./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor619526470 <...> Warning: Permanently added '10.128.0.93' (ED25519) to the list of known hosts. execve("./syz-executor619526470", ["./syz-executor619526470"], 0x7ffe2ba21b90 /* 10 vars */) = 0 brk(NULL) = 0x555557c43000 brk(0x555557c43d00) = 0x555557c43d00 arch_prctl(ARCH_SET_FS, 0x555557c43380) = 0 set_tid_address(0x555557c43650) = 288 set_robust_list(0x555557c43660, 24) = 0 rseq(0x555557c43ca0, 0x20, 0, 0x53053053) = -1 ENOSYS (Function not implemented) prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor619526470", 4096) = 27 getrandom("\xca\xff\x67\xf1\x8e\xdb\xcb\x23", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x555557c43d00 brk(0x555557c64d00) = 0x555557c64d00 brk(0x555557c65000) = 0x555557c65000 mprotect(0x7fb4d7aea000, 16384, PROT_READ) = 0 mmap(0x1ffffffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffffffff000 mmap(0x200000000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200000000000 mmap(0x200001000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200001000000 mkdir("./syzkaller.00RTQ8", 0700) = 0 chmod("./syzkaller.00RTQ8", 0777) = 0 chdir("./syzkaller.00RTQ8") = 0 unshare(CLONE_NEWPID) = 0 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x555557c43650) = 289 ./strace-static-x86_64: Process 289 attached [pid 289] set_robust_list(0x555557c43660, 24) = 0 [pid 289] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0 [pid 289] getppid() = 0 [pid 289] prlimit64(0, RLIMIT_AS, {rlim_cur=204800*1024, rlim_max=204800*1024}, NULL) = 0 [pid 289] prlimit64(0, RLIMIT_MEMLOCK, {rlim_cur=32768*1024, rlim_max=32768*1024}, NULL) = 0 [pid 289] prlimit64(0, RLIMIT_FSIZE, {rlim_cur=139264*1024, rlim_max=139264*1024}, NULL) = 0 [pid 289] prlimit64(0, RLIMIT_STACK, {rlim_cur=1024*1024, rlim_max=1024*1024}, NULL) = 0 [pid 289] prlimit64(0, RLIMIT_CORE, {rlim_cur=131072*1024, rlim_max=131072*1024}, NULL) = 0 [pid 289] prlimit64(0, RLIMIT_NOFILE, {rlim_cur=256, rlim_max=256}, NULL) = 0 [pid 289] unshare(CLONE_NEWNS) = 0 [pid 289] mount(NULL, "/", NULL, MS_REC|MS_PRIVATE, NULL) = 0 [pid 289] unshare(CLONE_NEWIPC) = -1 EINVAL (Invalid argument) [pid 289] unshare(CLONE_NEWCGROUP) = 0 [pid 289] unshare(CLONE_NEWUTS) = 0 [pid 289] unshare(CLONE_SYSVSEM) = 0 [pid 289] openat(AT_FDCWD, "/proc/sys/kernel/shmmax", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) [pid 289] openat(AT_FDCWD, "/proc/sys/kernel/shmall", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) [pid 289] openat(AT_FDCWD, "/proc/sys/kernel/shmmni", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) [pid 289] openat(AT_FDCWD, "/proc/sys/kernel/msgmax", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) [pid 289] openat(AT_FDCWD, "/proc/sys/kernel/msgmni", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) [pid 289] openat(AT_FDCWD, "/proc/sys/kernel/msgmnb", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) [pid 289] openat(AT_FDCWD, "/proc/sys/kernel/sem", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) [pid 289] getpid() = 1 [pid 