last executing test programs: 169.413283ms ago: executing program 1 (id=2): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x1]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x2, 0xb, 0x4, 0x5, 0x2, 0x0, 0x70bd27, 0x25dfdc02}, 0x10}}, 0x24000840) 158.594394ms ago: executing program 0 (id=1): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='pids.events\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') sendmmsg$inet6(r3, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r5, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r5, @ANYRES64=r4], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r5, 0x0) prlimit64(0x0, 0x6, 0x0, &(0x7f00000000c0)) 123.098808ms ago: executing program 1 (id=5): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r1, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) mount$fuse(0x0, 0x0, 0x0, 0x280449c, &(0x7f0000002140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) 91.532891ms ago: executing program 2 (id=3): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r1, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) mount$fuse(0x0, 0x0, 0x0, 0x280449c, &(0x7f0000002140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) 78.247092ms ago: executing program 1 (id=6): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) mount$fuse(0x0, 0x0, 0x0, 0x280449c, &(0x7f0000002140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) 78.024442ms ago: executing program 3 (id=4): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x1]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mount$incfs(&(0x7f00000007c0)='.\x00', &(0x7f0000000800)='./bus\x00', &(0x7f0000000840), 0x1004002, 0x0) chdir(&(0x7f00000001c0)='./bus\x00') mount(0x0, &(0x7f0000000040)='./cgroup\x00', 0x0, 0x200000, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) r2 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_JOIN_FILTERS(r2, 0x65, 0x6, 0x0, &(0x7f00000000c0)) 42.082156ms ago: executing program 3 (id=7): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='pids.events\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) prlimit64(0x0, 0x6, 0x0, &(0x7f00000000c0)) 0s ago: executing program 2 (id=8): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x1]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) r2 = fsopen(&(0x7f0000000040)='fuseblk\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='fuseblk\x00', &(0x7f0000000200)='fuseblk\x00', 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.79' (ED25519) to the list of known hosts. [ 26.648581][ T36] audit: type=1400 audit(1763046530.760:64): avc: denied { mounton } for pid=282 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 26.649769][ T282] cgroup: Unknown subsys name 'net' [ 26.674927][ T36] audit: type=1400 audit(1763046530.760:65): avc: denied { mount } for pid=282 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.705300][ T36] audit: type=1400 audit(1763046530.790:66): avc: denied { unmount } for pid=282 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.705470][ T282] cgroup: Unknown subsys name 'devices' [ 26.879357][ T282] cgroup: Unknown subsys name 'hugetlb' [ 26.886249][ T282] cgroup: Unknown subsys name 'rlimit' [ 26.977236][ T36] audit: type=1400 audit(1763046531.090:67): avc: denied { setattr } for pid=282 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 27.006466][ T36] audit: type=1400 audit(1763046531.090:68): avc: denied { mounton } for pid=282 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 27.039861][ T36] audit: type=1400 audit(1763046531.090:69): avc: denied { mount } for pid=282 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 27.048838][ T284] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 27.077001][ T36] audit: type=1400 audit(1763046531.190:70): avc: denied { relabelto } for pid=284 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 27.110063][ T36] audit: type=1400 audit(1763046531.190:71): avc: denied { write } for pid=284 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 27.181724][ T36] audit: type=1400 audit(1763046531.290:72): avc: denied { read } for pid=282 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 27.212798][ T36] audit: type=1400 audit(1763046531.290:73): avc: denied { open } for pid=282 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 27.213059][ T282] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 28.162912][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.172294][ T292] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.180915][ T292] bridge_slave_0: entered allmulticast mode [ 28.188347][ T292] bridge_slave_0: entered promiscuous mode [ 28.200452][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.207879][ T292] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.215582][ T292] bridge_slave_1: entered allmulticast mode [ 28.222181][ T292] bridge_slave_1: entered promiscuous mode [ 