1265.707859][ T5742] should_fail_ex+0x3d9/0x530 [ 1265.707877][ T5742] should_failslab+0xac/0x100 [ 1265.707895][ T5742] __kmalloc_cache_noprof+0x41/0x490 [ 1265.707911][ T5742] ? __kasan_check_write+0x18/0x20 [ 1265.707935][ T5742] ? ovl_iterate+0xf22/0x1f00 [ 1265.707958][ T5742] ? override_creds+0x83/0x120 [ 1265.707979][ T5742] ovl_iterate+0xf22/0x1f00 [ 1265.708015][ T5742] ? _parse_integer+0x2e/0x40 [ 1265.708041][ T5742] ? __cfi_ovl_iterate+0x10/0x10 [ 1265.708065][ T5742] ? kstrtouint+0x78/0xf0 [ 1265.708082][ T5742] ? kstrtouint_from_user+0xfb/0x150 [ 1265.708099][ T5742] ? __x64_sys_openat+0x13a/0x170 [ 1265.708122][ T5742] ? x64_sys_call+0xe69/0x2ee0 [ 1265.708147][ T5742] ? __cfi_kstrtouint_from_user+0x10/0x10 [ 1265.708165][ T5742] ? selinux_file_permission+0x309/0xb30 [ 1265.708188][ T5742] ? __kasan_check_write+0x18/0x20 [ 1265.708212][ T5742] ? rwsem_read_trylock+0x2b1/0x660 [ 1265.708237][ T5742] ? __kasan_check_write+0x18/0x20 [ 1265.708261][ T5742] ? down_write+0xe9/0x2a0 [ 1265.708280][ T5742] ? __cfi_down_write+0x10/0x10 [ 1265.708298][ T5742] ? vfs_write+0x93e/0xf30 [ 1265.708314][ T5742] ? __kasan_check_write+0x18/0x20 [ 1265.708339][ T5742] wrap_directory_iterator+0xa7/0xf0 [ 1265.708359][ T5742] ? __cfi_ovl_iterate+0x10/0x10 [ 1265.708382][ T5742] shared_ovl_iterate+0x28/0x40 [ 1265.708405][ T5742] iterate_dir+0x203/0x5e0 [ 1265.708424][ T5742] __se_sys_getdents64+0xe9/0x240 [ 1265.708444][ T5742] ? fput+0x1a5/0x240 [ 1265.708464][ T5742] ? __x64_sys_getdents64+0xa0/0xa0 [ 1265.708484][ T5742] ? ksys_write+0x1ef/0x250 [ 1265.708500][ T5742] ? __cfi_filldir64+0x10/0x10 [ 1265.708520][ T5742] ? __cfi_ksys_write+0x10/0x10 [ 1265.708537][ T5742] ? __kasan_check_read+0x15/0x20 [ 1265.708562][ T5742] __x64_sys_getdents64+0x7f/0xa0 [ 1265.708582][ T5742] x64_sys_call+0x27d0/0x2ee0 [ 1265.708606][ T5742] do_syscall_64+0x58/0xf0 [ 1265.708628][ T5742] ? clear_bhb_loop+0x50/0xa0 [ 1265.708648][ T5742] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 1265.708666][ T5742] RIP: 0033:0x7fd58938f6c9 [ 1265.708682][ T5742] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1265.708698][ T5742] RSP: 002b:00007fd587df7038 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1265.708718][ T5742] RAX: ffffffffffffffda RBX: 00007fd5895e5fa0 RCX: 00007fd58938f6c9 [ 1265.708733][ T5742] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 1265.708744][ T5742] RBP: 00007fd587df7090 R08: 0000000000000000 R09: 0000000000000000 [ 1265.708756][ T5742] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1265.708768][ T5742] R13: 00007fd5895e6038 R14: 00007fd5895e5fa0 R15: 00007fff05d2fd68 [ 1265.708784][ T5742] [ 1266.163955][ T714] usb 6-1: new high-speed USB device number 45 using dummy_hcd [ 1266.316041][ T714] usb 6-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 18 [ 1266.330654][ T714] usb 6-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1266.343953][ T714] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=1 [ 1266.362342][ T714] usb 6-1: SerialNumber: syz [ 1266.384888][ T5768] veth1_macvtap: entered promiscuous mode [ 1266.390849][ T5768] veth1_macvtap: entered allmulticast mode [ 1266.396810][ T5768] macsec0: left promiscuous mode [ 1266.401824][ T5768] macsec0: left allmulticast mode [ 1266.406896][ T5768] veth1_macvtap: left allmulticast mode [ 1266.494134][ T5774] netlink: 92 bytes leftover after parsing attributes in process `syz.0.31420'. [ 1266.505363][ T5773] netlink: 92 bytes leftover after parsing attributes in process `syz.4.31421'. [ 1266.595178][ T5781] veth1_macvtap: left promiscuous mode [ 1266.610436][ T5781] macsec0: entered promiscuous mode [ 1266.615819][ T5781] macsec0: entered allmulticast mode [ 1266.708492][ T5790] veth1_macvtap: left promiscuous mode [ 1266.714016][ T5790] macsec0: entered promiscuous mode [ 1266.719264][ T5790] macsec0: entered allmulticast mode [ 1266.727744][ T5790] veth1_macvtap: entered promiscuous mode [ 1266.733536][ T5790] veth1_macvtap: entered allmulticast mode [ 1266.740226][ T5790] macsec0: left promiscuous mode [ 1266.747136][ T5790] macsec0: left allmulticast mode [ 1266.752171][ T5790] veth1_macvtap: left allmulticast mode [ 1266.791944][ T5747] rust_binder: Error while translating object. [ 1266.792011][ T5747] rust_binder: Failure in copy_transaction_data: BR_FAILED_REPLY { source: ENOENT } [ 1266.804004][ T5747] rust_binder: Transaction failed: BR_FAILED_REPLY { source: ENOENT } my_pid:435 [ 1266.829795][ T714] cdc_ether 6-1:1.0: probe with driver cdc_ether failed with error -71 [ 1266.871124][ T714] usb 6-1: USB disconnect, device number 45 [ 1267.050869][ T5805] veth1_macvtap: left promiscuous mode [ 1267.057075][ T5805] macsec0: entered promiscuous mode [ 1267.062433][ T5805] macsec0: entered allmulticast mode [ 1267.655891][ T5829] __nla_validate_parse: 1 callbacks suppressed [ 1267.655911][ T5829] netlink: 92 bytes leftover after parsing attributes in process `syz.6.31447'. [ 1268.126112][ T36] kauditd_printk_skb: 560 callbacks suppressed [ 1268.126130][ T36] audit: type=1400 audit(2000000920.580:67306): avc: denied { execute } for pid=5846 comm="syz.0.31457" path="/571/cpuacct.usage_percpu" dev="tmpfs" ino=3497 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1268.165024][ T5847] netlink: 92 bytes leftover after parsing attributes in process `syz.0.31457'. [ 1268.190869][ T36] audit: type=1400 audit(2000000920.610:67307): avc: denied { create } for pid=5846 comm="syz.0.31457" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1268.251671][ T36] audit: type=1400 audit(2000000920.620:67308): avc: denied { write } for pid=5846 comm="syz.0.31457" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1268.292224][ T36] audit: type=1400 audit(2000000920.620:67309): avc: denied { nlmsg_write } for pid=5846 comm="syz.0.31457" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1268.330368][ T36] audit: type=1400 audit(2000000920.620:67310): avc: denied { read write } for pid=2259 comm="syz-executor" name="loop4" dev="devtmpfs" ino=53 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1268.389645][ T36] audit: type=1400 audit(2000000920.620:67311): avc: denied { read write open } for pid=2259 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=53 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1268.443930][ T36] audit: type=1400 audit(2000000920.630:67312): avc: denied { ioctl } for pid=2259 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=53 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1268.474868][ T5858] netlink: 92 bytes leftover after parsing attributes in process `syz.4.31461'. [ 1268.503940][ T36] audit: type=1400 audit(2000000920.650:67313): avc: denied { execute } for pid=5848 comm="syz.4.31455" path="/434/cpuacct.usage_percpu" dev="tmpfs" ino=2681 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1268.548500][ T36] audit: type=1400 audit(2000000920.670:67314): avc: denied { read write } for pid=2259 comm="syz-executor" name="loop4" dev="devtmpfs" ino=53 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1268.609335][ T36] audit: type=1400 audit(2000000920.670:67315): avc: denied { read write open } for pid=2259 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=53 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1269.174831][ T5901] tmpfs: Unknown parameter 'nr_ino' [ 1269.358049][ T5912] veth1_macvtap: left promiscuous mode [ 1269.363545][ T5912] macsec0: entered promiscuous mode [ 1269.393489][ T5912] macsec0: entered allmulticast mode [ 1269.667812][ T5926] tmpfs: Unknown parameter 'nr_ino' [ 1269.754013][ T9] usb 6-1: new full-speed USB device number 46 using dummy_hcd [ 1269.862813][ T5938] netlink: 4 bytes leftover after parsing attributes in process `syz.6.31499'. [ 1269.916543][ T9] usb 6-1: too many endpoints for config 1 interface 0 altsetting 0: 255, using maximum allowed: 30 [ 1269.935097][ T9] usb 6-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 10 [ 1269.951587][ T5943] netlink: 140 bytes leftover after parsing attributes in process `syz.4.31502'. [ 1269.960754][ T9] usb 6-1: config 1 interface 0 altsetting 0 endpoint 0x82 has invalid maxpacket 1024, setting to 64 [ 1269.978697][ T9] usb 6-1: config 1 interface 0 altsetting 0 has 3 endpoint descriptors, different from the interface descriptor's value: 255 [ 1270.005224][ T9] usb 6-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1270.017746][ T9] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=1 [ 1270.038958][ T9] usb 6-1: SerialNumber: syz [ 1270.047287][ T5920] raw-gadget.0 gadget.5: fail, usb_ep_enable returned -22 [ 1270.072187][ T5947] veth1_macvtap: entered promiscuous mode [ 1270.078036][ T5947] veth1_macvtap: entered allmulticast mode [ 1270.084002][ T5947] macsec0: left promiscuous mode [ 1270.089042][ T5947] macsec0: left allmulticast mode [ 1270.094125][ T5947] veth1_macvtap: left allmulticast mode [ 1270.137231][ T5949] tmpfs: Unknown parameter 'nr_ino' [ 1270.274387][ T9] cdc_acm 6-1:1.0: ttyACM0: USB ACM device [ 1270.296816][ T9] usb 6-1: USB disconnect, device number 46 [ 1270.428619][ T5964] netlink: 140 bytes leftover after parsing attributes in process `syz.0.31511'. [ 1270.770192][ T5985] netlink: 140 bytes leftover after parsing attributes in process `syz.6.31522'. [ 1271.452509][ T6020] veth1_macvtap: left promiscuous mode [ 1271.461541][ T6020] macsec0: entered promiscuous mode [ 1271.471648][ T6020] macsec0: entered allmulticast mode [ 1271.483787][ T6020] veth1_macvtap: entered promiscuous mode [ 1271.501924][ T6020] veth1_macvtap: entered allmulticast mode [ 1271.507921][ T6020] macsec0: left promiscuous mode [ 1271.523101][ T6020] macsec0: left allmulticast mode [ 1271.528216][ T6020] veth1_macvtap: left allmulticast mode [ 1272.516491][ T6063] netlink: 140 bytes leftover after parsing attributes in process `syz.5.31559'. [ 1273.072986][ T6075] veth1_macvtap: entered promiscuous mode [ 1273.080861][ T6075] veth1_macvtap: entered allmulticast mode [ 1273.091077][ T6075] macsec0: left promiscuous mode [ 1273.101130][ T6075] macsec0: left allmulticast mode [ 