./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor298190400

<...>
Warning: Permanently added '10.128.1.188' (ED25519) to the list of known hosts.
execve("./syz-executor298190400", ["./syz-executor298190400"], 0x7ffca7d06850 /* 10 vars */) = 0
brk(NULL)                               = 0x55556e8a2000
brk(0x55556e8a2e00)                     = 0x55556e8a2e00
arch_prctl(ARCH_SET_FS, 0x55556e8a2480) = 0
set_tid_address(0x55556e8a2750)         = 288
set_robust_list(0x55556e8a2760, 24)     = 0
rseq(0x55556e8a2da0, 0x20, 0, 0x53053053) = -1 ENOSYS (Function not implemented)
prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0
readlink("/proc/self/exe", "/root/syz-executor298190400", 4096) = 27
getrandom("\xf5\xfd\xc1\x1f\xd2\xc6\x4a\x17", 8, GRND_NONBLOCK) = 8
brk(NULL)                               = 0x55556e8a2e00
brk(0x55556e8c3e00)                     = 0x55556e8c3e00
brk(0x55556e8c4000)                     = 0x55556e8c4000
mprotect(0x7fa55fb93000, 16384, PROT_READ) = 0
mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000
mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000
mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000
rt_sigaction(SIGRTMIN, {sa_handler=SIG_IGN, sa_mask=[], sa_flags=0}, NULL, 8) = 0
rt_sigaction(SIGRT_1, {sa_handler=SIG_IGN, sa_mask=[], sa_flags=0}, NULL, 8) = 0
rt_sigaction(SIGSEGV, {sa_handler=0x7fa55fae9da0, sa_mask=[], sa_flags=SA_RESTORER|SA_NODEFER|SA_SIGINFO, sa_restorer=0x7fa55faf1a30}, NULL, 8) = 0
rt_sigaction(SIGBUS, {sa_handler=0x7fa55fae9da0, sa_mask=[], sa_flags=SA_RESTORER|SA_NODEFER|SA_SIGINFO, sa_restorer=0x7fa55faf1a30}, NULL, 8) = 0
getrandom("\x9c\x41\x9d\x3a\x32\xd4\x9d\x45", 8, GRND_NONBLOCK) = 8
mkdir("./syzkaller.eC67Ep", 0700)       = 0
chmod("./syzkaller.eC67Ep", 0777)       = 0
chdir("./syzkaller.eC67Ep")             = 0
unshare(CLONE_NEWPID)                   = 0
clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x55556e8a2750) = 289
./strace-static-x86_64: Process 289 attached
[pid   289] set_robust_list(0x55556e8a2760, 24) = 0
[pid   289] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0
[pid   289] getppid()                   = 0
[pid   289] prlimit64(0, RLIMIT_AS, {rlim_cur=204800*1024, rlim_max=204800*1024}, NULL) = 0
[pid   289] prlimit64(0, RLIMIT_MEMLOCK, {rlim_cur=32768*1024, rlim_max=32768*1024}, NULL) = 0
[pid   289] prlimit64(0, RLIMIT_FSIZE, {rlim_cur=139264*1024, rlim_max=139264*1024}, NULL) = 0
[pid   289] prlimit64(0, RLIMIT_STACK, {rlim_cur=1024*1024, rlim_max=1024*1024}, NULL) = 0
[pid   289] prlimit64(0, RLIMIT_CORE, {rlim_cur=131072*1024, rlim_max=131072*1024}, NULL) = 0
[pid   289] prlimit64(0, RLIMIT_NOFILE, {rlim_cur=256, rlim_max=256}, NULL) = 0
[pid   289] unshare(CLONE_NEWNS)        = 0
[pid   289] mount(NULL, "/", NULL, MS_REC|MS_PRIVATE, NULL) = 0
[pid   289] unshare(CLONE_NEWIPC)       = -1 EINVAL (Invalid argument)
[pid   289] unshare(CLONE_NEWCGROUP)    = 0
[pid   289] unshare(CLONE_NEWUTS)       = 0
[pid   289] unshare(CLONE_SYSVSEM)      = 0
[pid   289] openat(AT_FDCWD, "/proc/sys/kernel/shmmax", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
[pid   289] openat(AT_FDCWD, "/proc/sys/kernel/shmall", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
[pid   289] openat(AT_FDCWD, "/proc/sys/kernel/shmmni", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