289] capget({version=_LINUX_CAPABILITY_VERSION_3, pid=1}, {effective=1<<CAP_CHOWN|1<<CAP_DAC_OVERRIDE|1<<CAP_DAC_READ_SEARCH|1<<CAP_FOWNER|1<<CAP_FSETID|1<<CAP_KILL|1<<CAP_SETGID|1<<CAP_SETUID|1<<CAP_SETPCAP|1<<CAP_LINUX_IMMUTABLE|1<<CAP_NET_BIND_SERVICE|1<<CAP_NET_BROADCAST|1<<CAP_NET_ADMIN|1<<CAP_NET_RAW|1<<CAP_IPC_LOCK|1<<CAP_IPC_OWNER|1<<CAP_SYS_MODULE|1<<CAP_SYS_RAWIO|1<<CAP_SYS_CHROOT|1<<CAP_SYS_PTRACE|1<<CAP_SYS_PACCT|1<<CAP_SYS_ADMIN|1<<CAP_SYS_BOOT|1<<CAP_SYS_NICE|1<<CAP_SYS_RESOURCE|1<<CAP_SYS_TIME|1<<CAP_SYS_TTY_CONFIG|1<<CAP_MKNOD|1<<CAP_LEASE|1<<CAP_AUDIT_WRITE|1<<CAP_AUDIT_CONTROL|1<<CAP_SETFCAP|1<<CAP_MAC_OVERRIDE|1<<CAP_MAC_ADMIN|1<<CAP_SYSLOG|1<<CAP_WAKE_ALARM|1<<CAP_BLOCK_SUSPEND|1<<CAP_AUDIT_READ|1<<CAP_PERFMON|1<<CAP_BPF|1<<CAP_CHECKPOINT_RESTORE, permitted=1<<CAP_CHOWN|1<<CAP_DAC_OVERRIDE|1<<CAP_DAC_READ_SEARCH|1<<CAP_FOWNER|1<<CAP_FSETID|1<<CAP_KILL|1<<CAP_SETGID|1<<CAP_SETUID|1<<CAP_SETPCAP|1<<CAP_LINUX_IMMUTABLE|1<<CAP_NET_BIND_SERVICE|1<<CAP_NET_BROADCAST|1<<CAP_NET_ADMIN|1<<CAP_NET_RAW|1<<CAP_IPC_LOCK|1<<CAP_IPC_OWNER|1<<CAP_SYS_MODULE|1<<CAP_SYS_RAWIO|1<<CAP_SYS_CHROOT|1<<CAP_SYS_PTRACE|1<<CAP_SYS_PACCT|1<<CAP_SYS_ADMIN|1<<CAP_SYS_BOOT|1<<CAP_SYS_NICE|1<<CAP_SYS_RESOURCE|1<<CAP_SYS_TIME|1<<CAP_SYS_TTY_CONFIG|1<<CAP_MKNOD|1<<CAP_LEASE|1<<CAP_AUDIT_WRITE|1<<CAP_AUDIT_CONTROL|1<<CAP_SETFCAP|1<<CAP_MAC_OVERRIDE|1<<CAP_MAC_ADMIN|1<<CAP_SYSLOG|1<<CAP_WAKE_ALARM|1<<CAP_BLOCK_SUSPEND|1<<CAP_AUDIT_READ|1<<CAP_PERFMON|1<<CAP_BPF|1<<CAP_CHECKPOINT_RESTORE, inheritable=0}) = 0 [pid 289] capset({version=_LINUX_CAPABILITY_VERSION_3, pid=1}, {effective=1<<CAP_CHOWN|1<<CAP_DAC_OVERRIDE|1<<CAP_DAC_READ_SEARCH|1<<CAP_FOWNER|1<<CAP_FSETID|1<<CAP_KILL|1<<CAP_SETGID|1<<CAP_SETUID|1<<CAP_SETPCAP|1<<CAP_LINUX_IMMUTABLE|1<<CAP_NET_BIND_SERVICE|1<<CAP_NET_BROADCAST|1<<CAP_NET_ADMIN|1<<CAP_NET_RAW|1<<CAP_IPC_LOCK|1<<CAP_IPC_OWNER|1<<CAP_SYS_MODULE|1<<CAP_SYS_RAWIO|1<<CAP_SYS_CHROOT|1<<CAP_SYS_PACCT|1<<CAP_SYS_ADMIN|1<<CAP_SYS_BOOT|1<<CAP_SYS_RESOURCE|1<<CAP_SYS_TIME|1<<CAP_SYS_TTY_CONFIG|1<<CAP_MKNOD|1<<CAP_LEASE|1<<CAP_AUDIT_WRITE|1<<CAP_AUDIT_CONTROL|1<<CAP_SETFCAP|1<<CAP_MAC_OVERRIDE|1<<CAP_MAC_ADMIN|1<<CAP_SYSLOG|1<<CAP_WAKE_ALARM|1<<CAP_BLOCK_SUSPEND|1<<CAP_AUDIT_READ|1<<CAP_PERFMON|1<<CAP_BPF|1<<CAP_CHECKPOINT_RESTORE, permitted=1<<CAP_CHOWN|1<<CAP_DAC_OVERRIDE|1<<CAP_DAC_READ_SEARCH|1<<CAP_FOWNER|1<<CAP_FSETID|1<<CAP_KILL|1<<CAP_SETGID|1<<CAP_SETUID|1<<CAP_SETPCAP|1<<CAP_LINUX_IMMUTABLE|1<<CAP_NET_BIND_SERVICE|1<<CAP_NET_BROADCAST|1<<CAP_NET_ADMIN|1<<CAP_NET_RAW|1<<CAP_IPC_LOCK|1<<CAP_IPC_OWNER|1<<CAP_SYS_MODULE|1<<CAP_SYS_RAWIO|1<<CAP_SYS_CHROOT|1<<CAP_SYS_PACCT|1<<CAP_SYS_ADMIN|1<<CAP_SYS_BOOT|1<<CAP_SYS_RESOURCE|1<<CAP_SYS_TIME|1<<CAP_SYS_TTY_CONFIG|1<<CAP_MKNOD|1<<CAP_LEASE|1<<CAP_AUDIT_WRITE|1<<CAP_AUDIT_CONTROL|1<<CAP_SETFCAP|1<<CAP_MAC_OVERRIDE|1<<CAP_MAC_ADMIN|1<<CAP_SYSLOG|1<<CAP_WAKE_ALARM|1<<CAP_BLOCK_SUSPEND|1<<CAP_AUDIT_READ|1<<CAP_PERFMON|1<<CAP_BPF|1<<CAP_CHECKPOINT_RESTORE, inheritable=0}) = 0 [pid 289] unshare(CLONE_NEWNET) = 0 [pid 289] openat(AT_FDCWD, "/proc/sys/net/ipv4/ping_group_range", O_WRONLY|O_CLOEXEC) = 3 [pid 289] write(3, "0 65535", 7) = 7 [pid 289] close(3) = 0 [pid 