1273.106220][ T6075] veth1_macvtap: left allmulticast mode [ 1273.156239][ T36] kauditd_printk_skb: 530 callbacks suppressed [ 1273.156256][ T36] audit: type=1400 audit(2000000925.610:67846): avc: denied { read write } for pid=3684 comm="syz-executor" name="loop5" dev="devtmpfs" ino=54 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1273.210890][ T36] audit: type=1400 audit(2000000925.610:67847): avc: denied { read write open } for pid=3684 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=54 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1273.286520][ T36] audit: type=1400 audit(2000000925.610:67848): avc: denied { ioctl } for pid=3684 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=54 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1273.340048][ T36] audit: type=1400 audit(2000000925.690:67849): avc: denied { sys_module } for pid=6077 comm="syz.0.31567" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1273.391672][ T36] audit: type=1400 audit(2000000925.690:67850): avc: denied { execute } for pid=6077 comm="syz.0.31567" path="/597/cpuacct.usage_percpu" dev="tmpfs" ino=3656 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1273.416049][ T6088] veth1_macvtap: left promiscuous mode [ 1273.416961][ T36] audit: type=1400 audit(2000000925.690:67851): avc: denied { execute } for pid=6077 comm="syz.0.31567" path="/597/cpuacct.usage_percpu" dev="tmpfs" ino=3656 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1273.431690][ T6088] macsec0: entered promiscuous mode [ 1273.457269][ T6088] macsec0: entered allmulticast mode [ 1273.460412][ T36] audit: type=1400 audit(2000000925.720:67852): avc: denied { read write } for pid=3684 comm="syz-executor" name="loop5" dev="devtmpfs" ino=54 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1273.487543][ T36] audit: type=1400 audit(2000000925.720:67853): avc: denied { read write open } for pid=3684 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=54 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1273.513540][ T36] audit: type=1400 audit(2000000925.720:67854): avc: denied { ioctl } for pid=3684 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=54 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1273.548187][ T36] audit: type=1400 audit(2000000925.740:67855): avc: denied { read write } for pid=6080 comm="syz.0.31569" name="rnullb0" dev="devtmpfs" ino=31 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1273.576636][ T6093] netlink: 108 bytes leftover after parsing attributes in process `syz.5.31574'. [ 1274.044874][ T1700] bridge_slave_1: left allmulticast mode [ 1274.050678][ T1700] bridge_slave_1: left promiscuous mode [ 1274.057444][ T1700] bridge0: port 2(bridge_slave_1) entered disabled state [ 1274.074468][ T1700] bridge_slave_0: left allmulticast mode [ 1274.082347][ T1700] bridge_slave_0: left promiscuous mode [ 1274.093419][ T1700] bridge0: port 1(bridge_slave_0) entered disabled state [ 1274.256286][ T1700] veth0_vlan: left promiscuous mode [ 1274.367251][ T6107] bridge0: port 1(bridge_slave_0) entered blocking state [ 1274.387020][ T6107] bridge0: port 1(bridge_slave_0) entered disabled state [ 1274.426001][ T6107] bridge_slave_0: entered allmulticast mode [ 1274.432319][ T6107] bridge_slave_0: entered promiscuous mode [ 1274.469206][ T6107] bridge0: port 2(bridge_slave_1) entered blocking state [ 1274.483924][ T6107] bridge0: port 2(bridge_slave_1) entered disabled state [ 1274.491015][ T6107] bridge_slave_1: entered allmulticast mode [ 1274.504345][ T6107] bridge_slave_1: entered promiscuous mode [ 1274.791463][ T6107] bridge0: port 2(bridge_slave_1) entered blocking state [ 1274.798537][ T6107] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1274.805840][ T6107] bridge0: port 1(bridge_slave_0) entered blocking state [ 1274.812864][ T6107] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1274.956454][ T1700] bridge0: port 1(bridge_slave_0) entered disabled state [ 1274.965868][ T1700] bridge0: port 2(bridge_slave_1) entered disabled state [ 1275.006885][ T6171] netlink: 140 bytes leftover after parsing attributes in process `syz.5.31606'. [ 1275.036083][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 1275.043151][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1275.077965][ T1700] bridge0: port 2(bridge_slave_1) entered blocking state [ 1275.085088][ T1700] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1275.189821][ T6107] veth0_vlan: entered promiscuous mode [ 1275.260111][ T6107] veth1_macvtap: entered promiscuous mode [ 1275.413390][ T6193] veth1_macvtap: left promiscuous mode [ 1275.432211][ T6193] macsec0: entered promiscuous mode [ 1275.440158][ T6193] macsec0: entered allmulticast mode [ 1275.570462][ T6205] netlink: 4 bytes leftover after parsing attributes in process `syz.0.31618'. [ 1275.653137][ T6212] FAULT_INJECTION: forcing a failure. [ 1275.653137][ T6212] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1275.673077][ T6215] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=1001 sclass=netlink_xfrm_socket pid=6215 comm=syz.4.31625 [ 1275.684119][ T6212] CPU: 1 UID: 0 PID: 6212 Comm: syz.5.31623 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 1275.684149][ T6212] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1275.684160][ T6212] Call Trace: [ 1275.684167][ T6212] [ 1275.684175][ T6212] __dump_stack+0x21/0x30 [ 1275.684203][ T6212] dump_stack_lvl+0x10c/0x190 [ 1275.684225][ T6212] ? __cfi_dump_stack_lvl+0x10/0x10 [ 1275.684249][ T6212] dump_stack+0x19/0x20 [ 1275.684271][ T6212] should_fail_ex+0x3d9/0x530 [ 1275.684290][ T6212] should_fail+0xf/0x20 [ 1275.684307][ T6212] should_fail_usercopy+0x1e/0x30 [ 1275.684325][ T6212] strncpy_from_user+0x28/0x270 [ 1275.684345][ T6212] getname_flags+0x102/0x710 [ 1275.684364][ T6212] user_path_at+0x2b/0x60 [ 1275.684383][ T6212] __se_sys_mount+0x288/0x480 [ 1275.684400][ T6212] ? ksys_write+0x1ef/0x250 [ 1275.684417][ T6212] ? __x64_sys_mount+0xf0/0xf0 [ 1275.684435][ T6212] __x64_sys_mount+0xc3/0xf0 [ 1275.684451][ T6212] x64_sys_call+0x2021/0x2ee0 [ 1275.684475][ T6212] do_syscall_64+0x58/0xf0 [ 1275.684497][ T6212] ? clear_bhb_loop+0x50/0xa0 [ 1275.684516][ T6212] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 1275.684534][ T6212] RIP: 0033:0x7f68c6b8f6c9 [ 1275.684550][ T6212] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1275.684566][ T6212] RSP: 002b:00007f68c79a6038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1275.684585][ T6212] RAX: ffffffffffffffda RBX: 00007f68c6de5fa0 RCX: 00007f68c6b8f6c9 [ 1275.684600][ T6212] RDX: 0000200000000140 RSI: 00002000000000c0 RDI: 0000000000000000 [ 1275.684613][ T6212] RBP: 00007f68c79a6090 R08: 0000000000000000 R09: 0000000000000000 [ 1275.684625][ T6212] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1275.684636][ T6212] R13: 00007f68c6de6038 R14: 00007f68c6de5fa0 R15: 00007fffb5b9fc48 [ 1275.684652][ T6212] [ 1276.630591][ T6239] veth1_macvtap: entered promiscuous mode [ 1276.640223][ T6239] veth1_macvtap: entered allmulticast mode [ 1276.654075][ T6239] macsec0: left promiscuous mode [ 1276.659122][ T6239] macsec0: left allmulticast mode [ 1276.673327][ T6239] veth1_macvtap: left allmulticast mode [ 1277.174598][ T9] usb 6-1: new full-speed USB device number 47 using dummy_hcd [ 1277.313964][ T9] usb 6-1: device descriptor read/64, error -71 [ 1277.564005][ T9] usb 6-1: device descriptor read/64, error -71 [ 1277.813934][ T9] usb 6-1: new full-speed USB device number 48 using dummy_hcd [ 1277.963942][ T9] usb 6-1: device descriptor read/64, error -71 [ 1278.120008][ T6309] netlink: 4 bytes leftover after parsing attributes in process `syz.6.31666'. [ 1278.189682][ T36] kauditd_printk_skb: 714 callbacks suppressed [ 1278.189698][ T36] audit: type=1326 audit(2000000930.640:68570): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6281 comm="syz.0.31656" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f733038f6c9 code=0x7fc00000 [ 1278.219841][ T36] audit: type=1400 audit(2000000930.680:68571): avc: denied { ioctl } for pid=6306 comm="syz.4.31667" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1278.224220][ T9] usb 6-1: device descriptor read/64, error -71 [ 1278.246509][ T36] audit: type=1326 audit(2000000930.700:68572): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6281 comm="syz.0.31656" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f733038f6c9 code=0x7fc00000 [ 1278.275142][T13524] usb 5-1: new high-speed USB device number 70 using dummy_hcd [ 1278.283302][ T36] audit: type=1400 audit(2000000930.730:68573): avc: denied { execute } for pid=6310 comm="syz.0.31668" path="/16/cpuacct.usage_percpu" dev="tmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1278.307928][ T36] audit: type=1400 audit(2000000930.770:68574): avc: denied { ioctl } for pid=6306 comm="syz.4.31667" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1278.333358][ T36] audit: type=1400 audit(2000000930.770:68575): avc: denied { ioctl } for pid=6306 comm="syz.4.31667" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1278.358698][ T36] audit: type=1400 audit(2000000930.770:68576): avc: denied { ioctl } for pid=6306 comm="syz.4.31667" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1278.367981][ T9] usb usb6-port1: attempt power cycle [ 1278.384450][ T36] audit: type=1400 audit(2000000930.770:68577): avc: denied { execute } for pid=6312 comm="syz.0.31669" path="/17/cpuacct.usage_percpu" dev="tmpfs" ino=123 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1278.414689][ T36] audit: type=1400 audit(2000000930.840:68578): avc: denied { ioctl } for pid=6251 comm="syz.5.31642" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1278.442205][ T36] audit: type=1400 audit(2000000930.840:68579): avc: denied { ioctl } for pid=6306 comm="syz.4.31667" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1278.487574][T13524] usb 5-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 18 [ 1278.502123][T13524] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1278.512901][T13524] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=1 [ 