28.277562][ T290] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.285743][ T290] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.293964][ T290] bridge_slave_0: entered allmulticast mode [ 28.301665][ T290] bridge_slave_0: entered promiscuous mode [ 28.308371][ T290] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.315835][ T290] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.323848][ T290] bridge_slave_1: entered allmulticast mode [ 28.331325][ T290] bridge_slave_1: entered promiscuous mode [ 28.352152][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.360385][ T291] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.368019][ T291] bridge_slave_0: entered allmulticast mode [ 28.374169][ T291] bridge_slave_0: entered promiscuous mode [ 28.391964][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.399452][ T291] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.407894][ T291] bridge_slave_1: entered allmulticast mode [ 28.415217][ T291] bridge_slave_1: entered promiscuous mode [ 28.425429][ T289] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.433153][ T289] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.441009][ T289] bridge_slave_0: entered allmulticast mode [ 28.447561][ T289] bridge_slave_0: entered promiscuous mode [ 28.454655][ T289] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.462283][ T289] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.469479][ T289] bridge_slave_1: entered allmulticast mode [ 28.476202][ T289] bridge_slave_1: entered promiscuous mode [ 28.634199][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.641986][ T292] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.649527][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.656851][ T292] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.665408][ T290] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.672525][ T290] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.679951][ T290] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.687184][ T290] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.707333][ T289] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.714585][ T289] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.722021][ T289] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.729079][ T289] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.738762][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.746333][ T291] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.754019][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.761277][ T291] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.814538][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.822725][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.833757][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.842070][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.850270][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.858795][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.867861][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.878262][ T46] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.886011][ T46] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.898501][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.905565][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.913947][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.921894][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.932288][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.939560][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.949620][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.956877][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.001237][ T46] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.008585][ T46] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.021264][ T289] veth0_vlan: entered promiscuous mode [ 29.033081][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.042174][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.071051][ T289] veth1_macvtap: entered promiscuous mode [ 29.086362][ T292] veth0_vlan: entered promiscuous mode [ 29.100296][ T290] veth0_vlan: entered promiscuous mode [ 29.110994][ T292] veth1_macvtap: entered promiscuous mode [ 29.152189][ T291] veth0_vlan: entered promiscuous mode [ 29.161948][ T289] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 29.168948][ T290] veth1_macvtap: entered promiscuous mode [ 29.189625][ T291] veth1_macvtap: entered promiscuous mode [ 29.293557][ T342] incfs: Unexpected inode type [ 29.316036][ T291] ------------[ cut here ]------------ [ 29.321925][ T291] WARNING: CPU: 0 PID: 291 at fs/inode.c:340 drop_nlink+0xce/0x110 [ 29.331386][ T291] Modules linked in: [ 29.335394][ T291] CPU: 0 UID: 0 PID: 291 Comm: syz-executor Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 29.347211][ T291] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 