289] openat(AT_FDCWD, "/proc/sys/fs/mount-max", O_WRONLY|O_CLOEXEC) = 3 [pid 289] write(3, "100000", 6) = 6 [pid 289] close(3) = 0 [pid 289] mkdir("./syz-tmp", 0777) = 0 [pid 289] mount("", "./syz-tmp", "tmpfs", 0, NULL) = 0 [ 22.999283][ T24] audit: type=1400 audit(1745627660.280:66): avc: denied { execmem } for pid=288 comm="syz-executor619" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 23.024308][ T24] audit: type=1400 audit(1745627660.310:67): avc: denied { mounton } for pid=289 comm="syz-executor619" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [pid 289] mkdir("./syz-tmp/newroot", 0777) = 0 [pid 289] mkdir("./syz-tmp/newroot/dev", 0700) = 0 [pid 289] mount("/dev", "./syz-tmp/newroot/dev", NULL, MS_BIND|MS_REC|MS_PRIVATE, NULL) = 0 [pid 289] mkdir("./syz-tmp/newroot/proc", 0700) = 0 [pid 289] mount("syz-proc", "./syz-tmp/newroot/proc", "proc", 0, NULL) = 0 [pid 289] mkdir("./syz-tmp/newroot/selinux", 0700) = 0 [pid 289] mount("/selinux", "./syz-tmp/newroot/selinux", NULL, MS_BIND|MS_REC|MS_PRIVATE, NULL) = -1 ENOENT (No such file or directory) [pid 289] mount("/sys/fs/selinux", "./syz-tmp/newroot/selinux", NULL, MS_BIND|MS_REC|MS_PRIVATE, NULL) = 0 [pid 289] mkdir("./syz-tmp/newroot/sys", 0700) = 0 [pid 289] mount("/sys", "./syz-tmp/newroot/sys", NULL, MS_BIND|MS_REC|MS_PRIVATE, NULL) = 0 [pid 289] mount("/sys/kernel/debug", "./syz-tmp/newroot/sys/kernel/debug", NULL, MS_BIND|MS_REC|MS_PRIVATE, NULL) = 0 [pid 289] mount("/sys/fs/smackfs", "./syz-tmp/newroot/sys/fs/smackfs", NULL, MS_BIND|MS_REC|MS_PRIVATE, NULL) = -1 ENOENT (No such file or directory) [pid 289] mount("/proc/sys/fs/binfmt_misc", "./syz-tmp/newroot/proc/sys/fs/binfmt_misc", NULL, MS_BIND|MS_REC|MS_PRIVATE, NULL) = 0 [pid 289] mkdir("./syz-tmp/newroot/syz-inputs", 0700) = 0 [pid 289] mount("/syz-inputs", "./syz-tmp/newroot/syz-inputs", NULL, MS_RDONLY|MS_BIND|MS_REC|MS_PRIVATE, NULL) = -1 ENOENT (No such file or directory) [pid 289] mkdir("./syz-tmp/pivot", 0777) = 0 [pid 289] pivot_root("./syz-tmp", "./syz-tmp/pivot") = 0 [pid 289] chdir("/") = 0 [pid 289] umount2("./pivot", MNT_DETACH) = 0 [pid 289] chroot("./newroot") = 0 [pid 289] chdir("/") = 0 [pid 289] mkdir("/dev/gadgetfs", 0777) = 0 [ 23.059101][ T24] audit: type=1400 audit(1745627660.340:68): avc: denied { mounton } for pid=289 comm="syz-executor619" path="/root/syzkaller.00RTQ8/syz-tmp" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [pid 289] mount("gadgetfs", "/dev/gadgetfs", "gadgetfs", 0, NULL) = -1 ENODEV (No such device) [pid 289] mkdir("/dev/binderfs", 0777) = 0 [pid 289] mount("binder", "/dev/binderfs", "binder", 0, NULL) = 0 [pid 289] mount(NULL, "/sys/fs/fuse/connections", "fusectl", 0, NULL) = -1 EBUSY (Device or resource busy) [pid 289] mkdir("./0", 0777) = 0 [pid 289] clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x555557c43650) = 2 ./strace-static-x86_64: Process 290 attached [pid 290] set_robust_list(0x555557c43660, 24) = 0 [pid 290] chdir("./0") = 0 [pid 290] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0 [pid 290] setpgid(0, 0) = 0 [pid 290] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC) = 