last executing test programs:
169.413283ms ago: executing program 1 (id=2):
rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x1]}}, 0x0, 0x8, &(0x7f0000000300))
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0)
write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118)
syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00')
ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4})
sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0)
r2 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x2, 0xb, 0x4, 0x5, 0x2, 0x0, 0x70bd27, 0x25dfdc02}, 0x10}}, 0x24000840)
158.594394ms ago: executing program 0 (id=1):
rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300))
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='pids.events\x00', 0x275a, 0x0)
write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4})
sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00')
sendmmsg$inet6(r3, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4)
mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0)
rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300))
r4 = socket$inet6_tcp(0xa, 0x1, 0x0)
r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0)
write$UHID_CREATE2(r5, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r5, @ANYRES64=r4], 0x118)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r5, 0x0)
prlimit64(0x0, 0x6, 0x0, &(0x7f00000000c0))
123.098808ms ago: executing program 1 (id=5):
rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300))
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8, @ANYRES64=r0], 0x118)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, 0xffffffffffffffff, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4})
sendmmsg$inet6(r1, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0)
write(r0, 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4})
sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendmmsg$inet6(r3, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4)
mount$fuse(0x0, 0x0, 0x0, 0x280449c, &(0x7f0000002140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}})
91.532891ms ago: executing program 2 (id=3):
rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300))
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8, @ANYRES64=r0], 0x118)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, 0xffffffffffffffff, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4})
sendmmsg$inet6(r1, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0)
write(r0, 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00')
ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4})
sendmmsg$inet6(r2, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4)
mount$fuse(0x0, 0x0, 0x0, 0x280449c, &(0x7f0000002140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}})
78.247092ms ago: executing program 1 (id=6):
rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300))
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0)
write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4})
sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4)
mount$fuse(0x0, 0x0, 0x0, 0x280449c, &(0x7f0000002140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}})
78.024442ms ago: executing program 3 (id=4):
rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x1]}}, 0x0, 0x8, &(0x7f0000000300))
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0)
mkdir(&(0x7f00000000c0)='./bus\x00', 0x0)
mount$incfs(&(0x7f00000007c0)='.\x00', &(0x7f0000000800)='./bus\x00', &(0x7f0000000840), 0x1004002, 0x0)
chdir(&(0x7f00000001c0)='./bus\x00')
mount(0x0, &(0x7f0000000040)='./cgroup\x00', 0x0, 0x200000, 0x0)
write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0)
syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00')
ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4})
r2 = socket$can_raw(0x1d, 0x3, 0x1)
getsockopt$CAN_RAW_JOIN_FILTERS(r2, 0x65, 0x6, 0x0, &(0x7f00000000c0))
42.082156ms ago: executing program 3 (id=7):
rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300))
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='pids.events\x00', 0x275a, 0x0)
write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0)
ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4})
sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4})
sendmmsg$inet6(r2, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4)
prlimit64(0x0, 0x6, 0x0, &(0x7f00000000c0))
0s ago: executing program 2 (id=8):
rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x1]}}, 0x0, 0x8, &(0x7f0000000300))
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0)
write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0)
syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00')
ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4})
r2 = fsopen(&(0x7f0000000040)='fuseblk\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0)
fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='fuseblk\x00', &(0x7f0000000200)='fuseblk\x00', 0x0)
kernel console output (not intermixed with test programs):
Warning: Permanently added '10.128.1.79' (ED25519) to the list of known hosts.
[ 26.648581][ T36] audit: type=1400 audit(1763046530.760:64): avc: denied { mounton } for pid=282 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1
[ 26.649769][ T282] cgroup: Unknown subsys name 'net'
[ 26.674927][ T36] audit: type=1400 audit(1763046530.760:65): avc: denied { mount } for pid=282 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[ 26.705300][ T36] audit: type=1400 audit(1763046530.790:66): avc: denied { unmount } for pid=282 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[ 26.705470][ T282] cgroup: Unknown subsys name 'devices'
[ 26.879357][ T282] cgroup: Unknown subsys name 'hugetlb'
[ 26.886249][ T282] cgroup: Unknown subsys name 'rlimit'
[ 26.977236][ T36] audit: type=1400 audit(1763046531.090:67): avc: denied { setattr } for pid=282 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 27.006466][ T36] audit: type=1400 audit(1763046531.090:68): avc: denied { mounton } for pid=282 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1
[ 27.039861][ T36] audit: type=1400 audit(1763046531.090:69): avc: denied { mount } for pid=282 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1
[ 27.048838][ T284] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped).
