last executing test programs: 48.168711844s ago: executing program 3 (id=975): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x80, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) unshare(0x22020600) connect$vsock_stream(r1, 0x0, 0x0) 48.115005429s ago: executing program 3 (id=978): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000000440)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8014) r4 = socket$inet_udp(0x2, 0x2, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f0000000180)='./binderfs/binder0\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) getsockopt$inet_buf(r4, 0x0, 0x30, 0x0, &(0x7f0000000180)) 48.070737143s ago: executing program 3 (id=980): madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xe) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) syz_clone(0x2800400, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x80020000, 0x0, 0x0, 0x0, 0x0, 0x0) 47.964759464s ago: executing program 3 (id=986): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x80, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) sendmmsg$inet(r4, &(0x7f0000000f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x408e0) shutdown(r4, 0x1) 47.867794154s ago: executing program 3 (id=989): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r5 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)=0x10) 47.816261219s ago: executing program 3 (id=993): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) pivot_root(&(0x7f0000000500)='./file0\x00', 0x0) 32.70801344s ago: executing program 32 (id=993): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) pivot_root(&(0x7f0000000500)='./file0\x00', 0x0) 9.845014356s ago: executing program 1 (id=2983): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000140)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r2, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r5, 0x29, 0x6, 0x0, 0x0) 9.80108634s ago: executing program 1 (id=2986): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000040)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x80, 0x0, 0x0) r3 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r3, 0x11b, 0x2, &(0x7f0000000040)=0x20, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) bind$xdp(r3, &(0x7f0000000100)={0x2c, 0x0, r5}, 0x10) 9.756194484s ago: executing program 1 (id=2991): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r3, &(0x7f0000005800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8014) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_RELOAD_REGDB(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, r5, 0x421, 0x70bd2a, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0xc35d4f6d52288271}, 0x200048c4) 9.711150519s ago: executing program 1 (id=2994): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8000) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) write(r5, 0x0, 0x0) rt_sigqueueinfo(0x0, 0x21, &(0x7f0000000ac0)={0x0, 0x9, 0xfffffffe}) 9.681466862s ago: executing program 1 (id=2997): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r5 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)=0x10) 9.640228026s ago: executing program 1 (id=3000): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r3 = fsopen(&(0x7f0000000100)='configfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r3, 0x6, 0x0, 0x0, 0x0) r4 = fsmount(r3, 0x0, 0x87) fchdir(r4) r5 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) getdents(r5, &(0x7f0000000180)=""/49, 0x2d) getdents(r5, &(0x7f00000001c0)=""/254, 0xfe) 897.24565ms ago: executing program 2 (id=3359): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendmmsg$inet(r2, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40040) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xf, 0x4008032, 0xffffffffffffffff, 0x1c5ed000) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x8) madvise(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x15) 430.663837ms ago: executing program 2 (id=3373): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) write(r3, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r5 = fsopen(&(0x7f00000000c0)='devtmpfs\x00', 0x1) fsconfig$FSCONFIG_SET_STRING(r5, 0x1, &(0x7f0000000080)='^\t*([%\x8e\x00', &(0x7f0000000200)='@!\x00', 0x0) 366.355663ms ago: executing program 2 (id=3378): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x29, 0x0, 0x18) 350.044785ms ago: executing program 0 (id=3379): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x0, 0x0) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r3) ptrace$setregs(0xd, r3, 0x0, &(0x7f00000003c0)="18607651149d7b10b4024fbbdc08899b8f589df2dbb5d7a8d1b36cfab675cb3976ee8100e2878c9cfa178cac130eb046eda93df39ed4b41924dc225ad4028dd63defb87d698be5c749450b350a789dcfc6b2d6a696b5026d1e52f19274566d1da0f353dd65e330ebf71c5e823f2753c5fd76724828ef31b353e71805205c3dceb44cc4c7b3664e29fb") ptrace$getregset(0x4205, r3, 0x200, &(0x7f0000000080)={&(0x7f00000000c0)=""/112, 0x70}) 300.84165ms ago: executing program 2 (id=3382): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) writev(r3, &(0x7f00000000c0)=[{&(0x7f0000000040)='k\r', 0x2}], 0x1) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r4, 0x6, 0x23, 0x0, &(0x7f0000000000)) 291.224511ms ago: executing program 0 (id=3383): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='blkio.bfq.io_wait_time_recursive\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r4, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) clock_gettime(0x0, &(0x7f0000000140)) 263.708404ms ago: executing program 2 (id=3385): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r4, &(0x7f0000005800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8014) syz_clone3(&(0x7f0000000080)={0x801400, &(0x7f0000000040), 0x0, 0x0, {0xa}, 0x0, 0x0, 0x0, 0x0}, 0x58) 251.182435ms ago: executing program 0 (id=3386): mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='binder\x00', 0x0, 0x0) rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='hugetlb.1GB.usage_in_bytes\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000000440)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8014) sendmmsg$inet6(r3, &(0x7f00000075c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40804) mount$overlay(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f00000003c0)={[{@xino_auto}, {@lowerdir={'lowerdir', 0x3d, './file0'}, 0x3a}], [], 0x2f}) 220.339838ms ago: executing program 4 (id=3387): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8=0x0, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="5c0100001500"], 0x15c}, 0x1, 0x0, 0x0, 0x800}, 0x0) 203.25637ms ago: executing program 2 (id=3388): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r3 = socket$inet_tcp(0x2, 0x1, 0x0) sendmmsg$inet(r3, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40040) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) sendmmsg$inet6(r2, &(0x7f0000003b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0xc040884) r5 = syz_io_uring_setup(0x48ce, &(0x7f0000000140)={0x0, 0x5e99, 0x3000, 0x3, 0x19a}, &(0x7f0000000040), &(0x7f0000000200)) ppoll(&(0x7f00000001c0)=[{r5, 0x20}], 0x1, 0x0, 0x0, 0x0) 179.032242ms ago: executing program 0 (id=3389): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) utimensat(0xffffffffffffffff, 0x0, &(0x7f0000001a40)={{}, {0x77359400}}, 0x0) 160.070114ms ago: executing program 0 (id=3390): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) unshare(0x60000600) r4 = socket(0x10, 0x803, 0x0) sendto(r4, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r4, &(0x7f0000000380)=[{{0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000dc0)=""/4096, 0x1000}, {&(0x7f0000000080)=""/93, 0x5d}, {&(0x7f0000000940)=""/263, 0x107}, {&(0x7f0000003700)=""/213, 0xd5}], 0x4}, 0x9}], 0x1, 0x40012160, 0x0) 152.947185ms ago: executing program 4 (id=3391): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) capset(&(0x7f0000000100)={0x20071026}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x81, 0xfffffffb}) mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) 107.49476ms ago: executing program 4 (id=3392): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000140)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = socket$inet_tcp(0x2, 0x1, 0x0) sendmmsg$inet(r4, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40040) r5 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000380)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r5, 0x4018620d, 0x0) 102.71646ms ago: executing program 0 (id=3393): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) sendmsg$sock(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x4040000) capset(&(0x7f00000001c0)={0x20071026}, &(0x7f0000000080)={0x0, 0x203}) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) syz_clone3(&(0x7f0000000140)={0x4000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 67.184233ms ago: executing program 4 (id=3394): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8=0x0, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r5 = socket$inet_icmp(0x2, 0x2, 0x1) ioctl$sock_inet_SIOCGIFNETMASK(r5, 0x891b, &(0x7f0000000140)={'pim6reg1\x00', {0x2, 0x0, @multicast1}}) 48.498605ms ago: executing program 4 (id=3395): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8=0x0, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mount$incfs(&(0x7f00000007c0)='.