3 [pid 290] write(3, "1000", 4) = 4 [pid 290] close(3) = 0 [pid 290] symlink("/dev/binderfs", "./binderfs") = 0 [pid 290] write(1, "executing program\n", 18executing program ) = 18 [pid 290] mkdirat(AT_FDCWD, "./file0", 000) = 0 [pid 290] mount(".", "./file0", NULL, MS_RDONLY|MS_SYNCHRONOUS|MS_DIRSYNC|MS_BIND|MS_SHARED, NULL) = 0 [ 23.088966][ T24] audit: type=1400 audit(1745627660.340:69): avc: denied { mount } for pid=289 comm="syz-executor619" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 23.092760][ T289] request_module fs-gadgetfs succeeded, but still no fs? [ 23.115928][ T24] audit: type=1400 audit(1745627660.350:70): avc: denied { mounton } for pid=289 comm="syz-executor619" path="/root/syzkaller.00RTQ8/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [pid 290] mount("./file0", "./file0", "incremental-fs", MS_RDONLY, NULL) = 0 [pid 290] close(3) = -1 EBADF (Bad file descriptor) [pid 290] close(4) = -1 EBADF (Bad file descriptor) [pid 290] close(5) = -1 EBADF (Bad file descriptor) [pid 290] close(6) = -1 EBADF (Bad file descriptor) [pid 290] close(7) = -1 EBADF (Bad file descriptor) [pid 290] close(8) = -1 EBADF (Bad file descriptor) [pid 290] close(9) = -1 EBADF (Bad file descriptor) [pid 290] close(10) = -1 EBADF (Bad file descriptor) [pid 290] close(11) = -1 EBADF (Bad file descriptor) [pid 290] close(12) = -1 EBADF (Bad file descriptor) [pid 290] close(13) = -1 EBADF (Bad file descriptor) [pid 290] close(14) = -1 EBADF (Bad file descriptor) [pid 290] close(15) = -1 EBADF (Bad file descriptor) [pid 290] close(16) = -1 EBADF (Bad file descriptor) [pid 290] close(17) = -1 EBADF (Bad file descriptor) [pid 290] close(18) = -1 EBADF (Bad file descriptor) [pid 290] close(19) = -1 EBADF (Bad file descriptor) [pid 290] close(20) = -1 EBADF (Bad file descriptor) [pid 290] close(21) = -1 EBADF (Bad file descriptor) [pid 290] close(22) = -1 EBADF (Bad file descriptor) [pid 290] close(23) = -1 EBADF (Bad file descriptor) [pid 290] close(24) = -1 EBADF (Bad file descriptor) [pid 290] close(25) = -1 EBADF (Bad file descriptor) [pid 290] close(26) = -1 EBADF (Bad file descriptor) [pid 290] close(27) = -1 EBADF (Bad file descriptor) [pid 290] close(28) = -1 EBADF (Bad file descriptor) [pid 290] close(29) = -1 EBADF (Bad file descriptor) [pid 290] exit_group(0) = ? [pid 290] +++ exited with 0 +++ [pid 289] --- SIGCHLD {si_signo=SIGCHLD, si_code=CLD_EXITED, si_pid=2, si_uid=0, si_status=0, si_utime=0, si_stime=1} --- [pid 289] umount2("./0", MNT_FORCE|UMOUNT_NOFOLLOW) = -1 EINVAL (Invalid argument) [pid 289] openat(AT_FDCWD, "./0", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 3 [pid 289] newfstatat(3, "", {st_mode=S_IFDIR|0700, st_size=120, ...}, AT_EMPTY_PATH) = 0 [pid 289] getdents64(3, 0x555557c446f0 /* 6 entries */, 32768) = 176 [pid 289] umount2("./0/.incomplete", MNT_FORCE|UMOUNT_NOFOLLOW) = -1 EINVAL (Invalid argument) [pid 289] newfstatat(AT_FDCWD, "./0/.incomplete", {st_mode=S_IFDIR|0700, st_size=40, ...