last executing test programs:
189.585662ms ago: executing program 0 (id=1):
rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300))
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0)
ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4})
sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4)
ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4})
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0)
sendto$inet(r2, 0x0, 0x0, 0x80, 0x0, 0x0)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, 0x0)
sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4)
madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe)
r4 = gettid()
process_vm_writev(r4, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0)
madvise(&(0x7f000042f000/0x800000)=nil, 0x800000, 0x15)
179.741633ms ago: executing program 1 (id=2):
rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300))
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0)
write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0)
ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4})
sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4)
socket$inet_tcp(0x2, 0x1, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0)
write(r2, 0x0, 0x0)
r4 = socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4})
sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4)
mount$binderfs(0x0, &(0x7f0000000040)='./binderfs\x00', &(0x7f00000000c0), 0x4, 0x0)
156.791973ms ago: executing program 0 (id=5):
rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300))
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0)
write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0)
syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00')
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4})
sendmmsg$inet6(r3, &(0x7f0000000440)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8014)
sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0x0)
sendmmsg$inet6(r3, &(0x7f00000075c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40804)
r4 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendmmsg$inet6(r4, &(0x7f00000009c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4)
r5 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendmmsg$inet6(r5, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4)
mount$binderfs(0x0, &(0x7f00000001c0)='./binderfs\x00', &(0x7f0000000280), 0x200000, &(0x7f0000000380)=ANY=[@ANYBLOB='ma'])
142.762694ms ago: executing program 3 (id=4):
mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x1c0)
mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./bus\x00', 0x0)
rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300))
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0)
write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4})
sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4)
r4 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendmmsg$inet6(r4, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4)
r5 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendmmsg$inet6(r5, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4)
mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file1/file0\x00', 0x0)
mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f00000003c0), 0x0, &(0x7f00000004c0)={[{@lowerdir={'lowerdir', 0x3d, './file1/file0'}}, {@upperdir={'upperdir', 0x3d, './file1'}}]})
127.443735ms ago: executing program 2 (id=3):
rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300))
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0)
write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118)
ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4})
sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4)
ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4})
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0)
sendto$inet(r2, 0x0, 0x0, 0x80, 0x0, 0x0)
madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe)
mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil)
r3 = gettid()
process_vm_writev(r3, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0)
madvise(&(0x7f000042f000/0x800000)=nil, 0x800000, 0x15)
105.639785ms ago: executing program 0 (id=6):
rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000140))
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0)
write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118)
ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4})
sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4)
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
r4 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0)
write(r3, 0x0, 0x0)
sendto$inet(r2, 0x0, 0x0, 0x80, 0x0, 0x0)
r5 = socket$inet6_tcp(0xa, 0x1, 0x0)
writev(r2, &(0x7f00000002c0)=[{&(0x7f00000001c0)="1b", 0x1}], 0x1)
sendmmsg$inet6(r5, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4)
openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder1\x00', 0x1802, 0x0)
104.046316ms ago: executing program 3 (id=7):
rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x24000]}}, 0x0, 0x8, &(0x7f0000000300))
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0)
write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0)