1278.520923][T13524] usb 5-1: SerialNumber: syz [ 1278.583368][ T6327] veth1_macvtap: left promiscuous mode [ 1278.588903][ T6327] macsec0: entered promiscuous mode [ 1278.594388][ T6327] macsec0: entered allmulticast mode [ 1278.601456][ T6327] veth1_macvtap: entered promiscuous mode [ 1278.607402][ T6327] veth1_macvtap: entered allmulticast mode [ 1278.613376][ T6327] macsec0: left promiscuous mode [ 1278.618522][ T6327] macsec0: left allmulticast mode [ 1278.623543][ T6327] veth1_macvtap: left allmulticast mode [ 1278.743975][ T9] usb 6-1: new full-speed USB device number 49 using dummy_hcd [ 1278.744892][T13524] cdc_ether 5-1:1.0: probe with driver cdc_ether failed with error -71 [ 1278.793079][T13524] usb 5-1: USB disconnect, device number 70 [ 1278.800974][ T9] usb 6-1: device descriptor read/8, error -71 [ 1278.936332][ T9] usb 6-1: device descriptor read/8, error -71 [ 1279.076610][ T6353] netlink: 4 bytes leftover after parsing attributes in process `syz.0.31689'. [ 1279.183933][ T9] usb 6-1: new full-speed USB device number 50 using dummy_hcd [ 1279.226155][ T9] usb 6-1: device descriptor read/8, error -71 [ 1279.356261][ T9] usb 6-1: device descriptor read/8, error -71 [ 1279.388116][ T6374] veth1_macvtap: entered promiscuous mode [ 1279.397079][ T6374] veth1_macvtap: entered allmulticast mode [ 1279.406013][ T6374] macsec0: left promiscuous mode [ 1279.411040][ T6374] macsec0: left allmulticast mode [ 1279.416155][ T6374] veth1_macvtap: left allmulticast mode [ 1279.475917][ T9] usb usb6-port1: unable to enumerate USB device [ 1279.706405][ T6397] veth1_macvtap: left promiscuous mode [ 1279.711904][ T6397] macsec0: entered promiscuous mode [ 1279.724995][ T6397] macsec0: entered allmulticast mode [ 1279.809371][ T6403] veth1_macvtap: entered promiscuous mode [ 1279.828715][ T6403] veth1_macvtap: entered allmulticast mode [ 1279.841209][ T6403] macsec0: left promiscuous mode [ 1279.854011][ T6403] macsec0: left allmulticast mode [ 1279.868287][ T6403] veth1_macvtap: left allmulticast mode [ 1279.993419][ T6414] netlink: 4 bytes leftover after parsing attributes in process `syz.0.31718'. [ 1280.228354][ T6431] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=2048 sclass=netlink_tcpdiag_socket pid=6431 comm=syz.4.31725 [ 1281.036499][ T6476] veth1_macvtap: left promiscuous mode [ 1281.054765][ T6476] macsec0: entered promiscuous mode [ 1281.061403][ T6476] macsec0: entered allmulticast mode [ 1281.085127][ T6476] veth1_macvtap: entered promiscuous mode [ 1281.101017][ T6476] veth1_macvtap: entered allmulticast mode [ 1281.134013][ T6476] macsec0: left promiscuous mode [ 1281.144760][ T6476] macsec0: left allmulticast mode [ 1281.159767][ T6476] veth1_macvtap: left allmulticast mode [ 1282.502573][ T6520] veth1_macvtap: left promiscuous mode [ 1282.518551][ T6520] macsec0: entered promiscuous mode [ 1282.528349][ T6520] macsec0: entered allmulticast mode [ 1282.565061][ T6520] veth1_macvtap: entered promiscuous mode [ 1282.584020][ T6520] veth1_macvtap: entered allmulticast mode [ 1282.590017][ T6520] macsec0: left promiscuous mode [ 1282.602132][ T6520] macsec0: left allmulticast mode [ 1282.624168][ T6520] veth1_macvtap: left allmulticast mode [ 1282.773967][ T6533] veth1_macvtap: left promiscuous mode [ 1282.784884][ T6533] macsec0: entered promiscuous mode [ 1282.796339][ T6533] macsec0: entered allmulticast mode [ 1283.105317][ T6553] veth1_macvtap: left promiscuous mode [ 1283.110820][ T6553] macsec0: entered promiscuous mode [ 1283.153927][ T6553] macsec0: entered allmulticast mode [ 1283.202058][ T36] kauditd_printk_skb: 574 callbacks suppressed [ 1283.202075][ T36] audit: type=1400 audit(2000000935.650:69154): avc: denied { read write open } for pid=3617 comm="syz-executor" path="/dev/loop6" dev="devtmpfs" ino=55 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1283.266072][ T36] audit: type=1400 audit(2000000935.690:69155): avc: denied { ioctl } for pid=3617 comm="syz-executor" path="/dev/loop6" dev="devtmpfs" ino=55 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1283.329922][ T36] audit: type=1400 audit(2000000935.700:69156): avc: denied { execute } for pid=6559 comm="syz.0.31789" path="/45/cpuacct.usage_percpu" dev="tmpfs" ino=291 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1283.428076][ T36] audit: type=1400 audit(2000000935.720:69157): avc: denied { execute } for pid=6557 comm="syz.5.31783" path="/296/cpuacct.usage_percpu" dev="tmpfs" ino=1811 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1283.490623][ T36] audit: type=1400 audit(2000000935.760:69158): avc: denied { read write } for pid=3684 comm="syz-executor" name="loop5" dev="devtmpfs" ino=54 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1283.578681][ T36] audit: type=1400 audit(2000000935.760:69159): avc: denied { read write open } for pid=3684 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=54 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1283.611670][ T36] audit: type=1400 audit(2000000935.760:69160): avc: denied { ioctl } for pid=3684 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=54 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1283.687946][ T36] audit: type=1400 audit(2000000935.780:69161): avc: denied { execute } for pid=6563 comm="syz.0.31790" path="/46/cpuacct.usage_percpu" dev="tmpfs" ino=297 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1283.783953][ T36] audit: type=1400 audit(2000000935.780:69162): avc: denied { execute } for pid=6561 comm="syz.6.31788" path="/321/cpuacct.usage_percpu" dev="tmpfs" ino=2011 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1283.850032][ T36] audit: type=1400 audit(2000000935.830:69163): avc: denied { read write } for pid=3617 comm="syz-executor" name="loop6" dev="devtmpfs" ino=55 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1283.909680][ T6591] veth1_macvtap: left promiscuous mode [ 1283.919955][ T6591] macsec0: entered promiscuous mode [ 1283.929345][ T6591] macsec0: entered allmulticast mode [ 1284.450400][ T6622] veth1_macvtap: entered promiscuous mode [ 1284.483940][ T6622] veth1_macvtap: entered allmulticast mode [ 1284.494258][ T6622] macsec0: left promiscuous mode [ 1284.499285][ T6622] macsec0: left allmulticast mode [ 1284.508045][ T6622] veth1_macvtap: left allmulticast mode [ 1285.097587][ T6659] netlink: 4 bytes leftover after parsing attributes in process `syz.6.31835'. [ 1285.433406][ T6689] FAULT_INJECTION: forcing a failure. [ 1285.433406][ T6689] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1285.452114][ T6689] CPU: 0 UID: 0 PID: 6689 Comm: syz.0.31851 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 1285.452144][ T6689] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1285.452156][ T6689] Call Trace: [ 1285.452163][ T6689] [ 1285.452170][ T6689] __dump_stack+0x21/0x30 [ 1285.452197][ T6689] dump_stack_lvl+0x10c/0x190 [ 1285.452218][ T6689] ? __cfi_dump_stack_lvl+0x10/0x10 [ 1285.452240][ T6689] ? selinux_file_open+0x457/0x610 [ 1285.452263][ T6689] dump_stack+0x19/0x20 [ 1285.452285][ T6689] should_fail_ex+0x3d9/0x530 [ 1285.452304][ T6689] should_fail_alloc_page+0xeb/0x110 [ 1285.452325][ T6689] __alloc_pages_noprof+0x19b/0x7b0 [ 1285.452349][ T6689] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 1285.452373][ T6689] ? is_bpf_text_address+0x17b/0x1a0 [ 1285.452394][ T6689] ? __kernel_text_address+0x11/0x40 [ 1285.452416][ T6689] ? unwind_get_return_address+0x51/0x90 [ 1285.452436][ T6689] ? __cfi_stack_trace_consume_entry+0x10/0x10 [ 1285.452461][ T6689] ? arch_stack_walk+0x10b/0x170 [ 1285.452478][ T6689] __folio_alloc_noprof+0x14/0x80 [ 1285.452499][ T6689] folio_prealloc+0x46/0x240 [ 1285.452520][ T6689] do_pte_missing+0x164c/0x4240 [ 1285.452541][ T6689] ? _parse_integer+0x2e/0x40 [ 1285.452568][ T6689] ? pte_marker_clear+0x1b0/0x1b0 [ 1285.452589][ T6689] ? kstrtouint_from_user+0xfb/0x150 [ 1285.452606][ T6689] ? __x64_sys_openat+0x13a/0x170 [ 1285.452629][ T6689] ? x64_sys_call+0xe69/0x2ee0 [ 1285.452654][ T6689] ? selinux_file_permission+0x309/0xb30 [ 1285.452675][ T6689] ? __pte_offset_map+0x1b0/0x230 [ 1285.452700][ T6689] ? pte_offset_map_rw_nolock+0xba/0x110 [ 1285.452725][ T6689] handle_mm_fault+0x1166/0x1b90 [ 1285.452747][ T6689] ? __cfi_handle_mm_fault+0x10/0x10 [ 1285.452766][ T6689] ? lock_vma_under_rcu+0x49d/0x540 [ 1285.452787][ T6689] ? __kasan_check_write+0x18/0x20 [ 1285.452813][ T6689] do_user_addr_fault+0x96c/0x1200 [ 1285.452837][ T6689] ? __cfi_ksys_write+0x10/0x10 [ 1285.452856][ T6689] exc_page_fault+0x59/0xc0 [ 1285.452875][ T6689] asm_exc_page_fault+0x2b/0x30 [ 1285.452893][ T6689] RIP: 0033:0x7f733025a5ab [ 1285.452909][ T6689] Code: 00 00 00 48 8d 3d 8d 3b 19 00 48 89 c1 31 c0 e8 db 39 ff ff eb d2 66 0f 1f 84 00 00 00 00 00 55 31 c0 53 48 81 ec 68 10 00 00 <48> 89 7c 24 08 48 8d 3d c1 3b 19 00 48 89 34 24 48 8b 14 24 48 8b [ 1285.452923][ T6689] RSP: 002b:00007f7331285fb0 EFLAGS: 00010202 [ 1285.452940][ T6689] RAX: 0000000000000000 RBX: 00007f73305e5fa0 RCX: 0000000000000000 [ 1285.452953][ T6689] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000200000000080 [ 1285.452971][ T6689] RBP: 00007f7331287090 R08: 0000000000000000 R09: 0000000000000000 [ 1285.452984][ T6689] R10: 0000200000000080 R11: 0000000000000000 R12: 0000000000000001 [ 1285.452996][ T6689] R13: 00007f73305e6038 R14: 00007f73305e5fa0 R15: 00007ffde667bc48 [ 1285.453013][ T6689] [ 1285.453024][ T6689] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 1285.539197][ T6692] rust_binder: Transaction failed: BR_FAILED_REPLY { source: EINVAL } my_pid:1136 [ 1285.819011][ T6696] veth1_macvtap: entered promiscuous mode [ 1285.874379][ T6696] veth1_macvtap: entered allmulticast mode [ 1285.883525][ T6696] macsec0: left promiscuous mode [ 1285.899871][ T6696] macsec0: left allmulticast mode [ 1285.926004][ T6696] veth1_macvtap: left allmulticast mode [ 1286.178868][ T6725] netlink: 108 bytes leftover after parsing attributes in process `syz.0.31867'. [ 1286.861705][ T6765] netlink: 4 bytes leftover after parsing attributes in process `syz.6.31887'. [ 1287.815952][ T6802] netlink: 4 bytes leftover after parsing attributes in process `syz.6.31906'. [ 1287.838294][ T6805] FAULT_INJECTION: forcing a failure. [ 1287.838294][ T6805] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1287.857631][ T6805] CPU: 0 UID: 0 PID: 6805 Comm: syz.4.31900 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 1287.857662][ T6805] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1287.857674][ T6805] Call Trace: [ 1287.857680][ T6805] [ 1287.857688][ T6805] __dump_stack+0x21/0x30 [ 1287.857727][ T6805] dump_stack_lvl+0x10c/0x190 [ 1287.857750][ T6805] ? __cfi_dump_stack_lvl+0x10/0x10 [ 1287.857774][ T6805] ? kernel_text_address+0xa9/0xe0 [ 1287.857798][ T6805] dump_stack+0x19/0x20 [ 1287.857820][ T6805] should_fail_ex+0x3d9/0x530 [ 1287.857840][ T6805] should_fail+0xf/0x20 [ 1287.857857][ T6805] should_fail_usercopy+0x1e/0x30 [ 1287.857877][ T6805] _copy_from_user+0x22/0xb0 [ 1287.857898][ T6805] ___sys_sendmsg+0x159/0x2a0 [ 1287.857922][ T6805] ? __sys_sendmsg+0x280/0x280 [ 1287.857946][ T6805] ? kstrtouint+0x78/0xf0 [ 1287.857968][ T6805] __sys_sendmmsg+0x271/0x470 [ 1287.857991][ T6805] ? __cfi___sys_sendmmsg+0x10/0x10 [ 1287.858017][ T6805] ? __cfi_ksys_write+0x10/0x10 [ 1287.858034][ T6805] __x64_sys_sendmmsg+0xa4/0xc0 [ 1287.858059][ T6805] x64_sys_call+0xfec/0x2ee0 [ 1287.858082][ T6805] do_syscall_64+0x58/0xf0 [ 1287.858105][ T6805] ? clear_bhb_loop+0x50/0xa0 [ 1287.858124][ T6805] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 1287.858142][ T6805] RIP: 0033:0x7fc9e298f6c9 [ 1287.858157][ T6805] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1287.858174][ T6805] RSP: 002b:00007fc9e37b4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1287.858194][ T6805] RAX: ffffffffffffffda RBX: 00007fc9e2be5fa0 RCX: 00007fc9e298f6c9 [ 1287.858209][ T6805] RDX: 0000000000000001 RSI: 0000200000003c00 RDI: 0000000000000005 [ 1287.858221][ T6805] RBP: 00007fc9e37b4090 R08: 0000000000000000 R09: 0000000000000000 [ 1287.858234][ T6805] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000000000001 [ 1287.858246][ T6805] R13: 00007fc9e2be6038 R14: 00007fc9e2be5fa0 R15: 00007ffeb09ee598 [ 1287.858263][ T6805] [ 1288.212118][ T36] kauditd_printk_skb: 535 callbacks suppressed [ 1288.212135][ T36] audit: type=1400 audit(2000000940.660:69699): avc: denied { read write } for pid=2259 comm="syz-executor" name="loop4" dev="devtmpfs" ino=53 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1288.251625][ T36] audit: type=1400 audit(2000000940.660:69700): avc: denied { unmount } for pid=6107 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 1288.272054][ T36] audit: type=1400 audit(2000000940.680:69701): avc: denied { execute } for pid=6820 comm="syz.5.31913" path="/326/cpuacct.usage_percpu" dev="tmpfs" ino=2002 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1288.298809][ T36] audit: type=1400 audit(2000000940.700:69702): avc: denied { read write open } for pid=2259 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=53 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1288.339594][ T36] audit: type=1400 audit(2000000940.700:69703): avc: denied { ioctl } for pid=2259 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=53 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1288.366230][ T36] audit: type=1400 audit(2000000940.700:69704): avc: denied { read write } for pid=3684 comm="syz-executor" name="loop5" dev="devtmpfs" ino=54 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1288.396688][ T36] audit: type=1400 audit(2000000940.700:69705): avc: denied { read write open } for pid=3684 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=54 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1288.432021][ T36] audit: type=1400 audit(2000000940.700:69706): avc: denied { ioctl } for pid=3684 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=54 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1288.466918][ T36] audit: type=1400 audit(2000000940.800:69707): avc: denied { read write } for pid=2259 comm="syz-executor" name="loop4" dev="devtmpfs" ino=53 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1288.493123][ T36] audit: type=1400 audit(2000000940.800:69708): avc: denied { read write open } for pid=2259 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=53 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1289.107068][ T6858] veth1_macvtap: left promiscuous mode [ 1289.112892][ T6858] macsec0: entered promiscuous mode [ 1289.118739][ T6858] macsec0: entered allmulticast mode [ 1289.136353][ T6858] veth1_macvtap: entered promiscuous mode [ 1289.152959][ T6858] veth1_macvtap: entered allmulticast mode [ 1289.173795][ T6858] macsec0: left promiscuous mode [ 1289.178827][ T6858] macsec0: left allmulticast mode [ 1289.203907][ T6858] veth1_macvtap: left allmulticast mode [ 1289.537078][ T6871] veth1_macvtap: entered promiscuous mode [ 1289.542849][ T6871] veth1_macvtap: entered allmulticast mode [ 1289.555156][ T6871] macsec0: left promiscuous mode [ 1289.560231][ T6871] macsec0: left allmulticast mode [ 1289.565336][ T6871] veth1_macvtap: left allmulticast mode [ 1289.689166][ T6875] netlink: 104 bytes leftover after parsing attributes in process `syz.4.31938'. [ 1289.945160][ T6886] overlayfs: failed to resolve './file1': -2 [ 1290.352695][ T6902] overlayfs: failed to resolve './file1': -2 [ 1290.555118][ T6916] veth1_macvtap: left promiscuous mode [ 1290.562155][ T6916] macsec0: entered promiscuous mode [ 1290.578458][ T6916] macsec0: entered allmulticast mode [ 1290.587251][ T6916] veth1_macvtap: entered promiscuous mode [ 1290.593055][ T6916] veth1_macvtap: entered allmulticast mode [ 1290.600002][ T6916] macsec0: left promiscuous mode [ 1290.605747][ T6916] macsec0: left allmulticast mode [ 1290.610781][ T6916] veth1_macvtap: left allmulticast mode [ 1290.778041][ T6926] netlink: 4 bytes leftover after parsing attributes in process `syz.4.31962'. [ 1291.576947][ T6948] veth1_macvtap: left promiscuous mode [ 1291.625984][ T6948] macsec0: entered promiscuous mode [ 1291.645968][ T6948] macsec0: entered allmulticast mode [ 1291.653943][ T340] usb 5-1: new full-speed USB device number 71 using dummy_hcd [ 1291.685032][ T6954] veth1_macvtap: entered promiscuous mode [ 1291.700746][ T6954] veth1_macvtap: entered allmulticast mode [ 1291.724037][ T6954] macsec0: left promiscuous mode [ 1291.736074][ T6954] macsec0: left allmulticast mode [ 1291.765711][ T6954] veth1_macvtap: left allmulticast mode [ 1291.832662][ T340] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1291.851228][ T340] usb 5-1: New USB device found, idVendor=056a, idProduct=0317, bcdDevice= 0.00 [ 1291.880533][ T340] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1291.895474][ T340] usb 5-1: config 0 descriptor?? [ 1291.941643][ T6962] netlink: 4 bytes leftover after parsing attributes in process `syz.6.31978'. [ 1292.115800][ T340] usbhid 5-1:0.0: can't add hid device: -71 [ 1292.121782][ T340] usbhid 5-1:0.0: probe with driver usbhid failed with error -71 [ 1292.150601][ T340] usb 5-1: USB disconnect, device number 71 [ 1292.726301][ T6979] veth1_macvtap: left promiscuous mode [ 1292.773929][ T6979] macsec0: entered promiscuous mode [ 1292.783914][ T6979] macsec0: entered allmulticast mode [ 1292.806898][ T6984] veth1_macvtap: entered promiscuous mode [ 1292.812656][ T6984] veth1_macvtap: entered allmulticast mode [ 1292.853177][ T6984] macsec0: left promiscuous mode [ 1292.868394][ T6984] macsec0: left allmulticast mode [ 1292.884568][ T6984] veth1_macvtap: left allmulticast mode [ 1293.214834][ T36] kauditd_printk_skb: 444 callbacks suppressed [ 1293.214852][ T36] audit: type=1400 audit(2000000945.670:70153): avc: denied { execute } for pid=6993 comm="syz.4.31992" path="/578/cpuacct.usage_percpu" dev="tmpfs" ino=3589 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1293.293917][ T36] audit: type=1400 audit(2000000945.710:70154): avc: denied { create } for pid=6993 comm="syz.4.31992" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1293.343955][ T36] audit: type=1326 audit(2000000945.710:70155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6985 comm="syz.6.31989" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd58938f6c9 code=0x7fc00000 [ 1293.387791][ T36] audit: type=1400 audit(2000000945.720:70156): avc: denied { read } for pid=6993 comm="syz.4.31992" name="binder1" dev="binder" ino=20 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1293.441883][ T36] audit: type=1400 audit(2000000945.720:70157): avc: denied { read open } for pid=6993 comm="syz.4.31992" path="/dev/binderfs/binder1" dev="binder" ino=20 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1293.499130][ T36] audit: type=1400 audit(2000000945.720:70158): avc: denied { ioctl } for pid=6993 comm="syz.4.31992" path="/dev/binderfs/binder1" dev="binder" ino=20 ioctlcmd=0x620d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1293.529043][ T6998] rust_binder: BINDER_SET_CONTEXT_MGR already set [ 1293.533856][ T6998] netlink: 8 bytes leftover after parsing attributes in process `syz.4.31994'. [ 1293.551132][ T36] audit: type=1400 audit(2000000945.720:70159): avc: denied { set_context_mgr } for pid=6993 comm="syz.4.31992" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 1293.573004][ T6998] rust_binder: Failed to allocate buffer. len:1152, is_oneway:true [ 1293.573354][ T36] audit: type=1326 audit(2000000945.770:70161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6985 comm="syz.6.31989" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd58938f6c9 code=0x7fc00000 [ 1293.623950][ T36] audit: type=1400 audit(2000000945.740:70160): avc: denied { read write } for pid=2259 comm="syz-executor" name="loop4" dev="devtmpfs" ino=53 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1293.683922][ T36] audit: type=1400 audit(2000000945.780:70162): avc: denied { read write open } for pid=2259 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=53 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1294.270911][ T7017] veth1_macvtap: left promiscuous mode [ 1294.293988][ T7017] macsec0: entered promiscuous mode [ 1294.299263][ T7017] macsec0: entered allmulticast mode [ 1294.338877][ T7023] veth1_macvtap: entered promiscuous mode [ 1294.379384][ T7023] veth1_macvtap: entered allmulticast mode [ 1294.394068][ T7023] macsec0: left promiscuous mode [ 1294.406551][ T7023] macsec0: left allmulticast mode [ 1294.427166][ T7023] veth1_macvtap: left allmulticast mode [ 1295.144160][ T7069] EXT4-fs: dax option not supported [ 1295.563965][ T340] usb 1-1: new full-speed USB device number 102 using dummy_hcd [ 1295.613923][ T31] usb 5-1: new full-speed USB device number 72 using dummy_hcd [ 1295.738577][ T340] usb 1-1: too many endpoints for config 1 interface 0 altsetting 0: 255, using maximum allowed: 30 [ 1295.773920][ T340] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 10 [ 1295.803454][ T340] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x82 has invalid maxpacket 1024, setting to 64 [ 1295.825950][ T340] usb 1-1: config 1 interface 0 altsetting 0 has 3 endpoint descriptors, different from the interface descriptor's value: 255 [ 1295.826022][ T31] usb 5-1: too many endpoints for config 1 interface 0 altsetting 0: 255, using maximum allowed: 30 [ 1295.860955][ T340] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1295.870431][ T340] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=1 [ 1295.883905][ T340] usb 1-1: SerialNumber: syz [ 1295.888577][ T31] usb 5-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 10 [ 1295.906641][ T7078] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 1295.934720][ T31] usb 5-1: config 1 interface 0 altsetting 0 endpoint 0x82 has invalid maxpacket 1024, setting to 64 [ 1295.948443][ T31] usb 5-1: config 1 interface 0 altsetting 0 has 3 endpoint descriptors, different from the interface descriptor's value: 255 [ 1295.973442][ T31] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1295.982954][ T31] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=1 [ 1296.012841][ T31] usb 5-1: SerialNumber: syz [ 1296.054608][ T7082] raw-gadget.1 gadget.4: fail, usb_ep_enable returned -22 [ 1296.150537][ T340] cdc_acm 1-1:1.0: ttyACM0: USB ACM device [ 1296.174477][ T340] usb 1-1: USB disconnect, device number 102 [ 1296.307704][ T31] cdc_acm 5-1:1.0: ttyACM1: USB ACM device [ 1296.344426][ T31] usb 5-1: USB disconnect, device number 72 [ 1298.224755][ T36] kauditd_printk_skb: 363 callbacks suppressed [ 1298.224770][ T36] audit: type=1400 audit(2000000950.680:70526): avc: denied { read write open } for pid=2259 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=53 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1298.302340][ T36] audit: type=1400 audit(2000000950.680:70527): avc: denied { ioctl } for pid=2259 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=53 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1298.381046][ T36] audit: type=1400 audit(2000000950.710:70528): avc: denied { read write } for pid=3684 comm="syz-executor" name="loop5" dev="devtmpfs" ino=54 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1298.444584][ T36] audit: type=1400 audit(2000000950.710:70529): avc: denied { read write open } for pid=3684 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=54 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1298.533914][ T36] audit: type=1400 audit(2000000950.710:70530): avc: denied { ioctl } for pid=3684 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=54 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1298.595967][ T7141] cgroup2: Unknown parameter 'memory_lo™alevents' [ 1298.604082][ T36] audit: type=1400 audit(2000000950.740:70531): avc: denied { execute } for pid=7128 comm="syz.0.32058" path="/127/cpuacct.usage_percpu" dev="tmpfs" ino=804 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1298.665382][ T7140] rust_binder: BINDER_SET_CONTEXT_MGR already set [ 1298.665858][ T36] audit: type=1400 audit(2000000950.760:70532): avc: denied { execute } for pid=7130 comm="syz.5.32056" path="/366/cpuacct.usage_percpu" dev="tmpfs" ino=2256 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1298.668103][ T7140] rust_binder: Error in use_page_slow: ESRCH [ 1298.683908][ T36] audit: type=1400 audit(2000000950.770:70533): avc: denied { read } for pid=7130 comm="syz.5.32056" name="binder0" dev="binder" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1298.789804][ T36] audit: type=1400 audit(2000000950.770:70534): avc: denied { read open } for pid=7130 comm="syz.5.32056" path="/dev/binderfs/binder0" dev="binder" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1298.807394][ T7140] rust_binder: use_range failure ESRCH [ 1298.836388][ T36] audit: type=1400 audit(2000000950.780:70535): avc: denied { create } for pid=7128 comm="syz.0.32058" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1298.845062][ T7140] rust_binder: Failed to allocate buffer. len:4248, is_oneway:false [ 1298.932376][ T7140] rust_binder: Failure in copy_transaction_data: BR_FAILED_REPLY { source: ESRCH } [ 1298.982798][ T7140] rust_binder: Transaction failed: BR_FAILED_REPLY { source: ESRCH } my_pid:766 [ 1299.476197][ T7157] rust_binder: BINDER_SET_CONTEXT_MGR already set [ 1300.217316][ T1700] bridge_slave_1: left allmulticast mode [ 1300.240427][ T1700] bridge_slave_1: left promiscuous mode [ 1300.258228][ T1700] bridge0: port 2(bridge_slave_1) entered disabled state [ 1300.280579][ T1700] bridge_slave_0: left allmulticast mode [ 1300.288624][ T1700] bridge_slave_0: left promiscuous mode [ 1300.299544][ T1700] bridge0: port 1(bridge_slave_0) entered disabled state [ 1300.477387][ T1700] veth1_macvtap: left promiscuous mode [ 1300.482929][ T1700] veth0_vlan: left promiscuous mode [ 1300.649709][ T7170] bridge0: port 1(bridge_slave_0) entered blocking state [ 1300.670456][ T7170] bridge0: port 1(bridge_slave_0) entered disabled state [ 1300.700941][ T7170] bridge_slave_0: entered allmulticast mode [ 1300.719258][ T7170] bridge_slave_0: entered promiscuous mode [ 1300.739774][ T7170] bridge0: port 2(bridge_slave_1) entered blocking state [ 1300.766209][ T7170] bridge0: port 2(bridge_slave_1) entered disabled state [ 1300.773310][ T7170] bridge_slave_1: entered allmulticast mode [ 1300.804408][ T7170] bridge_slave_1: entered promiscuous mode [ 1301.051599][ T7170] bridge0: port 2(bridge_slave_1) entered blocking state [ 1301.058719][ T7170] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1301.066024][ T7170] bridge0: port 1(bridge_slave_0) entered blocking state [ 1301.073053][ T7170] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1301.114746][ T1699] bridge0: port 1(bridge_slave_0) entered disabled state [ 1301.123023][ T1699] bridge0: port 2(bridge_slave_1) entered disabled state [ 1301.296226][ T1700] bridge0: port 1(bridge_slave_0) entered blocking state [ 1301.303300][ T1700] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1301.335727][ T1700] bridge0: port 2(bridge_slave_1) entered blocking state [ 1301.342825][ T1700] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1301.585609][ T7170] veth0_vlan: entered promiscuous mode [ 1301.686572][ T7170] veth1_macvtap: entered promiscuous mode [ 1302.440482][T31851] usb 6-1: new high-speed USB device number 51 using dummy_hcd [ 1302.614500][T31851] usb 6-1: Using ep0 maxpacket: 8 [ 1302.632103][T31851] usb 6-1: too many endpoints for config 0 interface 0 altsetting 250: 255, using maximum allowed: 30 [ 1302.663940][T31851] usb 6-1: config 0 interface 0 altsetting 250 has 1 endpoint descriptor, different from the interface descriptor's value: 255 [ 1302.697821][T31851] usb 6-1: config 0 interface 0 has no altsetting 0 [ 1302.712197][T31851] usb 6-1: New USB device found, idVendor=046d, idProduct=c20e, bcdDevice= 0.00 [ 1302.731424][T31851] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1302.743156][T31851] usb 6-1: config 0 descriptor?? [ 1303.156766][T31851] logitech 0003:046D:C20E.0025: rdesc size test failed for formula gp [ 1303.184205][T31851] logitech 0003:046D:C20E.0025: unknown main item tag 0x1 [ 1303.207145][T31851] logitech 0003:046D:C20E.0025: item fetching failed at offset 3/5 [ 1303.224699][T31851] logitech 0003:046D:C20E.0025: parse failed [ 1303.234580][T31851] logitech 0003:046D:C20E.0025: probe with driver logitech failed with error -22 [ 1303.346308][ T36] kauditd_printk_skb: 441 callbacks suppressed [ 1303.346324][ T36] audit: type=1400 audit(2000000955.800:70971): avc: denied { read write } for pid=3617 comm="syz-executor" name="loop6" dev="devtmpfs" ino=55 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1303.387629][T31851] usb 6-1: USB disconnect, device number 51 [ 1303.414059][ T36] audit: type=1400 audit(2000000955.800:70972): avc: denied { read write open } for pid=3617 comm="syz-executor" path="/dev/loop6" dev="devtmpfs" ino=55 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1303.480122][ T36] audit: type=1400 audit(2000000955.800:70973): avc: denied { ioctl } for pid=3617 comm="syz-executor" path="/dev/loop6" dev="devtmpfs" ino=55 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1303.533913][ T36] audit: type=1400 audit(2000000955.860:70974): avc: denied { execute } for pid=7257 comm="syz.6.32112" path="/400/cpuacct.usage_percpu" dev="tmpfs" ino=2511 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1303.779180][ T36] audit: type=1400 audit(2000000956.230:70975): avc: denied { execute } for pid=7259 comm="syz.0.32113" path="/142/cpuacct.usage_percpu" dev="tmpfs" ino=899 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1303.844445][ T36] audit: type=1400 audit(2000000956.300:70976): avc: denied { execute } for pid=7261 comm="syz.0.32114" path="/143/cpuacct.usage_percpu" dev="tmpfs" ino=905 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1303.906021][ T36] audit: type=1400 audit(2000000956.360:70977): avc: denied { execute } for pid=7263 comm="syz.0.32116" path="/144/cpuacct.usage_percpu" dev="tmpfs" ino=911 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1303.964173][ T36] audit: type=1400 audit(2000000956.390:70978): avc: denied { read write } for pid=3684 