}, AT_SYMLINK_NOFOLLOW) = 0 [pid 289] umount2("./0/.incomplete", MNT_FORCE|UMOUNT_NOFOLLOW) = -1 EINVAL (Invalid argument) [pid 289] openat(AT_FDCWD, "./0/.incomplete", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 4 [pid 289] newfstatat(4, "", {st_mode=S_IFDIR|0700, st_size=40, ...}, AT_EMPTY_PATH) = 0 [pid 289] getdents64(4, 0x555557c4c730 /* 2 entries */, 32768) = 48 [pid 289] getdents64(4, 0x555557c4c730 /* 0 entries */, 32768) = 0 [pid 289] close(4) = 0 [pid 289] rmdir("./0/.incomplete") = 0 [pid 289] umount2("./0/.index", MNT_FORCE|UMOUNT_NOFOLLOW) = -1 EINVAL (Invalid argument) [pid 289] newfstatat(AT_FDCWD, "./0/.index", {st_mode=S_IFDIR|0700, st_size=40, ...}, AT_SYMLINK_NOFOLLOW) = 0 [pid 289] umount2("./0/.index", MNT_FORCE|UMOUNT_NOFOLLOW) = -1 EINVAL (Invalid argument) [pid 289] openat(AT_FDCWD, "./0/.index", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 4 [pid 289] newfstatat(4, "", {st_mode=S_IFDIR|0700, st_size=40, ...}, AT_EMPTY_PATH) = 0 [pid 289] getdents64(4, 0x555557c4c730 /* 2 entries */, 32768) = 48 [pid 289] getdents64(4, 0x555557c4c730 /* 0 entries */, 32768) = 0 [pid 289] close(4) = 0 [pid 289] rmdir("./0/.index") = 0 [ 23.141168][ T290] incfs: ino conflict with backing FS 9 [ 23.156491][ T24] audit: type=1400 audit(1745627660.350:71): avc: denied { mount } for pid=289 comm="syz-executor619" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 23.189840][ T24] audit: type=1400 audit(1745627660.350:72): avc: denied { mounton } for pid=289 comm="syz-executor619" path="/root/syzkaller.00RTQ8/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 23.190115][ T289] ------------[ cut here ]------------ [ 23.222074][ T24] audit: type=1400 audit(1745627660.350:73): avc: denied { mounton } for pid=289 comm="syz-executor619" path="/root/syzkaller.00RTQ8/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=13966 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 23.228529][ T289] WARNING: CPU: 0 PID: 289 at fs/inode.c:304 drop_nlink+0xc5/0x110 [ 23.260026][ T24] audit: type=1400 audit(1745627660.360:74): avc: denied { unmount } for pid=289 comm="syz-executor619" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 23.271971][ T289] Modules linked in: [ 23.293578][ T24] audit: type=1400 audit(1745627660.370:75): avc: denied { mounton } for pid=289 comm="syz-executor619" path="/dev/gadgetfs" dev="devtmpfs" ino=509 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 23.301731][ T289] CPU: 0 PID: 289 Comm: syz-executor619 Not tainted 5.10.236-syzkaller #0 [ 23.341971][ T289] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 23.355412][ T289] RIP: 0010:drop_nlink+0xc5/0x110 [ 23.360539][ T289] Code: 1b 48 8d bb b8 04 00 00 be 08 00 00 00 e8 a3 23 f2 ff f0 48 ff 83 b8 04 00 00 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 2b 3b b8 ff <0f> 0b eb 86 44 89 f1 80 e1 07 80 c1 03 38 c1 0f 8c 5e ff ff ff 4c [ 23.389582][ T289] RSP: 0018:ffffc90000b77be8 EFLAGS: 00010293 [ 23.395798][ T289] RAX: ffffffff81ab5015 RBX: ffff88810d054b40 RCX: ffff88810aefe2c0 [ 23.404309][ T289] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 23.414808][ T289] RBP: ffffc90000b77c10 R08: 0000000000000004 R09: 0000000000000003 [ 23.423223][ T289] R10: fffff5200016ef6c R11: 