syz_open_procfs(0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendmmsg$inet6(r2, &(0x7f0000005800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8014)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendmmsg$inet6(r3, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4)
r4 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendmmsg$inet6(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4)
r5 = socket(0x2, 0x2, 0x1)
ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r5, 0x8983, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0xc2c})
102.517085ms ago: executing program 1 (id=8):
rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300))
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0)
ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4})
sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4)
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4})
sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0)
r4 = socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4})
sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4)
mount$binderfs(0x0, &(0x7f0000000040)='./binderfs\x00', &(0x7f00000000c0), 0x4, 0x0)
65.456737ms ago: executing program 1 (id=9):
rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300))
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0)
write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8=0x0, @ANYRES64=r0], 0x118)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4})
sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0)
write(r0, 0x0, 0x0)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4})
sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4)
mkdir(&(0x7f00000000c0)='./bus\x00', 0x0)
mount$incfs(&(0x7f00000007c0)='.\x00', &(0x7f0000000800)='./bus\x00', &(0x7f0000000840), 0x1004002, 0x0)
chdir(&(0x7f00000001c0)='./bus\x00')
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0)
43.139788ms ago: executing program 0 (id=10):
rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300))
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8, @ANYRES64=r0], 0x118)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, 0xffffffffffffffff, 0x0)
ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4})
sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
sendto$inet(r1, 0x0, 0x0, 0x805, 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4})
sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0)
write(r2, 0x0, 0x0)
r4 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4)
mount$binderfs(0x0, &(0x7f0000000040)='./binderfs\x00', &(0x7f00000000c0), 0x4, 0x0)
13.331509ms ago: executing program 2 (id=11):
rt_sigaction(0xd, 0x0, 0x0, 0x8, &(0x7f0000000300))
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0)
write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0)
ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4})
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendmmsg$inet6(r2, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4)
r4 = socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4})
sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0)
r5 = socket$inet_tcp(0x2, 0x1, 0x0)
bind$inet(r5, &(0x7f0000000080)={0x2, 0x4e21, @multicast1}, 0x10)
0s ago: executing program 1 (id=12):
rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300))
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0)
ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4})
sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4)
ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4})
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0)
sendto$inet(r2, 0x0, 0x0, 0x80, 0x0, 0x0)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, 0x0)
sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4)
madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe)
r4 = gettid()
process_vm_writev(r4, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0)
madvise(&(0x7f000042f000/0x800000)=nil, 0x800000, 0x15)
kernel console output (not intermixed with test programs):
Warning: Permanently added '10.128.0.74' (ED25519) to the list of known hosts.
[ 23.136294][ T36] audit: type=1400 audit(1763573455.620:64): avc: denied { mounton } for pid=282 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1
[ 23.137738][ T282] cgroup: Unknown subsys name 'net'
[ 23.158938][ T36] audit: type=1400 audit(1763573455.620:65): avc: denied { mount } for pid=282 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[ 23.186280][ T36] audit: type=1400 audit(1763573455.650:66): avc: denied { unmount } for pid=282 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[ 23.186448][ T282] cgroup: Unknown subsys name 'devices'
[ 23.306403][ T282] cgroup: Unknown subsys name 'hugetlb'
[ 23.312016][ T282] cgroup: Unknown subsys name 'rlimit'
[ 23.466343][ T36] audit: type=1400 audit(1763573455.950:67): avc: denied { setattr } for pid=282 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 23.489529][ T36] audit: type=1400 audit(1763573455.950:68): avc: denied { mounton } for pid=282 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1
[ 23.513199][ T284] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped).