\x00', &(0x7f0000000800)='./bus\x00', &(0x7f0000000840), 0x1004002, 0x0) chdir(&(0x7f00000001c0)='./bus\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) 0s ago: executing program 4 (id=3396): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r3, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x37fe0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.75' (ED25519) to the list of known hosts. [ 25.150832][ T36] audit: type=1400 audit(1763513742.270:64): avc: denied { mounton } for pid=282 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 25.152284][ T282] cgroup: Unknown subsys name 'net' [ 25.173640][ T36] audit: type=1400 audit(1763513742.270:65): avc: denied { mount } for pid=282 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 25.200948][ T36] audit: type=1400 audit(1763513742.300:66): avc: denied { unmount } for pid=282 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 25.201213][ T282] cgroup: Unknown subsys name 'devices' [ 25.341442][ T282] cgroup: Unknown subsys name 'hugetlb' [ 25.347377][ T282] cgroup: Unknown subsys name 'rlimit' [ 25.502839][ T36] audit: type=1400 audit(1763513742.620:67): avc: denied { setattr } for pid=282 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 25.526057][ T36] audit: type=1400 audit(1763513742.620:68): avc: denied { mounton } for pid=282 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 25.541435][ T284] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 25.551026][ T36] audit: type=1400 audit(1763513742.620:69): avc: denied { mount } for pid=282 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 25.582633][ T36] audit: type=1400 audit(1763513742.680:70): avc: denied { relabelto } for pid=284 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 25.608058][ T36] audit: type=1400 audit(1763513742.680:71): avc: denied { write } for pid=284 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 25.613827][ T282] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 25.633657][ T36] audit: type=1400 audit(1763513742.730:72): avc: denied { read } for pid=282 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 25.667989][ T36] audit: type=1400 audit(1763513742.730:73): avc: denied { open } for pid=282 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 28.033532][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.040732][ T292] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.047821][ T292] bridge_slave_0: entered allmulticast mode [ 28.054360][ T292] bridge_slave_0: entered promiscuous mode [ 28.072072][ T289] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.079223][ T289] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.086527][ T289] bridge_slave_0: entered allmulticast mode [ 28.092938][ T289] bridge_slave_0: entered promiscuous mode [ 28.099169][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.106227][ T292] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.113380][ T292] bridge_slave_1: entered allmulticast mode [ 28.119833][ T292] bridge_slave_1: entered promiscuous mode [ 28.129570][ T289] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.136637][ T289] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.143793][ T289] bridge_slave_1: entered allmulticast mode [ 28.150110][ T289] bridge_slave_1: entered promiscuous mode [ 28.179129][ T290] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.186209][ T290] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.193518][ T290] bridge_slave_0: entered allmulticast mode [ 28.199925][ T290] bridge_slave_0: entered promiscuous mode [ 28.214628][ T290] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.221895][ T290] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.229043][ T290] bridge_slave_1: entered allmulticast mode [ 28.235323][ T290] bridge_slave_1: entered promiscuous mode [ 28.292857][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.299967][ T291] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.307062][ T291] bridge_slave_0: entered allmulticast mode [ 28.313605][ T291] bridge_slave_0: entered promiscuous mode [ 28.321729][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.328829][ T291] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.335908][ T291] bridge_slave_1: entered allmulticast mode [ 28.342747][ T291] bridge_slave_1: entered promiscuous mode [ 28.492242][ T289] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.499329][ T289] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.506640][ T289] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.513711][ T289] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.523463][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.530554][ T292] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.537859][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.544927][ T292] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.556885][ T290] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.564011][ T290] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.571324][ T290] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.578404][ T290] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.594472][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.601563][ T291] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.608877][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.615914][ T291] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.666232][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.673594][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.681079][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.688401][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.696543][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.703855][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.711524][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.718718][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.734597][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.741706][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.753444][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.760543][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.773581][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.780672][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.788252][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.795350][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.803266][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.810333][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.820701][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.827773][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.854645][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.861729][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.869842][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.876919][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.917612][ T291] veth0_vlan: entered promiscuous mode [ 28.938085][ T292] veth0_vlan: entered promiscuous mode [ 28.961054][ T290] veth0_vlan: entered promiscuous mode [ 28.969265][ T289] veth0_vlan: entered promiscuous mode [ 28.975066][ T291] veth1_macvtap: entered promiscuous mode [ 29.003804][ T292] veth1_macvtap: entered promiscuous mode [ 29.016335][ T290] veth1_macvtap: entered promiscuous mode [ 29.024473][ T289] veth1_macvtap: entered promiscuous mode [ 29.039464][ T291] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 29.151603][ T343] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 29.462163][ T377] netlink: 96 bytes leftover after parsing attributes in process `syz.1.18'. [ 29.837020][ T417] overlayfs: missing 'lowerdir' [ 29.846774][ T419] netlink: 'syz.0.42': attribute type 4 has an invalid length. [ 29.867310][ T419] netlink: 'syz.0.42': attribute type 5 has an invalid length. [ 29.879340][ T419] netlink: 3657 bytes leftover after parsing attributes in process `syz.0.42'. [ 30.041147][ T439] capability: warning: `syz.1.52' uses deprecated v2 capabilities in a way that may be insecure [ 30.136508][ T448] tmpfs: Unsupported parameter 'mpol' [ 30.203218][ T455] tipc: Started in network mode [ 30.208196][ T455] tipc: Node identity 4, cluster identity 4711 [ 30.237682][ T455] tipc: Node number set to 4 [ 30.248584][ T36] kauditd_printk_skb: 53 callbacks suppressed [ 30.248601][ T36] audit: type=1400 audit(1763513747.360:127): avc: denied { create } for pid=457 comm="syz.1.61" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 