1ffff9200016ef6c R12: dffffc0000000000 [ 23.432650][ T289] R13: 1ffff11021a0a971 R14: ffff88810d054b88 R15: 0000000000000000 [ 23.442969][ T289] FS: 0000555557c43380(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 23.453939][ T289] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 23.461651][ T289] CR2: 0000000029ceb248 CR3: 0000000100bc6000 CR4: 00000000003506a0 [ 23.470078][ T289] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 23.478602][ T289] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 23.486458][ T289] Call Trace: [ 23.489682][ T289] shmem_rmdir+0x5b/0x90 [ 23.494019][ T289] vfs_rmdir+0x1b3/0x3e0 [ 23.498588][ T289] incfs_kill_sb+0xfe/0x210 [ 23.503276][ T289] deactivate_locked_super+0xa0/0x100 [ 23.508754][ T289] deactivate_super+0xaf/0xe0 [ 23.513442][ T289] cleanup_mnt+0x446/0x500 [ 23.517912][ T289] __cleanup_mnt+0x19/0x20 [ 23.522312][ T289] task_work_run+0x127/0x190 [ 23.530057][ T289] ptrace_notify+0x212/0x250 [ 23.535339][ T289] ? do_notify_parent+0x7e0/0x7e0 [ 23.540407][ T289] ? user_path_at_empty+0x43/0x50 [ 23.545553][ T289] ? __x64_sys_umount+0x125/0x160 [ 23.550851][ T289] ? path_umount+0xe60/0xe60 [ 23.555265][ T289] syscall_exit_work+0x6e/0x140 [ 23.560353][ T289] syscall_exit_to_user_mode+0x5b/0x90 [ 23.566055][ T289] do_syscall_64+0x3d/0x40 [ 23.570617][ T289] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 23.577475][ T289] RIP: 0033:0x7fb4d7a77a87 [ 23.582256][ T289] Code: 07 00 48 83 c4 08 5b 5d c3 66 2e 0f 1f 84 00 00 00 00 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 [ 23.605545][ T289] RSP: 002b:00007ffe92d02a98 EFLAGS: 00000202 ORIG_RAX: 00000000000000a6 [ 23.618655][ T289] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fb4d7a77a87 [ 23.636372][ T289] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffe92d02b50 [ 23.650776][ T289] RBP: 00007ffe92d02b50 R08: 0000000000000000 R09: 0000000000000000 [ 23.663094][ T289] R10: 00000000ffffffff R11: 0000000000000202 R12: 00007ffe92d03bc0 [ 23.674351][ T289] R13: 0000555557c446c0 R14: 00007ffe92d03bc0 R15: 0000000000000001 [ 23.683036][ T289] ---[ end trace 4d5097d24353bf42 ]--- [ 23.689237][ T289] ================================================================== [ 23.698843][ T289] BUG: KASAN: null-ptr-deref in ihold+0x20/0x60 [ 23.704836][ T289] Write of size 4 at addr 0000000000000170 by task syz-executor619/289 [ 23.713122][ T289] [ 23.715305][ T289] CPU: 1 PID: 289 Comm: syz-executor619 Tainted: G W 5.10.236-syzkaller #0 [ 23.725015][ T289] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 23.734992][ T289] Call Trace: [ 23.738122][ T289] __dump_stack+0x21/0x24 [ 23.742543][ T289] dump_stack_lvl+0x169/0x1d8 [ 23.747143][ T289] ? thaw_kernel_threads+0x220/0x220 [ 23.752370][ T289] ? show_regs_print_info+0x18/0x18 [ 23.757793][ T289] ? _raw_spin_lock+0x8e/0xe0 [ 23.762291][ T289] ? _raw_spin_trylock_bh+0x130/0x130 [ 23.767723][ T289] ? ihold+0x20/0x60 [ 23.772209][ T289] kasan_report+0xd8/0x130 [ 23.776930][ T289] ? ihold+0x20/0x60 [ 23.780610][ T289] kasan_check_range+0x280/0x290 [ 23.786229][ T289] __kasan_check_write+0x14/0x20 [ 