./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor2591011375 <...> Warning: Permanently added '10.128.1.75' (ED25519) to the list of known hosts. execve("./syz-executor2591011375", ["./syz-executor2591011375"], 0x7fffd97b3760 /* 10 vars */) = 0 brk(NULL) = 0x5555572bf000 brk(0x5555572bfd00) = 0x5555572bfd00 arch_prctl(ARCH_SET_FS, 0x5555572bf380) = 0 set_tid_address(0x5555572bf650) = 301 set_robust_list(0x5555572bf660, 24) = 0 rseq(0x5555572bfca0, 0x20, 0, 0x53053053) = -1 ENOSYS (Function not implemented) prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor2591011375", 4096) = 28 getrandom("\x57\xa3\x42\xe7\xdb\x73\xd8\x99", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x5555572bfd00 brk(0x5555572e0d00) = 0x5555572e0d00 brk(0x5555572e1000) = 0x5555572e1000 mprotect(0x7f57c74ae000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 mkdir("./syzkaller.qPXlGP", 0700) = 0 chmod("./syzkaller.qPXlGP", 0777) = 0 chdir("./syzkaller.qPXlGP") = 0 unshare(CLONE_NEWPID) = 0 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x5555572bf650) = 302 ./strace-static-x86_64: Process 302 attached [pid 302] set_robust_list(0x5555572bf660, 24) = 0 [pid 302] mount(NULL, "/sys/fs/fuse/connections", "fusectl", 0, NULL) = -1 EBUSY (Device or resource busy) [pid 302] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0 [pid 302] setsid() = 1 [pid 302] prlimit64(0, RLIMIT_AS, {rlim_cur=204800*1024, rlim_max=204800*1024}, NULL) = 0 [pid 302] prlimit64(0, RLIMIT_MEMLOCK, {rlim_cur=32768*1024, rlim_max=32768*1024}, NULL) = 0 [pid 302] prlimit64(0, RLIMIT_FSIZE, {rlim_cur=139264*1024, rlim_max=139264*1024}, NULL) = 0 [pid 302] prlimit64(0, RLIMIT_STACK, {rlim_cur=1024*1024, rlim_max=1024*1024}, NULL) = 0 [pid 302] prlimit64(0, RLIMIT_CORE, {rlim_cur=131072*1024, rlim_max=131072*1024}, NULL) = 0 [pid 302] prlimit64(0, RLIMIT_NOFILE, {rlim_cur=256, rlim_max=256}, NULL) = 0 [pid 302] unshare(CLONE_NEWNS) = 0 [pid 302] mount(NULL, "/", NULL, MS_REC|MS_PRIVATE, NULL) = 0 [pid 302] unshare(CLONE_NEWIPC) = -1 EINVAL (Invalid argument) [pid 302] unshare(CLONE_NEWCGROUP) = 0 [pid 302] unshare(CLONE_NEWUTS) = 0 [pid 302] unshare(CLONE_SYSVSEM) = 0 [pid 302] openat(AT_FDCWD, "/proc/sys/kernel/shmmax", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) [pid 302] openat(AT_FDCWD, "/proc/sys/kernel/shmall", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) [pid 302] openat(AT_FDCWD, "/proc/sys/kernel/shmmni", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) [pid 302] openat(AT_FDCWD, "/proc/sys/kernel/msgmax", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) [pid 302] openat(AT_FDCWD, "/proc/sys/kernel/msgmni", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) [pid 302] openat(AT_FDCWD, "/proc/sys/kernel/msgmnb", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) [pid 302] openat(AT_FDCWD, "/proc/sys/kernel/sem", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) [pid 