[ 27.077001][ T36] audit: type=1400 audit(1763046531.190:70): avc: denied { relabelto } for pid=284 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t"
Setting up swapspace version 1, size = 127995904 bytes
[ 27.110063][ T36] audit: type=1400 audit(1763046531.190:71): avc: denied { write } for pid=284 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t"
[ 27.181724][ T36] audit: type=1400 audit(1763046531.290:72): avc: denied { read } for pid=282 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t"
[ 27.212798][ T36] audit: type=1400 audit(1763046531.290:73): avc: denied { open } for pid=282 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t"
[ 27.213059][ T282] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k
[ 28.162912][ T292] bridge0: port 1(bridge_slave_0) entered blocking state
[ 28.172294][ T292] bridge0: port 1(bridge_slave_0) entered disabled state
[ 28.180915][ T292] bridge_slave_0: entered allmulticast mode
[ 28.188347][ T292] bridge_slave_0: entered promiscuous mode
[ 28.200452][ T292] bridge0: port 2(bridge_slave_1) entered blocking state
[ 28.207879][ T292] bridge0: port 2(bridge_slave_1) entered disabled state
[ 28.215582][ T292] bridge_slave_1: entered allmulticast mode
[ 28.222181][ T292] bridge_slave_1: entered promiscuous mode
[ 28.277562][ T290] bridge0: port 1(bridge_slave_0) entered blocking state
[ 28.285743][ T290] bridge0: port 1(bridge_slave_0) entered disabled state
[ 28.293964][ T290] bridge_slave_0: entered allmulticast mode
[ 28.301665][ T290] bridge_slave_0: entered promiscuous mode
[ 28.308371][ T290] bridge0: port 2(bridge_slave_1) entered blocking state
[ 28.315835][ T290] bridge0: port 2(bridge_slave_1) entered disabled state
[ 28.323848][ T290] bridge_slave_1: entered allmulticast mode
[ 28.331325][ T290] bridge_slave_1: entered promiscuous mode
[ 28.352152][ T291] bridge0: port 1(bridge_slave_0) entered blocking state
[ 28.360385][ T291] bridge0: port 1(bridge_slave_0) entered disabled state
[ 28.368019][ T291] bridge_slave_0: entered allmulticast mode
[ 28.374169][ T291] bridge_slave_0: entered promiscuous mode
[ 28.391964][ T291] bridge0: port 2(bridge_slave_1) entered blocking state
[ 28.399452][ T291] bridge0: port 2(bridge_slave_1) entered disabled state
[ 28.407894][ T291] bridge_slave_1: entered allmulticast mode
[ 28.415217][ T291] bridge_slave_1: entered promiscuous mode
[ 28.425429][ T289] bridge0: port 1(bridge_slave_0) entered blocking state
[ 28.433153][ T289] bridge0: port 1(bridge_slave_0) entered disabled state
[ 28.441009][ T289] bridge_slave_0: entered allmulticast mode
[ 28.447561][ T289] bridge_slave_0: entered promiscuous mode
[ 28.454655][ T289] bridge0: port 2(bridge_slave_1) entered blocking state
[ 28.462283][ T289] bridge0: port 2(bridge_slave_1) entered disabled state
[ 28.469479][ T289] bridge_slave_1: entered allmulticast mode
[ 28.476202][ T289] bridge_slave_1: entered promiscuous mode
[ 28.634199][ T292] bridge0: port 2(bridge_slave_1) entered blocking state
[ 28.641986][ T292] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 28.649527][ T292] bridge0: port 1(bridge_slave_0) entered blocking state
[ 28.656851][ T292] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 28.665408][ T290] bridge0: port 2(bridge_slave_1) entered blocking state
