last executing test programs: 1.726621467s ago: executing program 4 (id=5): ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000006c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000700)=0x0) syz_open_procfs(r0, 0x0) syz_clone(0x1000, 0x0, 0x0, 0x0, 0x0, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r1 = socket$inet6(0xa, 0x3, 0x7) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x4020aeb2, &(0x7f0000000300)={0x0, 0x12c, @ioapic={0xffff1000, 0x5fa4, 0xfffff5a7, 0x7fffffff, 0x0, [{0x1, 0xc, 0x1, '\x00', 0x4}, {0xfe, 0x3, 0x0, '\x00', 0x6}, {0x7, 0xff, 0x3, '\x00', 0x9}, {0x51, 0x10, 0xd6, '\x00', 0x86}, {0x9, 0xb, 0x6, '\x00', 0x2}, {0xf, 0x1, 0xf9, '\x00', 0x3}, {0x2, 0xa, 0x50, '\x00', 0x6}, {0x8, 0x9, 0x8, '\x00', 0x8}, {0x4, 0x0, 0xa, '\x00', 0xff}, {0x8, 0xd6, 0x3, '\x00', 0x8}, {0x9e, 0x6, 0x8, '\x00', 0x3}, {0x2, 0x9, 0x0, '\x00', 0x7f}, {0x45, 0x50, 0xa}, {0xe, 0xfc, 0x0, '\x00', 0x1}, {0x8, 0x2, 0x6, '\x00', 0x9}, {0x7, 0x1b, 0xff, '\x00', 0x3}, {0x2, 0xe, 0xd6, '\x00', 0x7f}, {0xa, 0x0, 0xca, '\x00', 0x6}, {0x0, 0x60, 0x4, '\x00', 0x12}, {0xf, 0x8, 0x40, '\x00', 0xda}, {0x3, 0x3, 0x6, '\x00', 0x9}, {0x9, 0x3, 0x1, '\x00', 0x2}, {0xf9, 0x81, 0x4, '\x00', 0x7}, {0x8, 0xc, 0x0, '\x00', 0x6}]}}) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@dev={0xfe, 0x80, '\x00', 0x2c}, @in6=@loopback, 0x4e22, 0x7fff, 0x0, 0x0, 0xa, 0x0, 0x20}, {0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x4, 0x2}, {}, 0x0, 0x6e6bb9, 0x1}, {{@in=@broadcast, 0xfffffffc, 0x32}, 0x0, @in=@multicast1, 0x1, 0x0, 0x2, 0x7, 0x200, 0x2}}, 0xe8) writev(r1, &(0x7f00000002c0)=[{&(0x7f0000000580)="32b00a8b8dbab86a28dcdc24535498a2b2353d14cabcdadfc8e1e4eafcb6fcb942a0febdbe41670dcfd8c1d2ebc29284f13177ae170f849856f094a8ffdaa58300000000000087826b025488639085beb3ff5440f7cf99adbe7c830f757100f10cabf96479c183f72ffc71281da0254e7a57300567be9f03a3a93122cd1532b9f3d2630172c62278fe977692e05c2cdc0fff47db53669ad514b16a1bee5804f1bff9667eefcf52fc5c6d57ce9542bf906982c74a6a9bc6436bffb1deef901b5183a59f64d756dafe94124aa934b9012a8ce55965f86a31a85d280bd65463cbdfeb3e00f860fae9706c9184ea0169ae51", 0xf0}], 0x1) signalfd4(0xffffffffffffffff, &(0x7f0000000680)={[0x7]}, 0x8, 0x0) fstat(r1, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, 0x0, r2) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="1e00000005000000060000000100000000010000", @ANYRES32, @ANYBLOB="38b200"/20, @ANYRES32=0x0], 0x50) syz_usb_connect(0x0, 0x56, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000c9d1c40899040a50b7e70102030109024400020000000009049700010dd5ce0008240201000000000905"], 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x24) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bc82000000000000a6020000f8ffffffb703000008000000b703000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 1.641360688s ago: executing program 3 (id=4): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = getpid() sched_setscheduler(r0, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x10) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, &(0x7f0000000000)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000080)={0x80, 0x0, 0x0, 0x0, 0x7995}, 0xfff7, 0x0, 0x0, 0x48000000, 0x0, 0x0, 0x0}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x26, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x6, 0x4, 0xffd, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xc, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r4, 0x2000000, 0xe, 0x0, &(0x7f0000000600)="c9f7b98600"/14, 0x0, 0x7ffd, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 1.626992598s ago: executing program 2 (id=3): syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000004c0)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000040), 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) r3 = openat$incfs(r2, &(0x7f0000000000)='.pending_reads\x00', 0x0, 0x0) ioctl$TIOCL_GETKMSGREDIRECT(r3, 0x40046721, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020722500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sys_enter\x00', r4}, 0x10) renameat(r3, 0x0, r3, 0x0) sendmsg$NL80211_CMD_JOIN_OCB(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="200025bd7000fedbdf256c000000080003", @ANYRES32=0x0, @ANYBLOB="0100000012cc62"], 0x24}, 0x1, 0x0, 0x0, 0x810}, 0x4000000) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000200)="f7790066baa00066b86b4266ef66ba420066b8e20066ef0f29902cbb0000c4e2b1ba8c88d9000000666666440f38826b410f7842280f07b8010000000f01d9c4033921820f47a753fd", 0x49}], 0x1, 0x43, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, 0x0}], 0x1, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x3, &(0x7f0000000000)=[{0x14}, {0x2d}, {0x6}]}) mkdirat(r3, &(0x7f0000000480)='./file0/../file0/../file0/../file0\x00', 0x1e5) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000780)='devpts\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='devtmpfs\x00', 0x0, 0x0) chroot(&(0x7f0000000300)='./file0/../file0/../file0/../file0\x00') r6 = open_tree(0xffffffffffffff9c, &(0x7f00000002c0)='\x00', 0x89901) move_mount(r6, &(0x7f0000000400)='.