302] getpid() = 1 [pid 302] capget({version=_LINUX_CAPABILITY_VERSION_3, pid=1}, {effective=1<<CAP_CHOWN|1<<CAP_DAC_OVERRIDE|1<<CAP_DAC_READ_SEARCH|1<<CAP_FOWNER|1<<CAP_FSETID|1<<CAP_KILL|1<<CAP_SETGID|1<<CAP_SETUID|1<<CAP_SETPCAP|1<<CAP_LINUX_IMMUTABLE|1<<CAP_NET_BIND_SERVICE|1<<CAP_NET_BROADCAST|1<<CAP_NET_ADMIN|1<<CAP_NET_RAW|1<<CAP_IPC_LOCK|1<<CAP_IPC_OWNER|1<<CAP_SYS_MODULE|1<<CAP_SYS_RAWIO|1<<CAP_SYS_CHROOT|1<<CAP_SYS_PTRACE|1<<CAP_SYS_PACCT|1<<CAP_SYS_ADMIN|1<<CAP_SYS_BOOT|1<<CAP_SYS_NICE|1<<CAP_SYS_RESOURCE|1<<CAP_SYS_TIME|1<<CAP_SYS_TTY_CONFIG|1<<CAP_MKNOD|1<<CAP_LEASE|1<<CAP_AUDIT_WRITE|1<<CAP_AUDIT_CONTROL|1<<CAP_SETFCAP|1<<CAP_MAC_OVERRIDE|1<<CAP_MAC_ADMIN|1<<CAP_SYSLOG|1<<CAP_WAKE_ALARM|1<<CAP_BLOCK_SUSPEND|1<<CAP_AUDIT_READ|1<<CAP_PERFMON|1<<CAP_BPF|1<<CAP_CHECKPOINT_RESTORE, permitted=1<<CAP_CHOWN|1<<CAP_DAC_OVERRIDE|1<<CAP_DAC_READ_SEARCH|1<<CAP_FOWNER|1<<CAP_FSETID|1<<CAP_KILL|1<<CAP_SETGID|1<<CAP_SETUID|1<<CAP_SETPCAP|1<<CAP_LINUX_IMMUTABLE|1<<CAP_NET_BIND_SERVICE|1<<CAP_NET_BROADCAST|1<<CAP_NET_ADMIN|1<<CAP_NET_RAW|1<<CAP_IPC_LOCK|1<<CAP_IPC_OWNER|1<<CAP_SYS_MODULE|1<<CAP_SYS_RAWIO|1<<CAP_SYS_CHROOT|1<<CAP_SYS_PTRACE|1<<CAP_SYS_PACCT|1<<CAP_SYS_ADMIN|1<<CAP_SYS_BOOT|1<<CAP_SYS_NICE|1<<CAP_SYS_RESOURCE|1<<CAP_SYS_TIME|1<<CAP_SYS_TTY_CONFIG|1<<CAP_MKNOD|1<<CAP_LEASE|1<<CAP_AUDIT_WRITE|1<<CAP_AUDIT_CONTROL|1<<CAP_SETFCAP|1<<CAP_MAC_OVERRIDE|1<<CAP_MAC_ADMIN|1<<CAP_SYSLOG|1<<CAP_WAKE_ALARM|1<<CAP_BLOCK_SUSPEND|1<<CAP_AUDIT_READ|1<<CAP_PERFMON|1<<CAP_BPF|1<<CAP_CHECKPOINT_RESTORE, inheritable=0}) = 0 [pid 302] capset({version=_LINUX_CAPABILITY_VERSION_3, pid=1}, {effective=1<<CAP_CHOWN|1<<CAP_DAC_OVERRIDE|1<<CAP_DAC_READ_SEARCH|1<<CAP_FOWNER|1<<CAP_FSETID|1<<CAP_KILL|1<<CAP_SETGID|1<<CAP_SETUID|1<<CAP_SETPCAP|1<<CAP_LINUX_IMMUTABLE|1<<CAP_NET_BIND_SERVICE|1<<CAP_NET_BROADCAST|1<<CAP_NET_ADMIN|1<<CAP_NET_RAW|1<<CAP_IPC_LOCK|1<<CAP_IPC_OWNER|1<<CAP_SYS_MODULE|1<<CAP_SYS_RAWIO|1<<CAP_SYS_CHROOT|1<<CAP_SYS_PACCT|1<<CAP_SYS_ADMIN|1<<CAP_SYS_BOOT|1<<CAP_SYS_RESOURCE|1<<CAP_SYS_TIME|1<<CAP_SYS_TTY_CONFIG|1<<CAP_MKNOD|1<<CAP_LEASE|1<<CAP_AUDIT_WRITE|1<<CAP_AUDIT_CONTROL|1<<CAP_SETFCAP|1<<CAP_MAC_OVERRIDE|1<<CAP_MAC_ADMIN|1<<CAP_SYSLOG|1<<CAP_WAKE_ALARM|1<<CAP_BLOCK_SUSPEND|1<<CAP_AUDIT_READ|1<<CAP_PERFMON|1<<CAP_BPF|1<<CAP_CHECKPOINT_RESTORE, permitted=1<<CAP_CHOWN|1<<CAP_DAC_OVERRIDE|1<<CAP_DAC_READ_SEARCH|1<<CAP_FOWNER|1<<CAP_FSETID|1<<CAP_KILL|1<<CAP_SETGID|1<<CAP_SETUID|1<<CAP_SETPCAP|1<<CAP_LINUX_IMMUTABLE|1<<CAP_NET_BIND_SERVICE|1<<CAP_NET_BROADCAST|1<<CAP_NET_ADMIN|1<<CAP_NET_RAW|1<<CAP_IPC_LOCK|1<<CAP_IPC_OWNER|1<<CAP_SYS_MODULE|1<<CAP_SYS_RAWIO|1<<CAP_SYS_CHROOT|1<<CAP_SYS_PACCT|1<<CAP_SYS_ADMIN|1<<CAP_SYS_BOOT|1<<CAP_SYS_RESOURCE|1<<CAP_SYS_TIME|1<<CAP_SYS_TTY_CONFIG|1<<CAP_MKNOD|1<<CAP_LEASE|1<<CAP_AUDIT_WRITE|1<<CAP_AUDIT_CONTROL|1<<CAP_SETFCAP|1<<CAP_MAC_OVERRIDE|1<<CAP_MAC_ADMIN|1<<CAP_SYSLOG|1<<CAP_WAKE_ALARM|1<<CAP_BLOCK_SUSPEND|1<<CAP_AUDIT_READ|1<<CAP_PERFMON|1<<CAP_BPF|1<<CAP_CHECKPOINT_RESTORE, inheritable=0}) = 