[ 28.672525][ T290] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 28.679951][ T290] bridge0: port 1(bridge_slave_0) entered blocking state
[ 28.687184][ T290] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 28.707333][ T289] bridge0: port 2(bridge_slave_1) entered blocking state
[ 28.714585][ T289] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 28.722021][ T289] bridge0: port 1(bridge_slave_0) entered blocking state
[ 28.729079][ T289] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 28.738762][ T291] bridge0: port 2(bridge_slave_1) entered blocking state
[ 28.746333][ T291] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 28.754019][ T291] bridge0: port 1(bridge_slave_0) entered blocking state
[ 28.761277][ T291] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 28.814538][ T46] bridge0: port 1(bridge_slave_0) entered disabled state
[ 28.822725][ T46] bridge0: port 2(bridge_slave_1) entered disabled state
[ 28.833757][ T46] bridge0: port 1(bridge_slave_0) entered disabled state
[ 28.842070][ T46] bridge0: port 2(bridge_slave_1) entered disabled state
[ 28.850270][ T46] bridge0: port 1(bridge_slave_0) entered disabled state
[ 28.858795][ T46] bridge0: port 2(bridge_slave_1) entered disabled state
[ 28.867861][ T46] bridge0: port 2(bridge_slave_1) entered disabled state
[ 28.878262][ T46] bridge0: port 1(bridge_slave_0) entered blocking state
[ 28.886011][ T46] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 28.898501][ T13] bridge0: port 2(bridge_slave_1) entered blocking state
[ 28.905565][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 28.913947][ T13] bridge0: port 1(bridge_slave_0) entered blocking state
[ 28.921894][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 28.932288][ T13] bridge0: port 2(bridge_slave_1) entered blocking state
[ 28.939560][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 28.949620][ T13] bridge0: port 2(bridge_slave_1) entered blocking state
[ 28.956877][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 29.001237][ T46] bridge0: port 1(bridge_slave_0) entered blocking state
[ 29.008585][ T46] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 29.021264][ T289] veth0_vlan: entered promiscuous mode
[ 29.033081][ T13] bridge0: port 2(bridge_slave_1) entered blocking state
[ 29.042174][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 29.071051][ T289] veth1_macvtap: entered promiscuous mode
[ 29.086362][ T292] veth0_vlan: entered promiscuous mode
[ 29.100296][ T290] veth0_vlan: entered promiscuous mode
[ 29.110994][ T292] veth1_macvtap: entered promiscuous mode
[ 29.152189][ T291] veth0_vlan: entered promiscuous mode
[ 29.161948][ T289] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality.
[ 29.168948][ T290] veth1_macvtap: entered promiscuous mode
[ 29.189625][ T291] veth1_macvtap: entered promiscuous mode
[ 29.293557][ T342] incfs: Unexpected inode type
[ 29.316036][ T291] ------------[ cut here ]------------
[ 29.321925][ T291] WARNING: CPU: 0 PID: 291 at fs/inode.c:340 drop_nlink+0xce/0x110
[ 29.331386][ T291] Modules linked in:
[ 29.335394][ T291] CPU: 0 UID: 0 PID: 291 Comm: syz-executor Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e
[ 29.347211][ T291] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