[pid   289] openat(AT_FDCWD, "/proc/sys/kernel/msgmax", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
[pid   289] openat(AT_FDCWD, "/proc/sys/kernel/msgmni", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
[pid   289] openat(AT_FDCWD, "/proc/sys/kernel/msgmnb", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
[pid   289] openat(AT_FDCWD, "/proc/sys/kernel/sem", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
[pid   289] getpid()                    = 1
[pid   289] capget({version=_LINUX_CAPABILITY_VERSION_3, pid=1}, {effective=1<<CAP_CHOWN|1<<CAP_DAC_OVERRIDE|1<<CAP_DAC_READ_SEARCH|1<<CAP_FOWNER|1<<CAP_FSETID|1<<CAP_KILL|1<<CAP_SETGID|1<<CAP_SETUID|1<<CAP_SETPCAP|1<<CAP_LINUX_IMMUTABLE|1<<CAP_NET_BIND_SERVICE|1<<CAP_NET_BROADCAST|1<<CAP_NET_ADMIN|1<<CAP_NET_RAW|1<<CAP_IPC_LOCK|1<<CAP_IPC_OWNER|1<<CAP_SYS_MODULE|1<<CAP_SYS_RAWIO|1<<CAP_SYS_CHROOT|1<<CAP_SYS_PTRACE|1<<CAP_SYS_PACCT|1<<CAP_SYS_ADMIN|1<<CAP_SYS_BOOT|1<<CAP_SYS_NICE|1<<CAP_SYS_RESOURCE|1<<CAP_SYS_TIME|1<<CAP_SYS_TTY_CONFIG|1<<CAP_MKNOD|1<<CAP_LEASE|1<<CAP_AUDIT_WRITE|1<<CAP_AUDIT_CONTROL|1<<CAP_SETFCAP|1<<CAP_MAC_OVERRIDE|1<<CAP_MAC_ADMIN|1<<CAP_SYSLOG|1<<CAP_WAKE_ALARM|1<<CAP_BLOCK_SUSPEND|1<<CAP_AUDIT_READ|1<<CAP_PERFMON|1<<CAP_BPF|1<<CAP_CHECKPOINT_RESTORE, permitted=1<<CAP_CHOWN|1<<CAP_DAC_OVERRIDE|1<<CAP_DAC_READ_SEARCH|1<<CAP_FOWNER|1<<CAP_FSETID|1<<CAP_KILL|1<<CAP_SETGID|1<<CAP_SETUID|1<<CAP_SETPCAP|1<<CAP_LINUX_IMMUTABLE|1<<CAP_NET_BIND_SERVICE|1<<CAP_NET_BROADCAST|1<<CAP_NET_ADMIN|1<<CAP_NET_RAW|1<<CAP_IPC_LOCK|1<<CAP_IPC_OWNER|1<<CAP_SYS_MODULE|1<<CAP_SYS_RAWIO|1<<CAP_SYS_CHROOT|1<<CAP_SYS_PTRACE|1<<CAP_SYS_PACCT|1<<CAP_SYS_ADMIN|1<<CAP_SYS_BOOT|1<<CAP_SYS_NICE|1<<CAP_SYS_RESOURCE|1<<CAP_SYS_TIME|1<<CAP_SYS_TTY_CONFIG|1<<CAP_MKNOD|1<<CAP_LEASE|1<<CAP_AUDIT_WRITE|1<<CAP_AUDIT_CONTROL|1<<CAP_SETFCAP|1<<CAP_MAC_OVERRIDE|1<<CAP_MAC_ADMIN|1<<CAP_SYSLOG|1<<CAP_WAKE_ALARM|1<<CAP_BLOCK_SUSPEND|1<<CAP_AUDIT_READ|1<<CAP_PERFMON|1<<CAP_BPF|1<<CAP_CHECKPOINT_RESTORE, inheritable=0}) = 0
[pid   289] capset({version=_LINUX_CAPABILITY_VERSION_3, pid=1}, {effective=1<<CAP_CHOWN|1<<CAP_DAC_OVERRIDE|1<<CAP_DAC_READ_SEARCH|1<<CAP_FOWNER|1<<CAP_FSETID|1<<CAP_KILL|1<<CAP_SETGID|1<<CAP_SETUID|1<<CAP_SETPCAP|1<<CAP_LINUX_IMMUTABLE|1<<CAP_NET_BIND_SERVICE|1<<CAP_NET_BROADCAST|1<<CAP_NET_ADMIN|1<<CAP_NET_RAW|1<<CAP_IPC_LOCK|1<<CAP_IPC_OWNER|1<<CAP_SYS_MODULE|1<<CAP_SYS_RAWIO|1<<CAP_SYS_CHROOT|1<<CAP_SYS_PACCT|1<<CAP_SYS_ADMIN|1<<CAP_SYS_BOOT|1<<CAP_SYS_RESOURCE|1<<CAP_SYS_TIME|1<<CAP_SYS_TTY_CONFIG|1<<CAP_MKNOD|1<<CAP_LEASE|1<<CAP_AUDIT_WRITE|1<<CAP_AUDIT_CONTROL|1<<CAP_SETFCAP|1<<CAP_MAC_OVERRIDE|1<<CAP_MAC_ADMIN|1<<CAP_SYSLOG|1<<CAP_WAKE_ALARM|1<<CAP_BLOCK_SUSPEND|1<<CAP_AUDIT_READ|1<<CAP_PERFMON|1<<CAP_BPF|1<<CAP_CHECKPOINT_RESTORE, permitted=1<<CAP_CHOWN|1<<CAP_DAC_OVERRIDE|1<<CAP_DAC_READ_SEARCH|1<<CAP_FOWNER|1<<CAP_FSETID|1<<CAP_KILL|1<<CAP_SETGID|1<<CAP_SETUID|1<<CAP_SETPCAP|1<<CAP_LINUX_IMMUTABLE|1<<CAP_NET_BIND_SERVICE|1<<CAP_NET_BROADCAST|1<<CAP_NET_ADMIN|1<<CAP_NET_RAW|1<<CAP_IPC_LOCK|1<<CAP_IPC_OWNER|1<<CAP_SYS_MODULE|1<<CAP_SYS_RAWIO|1<<CAP_SYS_CHROOT|1<<CAP_SYS_PACCT|1<<CAP_SYS_ADMIN|1<<CAP_SYS_BOOT|1<<CAP_SYS_RESOURCE|1<<CAP_SYS_TIME|1<<CAP_SYS_TTY_CONFIG|1<<CAP_MKNOD|1<<CAP_LEASE|1<<CAP_AUDIT_WRITE|1<<CAP_AUDIT_CONTROL|1<<CAP_SETFCAP|1<<CAP_MAC_OVERRIDE|1<<CAP_MAC_ADMIN|1<<CAP_SYSLOG|1<<CAP_WAKE_ALARM|1<<CAP_BLOCK_SUSPEND|1<<CAP_AUDIT_READ|1<<CAP_PERFMON|1<<CAP_BPF|1<<CAP_CHECKPOINT_RESTORE, inheritable=0}) = 0