0 [ 33.485756][ T28] audit: type=1400 audit(1721008479.391:66): avc: denied { execmem } for pid=301 comm="syz-executor259" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 33.505743][ T28] audit: type=1400 audit(1721008479.391:67): avc: denied { mounton } for pid=302 comm="syz-executor259" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [pid 302] unshare(CLONE_NEWNET) = 0 [pid 302] openat(AT_FDCWD, "/proc/sys/net/ipv4/ping_group_range", O_WRONLY|O_CLOEXEC) = 3 [pid 302] write(3, "0 65535", 7) = 7 [pid 302] close(3) = 0 [pid 302] openat(AT_FDCWD, "/proc/sys/fs/mount-max", O_WRONLY|O_CLOEXEC) = 3 [pid 302] write(3, "100000", 6) = 6 [pid 302] close(3) = 0 [pid 302] mkdir("./syz-tmp", 0777) = 0 [pid 302] mount("", "./syz-tmp", "tmpfs", 0, NULL) = 0 [pid 302] mkdir("./syz-tmp/newroot", 0777) = 0 [pid 302] mkdir("./syz-tmp/newroot/dev", 0700) = 0 [pid 302] mount("/dev", "./syz-tmp/newroot/dev", NULL, MS_BIND|MS_REC|MS_PRIVATE, NULL) = 0 [pid 302] mkdir("./syz-tmp/newroot/proc", 0700) = 0 [pid 302] mount("syz-proc", "./syz-tmp/newroot/proc", "proc", 0, NULL) = 0 [pid 302] mkdir("./syz-tmp/newroot/selinux", 0700) = 0 [pid 302] mount("/selinux", "./syz-tmp/newroot/selinux", NULL, MS_BIND|MS_REC|MS_PRIVATE, NULL) = -1 ENOENT (No such file or directory) [pid 302] mount("/sys/fs/selinux", "./syz-tmp/newroot/selinux", NULL, MS_BIND|MS_REC|MS_PRIVATE, NULL) = 0 [pid 302] mkdir("./syz-tmp/newroot/sys", 0700) = 0 [pid 302] mount("/sys", "./syz-tmp/newroot/sys", NULL, MS_BIND|MS_REC|MS_PRIVATE, NULL) = 0 [pid 302] mkdir("./syz-tmp/pivot", 0777) = 0 [pid 302] pivot_root("./syz-tmp", "./syz-tmp/pivot") = 0 [pid 302] chdir("/") = 0 [pid 302] umount2("./pivot", MNT_DETACH) = 0 [pid 302] chroot("./newroot") = 0 [pid 302] chdir("/") = 0 [pid 302] mkdir("/dev/binderfs", 0777) = 0 [pid 302] mount("binder", "/dev/binderfs", "binder", 0, NULL) = 0 [pid 302] mkdir("./0", 0777) = 0 [pid 302] clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x5555572bf650) = 2 [ 33.530540][ T28] audit: type=1400 audit(1721008479.391:68): avc: denied { mount } for pid=302 comm="syz-executor259" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 33.553218][ T28] audit: type=1400 audit(1721008479.391:69): avc: denied { mounton } for pid=302 comm="syz-executor259" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 ./strace-static-x86_64: Process 303 attached [pid 303] set_robust_list(0x5555572bf660, 24) = 0 [pid 303] chdir("./0") = 0 [pid 303] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0 [pid 303] setpgid(0, 0) = 0 [pid 303] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC) = 3 [pid 303] write(3, "1000", 4) = 4 [pid 303] close(3) = 0 [pid 303] symlink("/dev/binderfs", "./binderfs") = 0 [pid 303] write(1, "executing program\n", 18executing program ) = 18 [pid 303] mkdir("./file0", 000) = 0 [pid 