last executing test programs: 172.019515ms ago: executing program 1 (id=2): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0xb007}, 0x4) r2 = syz_open_dev$usbfs(&(0x7f0000000100), 0x76, 0x101b01) ioctl$USBDEVFS_ALLOW_SUSPEND(r2, 0x5522) ioctl$USBDEVFS_IOCTL(r2, 0xc0105512, &(0x7f0000000000)=@usbdevfs_disconnect={0x9}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setitimer(0x2, &(0x7f0000000b40)={{}, {0x0, 0x2710}}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) setsockopt$sock_int(r4, 0x1, 0x6, &(0x7f0000000000)=0x4, 0x4) connect$inet(r4, &(0x7f0000000280)={0x2, 0x0, @broadcast}, 0x10) sendmmsg$inet(r4, &(0x7f0000004d00)=[{{0x0, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x30000}}], 0x300, 0xf00) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x4e22, 0x5, @remote, 0x9}, 0x34) setsockopt$inet6_opts(r3, 0x29, 0x36, &(0x7f0000000080)=@routing={0x87, 0x4, 0x0, 0x4, 0x0, [@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}]}, 0x28) setsockopt$inet6_tcp_int(r3, 0x6, 0x17, &(0x7f0000000000)=0x6, 0x4) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'ip6gretap0\x00', 0x0}) sendto$packet(r1, 0x0, 0x0, 0x90, &(0x7f0000000140)={0x11, 0x5, r6}, 0x14) sendmsg$nl_xfrm(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000005c0)=@migrate={0xbc, 0x21, 0x1, 0x0, 0x0, {{@in=@broadcast, @in6=@private2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, r6}}, [@migrate={0x50, 0x11, [{@in=@loopback, @in=@private=0xa010100, @in=@private=0xa010100, @in6=@local, 0x3c, 0x0, 0x0, 0x0, 0x2, 0x2}]}, @encap={0x1c, 0x4, {0x2, 0x4e24, 0x4e23, @in6=@private1}}]}, 0xbc}}, 0x0) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000040)=@req={0x8001, 0x9, 0x2, 0x7}, 0x10) 170.963605ms ago: executing program 2 (id=3): socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0xa2f01, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(r1) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000100)={'syzkaller1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}) write$tun(r0, &(0x7f0000000140)={@val={0x0, 0x88e5}, @void, @eth={@broadcast, @random="df19d0e500", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x5, 0x28, 0x66, 0x2800, 0x6, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote}, @timestamp={0xd, 0x0, 0x0, 0xd869, 0x0, 0x5, 0x34, 0x3}}}}}}, 0x3a) 148.481099ms ago: executing program 0 (id=1): socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0xa2f01, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(r1) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000100)={'syzkaller1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}) write$tun(r0, &(0x7f0000000140)={@val={0x0, 0x88e5}, @void, @eth={@broadcast, @random="df19d0e500", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x5, 0x28, 0x66, 0xfe, 0x6, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote}, @timestamp={0xd, 0x0, 0x0, 0xd869, 0x0, 0x5, 0x34, 0x3}}}}}}, 0x3a) 147.874189ms ago: executing program 3 (id=4): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='devpts\x00', 0x0, 0x0) r0 = socket(0x8000000010, 0x2, 0x0) write(r0, &(0x7f0000000280)="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", 0xfc) mount$bpf(0x0, &(0x7f00000023c0)='./file0\x00', 0x0, 0x958028, &(0x7f00000004c0)={[{}]}) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) (async) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='devpts\x00', 0x0, 0x0) (async) socket(0x8000000010, 0x2, 0x0) (async) write(r0, &(0x7f0000000280)="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", 0xfc) (async) mount$bpf(0x0, &(0x7f00000023c0)='./file0\x00', 0x0, 0x958028, &(0x7f00000004c0)={[{}]}) (async) 57.491086ms ago: executing program 2 (id=5): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='fd\x00') (async) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='fd\x00') getdents(r2, &(0x7f0000000180)=""/134, 