\x00', 0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) pivot_root(&(0x7f0000000080)='./file0/../file0/../file0/../file0\x00', &(0x7f0000000380)='./file0/../file0/../file0/../file0\x00') 1.46021202s ago: executing program 1 (id=2): prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x200000000000008b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() syz_mount_image$fuse(0x0, &(0x7f0000001040)='./file2\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="05000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x50, 0xffffffffffffffff, 0x953f000) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r7 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)=ANY=[@ANYBLOB="700200001300290a000000000000000007000000", @ANYRES32=r6, @ANYBLOB="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"], 0x270}}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r8}, 0xc) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r3}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) syz_open_procfs(r0, &(0x7f00000001c0)='net/ip_vs_stats\x00') socket$inet_tcp(0x2, 0x1, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r9}, 0x10) r10 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ppoll(&(0x7f0000000080)=[{r10, 0x8100}], 0x1, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r10, 0x40505412, &(0x7f0000000240)={0x4, 0x8000, 0x0, 0x0, 0x1d}) 1.393697061s ago: executing program 0 (id=1): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_format(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, &(0x7f0000000000)=@urb_type_control={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48000000, 0x0, 0x0, 0x0}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x26, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) mkdir(&(0x7f00000003c0)='./file0\x00', 0x21) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x6, 0x4, 0xffd, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f9ffffffb703000000080000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xc, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r6, 0x2000000, 0xe, 0x0, &(0x7f0000000600)="c9f7b98600"/14, 0x0, 0x7ffd, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 0s ago: executing program 2 (id=6): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x18) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r4, &(0x7f0000000280)={0x1f, 0xffff, 0x3}, 0x6) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x3, 0x0, 0x3, 0x1, 0x0, 0x6c}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) getpid() r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000b9a9000000000000000000000000ab7a475fede72f689dbc452fb77837df2068acddd61f2bb88c6d9188fa1b93b8f4187e85648bf0855aa812edfbb30317dfb668354fc83c7452d49001804ba2131dfae6e315805f73008c395d3d660ce2a8891ae2aa0c5166aae3dcd05ba9ef0182c06e7d5e7f69bd675b8cc26a0a"], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r6}, 0x10) r7 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$uinput_user_dev(r7, &(0x7f0000000580)={'syz1\x00', {0x6fc9, 0x7, 0x5, 0x5}, 0x3e, [0x9, 0x3, 0xa, 0x2, 0x5334, 0x400, 0x80000000, 0x5, 0x8, 0x0, 0x6, 0xf5, 0x9, 0x39, 0x747d5a13, 0x8, 0xfffffb9a, 0xfffffffc, 0x4, 0xfffffffb, 0xbeb, 0x3, 0x4, 0xf252, 0x4, 0x800, 0x300000, 0x7, 0xe, 0x4623b, 0x0, 0x0, 0x1ff, 0x8000, 0x3ff, 0x3, 0xd, 0x4, 0xba55, 0x8da8, 0x2, 0x200, 0x2, 0x8, 0xe, 0xd75, 0x2, 0xde, 0x8, 0x9, 0x1, 0x199f, 0x8, 0x2, 0x9, 0x1, 0x4, 0x6, 0x1000, 0x5, 0x40, 0x9, 0x7, 0x1], [0x6, 0x1e, 0x3, 0x8000, 0xfffffffe, 0x3, 0x0, 0x400005, 0x7, 0xfffffffc, 0x4, 0x7fff, 0x72c, 0xc32, 0x3, 0x9, 0x10000, 0x400, 0x8001, 0x3, 0x1, 0x297, 0x5, 0x0, 0x981, 0x4, 0x100, 0x3ff, 0x0, 0xfffffffe, 0x0, 0x1000001, 0x10, 0xfffffff9, 0x0, 0x2, 0x1, 0x0, 0x6, 0x5, 0x800, 0xffff, 0x6, 0x96, 0xfffffff9, 0x101, 0x0, 0x2, 0x401, 0xc, 0x3, 0x379, 0x9, 0xe, 0x5, 0x7, 0x6, 0x2, 0x1, 0x1, 0x8, 0x6, 0x200, 0x3], [0x401, 0xc584, 0xffff, 0xcd4, 0x7, 0x20, 0x7, 0x4, 0x8, 0x10, 0x7, 0x9, 0xe8b, 0x5, 0x80000001, 0x7, 0xfffffffc, 0x1000, 0x2, 0x10, 0x1, 0xfffffff9, 0xe55, 0x10, 0x80000001, 0x4, 0x4, 0x5, 0x9, 0x2, 0x5, 0x80, 0x9, 0x9, 0x47, 0x2, 0x3, 0x4, 0x7, 0x6d7e, 0x3, 0x8, 0x8001, 0xbf23, 0x6, 0x8, 0x0, 0x0, 0x3ff, 0x3, 0x6, 0x100fffd, 0x2005, 0x7, 0x4, 0xea, 0x9, 0x5, 0x6, 0xd9, 0x0, 0x7d, 0x401, 0x5], [0x108e, 0x7fff, 0x3, 0x3, 0x88, 0x2, 0x6, 0x4, 0x10, 0x2, 0x763, 0xb, 0x402, 0x800, 0x4, 0x1000, 0x7f, 0x5, 0x3fa6, 0x4, 0x0, 0x5, 0x1e0, 0x4, 0xe47, 0x3, 0x3, 0x4, 0x200, 0x1000, 0x3b, 0x2, 0x5, 0x800, 0xa80a, 0x65f413f9, 0x4, 0x8, 0x8a8, 0x2, 0x3d, 0x7, 0x2, 0x4, 0x4, 0x10, 0x340a, 0x0, 0x7fff, 0xffffffff, 0xfffffff8, 0x401, 0x1, 0x200, 0x7, 0x4edf, 0xfffffffd, 0x7, 0xe, 0x2, 