30.309083][ T36] audit: type=1400 audit(1763513747.380:128): avc: denied { read write } for pid=459 comm="syz.2.62" name="fuse" dev="devtmpfs" ino=23 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 30.341597][ T36] audit: type=1400 audit(1763513747.380:129): avc: denied { open } for pid=459 comm="syz.2.62" path="/dev/fuse" dev="devtmpfs" ino=23 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 30.373563][ T36] audit: type=1400 audit(1763513747.380:130): avc: denied { mounton } for pid=459 comm="syz.2.62" path="/5/file0" dev="tmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 30.396257][ T36] audit: type=1400 audit(1763513747.390:131): avc: denied { accept } for pid=457 comm="syz.1.61" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 30.434184][ T36] audit: type=1400 audit(1763513747.520:132): avc: denied { lock } for pid=469 comm="syz.0.67" path="socket:[4522]" dev="sockfs" ino=4522 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 30.469945][ T476] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=476 comm=syz.0.70 [ 30.578348][ T36] audit: type=1400 audit(1763513747.690:133): avc: denied { create } for pid=487 comm="syz.1.76" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 30.619214][ T493] capability: warning: `syz.0.79' uses 32-bit capabilities (legacy support in use) [ 30.637823][ T36] audit: type=1400 audit(1763513747.700:134): avc: denied { setopt } for pid=487 comm="syz.1.76" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 30.696016][ T36] audit: type=1400 audit(1763513747.780:135): avc: denied { create } for pid=495 comm="syz.1.80" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 30.720616][ T36] audit: type=1400 audit(1763513747.790:136): avc: denied { write } for pid=495 comm="syz.1.80" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 30.841354][ T519] fuse: Bad value for 'fd' [ 31.049566][ T544] netlink: 'syz.1.102': attribute type 16 has an invalid length. [ 31.060862][ T544] netlink: 63874 bytes leftover after parsing attributes in process `syz.1.102'. [ 31.066847][ T541] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 31.242511][ T565] tmpfs: Unsupported parameter 'mpol' [ 32.008436][ T648] cgroup: subsys name conflicts with all [ 32.312516][ T677] 9pnet_fd: Insufficient options for proto=fd [ 32.395788][ T688] process 'syz.1.173' launched './file0' with NULL argv: empty string added [ 32.456120][ T693] netlink: 72 bytes leftover after parsing attributes in process `syz.1.175'. [ 32.524925][ T702] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=41 sclass=netlink_xfrm_socket pid=702 comm=syz.1.180 [ 32.597800][ T710] ======================================================= [ 32.597800][ T710] WARNING: The mand mount option has been deprecated and [ 32.597800][ T710] and is ignored by this kernel. Remove the mand [ 32.597800][ T710] option from the mount to silence this warning. [ 32.597800][ T710] ======================================================= [ 32.663093][ T710] SELinux: security_context_str_to_sid (syste_uÝGй ‰:) failed with errno=-22 [ 32.776486][ T722] netlink: 12 bytes leftover after parsing attributes in process `syz.0.190'. [ 32.810684][ T726] x_tables: unsorted underflow at hook 1 [ 32.865161][ T730] overlayfs: missing 'lowerdir' [ 33.290417][ T777] kvm_intel: L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 33.564680][ T803] 9pnet_fd: Insufficient options for proto=fd [ 33.799568][ T840] /dev/nbd0: Can't lookup blockdev [ 34.197113][ T890] netlink: 'syz.1.271': attribute type 11 has an invalid length. [ 34.205312][ T890] netlink: 3657 bytes leftover after parsing attributes in process `syz.1.271'. [ 34.262730][ T900] netlink: 8 bytes leftover after parsing attributes in process `syz.0.276'. [ 34.317136][ T906] netlink: 268 bytes leftover after parsing attributes in process `syz.0.278'. [ 34.484232][ T924] netlink: 24 bytes leftover after parsing attributes in process `syz.2.286'. [ 34.858123][ T970] netlink: 9 bytes leftover after parsing attributes in process `syz.1.308'. [ 34.881438][ T970] gretap0: entered promiscuous mode [ 35.546749][ T36] kauditd_printk_skb: 46 callbacks suppressed [ 35.546767][ T36] audit: type=1400 audit(1763513752.660:183): avc: denied { name_bind } for pid=1062 comm="syz.3.353" src=3618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 35.581474][ T36] audit: type=1400 audit(1763513752.670:184): avc: denied { sqpoll } for pid=1064 comm="syz.1.354" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 35.616258][ T1070] overlayfs: option "workdir=./bus" is useless in a non-upper mount, ignore [ 35.632306][ T1070] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent [ 35.831590][ T1101] netlink: 'syz.3.370': attribute type 4 has an invalid length. [ 35.846048][ T1101] netlink: 17 bytes leftover after parsing attributes in process `syz.3.370'. [ 35.945372][ T36] audit: type=1400 audit(1763513753.060:185): avc: denied { write } for pid=1115 comm="syz.0.377" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 35.973285][ T36] audit: type=1400 audit(1763513753.080:186): avc: denied { bind } for pid=1113 comm="syz.2.378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 36.002118][ T1123] netlink: 'syz.0.381': attribute type 63 has an invalid length. [ 36.015730][ T1123] netlink: 5 bytes leftover after parsing attributes in process `syz.0.381'. [ 36.026510][ T1123] gretap0: entered allmulticast mode [ 36.043055][ T1123] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 36.203499][ T36] audit: type=1400 audit(1763513753.320:187): avc: denied { create } for pid=1139 comm="syz.1.388" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 36.230757][ T36] audit: type=1400 audit(1763513753.320:188): avc: denied { setopt } for pid=1139 comm="syz.1.388" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 36.258033][ T36] audit: type=1400 audit(1763513753.330:189): avc: denied { unmount } for pid=290 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 36.266672][ T1150] overlayfs: failed to resolve './file0': -2 [ 36.286268][ T36] audit: type=1400 audit(1763513753.340:190): avc: denied { bind } for pid=1144 comm="syz.0.390" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 36.330001][ T1157] netlink: 'syz.1.397': attribute type 11 has an invalid length. [ 36.542323][ T36] audit: type=1400 audit(1763513753.660:191): avc: denied { unmount } for pid=291 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 36.707218][ T1211] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=1211 comm=syz.1.424 [ 36.938726][ T36] audit: type=1400 audit(1763513754.050:192): avc: denied { bpf } for pid=1242 comm="syz.2.439" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 37.447146][ T1317] batadv_slave_1: entered promiscuous mode [ 37.453710][ T1315] batadv_slave_1: left promiscuous mode [ 37.556583][ T1333] netlink: 'syz.2.482': attribute type 63 has an invalid length. [ 37.578904][ T1333] netlink: 5 bytes leftover after parsing attributes in process `syz.2.482'. [ 37.587923][ T1333] gretap0: entered allmulticast mode [ 37.606195][ T1333] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 37.727117][ T1358] netlink: 84 bytes leftover after parsing attributes in process `syz.2.495'. [ 38.030234][ T813] tipc: Subscription rejected, illegal request [ 38.723531][ T1491] 9pnet: p9_errstr2errno: server reported unknown error [ 38.734978][ T1489] netlink: 20 bytes leftover after parsing attributes in process `syz.0.559'. [ 39.285277][ T1556] netlink: 24 bytes leftover after parsing attributes in process `syz.2.580'. [ 39.894831][ T1609] 9pnet: p9_errstr2errno: server reported unknown error 1844674407 [ 40.020375][ T1616] netlink: 268 bytes leftover after parsing attributes in process `syz.0.608'. [ 40.461339][ T1640] netlink: 12 bytes leftover after parsing attributes in process `syz.1.620'. [ 40.477955][ T1655] Zero length message leads to an empty skb [ 40.576274][ T36] kauditd_printk_skb: 11 callbacks suppressed [ 40.576294][ T36] audit: type=1400 audit(1763513757.690:204): avc: denied { getopt } for pid=1659 comm="syz.0.629" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 40.798966][ T1683] netlink: 104 bytes leftover after parsing attributes in process `syz.2.640'. [ 40.909332][ T1695] overlay: Unknown parameter 'hash' [ 41.009435][ T36] audit: type=1400 audit(1763513758.120:205): avc: denied { mounton } for pid=1700 comm="syz.0.650" path="/168/file0" dev="tmpfs" ino=1052 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=sock_file permissive=1 [ 41.162833][ T1710] netlink: 'syz.0.653': attribute type 17 has an invalid length. [ 41.173495][ T36] audit: type=1400 audit(1763513758.290:206): avc: denied { watch } for pid=1711 comm="syz.3.654" path="/140" dev="tmpfs" ino=867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 41.509125][ T1768] netlink: 'syz.2.681': attribute