0x86) write$UHID_CREATE2(r2, &(0x7f0000000180)={0xb, {'syz1\x00', 'syz0\x00', 'syz0\x00', 0x42, 0xb7, 0xb395, 0x9, 0x8, 0x10001, "afd0ad32967ec9c4179202b92eaf3e0cacae83b8de518eaeaf970a5fd88242ccd7aa8f5c8a8174a738ed8b8e3cfb50299b54a34aafb629fae505f0c3652fa183b3cc"}}, 0x15a) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001140)=ANY=[], 0x48}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) (async) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) connect$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0xc, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004ac0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000004a80)=""/51, 0x33}, 0x5}], 0x1, 0x45833af92e4b39ff, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) (async) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r0, &(0x7f00003a1000/0x18000)=nil, &(0x7f0000000100)=[@text32={0x20, &(0x7f0000000000)="9a01000000f800b8d58800000f23d00f21f8351000000d0f23f864640f79ea66baf80cb8c85f5480ef66bafc0cecc4c2adac17b9550200000f320f2860c7c4e11751df0f2e2d00000080b9800000c00f3235008000000f30", 0x58}], 0x1, 0x4a, 0x0, 0x0) (async) syz_kvm_setup_cpu$x86(r1, r0, &(0x7f00003a1000/0x18000)=nil, &(0x7f0000000100)=[@text32={0x20, &(0x7f0000000000)="9a01000000f800b8d58800000f23d00f21f8351000000d0f23f864640f79ea66baf80cb8c85f5480ef66bafc0cecc4c2adac17b9550200000f320f2860c7c4e11751df0f2e2d00000080b9800000c00f3235008000000f30", 0x58}], 0x1, 0x4a, 0x0, 0x0) ioctl$KVM_SET_GUEST_DEBUG_x86(r3, 0x4048ae9b, &(0x7f0000000080)={0xe0003, 0x0, {[0xffffffffffffffff, 0x1f8, 0x83, 0xffffffffefffff15, 0x0, 0x4, 0x1, 0x4]}}) (async) ioctl$KVM_SET_GUEST_DEBUG_x86(r3, 0x4048ae9b, &(0x7f0000000080)={0xe0003, 0x0, {[0xffffffffffffffff, 0x1f8, 0x83, 0xffffffffefffff15, 0x0, 0x4, 0x1, 0x4]}}) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x7}, 0x4) setsockopt$packet_int(r4, 0x107, 0x16, &(0x7f0000000000)=0x4, 0x4) 0s ago: executing program 3 (id=6): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x141a82, 0x0) copy_file_range(r1, 0x0, r1, &(0x7f0000000180)=0x5, 0x3, 0x0) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, &(0x7f0000000280)=@urb_type_control={0x2, {}, 0x0, 0x40, &(0x7f0000000000)={0x4b5a9da54893e123, 0x14, 0x8, 0x2}, 0x8, 0x7, 0x200, 0x0, 0x0, 0x40, 0x0}) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815"], 0x65) sendto$inet6(r0, 0x0, 0x0, 0x20008840, &(0x7f0000000040)={0xa, 0x2, 0x80398, @loopback, 0xfffffffe}, 0x1c) shutdown(r0, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) munmap(&(0x7f0000002000/0x800000)=nil, 0x800000) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x400000, 0x3, &(0x7f0000000000/0x400000)=nil) getsockopt$inet6_tcp_int(r3, 0x6, 0x2b, 0x0, &(0x7f00000003c0)) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e21, 0x75, @loopback, 0x8}, 0x1c) r4 = add_key$user(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000240)="6ea59508", 0x4, 0xffffffffffffffff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000380)='./bus\x00', 0x85) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040), 0x8, &(0x7f0000000200)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@upperdir={'upperdir', 0x3d, './file0'}}]}) openat2$dir(0xffffff9c, &(0x7f00000000c0)='./file0/file1\x00', &(0x7f0000000140)={0x40, 0x110, 0x2}, 0x18) newfstatat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file1\x00', &(0x7f00000002c0), 0x6000) keyctl$update(0x2, r4, 0x0, 0x0) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x42, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x31) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) ioctl$KVM_CREATE_DEVICE(r6, 0xc00caee0, &(0x7f0000000080)={0xb}) ioctl$KVM_SET_MSRS(r7, 0x4008ae89, &(0x7f00000000c0)={0x1, 