0xe, 0xf, 0x133, 0x6]}, 0x45c) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x12, 0xffffffffffffffff, 0x0) io_setup(0x2, &(0x7f0000002400)) write(0xffffffffffffffff, &(0x7f00000002c0)="fc0000001c000704ab5b2509b868030002ab087a0100000001481093210001c0f0030584050060100000000000039815fa2c53c28648000000b9d95662537a00bc000c00f0ff7f0000b400600033d44000040560916a0033f436313012dafd5a32e273fc83ab82d710f74cec184406f90d435ef8b29d3ef3d92c94170e5bba2e177312e081bea05d3a021e8ca062914a46ccfc510bb73c9455cdc8363ae4f5df77bc4cfd6239ec2a0f0d1bcae5fa0f5f9dcdd51af51af8502943283f4bb102b2b8f5566791cf190201ded815b2ccd243f395ed94e0ad91bd6433802e0784f2013cd1890058a10000c880ac801fe4af000049f0d4796f0000090548de", 0xfc) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.97' (ED25519) to the list of known hosts. [ 22.941450][ T28] audit: type=1400 audit(1748983306.552:64): avc: denied { mounton } for pid=274 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 22.942883][ T274] cgroup: Unknown subsys name 'net' [ 22.964101][ T28] audit: type=1400 audit(1748983306.562:65): avc: denied { mount } for pid=274 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.991337][ T28] audit: type=1400 audit(1748983306.582:66): avc: denied { unmount } for pid=274 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.991476][ T274] cgroup: Unknown subsys name 'devices' [ 23.133440][ T274] cgroup: Unknown subsys name 'hugetlb' [ 23.139036][ T274] cgroup: Unknown subsys name 'rlimit' [ 23.273020][ T28] audit: type=1400 audit(1748983306.892:67): avc: denied { setattr } for pid=274 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=258 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 23.296175][ T28] audit: type=1400 audit(1748983306.892:68): avc: denied { mounton } for pid=274 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 23.320874][ T28] audit: type=1400 audit(1748983306.892:69): avc: denied { mount } for pid=274 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 23.350617][ T276] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 23.359769][ T28] audit: type=1400 audit(1748983306.982:70): avc: denied { relabelto } for pid=276 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 23.385213][ T28] audit: type=1400 audit(1748983306.982:71): avc: denied { write } for pid=276 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 23.413881][ T28] audit: type=1400 audit(1748983307.032:72): avc: denied { read } for pid=274 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 23.414333][ T274] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 23.439383][ T28] audit: type=1400 audit(1748983307.032:73): avc: denied { open } for pid=274 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 25.304076][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.311138][ T283] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.318710][ T283] device bridge_slave_0 entered promiscuous mode [ 25.326448][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.333516][ T283] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.341000][ T283] device bridge_slave_1 entered promiscuous mode [ 25.364470][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.371512][ T286] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.378960][ T286] device bridge_slave_0 entered promiscuous mode [ 25.397107][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.404280][ T286] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.411982][ T286] device bridge_slave_1 entered promiscuous mode [ 25.468221][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.475351][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.482786][ T285] device bridge_slave_0 entered promiscuous mode [ 25.491172][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.498244][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.505712][ T285] device bridge_slave_1 entered promiscuous mode [ 25.516133][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.523190][ T282] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.530547][ T282] device bridge_slave_0 entered promiscuous mode [ 25.539051][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.546139][ T282] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.553577][ T282] device bridge_slave_1 entered promiscuous mode [ 25.611405][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.618505][ T284] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.626041][ T284] device bridge_slave_0 entered promiscuous mode [ 25.633043][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.640089][ T284] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.647640][ T284] device bridge_slave_1 entered promiscuous mode [ 25.797743][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.804810][ T282] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.812082][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.819098][ T282] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.833657][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.840692][ T286] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.847955][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.854984][ T286] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.864483][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.871497][ T283] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.878775][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.885826][ T283] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.919126][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.926224][ T285] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.933502][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.940524][ T285] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.950998][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.958044][ T284] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.965314][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.972367][ T284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.004857][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 26.012693][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.020000][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.027488][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.034964][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.042215][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.049362][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.056635][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.063860][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.070984][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.078323][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.097731][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 26.105363][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 26.112890][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 26.120265][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 26.128654][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.135722][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.143440][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 26.151553][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.158605][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.166005][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 26.174241][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.181261][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.188650][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 26.196820][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.203839][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.211145][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 26.219355][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.226399][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.257071][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 26.265230][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.272349][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.280273][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 26.288418][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 26.317696][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 26.326144][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 26.334508][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 26.342764][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 26.350728][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 26.358496][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 26.366035][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 26.374470][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 26.382816][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.389823][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.397205][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 26.405616][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 26.413839][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.420848][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.428215][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 26.435699][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 26.443239][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 26.451285][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 26.459324][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 26.467437][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 26.475609][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 26.483976][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 26.492122][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.499135][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.519529][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 26.527906][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 26.536344][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.543398][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.552831][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 26.560983][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 26.569089][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 26.577515][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 26.585883][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 26.594155][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 26.607471][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 26.615522][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.627796][ T286] device veth0_vlan entered promiscuous mode [ 26.635074][ T283] device veth0_vlan entered promiscuous mode [ 26.643021][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 26.650447][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 26.657894][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 26.666216][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.674393][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 26.682577][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 26.690509][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 26.698174][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 26.724273][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 26.732374][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 26.740300][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 26.748747][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 26.756834][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 26.765611][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 26.774043][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 26.782237][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.790401][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 26.798465][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.806587][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 26.814027][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 26.821442][ T285] device veth0_vlan entered promiscuous mode [ 26.831495][ T283] device veth1_macvtap entered promiscuous mode [ 26.841299][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 26.849640][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 26.864263][ T286] device veth1_macvtap entered promiscuous mode [ 26.875706][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 26.883972][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.892323][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 26.899894][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 26.908496][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 26.916624][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.924841][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 26.932632][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 26.950989][ T282] device veth0_vlan entered promiscuous mode [ 26.962805][ T284] device veth0_vlan entered promiscuous mode [ 26.970596][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.979398][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.979663][ T286] request_module fs-gadgetfs succeeded, but still no fs? [ 26.989532][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 27.003343][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 27.012326][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 27.020526][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 27.029029][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 27.037451][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 27.045981][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 27.054257][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 27.061941][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 27.073250][ T285] device veth1_macvtap entered promiscuous mode [ 27.092787][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 27.101351][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 27.110095][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 27.118699][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 27.128068][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 27.144024][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 27.154724][ T284] device veth1_macvtap entered promiscuous mode [ 27.169192][ T282] device veth1_macvtap entered promiscuous mode [ 27.187157][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 27.201392][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 27.210120][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 27.221111][ T314] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 27.267399][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 