303] mount(".", "./file0", NULL, MS_RDONLY|MS_SYNCHRONOUS|MS_DIRSYNC|MS_BIND|MS_SHARED, NULL) = 0 [pid 303] mount("./file0", "./file0", "incremental-fs", 0, NULL) = 0 [pid 303] close(3) = -1 EBADF (Bad file descriptor) [pid 303] close(4) = -1 EBADF (Bad file descriptor) [pid 303] close(5) = -1 EBADF (Bad file descriptor) [pid 303] close(6) = -1 EBADF (Bad file descriptor) [pid 303] close(7) = -1 EBADF (Bad file descriptor) [pid 303] close(8) = -1 EBADF (Bad file descriptor) [pid 303] close(9) = -1 EBADF (Bad file descriptor) [ 33.574931][ T28] audit: type=1400 audit(1721008479.461:70): avc: denied { mounton } for pid=302 comm="syz-executor259" path="/root/syzkaller.qPXlGP/syz-tmp" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 33.599425][ T28] audit: type=1400 audit(1721008479.461:71): avc: denied { mount } for pid=302 comm="syz-executor259" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 33.602986][ T303] incfs: ino conflict with backing FS 8 [pid 303] close(10) = -1 EBADF (Bad file descriptor) [pid 303] close(11) = -1 EBADF (Bad file descriptor) [pid 303] close(12) = -1 EBADF (Bad file descriptor) [pid 303] close(13) = -1 EBADF (Bad file descriptor) [pid 303] close(14) = -1 EBADF (Bad file descriptor) [pid 303] close(15) = -1 EBADF (Bad file descriptor) [pid 303] close(16) = -1 EBADF (Bad file descriptor) [pid 303] close(17) = -1 EBADF (Bad file descriptor) [pid 303] close(18) = -1 EBADF (Bad file descriptor) [pid 303] close(19) = -1 EBADF (Bad file descriptor) [pid 303] close(20) = -1 EBADF (Bad file descriptor) [pid 303] close(21) = -1 EBADF (Bad file descriptor) [pid 303] close(22) = -1 EBADF (Bad file descriptor) [pid 303] close(23) = -1 EBADF (Bad file descriptor) [pid 303] close(24) = -1 EBADF (Bad file descriptor) [pid 303] close(25) = -1 EBADF (Bad file descriptor) [pid 303] close(26) = -1 EBADF (Bad file descriptor) [pid 303] close(27) = -1 EBADF (Bad file descriptor) [pid 303] close(28) = -1 EBADF (Bad file descriptor) [pid 303] close(29) = -1 EBADF (Bad file descriptor) [pid 303] exit_group(0) = ? [pid 303] +++ exited with 0 +++ [pid 302] --- SIGCHLD {si_signo=SIGCHLD, si_code=CLD_EXITED, si_pid=2, si_uid=0, si_status=0, si_utime=0, si_stime=0} --- [pid 302] umount2("./0", MNT_FORCE|UMOUNT_NOFOLLOW) = -1 EINVAL (Invalid argument) [pid 302] openat(AT_FDCWD, "./0", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 3 [pid 302] newfstatat(3, "", {st_mode=S_IFDIR|0700, st_size=120, ...}, AT_EMPTY_PATH) = 0 [pid 302] getdents64(3, 0x5555572c06f0 /* 6 entries */, 32768) = 176 [pid 302] umount2("./0/.incomplete", MNT_FORCE|UMOUNT_NOFOLLOW) = -1 EINVAL (Invalid argument) [pid 302] newfstatat(AT_FDCWD, "./0/.incomplete", {st_mode=S_IFDIR|0700, st_size=40, ...}, AT_SYMLINK_NOFOLLOW) = 0 [pid 302] umount2("./0/.incomplete", MNT_FORCE|UMOUNT_NOFOLLOW) = -1 EINVAL (Invalid argument) [pid 302] openat(AT_FDCWD, "./0/.incomplete", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 4 [pid 302] newfstatat(4, "", {st_mode=S_IFDIR|0700, st_size=40, ...