[pid   289] unshare(CLONE_NEWNET)       = 0
[pid   289] openat(AT_FDCWD, "/proc/sys/net/ipv4/ping_group_range", O_WRONLY|O_CLOEXEC) = 3
[pid   289] write(3, "0 65535", 7)      = 7
[pid   289] close(3)                    = 0
[pid   289] openat(AT_FDCWD, "/proc/sys/fs/mount-max", O_WRONLY|O_CLOEXEC) = 3
[pid   289] write(3, "100000", 6)       = 6
[pid   289] close(3)                    = 0
[pid   289] mkdir("./syz-tmp", 0777)    = 0
[pid   289] mount("", "./syz-tmp", "tmpfs", 0, NULL) = 0
[pid   289] mkdir("./syz-tmp/newroot", 0777) = 0
[pid   289] mkdir("./syz-tmp/newroot/dev", 0700) = 0
[pid   289] mount("/dev", "./syz-tmp/newroot/dev", NULL, MS_BIND|MS_REC|MS_PRIVATE, NULL) = 0
[pid   289] mkdir("./syz-tmp/newroot/proc", 0700) = 0
[pid   289] mount("syz-proc", "./syz-tmp/newroot/proc", "proc", 0, NULL) = 0
[pid   289] mkdir("./syz-tmp/newroot/selinux", 0700) = 0
[pid   289] mount("/selinux", "./syz-tmp/newroot/selinux", NULL, MS_BIND|MS_REC|MS_PRIVATE, NULL) = -1 ENOENT (No such file or directory)
[pid   289] mount("/sys/fs/selinux", "./syz-tmp/newroot/selinux", NULL, MS_BIND|MS_REC|MS_PRIVATE, NULL) = 0
[pid   289] mkdir("./syz-tmp/newroot/sys", 0700) = 0
[pid   289] mount("/sys", "./syz-tmp/newroot/sys", NULL, MS_BIND|MS_REC|MS_PRIVATE, NULL) = 0
[pid   289] mount("/sys/kernel/debug", "./syz-tmp/newroot/sys/kernel/debug", NULL, MS_BIND|MS_REC|MS_PRIVATE, NULL) = 0
[pid   289] mount("/sys/fs/smackfs", "./syz-tmp/newroot/sys/fs/smackfs", NULL, MS_BIND|MS_REC|MS_PRIVATE, NULL) = -1 ENOENT (No such file or directory)
[pid   289] mount("/proc/sys/fs/binfmt_misc", "./syz-tmp/newroot/proc/sys/fs/binfmt_misc", NULL, MS_BIND|MS_REC|MS_PRIVATE, NULL) = 0
[pid   289] mkdir("./syz-tmp/pivot", 0777) = 0
[pid   289] pivot_root("./syz-tmp", "./syz-tmp/pivot") = 0
[pid   289] chdir("/")                  = 0
[pid   289] umount2("./pivot", MNT_DETACH) = 0
[pid   289] chroot("./newroot")         = 0
[pid   289] chdir("/")                  = 0
[   21.294766][   T24] audit: type=1400 audit(1735273420.330:66): avc:  denied  { execmem } for  pid=288 comm="syz-executor298" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
[   21.304587][   T24] audit: type=1400 audit(1735273420.340:67): avc:  denied  { mounton } for  pid=289 comm="syz-executor298" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1
[pid   289] mkdir("/dev/gadgetfs", 0777) = 0
[pid   289] mount("gadgetfs", "/dev/gadgetfs", "gadgetfs", 0, NULL) = -1 ENODEV (No such device)
[pid   289] mkdir("/dev/binderfs", 0777) = 0
[pid   289] mount("binder", "/dev/binderfs", "binder", 0, NULL) = 0
[pid   289] mount(NULL, "/sys/fs/fuse/connections", "fusectl", 0, NULL) = -1 EBUSY (Device or resource busy)
[pid   289] mkdir("./0", 0777)          = 0
[pid   289] openat(AT_FDCWD, "/dev/loop0", O_RDWR) = 3
[pid   289] ioctl(3, LOOP_CLR_FD)       = -1 ENXIO (No such device or address)
[pid   289] close(3)                    = 0
[pid   289] clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x55556e8a2750) = 2
./strace-static-x86_64: Process 291 attached