type 19 has an invalid length. [ 41.530029][ T1768] netlink: 5 bytes leftover after parsing attributes in process `syz.2.681'. [ 41.840373][ T36] audit: type=1400 audit(1763513758.960:207): avc: denied { setopt } for pid=1817 comm="syz.2.706" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 41.866479][ T36] audit: type=1400 audit(1763513758.980:208): avc: denied { watch_reads } for pid=1816 comm="syz.3.705" path="/156" dev="tmpfs" ino=967 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 41.949596][ T1832] netlink: 8 bytes leftover after parsing attributes in process `syz.3.712'. [ 42.258565][ T36] audit: type=1400 audit(1763513759.370:209): avc: denied { wake_alarm } for pid=1872 comm="syz.2.733" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 42.291963][ T1878] netlink: 12 bytes leftover after parsing attributes in process `syz.3.735'. [ 42.356763][ T1886] No source specified [ 42.360888][ T36] audit: type=1400 audit(1763513759.470:210): avc: denied { mounton } for pid=1885 comm="syz.3.739" path="/syzcgroup/unified/syz3" dev="cgroup2" ino=57 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=dir permissive=1 [ 42.432918][ T1895] 9pnet: Unknown protocol version 9 [ 42.488834][ T1902] futex_wake_op: syz.1.747 tries to shift op by -1; fix this program [ 42.572635][ T813] tipc: Subscription rejected, illegal request [ 42.615796][ T36] audit: type=1400 audit(1763513759.730:211): avc: denied { unmount } for pid=290 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 42.842208][ T1949] netlink: 56 bytes leftover after parsing attributes in process `syz.0.770'. [ 43.043882][ T36] audit: type=1400 audit(1763513760.160:212): avc: denied { bind } for pid=1975 comm="syz.3.783" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 43.068674][ T36] audit: type=1400 audit(1763513760.160:213): avc: denied { name_bind } for pid=1975 comm="syz.3.783" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 43.282924][ T2016] cgroup: Invalid name [ 43.378428][ T2033] tipc: Started in network mode [ 43.383486][ T2033] tipc: Node identity 5257efbdccf7, cluster identity 4711 [ 43.391011][ T2033] tipc: Enabled bearer , priority 0 [ 43.400502][ T2031] tipc: Disabling bearer [ 43.663612][ T2076] tmpfs: Bad value for 'fscontext' [ 43.828645][ T2101] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=1279 sclass=netlink_xfrm_socket pid=2101 comm=syz.1.844 [ 44.013315][ T2134] netlink: 388 bytes leftover after parsing attributes in process `syz.1.861'. [ 44.209105][ T2170] netlink: 4 bytes leftover after parsing attributes in process `syz.3.877'. [ 45.061407][ T2235] netlink: 12 bytes leftover after parsing attributes in process `syz.3.909'. [ 45.073580][ T2233] netlink: 52 bytes leftover after parsing attributes in process `syz.2.908'. [ 45.362534][ T2265] netlink: 4 bytes leftover after parsing attributes in process `syz.2.924'. [ 45.610273][ T36] kauditd_printk_skb: 17 callbacks suppressed [ 45.610292][ T36] audit: type=1400 audit(1763513762.730:231): avc: denied { mount } for pid=2308 comm="syz.2.946" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 45.646440][ T36] audit: type=1400 audit(1763513762.730:232): avc: denied { getopt } for pid=2312 comm="syz.1.947" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 45.672466][ T36] audit: type=1400 audit(1763513762.760:233): avc: denied { create } for pid=2311 comm="syz.3.948" name="file2" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 45.693784][ T36] audit: type=1400 audit(1763513762.760:234): avc: denied { unlink } for pid=290 comm="syz-executor" name="file2" dev="tmpfs" ino=1538 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 46.348403][ T2391] netlink: 836 bytes leftover after parsing attributes in process `syz.1.984'. [ 46.369603][ T36] audit: type=1400 audit(1763513763.480:235): avc: denied { create } for pid=2392 comm="syz.0.985" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 46.428932][ T2399] incfs: Options parsing error. -22 [ 46.452526][ T2399] incfs: mount failed -22 [ 47.081050][ T2434] 9pnet: p9_errstr2errno: server reported unknown error 18446744073 [ 47.147576][ T2436] IPv6: NLM_F_CREATE should be specified when creating new route [ 47.706010][ T2456] netlink: 'syz.1.1017': attribute type 11 has an invalid length. [ 47.719027][ T2456] netlink: 20 bytes leftover after parsing attributes in process `syz.1.1017'. [ 47.843212][ T36] audit: type=1400 audit(1763513764.960:236): avc: denied { mount } for pid=2460 comm="syz.0.1020" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 47.908844][ T36] audit: type=1400 audit(1763513765.010:237): avc: denied { unmount } for pid=289 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 47.958834][ T36] audit: type=1400 audit(1763513765.070:238): avc: denied { ioctl } for pid=2463 comm="syz.1.1021" path="socket:[15564]" dev="sockfs" ino=15564 ioctlcmd=0x8946 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 48.090640][ T2476] F2FS-fs (rnullb0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 48.108873][ T2476] F2FS-fs (rnullb0): Can't find valid F2FS filesystem in 1th superblock [ 48.117417][ T2476] F2FS-fs (rnullb0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 48.148820][ T2476] F2FS-fs (rnullb0): Can't find valid F2FS filesystem in 2th superblock [ 48.189378][ T2480] syz.2.1029 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 48.355588][ T2496] netlink: 24 bytes leftover after parsing attributes in process `syz.0.1037'. [ 48.501681][ T36] audit: type=1400 audit(1763513765.620:239): avc: denied { checkpoint_restore } for pid=2511 comm="syz.1.1045" capability=40 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 49.104129][ T2580] overlayfs: option "uuid=on" requires an upper fs, falling back to uuid=null. [ 49.128879][ T2580] overlayfs: missing 'lowerdir' [ 49.163554][ T2588] netlink: 72 bytes leftover after parsing attributes in process `syz.0.1082'. [ 49.559996][ T36] audit: type=1400 audit(1763513766.680:240): avc: denied { shutdown } for pid=2616 comm="syz.1.1097" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 49.970522][ T2657] netlink: 24 bytes leftover after parsing attributes in process `syz.0.1115'. [ 49.991120][ T2659] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1116'. [ 50.198855][ T9] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 50.358829][ T9] usb 2-1: Using ep0 maxpacket: 16 [ 50.365355][ T9] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 50.379929][ T9] usb 2-1: New USB device found, idVendor=0458, idProduct=5016, bcdDevice= 0.00 [ 50.396384][ T9] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 50.410233][ T9] usb 2-1: config 0 descriptor?? [ 50.627485][ T9] usbhid 2-1:0.0: can't add hid device: -71 [ 50.633936][ T9] usbhid 2-1:0.0: probe with driver usbhid failed with error -71 [ 50.646845][ T9] usb 2-1: USB disconnect, device number 2 [ 50.711239][ T2728] overlay: Unknown parameter '/' [ 51.208184][ T36] kauditd_printk_skb: 4 callbacks suppressed [ 51.208204][ T36] audit: type=1400 audit(1763513768.320:245): avc: denied { create } for pid=2763 comm="syz.0.1168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 51.781362][ T36] audit: type=1400 audit(1763513768.900:246): avc: denied { bind } for pid=2821 comm="syz.0.1195" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 53.376982][ T2947] netlink: 268 bytes leftover after parsing attributes in process `syz.1.1256'. [ 53.645389][ T2968] SELinux: security_context_str_to_sid (unconfined_u) failed with errno=-22 [ 54.450261][ T3031] tmpfs: Bad value for 'mpol' [ 54.487113][ T36] audit: type=1400 audit(1763513771.600:247): avc: denied { read } for pid=3032 comm="syz.1.1297" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 54.605197][ T3041] syz.1.1301 (3041): attempted to duplicate a private mapping with mremap. This is not supported. [ 55.047712][ T3070] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1315'. [ 55.716570][ T3113] netlink: 52 bytes leftover after parsing attributes in process `syz.0.1336'. [ 55.975289][ T3133] netlink: 96 bytes leftover after parsing attributes in process `syz.0.1346'. [ 56.677662][ T3172] 9pnet: Unknown protocol version 9 [ 56.862786][ T36] audit: type=1400 audit(1763513773.980:248): avc: denied { read } for pid=3182 comm="syz.1.1371" path="socket:[19591]" dev="sockfs" ino=19591 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 57.029160][ T3190] overlay: Unknown parameter 'fsname' [ 57.209864][ T3213] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1385'. [ 57.457335][ T3232] netlink: 'syz.2.1394': attribute type 4 has an invalid length. [ 57.465256][ T3232] netlink: 'syz.2.1394': attribute type 5 has an invalid length. [ 57.473318][ T3232] netlink: 3657 bytes leftover after parsing attributes in process `syz.2.1394'. [ 57.634544][ T3251] 9pnet: p9_errstr2errno: server reported unknown error 