[ 23.514432][ T36] audit: type=1400 audit(1763573455.950:69): avc: denied { mount } for pid=282 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1
Setting up swapspace version 1, size = 127995904 bytes
[ 23.545930][ T36] audit: type=1400 audit(1763573456.000:70): avc: denied { relabelto } for pid=284 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t"
[ 23.549516][ T282] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k
[ 23.571747][ T36] audit: type=1400 audit(1763573456.000:71): avc: denied { write } for pid=284 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t"
[ 23.605907][ T36] audit: type=1400 audit(1763573456.030:72): avc: denied { read } for pid=282 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t"
[ 23.631469][ T36] audit: type=1400 audit(1763573456.030:73): avc: denied { open } for pid=282 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t"
[ 28.563968][ T36] kauditd_printk_skb: 1 callbacks suppressed
[ 28.563985][ T36] audit: type=1400 audit(1763573461.040:75): avc: denied { read } for pid=289 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1
[ 28.623732][ T36] audit: type=1400 audit(1763573461.040:76): avc: denied { open } for pid=289 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1
[ 28.674323][ T36] audit: type=1400 audit(1763573461.040:77): avc: denied { mounton } for pid=289 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1
[ 28.702714][ T36] audit: type=1400 audit(1763573461.070:78): avc: denied { sys_module } for pid=289 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1
[ 28.724258][ T289] bridge0: port 1(bridge_slave_0) entered blocking state
[ 28.731655][ T289] bridge0: port 1(bridge_slave_0) entered disabled state
[ 28.738752][ T289] bridge_slave_0: entered allmulticast mode
[ 28.745100][ T289] bridge_slave_0: entered promiscuous mode
[ 28.751533][ T289] bridge0: port 2(bridge_slave_1) entered blocking state
[ 28.758622][ T289] bridge0: port 2(bridge_slave_1) entered disabled state
[ 28.765800][ T289] bridge_slave_1: entered allmulticast mode
[ 28.771971][ T289] bridge_slave_1: entered promiscuous mode
[ 28.885459][ T295] bridge0: port 1(bridge_slave_0) entered blocking state
[ 28.892509][ T295] bridge0: port 1(bridge_slave_0) entered disabled state
[ 28.899754][ T295] bridge_slave_0: entered allmulticast mode
[ 28.905943][ T295] bridge_slave_0: entered promiscuous mode
[ 28.913963][ T36] audit: type=1400 audit(1763573461.390:79): avc: denied { create } for pid=289 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 28.934567][ T36] audit: type=1400 audit(1763573461.390:80): avc: denied { write } for pid=289 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 28.954860][ T36] audit: type=1400 audit(1763573461.390:81): avc: denied { read } for pid=289 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 28.975505][ T295] bridge0: port 2(bridge_slave_1) entered blocking state
[ 28.982544][ T295] bridge0: port 2(bridge_slave_1) entered disabled state
[ 28.989637][ T295] bridge_slave_1: entered allmulticast mode
[ 28.995953][ T295] bridge_slave_1: entered promiscuous mode
[ 29.031111][ T294] bridge0: port 1(bridge_slave_0) entered blocking state
[ 29.038219][ T294] bridge0: port 1(bridge_slave_0) entered disabled state
[ 29.045363][ T294] bridge_slave_0: entered allmulticast mode
[ 29.051540][ T294] bridge_slave_0: entered promiscuous mode
[ 29.058008][ T294] bridge0: port 2(bridge_slave_1) entered blocking state