[pid   291] set_robust_list(0x55556e8a2760, 24) = 0
[pid   291] chdir("./0")                = 0
[pid   291] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0
[pid   291] setpgid(0, 0)               = 0
[pid   291] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC) = 3
[pid   291] write(3, "1000", 4)         = 4
[pid   291] close(3)                    = 0
[pid   291] symlink("/dev/binderfs", "./binderfs") = 0
executing program
[pid   291] write(1, "executing program\n", 18) = 18
[pid   291] mkdir("./file0", 0777)      = 0
[pid   291] --- SIGSEGV {si_signo=SIGSEGV, si_code=SEGV_MAPERR, si_addr=NULL} ---
[pid   291] mount(".", "./file0/../file0", NULL, MS_RDONLY|MS_SYNCHRONOUS|MS_DIRSYNC|MS_BIND|MS_SHARED, NULL) = 0
[   21.325036][   T24] audit: type=1400 audit(1735273420.360:68): avc:  denied  { mounton } for  pid=289 comm="syz-executor298" path="/root/syzkaller.eC67Ep/syz-tmp" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1
[   21.349650][   T24] audit: type=1400 audit(1735273420.360:69): avc:  denied  { mount } for  pid=289 comm="syz-executor298" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1
[   21.351409][  T289] request_module fs-gadgetfs succeeded, but still no fs?
[pid   291] mount("./file0", "./file0", "incremental-fs", 0, NULL) = 0
[pid   291] close(3)                    = -1 EBADF (Bad file descriptor)
[pid   291] close(4)                    = -1 EBADF (Bad file descriptor)
[pid   291] close(5)                    = -1 EBADF (Bad file descriptor)
[pid   291] close(6)                    = -1 EBADF (Bad file descriptor)
[pid   291] close(7)                    = -1 EBADF (Bad file descriptor)
[pid   291] close(8)                    = -1 EBADF (Bad file descriptor)
[pid   291] close(9)                    = -1 EBADF (Bad file descriptor)
[pid   291] close(10)                   = -1 EBADF (Bad file descriptor)
[pid   291] close(11)                   = -1 EBADF (Bad file descriptor)
[pid   291] close(12)                   = -1 EBADF (Bad file descriptor)
[pid   291] close(13)                   = -1 EBADF (Bad file descriptor)
[pid   291] close(14)                   = -1 EBADF (Bad file descriptor)
[pid   291] close(15)                   = -1 EBADF (Bad file descriptor)
[pid   291] close(16)                   = -1 EBADF (Bad file descriptor)
[pid   291] close(17)                   = -1 EBADF (Bad file descriptor)
[pid   291] close(18)                   = -1 EBADF (Bad file descriptor)
[pid   291] close(19)                   = -1 EBADF (Bad file descriptor)
[pid   291] close(20)                   = -1 EBADF (Bad file descriptor)
[pid   291] close(21)                   = -1 EBADF (Bad file descriptor)
[pid   291] close(22)                   = -1 EBADF (Bad file descriptor)
[pid   291] close(23)                   = -1 EBADF (Bad file descriptor)
[pid   291] close(24)                   = -1 EBADF (Bad file descriptor)
[pid   291] close(25)                   = -1 EBADF (Bad file descriptor)
[pid   291] close(26)                   = -1 EBADF (Bad file descriptor)
[pid   291] close(27)                   = -1 EBADF (Bad file descriptor)
[pid   291] close(28)                   = -1 EBADF (Bad file descriptor)
[pid   291] close(29)                   = -1 EBADF (Bad file descriptor)
[pid   291] exit_group(0)               = ?