comm="syz-executor" name="loop5" dev="devtmpfs" ino=54 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1304.039053][ T36] audit: type=1400 audit(2000000956.390:70979): avc: denied { read write open } for pid=3684 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=54 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1304.093922][ T36] audit: type=1400 audit(2000000956.390:70980): avc: denied { ioctl } for pid=3684 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=54 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1307.817161][ T7377] overlayfs: option "workdir=./bus" is useless in a non-upper mount, ignore [ 1307.864182][ T7377] overlayfs: missing 'lowerdir' [ 1308.192315][ T7388] rust_binder: Write failure EFAULT in pid:50 [ 1308.364769][ T36] kauditd_printk_skb: 386 callbacks suppressed [ 1308.364786][ T36] audit: type=1400 audit(2000000960.820:71365): avc: denied { read write } for pid=3684 comm="syz-executor" name="loop5" dev="devtmpfs" ino=54 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1308.397495][ T7406] FAULT_INJECTION: forcing a failure. [ 1308.397495][ T7406] name failslab, interval 1, probability 0, space 0, times 0 [ 1308.444055][ T7406] CPU: 1 UID: 0 PID: 7406 Comm: syz.0.32181 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 1308.444088][ T7406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1308.444101][ T7406] Call Trace: [ 1308.444107][ T7406] [ 1308.444116][ T7406] __dump_stack+0x21/0x30 [ 1308.444144][ T7406] dump_stack_lvl+0x10c/0x190 [ 1308.444167][ T7406] ? __cfi_dump_stack_lvl+0x10/0x10 [ 1308.444190][ T7406] ? kasan_save_track+0x4f/0x80 [ 1308.444209][ T7406] ? kasan_save_track+0x3e/0x80 [ 1308.444227][ T7406] ? kasan_save_alloc_info+0x40/0x50 [ 1308.444252][ T7406] ? kmem_cache_alloc_noprof+0x1cb/0x430 [ 1308.444269][ T7406] dump_stack+0x19/0x20 [ 1308.444288][ T7406] should_fail_ex+0x3d9/0x530 [ 1308.444307][ T7406] should_failslab+0xac/0x100 [ 1308.444327][ T7406] kmem_cache_alloc_noprof+0x42/0x430 [ 1308.444344][ T7406] ? mas_alloc_nodes+0x254/0x9e0 [ 1308.444364][ T7406] mas_alloc_nodes+0x254/0x9e0 [ 1308.444385][ T7406] mas_preallocate+0x762/0xc60 [ 1308.444403][ T7406] ? kasan_save_alloc_info+0x40/0x50 [ 1308.444427][ T7406] ? __cfi_mas_preallocate+0x10/0x10 [ 1308.444446][ T7406] ? __kasan_check_read+0x15/0x20 [ 1308.444471][ T7406] ? anon_vma_name+0x51/0xa0 [ 1308.444495][ T7406] ? vm_area_dup+0x41c/0x570 [ 1308.444515][ T7406] __split_vma+0x412/0xa80 [ 1308.444534][ T7406] ? avc_has_perm+0x144/0x220 [ 1308.444558][ T7406] ? vms_gather_munmap_vmas+0xdd0/0xdd0 [ 1308.444577][ T7406] ? avc_perm_nonode+0x101/0x1b0 [ 1308.444600][ T7406] vms_gather_munmap_vmas+0x273/0xdd0 [ 1308.444618][ T7406] ? __cfi_selinux_file_open+0x10/0x10 [ 1308.444639][ T7406] do_vmi_align_munmap+0x244/0x5d0 [ 1308.444658][ T7406] ? __cfi_do_vmi_align_munmap+0x10/0x10 [ 1308.444676][ T7406] ? mas_walk+0x3f7/0x650 [ 1308.444692][ T7406] ? mas_find+0x358/0x5f0 [ 1308.444711][ T7406] do_vmi_munmap+0x246/0x2e0 [ 1308.444730][ T7406] do_munmap+0xe2/0x140 [ 1308.444749][ T7406] ? __cfi_do_munmap+0x10/0x10 [ 1308.444768][ T7406] ? __cfi_mtree_load+0x10/0x10 [ 1308.444785][ T7406] mremap_to+0x327/0x610 [ 1308.444807][ T7406] __se_sys_mremap+0x7e5/0x1010 [ 1308.444828][ T7406] ? __cfi_vfs_write+0x10/0x10 [ 1308.444844][ T7406] ? __x64_sys_mremap+0xf0/0xf0 [ 1308.444864][ T7406] ? __kasan_check_write+0x18/0x20 [ 1308.444894][ T7406] ? mutex_unlock+0x8b/0x240 [ 1308.444910][ T7406] ? __cfi_mutex_unlock+0x10/0x10 [ 1308.444925][ T7406] ? __fget_files+0x2c5/0x340 [ 1308.444942][ T7406] ? __kasan_check_write+0x18/0x20 [ 1308.444964][ T7406] ? fput+0x1a5/0x240 [ 1308.444983][ T7406] ? ksys_write+0x1ef/0x250 [ 1308.444998][ T7406] ? __cfi_ksys_write+0x10/0x10 [ 1308.445015][ T7406] __x64_sys_mremap+0xc3/0xf0 [ 1308.445035][ T7406] x64_sys_call+0x2ac4/0x2ee0 [ 1308.445059][ T7406] do_syscall_64+0x58/0xf0 [ 1308.445079][ T7406] ? clear_bhb_loop+0x50/0xa0 [ 1308.445097][ T7406] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 1308.445115][ T7406] RIP: 0033:0x7f733038f6c9 [ 1308.445130][ T7406] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1308.445145][ T7406] RSP: 002b:00007f7331287038 EFLAGS: 00000246 ORIG_RAX: 0000000000000019 [ 1308.445165][ T7406] RAX: ffffffffffffffda RBX: 00007f73305e5fa0 RCX: 00007f733038f6c9 [ 1308.445180][ T7406] RDX: 0000000000400000 RSI: 0000000000002000 RDI: 0000200000241000 [ 1308.445193][ T7406] RBP: 00007f7331287090 R08: 000020000082a000 R09: 0000000000000000 [ 1308.445206][ T7406] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000001 [ 1308.445218][ T7406] R13: 00007f73305e6038 R14: 00007f73305e5fa0 R15: 00007ffde667bc48 [ 1308.445234][ T7406] [ 1308.448376][ T36] audit: type=1400 audit(2000000960.820:71366): avc: denied { read write open } for pid=3684 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=54 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1308.849708][ T36] audit: type=1400 audit(2000000960.820:71367): avc: denied { ioctl } for pid=3684 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=54 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1308.923911][ T36] audit: type=1400 audit(2000000960.850:71368): avc: denied { execute } for pid=7405 comm="syz.0.32181" path="/160/cpuacct.usage_percpu" dev="tmpfs" ino=1009 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1309.002626][ T36] audit: type=1400 audit(2000000960.930:71369): avc: denied { read write } for pid=3617 comm="syz-executor" name="loop6" dev="devtmpfs" ino=55 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1309.071191][ T36] audit: type=1400 audit(2000000960.930:71370): avc: denied { read write open } for pid=3617 comm="syz-executor" path="/dev/loop6" dev="devtmpfs" ino=55 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1309.127880][ T7430] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1309.166726][ T36] audit: type=1400 audit(2000000960.930:71371): avc: denied { ioctl } for pid=3617 comm="syz-executor" path="/dev/loop6" dev="devtmpfs" ino=55 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1309.233922][ T7430] audit: audit_lost=40 audit_rate_limit=0 audit_backlog_limit=64 [ 1309.258246][ T36] audit: type=1400 audit(2000000960.980:71372): avc: denied { execute } for pid=7407 comm="syz.5.32180" path="/389/cpuacct.usage_percpu" dev="tmpfs" ino=2408 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1310.462317][ T7461] EXT4-fs: dax option not supported [ 1311.444004][ T7472] netlink: 140 bytes leftover after parsing attributes in process `syz.4.32209'. [ 1311.578398][ T7475] overlayfs: failed to resolve './file0': -2 [ 1311.606786][ T7481] cgroup2: Unknown parameter 'memory_lo™alevents' [ 1312.025575][ T7501] overlayfs: failed to resolve './file0': -2 [ 1312.244118][ T7513] EXT4-fs: dax option not supported [ 1312.459716][ T7526] overlayfs: failed to resolve './file1': -2 [ 1312.862323][ T7545] PF_CAN: dropped non conform CAN FD skbuff: dev type 65534, len 4080 [ 1313.393926][ T36] kauditd_printk_skb: 366 callbacks suppressed [ 1313.393943][ T36] audit: type=1400 audit(2000000965.840:71726): avc: denied { read write } for pid=3684 comm="syz-executor" name="loop5" dev="devtmpfs" ino=54 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1313.473905][ T36] audit: type=1400 audit(2000000965.850:71727): avc: denied { read write open } for pid=3684 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=54 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1313.513984][ T36] audit: type=1400 audit(2000000965.850:71728): avc: denied { ioctl } for pid=3684 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=54 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1313.584146][ T36] audit: type=1400 audit(2000000965.880:71729): avc: denied { execute } for pid=7573 comm="syz.5.32261" path="/413/cpuacct.usage_percpu" dev="tmpfs" ino=2555 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1313.628372][ T7579] FAULT_INJECTION: forcing a failure. [ 1313.628372][ T7579] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1313.633914][ T36] audit: type=1400 audit(2000000965.890:71730): avc: denied { execute } for pid=7572 comm="syz.4.32260" path="/34/cpuacct.usage_percpu" dev="tmpfs" ino=234 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1313.669671][ T36] audit: type=1400 audit(2000000965.890:71731): avc: denied { read } for pid=7573 comm="syz.5.32261" name="binder0" dev="binder" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1313.693765][ T36] audit: type=1400 audit(2000000965.890:71732): avc: denied { read open } for pid=7573 comm="syz.5.32261" path="/dev/binderfs/binder0" dev="binder" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1313.703931][ T7579] CPU: 0 UID: 0 PID: 7579 Comm: syz.5.32264 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 1313.703962][ T7579] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1313.703974][ T7579] Call Trace: [ 1313.703980][ T7579] [ 1313.703988][ T7579] __dump_stack+0x21/0x30 [ 1313.704016][ T7579] dump_stack_lvl+0x10c/0x190 [ 1313.704039][ T7579] ? __cfi_dump_stack_lvl+0x10/0x10 [ 1313.704062][ T7579] ? check_stack_object+0x12c/0x140 [ 1313.704081][ T7579] dump_stack+0x19/0x20 [ 1313.704101][ T7579] should_fail_ex+0x3d9/0x530 [ 1313.704119][ T7579] should_fail+0xf/0x20 [ 1313.704135][ T7579] should_fail_usercopy+0x1e/0x30 [ 1313.704155][ T7579] _copy_to_user+0x24/0xa0 [ 1313.704176][ T7579] simple_read_from_buffer+0xed/0x160 [ 1313.704199][ T7579] proc_fail_nth_read+0x19e/0x210 [ 1313.704221][ T7579] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 1313.704244][ T7579] ? bpf_lsm_file_permission+0xd/0x20 [ 1313.704266][ T7579] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 1313.704289][ T7579] vfs_read+0x27d/0xc70 [ 1313.704305][ T7579] ? __cfi_vfs_read+0x10/0x10 [ 1313.704320][ T7579] ? __kasan_check_write+0x18/0x20 [ 1313.704345][ T7579] ? mutex_lock+0x92/0x1c0 [ 1313.704367][ T7579] ? __cfi_mutex_lock+0x10/0x10 [ 1313.704382][ T7579] ? __fget_files+0x2c5/0x340 [ 1313.704402][ T7579] ksys_read+0x141/0x250 [ 1313.704418][ T7579] ? __cfi_ksys_read+0x10/0x10 [ 1313.704433][ T7579] ? fdget+0x189/0x1f0 [ 1313.704451][ T7579] ? __kasan_check_read+0x15/0x20 [ 1313.704475][ T7579] __x64_sys_read+0x7f/0x90 [ 1313.704490][ T7579] x64_sys_call+0x2638/0x2ee0 [ 1313.704514][ T7579] do_syscall_64+0x58/0xf0 [ 1313.704540][ T7579] ? clear_bhb_loop+0x50/0xa0 [ 1313.704561][ T7579] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 1313.704579][ T7579] RIP: 0033:0x7f68c6b8e0dc [ 1313.704594][ T7579] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 1313.704609][ T7579] RSP: 002b:00007f68c79a6030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1313.704629][ T7579] RAX: ffffffffffffffda RBX: 00007f68c6de5fa0 RCX: 00007f68c6b8e0dc [ 1313.704644][ T7579] RDX: 000000000000000f RSI: 00007f68c79a60a0 RDI: 0000000000000007 [ 1313.704656][ T7579] RBP: 00007f68c79a6090 R08: 0000000000000000 R09: 0000000000000000 [ 1313.704668][ T7579] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1313.704679][ T7579] R13: 00007f68c6de6038 R14: 00007f68c6de5fa0 R15: 00007fffb5b9fc48 [ 1313.704695][ T7579] [ 1313.971070][ T7585] rust_binder: Failed to allocate buffer. len:4248, is_oneway:false [ 1313.971203][ T36] audit: type=1400 audit(2000000965.900:71733): avc: denied { create } for pid=7573 comm="syz.5.32261" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1314.002175][ T36] audit: type=1400 audit(2000000965.910:71734): avc: denied { ioctl } for pid=7573 comm="syz.5.32261" path="/dev/binderfs/binder0" dev="binder" ino=13 ioctlcmd=0x620c scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1314.028534][ T36] audit: type=1400 audit(2000000965.910:71735): avc: denied { create } for pid=7573 comm="syz.5.32261" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1315.148783][ T7625] rust_binder: 392: no such ref 2 [ 1315.258538][ T7629] rust_binder: Failed to allocate buffer. len:4120, is_oneway:false [ 1315.259549][ T7629] rust_binder: Write failure EINVAL in pid:392 [ 1315.526783][ T7637] rust_binder: Failed to allocate buffer. len:4248, is_oneway:false [ 1317.219576][ T7699] EXT4-fs: dax option not supported [ 1318.500489][ T36] kauditd_printk_skb: 368 callbacks suppressed [ 1318.500506][ T36] audit: type=1400 audit(2000000970.950:72104): avc: denied { read write } for pid=3617 comm="syz-executor" name="loop6" dev="devtmpfs" ino=55 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1318.603980][ T36] audit: type=1400 audit(2000000970.950:72105): avc: denied { read write open } for pid=3617 comm="syz-executor" path="/dev/loop6" dev="devtmpfs" ino=55 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1318.695417][ T36] audit: type=1400 audit(2000000970.950:72106): avc: denied { ioctl } for pid=3617 comm="syz-executor" path="/dev/loop6" dev="devtmpfs" ino=55 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1318.770616][ T36] audit: type=1400 audit(2000000970.960:72107): avc: denied { read write } for pid=3684 comm="syz-executor" name="loop5" dev="devtmpfs" ino=54 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1318.833388][ T36] audit: type=1400 audit(2000000970.960:72108): avc: denied { read write open } for pid=3684 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=54 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1318.863050][ T7734] EXT4-fs: dax option not supported [ 1318.913911][ T36] audit: type=1400 audit(2000000970.960:72109): avc: denied { ioctl } for pid=3684 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=54 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1318.985271][ T36] audit: type=1400 audit(2000000970.990:72110): avc: denied { execute } for pid=7720 comm="syz.6.32332" path="/454/cpuacct.usage_percpu" dev="tmpfs" ino=2843 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1319.028881][ T7740] rust_binder: Failed to allocate buffer. len:4248, is_oneway:false [ 1319.053939][ T36] audit: type=1400 audit(2000000971.000:72111): avc: denied { execute } for pid=7721 comm="syz.5.32330" path="/441/cpuacct.usage_percpu" dev="tmpfs" ino=2723 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1319.148770][ T36] audit: type=1400 audit(2000000971.020:72112): avc: denied { read write } for pid=3617 comm="syz-executor" name="loop6" dev="devtmpfs" ino=55 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1319.221611][ T36] audit: type=1400 audit(2000000971.020:72113): avc: denied { read write open } for pid=3617 comm="syz-executor" path="/dev/loop6" dev="devtmpfs" ino=55 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1320.404420][ T7769] SELinux: security_context_str_to_sid (sytem_uİGй) failed with errno=-22 [ 1320.785466][ T7790] EXT4-fs: dax option not supported [ 1321.505238][ T7817] EXT4-fs: dax option not supported [ 1323.353923][ T340] usb 6-1: new full-speed USB device number 52 using dummy_hcd [ 1323.506203][ T36] kauditd_printk_skb: 420 callbacks suppressed [ 1323.506220][ T36] audit: type=1400 audit(2000000975.960:72534): avc: denied { execute } for pid=7883 comm="syz.6.32406" path="/472/cpuacct.usage_percpu" dev="tmpfs" ino=2952 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1323.525183][ T340] usb 6-1: too many endpoints for config 1 interface 0 altsetting 0: 255, using maximum allowed: 30 [ 1323.564077][ T340] usb 6-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 10 [ 1323.567684][ T36] audit: type=1400 audit(2000000975.970:72535): avc: denied { ioctl } for pid=7869 comm="syz.5.32400" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1323.583917][ T340] usb 6-1: config 1 interface 0 altsetting 0 endpoint 0x82 has invalid maxpacket 1024, setting to 64 [ 1323.638914][ T36] audit: type=1400 audit(2000000975.970:72536): avc: denied { ioctl } for pid=7869 comm="syz.5.32400" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1323.663941][ T340] usb 6-1: config 1 interface 0 altsetting 0 has 3 endpoint descriptors, different from the interface descriptor's value: 255 [ 1323.706049][ T340] usb 6-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1323.724207][ T340] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=1 [ 1323.764977][ T340] usb 6-1: SerialNumber: syz [ 1323.768489][ T36] audit: type=1400 audit(2000000975.980:72537): avc: denied { ioctl } for pid=7869 comm="syz.5.32400" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1323.781424][ T7870] raw-gadget.0 gadget.5: fail, usb_ep_enable returned -22 [ 1323.852396][ T36] audit: type=1400 audit(2000000975.980:72538): avc: denied { ioctl } for pid=7869 comm="syz.5.32400" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1323.923900][ T36] audit: type=1400 audit(2000000975.980:72539): avc: denied { ioctl } for pid=7869 comm="syz.5.32400" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1323.964626][ T7898] rust_binder: Failed to allocate buffer. len:4248, is_oneway:false [ 1324.005251][ T36] audit: type=1400 audit(2000000976.010:72540): avc: denied { ioctl } for pid=7869 comm="syz.5.32400" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1324.073952][ T36] audit: type=1400 audit(2000000976.010:72541): avc: denied { read write } for pid=7170 comm="syz-executor" name="loop4" dev="devtmpfs" ino=53 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1324.126995][ T7170] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1324.133779][ T340] cdc_acm 6-1:1.0: ttyACM0: USB ACM device [ 1324.138646][ T3617] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1324.176953][ T340] usb 6-1: USB disconnect, device number 52 [ 1325.325220][ T7958] cgroup2: Unknown parameter 'memory_lo™alevents' [ 1325.919596][ T7979] EXT4-fs: dax option not supported [ 1328.525389][ T36] kauditd_printk_skb: 539 callbacks suppressed [ 1328.525406][ T36] audit: type=1400 audit(2000000980.980:73077): avc: denied { read } for pid=8069 comm="syz.4.32493" name="binder1" dev="binder" ino=19 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1328.575599][ T36] audit: type=1400 audit(2000000981.020:73078): avc: denied { read open } for pid=8069 comm="syz.4.32493" path="/dev/binderfs/binder1" dev="binder" ino=19 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1328.653919][ T36] audit: type=1400 audit(2000000981.020:73079): avc: denied { map } for pid=8069 comm="syz.4.32493" path="/dev/binderfs/binder1" dev="binder" ino=19 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1328.733915][ T36] audit: type=1400 audit(2000000981.020:73080): avc: denied { read } for pid=8069 comm="syz.4.32493" path="/dev/binderfs/binder1" dev="binder" ino=19 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1328.793908][ T36] audit: type=1400 audit(2000000981.060:73081): avc: denied { create } for pid=8069 comm="syz.4.32493" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 1328.833943][ T36] audit: type=1400 audit(2000000981.070:73082): avc: denied { sys_admin } for pid=8069 comm="syz.4.32493" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 1328.883902][ T36] audit: type=1400 audit(2000000981.070:73083): avc: denied { sys_admin } for pid=8069 comm="syz.4.32493" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 1328.925500][ T36] audit: type=1400 audit(2000000981.080:73084): avc: denied { read write } for pid=3684 comm="syz-executor" name="loop5" dev="devtmpfs" ino=54 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1328.986473][ T36] audit: type=1400 audit(2000000981.080:73085): avc: denied { read write open } for pid=3684 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=54 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1329.072206][ T36] audit: type=1400 audit(2000000981.080:73086): avc: denied { ioctl } for pid=3684 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=54 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1332.531163][ T37] INFO: task syz.1.29997:2796 blocked for more than 122 seconds. [ 1332.563899][ T37] Not tainted syzkaller #0 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 1332.575623][ T37] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1332.643027][ T37] task:syz.1.29997 state:D stack:0 pid:2796 tgid:2788 ppid:30612 flags:0x00000004 [ 1332.653750][ T37] Call Trace: [ 1332.657098][ T37] [ 1332.660023][ T37] __schedule+0x1322/0x1df0 [ 