last executing test programs: 188.334422ms ago: executing program 3 (id=4): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) write(r0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) openat$kvm(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000140)=[@text32={0x20, 0x0}], 0x1, 0xe0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 148.915434ms ago: executing program 3 (id=5): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r2, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000440)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8014) sendmmsg$inet6(0xffffffffffffffff, &(0x7f00000075c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40804) r4 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r4, &(0x7f0000004040)=[{{&(0x7f0000000080)={0x2, 0x4e24, @empty}, 0x10, 0x0}}], 0x1, 0x4000000) 140.584114ms ago: executing program 2 (id=3): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r2, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000440), 0x7, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='rdma.current\x00', 0x275a, 0x0) ioctl$BLKRRPART(r3, 0x125f, 0x0) 79.399697ms ago: executing program 2 (id=6): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f00000001c0)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0xc, 0x54404d0a08a4d8, 0x4}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x80, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000003780)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8014) rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) 79.242596ms ago: executing program 1 (id=2): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x488d5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000040)={0x3, &(0x7f0000000140)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmmsg(r4, &(0x7f0000000bc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4040840) 79.143836ms ago: executing program 0 (id=1): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000340)=ANY=[], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r1, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mount$incfs(&(0x7f00000007c0)='.\x00', &(0x7f0000000800)='./bus\x00', &(0x7f0000000840), 0x1004002, 0x0) 78.799557ms ago: executing program 3 (id=7): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e24, 0x0, @mcast2, 0xffffff7f}, 0x1c) 44.362308ms ago: executing program 1 (id=8): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_REVISION_TARGET(r3, 0x0, 0x43, &(0x7f0000000040)={'NETMAP\x00'}, &(0x7f00000000c0)=0x1e) 42.350448ms ago: executing program 0 (id=9): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet(r3, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x488d5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000040)={0x3, &(0x7f0000000140)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) 41.788508ms ago: executing program 3 (id=10): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) write(r2, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000440), 0x7, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='rdma.current\x00', 0x275a, 0x0) ioctl$LOOP_CONFIGURE(r3, 0x4c0a, &(0x7f00000005c0)={r4, 0x800, {0x2a00, 0x80010000, 0x0, 0x5, 0x0, 0x0, 0x0, 0x20, 0x1d, "fee8a2ab78fc179fd1f8a0e91ddaaca7bd6447a4b4e00d9683dda1af1ea09de2b7fb0a0100000000000000000300", "2809e8dbe108598927875397bab22d0000b420a9c81f40f05f819e01177d3d458dac00000000000000000000003b00000000000000000200", "90be8b1c5512406c7f00", [0x4, 0x3fffffffffffff]}}) 0s ago: executing program 1 (id=11): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x40845, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0xc, 0x54404d0a08a4d8, 0x4}) socket$inet_tcp(0x2, 0x1, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r5, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) unshare(0x60000600) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.251' (ED25519) to the list of known hosts. [ 21.237525][ T36] audit: type=1400 audit(1763544966.350:64): avc: denied { mounton } for pid=268 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 21.239014][ T268] cgroup: Unknown subsys name 'net' [ 21.263429][ T36] audit: type=1400 audit(1763544966.350:65): avc: denied { mount } for pid=268 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.290861][ T36] audit: type=1400 audit(1763544966.390:66): avc: denied { unmount } for pid=268 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.291124][ T268] cgroup: Unknown subsys name 'devices' [ 21.456460][ T268] cgroup: Unknown subsys name 'hugetlb' [ 21.462107][ T268] cgroup: Unknown subsys name 'rlimit' [ 21.638840][ T36] audit: type=1400 audit(1763544966.750:67): avc: denied { setattr } for pid=268 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 21.662053][ T36] audit: type=1400 audit(1763544966.750:68): avc: denied { mounton } for pid=268 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 21.676675][ T284] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 21.687019][ T36] audit: type=1400 audit(1763544966.750:69): avc: denied { mount } for pid=268 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 21.718493][ T36] audit: type=1400 audit(1763544966.810:70): avc: denied { relabelto } for pid=284 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.742518][ T268] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 21.743905][ T36] audit: type=1400 audit(1763544966.810:71): avc: denied { write } for pid=284 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.778220][ T36] audit: type=1400 audit(1763544966.860:72): avc: denied { read } for pid=268 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.803800][ T36] audit: type=1400 audit(1763544966.860:73): avc: denied { open } for pid=268 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 24.155548][ T290] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.162704][ T290] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.169991][ T290] bridge_slave_0: entered allmulticast mode [ 24.176414][ T290] bridge_slave_0: entered promiscuous mode [ 24.183040][ T290] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.190253][ T290] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.197491][ T290] bridge_slave_1: entered allmulticast mode [ 24.203747][ T290] bridge_slave_1: entered promiscuous mode [ 24.240646][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.247838][ T292] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.255095][ T292] bridge_slave_0: entered allmulticast mode [ 24.261363][ T292] bridge_slave_0: entered promiscuous mode [ 24.267763][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.274907][ T292] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.282002][ T292] bridge_slave_1: entered allmulticast mode [ 24.288438][ T292] bridge_slave_1: entered promiscuous mode [ 24.371412][ T289] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.378555][ T289] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.385893][ T289] bridge_slave_0: entered allmulticast mode [ 24.392139][ T289] bridge_slave_0: entered promiscuous mode [ 24.408624][ T289] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.415799][ T289] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.422869][ T289] bridge_slave_1: entered allmulticast mode [ 24.429246][ T289] bridge_slave_1: entered promiscuous mode [ 24.442693][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.450078][ T291] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.457202][ T291] bridge_slave_0: entered allmulticast mode [ 24.463437][ T291] bridge_slave_0: entered promiscuous mode [ 24.482128][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.489243][ T291] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.496361][ T291] bridge_slave_1: entered allmulticast mode [ 24.502611][ T291] bridge_slave_1: entered promiscuous mode [ 24.558271][ T290] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.565371][ T290] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.572668][ T290] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.579826][ T290] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.605242][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.612318][ T292] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.619661][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.626724][ T292] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.670494][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.678115][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.685358][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.692537][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.710914][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.718004][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.731060][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.738162][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.813115][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.820212][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.827841][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.834905][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.862946][ T290] veth0_vlan: entered promiscuous mode [ 24.878670][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.885762][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.893610][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.900697][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.913039][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.920162][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.928160][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.935219][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.955963][ T292] veth0_vlan: entered promiscuous mode [ 24.982519][ T290] veth1_macvtap: entered promiscuous mode [ 25.015518][ T289] veth0_vlan: entered promiscuous mode [ 25.021306][ T292] veth1_macvtap: entered promiscuous mode [ 25.035269][ T291] veth0_vlan: entered promiscuous mode [ 25.042660][ T290] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 25.065182][ T291] veth1_macvtap: entered promiscuous mode [ 25.095379][ T289] veth1_macvtap: entered promiscuous mode [ 25.130872][ T336] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 25.223933][ T289] ------------[ cut here ]------------ [ 25.229538][ T289] WARNING: CPU: 1 PID: 289 at fs/inode.c:340 drop_nlink+0xce/0x110 [ 25.237662][ T289] Modules linked in: [ 25.241620][ T289] CPU: 1 UID: 0 PID: 289 Comm: syz-executor Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 25.253380][ T289] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 25.263533][ T289] RIP: 0010:drop_nlink+0xce/0x110 [ 25.268651][ T289] Code: 04 00 00 be 08 00 00 00 e8 cf 54 ee ff f0 48 ff 83 b8 04 00 00 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc cc e8 32 e4 97 ff <0f> 0b eb 81 44 89 f1 80 e1 07 80 c1 03 38 c1 0f 8c 59 ff ff ff 4c [ 25.288410][ T289] RSP: 0018:ffffc9000b61fc60 EFLAGS: 00010293 [ 25.294580][ T289] RAX: ffffffff81ee1a7e RBX: ffff88810fbd8f50 RCX: ffff888107eba600 [ 25.302594][ T289] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 25.310668][ T289] RBP: ffffc9000b61fc88 R08: 0000000000000003 R09: 0000000000000004 [ 25.318739][ T289] R10: dffffc0000000000 R11: fffff520016c3f7c R12: dffffc0000000000 [ 25.326796][ T289] R13: 1ffff11021f7b1f3 R14: ffff88810fbd8f98 R15: 0000000000000000 [ 25.334830][ T289] FS: 0000555582f3e500(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 25.343796][ T289] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 25.350484][ T289] CR2: 0000555585e4a4a8 CR3: 00000001249c8000 CR4: 00000000003526b0 [ 25.358573][ T289] Call Trace: [ 25.361885][ T289] [ 25.364915][ T289] shmem_rmdir+0x5f/0x90 [ 25.369208][ T289] vfs_rmdir+0x3dd/0x560 [ 25.373489][ T289] incfs_kill_sb+0x109/0x230 [ 25.378184][ T289] deactivate_locked_super+0xd5/0x2a0 [ 25.383600][ T289] deactivate_super+0xb8/0xe0 [ 25.388355][ T289] cleanup_mnt+0x3f1/0x480 [ 25.392813][ T289] __cleanup_mnt+0x1d/0x40 [ 25.397327][ T289] task_work_run+0x1e0/0x250 [ 25.401948][ T289] ? __cfi_task_work_run+0x10/0x10 [ 25.407134][ T289] ? __x64_sys_umount+0x126/0x170 [ 25.412206][ T289] ? __cfi___x64_sys_umount+0x10/0x10 [ 25.417660][ T289] ? __kasan_check_read+0x15/0x20 [ 