[ 29.065097][ T294] bridge0: port 2(bridge_slave_1) entered disabled state
[ 29.072182][ T294] bridge_slave_1: entered allmulticast mode
[ 29.078454][ T294] bridge_slave_1: entered promiscuous mode
[ 29.092486][ T293] bridge0: port 1(bridge_slave_0) entered blocking state
[ 29.099568][ T293] bridge0: port 1(bridge_slave_0) entered disabled state
[ 29.106669][ T293] bridge_slave_0: entered allmulticast mode
[ 29.112872][ T293] bridge_slave_0: entered promiscuous mode
[ 29.128888][ T293] bridge0: port 2(bridge_slave_1) entered blocking state
[ 29.135939][ T293] bridge0: port 2(bridge_slave_1) entered disabled state
[ 29.142987][ T293] bridge_slave_1: entered allmulticast mode
[ 29.149334][ T293] bridge_slave_1: entered promiscuous mode
[ 29.158981][ T289] bridge0: port 2(bridge_slave_1) entered blocking state
[ 29.166029][ T289] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 29.173307][ T289] bridge0: port 1(bridge_slave_0) entered blocking state
[ 29.180362][ T289] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 29.294040][ T13] bridge0: port 1(bridge_slave_0) entered disabled state
[ 29.301482][ T13] bridge0: port 2(bridge_slave_1) entered disabled state
[ 29.319358][ T46] bridge0: port 1(bridge_slave_0) entered blocking state
[ 29.326431][ T46] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 29.337210][ T13] bridge0: port 2(bridge_slave_1) entered blocking state
[ 29.344268][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 29.422673][ T289] veth0_vlan: entered promiscuous mode
[ 29.428947][ T46] bridge0: port 1(bridge_slave_0) entered blocking state
[ 29.435996][ T46] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 29.444376][ T46] bridge0: port 1(bridge_slave_0) entered blocking state
[ 29.451444][ T46] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 29.465375][ T46] bridge0: port 2(bridge_slave_1) entered blocking state
[ 29.472409][ T46] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 29.480388][ T46] bridge0: port 2(bridge_slave_1) entered blocking state
[ 29.487434][ T46] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 29.495147][ T46] bridge0: port 1(bridge_slave_0) entered blocking state
[ 29.502187][ T46] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 29.526675][ T317] bridge0: port 2(bridge_slave_1) entered blocking state
[ 29.533745][ T317] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 29.563579][ T289] veth1_macvtap: entered promiscuous mode
[ 29.575901][ T295] veth0_vlan: entered promiscuous mode
[ 29.582225][ T294] veth0_vlan: entered promiscuous mode
[ 29.598139][ T295] veth1_macvtap: entered promiscuous mode
[ 29.625677][ T293] veth0_vlan: entered promiscuous mode
[ 29.639222][ T36] audit: type=1400 audit(1763573462.120:82): avc: denied { mounton } for pid=289 comm="syz-executor" path="/root/syzkaller.RIBqCJ/syz-tmp" dev="sda1" ino=2038 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1
[ 29.646588][ T294] veth1_macvtap: entered promiscuous mode
[ 29.663816][ T36] audit: type=1400 audit(1763573462.120:83): avc: denied { mount } for pid=289 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1
[ 29.678440][ T293] veth1_macvtap: entered promiscuous mode
[ 29.697853][ T36] audit: type=1400 audit(1763573462.120:84): avc: denied { mounton } for pid=289 comm="syz-executor" path="/root/syzkaller.RIBqCJ/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1