[ 29.357801][ T291] RIP: 0010:drop_nlink+0xce/0x110
[ 29.363121][ T291] Code: 04 00 00 be 08 00 00 00 e8 cf 54 ee ff f0 48 ff 83 b8 04 00 00 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc cc e8 32 e4 97 ff <0f> 0b eb 81 44 89 f1 80 e1 07 80 c1 03 38 c1 0f 8c 59 ff ff ff 4c
[ 29.386337][ T291] RSP: 0018:ffffc9000b66fc60 EFLAGS: 00010293
[ 29.393768][ T291] RAX: ffffffff81ee1a7e RBX: ffff888131c53838 RCX: ffff88812ac53900
[ 29.402071][ T291] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 29.410383][ T291] RBP: ffffc9000b66fc88 R08: 0000000000000003 R09: 0000000000000004
[ 29.419367][ T291] R10: dffffc0000000000 R11: fffff520016cdf7c R12: dffffc0000000000
[ 29.427673][ T291] R13: 1ffff1102638a710 R14: ffff888131c53880 R15: 0000000000000000
[ 29.436538][ T291] FS: 0000555567f22500(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000
[ 29.445647][ T291] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 29.453337][ T291] CR2: 00000000000000da CR3: 0000000102b98000 CR4: 00000000003526b0
[ 29.462570][ T291] Call Trace:
[ 29.465867][ T291]
[ 29.468875][ T291] shmem_rmdir+0x5f/0x90
[ 29.473504][ T291] vfs_rmdir+0x3dd/0x560
[ 29.478550][ T291] incfs_kill_sb+0x109/0x230
[ 29.484142][ T291] deactivate_locked_super+0xd5/0x2a0
[ 29.491599][ T291] deactivate_super+0xb8/0xe0
[ 29.496407][ T291] cleanup_mnt+0x3f1/0x480
[ 29.501214][ T291] __cleanup_mnt+0x1d/0x40
[ 29.506201][ T291] task_work_run+0x1e0/0x250
[ 29.511089][ T291] ? __cfi_task_work_run+0x10/0x10
[ 29.517771][ T291] ? __x64_sys_umount+0x126/0x170
[ 29.522827][ T291] ? __cfi___x64_sys_umount+0x10/0x10
[ 29.528642][ T291] ? __kasan_check_read+0x15/0x20
[ 29.534076][ T291] resume_user_mode_work+0x36/0x50
[ 29.539478][ T291] syscall_exit_to_user_mode+0x64/0xb0
[ 29.545392][ T291] do_syscall_64+0x64/0xf0
[ 29.549985][ T291] ? clear_bhb_loop+0x50/0xa0
[ 29.554861][ T291] entry_SYSCALL_64_after_hwframe+0x76/0x7e
[ 29.561152][ T291] RIP: 0033:0x7f97281909f7
[ 29.565987][ T291] Code: a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 a8 ff ff ff f7 d8 64 89 02 b8
[ 29.586733][ T291] RSP: 002b:00007ffc574c0678 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6
[ 29.595685][ T291] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f97281909f7
[ 29.604014][ T291] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffc574c0730
[ 29.613055][ T291] RBP: 00007ffc574c0730 R08: 0000000000000000 R09: 0000000000000000
[ 29.624518][ T291] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007ffc574c17c0
[ 29.634675][ T291] R13: 00007f9728211d7d R14: 0000000000007256 R15: 00007ffc574c1800
[ 29.644764][ T291]
[ 29.648806][ T291] ---[ end trace 0000000000000000 ]---
[ 29.657164][ T291] ==================================================================
[ 29.666350][ T291] BUG: KASAN: null-ptr-deref in ihold+0x24/0x70
[ 29.673233][ T291] Write of size 4 at addr 0000000000000168 by task syz-executor/291
[ 29.683633][ T291]
[ 29.686090][ T291] CPU: 0 UID: 0 PID: 291 Comm: syz-executor Tainted: G W syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e
[ 29.686123][ T291] Tainted: [W]=WARN
[ 29.686130][ T291] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
[ 29.686141][ T291] Call Trace:
[ 29.686147][ T291]
[ 29.686155][ T291] __dump_stack+0x21/0x30