1844674407 [ 57.727816][ T3260] netlink: 268 bytes leftover after parsing attributes in process `syz.1.1407'. [ 58.029741][ T3293] netlink: 'syz.2.1423': attribute type 7 has an invalid length. [ 58.222102][ T36] audit: type=1400 audit(1763513775.340:249): avc: denied { ioctl } for pid=3312 comm="syz.2.1434" path="socket:[19861]" dev="sockfs" ino=19861 ioctlcmd=0x8946 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 58.356475][ T3327] No source specified [ 58.871467][ T3375] tipc: Started in network mode [ 58.876563][ T3375] tipc: Node identity 4, cluster identity 4711 [ 58.884666][ T3375] tipc: Node number set to 4 [ 59.140593][ T3404] netlink: 268 bytes leftover after parsing attributes in process `syz.2.1476'. [ 59.215248][ T3413] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=3413 comm=syz.0.1480 [ 59.445203][ T3438] incfs: Backing dir is not set, filesystem can't be mounted. [ 59.458962][ T3438] incfs: mount failed -2 [ 59.801919][ T3481] netlink: 20 bytes leftover after parsing attributes in process `syz.0.1514'. [ 59.839664][ T36] audit: type=1400 audit(1763514032.952:250): avc: denied { mount } for pid=3482 comm="syz.2.1515" name="/" dev="ramfs" ino=20573 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 60.810736][ T3590] netlink: 'syz.1.1568': attribute type 28 has an invalid length. [ 61.357108][ T36] audit: type=1400 audit(1763514034.462:251): avc: denied { read } for pid=3654 comm="syz.0.1600" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 61.389447][ T3658] overlayfs: missing 'lowerdir' [ 61.551922][ T36] audit: type=1326 audit(1763514034.662:252): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3671 comm="syz.0.1607" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f831c78f6c9 code=0x50000 [ 61.584590][ T36] audit: type=1326 audit(1763514034.692:253): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3671 comm="syz.0.1607" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f831c78f6c9 code=0x50000 [ 61.615111][ T36] audit: type=1326 audit(1763514034.692:254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3671 comm="syz.0.1607" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f831c78f6c9 code=0x50000 [ 61.641169][ T36] audit: type=1326 audit(1763514034.692:255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3671 comm="syz.0.1607" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f831c78f6c9 code=0x50000 [ 61.667134][ T36] audit: type=1326 audit(1763514034.692:256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3671 comm="syz.0.1607" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f831c78f6c9 code=0x50000 [ 61.717623][ T36] audit: type=1326 audit(1763514034.692:257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3671 comm="syz.0.1607" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f831c78f6c9 code=0x50000 [ 61.872856][ T36] kauditd_printk_skb: 323 callbacks suppressed [ 61.872874][ T36] audit: type=1326 audit(1763514034.972:581): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3671 comm="syz.0.1607" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f831c78f6c9 code=0x50000 [ 61.941686][ T36] audit: type=1400 audit(1763514035.002:582): avc: denied { mounton } for pid=3683 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 61.978840][ T36] audit: type=1326 audit(1763514035.012:583): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3671 comm="syz.0.1607" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f831c78f6c9 code=0x50000 [ 62.025383][ T329] bridge_slave_1: left allmulticast mode [ 62.031251][ T329] bridge_slave_1: left promiscuous mode [ 62.035944][ T3688] 9p: Unknown Cache mode or invalid value f [ 62.036930][ T329] bridge0: port 2(bridge_slave_1) entered disabled state [ 62.051435][ T36] audit: type=1326 audit(1763514035.012:584): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3671 comm="syz.0.1607" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f831c78f6c9 code=0x50000 [ 62.086133][ T329] bridge_slave_0: left allmulticast mode [ 62.107267][ T329] bridge_slave_0: left promiscuous mode [ 62.128604][ T329] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.151557][ T36] audit: type=1326 audit(1763514035.012:585): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3671 comm="syz.0.1607" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f831c78f6c9 code=0x50000 [ 62.253294][ T36] audit: type=1326 audit(1763514035.012:586): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3671 comm="syz.0.1607" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f831c78f6c9 code=0x50000 [ 62.313014][ T3694] overlayfs: "xino" feature enabled using 3 upper inode bits. [ 62.314530][ T36] audit: type=1326 audit(1763514035.012:587): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3671 comm="syz.0.1607" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f831c78f6c9 code=0x50000 [ 62.377097][ T329] tipc: Left network mode [ 62.384260][ T3683] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.399131][ T3683] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.416455][ T3683] bridge_slave_0: entered allmulticast mode [ 62.426620][ T36] audit: type=1326 audit(1763514035.012:588): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3671 comm="syz.0.1607" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f831c78f6c9 code=0x50000 [ 62.458723][ T3683] bridge_slave_0: entered promiscuous mode [ 62.465554][ T3683] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.472753][ T3683] bridge0: port 2(bridge_slave_1) entered disabled state [ 62.480232][ T36] audit: type=1326 audit(1763514035.012:589): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3671 comm="syz.0.1607" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f831c78f6c9 code=0x50000 [ 62.503601][ T3683] bridge_slave_1: entered allmulticast mode [ 62.510109][ T3683] bridge_slave_1: entered promiscuous mode [ 62.517089][ T36] audit: type=1326 audit(1763514035.012:590): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3671 comm="syz.0.1607" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f831c78f6c9 code=0x50000 [ 62.518929][ T329] veth1_macvtap: left promiscuous mode [ 62.558099][ T329] veth0_vlan: left promiscuous mode [ 62.796851][ T3683] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.803990][ T3683] bridge0: port 2(bridge_slave_1) entered forwarding state [ 62.811455][ T3683] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.818524][ T3683] bridge0: port 1(bridge_slave_0) entered forwarding state [ 62.924245][ T1722] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.943600][ T1722] bridge0: port 2(bridge_slave_1) entered disabled state [ 62.979794][ T1722] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.986903][ T1722] bridge0: port 1(bridge_slave_0) entered forwarding state [ 62.995332][ T1722] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.002507][ T1722] bridge0: port 2(bridge_slave_1) entered forwarding state [ 63.042149][ T3683] veth0_vlan: entered promiscuous mode [ 63.064126][ T3683] veth1_macvtap: entered promiscuous mode [ 63.401448][ T3756] netlink: 100 bytes leftover after parsing attributes in process `syz.4.1643'. [ 63.794595][ T3788] af_packet: tpacket_rcv: packet too big, clamped from 40 to 4294967272. macoff=96 [ 63.905951][ T3797] fuse: Bad value for 'user_id' [ 63.933944][ T3797] fuse: Bad value for 'user_id' [ 64.020323][ T3806] binder: Bad value for 'stats' [ 64.233725][ T3831] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=1024 sclass=netlink_xfrm_socket pid=3831 comm=syz.4.1679 [ 64.414832][ T3848] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3848 comm=syz.4.1687 [ 65.110356][ T3934] syz.2.1728 uses obsolete (PF_INET,SOCK_PACKET) [ 65.351386][ T3956] netlink: 172 bytes leftover after parsing attributes in process `syz.4.1740'. [ 65.360605][ T3956] netlink: 16 bytes leftover after parsing attributes in process `syz.4.1740'. [ 65.814868][ T4013] netlink: 128 bytes leftover after parsing attributes in process `syz.2.1768'. [ 65.874555][ T4021] netlink: 248 bytes leftover after parsing attributes in process `syz.2.1772'. [ 65.996116][ T4037] incfs: Backing dir is not set, filesystem can't be mounted. [ 66.006015][ T4037] incfs: mount failed -2 [ 66.356047][ T4078] binder: Bad value for 'max' [ 66.917779][ T36] kauditd_printk_skb: 8671 callbacks suppressed [ 66.917798][ T36] audit: type=1400 audit(1763514040.022:9262): avc: denied { mount } for pid=4133 comm="syz.4.1826" name="/" dev="ramfs" ino=24134 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 67.460185][ T4191] netlink: 'syz.1.1854': attribute type 1 has an invalid length. [ 67.779872][ T4230] Invalid ELF header type: 2 != 1 [ 67.784181][ T36] audit: type=1400 audit(1763514040.892:9263): avc: denied { module_load } for pid=4229 comm="syz.0.1873" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 67.948490][ T4249] netlink: 