0x0, [{0xc0010001, 0x0, 0x400003}]}) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.91' (ED25519) to the list of known hosts. [ 25.466140][ T36] audit: type=1400 audit(1772431938.100:64): avc: denied { mounton } for pid=284 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 25.469579][ T284] cgroup: Unknown subsys name 'net' [ 25.489226][ T36] audit: type=1400 audit(1772431938.100:65): avc: denied { mount } for pid=284 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 25.516169][ T36] audit: type=1400 audit(1772431938.120:66): avc: denied { unmount } for pid=284 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 25.516529][ T284] cgroup: Unknown subsys name 'devices' [ 25.658525][ T284] cgroup: Unknown subsys name 'hugetlb' [ 25.664162][ T284] cgroup: Unknown subsys name 'rlimit' [ 25.818510][ T36] audit: type=1400 audit(1772431938.450:67): avc: denied { setattr } for pid=284 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 25.841695][ T36] audit: type=1400 audit(1772431938.450:68): avc: denied { mounton } for pid=284 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 25.866716][ T36] audit: type=1400 audit(1772431938.450:69): avc: denied { mount } for pid=284 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 25.890937][ T286] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 25.899834][ T36] audit: type=1400 audit(1772431938.530:70): avc: denied { relabelto } for pid=286 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 25.925416][ T36] audit: type=1400 audit(1772431938.530:71): avc: denied { write } for pid=286 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 25.961794][ T36] audit: type=1400 audit(1772431938.590:72): avc: denied { read } for pid=284 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 25.987454][ T36] audit: type=1400 audit(1772431938.590:73): avc: denied { open } for pid=284 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 25.988084][ T284] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 27.378593][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.385688][ T291] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.392895][ T291] bridge_slave_0: entered allmulticast mode [ 27.399353][ T291] bridge_slave_0: entered promiscuous mode [ 27.415133][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.422242][ T292] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.429373][ T292] bridge_slave_0: entered allmulticast mode [ 27.435670][ T292] bridge_slave_0: entered promiscuous mode [ 27.443843][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.450965][ T292] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.458104][ T292] bridge_slave_1: entered allmulticast mode [ 27.464288][ T292] bridge_slave_1: entered promiscuous mode [ 27.470443][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.477501][ T291] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.484568][ T291] bridge_slave_1: entered allmulticast mode [ 27.491010][ T291] bridge_slave_1: entered promiscuous mode [ 27.540963][ T294] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.548375][ T294] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.555434][ T294] bridge_slave_0: entered allmulticast mode [ 27.562003][ T294] bridge_slave_0: entered promiscuous mode [ 27.575915][ T294] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.582973][ T294] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.590073][ T294] bridge_slave_1: entered allmulticast mode [ 27.596359][ T294] bridge_slave_1: entered promiscuous mode [ 27.623993][ T293] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.631272][ T293] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.638387][ T293] bridge_slave_0: entered allmulticast mode [ 27.644602][ T293] bridge_slave_0: entered promiscuous