[pid   291] +++ exited with 0 +++
[pid   289] --- SIGCHLD {si_signo=SIGCHLD, si_code=CLD_EXITED, si_pid=2, si_uid=0, si_status=0, si_utime=0, si_stime=1} ---
[pid   289] restart_syscall(<... resuming interrupted clone ...>) = 0
[pid   289] umount2("./0", MNT_FORCE|UMOUNT_NOFOLLOW) = -1 EINVAL (Invalid argument)
[pid   289] openat(AT_FDCWD, "./0", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 3
[pid   289] newfstatat(3, "", {st_mode=S_IFDIR|0700, st_size=120, ...}, AT_EMPTY_PATH) = 0
[pid   289] getdents64(3, 0x55556e8a37f0 /* 6 entries */, 32768) = 176
[pid   289] umount2("./0/.incomplete", MNT_FORCE|UMOUNT_NOFOLLOW) = -1 EINVAL (Invalid argument)
[pid   289] newfstatat(AT_FDCWD, "./0/.incomplete", {st_mode=S_IFDIR|0700, st_size=40, ...}, AT_SYMLINK_NOFOLLOW) = 0
[pid   289] umount2("./0/.incomplete", MNT_FORCE|UMOUNT_NOFOLLOW) = -1 EINVAL (Invalid argument)
[pid   289] openat(AT_FDCWD, "./0/.incomplete", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 4
[pid   289] newfstatat(4, "", {st_mode=S_IFDIR|0700, st_size=40, ...}, AT_EMPTY_PATH) = 0
[pid   289] getdents64(4, 0x55556e8ab830 /* 2 entries */, 32768) = 48
[pid   289] getdents64(4, 0x55556e8ab830 /* 0 entries */, 32768) = 0
[pid   289] close(4)                    = 0
[pid   289] rmdir("./0/.incomplete")    = 0
[pid   289] umount2("./0/.index", MNT_FORCE|UMOUNT_NOFOLLOW) = -1 EINVAL (Invalid argument)
[pid   289] newfstatat(AT_FDCWD, "./0/.index", {st_mode=S_IFDIR|0700, st_size=40, ...}, AT_SYMLINK_NOFOLLOW) = 0
[pid   289] umount2("./0/.index", MNT_FORCE|UMOUNT_NOFOLLOW) = -1 EINVAL (Invalid argument)
[pid   289] openat(AT_FDCWD, "./0/.index", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 4
[pid   289] newfstatat(4, "", {st_mode=S_IFDIR|0700, st_size=40, ...}, AT_EMPTY_PATH) = 0
[pid   289] getdents64(4, 0x55556e8ab830 /* 2 entries */, 32768) = 48
[pid   289] getdents64(4, 0x55556e8ab830 /* 0 entries */, 32768) = 0
[pid   289] close(4)                    = 0
[pid   289] rmdir("./0/.index")         = 0
[   21.371770][   T24] audit: type=1400 audit(1735273420.370:70): avc:  denied  { mounton } for  pid=289 comm="syz-executor298" path="/root/syzkaller.eC67Ep/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1
[   21.391060][  T291] incfs: ino conflict with backing FS 8
[   21.407688][   T24] audit: type=1400 audit(1735273420.370:71): avc:  denied  { mount } for  pid=289 comm="syz-executor298" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1
[   21.431154][  T289] ------------[ cut here ]------------
[   21.431239][   T24] audit: type=1400 audit(1735273420.370:72): avc:  denied  { mounton } for  pid=289 comm="syz-executor298" path="/root/syzkaller.eC67Ep/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1
[   21.436465][  T289] WARNING: CPU: 0 PID: 289 at fs/inode.c:304 drop_nlink+0xc1/0x110
[   21.462975][   T24] audit: type=1400 audit(1735273420.370:73): avc:  denied  { mounton } for  pid=289 comm="syz-executor298" path="/root/syzkaller.eC67Ep/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=13827 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1
[   21.470961][  T289] Modules linked in:
[   21.498202][   T24] audit: type=1400 audit(1735273420.370:74): avc:  denied  { unmount } for  pid=289 comm="syz-executor298" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1
[   21.501753][  T289] CPU: 0 PID: 289 Comm: syz-executor298 Not tainted 5.10.231-syzkaller-00700-g4055d754db6f #0
[   21.521743][   T24] audit: type=1400 audit(1735273420.390:75): avc:  denied  { mounton } for  pid=289 comm="syz-executor298" path="/dev/gadgetfs" dev="devtmpfs" ino=509 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1
[   21.531394][  T289] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
[   21.563970][  T289] RIP: 0010:drop_nlink+0xc1/0x110