'syz.0.1882': attribute type 4 has an invalid length. [ 67.963794][ T4249] netlink: 'syz.0.1882': attribute type 5 has an invalid length. [ 67.975843][ T4249] netlink: 3657 bytes leftover after parsing attributes in process `syz.0.1882'. [ 68.131662][ T4271] overlayfs: option "index=on" is useless in a non-upper mount, ignore [ 68.145512][ T4271] overlayfs: missing 'lowerdir' [ 68.298134][ T4286] fuse: Bad value for 'group_id' [ 68.307652][ T4286] fuse: Bad value for 'group_id' [ 68.356689][ T36] audit: type=1400 audit(1763514041.462:9264): avc: denied { write } for pid=4289 comm="syz.0.1902" name="001" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 68.431380][ T36] audit: type=1400 audit(1763514041.542:9265): avc: denied { read } for pid=4296 comm="syz.1.1905" name="uhid" dev="devtmpfs" ino=199 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 68.480381][ T36] audit: type=1400 audit(1763514041.542:9266): avc: denied { open } for pid=4296 comm="syz.1.1905" path="/dev/uhid" dev="devtmpfs" ino=199 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 68.616694][ T36] audit: type=1326 audit(1763514041.722:9267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4309 comm="syz.2.1911" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f296f18f6c9 code=0x7fc00000 [ 68.683292][ T36] audit: type=1326 audit(1763514041.722:9268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4309 comm="syz.2.1911" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f296f18f6c9 code=0x7fc00000 [ 68.718436][ T4329] netlink: 536 bytes leftover after parsing attributes in process `syz.2.1920'. [ 68.731060][ T36] audit: type=1326 audit(1763514041.722:9269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4309 comm="syz.2.1911" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f296f18f6c9 code=0x7fc00000 [ 68.739302][ T4329] netlink: 52 bytes leftover after parsing attributes in process `syz.2.1920'. [ 68.798269][ T36] audit: type=1326 audit(1763514041.722:9270): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4309 comm="syz.2.1911" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f296f18f6c9 code=0x7fc00000 [ 69.267329][ T4371] netlink: 'syz.2.1941': attribute type 4 has an invalid length. [ 69.288142][ T4371] netlink: 'syz.2.1941': attribute type 5 has an invalid length. [ 69.308310][ T4371] netlink: 3657 bytes leftover after parsing attributes in process `syz.2.1941'. [ 69.398948][ T4381] overlayfs: missing 'lowerdir' [ 69.585844][ T4399] netlink: 'syz.1.1954': attribute type 4 has an invalid length. [ 69.618928][ T4399] netlink: 'syz.1.1954': attribute type 5 has an invalid length. [ 69.647075][ T4399] netlink: 3657 bytes leftover after parsing attributes in process `syz.1.1954'. [ 69.745294][ T4425] netlink: 12 bytes leftover after parsing attributes in process `syz.2.1967'. [ 69.866800][ T4441] 9pnet: Could not find request transport: 00000000000000000004 [ 70.118107][ T4474] fuse: Bad value for 'group_id' [ 70.139031][ T4474] fuse: Bad value for 'group_id' [ 71.027311][ T4501] netlink: 'syz.4.2003': attribute type 4 has an invalid length. [ 71.047380][ T4501] netlink: 'syz.4.2003': attribute type 5 has an invalid length. [ 71.057168][ T4501] __nla_validate_parse: 3 callbacks suppressed [ 71.057187][ T4501] netlink: 3657 bytes leftover after parsing attributes in process `syz.4.2003'. [ 71.080363][ T4510] 9pnet: Could not find request transport: 0xffffffffffffffff [ 71.225008][ T36] audit: type=1400 audit(1763514044.332:9271): avc: denied { append } for pid=4533 comm="syz.0.2022" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 71.309387][ T4549] fuse: Bad value for 'fd' [ 71.349659][ T4556] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2032'. [ 71.491884][ T4582] netlink: 80 bytes leftover after parsing attributes in process `syz.2.2045'. [ 71.499088][ T4584] netlink: 'syz.0.2046': attribute type 10 has an invalid length. [ 71.556092][ T4592] netlink: 12 bytes leftover after parsing attributes in process `syz.1.2051'. [ 72.109959][ T4698] netlink: 4 bytes leftover after parsing attributes in process `syz.0.2102'. [ 72.256662][ T36] kauditd_printk_skb: 1 callbacks suppressed [ 72.256683][ T36] audit: type=1400 audit(1763514045.362:9273): avc: denied { getopt } for pid=4723 comm="syz.2.2115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 72.373529][ T4748] SELinux: security_context_str_to_sid (syste_uÝG) failed with errno=-22 [ 72.588286][ T4787] netlink: 32 bytes leftover after parsing attributes in process `syz.1.2145'. [ 72.605366][ T36] audit: type=1400 audit(1763514045.712:9274): avc: denied { execute } for pid=4789 comm="syz.0.2148" name="file1" dev="ramfs" ino=27919 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:ramfs_t tclass=file permissive=1 [ 72.680452][ T36] audit: type=1400 audit(1763514045.712:9275): avc: denied { execute_no_trans } for pid=4789 comm="syz.0.2148" path="/file1" dev="ramfs" ino=27919 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:ramfs_t tclass=file permissive=1 [ 73.053273][ T4859] netlink: 268 bytes leftover after parsing attributes in process `syz.0.2179'. [ 73.127329][ T4866] netlink: 68 bytes leftover after parsing attributes in process `syz.2.2183'. [ 73.566119][ T36] audit: type=1400 audit(1763514046.672:9276): avc: denied { map } for pid=4929 comm="syz.1.2214" path="socket:[28322]" dev="sockfs" ino=28322 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 73.939422][ T4983] overlayfs: conflicting lowerdir path [ 74.701938][ T5102] tmpfs: Bad value for 'nr_blocks' [ 74.707473][ T36] audit: type=1400 audit(1763514047.812:9277): avc: denied { create } for pid=5100 comm="syz.4.2297" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 75.008813][ T45] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 75.179907][ T45] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 75.198865][ T45] usb 1-1: config 0 has no interfaces? [ 75.209907][ T45] usb 1-1: New USB device found, idVendor=8086, idProduct=0b07, bcdDevice=6c.b9 [ 75.219090][ T45] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 75.227112][ T45] usb 1-1: Product: syz [ 75.248802][ T45] usb 1-1: Manufacturer: syz [ 75.254009][ T45] usb 1-1: SerialNumber: syz [ 75.269605][ T45] usb 1-1: config 0 descriptor?? [ 75.278870][ T9] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 75.438812][ T9] usb 2-1: Using ep0 maxpacket: 32 [ 75.445279][ T9] usb 2-1: New USB device found, idVendor=046d, idProduct=c29c, bcdDevice= 0.00 [ 75.454567][ T9] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 75.464770][ T9] usb 2-1: config 0 descriptor?? [ 75.477143][ T45] usb 1-1: USB disconnect, device number 2 [ 75.677022][ T9] usbhid 2-1:0.0: can't add hid device: -71 [ 75.683118][ T9] usbhid 2-1:0.0: probe with driver usbhid failed with error -71 [ 75.692202][ T9] usb 2-1: USB disconnect, device number 3 [ 76.756259][ T5286] cgroup: Invalid name [ 76.822363][ T5296] 9pnet_fd: Insufficient options for proto=fd [ 76.891222][ T5307] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2395'. [ 76.911803][ T5310] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5310 comm=syz.0.2396 [ 76.925780][ T5307] netlink: 32 bytes leftover after parsing attributes in process `syz.2.2395'. [ 77.003217][ T36] audit: type=1400 audit(1763514050.112:9278): avc: denied { create } for pid=5319 comm="syz.4.2401" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 77.308563][ T5373] netlink: 288 bytes leftover after parsing attributes in process `syz.1.2426'. [ 77.626932][ T5415] SELinux: security_context_str_to_sid () failed with errno=-22 [ 78.412829][ T36] audit: type=1400 audit(1763514051.522:9279): avc: denied { map } for pid=5541 comm="syz.4.2508" path="/dev/bus/usb/006/001" dev="devtmpfs" ino=111 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 78.577901][ T5569] netlink: 40 bytes leftover after parsing attributes in process `syz.0.2522'. [ 78.742599][ T36] audit: type=1400 audit(1763514051.852:9280): avc: denied { name_bind } for pid=5591 comm="syz.2.2533" src=65530 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=rawip_socket permissive=1 [ 78.799193][ T36] audit: type=1400 audit(1763514051.902:9281): avc: denied { read write } for pid=5595 comm="syz.2.2536" name="uinput" dev="devtmpfs" ino=194 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 78.828952][ T36] audit: type=1400 audit(1763514051.902:9282): avc: denied { open } for pid=5595 comm="syz.2.2536" path="/dev/uinput" dev="devtmpfs" ino=194 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 78.877507][ T36] audit: type=1400 audit(1763514051.902:9283): avc: denied { ioctl } for pid=5595 comm="syz.2.2536" path="/dev/uinput" dev="devtmpfs" ino=194 ioctlcmd=0x5564 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 79.192925][ T36] audit: type=1400 audit(1763514052.302:9284): avc: denied { watch watch_reads } for