1332.664548][ T37] ? __sched_text_start+0x10/0x10 [ 1332.669563][ T37] ? __kmalloc_noprof+0x271/0x530 [ 1332.674590][ T37] ? update_curr+0xdc/0xaa0 [ 1332.679080][ T37] ? enqueue_task+0x1133/0x11f0 [ 1332.683927][ T37] schedule+0xc6/0x240 [ 1332.687990][ T37] schedule_timeout+0xb2/0x3a0 [ 1332.692740][ T37] ? __cfi_schedule_timeout+0x10/0x10 [ 1332.698107][ T37] ? __cfi__raw_spin_lock_irq+0x10/0x10 [ 1332.703643][ T37] ? __cfi_check_preempt_wakeup_fair+0x10/0x10 [ 1332.709798][ T37] wait_for_common+0x359/0x630 [ 1332.714568][ T37] ? wait_for_completion+0x40/0x40 [ 1332.719671][ T37] ? _raw_spin_lock_irq+0x8d/0x120 [ 1332.724790][ T37] ? __cfi__raw_spin_lock_irq+0x10/0x10 [ 1332.730325][ T37] wait_for_completion_state+0x19/0x40 [ 1332.735786][ T37] do_coredump+0x7cf/0x2bd0 [ 1332.740283][ T37] ? stack_depot_save_flags+0x38/0x800 [ 1332.745737][ T37] ? kasan_save_track+0x4f/0x80 [ 1332.750575][ T37] ? kasan_save_track+0x3e/0x80 [ 1332.755416][ T37] ? kasan_save_free_info+0x4a/0x60 [ 1332.760605][ T37] ? __kasan_slab_free+0x5f/0x80 [ 1332.765544][ T37] ? __cfi_do_coredump+0x10/0x10 [ 1332.770474][ T37] ? asm_exc_invalid_op+0x1f/0x30 [ 1332.775500][ T37] ? __kasan_slab_free+0x6a/0x80 [ 1332.780436][ T37] ? kmem_cache_free+0x1c1/0x510 [ 1332.785423][ T37] ? get_signal+0xa75/0x14f0 [ 1332.790019][ T37] get_signal+0x11fd/0x14f0 [ 1332.794535][ T37] arch_do_signal_or_restart+0x96/0x720 [ 1332.800077][ T37] ? __cfi_arch_do_signal_or_restart+0x10/0x10 [ 1332.806242][ T37] ? do_trap+0x228/0x3c0 [ 1332.810479][ T37] irqentry_exit_to_user_mode+0x4e/0xb0 [ 1332.816021][ T37] irqentry_exit+0x16/0x60 [ 1332.820423][ T37] exc_invalid_op+0x42/0x60 [ 1332.824927][ T37] asm_exc_invalid_op+0x1f/0x30 [ 1332.829766][ T37] RIP: 0033:0x200000000000 [ 1332.834173][ T37] RSP: 002b:00007fa117c34a78 EFLAGS: 00010246 [ 1332.840230][ T37] RAX: 0000000000000000 RBX: 00007fa116fe6090 RCX: 00007fa116d8f6c9 [ 1332.848205][ T37] RDX: 00007fa117c34a80 RSI: 00007fa117c34bb0 RDI: 000000000000000d [ 1332.856170][ T37] RBP: 00007fa116e11f91 R08: 0000000000000000 R09: 0000000000000000 [ 1332.864135][ T37] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000000000000 [ 1332.872092][ T37] R13: 00007fa116fe6128 R14: 00007fa116fe6090 R15: 00007fff04c290a8 [ 1332.880060][ T37] [ 1332.900610][ T37] NMI backtrace for cpu 0 [ 1332.900626][ T37] CPU: 0 UID: 0 PID: 37 Comm: khungtaskd Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 1332.900651][ T37] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1332.900663][ T37] Call Trace: [ 1332.900669][ T37] [ 1332.900676][ T37] __dump_stack+0x21/0x30 [ 1332.900704][ T37] dump_stack_lvl+0x10c/0x190 [ 1332.900727][ T37] ? __cfi_dump_stack_lvl+0x10/0x10 [ 1332.900752][ T37] dump_stack+0x19/0x20 [ 1332.900774][ T37] nmi_cpu_backtrace+0x2bf/0x2d0 [ 1332.900796][ T37] ? rcu_read_unlock_special+0xab/0x410 [ 1332.900819][ T37] ? __cfi_nmi_cpu_backtrace+0x10/0x10 [ 1332.900841][ T37] ? sched_show_task+0x379/0x560 [ 1332.900864][ T37] ? __rcu_read_unlock+0xc0/0xc0 [ 1332.900885][ T37] ? __cfi_nmi_raise_cpu_backtrace+0x10/0x10 [ 1332.900908][ T37] ? __cfi_nmi_raise_cpu_backtrace+0x10/0x10 [ 1332.900930][ T37] nmi_trigger_cpumask_backtrace+0x142/0x2c0 [ 1332.900954][ T37] arch_trigger_cpumask_backtrace+0x14/0x20 [ 1332.900976][ T37] watchdog+0xd8f/0xed0 [ 1332.901001][ T37] ? __cfi_watchdog+0x10/0x10 [ 1332.901025][ T37] ? __kasan_check_read+0x15/0x20 [ 1332.901051][ T37] ? __kthread_parkme+0x138/0x180 [ 1332.901068][ T37] ? schedule+0xc6/0x240 [ 1332.901093][ T37] kthread+0x2ca/0x370 [ 1332.901111][ T37] ? __cfi_watchdog+0x10/0x10 [ 1332.901135][ T37] ? __cfi_kthread+0x10/0x10 [ 1332.901152][ T37] ret_from_fork+0x67/0xa0 [ 1332.901175][ T37] ? __cfi_kthread+0x10/0x10 [ 1332.901194][ T37] ret_from_fork_asm+0x1a/0x30 [ 1332.901221][ T37] [ 1332.901230][ T37] Sending NMI from CPU 0 to CPUs 1: [ 1333.059362][ C1] NMI backtrace for cpu 1 [ 1333.059377][ C1] CPU: 1 UID: 0 PID: 8127 Comm: syz.4.32518 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 1333.059397][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1333.059407][ C1] RIP: 0010:__sanitizer_cov_trace_pc+0x5/0x70 [ 1333.059431][ C1] Code: e8 10 5f 52 00 5b 5d e9 c9 bc 09 04 cc cc cc cc cc cc cc cc cc b8 e7 e0 64 1c 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 55 <48> 89 e5 48 8b 45 08 65 48 8b 0c 25 00 eb 04 00 65 8b 15 3c ec 7e [ 1333.059444][ C1] RSP: 0018:ffffc90000edeeb0 EFLAGS: 00000206 [ 1333.059458][ C1] RAX: ffffffff8586c0b0 RBX: ffff88816d9d8840 RCX: ffff888178e50000 [ 1333.059470][ C1] RDX: 0000000000000000 RSI: 00007f04c0494000 RDI: 00007f04c0d1dfff [ 1333.059481][ C1] RBP: ffffc90000edf030 R08: ffff888178e50000 R09: 0000000000000003 [ 1333.059491][ C1] R10: 0000000000000003 R11: 0000000000000000 R12: 00007f04c0d1dfff [ 1333.059501][ C1] R13: 0000000000000007 R14: 00007f04c0494000 R15: fffffffffffffff3 [ 1333.059512][ C1] FS: 0000000000000000(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 1333.059525][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1333.059536][ C1] CR2: 00007f7331286f98 CR3: 00000001896b2000 CR4: 00000000003526b0 [ 1333.059550][ C1] Call Trace: [ 1333.059555][ C1] [ 1333.059561][ C1] ? mt_find+0x561/0xb50 [ 1333.059578][ C1] ? __cfi__raw_spin_trylock+0x10/0x10 [ 1333.059597][ C1] ? __cfi_mt_find+0x10/0x10 [ 1333.059611][ C1] ? get_page_from_freelist+0x48ce/0x4960 [ 1333.059631][ C1] ? stack_depot_save_flags+0x38/0x800 [ 1333.059648][ C1] find_vma+0xcd/0x110 [ 1333.059660][ C1] ? __cfi_find_vma+0x10/0x10 [ 1333.059673][ C1] ? vma_is_secretmem+0x11/0x50 [ 1333.059691][ C1] __get_user_pages+0x3d1/0x22d0 [ 1333.059709][ C1] ? __kasan_check_write+0x18/0x20 [ 1333.059730][ C1] ? down_read_killable+0x79/0xf0 [ 1333.059745][ C1] ? populate_vma_page_range+0x230/0x230 [ 1333.059762][ C1] ? __alloc_pages_noprof+0x31f/0x7b0 [ 1333.059780][ C1] ? __kasan_check_write+0x18/0x20 [ 1333.059799][ C1] get_dump_page+0x107/0x220 [ 1333.059816][ C1] ? __cfi_get_dump_page+0x10/0x10 [ 1333.059833][ C1] ? __free_pages+0x6b/0x3b0 [ 1333.059850][ C1] dump_user_range+0x181/0xdf0 [ 1333.059864][ C1] ? __cfi_dump_emit+0x10/0x10 [ 1333.059877][ C1] ? __cfi_dump_user_range+0x10/0x10 [ 1333.059890][ C1] ? elf_coredump_extra_notes_write+0x42f/0x4c0 [ 1333.059911][ C1] ? __cfi_elf_coredump_extra_notes_write+0x10/0x10 [ 1333.059930][ C1] ? elf_core_dump+0x2368/0x3800 [ 1333.059946][ C1] elf_core_dump+0x2ccc/0x3800 [ 1333.059964][ C1] ? __cfi_elf_core_dump+0x10/0x10 [ 1333.059984][ C1] ? dump_interrupted+0xf0/0xf0 [ 1333.060003][ C1] ? filp_open+0x182/0x1d0 [ 1333.060020][ C1] ? 0xffffffffff600000 [ 1333.060032][ C1] do_coredump+0x1bfa/0x2bd0 [ 1333.060053][ C1] ? __cfi_do_coredump+0x10/0x10 [ 1333.060071][ C1] ? asm_exc_page_fault+0x2b/0x30 [ 1333.060090][ C1] ? __kasan_slab_free+0x6a/0x80 [ 1333.060105][ C1] ? kmem_cache_free+0x1c1/0x510 [ 1333.060119][ C1] ? get_signal+0xa75/0x14f0 [ 1333.060143][ C1] get_signal+0x11fd/0x14f0 [ 1333.060161][ C1] arch_do_signal_or_restart+0x96/0x720 [ 1333.060183][ C1] ? __cfi_arch_do_signal_or_restart+0x10/0x10 [ 1333.060204][ C1] irqentry_exit_to_user_mode+0x4e/0xb0 [ 1333.060220][ C1] irqentry_exit+0x16/0x60 [ 1333.060233][ C1] exc_page_fault+0x66/0xc0 [ 1333.060247][ C1] asm_exc_page_fault+0x2b/0x30 [ 1333.060261][ C1] RIP: 0033:0x7f04bfe4f6b7 [ 1333.060272][ C1] Code: 88 15 42 60 ec 00 88 05 3f 60 ec 00 c3 50 48 8d 35 e9 28 1c 00 48 8d 3d ef 28 1c 00 31 c0 e8 20 f7 ff ff 53 89 fb 48 83 ec 10 <64> 8b 04 25 94 ff ff ff 85 c0 74 2a 89 fe 31 c0 bf 3c 00 00 00 e8 [ 1333.060283][ C1] RSP: 002b:00007f04c0eb9120 EFLAGS: 00010202 [ 1333.060295][ C1] RAX: 0000000000000000 RBX: 000000000000000b RCX: 00007f04bff8f6c9 [ 1333.060305][ C1] RDX: 00007f04c0eb9140 RSI: 00007f04c0eb9270 RDI: 000000000000000b [ 1333.060316][ C1] RBP: 00007f04c0011f91 R08: 0000000000000000 R09: 0000000000000000 [ 1333.060325][ C1] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000 [ 1333.060334][ C1] R13: 00007f04c01e6038 R14: 00007f04c01e5fa0 R15: 00007ffe210d2e18 [ 1333.060347][ C1] [ 1333.063481][ T8198] overlayfs: overlapping lowerdir path [ 1333.721028][ T1700] bridge_slave_1: left allmulticast mode [ 1333.726710][ T1700] bridge_slave_1: left promiscuous mode [ 1333.732281][ T1700] bridge0: port 2(bridge_slave_1) entered disabled state [ 1333.739875][ T1700] bridge_slave_0: left allmulticast mode [ 1333.745625][ T1700] bridge_slave_0: left promiscuous mode [ 1333.751208][ T1700] bridge0: port 1(bridge_slave_0) entered disabled state [ 1334.026092][ T1700] veth1_macvtap: left promiscuous mode [ 1334.031599][ T1700] veth0_vlan: left promiscuous mode [ 1335.004648][ T1700] bridge_slave_1: left allmulticast mode [ 1335.010294][ T1700] bridge_slave_1: left promiscuous mode [ 1335.015925][ T1700] bridge0: port 2(bridge_slave_1) entered disabled state [ 1335.023277][ T1700] bridge_slave_0: left allmulticast mode [ 1335.029009][ T1700] bridge_slave_0: left promiscuous mode [ 1335.034619][ T1700] bridge0: port 1(bridge_slave_0) entered disabled state [ 1335.042073][ T1700] bridge_slave_1: left allmulticast mode [ 1335.047759][ T1700] bridge_slave_1: left promiscuous mode [ 1335.053330][ T1700] bridge0: port 2(bridge_slave_1) entered disabled state [ 1335.060981][ T1700] bridge_slave_0: left allmulticast mode [ 1335.066637][ T1700] bridge_slave_0: left promiscuous mode [ 1335.072209][ T1700] bridge0: port 1(bridge_slave_0) entered disabled state [ 1335.079968][ T1700] bridge_slave_1: left allmulticast mode [ 1335.085690][ T1700] bridge_slave_1: left promiscuous mode [ 1335.091259][ T1700] bridge0: port 2(bridge_slave_1) entered disabled state [ 1335.098966][ T1700] bridge_slave_0: left allmulticast mode [ 1335.104620][ T1700] bridge_slave_0: left promiscuous mode [ 1335.110189][ T1700] bridge0: port 1(bridge_slave_0) entered disabled state [ 1335.675463][ T1700] veth1_macvtap: left promiscuous mode [ 1335.680961][ T1700] veth0_vlan: left promiscuous mode [ 1335.686488][ T1700] veth0_vlan: left promiscuous mode [ 1335.691964][ T1700] veth1_macvtap: left promiscuous mode [ 1335.697490][ T1700] veth0_vlan: left promiscuous mode