25.422725][ T289] resume_user_mode_work+0x36/0x50 [ 25.427938][ T289] syscall_exit_to_user_mode+0x64/0xb0 [ 25.433431][ T289] do_syscall_64+0x64/0xf0 [ 25.437932][ T289] ? clear_bhb_loop+0x50/0xa0 [ 25.442637][ T289] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 25.448612][ T289] RIP: 0033:0x7f44a3d909f7 [ 25.453074][ T289] Code: a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 a8 ff ff ff f7 d8 64 89 02 b8 [ 25.472751][ T289] RSP: 002b:00007ffcab051fb8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 25.481349][ T289] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f44a3d909f7 [ 25.489411][ T289] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffcab052070 [ 25.497473][ T289] RBP: 00007ffcab052070 R08: 0000000000000000 R09: 0000000000000000 [ 25.505538][ T289] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007ffcab053100 [ 25.513534][ T289] R13: 00007f44a3e11d7d R14: 0000000000006276 R15: 00007ffcab053140 [ 25.521608][ T289] [ 25.524722][ T289] ---[ end trace 0000000000000000 ]--- [ 25.532957][ T289] ================================================================== [ 25.541103][ T289] BUG: KASAN: null-ptr-deref in ihold+0x24/0x70 [ 25.547360][ T289] Write of size 4 at addr 0000000000000168 by task syz-executor/289 [ 25.555345][ T289] [ 25.557673][ T289] CPU: 1 UID: 0 PID: 289 Comm: syz-executor Tainted: G W syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 25.557698][ T289] Tainted: [W]=WARN [ 25.557703][ T289] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 25.557713][ T289] Call Trace: [ 25.557720][ T289] [ 25.557727][ T289] __dump_stack+0x21/0x30 [ 25.557753][ T289] dump_stack_lvl+0x10c/0x190 [ 25.557774][ T289] ? __cfi_dump_stack_lvl+0x10/0x10 [ 25.557797][ T289] print_report+0x3d/0x70 [ 25.557814][ T289] kasan_report+0x163/0x1a0 [ 25.557833][ T289] ? ihold+0x24/0x70 [ 25.557850][ T289] ? _raw_spin_unlock+0x45/0x60 [ 25.557872][ T289] ? ihold+0x24/0x70 [ 25.557888][ T289] kasan_check_range+0x299/0x2a0 [ 25.557907][ T289] __kasan_check_write+0x18/0x20 [ 25.557931][ T289] ihold+0x24/0x70 [ 25.557947][ T289] vfs_rmdir+0x26a/0x560 [ 25.557967][ T289] incfs_kill_sb+0x109/0x230 [ 25.557992][ T289] deactivate_locked_super+0xd5/0x2a0 [ 25.558013][ T289] deactivate_super+0xb8/0xe0 [ 25.558033][ T289] cleanup_mnt+0x3f1/0x480 [ 25.558051][ T289] __cleanup_mnt+0x1d/0x40 [ 25.558067][ T289] task_work_run+0x1e0/0x250 [ 25.558087][ T289] ? __cfi_task_work_run+0x10/0x10 [ 25.558105][ T289] ? __x64_sys_umount+0x126/0x170 [ 25.558127][ T289] ? __cfi___x64_sys_umount+0x10/0x10 [ 25.558150][ T289] ? __kasan_check_read+0x15/0x20 [ 25.558173][ T289] resume_user_mode_work+0x36/0x50 [ 25.558193][ T289] syscall_exit_to_user_mode+0x64/0xb0 [ 25.558210][ T289] do_syscall_64+0x64/0xf0 [ 25.558231][ T289] ? clear_bhb_loop+0x50/0xa0 [ 25.558253][ T289] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 25.558270][ T289] RIP: 0033:0x7f44a3d909f7 [ 25.558283][ T289] Code: a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 a8 ff ff ff f7 d8 64 89 02 b8 [ 25.558296][ T289] RSP: 002b:00007ffcab051fb8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 25.558313][ T289] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f44a3d909f7 [ 25.558323][ T289] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffcab052070 [ 25.558333][ T289] RBP: 00007ffcab052070 R08: 0000000000000000 R09: 0000000000000000 [ 25.558343][ T289] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007ffcab053100 [ 25.558354][ T289] R13: 00007f44a3e11d7d R14: 0000000000006276 R15: 00007ffcab053140 [ 25.558367][ T289] [ 25.558373][ T289] ================================================================== [ 25.803842][ T289] Disabling lock debugging due to kernel taint [ 25.810510][ T289] BUG: kernel NULL pointer dereference, address: 0000000000000168 [ 25.818339][ T289] #PF: supervisor write access in kernel mode [ 25.824501][ T289] #PF: error_code(0x0002) - not-present page [ 25.830577][ T289] PGD 800000010f702067 P4D 800000010f702067 PUD 0 [ 25.837092][ T289] Oops: Oops: 0002 [#1] PREEMPT SMP KASAN PTI [ 25.843159][ T289] CPU: 1 UID: 0 PID: 289 Comm: syz-executor Tainted: G B W syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 25.856272][ T289] Tainted: [B]=BAD_PAGE, [W]=WARN [ 25.861286][ T289] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 25.871354][ T289] RIP: 0010:ihold+0x2a/0x70 [ 25.875873][ T289] Code: f3 0f 1e fa 55 48 89 e5 41 56 53 48 89 fb e8 1d db 97 ff 48 8d bb 68 01 00 00 be 04 00 00 00 e8 8c 4b ee ff 41 be 01 00 00 00 44 0f c1 b3 68 01 00 00 41 ff c6 bf 02 00 00 00 44 89 f6 e8 2d [ 25.895496][ T289] RSP: 0018:ffffc9000b61fca0 EFLAGS: 00010246 [ 25.901567][ T289] RAX: ffff888107eba600 RBX: 0000000000000000 RCX: ffff888107eba600 [ 25.909550][ T289] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 25.917528][ T289] RBP: ffffc9000b61fcb0 R08: ffffffff88972947 R09: 1ffffffff112e528 [ 25.925503][ T289] R10: dffffc0000000000 R11: fffffbfff112e529 R12: ffff88810fbd8f5c [ 25.933590][ T289] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 [ 25.941584][ T289] FS: 0000555582f3e500(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 25.950526][ T289] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 25.957114][ T289] CR2: 0000000000000168 CR3: 00000001249c8000 CR4: 00000000003526b0 [ 25.965100][ T289] Call Trace: [ 25.968382][ T289] [ 25.971317][ T289] vfs_rmdir+0x26a/0x560 [ 25.975573][ T289] incfs_kill_sb+0x109/0x230 [ 25.980172][ T289] deactivate_locked_super+0xd5/0x2a0 [ 25.985552][ T289] deactivate_super+0xb8/0xe0 [ 25.990240][ T289] cleanup_mnt+0x3f1/0x480 [ 25.994663][ T289] __cleanup_mnt+0x1d/0x40 [ 25.999179][ T289] task_work_run+0x1e0/0x250 [ 26.003791][ T289] ? __cfi_task_work_run+0x10/0x10 [ 26.008921][ T289] ? __x64_sys_umount+0x126/0x170 [ 26.014016][ T289] ? __cfi___x64_sys_umount+0x10/0x10 [ 26.019403][ T289] ? __kasan_check_read+0x15/0x20 [ 26.024458][ T289] resume_user_mode_work+0x36/0x50 [ 26.029581][ T289] syscall_exit_to_user_mode+0x64/0xb0 [ 26.035060][ T289] do_syscall_64+0x64/0xf0 [ 26.039531][ T289] ? clear_bhb_loop+0x50/0xa0 [ 26.044216][ T289] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 26.050114][ T289] RIP: 0033:0x7f44a3d909f7 [ 26.054537][ T289] Code: a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 a8 ff ff ff f7 d8 64 89 02 b8 [ 26.074172][ T289] RSP: 002b:00007ffcab051fb8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 26.082606][ T289] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f44a3d909f7 [ 26.090578][ T289] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffcab052070 [ 26.098558][ T289] RBP: 00007ffcab052070 R08: 0000000000000000 R09: 0000000000000000 [ 26.106534][ T289] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007ffcab053100 [ 26.114685][ T289] R13: 00007f44a3e11d7d R14: 0000000000006276 R15: 00007ffcab053140 [ 26.122672][ T289] [ 26.125691][ T289] Modules linked in: [ 26.129598][ T289] CR2: 0000000000000168 [ 26.133744][ T289] ---[ end trace 0000000000000000 ]--- [ 26.139206][ T289] RIP: 0010:ihold+0x2a/0x70 [ 26.143722][ T289] Code: f3 0f 1e fa 55 48 89 e5 41 56 53 48 89 fb e8 1d db 97 ff 48 8d bb 68 01 00 00 be 04 00 00 00 e8 8c 4b ee ff 41 be 01 00 00 00 44 0f c1 b3 68 01 00 00 41 ff c6 bf 02 00 00 00 44 89 f6 e8 2d [ 26.163328][ T289] RSP: 0018:ffffc9000b61fca0 EFLAGS: 00010246 [ 26.169403][ T289] RAX: ffff888107eba600 RBX: 0000000000000000 RCX: ffff888107eba600 [ 26.177382][ T289] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 26.185384][ T289] RBP: ffffc9000b61fcb0 R08: ffffffff88972947 R09: 1ffffffff112e528 [ 26.193392][ T289] R10: dffffc0000000000 R11: fffffbfff112e529 R12: ffff88810fbd8f5c [ 26.201713][ T289] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 [ 26.209701][ T289] FS: 0000555582f3e500(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 26.218634][ T289] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 26.225219][ T289] CR2: 0000000000000168 CR3: 00000001249c8000 CR4: 00000000003526b0 [ 26.233197][ T289] Kernel panic - not syncing: Fatal exception [ 26.239584][ T289] Kernel Offset: disabled [ 26.243937][ T289] Rebooting in 86400 seconds..