pid=5660 comm="syz.0.2568" path="/" dev="ramfs" ino=32365 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:ramfs_t tclass=dir permissive=1 [ 79.252260][ T5675] netlink: 140 bytes leftover after parsing attributes in process `syz.2.2574'. [ 79.345429][ T5696] overlayfs: conflicting lowerdir path [ 79.550663][ T5735] SELinux: security_context_str_to_sid () failed with errno=-22 [ 79.840663][ T36] audit: type=1400 audit(1763514052.952:9285): avc: denied { mount } for pid=5789 comm="syz.0.2638" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 79.864297][ T36] audit: type=1400 audit(1763514052.982:9286): avc: denied { unmount } for pid=289 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 79.930073][ T5804] 9pnet_fd: Insufficient options for proto=fd [ 80.086972][ T36] audit: type=1400 audit(1763514053.192:9287): avc: denied { create } for pid=5835 comm="syz.0.2652" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 80.148809][ T36] audit: type=1400 audit(1763514053.192:9288): avc: denied { write } for pid=5835 comm="syz.0.2652" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 80.699027][ T5947] FAT-fs (rnullb0): bogus number of reserved sectors [ 80.706129][ T5947] FAT-fs (rnullb0): Can't find a valid FAT filesystem [ 82.246735][ T6219] 9pnet: p9_errstr2errno: server reported unknown error 184467440 [ 83.123953][ T6330] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2878'. [ 83.685915][ T6433] netlink: 268 bytes leftover after parsing attributes in process `syz.2.2928'. [ 83.889744][ T6465] can: request_module (can-proto-0) failed. [ 84.091418][ T36] kauditd_printk_skb: 9 callbacks suppressed [ 84.091443][ T36] audit: type=1400 audit(1763514057.202:9298): avc: denied { read write } for pid=6484 comm="syz.1.2953" name="file1" dev="tmpfs" ino=4735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 84.128185][ T36] audit: type=1400 audit(1763514057.202:9299): avc: denied { open } for pid=6484 comm="syz.1.2953" path="/771/file1" dev="tmpfs" ino=4735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 84.183928][ T6497] fuseblk: Bad value for 'fd' [ 84.232997][ T36] audit: type=1326 audit(1763514057.342:9300): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6482 comm="syz.0.2952" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f831c78f6c9 code=0x7fc00000 [ 84.410981][ T6538] netlink: 100 bytes leftover after parsing attributes in process `syz.2.2980'. [ 84.486331][ T36] audit: type=1400 audit(1763514057.592:9301): avc: denied { bind } for pid=6546 comm="syz.2.2984" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 84.647924][ T36] audit: type=1400 audit(1763514057.752:9302): avc: denied { bind } for pid=6571 comm="syz.4.2995" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 84.888006][ T36] audit: type=1326 audit(1763514057.992:9303): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6482 comm="syz.0.2952" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f831c78f6c9 code=0x7fc00000 [ 85.206319][ T6630] 9pnet_fd: Insufficient options for proto=fd [ 85.260341][ T6634] incfs: Error accessing: ./file0. [ 85.268174][ T6634] incfs: mount failed -20 [ 86.082271][ T6707] netlink: 8 bytes leftover after parsing attributes in process `syz.0.3062'. [ 86.908806][ T334] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 86.935740][ T6751] netlink: 8 bytes leftover after parsing attributes in process `syz.2.3083'. [ 87.002108][ T6757] bpf: Bad value for 'uid' [ 87.068811][ T334] usb 1-1: Using ep0 maxpacket: 8 [ 87.080635][ T334] usb 1-1: unable to get BOS descriptor or descriptor too short [ 87.092152][ T334] usb 1-1: unable to read config index 0 descriptor/start: -71 [ 87.108812][ T334] usb 1-1: can't read configurations, error -71 [ 87.167908][ T6771] veth0: entered promiscuous mode [ 87.173690][ T6770] veth0: left promiscuous mode [ 87.188912][ T36] audit: type=1400 audit(1763514060.292:9304): avc: denied { relabelfrom } for pid=6772 comm="syz.2.3094" name="" dev="pipefs" ino=38990 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 87.199765][ T6775] mmap: syz.2.3095 (6775) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 87.525998][ T6801] 9pnet_fd: Insufficient options for proto=fd [ 88.027824][ T6853] netlink: 80 bytes leftover after parsing attributes in process `syz.0.3135'. [ 88.269631][ T6887] No source specified [ 88.414958][ T6904] cgroup: subsys name conflicts with all [ 88.432740][ T6906] incfs: Options parsing error. -22 [ 88.438035][ T6906] incfs: mount failed -22 [ 88.492570][ T6914] netlink: 'syz.2.3162': attribute type 17 has an invalid length. [ 89.588806][ T5125] usb 5-1: new high-speed USB device number 2 using dummy_hcd [ 89.682934][ T6975] netlink: 268 bytes leftover after parsing attributes in process `syz.2.3191'. [ 89.748808][ T5125] usb 5-1: Using ep0 maxpacket: 16 [ 89.757894][ T5125] usb 5-1: config 0 has an invalid interface number: 41 but max is 0 [ 89.775508][ T5125] usb 5-1: config 0 has no interface number 0 [ 89.792822][ T5125] usb 5-1: config 0 interface 41 has no altsetting 0 [ 89.810234][ T5125] usb 5-1: New USB device found, idVendor=0fe6, idProduct=9800, bcdDevice=d1.9a [ 89.819593][ T5125] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 89.838060][ T5125] usb 5-1: Product: syz [ 89.848800][ T5125] usb 5-1: Manufacturer: syz [ 89.853501][ T5125] usb 5-1: SerialNumber: syz [ 89.866280][ T5125] usb 5-1: config 0 descriptor?? [ 89.879935][ T5125] CoreChips 5-1:0.41: probe with driver CoreChips failed with error -22 [ 90.095010][ T5125] usb 5-1: USB disconnect, device number 2 [ 90.538626][ T7038] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=54 sclass=netlink_route_socket pid=7038 comm=syz.2.3222 [ 90.850114][ T7076] overlayfs: option "uuid=on" requires an upper fs, falling back to uuid=null. [ 90.864438][ T7076] overlayfs: missing 'lowerdir' [ 90.959552][ T7086] netlink: 56 bytes leftover after parsing attributes in process `syz.4.3246'. [ 91.055638][ T7100] netlink: 4 bytes leftover after parsing attributes in process `syz.2.3253'. [ 91.151388][ T7110] can: request_module (can-proto-0) failed. [ 91.248681][ T7121] netlink: 12 bytes leftover after parsing attributes in process `syz.4.3263'. [ 91.448837][ T36] audit: type=1400 audit(1763514064.552:9305): avc: denied { map } for pid=7139 comm="syz.4.3273" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 93.312243][ T7304] overlay: Bad value for 'verity' [ 94.100552][ T7378] overlayfs: "xino" feature enabled using 3 upper inode bits. [ 94.130664][ T7382] netlink: 268 bytes leftover after parsing attributes in process `syz.4.3387'. [ 94.288790][ T36] audit: type=1400 audit(1763514067.392:9306): avc: denied { write } for pid=7397 comm="syz.4.3395" name="/" dev="incremental-fs" ino=3086 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 94.320592][ T3683] ------------[ cut here ]------------ [ 94.326259][ T3683] WARNING: CPU: 1 PID: 3683 at fs/inode.c:340 drop_nlink+0xce/0x110 [ 94.334362][ T3683] Modules linked in: [ 94.338326][ T3683] CPU: 1 UID: 0 PID: 3683 Comm: syz-executor Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 94.350335][ T3683] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 94.360520][ T3683] RIP: 0010:drop_nlink+0xce/0x110 [ 94.365587][ T3683] Code: 04 00 00 be 08 00 00 00 e8 cf 54 ee ff f0 48 ff 83 b8 04 00 00 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc cc e8 32 e4 97 ff <0f> 0b eb 81 44 89 f1 80 e1 07 80 c1 03 38 c1 0f 8c 59 ff ff ff 4c [ 94.385298][ T3683] RSP: 0018:ffffc9000baafc60 EFLAGS: 00010293 [ 94.388833][ T36] audit: type=1400 audit(1763514067.392:9307): avc: denied { add_name } for pid=7397 comm="syz.4.3395" name="cpuacct.usage_percpu" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 94.391419][ T3683] RAX: ffffffff81ee1a7e RBX: ffff8881442e5308 RCX: ffff88810b7c2600 [ 94.421642][ T3683] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 94.422468][ T36] audit: type=1400 audit(1763514067.392:9308): avc: denied { create } for pid=7397 comm="syz.4.3395" name="cpuacct.usage_percpu" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 94.429728][ T3683] RBP: ffffc9000baafc88 R08: 0000000000000003 R09: 0000000000000004 [ 94.429748][ T3683] R10: dffffc0000000000 R11: fffff52001755f7c R12: dffffc0000000000 [ 94.452396][ T36] audit: type=1400 audit(1763514067.432:9309): avc: denied { associate } for pid=7397 comm="syz.4.3395" name="cpuacct.usage_percpu" scontext=root:object_r:unlabeled_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 94.459434][ T3683] R13: 1ffff1102885ca6a R14: ffff8881442e5350 R15: 0000000000000000 [ 94.498387][ T3683] FS: 000055556e5f0500(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 94.507489][ T3683] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 94.514140][ T3683] CR2: 000055556e6134e8 CR3: 00000001443a0000 CR4: 00000000003526b0 [ 94.522227][ T3683] Call Trace: [ 