[ 29.686185][ T291] dump_stack_lvl+0x10c/0x190
[ 29.686208][ T291] ? __cfi_dump_stack_lvl+0x10/0x10
[ 29.686232][ T291] print_report+0x3d/0x70
[ 29.686252][ T291] kasan_report+0x163/0x1a0
[ 29.686272][ T291] ? ihold+0x24/0x70
[ 29.686454][ T291] ? _raw_spin_unlock+0x45/0x60
[ 29.686471][ T291] ? ihold+0x24/0x70
[ 29.686489][ T291] kasan_check_range+0x299/0x2a0
[ 29.686508][ T291] __kasan_check_write+0x18/0x20
[ 29.686532][ T291] ihold+0x24/0x70
[ 29.686551][ T291] vfs_rmdir+0x26a/0x560
[ 29.686572][ T291] incfs_kill_sb+0x109/0x230
[ 29.686597][ T291] deactivate_locked_super+0xd5/0x2a0
[ 29.686620][ T291] deactivate_super+0xb8/0xe0
[ 29.686639][ T291] cleanup_mnt+0x3f1/0x480
[ 29.686657][ T291] __cleanup_mnt+0x1d/0x40
[ 29.686674][ T291] task_work_run+0x1e0/0x250
[ 29.686693][ T291] ? __cfi_task_work_run+0x10/0x10
[ 29.686712][ T291] ? __x64_sys_umount+0x126/0x170
[ 29.686735][ T291] ? __cfi___x64_sys_umount+0x10/0x10
[ 29.686755][ T291] ? __kasan_check_read+0x15/0x20
[ 29.686778][ T291] resume_user_mode_work+0x36/0x50
[ 29.686796][ T291] syscall_exit_to_user_mode+0x64/0xb0
[ 29.686814][ T291] do_syscall_64+0x64/0xf0
[ 29.686833][ T291] ? clear_bhb_loop+0x50/0xa0
[ 29.686851][ T291] entry_SYSCALL_64_after_hwframe+0x76/0x7e
[ 29.686885][ T291] RIP: 0033:0x7f97281909f7
[ 29.686901][ T291] Code: a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 a8 ff ff ff f7 d8 64 89 02 b8
[ 29.686915][ T291] RSP: 002b:00007ffc574c0678 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6
[ 29.686933][ T291] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f97281909f7
[ 29.686945][ T291] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffc574c0730
[ 29.686954][ T291] RBP: 00007ffc574c0730 R08: 0000000000000000 R09: 0000000000000000
[ 29.686963][ T291] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007ffc574c17c0
[ 29.686973][ T291] R13: 00007f9728211d7d R14: 0000000000007256 R15: 00007ffc574c1800
[ 29.686987][ T291]
[ 29.686994][ T291] ==================================================================
[ 29.970850][ T291] Disabling lock debugging due to kernel taint
[ 29.977452][ T291] BUG: kernel NULL pointer dereference, address: 0000000000000168
[ 29.985441][ T291] #PF: supervisor write access in kernel mode
[ 29.991585][ T291] #PF: error_code(0x0002) - not-present page
[ 29.998856][ T291] PGD 8000000131b99067 P4D 8000000131b99067 PUD 0
[ 30.007352][ T291] Oops: Oops: 0002 [#1] PREEMPT SMP KASAN PTI
[ 30.014165][ T291] CPU: 0 UID: 0 PID: 291 Comm: syz-executor Tainted: G B W syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e
[ 30.028631][ T291] Tainted: [B]=BAD_PAGE, [W]=WARN
[ 30.033916][ T291] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
[ 30.044737][ T291] RIP: 0010:ihold+0x2a/0x70
[ 30.049250][ T291] Code: f3 0f 1e fa 55 48 89 e5 41 56 53 48 89 fb e8 1d db 97 ff 48 8d bb 68 01 00 00 be 04 00 00 00 e8 8c 4b ee ff 41 be 01 00 00 00 44 0f c1 b3 68 01 00 00 41 ff c6 bf 02 00 00 00 44 89 f6 e8 2d
[ 30.069387][ T291] RSP: 0018:ffffc9000b66fca0 EFLAGS: 00010246
[ 30.075542][ T291] RAX: ffff88812ac53900 RBX: 0000000000000000 RCX: ffff88812ac53900
[ 30.084923][ T291] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 30.093328][ T291] RBP: ffffc9000b66fcb0 R08: ffffffff88972947 R09: 1ffffffff112e528