}, AT_EMPTY_PATH) = 0 [pid 302] getdents64(4, 0x5555572c8730 /* 2 entries */, 32768) = 48 [pid 302] getdents64(4, 0x5555572c8730 /* 0 entries */, 32768) = 0 [pid 302] close(4) = 0 [pid 302] rmdir("./0/.incomplete") = 0 [pid 302] umount2("./0/.index", MNT_FORCE|UMOUNT_NOFOLLOW) = -1 EINVAL (Invalid argument) [pid 302] newfstatat(AT_FDCWD, "./0/.index", {st_mode=S_IFDIR|0700, st_size=40, ...}, AT_SYMLINK_NOFOLLOW) = 0 [pid 302] umount2("./0/.index", MNT_FORCE|UMOUNT_NOFOLLOW) = -1 EINVAL (Invalid argument) [pid 302] openat(AT_FDCWD, "./0/.index", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 4 [pid 302] newfstatat(4, "", {st_mode=S_IFDIR|0700, st_size=40, ...}, AT_EMPTY_PATH) = 0 [pid 302] getdents64(4, 0x5555572c8730 /* 2 entries */, 32768) = 48 [pid 302] getdents64(4, 0x5555572c8730 /* 0 entries */, 32768) = 0 [pid 302] close(4) = 0 [pid 302] rmdir("./0/.index") = 0 [ 33.622446][ T28] audit: type=1400 audit(1721008479.461:72): avc: denied { mounton } for pid=302 comm="syz-executor259" path="/root/syzkaller.qPXlGP/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 33.654181][ T28] audit: type=1400 audit(1721008479.461:73): avc: denied { mount } for pid=302 comm="syz-executor259" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 33.677385][ T28] audit: type=1400 audit(1721008479.461:74): avc: denied { unmount } for pid=302 comm="syz-executor259" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 33.678232][ T302] ------------[ cut here ]------------ [ 33.697620][ T28] audit: type=1400 audit(1721008479.491:75): avc: denied { mounton } for pid=302 comm="syz-executor259" path="/dev/binderfs" dev="devtmpfs" ino=370 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 33.726409][ T302] WARNING: CPU: 0 PID: 302 at fs/inode.c:332 drop_nlink+0xc1/0x110 [ 33.735229][ T302] Modules linked in: [ 33.739002][ T302] CPU: 0 PID: 302 Comm: syz-executor259 Not tainted 6.1.84-syzkaller-00005-g96d66062d076 #0 [ 33.749075][ T302] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 33.760124][ T302] RIP: 0010:drop_nlink+0xc1/0x110 [ 33.765333][ T302] Code: 1e 48 8d bb b8 04 00 00 be 08 00 00 00 e8 67 e8 ef ff f0 48 ff 83 b8 04 00 00 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 9f d9 a8 ff <0f> 0b eb 88 44 89 f9 80 e1 07 80 c1 03 38 c1 0f 8c 62 ff ff ff 4c [ 33.785213][ T302] RSP: 0018:ffffc90000d97b30 EFLAGS: 00010293 [ 33.791155][ T302] RAX: ffffffff81ccac31 RBX: 0000000000000000 RCX: ffff88811b4fe540 [ 33.799012][ T302] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 33.807363][ T302] RBP: ffffc90000d97b58 R08: ffffffff81ccabb4 R09: 0000000000000003 [ 33.815325][ T302] R10: ffffffffffffffff R11: dffffc0000000001 R12: dffffc0000000000 [ 33.823247][ T302] R13: 1ffff11023888892 R14: ffff88811c444448 R15: ffff88811c444490 [ 33.831364][ T302] FS: 