[   21.568756][  T289] Code: 1e 48 8d bb b8 04 00 00 be 08 00 00 00 e8 77 cb f0 ff f0 48 ff 83 b8 04 00 00 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 df 2d b3 ff <0f> 0b eb 88 44 89 f9 80 e1 07 80 c1 03 38 c1 0f 8c 62 ff ff ff 4c
[   21.588177][  T289] RSP: 0018:ffffc90000b27be8 EFLAGS: 00010293
[   21.594033][  T289] RAX: ffffffff81b790a1 RBX: 0000000000000000 RCX: ffff88810c0dbb40
[   21.601874][  T289] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[   21.609670][  T289] RBP: ffffc90000b27c10 R08: ffffffff81b79024 R09: 0000000000000003
[   21.617468][  T289] R10: fffff52000164f6c R11: dffffc0000000001 R12: dffffc0000000000
[   21.625307][  T289] R13: 1ffff11021abca59 R14: ffff88810d5e5280 R15: ffff88810d5e52c8
[   21.633109][  T289] FS:  000055556e8a2480(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000
[   21.641894][  T289] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   21.648303][  T289] CR2: 00005603f7f580c0 CR3: 000000010c272000 CR4: 00000000003506a0
[   21.656087][  T289] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[   21.663932][  T289] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[   21.671850][  T289] Call Trace:
[   21.674951][  T289]  ? show_regs+0x58/0x60
[   21.679055][  T289]  ? __warn+0x160/0x2f0
[   21.683029][  T289]  ? drop_nlink+0xc1/0x110
[   21.687274][  T289]  ? report_bug+0x3d9/0x5b0
[   21.691643][  T289]  ? drop_nlink+0xc1/0x110
[   21.695878][  T289]  ? handle_bug+0x41/0x70
[   21.700063][  T289]  ? exc_invalid_op+0x1b/0x50
[   21.704548][  T289]  ? asm_exc_invalid_op+0x12/0x20
[   21.709444][  T289]  ? drop_nlink+0x44/0x110
[   21.713658][  T289]  ? drop_nlink+0xc1/0x110
[   21.717938][  T289]  ? drop_nlink+0xc1/0x110
[   21.722164][  T289]  ? drop_nlink+0xc1/0x110
[   21.726414][  T289]  shmem_rmdir+0x59/0x90
[   21.730524][  T289]  vfs_rmdir+0x2b7/0x3f0
[   21.734576][  T289]  incfs_kill_sb+0x108/0x220
[   21.739033][  T289]  deactivate_locked_super+0xad/0x110
[   21.744234][  T289]  deactivate_super+0xbe/0xf0
[   21.748795][  T289]  cleanup_mnt+0x45c/0x510
[   21.752982][  T289]  __cleanup_mnt+0x19/0x20
[   21.757226][  T289]  task_work_run+0x129/0x190
[   21.761715][  T289]  ptrace_notify+0x29e/0x350
[   21.766184][  T289]  ? do_notify_parent+0xa10/0xa10
[   21.771015][  T289]  ? user_path_at_empty+0x40/0x50
[   21.775824][  T289]  ? __x64_sys_umount+0x122/0x170
[   21.781155][  T289]  ? path_umount+0xea0/0xea0
[   21.785531][  T289]  syscall_exit_to_user_mode+0xf5/0x1a0
[   21.790943][  T289]  do_syscall_64+0x40/0x70
[   21.795158][  T289]  entry_SYSCALL_64_after_hwframe+0x61/0xcb
[   21.800915][  T289] RIP: 0033:0x7fa55fb20147
[   21.805137][  T289] Code: 07 00 48 83 c4 08 5b 5d c3 66 2e 0f 1f 84 00 00 00 00 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8
[   21.824613][  T289] RSP: 002b:00007fffefcd7218 EFLAGS: 00000206 ORIG_RAX: 00000000000000a6
[   21.832849][  T289] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fa55fb20147
[   21.840654][  T289] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007fffefcd72d0
[   21.848459][  T289] RBP: 00007fffefcd72d0 R08: 0000000000000000 R09: 0000000000000000
[   21.856255][  T289] R10: 00000000ffffffff R11: 0000000000000206 R12: 00007fffefcd8340
[   21.864356][  T289] R13: 000055556e8a37c0 R14: 431bde82d7b634db R15: 00007fffefcd8360
[   21.872162][  T289] ---[ end trace 94933bb5b43a4513 ]---
[   21.877465][  T289] ==================================================================
[   21.885333][  T289] BUG: KASAN: null-ptr-deref in ihold+0x20/0x60
[   21.891406][  T289] Write of size 4 at addr 0000000000000170 by task syz-executor298/289
[   21.899471][  T289] 
[   21.901657][  T289] CPU: 1 PID: 289 Comm: syz-executor298 Tainted: G        W         5.10.231-syzkaller-00700-g4055d754db6f #0
[   21.913110][  T289] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
[   21.922996][  T289] Call Trace:
[   21.926125][  T289]  dump_stack_lvl+0x1e2/0x24b
[   21.930636][  T289]  ? panic+0x812/0x812