mode [ 27.653842][ T293] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.660916][ T293] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.668011][ T293] bridge_slave_1: entered allmulticast mode [ 27.674252][ T293] bridge_slave_1: entered promiscuous mode [ 27.804713][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.811888][ T291] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.819194][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.826232][ T291] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.837782][ T293] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.844828][ T293] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.852165][ T293] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.859295][ T293] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.872604][ T294] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.879695][ T294] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.886990][ T294] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.894027][ T294] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.918519][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.925619][ T292] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.932922][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.939968][ T292] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.978797][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.986741][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.993978][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.001689][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.021550][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.028611][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.037160][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.044213][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.079540][ T46] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.086735][ T46] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.107123][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.114171][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.130951][ T293] veth0_vlan: entered promiscuous mode [ 28.147786][ T291] veth0_vlan: entered promiscuous mode [ 28.169268][ T294] veth0_vlan: entered promiscuous mode [ 28.176057][ T293] veth1_macvtap: entered promiscuous mode [ 28.191701][ T291] veth1_macvtap: entered promiscuous mode [ 28.203898][ T294] veth1_macvtap: entered promiscuous mode [ 28.219218][ T292] veth0_vlan: entered promiscuous mode [ 28.250666][ T292] veth1_macvtap: entered promiscuous mode [ 28.257482][ T293] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 28.344143][ T340] netlink: 'syz.3.4': attribute type 12 has an invalid length. [ 28.374697][ T343] netlink: 'syz.3.4': attribute type 12 has an invalid length. [ 28.422828][ T346] kvm_intel: L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 28.443474][ T348] ------------[ cut here ]------------ [ 28.449067][ T348] WARNING: CPU: 1 PID: 348 at mm/page_alloc.c:5268 __alloc_pages_noprof+0x109/0x7e0 [ 28.458533][ T348] Modules linked in: [ 28.462668][ T348] CPU: 1 UID: 0 PID: 348 Comm: syz.3.6 Not tainted syzkaller #0 a88889f1fd4bd040639a1a4060abea1bc20e1fef [ 28.473930][ T348] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 28.484412][ T348] RIP: 0010:__alloc_pages_noprof+0x109/0x7e0 [ 28.490498][ T348] Code: 00 0f 1f 44 00 00 83 fb 0b 72 28 b8 00 20 00 00 23 44 24 40 75 1d 80 3d ea a7 0b 06 00 0f 85 c2 00 00 00 c6 05 dd a7 0b 06 01 <0f> 0b 31 c0 e9 b4 00 00 00 83 fb 0a 0f 87 a9 00 00 00 44 8b 64 24 [ 28.510233][ T348] RSP: 0018:ffffc9000b96f520 EFLAGS: 00010246 [ 28.516372][ T348] RAX: 0000000000000000 RBX: 0000000000000016 RCX: 0000000000000000 [ 28.524382][ T348] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc9000b96f5d8 [ 28.532546][ T348] RBP: ffffc9000b96f660 R08: ffffc9000b96f5d7 R09: 0000000000000000 [ 28.540634][ T348] R10: ffffc9000b96f5c0 R11: fffff5200172debb R12: ffffc9000b96f560 [ 28.548652][ T348] R13: dffffc0000000000 R14: 1ffff9200172dea8 R15: 0000000000000000 [ 28.556674][ T348] FS: 00007f952b9f46c0(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 28.565647][ T348] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 28.572301][ T348] CR2: 00002000000002c0 CR3: 000000010fb14000 CR4: 00000000003526b0 [ 28.580340][ T348] Call Trace: [ 28.583647][ T348] [ 28.586649][ T348] ? vfs_write+0x3c5/0xf90 [ 28.591099][ T348] ? ksys_write+0x145/0x260 [ 28.595639][ T348] ? x64_sys_call+0x271c/0x2ee0 [ 28.600605][ T348] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 28.606401][ T348] ? hashtab_init+0xdb/0x1f0 [ 28.611033][ T348] ___kmalloc_large_node+0x81/0x210 [ 28.616289][ T348] ? hashtab_init+0xdb/0x1f0 [ 28.620917][ T348] __kmalloc_large_node_noprof+0x1e/0xd0 [ 28.626624][ T348] ? hashtab_init+0xdb/0x1f0 [ 28.631260][ T348] __kmalloc_noprof+0x326/0x500 [ 28.636159][ T348] ? kasan_save_alloc_info+0x40/0x50 [ 28.641481][ T348] hashtab_init+0xdb/0x1f0 [ 28.646015][ T348] ? class_read+0x17f/0x8c0 [ 28.650553][ T348] symtab_init+0x44/0x70 [ 28.654805][ T348] class_read+0x20e/0x8c0 [ 28.659251][ T348] ? __kasan_kmalloc+0x96/0xb0 [ 28.664053][ T348] ? hashtab_init+0xdb/0x1f0 [ 28.668704][ T348] ? __cfi_class_read+0x10/0x10 [ 28.673596][ T348] ? hashtab_init+0x105/0x1f0 [ 28.678358][ T348] policydb_read+0xabb/0x28b0 [ 28.683069][ T348] ? __kasan_kmalloc+0x96/0xb0 [ 28.687929][ T348] ? __cfi_policydb_read+0x10/0x10 [ 28.693070][ T348] ? security_load_policy+0x130/0x12d0 [ 28.698578][ T348] security_load_policy+0x16a/0x12d0 [ 28.703901][ T348] ? avc_has_perm_noaudit+0x220/0x360 [ 28.709341][ T348] ? _raw_spin_unlock+0x45/0x60 [ 28.714233][ T348] ? __check_object_size+0x527/0x830 [ 28.719653][ T348] ? __cfi_security_load_policy+0x10/0x10 [ 28.725411][ T348] ? __kasan_check_write+0x18/0x20 [ 28.730574][ T348] sel_write_load+0x2a7/0x5f0 [ 28.735271][ T348] ? __cfi_sel_write_load+0x10/0x10 [ 28.740586][ T348] ? bpf_lsm_file_permission+0xd/0x20 [ 28.746006][ T348] ? __cfi_sel_write_load+0x10/0x10 [ 28.751231][ T348] vfs_write+0x3c5/0xf90 [ 28.755482][ T348] ? __cfi_vfs_write+0x10/0x10 [ 28.760317][ T348] ? __kasan_check_write+0x18/0x20 [ 28.765457][ T348] ? mutex_lock+0x97/0x1d0 [ 28.769921][ T348] ? __cfi_mutex_lock+0x10/0x10 [ 28.774804][ T348] ? __fget_files+0x2c5/0x340 [ 28.779550][ T348] ksys_write+0x145/0x260 [ 28.783912][ T348] ? xfd_validate_state+0x68/0x140 [ 28.789113][ T348] ? __cfi_ksys_write+0x10/0x10 [ 28.794002][ T348] ? __kasan_check_write+0x18/0x20 [ 28.799170][ T348] ? fpregs_restore_userregs+0x11c/0x260 [ 28.804833][ T348] __x64_sys_write+0x7f/0x90 [ 28.809477][ T348] x64_sys_call+0x271c/0x2ee0 [ 28.814185][ T348] do_syscall_64+0x57/0xf0 [ 28.818726][ T348] ? clear_bhb_loop+0x50/0xa0 [ 28.823458][ T348] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 28.829439][ T348] RIP: 0033:0x7f952ab9c799 [ 28.833888][ T348] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 28.853552][ T348] RSP: 002b:00007f952b9f4028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 28.862028][ T348] RAX: ffffffffffffffda RBX: 00007f952ae15fa0 RCX: 00007f952ab9c799 [ 28.870067][ T348] RDX: 0000000000000065 RSI: 0000200000000280 RDI: 0000000000000005 [ 28.878102][ T348] RBP: 00007f952ac32bd9 R08: 0000000000000000 R09: 0000000000000000 [ 28.886123][ T348] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 28.894114][ T348] R13: 00007f952ae16038 R14: 00007f952ae15fa0 R15: 00007fffb795e378 [ 28.902239][ T348] [ 28.905280][ T348] ---[ end trace 0000000000000000 ]--- [ 28.911025][ T348] SELinux: failed to load policy