last executing test programs: 90.502977ms ago: executing program 0 (id=1): symlinkat(&(0x7f0000000080)='.\x00', 0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00') mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x1) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000000)='./bus\x00', &(0x7f00000005c0), 0x8040, &(0x7f0000000600)={[{@lowerdir={'lowerdir', 0x3d, './file0'}}, {@upperdir={'upperdir', 0x3d, './file1'}}, {@workdir={'workdir', 0x3d, './bus'}}]}) chdir(&(0x7f00000003c0)='./bus\x00') mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000000), 0x82, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x5) getdents(r0, 0x0, 0x0) 0s ago: executing program 0 (id=5): mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x40eaf000) madvise(&(0x7f0000130000/0xd000)=nil, 0xd000, 0x66) madvise(&(0x7f0000000000/0x600000)=nil, 0x60005f, 0x19) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0xa2f01, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup(r2) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000100)={'syzkaller1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}) write$tun(r1, &(0x7f0000000040)={@void, @void, @eth={@broadcast, @random="c222a5fe422d", @val={@val={0x88a8, 0x2, 0x1, 0x4}, {0x8100, 0x0, 0x0, 0x4}}, {@ipv4={0x800, @generic={{0x5, 0x4, 0x1, 0x6, 0x1c, 0x67, 0x0, 0x7, 0x11, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, "e4f6388b796aad5c"}}}}}, 0x32) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @any, 0x0, 0x1}, 0xe) r4 = syz_clone(0x0, 0x0, 0xfffffffffffffead, 0x0, 0x0, 0x0) syz_open_procfs$userns(r4, &(0x7f0000000040)) r5 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r6 = creat(&(0x7f00000000c0)='./file0\x00', 0xdafbe5d6891b6e4) gettid() write$binfmt_elf32(r6, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c46800c04000100000001000000030006002c3b0000e100000038000000b1030000772400000300200001000500090000000000000003000000040000df030020000600000080"], 0x85) r7 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r7, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_rx_ring(r7, 0x107, 0x5, &(0x7f0000000140)=@req3={0x1000, 0x3a, 0x1000, 0x3a, 0x7ff, 0xf83, 0x3}, 0x1c) r8 = socket$packet(0x11, 0x3, 0x300) ioctl$KVM_SET_GUEST_DEBUG_x86(r3, 0x4048ae9b, &(0x7f0000000280)={0x150003, 0x0, {[0x3, 0x2, 0x9, 0x4, 0xff, 0x7, 0x5, 0x3]}}) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000240)={'gre0\x00', 0x0}) setsockopt$packet_int(r8, 0x107, 0xf, &(0x7f0000000140)=0x8, 0x4) sendto$packet(r8, &(0x7f0000000340)="05030006e8fe091c6202a0ffffffff006003000000007f141434e3177f43055762cb80948864113b022543424aa608", 0xfef2, 0x0, &(0x7f0000000a80)={0x11, 0x88a8, r9, 0x1, 0x0, 0x6, @multicast}, 0x14) close(r6) ioctl$KVM_SET_USER_MEMORY_REGION2(r5, 0x40a0ae49, &(0x7f0000000080)={0x1fd, 0x7, 0x40000, 0x2000, &(0x7f000016b000/0x2000)=nil, 0x400000000000, r6}) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r5, 0x4010ae74, &(0x7f0000000000)={0x3, 0x6, 0x2}) kernel console output (not intermixed with test programs): syzkaller syzkaller login: [ 12.318280][ T36] kauditd_printk_skb: 48 callbacks suppressed [ 12.318296][ T36] audit: type=1400 audit(1778812547.759:59): avc: denied { transition } for pid=230 comm="sshd-session" path="/bin/sh" dev="sda1" ino=90 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 12.322517][ T36] audit: type=1400 audit(1778812547.759:60): avc: denied { noatsecure } for pid=230 comm="sshd-session" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 12.325229][ T36] audit: type=1400 audit(1778812547.769:61): avc: denied { write } for pid=230 comm="sh" path="pipe:[1546]" dev="pipefs" ino=1546 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 12.328506][ T36] audit: type=1400 audit(1778812547.769:62): avc: denied { rlimitinh } for pid=230 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 12.331445][ T36] audit: type=1400 audit(1778812547.769:63): avc: denied { siginh } for pid=230 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.0.211' (ED25519) to the list of known hosts. [ 19.712616][ T36] audit: type=1400 audit(1778812555.159:64): avc: denied { mounton } for pid=286 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 19.715819][ T36] audit: type=1400 audit(1778812555.159:65): avc: denied { mount } for pid=286 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 19.716154][ T286] cgroup: Unknown subsys name 'net' [ 19.719979][ T36] audit: type=1400 audit(1778812555.159:66): avc: denied { unmount } for pid=286 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 19.720126][ T286] cgroup: Unknown subsys name 'devices' [ 19.863197][ T286] cgroup: Unknown subsys name 'hugetlb' [ 19.868845][ T286] cgroup: Unknown subsys name 'rlimit' [ 20.041743][ T36] audit: type=1400 audit(1778812555.489:67): avc: denied { setattr } for pid=286 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 20.064950][ T36] audit: type=1400 audit(1778812555.489:68): avc: denied { mounton } for pid=286 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 20.074211][ T288] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 20.089748][ T36] audit: type=1400 audit(1778812555.489:69): avc: denied { mount } for pid=286 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 20.121499][ T36] audit: type=1400 audit(1778812555.549:70): avc: denied { relabelto } for pid=288 comm="mkswap" name="swap-file" dev="sda1" ino=2026 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.140717][ T286] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 20.146905][ T36] audit: type=1400 audit(1778812555.549:71): avc: denied { write } for pid=288 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2026 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.181179][ T36] audit: type=1400 audit(1778812555.579:72): avc: denied { read } for pid=286 comm="syz-executor" name="swap-file" dev="sda1" ino=2026 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.206922][ T36] audit: type=1400 audit(1778812555.579:73): avc: denied { open } for pid=286 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2026 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.955708][ T294] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.962933][ T294] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.969997][ T294] bridge_slave_0: entered allmulticast mode [ 20.976430][ T294] bridge_slave_0: entered promiscuous mode [ 20.982962][ T294] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.989998][ T294] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.997273][ T294] bridge_slave_1: entered allmulticast mode [ 21.003469][ T294] bridge_slave_1: entered promiscuous mode [ 21.048836][ T293] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.056210][ T293] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.063476][ T293] bridge_slave_0: entered allmulticast mode [ 21.069669][ T293] bridge_slave_0: entered promiscuous mode [ 21.077122][ T293] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.084706][ T293] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.091897][ T293] bridge_slave_1: entered allmulticast mode [ 21.098082][ T293] bridge_slave_1: entered promiscuous mode [ 21.135431][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.142508][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.149559][ T296] bridge_slave_0: entered allmulticast mode [ 21.155885][ T296] bridge_slave_0: entered promiscuous mode [ 21.162420][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.169460][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.176571][ T296] bridge_slave_1: entered allmulticast mode [ 21.182868][ T296] bridge_slave_1: entered promiscuous mode [ 21.253477][ T295] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.260534][ T295] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.267674][ T295] bridge_slave_0: entered allmulticast mode [ 21.273982][ T295] bridge_slave_0: entered promiscuous mode [ 21.283214][ T295] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.290258][ T295] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.297559][ T295] bridge_slave_1: entered allmulticast mode [ 21.303799][ T295] bridge_slave_1: entered promiscuous mode [ 21.349038][ T294] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.356113][ T294] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.363419][ T294] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.370435][ T294] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.414032][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.421107][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.428380][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.435407][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.446188][ T293] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.453239][ T293] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.460497][ T293] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.467522][ T293] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.485828][ T295] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.492911][ T295] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.500177][ T295] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.507242][ T295] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.536263][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.544208][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.551535][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.558733][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.566773][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.574122][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.582219][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.589476][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.603165][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.610212][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.626067][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.633134][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.647923][ T46] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.655001][ T46] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.683067][ T46] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.690104][ T46] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.698622][ T46] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.705667][ T46] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.734558][ T46] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.741611][ T46] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.749265][ T46] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.756311][ T46] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.764198][ T46] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.771246][ T46] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.779508][ T294] veth0_vlan: entered promiscuous mode [ 21.793601][ T294] veth1_macvtap: entered promiscuous mode [ 21.808330][ T295] veth0_vlan: entered promiscuous mode [ 21.838438][ T295] veth1_macvtap: entered promiscuous mode [ 21.854992][ T294] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 21.874960][ T296] veth0_vlan: entered promiscuous mode [ 21.887525][ T293] veth0_vlan: entered promiscuous mode [ 21.895369][ T312] ======================================================= [ 21.895369][ T312] WARNING: The mand mount option has been deprecated and [ 21.895369][ T312] and is ignored by this kernel. Remove the mand [ 21.895369][ T312] option from the mount to silence this warning. [ 21.895369][ T312] ======================================================= [ 21.902506][ T293] veth1_macvtap: entered promiscuous mode [ 21.965853][ T296] veth1_macvtap: entered promiscuous mode [ 21.973816][ T294] ------------[ cut here ]------------ [ 21.979297][ T294] WARNING: CPU: 0 PID: 294 at fs/overlayfs/util.c:602 ovl_dir_modified+0x15a/0x190 [ 21.988658][ T294] Modules linked in: [ 21.992668][ T294] CPU: 0 UID: 0 PID: 294 Comm: syz-executor Not tainted syzkaller #0 0016c7850c8f5e741b1ca5ad3edd21019ebf9493 [ 22.004335][ T294] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 22.014456][ T294] RIP: 0010:ovl_dir_modified+0x15a/0x190 [ 22.020093][ T294] Code: c1 e8 03 42 80 3c 28 00 74 08 4c 89 f7 e8 ee 5f 97 ff 49 ff 06 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc cc e8 66 db 3e ff <0f> 0b e9 3e ff ff ff e8 5a db 3e ff 0f 0b e9 6e ff ff ff 44 89 f9 [ 22.039781][ T294] RSP: 0018:ffffc9000b6cfb48 EFLAGS: 00010293 [ 22.045887][ T294] RAX: ffffffff8248e83a RBX: 0000000000000000 RCX: ffff88812f1ca600 [ 22.053938][ T294] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 22.061982][ T294] RBP: ffffc9000b6cfb70 R08: ffff88811b94c0bf R09: 1ffff11023729817 [ 22.069966][ T294] R10: dffffc0000000000 R11: ffffed1023729818 R12: 0000000000000000 [ 22.077980][ T294] R13: dffffc0000000000 R14: ffff88811b94c020 R15: ffff88811b973cc0 [ 22.086018][ T294] FS: 00005555808c0500(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 22.095044][ T294] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 22.101667][ T294] CR2: 00007ffcc0165e10 CR3: 0000000102bce000 CR4: 00000000003526b0 [ 22.109645][ T294] Call Trace: [ 22.112977][ T294] [ 22.115906][ T294] ovl_do_remove+0x81b/0xda0 [ 22.120492][ T294] ? ovl_set_redirect+0x780/0x780 [ 22.125570][ T294] ? down_write+0xee/0x2b0 [ 22.129996][ T294] ? __cfi_down_write+0x10/0x10 [ 22.134905][ T294] ovl_rmdir+0x1e/0x30 [ 22.139009][ T294] vfs_rmdir+0x3e3/0x560 [ 22.143284][ T294] incfs_kill_sb+0x109/0x230 [ 22.147873][ T294] deactivate_locked_super+0xd5/0x2a0 [ 22.153301][ T294] deactivate_super+0xb8/0xe0 [ 22.158070][ T294] cleanup_mnt+0x406/0x4a0 [ 22.162516][ T294] __cleanup_mnt+0x1d/0x40 [ 22.166930][ T294] task_work_run+0x1e5/0x260 [ 22.171558][ T294] ? __cfi_task_work_run+0x10/0x10 [ 22.176671][ T294] ? __x64_sys_umount+0x12e/0x180 [ 22.181739][ T294] ? __cfi___x64_sys_umount+0x10/0x10 [ 22.187120][ T294] ? __kasan_check_read+0x15/0x20 [ 22.192221][ T294] resume_user_mode_work+0x35/0x50 [ 22.197333][ T294] syscall_exit_to_user_mode+0x63/0xb0 [ 22.202816][ T294] do_syscall_64+0x63/0xf0 [ 22.207234][ T294] ? clear_bhb_loop+0x50/0xa0 [ 22.211963][ T294] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 22.217871][ T294] RIP: 0033:0x7f796ef9e097 [ 22.222333][ T294] Code: a2 c7 05 5c 06 25 00 00 00 00 00 eb 96 e8 e1 12 00 00 90 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 e8 ff ff ff f7 d8 64 89 02 b8 [ 22.242005][ T294] RSP: 002b:00007ffcc0166468 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 22.250415][ T294] RAX: 0000000000000000 RBX: 00007f796f0321ca RCX: 00007f796ef9e097 [ 22.258449][ T294] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffcc0166520 [ 22.266443][ T294] RBP: 00007ffcc0166520 R08: 00007ffcc0167520 R09: 00000000ffffffff [ 22.274468][ T294] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffcc01675b0 [ 22.282507][ T294] R13: 00007f796f0321ca R14: 00000000000055aa R15: 00007ffcc01675f0 [ 22.290480][ T294] [ 22.293551][ T294] ---[ end trace 0000000000000000 ]--- [ 22.299356][ T294] ------------[ cut here ]------------ [ 22.304890][ T294] WARNING: CPU: 1 PID: 294 at fs/overlayfs/util.c:602 ovl_dir_modified+0x15a/0x190 [ 22.314265][ T294] Modules linked in: [ 22.318159][ T294] CPU: 1 UID: 0 PID: 294 Comm: syz-executor Tainted: G W syzkaller #0 0016c7850c8f5e741b1ca5ad3edd21019ebf9493 [ 22.331278][ T294] Tainted: [W]=WARN [ 22.335072][ T294] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 22.345147][ T294] RIP: 0010:ovl_dir_modified+0x15a/0x190 [ 22.350783][ T294] Code: c1 e8 03 42 80 3c 28 00 74 08 4c 89 f7 e8 ee 5f 97 ff 49 ff 06 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc cc e8 66 db 3e ff <0f> 0b e9 3e ff ff ff e8 5a db 3e ff 0f 0b e9 6e ff ff ff 44 89 f9 [ 22.370406][ T294] RSP: 0018:ffffc9000b6cfb48 EFLAGS: 00010293 [ 22.376514][ T294] RAX: ffffffff8248e83a RBX: 0000000000000000 RCX: ffff88812f1ca600 [ 22.384548][ T294] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 22.392544][ T294] RBP: ffffc9000b6cfb70 R08: ffff88811b94c0bf R09: 1ffff11023729817 [ 22.400507][ T294] R10: dffffc0000000000 R11: ffffed1023729818 R12: 0000000000000000 [ 22.408496][ T294] R13: dffffc0000000000 R14: ffff88811b94c020 R15: ffff88811b973cc0 [ 22.416509][ T294] FS: 00005555808c0500(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 22.425552][ T294] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 22.432208][ T294] CR2: 00007ff577800218 CR3: 0000000102bce000 CR4: 00000000003526b0 [ 22.440175][ T294] Call Trace: [ 22.443467][ T294] [ 22.446396][ T294] ovl_do_remove+0x81b/0xda0 [ 22.450973][ T294] ? ovl_set_redirect+0x780/0x780 [ 22.457170][ T294] ? down_write+0xee/0x2b0 [ 22.461646][ T294] ? __cfi_down_write+0x10/0x10 [ 22.466507][ T294] ovl_rmdir+0x1e/0x30 [ 22.470581][ T294] vfs_rmdir+0x3e3/0x560 [ 22.474970][ T294] incfs_kill_sb+0x1a0/0x230 [ 22.479562][ T294] deactivate_locked_super+0xd5/0x2a0 [ 22.485001][ T294] deactivate_super+0xb8/0xe0 [ 22.489695][ T294] cleanup_mnt+0x406/0x4a0 [ 22.494155][ T294] __cleanup_mnt+0x1d/0x40 [ 22.498580][ T294] task_work_run+0x1e5/0x260 [ 22.503202][ T294] ? __cfi_task_work_run+0x10/0x10 [ 22.508321][ T294] ? __x64_sys_umount+0x12e/0x180 [ 22.513463][ T294] ? __cfi___x64_sys_umount+0x10/0x10 [ 22.518844][ T294] ? __kasan_check_read+0x15/0x20 [ 22.523886][ T294] resume_user_mode_work+0x35/0x50 [ 22.528998][ T294] syscall_exit_to_user_mode+0x63/0xb0 [ 22.534530][ T294] do_syscall_64+0x63/0xf0 [ 22.538953][ T294] ? clear_bhb_loop+0x50/0xa0 [ 22.543661][ T294] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 22.549599][ T294] RIP: 0033:0x7f796ef9e097 [ 22.554045][ T294] Code: a2 c7 05 5c 06 25 00 00 00 00 00 eb 96 e8 e1 12 00 00 90 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 e8 ff ff ff f7 d8 64 89 02 b8 [ 22.573680][ T294] RSP: 002b:00007ffcc0166468 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 22.582163][ T294] RAX: 0000000000000000 RBX: 00007f796f0321ca RCX: 00007f796ef9e097 [ 22.590137][ T294] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffcc0166520 [ 22.598143][ T294] RBP: 00007ffcc0166520 R08: 00007ffcc0167520 R09: 00000000ffffffff [ 22.606143][ T294] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffcc01675b0 [ 22.614221][ T294] R13: 00007f796f0321ca R14: 00000000000055aa R15: 00007ffcc01675f0 [ 22.622232][ T294] [ 22.625247][ T294] ---[ end trace 0000000000000000 ]--- [ 22.745630][ T317] af_packet: tpacket_rcv: packet too big, clamped from 65232 to 4294967272. macoff=96