23.791168][ T289] ihold+0x20/0x60 [ 23.795073][ T289] vfs_rmdir+0x247/0x3e0 [ 23.799157][ T289] incfs_kill_sb+0xfe/0x210 [ 23.803731][ T289] deactivate_locked_super+0xa0/0x100 [ 23.809657][ T289] deactivate_super+0xaf/0xe0 [ 23.814188][ T289] cleanup_mnt+0x446/0x500 [ 23.818607][ T289] __cleanup_mnt+0x19/0x20 [ 23.822789][ T289] task_work_run+0x127/0x190 [ 23.827744][ T289] ptrace_notify+0x212/0x250 [ 23.832252][ T289] ? do_notify_parent+0x7e0/0x7e0 [ 23.837412][ T289] ? user_path_at_empty+0x43/0x50 [ 23.842648][ T289] ? __x64_sys_umount+0x125/0x160 [ 23.848209][ T289] ? path_umount+0xe60/0xe60 [ 23.853275][ T289] syscall_exit_work+0x6e/0x140 [ 23.858588][ T289] syscall_exit_to_user_mode+0x5b/0x90 [ 23.864380][ T289] do_syscall_64+0x3d/0x40 [ 23.869226][ T289] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 23.875083][ T289] RIP: 0033:0x7fb4d7a77a87 [ 23.881208][ T289] Code: 07 00 48 83 c4 08 5b 5d c3 66 2e 0f 1f 84 00 00 00 00 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 [ 23.902530][ T289] RSP: 002b:00007ffe92d02a98 EFLAGS: 00000202 ORIG_RAX: 00000000000000a6 [ 23.911230][ T289] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fb4d7a77a87 [ 23.920247][ T289] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffe92d02b50 [ 23.929190][ T289] RBP: 00007ffe92d02b50 R08: 0000000000000000 R09: 0000000000000000 [ 23.938040][ T289] R10: 00000000ffffffff R11: 0000000000000202 R12: 00007ffe92d03bc0 [ 23.947642][ T289] R13: 0000555557c446c0 R14: 00007ffe92d03bc0 R15: 0000000000000001 [ 23.956712][ T289] ================================================================== [ 23.966261][ T289] Disabling lock debugging due to kernel taint [ 23.975907][ T289] BUG: kernel NULL pointer dereference, address: 0000000000000170 [ 23.983878][ T289] #PF: supervisor write access in kernel mode [ 23.992222][ T289] #PF: error_code(0x0002) - not-present page [ 23.999624][ T289] PGD 0 P4D 0 [ 24.003495][ T289] Oops: 0002 [#1] PREEMPT SMP KASAN [ 24.009606][ T289] CPU: 1 PID: 289 Comm: syz-executor619 Tainted: G B W 5.10.236-syzkaller #0 [ 24.021449][ T289] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 24.036702][ T289] RIP: 0010:ihold+0x26/0x60 [ 24.041988][ T289] Code: 00 00 00 00 55 48 89 e5 41 56 53 48 89 fb e8 41 33 b8 ff 48 8d bb 70 01 00 00 be 04 00 00 00 e8 90 1b f2 ff 41 be 01 00 00 00 <f0> 44 0f c1 b3 70 01 00 00 41 ff c6 bf 02 00 00 00 44 89 f6 e8 c1 [ 24.073603][ T289] RSP: 0018:ffffc90000b77c28 EFLAGS: 00010246 [ 24.080005][ T289] RAX: ffff88810aefe200 RBX: 0000000000000000 RCX: 0000000000000286 [ 24.091034][ T289] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 00000000ffffffff [ 24.101125][ T289] RBP: ffffc90000b77c38 R08: 0000000000000004 R09: 0000000000000003 [ 24.112905][ T289] R10: fffffbfff0d8e448 R11: 1ffffffff0d8e448 R12: 1ffff1102125364a [ 24.124029][ T289] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 [ 24.132062][ T289] FS: 0000555557c43380(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 24.141588][ T289] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 24.150478][ T289] CR2: 0000000000000170 CR3: 0000000100bc6000 CR4: 