[   21.934540][  T289]  ? bfq_pos_tree_add_move+0x43b/0x43b
[   21.939832][  T289]  ? _raw_spin_lock+0xa4/0x1b0
[   21.944433][  T289]  ? _raw_spin_trylock_bh+0x190/0x190
[   21.949639][  T289]  kasan_report+0x167/0x1c0
[   21.953982][  T289]  ? ihold+0x20/0x60
[   21.957709][  T289]  ? ihold+0x20/0x60
[   21.961444][  T289]  kasan_check_range+0x293/0x2a0
[   21.966218][  T289]  __kasan_check_write+0x14/0x20
[   21.970990][  T289]  ihold+0x20/0x60
[   21.974548][  T289]  vfs_rmdir+0x200/0x3f0
[   21.978631][  T289]  incfs_kill_sb+0x108/0x220
[   21.983055][  T289]  deactivate_locked_super+0xad/0x110
[   21.988262][  T289]  deactivate_super+0xbe/0xf0
[   21.992772][  T289]  cleanup_mnt+0x45c/0x510
[   21.997027][  T289]  __cleanup_mnt+0x19/0x20
[   22.001279][  T289]  task_work_run+0x129/0x190
[   22.005704][  T289]  ptrace_notify+0x29e/0x350
[   22.010131][  T289]  ? do_notify_parent+0xa10/0xa10
[   22.014996][  T289]  ? user_path_at_empty+0x40/0x50
[   22.019852][  T289]  ? __x64_sys_umount+0x122/0x170
[   22.024713][  T289]  ? path_umount+0xea0/0xea0
[   22.029141][  T289]  syscall_exit_to_user_mode+0xf5/0x1a0
[   22.034522][  T289]  do_syscall_64+0x40/0x70
[   22.038774][  T289]  entry_SYSCALL_64_after_hwframe+0x61/0xcb
[   22.044501][  T289] RIP: 0033:0x7fa55fb20147
[   22.048756][  T289] Code: 07 00 48 83 c4 08 5b 5d c3 66 2e 0f 1f 84 00 00 00 00 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8
[   22.068197][  T289] RSP: 002b:00007fffefcd7218 EFLAGS: 00000206 ORIG_RAX: 00000000000000a6
[   22.076440][  T289] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fa55fb20147
[   22.084252][  T289] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007fffefcd72d0
[   22.092059][  T289] RBP: 00007fffefcd72d0 R08: 0000000000000000 R09: 0000000000000000
[   22.099871][  T289] R10: 00000000ffffffff R11: 0000000000000206 R12: 00007fffefcd8340
[   22.107682][  T289] R13: 000055556e8a37c0 R14: 431bde82d7b634db R15: 00007fffefcd8360
[   22.115495][  T289] ==================================================================
[   22.123389][  T289] Disabling lock debugging due to kernel taint
[   22.129590][  T289] BUG: kernel NULL pointer dereference, address: 0000000000000170
[   22.137194][  T289] #PF: supervisor write access in kernel mode
[   22.143086][  T289] #PF: error_code(0x0002) - not-present page
[   22.148905][  T289] PGD 0 P4D 0 
[   22.152115][  T289] Oops: 0002 [#1] PREEMPT SMP KASAN
[   22.157147][  T289] CPU: 1 PID: 289 Comm: syz-executor298 Tainted: G    B   W         5.10.231-syzkaller-00700-g4055d754db6f #0
[   22.168599][  T289] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
[   22.178505][  T289] RIP: 0010:ihold+0x25/0x60
[   22.182856][  T289] Code: 00 00 00 00 00 55 48 89 e5 41 56 53 49 89 fe e8 f1 25 b3 ff 49 8d be 70 01 00 00 be 04 00 00 00 e8 60 c3 f0 ff bb 01 00 00 00 <f0> 41 0f c1 9e 70 01 00 00 ff c3 bf 02 00 00 00 89 de e8 74 29 b3
[   22.202283][  T289] RSP: 0018:ffffc90000b27c28 EFLAGS: 00010246
[   22.208179][  T289] RAX: ffff88810c0dbb00 RBX: 0000000000000001 RCX: ffff88810c0dbb40
[   22.216002][  T289] RDX: 0000000000000000 RSI: 0000000000000282 RDI: 00000000ffffffff
[   22.223800][  T289] RBP: ffffc90000b27c38 R08: ffffffff813e2b7b R09: 0000000000000003
[   22.231614][  T289] R10: fffffbfff0e11248 R11: dffffc0000000001 R12: dffffc0000000000
[   22.239422][  T289] R13: ffff888121097660 R14: 0000000000000000 R15: 0000000000000000
[   22.247234][  T289] FS:  000055556e8a2480(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000
[   22.256000][  T289] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   22.262422][  T289] CR2: 0000000000000170 CR3: 000000010c272000 CR4: 00000000003506a0
[   22.270236][  T289] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[   22.278048][  T289] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[   22.285855][  T289] Call Trace:
[   22.288993][  T289]  ? __die_body+0x62/0xb0