[ 29.726846][ T289] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality.
[ 29.801179][ T338] binder: Unknown parameter 'ma'
[ 29.812948][ T341] overlayfs: missing 'workdir'
[ 29.934654][ T295] ------------[ cut here ]------------
[ 29.940326][ T295] WARNING: CPU: 0 PID: 295 at fs/inode.c:340 drop_nlink+0xce/0x110
[ 29.948385][ T295] Modules linked in:
[ 29.952542][ T295] CPU: 0 UID: 0 PID: 295 Comm: syz-executor Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e
[ 29.964315][ T295] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
[ 29.974412][ T295] RIP: 0010:drop_nlink+0xce/0x110
[ 29.979473][ T295] Code: 04 00 00 be 08 00 00 00 e8 cf 54 ee ff f0 48 ff 83 b8 04 00 00 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc cc e8 32 e4 97 ff <0f> 0b eb 81 44 89 f1 80 e1 07 80 c1 03 38 c1 0f 8c 59 ff ff ff 4c
[ 29.999390][ T295] RSP: 0018:ffffc9000b6cfc60 EFLAGS: 00010293
[ 30.005568][ T295] RAX: ffffffff81ee1a7e RBX: ffff88810f70b838 RCX: ffff888102b45f00
[ 30.013569][ T295] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 30.021625][ T295] RBP: ffffc9000b6cfc88 R08: 0000000000000003 R09: 0000000000000004
[ 30.029660][ T295] R10: dffffc0000000000 R11: fffff520016d9f7c R12: dffffc0000000000
[ 30.037819][ T295] R13: 1ffff11021ee1710 R14: ffff88810f70b880 R15: 0000000000000000
[ 30.045981][ T295] FS: 0000555567fa9500(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000
[ 30.054973][ T295] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 30.061568][ T295] CR2: 0000555567fcc4e8 CR3: 000000012fa50000 CR4: 00000000003526b0
[ 30.069608][ T295] Call Trace:
[ 30.072900][ T295]
[ 30.075888][ T295] shmem_rmdir+0x5f/0x90
[ 30.080160][ T295] vfs_rmdir+0x3dd/0x560
[ 30.084494][ T295] incfs_kill_sb+0x109/0x230
[ 30.089116][ T295] deactivate_locked_super+0xd5/0x2a0
[ 30.094583][ T295] deactivate_super+0xb8/0xe0
[ 30.099291][ T295] cleanup_mnt+0x3f1/0x480
[ 30.103732][ T295] __cleanup_mnt+0x1d/0x40
[ 30.108334][ T295] task_work_run+0x1e0/0x250
[ 30.112944][ T295] ? __cfi_task_work_run+0x10/0x10
[ 30.118113][ T295] ? __x64_sys_umount+0x126/0x170
[ 30.123161][ T295] ? __cfi___x64_sys_umount+0x10/0x10
[ 30.128606][ T295] ? __kasan_check_read+0x15/0x20
[ 30.133658][ T295] resume_user_mode_work+0x36/0x50
[ 30.138838][ T295] syscall_exit_to_user_mode+0x64/0xb0
[ 30.144383][ T295] do_syscall_64+0x64/0xf0
[ 30.148831][ T295] ? clear_bhb_loop+0x50/0xa0
[ 30.153535][ T295] entry_SYSCALL_64_after_hwframe+0x76/0x7e
[ 30.159514][ T295] RIP: 0033:0x7f49c9b90a77
[ 30.163994][ T295] Code: a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 a8 ff ff ff f7 d8 64 89 02 b8
[ 30.183889][ T295] RSP: 002b:00007ffddf5b53c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6
[ 30.192408][ T295] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f49c9b90a77
[ 30.200454][ T295] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffddf5b5480
[ 30.208669][ T295] RBP: 00007ffddf5b5480 R08: 0000000000000000 R09: 0000000000000000
[ 30.216788][ T295] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007ffddf5b6510
[ 30.224815][ T295] R13: 00007f49c9c13d7d R14: 00000000000074bd R15: 00007ffddf5b6550
[ 30.232804][ T295]
[ 30.235864][ T295] ---[ end trace 0000000000000000 ]---
[ 30.243148][ T295] ==================================================================
[ 30.251239][ T295] BUG: KASAN: null-ptr-deref in ihold+0x24/0x70
[ 30.257508][ T295] Write of size 4 at addr 0000000000000168 by task syz-executor/295