00000000003506a0 [ 24.158985][ T289] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 24.170472][ T289] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 24.179454][ T289] Call Trace: [ 24.183157][ T289] vfs_rmdir+0x247/0x3e0 [ 24.188304][ T289] incfs_kill_sb+0xfe/0x210 [ 24.193284][ T289] deactivate_locked_super+0xa0/0x100 [ 24.199390][ T289] deactivate_super+0xaf/0xe0 [ 24.204506][ T289] cleanup_mnt+0x446/0x500 [ 24.210942][ T289] __cleanup_mnt+0x19/0x20 [ 24.217921][ T289] task_work_run+0x127/0x190 [ 24.223489][ T289] ptrace_notify+0x212/0x250 [ 24.229247][ T289] ? do_notify_parent+0x7e0/0x7e0 [ 24.234628][ T289] ? user_path_at_empty+0x43/0x50 [ 24.241068][ T289] ? __x64_sys_umount+0x125/0x160 [ 24.247653][ T289] ? path_umount+0xe60/0xe60 [ 24.258801][ T289] syscall_exit_work+0x6e/0x140 [ 24.264935][ T289] syscall_exit_to_user_mode+0x5b/0x90 [ 24.275008][ T289] do_syscall_64+0x3d/0x40 [ 24.279971][ T289] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 24.287886][ T289] RIP: 0033:0x7fb4d7a77a87 [ 24.292758][ T289] Code: 07 00 48 83 c4 08 5b 5d c3 66 2e 0f 1f 84 00 00 00 00 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 [ 24.316164][ T289] RSP: 002b:00007ffe92d02a98 EFLAGS: 00000202 ORIG_RAX: 00000000000000a6 [ 24.327114][ T289] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fb4d7a77a87 [ 24.336369][ T289] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffe92d02b50 [ 24.347537][ T289] RBP: 00007ffe92d02b50 R08: 0000000000000000 R09: 0000000000000000 [ 24.356282][ T289] R10: 00000000ffffffff R11: 0000000000000202 R12: 00007ffe92d03bc0 [ 24.365881][ T289] R13: 0000555557c446c0 R14: 00007ffe92d03bc0 R15: 0000000000000001 [ 24.375247][ T289] Modules linked in: [ 24.379686][ T289] CR2: 0000000000000170 [ 24.384285][ T289] ---[ end trace 4d5097d24353bf43 ]--- [ 24.390212][ T289] RIP: 0010:ihold+0x26/0x60 [ 24.395410][ T289] Code: 00 00 00 00 55 48 89 e5 41 56 53 48 89 fb e8 41 33 b8 ff 48 8d bb 70 01 00 00 be 04 00 00 00 e8 90 1b f2 ff 41 be 01 00 00 00 <f0> 44 0f c1 b3 70 01 00 00 41 ff c6 bf 02 00 00 00 44 89 f6 e8 c1 [ 24.420760][ T289] RSP: 0018:ffffc90000b77c28 EFLAGS: 00010246 [ 24.427910][ T289] RAX: ffff88810aefe200 RBX: 0000000000000000 RCX: 0000000000000286 [ 24.437739][ T289] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 00000000ffffffff [ 24.447392][ T289] RBP: ffffc90000b77c38 R08: 0000000000000004 R09: 0000000000000003 [ 24.456401][ T289] R10: fffffbfff0d8e448 R11: 1ffffffff0d8e448 R12: 1ffff1102125364a [ 24.466370][ T289] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 [ 24.474945][ T289] FS: 0000555557c43380(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 24.484333][ T289] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 24.496696][ T289] CR2: 0000000000000170 CR3: 0000000100bc6000 CR4: 00000000003506a0 [ 24.508071][ T289] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 24.516585][ T289] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 24.525293][ T289] Kernel panic - not syncing: Fatal exception [ 24.533163][ T289] Kernel Offset: disabled [ 24.539420][ T289] Rebooting in 86400 seconds..