94.525544][ T3683] [ 94.528512][ T3683] shmem_rmdir+0x5f/0x90 [ 94.532842][ T3683] vfs_rmdir+0x3dd/0x560 [ 94.537135][ T3683] incfs_kill_sb+0x109/0x230 [ 94.541824][ T3683] deactivate_locked_super+0xd5/0x2a0 [ 94.547242][ T3683] deactivate_super+0xb8/0xe0 [ 94.552015][ T3683] cleanup_mnt+0x3f1/0x480 [ 94.556481][ T3683] __cleanup_mnt+0x1d/0x40 [ 94.560975][ T3683] task_work_run+0x1e0/0x250 [ 94.565619][ T3683] ? __cfi_task_work_run+0x10/0x10 [ 94.570813][ T3683] ? __x64_sys_umount+0x126/0x170 [ 94.575896][ T3683] ? __cfi___x64_sys_umount+0x10/0x10 [ 94.581363][ T3683] ? __kasan_check_read+0x15/0x20 [ 94.586446][ T3683] resume_user_mode_work+0x36/0x50 [ 94.591653][ T3683] syscall_exit_to_user_mode+0x64/0xb0 [ 94.597150][ T3683] do_syscall_64+0x64/0xf0 [ 94.601741][ T3683] ? clear_bhb_loop+0x50/0xa0 [ 94.606465][ T3683] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 94.612480][ T3683] RIP: 0033:0x7f665e9909f7 [ 94.616951][ T3683] Code: a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 a8 ff ff ff f7 d8 64 89 02 b8 [ 94.636661][ T3683] RSP: 002b:00007ffc272b6d28 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 94.645143][ T3683] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f665e9909f7 [ 94.653190][ T3683] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffc272b6de0 [ 94.661224][ T3683] RBP: 00007ffc272b6de0 R08: 0000000000000000 R09: 0000000000000000 [ 94.669279][ T3683] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007ffc272b7e70 [ 94.677292][ T3683] R13: 00007f665ea11d7d R14: 000000000001704a R15: 00007ffc272b7eb0 [ 94.685358][ T3683] [ 94.688404][ T3683] ---[ end trace 0000000000000000 ]--- [ 94.695291][ T3683] ================================================================== [ 94.703431][ T3683] BUG: KASAN: null-ptr-deref in ihold+0x24/0x70 [ 94.709806][ T3683] Write of size 4 at addr 0000000000000168 by task syz-executor/3683 [ 94.717897][ T3683] [ 94.720249][ T3683] CPU: 1 UID: 0 PID: 3683 Comm: syz-executor Tainted: G W syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 94.720289][ T3683] Tainted: [W]=WARN [ 94.720297][ T3683] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 94.720312][ T3683] Call Trace: [ 94.720320][ T3683] [ 94.720329][ T3683] __dump_stack+0x21/0x30 [ 94.720367][ T3683] dump_stack_lvl+0x10c/0x190 [ 94.720398][ T3683] ? __cfi_dump_stack_lvl+0x10/0x10 [ 94.720431][ T3683] print_report+0x3d/0x70 [ 94.720456][ T3683] kasan_report+0x163/0x1a0 [ 94.720484][ T3683] ? ihold+0x24/0x70 [ 94.720509][ T3683] ? _raw_spin_unlock+0x45/0x60 [ 94.720539][ T3683] ? ihold+0x24/0x70 [ 94.720562][ T3683] kasan_check_range+0x299/0x2a0 [ 94.720599][ T3683] __kasan_check_write+0x18/0x20 [ 94.720633][ T3683] ihold+0x24/0x70 [ 94.720656][ T3683] vfs_rmdir+0x26a/0x560 [ 94.720686][ T3683] incfs_kill_sb+0x109/0x230 [ 94.720722][ T3683] deactivate_locked_super+0xd5/0x2a0 [ 94.720754][ T3683] deactivate_super+0xb8/0xe0 [ 94.720783][ T3683] cleanup_mnt+0x3f1/0x480 [ 94.720809][ T3683] __cleanup_mnt+0x1d/0x40 [ 94.720834][ T3683] task_work_run+0x1e0/0x250 [ 94.720862][ T3683] ? __cfi_task_work_run+0x10/0x10 [ 94.720889][ T3683] ? __x64_sys_umount+0x126/0x170 [ 94.720922][ T3683] ? __cfi___x64_sys_umount+0x10/0x10 [ 94.720954][ T3683] ? __kasan_check_read+0x15/0x20 [ 94.720988][ T3683] resume_user_mode_work+0x36/0x50 [ 94.721017][ T3683] syscall_exit_to_user_mode+0x64/0xb0 [ 94.721042][ T3683] do_syscall_64+0x64/0xf0 [ 94.721071][ T3683] ? clear_bhb_loop+0x50/0xa0 [ 94.721097][ T3683] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 94.721121][ T3683] RIP: 0033:0x7f665e9909f7 [ 94.721140][ T3683] Code: a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 a8 ff ff ff f7 d8 64 89 02 b8 [ 94.721159][ T3683] RSP: 002b:00007ffc272b6d28 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 94.721182][ T3683] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f665e9909f7 [ 94.721197][ T3683] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffc272b6de0 [ 94.721212][ T3683] RBP: 00007ffc272b6de0 R08: 0000000000000000 R09: 0000000000000000 [ 94.721227][ T3683] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007ffc272b7e70 [ 94.721242][ T3683] R13: 00007f665ea11d7d R14: 000000000001704a R15: 00007ffc272b7eb0 [ 94.721262][ T3683] [ 94.721270][ T3683] ================================================================== [ 94.968044][ T3683] Disabling lock debugging due to kernel taint [ 94.974302][ T3683] BUG: kernel NULL pointer dereference, address: 0000000000000168 [ 94.982136][ T3683] #PF: supervisor write access in kernel mode [ 94.988233][ T3683] #PF: error_code(0x0002) - not-present page [ 94.994239][ T3683] PGD 8000000113cad067 P4D 8000000113cad067 PUD 0 [ 95.000794][ T3683] Oops: Oops: 0002 [#1] PREEMPT SMP KASAN PTI [ 95.006909][ T3683] CPU: 1 UID: 0 PID: 3683 Comm: syz-executor Tainted: G B W syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 95.020158][ T3683] Tainted: [B]=BAD_PAGE, [W]=WARN [ 95.025206][ T3683] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 95.035292][ T3683] RIP: 0010:ihold+0x2a/0x70 [ 95.039839][ T3683] Code: f3 0f 1e fa 55 48 89 e5 41 56 53 48 89 fb e8 1d db 97 ff 48 8d bb 68 01 00 00 be 04 00 00 00 e8 8c 4b ee ff 41 be 01 00 00 00 44 0f c1 b3 68 01 00 00 41 ff c6 bf 02 00 00 00 44 89 f6 e8 2d [ 95.059489][ T3683] RSP: 0018:ffffc9000baafca0 EFLAGS: 00010246 [ 95.065601][ T3683] RAX: ffff88810b7c2600 RBX: 0000000000000000 RCX: ffff88810b7c2600 [ 95.073617][ T3683] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 95.081626][ T3683] RBP: ffffc9000baafcb0 R08: ffffffff88972947 R09: 1ffffffff112e528 [ 95.089645][ T3683] R10: dffffc0000000000 R11: fffffbfff112e529 R12: ffff8881442e5314 [ 95.097652][ T3683] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 [ 95.105659][ T3683] FS: 000055556e5f0500(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 95.114630][ T3683] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 95.121244][ T3683] CR2: 0000000000000168 CR3: 00000001443a0000 CR4: 00000000003526b0 [ 95.129255][ T3683] Call Trace: [ 95.132568][ T3683] [ 95.135534][ T3683] vfs_rmdir+0x26a/0x560 [ 95.139825][ T3683] incfs_kill_sb+0x109/0x230 [ 95.144462][ T3683] deactivate_locked_super+0xd5/0x2a0 [ 95.149874][ T3683] deactivate_super+0xb8/0xe0 [ 95.154597][ T3683] cleanup_mnt+0x3f1/0x480 [ 95.159053][ T3683] __cleanup_mnt+0x1d/0x40 [ 95.163504][ T3683] task_work_run+0x1e0/0x250 [ 95.168141][ T3683] ? __cfi_task_work_run+0x10/0x10 [ 95.173290][ T3683] ? __x64_sys_umount+0x126/0x170 [ 95.178359][ T3683] ? __cfi___x64_sys_umount+0x10/0x10 [ 95.183774][ T3683] ? __kasan_check_read+0x15/0x20 [ 95.188845][ T3683] resume_user_mode_work+0x36/0x50 [ 95.193995][ T3683] syscall_exit_to_user_mode+0x64/0xb0 [ 95.199491][ T3683] do_syscall_64+0x64/0xf0 [ 95.203952][ T3683] ? clear_bhb_loop+0x50/0xa0 [ 95.208665][ T3683] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 95.214691][ T3683] RIP: 0033:0x7f665e9909f7 [ 95.219143][ T3683] Code: a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 a8 ff ff ff f7 d8 64 89 02 b8 [ 95.238790][ T3683] RSP: 002b:00007ffc272b6d28 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 95.247259][ T3683] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f665e9909f7 [ 95.255271][ T3683] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffc272b6de0 [ 95.263369][ T3683] RBP: 00007ffc272b6de0 R08: 0000000000000000 R09: 0000000000000000 [ 95.271387][ T3683] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007ffc272b7e70 [ 95.279407][ T3683] R13: 00007f665ea11d7d R14: 000000000001704a R15: 00007ffc272b7eb0 [ 95.287421][ T3683] [ 95.290471][ T3683] Modules linked in: [ 95.294500][ T3683] CR2: 0000000000000168 [ 95.298691][ T3683] ---[ end trace 0000000000000000 ]--- [ 95.304170][ T3683] RIP: 0010:ihold+0x2a/0x70 [ 95.308708][ T3683] Code: f3 0f 1e fa 55 48 89 e5 41 56 53 48 89 fb e8 1d db 97 ff 48 8d bb 68 01 00 00 be 04 00 00 00 e8 8c 4b ee ff 41 be 01 00 00 00 44 0f c1 b3 68 01 00 00 41 ff c6 bf 02 00 00 00 44 89 f6 e8 2d [ 95.328354][ T3683] RSP: 0018:ffffc9000baafca0 EFLAGS: 00010246 [ 95.334480][ T3683] RAX: ffff88810b7c2600 RBX: 0000000000000000 RCX: ffff88810b7c2600 [ 95.342505][ T3683] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 95.350518][ T3683] RBP: ffffc9000baafcb0 R08: ffffffff88972947 R09: 1ffffffff112e528 [ 95.358626][ T3683] R10: dffffc0000000000 R11: fffffbfff112e529 R12: ffff8881442e5314 [ 95.366651][ T3683] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 [ 95.374680][ T3683] FS: 000055556e5f0500(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 95.383658][ T3683] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 95.390288][ T3683] CR2: 0000000000000168 CR3: 00000001443a0000 CR4: 00000000003526b0 [ 95.398340][ T3683] Kernel panic - not syncing: Fatal exception [ 95.404812][ T3683] Kernel Offset: disabled [ 95.409147][ T3683] Rebooting in 86400 seconds..