[ 30.265501][ T295]
[ 30.267848][ T295] CPU: 0 UID: 0 PID: 295 Comm: syz-executor Tainted: G W syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e
[ 30.267894][ T295] Tainted: [W]=WARN
[ 30.267902][ T295] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
[ 30.267916][ T295] Call Trace:
[ 30.267923][ T295]
[ 30.267931][ T295] __dump_stack+0x21/0x30
[ 30.267964][ T295] dump_stack_lvl+0x10c/0x190
[ 30.267993][ T295] ? __cfi_dump_stack_lvl+0x10/0x10
[ 30.268025][ T295] print_report+0x3d/0x70
[ 30.268048][ T295] kasan_report+0x163/0x1a0
[ 30.268085][ T295] ? ihold+0x24/0x70
[ 30.268107][ T295] ? _raw_spin_unlock+0x45/0x60
[ 30.268133][ T295] ? ihold+0x24/0x70
[ 30.268154][ T295] kasan_check_range+0x299/0x2a0
[ 30.268180][ T295] __kasan_check_write+0x18/0x20
[ 30.268210][ T295] ihold+0x24/0x70
[ 30.268230][ T295] vfs_rmdir+0x26a/0x560
[ 30.268256][ T295] incfs_kill_sb+0x109/0x230
[ 30.268294][ T295] deactivate_locked_super+0xd5/0x2a0
[ 30.268321][ T295] deactivate_super+0xb8/0xe0
[ 30.268346][ T295] cleanup_mnt+0x3f1/0x480
[ 30.268368][ T295] __cleanup_mnt+0x1d/0x40
[ 30.268388][ T295] task_work_run+0x1e0/0x250
[ 30.268413][ T295] ? __cfi_task_work_run+0x10/0x10
[ 30.268437][ T295] ? __x64_sys_umount+0x126/0x170
[ 30.268466][ T295] ? __cfi___x64_sys_umount+0x10/0x10
[ 30.268494][ T295] ? __kasan_check_read+0x15/0x20
[ 30.268525][ T295] resume_user_mode_work+0x36/0x50
[ 30.268550][ T295] syscall_exit_to_user_mode+0x64/0xb0
[ 30.268573][ T295] do_syscall_64+0x64/0xf0
[ 30.268598][ T295] ? clear_bhb_loop+0x50/0xa0
[ 30.268621][ T295] entry_SYSCALL_64_after_hwframe+0x76/0x7e
[ 30.268643][ T295] RIP: 0033:0x7f49c9b90a77
[ 30.268660][ T295] Code: a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 a8 ff ff ff f7 d8 64 89 02 b8
[ 30.268678][ T295] RSP: 002b:00007ffddf5b53c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6
[ 30.268699][ T295] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f49c9b90a77
[ 30.268713][ T295] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffddf5b5480
[ 30.268726][ T295] RBP: 00007ffddf5b5480 R08: 0000000000000000 R09: 0000000000000000
[ 30.268739][ T295] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007ffddf5b6510
[ 30.268753][ T295] R13: 00007f49c9c13d7d R14: 00000000000074bd R15: 00007ffddf5b6550
[ 30.268770][ T295]
[ 30.268778][ T295] ==================================================================
[ 30.515514][ T295] Disabling lock debugging due to kernel taint
[ 30.521707][ T295] BUG: kernel NULL pointer dereference, address: 0000000000000168
[ 30.529521][ T295] #PF: supervisor write access in kernel mode
[ 30.535604][ T295] #PF: error_code(0x0002) - not-present page
[ 30.541589][ T295] PGD 800000010e70f067 P4D 800000010e70f067 PUD 0
[ 30.548133][ T295] Oops: Oops: 0002 [#1] PREEMPT SMP KASAN PTI
[ 30.554218][ T295] CPU: 0 UID: 0 PID: 295 Comm: syz-executor Tainted: G B W syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e
[ 30.567364][ T295] Tainted: [B]=BAD_PAGE, [W]=WARN
[ 30.572400][ T295] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
[ 30.582466][ T295] RIP: 0010:ihold+0x2a/0x70
[ 30.586997][ T295] Code: f3 0f 1e fa 55 48 89 e5 41 56 53 48 89 fb e8 1d db 97 ff 48 8d bb 68 01 00 00 be 04 00 00 00 e8 8c 4b ee ff 41 be 01 00 00 00 44 0f c1 b3 68 01 00 00 41 ff c6 bf 02 00 00 00 44 89 f6 e8 2d
[ 30.606631][ T295] RSP: 0018:ffffc9000b6cfca0 EFLAGS: 00010246
[ 30.612716][ T295] RAX: ffff888102b45f00 RBX: 0000000000000000 RCX: ffff888102b45f00