27.279533][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 27.301384][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 27.310024][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 27.319061][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 27.327552][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 27.456603][ T310] usb 5-1: new high-speed USB device number 2 using dummy_hcd [ 28.395214][ T28] kauditd_printk_skb: 48 callbacks suppressed [ 28.395233][ T28] audit: type=1400 audit(1748983311.822:122): avc: denied { ioctl } for pid=316 comm="syz.1.2" path="socket:[16393]" dev="sockfs" ino=16393 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 28.426395][ T324] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.721816][ T28] audit: type=1400 audit(1748983312.122:123): avc: denied { mount } for pid=321 comm="syz.0.1" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 28.743536][ T310] usb 5-1: Using ep0 maxpacket: 8 [ 28.779266][ T28] audit: type=1400 audit(1748983312.392:124): avc: denied { unmount } for pid=285 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 28.805636][ T285] ------------[ cut here ]------------ [ 28.807186][ T28] audit: type=1400 audit(1748983312.392:125): avc: denied { unmount } for pid=285 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 28.811128][ T285] WARNING: CPU: 1 PID: 285 at fs/inode.c:332 drop_nlink+0xc5/0x110 [ 28.811177][ T285] Modules linked in: [ 28.811192][ T285] CPU: 1 PID: 285 Comm: syz-executor Not tainted 6.1.138-syzkaller-00049-g5b87067cdd87 #0 [ 28.811213][ T285] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 28.811227][ T285] RIP: 0010:drop_nlink+0xc5/0x110 [ 28.811256][ T285] Code: 1b 48 8d bb b8 04 00 00 be 08 00 00 00 e8 63 ee f0 ff f0 48 ff 83 b8 04 00 00 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 1b 93 ac ff <0f> 0b eb 86 44 89 f1 80 e1 07 80 c1 03 38 c1 0f 8c 5e ff ff ff 4c [ 28.811272][ T285] RSP: 0018:ffffc9000db0fab8 EFLAGS: 00010293 [ 28.811289][ T285] RAX: ffffffff81c35df5 RBX: ffff88813320e288 RCX: ffff88812336bcc0 [ 28.831900][ T28] audit: type=1400 audit(1748983312.392:126): avc: denied { unmount } for pid=285 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 28.839343][ T285] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 28.862593][ T310] usb 5-1: config 0 has an invalid interface number: 151 but max is 1 [ 28.863454][ T285] RBP: ffffc9000db0fae0 R08: 0000000000000004 R09: 0000000000000003 [ 28.868488][ T310] usb 5-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 28.888050][ T285] R10: fffff52001b61f48 R11: 1ffff92001b61f48 R12: dffffc0000000000 [ 28.888067][ T285] R13: 1ffff11026641c5a R14: ffff88813320e2d0 R15: 0000000000000000 [ 28.888080][ T285] FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 28.888096][ T285] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 28.888109][ T285] CR2: 00007fa2b08e8710 CR3: 00000001342db000 CR4: 00000000003506a0 [ 28.888125][ T285] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 28.914462][ T310] usb 5-1: config 0 has 1 interface, different from the descriptor's value: 2 [ 28.922346][ T285] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 28.940426][ T310] usb 5-1: config 0 has no interface number 0 [ 28.946438][ T285] Call Trace: [ 28.946444][ T285] [ 28.946450][ T285] shmem_rmdir+0x5b/0x90 [ 28.946476][ T285] vfs_rmdir+0x393/0x500 [ 28.981899][ T310] usb 5-1: config 0 interface 151 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 28.988405][ T285] incfs_kill_sb+0x105/0x220 [ 29.012602][ T310] usb 5-1: New USB device found, idVendor=0499, idProduct=500a, bcdDevice=e7.b7 [ 29.013302][ T285] deactivate_locked_super+0xb5/0x120 [ 29.021221][ T310] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 29.027291][ T285] deactivate_super+0xaf/0xe0 [ 29.031792][ T310] usb 5-1: Product: syz [ 29.034300][ T285] cleanup_mnt+0x45f/0x4e0 [ 29.038489][ T310] usb 5-1: Manufacturer: syz [ 29.042756][ T285] ? __kasan_slab_free+0x11/0x20 [ 29.042783][ T285] __cleanup_mnt+0x19/0x20 [ 29.053719][ T310] usb 5-1: SerialNumber: syz [ 29.057930][ T285] task_work_run+0x1db/0x240 [ 29.076743][ T310] usb 5-1: config 0 descriptor?? [ 29.080338][ T285] ? __cfi_task_work_run+0x10/0x10 [ 29.080365][ T285] ? free_nsproxy+0x21f/0x270 [ 29.096022][ T310] snd-usb-audio: probe of 5-1:0.151 failed with error -2 [ 29.098213][ T285] do_exit+0xa1d/0x2650 [ 29.142958][ T285] ? __cfi_do_exit+0x10/0x10 [ 29.147658][ T285] ? __kasan_check_write+0x14/0x20 [ 29.152878][ T285] ? _raw_spin_lock_irq+0x8f/0xe0 [ 29.157925][ T285] ? __cfi__raw_spin_lock_irq+0x10/0x10 [ 29.163550][ T285] ? xfd_validate_state+0x70/0x150 [ 29.164107][ T305] udevd[305]: error opening ATTR{/sys/devices/platform/dummy_hcd.4/usb5/5-1/5-1:0.151/sound/card0/controlC0/../uevent} for writing: No such file or directory [ 29.168682][ T285] ? zap_other_threads+0x2c1/0x2f0 [ 29.168712][ T285] do_group_exit+0x210/0x2d0 [ 29.194217][ T285] __x64_sys_exit_group+0x3f/0x40 [ 29.199254][ T285] x64_sys_call+0x7b4/0x9a0 [ 29.203771][ T285] do_syscall_64+0x4c/0xa0 [ 29.208185][ T285] ? clear_bhb_loop+0x15/0x70 [ 29.212866][ T285] ? clear_bhb_loop+0x15/0x70 [ 29.217537][ T285] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 29.223447][ T285] RIP: 0033:0x7fa2afb8e969 [ 29.227867][ T285] Code: Unable to access opcode bytes at 0x7fa2afb8e93f. [ 29.234885][ T285] RSP: 002b:00007ffed450c848 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 29.243304][ T285] RAX: ffffffffffffffda RBX: 00007fa2afc1090f RCX: 00007fa2afb8e969 [ 29.251268][ T285] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000001 [ 29.259255][ T285] RBP: 0000000000000016 R08: 00007ffed450a5e6 R09: 00007ffed450db00 [ 29.267262][ T285] R10: 000000000000000a R11: 0000000000000246 R12: 00007ffed450db00 [ 29.275250][ T285] R13: 00007fa2afc1089d R14: 000055555860d4a8 R15: 00007ffed450fcc0 [ 29.283252][ T285] [ 29.286277][ T285] ---[ end trace 0000000000000000 ]--- [ 29.327487][ T285] ================================================================== [ 29.335582][ T285] BUG: KASAN: null-ptr-deref in ihold+0x20/0x60 [ 29.341840][ T285] Write of size 4 at addr 0000000000000170 by task syz-executor/285 [ 29.349826][ T285] [ 29.352147][ T285] CPU: 0 PID: 285 Comm: syz-executor Tainted: G W 6.1.138-syzkaller-00049-g5b87067cdd87 #0 [ 29.363505][ T285] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 29.373571][ T285] Call Trace: [ 29.376840][ T285] [ 29.379765][ T285] __dump_stack+0x21/0x24 [ 29.384105][ T285] dump_stack_lvl+0xee/0x150 [ 29.388700][ T285] ? __cfi_dump_stack_lvl+0x8/0x8 [ 29.393728][ T285] ? ihold+0x20/0x60 [ 29.397623][ T285] ? ihold+0x20/0x60 [ 29.401517][ T285] print_report+0x3d/0x60 [ 29.405835][ T285] kasan_report+0x122/0x150 [ 29.410425][ T285] ? ihold+0x20/0x60 [ 29.414330][ T285] kasan_check_range+0x280/0x290 [ 29.419265][ T285] __kasan_check_write+0x14/0x20 [ 29.424202][ T285] ihold+0x20/0x60 [ 29.427922][ T285] vfs_rmdir+0x25f/0x500 [ 29.432159][ T285] incfs_kill_sb+0x105/0x220 [ 29.436738][ T285] deactivate_locked_super+0xb5/0x120 [ 29.442188][ T285] deactivate_super+0xaf/0xe0 [ 29.446853][ T285] cleanup_mnt+0x45f/0x4e0 [ 29.451263][ T285] ? __kasan_slab_free+0x11/0x20 [ 29.456186][ T285] __cleanup_mnt+0x19/0x20 [ 29.460592][ T285] task_work_run+0x1db/0x240 [ 29.465171][ T285] ? __cfi_task_work_run+0x10/0x10 [ 29.470274][ T285] ? free_nsproxy+0x21f/0x270 [ 29.474946][ T285] do_exit+0xa1d/0x2650 [ 29.479099][ T285] ? __cfi_do_exit+0x10/0x10 [ 29.483690][ T285] ? __kasan_check_write+0x14/0x20 [ 29.488828][ T285] ? _raw_spin_lock_irq+0x8f/0xe0 [ 29.493853][ T285] ? __cfi__raw_spin_lock_irq+0x10/0x10 [ 29.499391][ T285] ? xfd_validate_state+0x70/0x150 [ 29.504510][ T285] ? zap_other_threads+0x2c1/0x2f0 [ 29.509617][ T285] do_group_exit+0x210/0x2d0 [ 29.514213][ T285] __x64_sys_exit_group+0x3f/0x40 [ 29.519240][ T285] x64_sys_call+0x7b4/0x9a0 [ 29.523747][ T285] do_syscall_64+0x4c/0xa0 [ 29.528158][ T285] ? clear_bhb_loop+0x15/0x70 [ 29.532832][ T285] ? clear_bhb_loop+0x15/0x70 [ 29.537498][ T285] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 29.543481][ T285] RIP: 0033:0x7fa2afb8e969 [ 29.547982][ T285] Code: Unable to access opcode bytes at 0x7fa2afb8e93f. [ 29.554999][ T285] RSP: 002b:00007ffed450c848 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 29.563582][ T285] RAX: ffffffffffffffda RBX: 00007fa2afc1090f RCX: 00007fa2afb8e969 [ 29.571549][ T285] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000001 [ 29.579531][ T285] RBP: 0000000000000016 R08: 00007ffed450a5e6 R09: 00007ffed450db00 [ 29.587509][ T285] R10: 000000000000000a R11: 0000000000000246 R12: 00007ffed450db00 [ 29.595483][ T285] R13: 00007fa2afc1089d R14: 000055555860d4a8 R15: 00007ffed450fcc0 [ 29.603460][ T285] [ 29.606469][ T285] ================================================================== [ 29.616735][ T28] audit: type=1400 audit(1748983313.232:127): avc: denied { unmount } for pid=284 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 29.661890][ T285] Disabling lock debugging due to kernel taint [ 29.672878][ T285] BUG: kernel NULL pointer dereference, address: 0000000000000170 [ 29.680697][ T285] #PF: supervisor write access in kernel mode [ 29.686757][ T285] #PF: error_code(0x0002) - not-present page [ 29.692823][ T285] PGD 0 P4D 0 [ 29.693064][ T28] audit: type=1400 audit(1748983313.292:128): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 29.696289][ T285] Oops: 0002 [#1] PREEMPT SMP KASAN [ 29.696307][ T285] CPU: 1 PID: 285 Comm: syz-executor Tainted: G B W 6.1.138-syzkaller-00049-g5b87067cdd87 #0 [ 29.734517][ T285] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 29.741316][ T28] audit: type=1400 audit(1748983313.292:129): avc: denied { search } for pid=84 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 29.744579][ T285] RIP: 0010:ihold+0x26/0x60 [ 29.744616][ T285] Code: 33 36 7c df 55 48 89 e5 41 56 53 48 89 fb e8 81 8a ac ff 48 8d bb 70 01 00 00 be 04 00 00 00 e8 a0 e5 f0 ff 41 be 01 00 00 00 44 0f c1 b3 70 01 00 00 41 ff c6 bf 02 00 00 00 44 89 f6 e8 71 [ 29.783604][ T310] usb 5-1: USB disconnect, device number 2 [ 29.789928][ T285] RSP: 0018:ffffc9000db0faf8 EFLAGS: 00010246 [ 29.789952][ T285] RAX: ffff88812336bc00 RBX: 0000000000000000 RCX: ffff88812336bcc0 [ 29.803689][ T28] audit: type=1400 audit(1748983313.292:130): avc: denied { write } for pid=84 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 29.809784][ T285] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 29.809799][ T285] RBP: ffffc9000db0fb08 R08: dffffc0000000000 R09: fffffbfff0f2cafd [ 29.831251][ T28] audit: type=1400 audit(1748983313.292:131): avc: denied { add_name } for pid=84 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 29.838910][ T285] R10: fffffbfff0f2cafd R11: 1ffffffff0f2cafc R12: ffff88813320e294 [ 29.838928][ T285] R13: dffffc0000000000 R14: 0000000000000001 R15: 0000000000000000 [ 29.838942][ T285] FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 29.892172][ T285] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 29.898743][ T285] CR2: 0000000000000170 CR3: 0000000134325000 CR4: 00000000003506a0 [ 29.906702][ T285] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 29.914657][ T285] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 29.922607][ T285] Call Trace: [ 29.925868][ T285] [ 29.928782][ T285] vfs_rmdir+0x25f/0x500 [ 29.933015][ T285] incfs_kill_sb+0x105/0x220 [ 29.937590][ T285] deactivate_locked_super+0xb5/0x120 [ 29.942965][ T285] deactivate_super+0xaf/0xe0 [ 29.947630][ T285] cleanup_mnt+0x45f/0x4e0 [ 29.952043][ T285] ? __kasan_slab_free+0x11/0x20 [ 29.956969][ T285] __cleanup_mnt+0x19/0x20 [ 29.961371][ T285] task_work_run+0x1db/0x240 [ 29.965943][ T285] ? __cfi_task_work_run+0x10/0x10 [ 29.971034][ T285] ? free_nsproxy+0x21f/0x270 [ 29.975700][ T285] do_exit+0xa1d/0x2650 [ 29.979850][ T285] ? __cfi_do_exit+0x10/0x10 [ 29.984427][ T285] ? __kasan_check_write+0x14/0x20 [ 29.989543][ T285] ? _raw_spin_lock_irq+0x8f/0xe0 [ 29.994556][ T285] ? __cfi__raw_spin_lock_irq+0x10/0x10 [ 30.000184][ T285] ? xfd_validate_state+0x70/0x150 [ 30.005288][ T285] ? zap_other_threads+0x2c1/0x2f0 [ 30.010391][ T285] do_group_exit+0x210/0x2d0 [ 30.015077][ T285] __x64_sys_exit_group+0x3f/0x40 [ 30.020155][ T285] x64_sys_call+0x7b4/0x9a0 [ 30.024647][ T285] do_syscall_64+0x4c/0xa0 [ 30.029072][ T285] ? clear_bhb_loop+0x15/0x70 [ 30.033735][ T285] ? clear_bhb_loop+0x15/0x70 [ 30.038421][ T285] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 30.044335][ T285] RIP: 0033:0x7fa2afb8e969 [ 30.048736][ T285] Code: Unable to access opcode bytes at 0x7fa2afb8e93f. [ 30.055759][ T285] RSP: 002b:00007ffed450c848 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 30.064161][ T285] RAX: ffffffffffffffda RBX: 00007fa2afc1090f RCX: 00007fa2afb8e969 [ 30.072126][ T285] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000001 [ 30.080101][ T285] RBP: 0000000000000016 R08: 00007ffed450a5e6 R09: 00007ffed450db00 [ 30.088060][ T285] R10: 000000000000000a R11: 0000000000000246 R12: 00007ffed450db00 [ 30.096019][ T285] R13: 00007fa2afc1089d R14: 000055555860d4a8 R15: 00007ffed450fcc0 [ 30.104003][ T285] [ 30.107045][ T285] Modules linked in: [ 30.110936][ T285] CR2: 0000000000000170 [ 30.115074][ T285] ---[ end trace 0000000000000000 ]--- [ 30.120518][ T285] RIP: 0010:ihold+0x26/0x60 [ 30.125028][ T285] Code: 33 36 7c df 55 48 89 e5 41 56 53 48 89 fb e8 81 8a ac ff 48 8d bb 70 01 00 00 be 04 00 00 00 e8 a0 e5 f0 ff 41 be 01 00 00 00 44 0f c1 b3 70 01 00 00 41 ff c6 bf 02 00 00 00 44 89 f6 e8 71 [ 30.144617][ T285] RSP: 0018:ffffc9000db0faf8 EFLAGS: 00010246 [ 30.150670][ T285] RAX: ffff88812336bc00 RBX: 0000000000000000 RCX: ffff88812336bcc0 [ 30.158636][ T285] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 30.166601][ T285] RBP: ffffc9000db0fb08 R08: dffffc0000000000 R09: fffffbfff0f2cafd [ 30.174564][ T285] R10: fffffbfff0f2cafd R11: 1ffffffff0f2cafc R12: ffff88813320e294 [ 30.182531][ T285] R13: dffffc0000000000 R14: 0000000000000001 R15: 0000000000000000 [ 30.190508][ T285] FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 30.199956][ T285] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 30.206527][ T285] CR2: 0000000000000170 CR3: 0000000134325000 CR4: 00000000003506a0 [ 30.214497][ T285] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 30.222460][ T285] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 30.230424][ T285] Kernel panic - not syncing: Fatal exception [ 30.236676][ T285] Kernel Offset: disabled [ 30.240987][ T285] Rebooting in 86400 seconds..