[   22.293159][  T289]  ? __die+0x7e/0x90
[   22.296908][  T289]  ? no_context+0x9f9/0xd20
[   22.301222][  T289]  ? is_prefetch+0x5c0/0x5c0
[   22.305649][  T289]  ? preempt_schedule+0xd9/0xe0
[   22.310648][  T289]  ? __kasan_check_read+0x11/0x20
[   22.315493][  T289]  ? preempt_schedule_common+0xbe/0xf0
[   22.320800][  T289]  ? preempt_schedule+0xd9/0xe0
[   22.325466][  T289]  ? schedule_preempt_disabled+0x20/0x20
[   22.330938][  T289]  ? sysvec_apic_timer_interrupt+0xcb/0xe0
[   22.336584][  T289]  ? __bad_area_nosemaphore+0xc4/0x430
[   22.341964][  T289]  ? bad_area_nosemaphore+0x2d/0x40
[   22.346991][  T289]  ? exc_page_fault+0x3df/0x5b0
[   22.351676][  T289]  ? asm_exc_page_fault+0x1e/0x30
[   22.356536][  T289]  ? check_panic_on_warn+0x5b/0xb0
[   22.361486][  T289]  ? ihold+0x25/0x60
[   22.365215][  T289]  ? ihold+0x20/0x60
[   22.368949][  T289]  vfs_rmdir+0x200/0x3f0
[   22.373044][  T289]  incfs_kill_sb+0x108/0x220
[   22.377466][  T289]  deactivate_locked_super+0xad/0x110
[   22.382665][  T289]  deactivate_super+0xbe/0xf0
[   22.387176][  T289]  cleanup_mnt+0x45c/0x510
[   22.391427][  T289]  __cleanup_mnt+0x19/0x20
[   22.395681][  T289]  task_work_run+0x129/0x190
[   22.400108][  T289]  ptrace_notify+0x29e/0x350
[   22.404530][  T289]  ? do_notify_parent+0xa10/0xa10
[   22.409390][  T289]  ? user_path_at_empty+0x40/0x50
[   22.414252][  T289]  ? __x64_sys_umount+0x122/0x170
[   22.419111][  T289]  ? path_umount+0xea0/0xea0
[   22.423540][  T289]  syscall_exit_to_user_mode+0xf5/0x1a0
[   22.428920][  T289]  do_syscall_64+0x40/0x70
[   22.433172][  T289]  entry_SYSCALL_64_after_hwframe+0x61/0xcb
[   22.438898][  T289] RIP: 0033:0x7fa55fb20147
[   22.443153][  T289] Code: 07 00 48 83 c4 08 5b 5d c3 66 2e 0f 1f 84 00 00 00 00 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8
[   22.462593][  T289] RSP: 002b:00007fffefcd7218 EFLAGS: 00000206 ORIG_RAX: 00000000000000a6
[   22.470837][  T289] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fa55fb20147
[   22.478647][  T289] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007fffefcd72d0
[   22.486458][  T289] RBP: 00007fffefcd72d0 R08: 0000000000000000 R09: 0000000000000000
[   22.494272][  T289] R10: 00000000ffffffff R11: 0000000000000206 R12: 00007fffefcd8340
[   22.502121][  T289] R13: 000055556e8a37c0 R14: 431bde82d7b634db R15: 00007fffefcd8360
[   22.509892][  T289] Modules linked in:
[   22.513636][  T289] CR2: 0000000000000170
[   22.517625][  T289] ---[ end trace 94933bb5b43a4514 ]---
[   22.522931][  T289] RIP: 0010:ihold+0x25/0x60
[   22.527251][  T289] Code: 00 00 00 00 00 55 48 89 e5 41 56 53 49 89 fe e8 f1 25 b3 ff 49 8d be 70 01 00 00 be 04 00 00 00 e8 60 c3 f0 ff bb 01 00 00 00 <f0> 41 0f c1 9e 70 01 00 00 ff c3 bf 02 00 00 00 89 de e8 74 29 b3
[   22.546695][  T289] RSP: 0018:ffffc90000b27c28 EFLAGS: 00010246
[   22.552596][  T289] RAX: ffff88810c0dbb00 RBX: 0000000000000001 RCX: ffff88810c0dbb40
[   22.560410][  T289] RDX: 0000000000000000 RSI: 0000000000000282 RDI: 00000000ffffffff
[   22.568217][  T289] RBP: ffffc90000b27c38 R08: ffffffff813e2b7b R09: 0000000000000003
[   22.576027][  T289] R10: fffffbfff0e11248 R11: dffffc0000000001 R12: dffffc0000000000
[   22.583847][  T289] R13: ffff888121097660 R14: 0000000000000000 R15: 0000000000000000
[   22.591655][  T289] FS:  000055556e8a2480(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000
[   22.600417][  T289] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   22.606839][  T289] CR2: 0000000000000170 CR3: 000000010c272000 CR4: 00000000003506a0
[   22.614650][  T289] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[   22.622459][  T289] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[   22.630272][  T289] Kernel panic - not syncing: Fatal exception
[   22.636385][  T289] Kernel Offset: disabled
[   22.640505][  T289] Rebooting in 86400 seconds..