[ 30.620700][ T295] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 30.628684][ T295] RBP: ffffc9000b6cfcb0 R08: ffffffff88972947 R09: 1ffffffff112e528
[ 30.636665][ T295] R10: dffffc0000000000 R11: fffffbfff112e529 R12: ffff88810f70b844
[ 30.644743][ T295] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000
[ 30.652722][ T295] FS: 0000555567fa9500(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000
[ 30.661664][ T295] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 30.668275][ T295] CR2: 0000000000000168 CR3: 000000012fa50000 CR4: 00000000003526b0
[ 30.676264][ T295] Call Trace:
[ 30.679558][ T295]
[ 30.682495][ T295] vfs_rmdir+0x26a/0x560
[ 30.686754][ T295] incfs_kill_sb+0x109/0x230
[ 30.691356][ T295] deactivate_locked_super+0xd5/0x2a0
[ 30.696754][ T295] deactivate_super+0xb8/0xe0
[ 30.701448][ T295] cleanup_mnt+0x3f1/0x480
[ 30.705872][ T295] __cleanup_mnt+0x1d/0x40
[ 30.710292][ T295] task_work_run+0x1e0/0x250
[ 30.714891][ T295] ? __cfi_task_work_run+0x10/0x10
[ 30.720013][ T295] ? __x64_sys_umount+0x126/0x170
[ 30.725051][ T295] ? __cfi___x64_sys_umount+0x10/0x10
[ 30.730441][ T295] ? __kasan_check_read+0x15/0x20
[ 30.735479][ T295] resume_user_mode_work+0x36/0x50
[ 30.740613][ T295] syscall_exit_to_user_mode+0x64/0xb0
[ 30.746074][ T295] do_syscall_64+0x64/0xf0
[ 30.750496][ T295] ? clear_bhb_loop+0x50/0xa0
[ 30.755207][ T295] entry_SYSCALL_64_after_hwframe+0x76/0x7e
[ 30.761095][ T295] RIP: 0033:0x7f49c9b90a77
[ 30.765502][ T295] Code: a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 a8 ff ff ff f7 d8 64 89 02 b8
[ 30.785116][ T295] RSP: 002b:00007ffddf5b53c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6
[ 30.793535][ T295] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f49c9b90a77
[ 30.801503][ T295] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffddf5b5480
[ 30.809469][ T295] RBP: 00007ffddf5b5480 R08: 0000000000000000 R09: 0000000000000000
[ 30.817442][ T295] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007ffddf5b6510
[ 30.825423][ T295] R13: 00007f49c9c13d7d R14: 00000000000074bd R15: 00007ffddf5b6550
[ 30.833398][ T295]
[ 30.836422][ T295] Modules linked in:
[ 30.840307][ T295] CR2: 0000000000000168
[ 30.844472][ T295] ---[ end trace 0000000000000000 ]---
[ 30.849930][ T295] RIP: 0010:ihold+0x2a/0x70
[ 30.854449][ T295] Code: f3 0f 1e fa 55 48 89 e5 41 56 53 48 89 fb e8 1d db 97 ff 48 8d bb 68 01 00 00 be 04 00 00 00 e8 8c 4b ee ff 41 be 01 00 00 00 44 0f c1 b3 68 01 00 00 41 ff c6 bf 02 00 00 00 44 89 f6 e8 2d
[ 30.874054][ T295] RSP: 0018:ffffc9000b6cfca0 EFLAGS: 00010246
[ 30.880130][ T295] RAX: ffff888102b45f00 RBX: 0000000000000000 RCX: ffff888102b45f00
[ 30.888093][ T295] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 30.896062][ T295] RBP: ffffc9000b6cfcb0 R08: ffffffff88972947 R09: 1ffffffff112e528
[ 30.904031][ T295] R10: dffffc0000000000 R11: fffffbfff112e529 R12: ffff88810f70b844
[ 30.912014][ T295] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000
[ 30.919983][ T295] FS: 0000555567fa9500(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000
[ 30.928909][ T295] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 30.935481][ T295] CR2: 0000000000000168 CR3: 000000012fa50000 CR4: 00000000003526b0
[ 30.943451][ T295] Kernel panic - not syncing: Fatal exception
[ 30.949812][ T295] Kernel Offset: disabled
[ 30.954138][ T295] Rebooting in 86400 seconds..