[ 30.101913][ T291] R10: dffffc0000000000 R11: fffffbfff112e529 R12: ffff888131c53844
[ 30.110836][ T291] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000
[ 30.118932][ T291] FS: 0000555567f22500(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000
[ 30.128115][ T291] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 30.134692][ T291] CR2: 0000000000000168 CR3: 0000000102b98000 CR4: 00000000003526b0
[ 30.142748][ T291] Call Trace:
[ 30.146371][ T291]
[ 30.149476][ T291] vfs_rmdir+0x26a/0x560
[ 30.153816][ T291] incfs_kill_sb+0x109/0x230
[ 30.158760][ T291] deactivate_locked_super+0xd5/0x2a0
[ 30.164658][ T291] deactivate_super+0xb8/0xe0
[ 30.169609][ T291] cleanup_mnt+0x3f1/0x480
[ 30.174696][ T291] __cleanup_mnt+0x1d/0x40
[ 30.179573][ T291] task_work_run+0x1e0/0x250
[ 30.184869][ T291] ? __cfi_task_work_run+0x10/0x10
[ 30.190080][ T291] ? __x64_sys_umount+0x126/0x170
[ 30.195479][ T291] ? __cfi___x64_sys_umount+0x10/0x10
[ 30.203520][ T291] ? __kasan_check_read+0x15/0x20
[ 30.209486][ T291] resume_user_mode_work+0x36/0x50
[ 30.215666][ T291] syscall_exit_to_user_mode+0x64/0xb0
[ 30.221566][ T291] do_syscall_64+0x64/0xf0
[ 30.226255][ T291] ? clear_bhb_loop+0x50/0xa0
[ 30.230947][ T291] entry_SYSCALL_64_after_hwframe+0x76/0x7e
[ 30.236840][ T291] RIP: 0033:0x7f97281909f7
[ 30.241344][ T291] Code: a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 a8 ff ff ff f7 d8 64 89 02 b8
[ 30.261203][ T291] RSP: 002b:00007ffc574c0678 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6
[ 30.269817][ T291] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f97281909f7
[ 30.277963][ T291] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffc574c0730
[ 30.286988][ T291] RBP: 00007ffc574c0730 R08: 0000000000000000 R09: 0000000000000000
[ 30.295504][ T291] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007ffc574c17c0
[ 30.303668][ T291] R13: 00007f9728211d7d R14: 0000000000007256 R15: 00007ffc574c1800
[ 30.311734][ T291]
[ 30.314739][ T291] Modules linked in:
[ 30.318741][ T291] CR2: 0000000000000168
[ 30.323005][ T291] ---[ end trace 0000000000000000 ]---
[ 30.328503][ T291] RIP: 0010:ihold+0x2a/0x70
[ 30.333254][ T291] Code: f3 0f 1e fa 55 48 89 e5 41 56 53 48 89 fb e8 1d db 97 ff 48 8d bb 68 01 00 00 be 04 00 00 00 e8 8c 4b ee ff 41 be 01 00 00 00 44 0f c1 b3 68 01 00 00 41 ff c6 bf 02 00 00 00 44 89 f6 e8 2d
[ 30.353847][ T291] RSP: 0018:ffffc9000b66fca0 EFLAGS: 00010246
[ 30.359906][ T291] RAX: ffff88812ac53900 RBX: 0000000000000000 RCX: ffff88812ac53900
[ 30.367874][ T291] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 30.375931][ T291] RBP: ffffc9000b66fcb0 R08: ffffffff88972947 R09: 1ffffffff112e528
[ 30.384859][ T291] R10: dffffc0000000000 R11: fffffbfff112e529 R12: ffff888131c53844
[ 30.392826][ T291] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000
[ 30.401149][ T291] FS: 0000555567f22500(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000
[ 30.410075][ T291] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 30.416731][ T291] CR2: 0000000000000168 CR3: 0000000102b98000 CR4: 00000000003526b0
[ 30.424699][ T291] Kernel panic - not syncing: Fatal exception
[ 30.431155][ T291] Kernel Offset: disabled
[ 30.435471][ T291] Rebooting in 86400 seconds..