29.357801][ T291] RIP: 0010:drop_nlink+0xce/0x110 [ 29.363121][ T291] Code: 04 00 00 be 08 00 00 00 e8 cf 54 ee ff f0 48 ff 83 b8 04 00 00 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc cc e8 32 e4 97 ff <0f> 0b eb 81 44 89 f1 80 e1 07 80 c1 03 38 c1 0f 8c 59 ff ff ff 4c [ 29.386337][ T291] RSP: 0018:ffffc9000b66fc60 EFLAGS: 00010293 [ 29.393768][ T291] RAX: ffffffff81ee1a7e RBX: ffff888131c53838 RCX: ffff88812ac53900 [ 29.402071][ T291] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 29.410383][ T291] RBP: ffffc9000b66fc88 R08: 0000000000000003 R09: 0000000000000004 [ 29.419367][ T291] R10: dffffc0000000000 R11: fffff520016cdf7c R12: dffffc0000000000 [ 29.427673][ T291] R13: 1ffff1102638a710 R14: ffff888131c53880 R15: 0000000000000000 [ 29.436538][ T291] FS: 0000555567f22500(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 29.445647][ T291] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 29.453337][ T291] CR2: 00000000000000da CR3: 0000000102b98000 CR4: 00000000003526b0 [ 29.462570][ T291] Call Trace: [ 29.465867][ T291] [ 29.468875][ T291] shmem_rmdir+0x5f/0x90 [ 29.473504][ T291] vfs_rmdir+0x3dd/0x560 [ 29.478550][ T291] incfs_kill_sb+0x109/0x230 [ 29.484142][ T291] deactivate_locked_super+0xd5/0x2a0 [ 29.491599][ T291] deactivate_super+0xb8/0xe0 [ 29.496407][ T291] cleanup_mnt+0x3f1/0x480 [ 29.501214][ T291] __cleanup_mnt+0x1d/0x40 [ 29.506201][ T291] task_work_run+0x1e0/0x250 [ 29.511089][ T291] ? __cfi_task_work_run+0x10/0x10 [ 29.517771][ T291] ? __x64_sys_umount+0x126/0x170 [ 29.522827][ T291] ? __cfi___x64_sys_umount+0x10/0x10 [ 29.528642][ T291] ? __kasan_check_read+0x15/0x20 [ 29.534076][ T291] resume_user_mode_work+0x36/0x50 [ 29.539478][ T291] syscall_exit_to_user_mode+0x64/0xb0 [ 29.545392][ T291] do_syscall_64+0x64/0xf0 [ 29.549985][ T291] ? clear_bhb_loop+0x50/0xa0 [ 29.554861][ T291] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 29.561152][ T291] RIP: 0033:0x7f97281909f7 [ 29.565987][ T291] Code: a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 a8 ff ff ff f7 d8 64 89 02 b8 [ 29.586733][ T291] RSP: 002b:00007ffc574c0678 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 29.595685][ T291] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f97281909f7 [ 29.604014][ T291] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffc574c0730 [ 29.613055][ T291] RBP: 00007ffc574c0730 R08: 0000000000000000 R09: 0000000000000000 [ 29.624518][ T291] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007ffc574c17c0 [ 29.634675][ T291] R13: 00007f9728211d7d R14: 0000000000007256 R15: 00007ffc574c1800 [ 29.644764][ T291] [ 29.648806][ T291] ---[ end trace 0000000000000000 ]--- [ 29.657164][ T291] ================================================================== [ 29.666350][ T291] BUG: KASAN: null-ptr-deref in ihold+0x24/0x70 [ 29.673233][ T291] Write of size 4 at addr 0000000000000168 by task syz-executor/291 [ 29.683633][ T291] [ 29.686090][ T291] CPU: 0 UID: 0 PID: 291 Comm: syz-executor Tainted: G W syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 29.686123][ T291] Tainted: [W]=WARN [ 29.686130][ T291] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 29.686141][ T291] Call Trace: [ 29.686147][ T291] [ 29.686155][ T291] __dump_stack+0x21/0x30 [ 29.686185][ T291] dump_stack_lvl+0x10c/0x190 [ 29.686208][ T291] ? __cfi_dump_stack_lvl+0x10/0x10 [ 29.686232][ T291] print_report+0x3d/0x70 [ 29.686252][ T291] kasan_report+0x163/0x1a0 [ 29.686272][ T291] ? ihold+0x24/0x70 [ 29.686454][ T291] ? _raw_spin_unlock+0x45/0x60 [ 29.686471][ T291] ? ihold+0x24/0x70 [ 29.686489][ T291] kasan_check_range+0x299/0x2a0 [ 29.686508][ T291] __kasan_check_write+0x18/0x20 [ 29.686532][ T291] ihold+0x24/0x70 [ 29.686551][ T291] vfs_rmdir+0x26a/0x560 [ 29.686572][ T291] incfs_kill_sb+0x109/0x230 [ 29.686597][ T291] deactivate_locked_super+0xd5/0x2a0 [ 29.686620][ T291] deactivate_super+0xb8/0xe0 [ 29.686639][ T291] cleanup_mnt+0x3f1/0x480 [ 29.686657][ T291] __cleanup_mnt+0x1d/0x40 [ 29.686674][ T291] task_work_run+0x1e0/0x250 [ 29.686693][ T291] ? __cfi_task_work_run+0x10/0x10 [ 29.686712][ T291] ? __x64_sys_umount+0x126/0x170 [ 29.686735][ T291] ? __cfi___x64_sys_umount+0x10/0x10 [ 29.686755][ T291] ? __kasan_check_read+0x15/0x20 [ 29.686778][ T291] resume_user_mode_work+0x36/0x50 [ 29.686796][ T291] syscall_exit_to_user_mode+0x64/0xb0 [ 29.686814][ T291] do_syscall_64+0x64/0xf0 [ 29.686833][ T291] ? clear_bhb_loop+0x50/0xa0 [ 29.686851][ T291] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 29.686885][ T291] RIP: 0033:0x7f97281909f7 [ 29.686901][ T291] Code: a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 a8 ff ff ff f7 d8 64 89 02 b8 [ 29.686915][ T291] RSP: 002b:00007ffc574c0678 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 29.686933][ T291] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f97281909f7 [ 29.686945][ T291] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffc574c0730 [ 29.686954][ T291] RBP: 00007ffc574c0730 R08: 0000000000000000 R09: 0000000000000000 [ 29.686963][ T291] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007ffc574c17c0 [ 29.686973][ T291] R13: 00007f9728211d7d R14: 0000000000007256 R15: 00007ffc574c1800 [ 29.686987][ T291] [ 29.686994][ T291] ================================================================== [ 29.970850][ T291] Disabling lock debugging due to kernel taint [ 29.977452][ T291] BUG: kernel NULL pointer dereference, address: 0000000000000168 [ 29.985441][ T291] #PF: supervisor write access in kernel mode [ 29.991585][ T291] #PF: error_code(0x0002) - not-present page [ 29.998856][ T291] PGD 8000000131b99067 P4D 8000000131b99067 PUD 0 [ 30.007352][ T291] Oops: Oops: 0002 [#1] PREEMPT SMP KASAN PTI [ 30.014165][ T291] CPU: 0 UID: 0 PID: 291 Comm: syz-executor Tainted: G B W syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 30.028631][ T291] Tainted: [B]=BAD_PAGE, [W]=WARN [ 30.033916][ T291] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 30.044737][ T291] RIP: 0010:ihold+0x2a/0x70 [ 30.049250][ T291] Code: f3 0f 1e fa 55 48 89 e5 41 56 53 48 89 fb e8 1d db 97 ff 48 8d bb 68 01 00 00 be 04 00 00 00 e8 8c 4b ee ff 41 be 01 00 00 00 44 0f c1 b3 68 01 00 00 41 ff c6 bf 02 00 00 00 44 89 f6 e8 2d [ 30.069387][ T291] RSP: 0018:ffffc9000b66fca0 EFLAGS: 00010246 [ 30.075542][ T291] RAX: ffff88812ac53900 RBX: 0000000000000000 RCX: ffff88812ac53900 [ 30.084923][ T291] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 30.093328][ T291] RBP: ffffc9000b66fcb0 R08: ffffffff88972947 R09: 1ffffffff112e528 [ 30.101913][ T291] R10: dffffc0000000000 R11: fffffbfff112e529 R12: ffff888131c53844 [ 30.110836][ T291] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 [ 30.118932][ T291] FS: 0000555567f22500(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 30.128115][ T291] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 30.134692][ T291] CR2: 0000000000000168 CR3: 0000000102b98000 CR4: 00000000003526b0 [ 30.142748][ T291] Call Trace: [ 30.146371][ T291] [ 30.149476][ T291] vfs_rmdir+0x26a/0x560 [ 30.153816][ T291] incfs_kill_sb+0x109/0x230 [ 30.158760][ T291] deactivate_locked_super+0xd5/0x2a0 [ 30.164658][ T291] deactivate_super+0xb8/0xe0 [ 30.169609][ T291] cleanup_mnt+0x3f1/0x480 [ 30.174696][ T291] __cleanup_mnt+0x1d/0x40 [ 30.179573][ T291] task_work_run+0x1e0/0x250 [ 30.184869][ T291] ? __cfi_task_work_run+0x10/0x10 [ 30.190080][ T291] ? __x64_sys_umount+0x126/0x170 [ 30.195479][ T291] ? __cfi___x64_sys_umount+0x10/0x10 [ 30.203520][ T291] ? __kasan_check_read+0x15/0x20 [ 30.209486][ T291] resume_user_mode_work+0x36/0x50 [ 30.215666][ T291] syscall_exit_to_user_mode+0x64/0xb0 [ 30.221566][ T291] do_syscall_64+0x64/0xf0 [ 30.226255][ T291] ? clear_bhb_loop+0x50/0xa0 [ 30.230947][ T291] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 30.236840][ T291] RIP: 0033:0x7f97281909f7 [ 30.241344][ T291] Code: a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 a8 ff ff ff f7 d8 64 89 02 b8 [ 30.261203][ T291] RSP: 002b:00007ffc574c0678 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 30.269817][ T291] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f97281909f7 [ 30.277963][ T291] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffc574c0730 [ 30.286988][ T291] RBP: 00007ffc574c0730 R08: 0000000000000000 R09: 0000000000000000 [ 30.295504][ T291] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007ffc574c17c0 [ 30.303668][ T291] R13: 00007f9728211d7d R14: 0000000000007256 R15: 00007ffc574c1800 [ 30.311734][ T291] [ 30.314739][ T291] Modules linked in: [ 30.318741][ T291] CR2: 0000000000000168 [ 30.323005][ T291] ---[ end trace 0000000000000000 ]--- [ 30.328503][ T291] RIP: 0010:ihold+0x2a/0x70 [ 30.333254][ T291] Code: f3 0f 1e fa 55 48 89 e5 41 56 53 48 89 fb e8 1d db 97 ff 48 8d bb 68 01 00 00 be 04 00 00 00 e8 8c 4b ee ff 41 be 01 00 00 00 44 0f c1 b3 68 01 00 00 41 ff c6 bf 02 00 00 00 44 89 f6 e8 2d [ 30.353847][ T291] RSP: 0018:ffffc9000b66fca0 EFLAGS: 00010246 [ 30.359906][ T291] RAX: ffff88812ac53900 RBX: 0000000000000000 RCX: ffff88812ac53900 [ 30.367874][ T291] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 30.375931][ T291] RBP: ffffc9000b66fcb0 R08: ffffffff88972947 R09: 1ffffffff112e528 [ 30.384859][ T291] R10: dffffc0000000000 R11: fffffbfff112e529 R12: ffff888131c53844 [ 30.392826][ T291] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 [ 30.401149][ T291] FS: 0000555567f22500(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 30.410075][ T291] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 30.416731][ T291] CR2: 0000000000000168 CR3: 0000000102b98000 CR4: 00000000003526b0 [ 30.424699][ T291] Kernel panic - not syncing: Fatal exception [ 30.431155][ T291] Kernel Offset: disabled [ 30.435471][ T291] Rebooting in 86400 seconds..