00005555572bf380(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 33.840448][ T302] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 33.847045][ T302] CR2: 00005555572d0738 CR3: 0000000122b2a000 CR4: 00000000003506b0 [ 33.855500][ T302] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 33.863976][ T302] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 33.872344][ T302] Call Trace: [ 33.875481][ T302] <TASK> [ 33.878267][ T302] ? show_regs+0x58/0x60 [ 33.882396][ T302] ? __warn+0x160/0x3d0 [ 33.886808][ T302] ? drop_nlink+0xc1/0x110 [ 33.891235][ T302] ? report_bug+0x4d5/0x7d0 [ 33.895837][ T302] ? drop_nlink+0xc1/0x110 [ 33.900093][ T302] ? handle_bug+0x41/0x70 [ 33.904333][ T302] ? exc_invalid_op+0x1b/0x50 [ 33.909256][ T302] ? asm_exc_invalid_op+0x1b/0x20 [ 33.914532][ T302] ? drop_nlink+0x44/0x110 [ 33.919056][ T302] ? drop_nlink+0xc1/0x110 [ 33.923402][ T302] ? drop_nlink+0xc1/0x110 [ 33.927721][ T302] shmem_rmdir+0x59/0x90 [ 33.931884][ T302] vfs_rmdir+0x398/0x500 [ 33.936207][ T302] incfs_kill_sb+0x113/0x230 [ 33.940695][ T302] deactivate_locked_super+0xad/0x110 [ 33.945973][ T302] deactivate_super+0xbe/0xf0 [ 33.950522][ T302] cleanup_mnt+0x485/0x510 [ 33.955144][ T302] __cleanup_mnt+0x19/0x20 [ 33.962525][ T302] task_work_run+0x24d/0x2e0 [ 33.967520][ T302] ? task_work_cancel+0x2b0/0x2b0 [ 33.972481][ T302] ptrace_notify+0x29e/0x350 [ 33.977132][ T302] ? do_notify_parent+0xa20/0xa20 [ 33.982103][ T302] ? user_path_at_empty+0x14e/0x1a0 [ 33.987221][ T302] ? __x64_sys_umount+0x122/0x170 [ 33.992508][ T302] ? path_umount+0xe70/0xe70 [ 33.997027][ T302] syscall_exit_to_user_mode+0x99/0x130 [ 34.002770][ T302] do_syscall_64+0x49/0xb0 [ 34.007099][ T302] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 34.013064][ T302] RIP: 0033:0x7f57c743b9a7 [ 34.018401][ T302] Code: 07 00 48 83 c4 08 5b 5d c3 66 2e 0f 1f 84 00 00 00 00 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 [ 34.038499][ T302] RSP: 002b:00007ffdca9536b8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a6 [ 34.047084][ T302] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f57c743b9a7 [ 34.055105][ T302] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffdca953770 [ 34.063503][ T302] RBP: 00007ffdca953770 R08: 0000000000000000 R09: 0000000000000000 [ 34.072372][ T302] R10: 00000000ffffffff R11: 0000000000000206 R12: 00007ffdca9547e0 [ 34.080501][ T302] R13: 00005555572c06c0 R14: 00007ffdca9547e0 R15: 0000000000000001 [ 34.089185][ T302] </TASK> [ 34.092154][ T302] ---[ end trace 0000000000000000 ]--- [ 34.097805][ T302] ================================================================== [ 34.105715][ T302] BUG: KASAN: null-ptr-deref in ihold+0x20/0x60 [ 34.111793][ T302] Write of size 4 at addr 0000000000000170 by task syz-executor259/302 [ 34.119862][ T302] [ 34.122050][ T302] CPU: 1 PID: 302 Comm: syz-executor259 Tainted: G W 6.1.84-syzkaller-00005-g96d66062d076 #0 [ 34.133787][ T302] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 34.143767][ T302] Call Trace: [ 34.146888][ T302] <TASK> [ 34.149663][ T302] dump_stack_lvl+0x151/0x1b7 [ 34.154284][ T302] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 34.159597][ T302] ? _printk+0xd1/0x111 [ 34.163587][ T302] print_report+0xe1/0x4e0 [ 34.167972][ T302] ? __virt_addr_valid+0x59/0x2f0 [ 34.172842][ T302] ? kasan_addr_to_slab+0xd/0x80 [ 34.177730][ T302] ? ihold+0x20/0x60 [ 34.181446][ T302] kasan_report+0x13c/0x170 [ 34.185972][ T302] ? ihold+0x20/0x60 [ 34.189692][ T302] kasan_check_range+0x294/0x2a0 [ 34.194598][ T302] __kasan_check_write+0x14/0x20 [ 34.199365][ T302] ihold+0x20/0x60 [ 34.202923][ T302] vfs_rmdir+0x268/0x500 [ 34.207275][ T302] incfs_kill_sb+0x113/0x230 [ 34.212483][ T302] deactivate_locked_super+0xad/0x110 [ 34.217688][ T302] deactivate_super+0xbe/0xf0 [ 34.222199][ T302] cleanup_mnt+0x485/0x510 [ 34.226453][ T302] __cleanup_mnt+0x19/0x20 [ 34.230701][ T302] task_work_run+0x24d/0x2e0 [ 34.235131][ T302] ? task_work_cancel+0x2b0/0x2b0 [ 34.240009][ T302] ptrace_notify+0x29e/0x350 [ 34.244422][ T302] ? do_notify_parent+0xa20/0xa20 [ 34.249277][ T302] ? user_path_at_empty+0x14e/0x1a0 [ 34.254416][ T302] ? __x64_sys_umount+0x122/0x170 [ 34.259342][ T302] ? path_umount+0xe70/0xe70 [ 34.263826][ T302] syscall_exit_to_user_mode+0x99/0x130 [ 34.269210][ T302] do_syscall_64+0x49/0xb0 [ 34.273442][ T302] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 34.279164][ T302] RIP: 0033:0x7f57c743b9a7 [ 34.283418][ T302] Code: 07 00 48 83 c4 08 5b 5d c3 66 2e 0f 1f 84 00 00 00 00 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 [ 34.303050][ T302] RSP: 002b:00007ffdca9536b8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a6 [ 34.311314][ T302] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f57c743b9a7 [ 34.319292][ T302] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffdca953770 [ 34.327187][ T302] RBP: 00007ffdca953770 R08: 0000000000000000 R09: 0000000000000000 [ 34.335001][ T302] R10: 00000000ffffffff R11: 0000000000000206 R12: 00007ffdca9547e0 [ 34.342811][ T302] R13: 00005555572c06c0 R14: 00007ffdca9547e0 R15: 0000000000000001 [ 34.350807][ T302] </TASK> [ 34.353660][ T302] ================================================================== [ 34.361843][ T302] Disabling lock debugging due to kernel taint [ 34.368152][ T302] BUG: kernel NULL pointer dereference, address: 0000000000000170 [ 34.375937][ T302] #PF: supervisor write access in kernel mode [ 34.381999][ T302] #PF: error_code(0x0002) - not-present page [ 34.387759][ T302] PGD 0 P4D 0 [ 34.391169][ T302] Oops: 0002 [#1] PREEMPT SMP KASAN [ 34.396237][ T302] CPU: 1 PID: 302 Comm: syz-executor259 Tainted: G B W 6.1.84-syzkaller-00005-g96d66062d076 #0 [ 34.407677][ T302] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 34.417580][ T302] RIP: 0010:ihold+0x25/0x60 [ 34.421917][ T302] Code: 00 00 00 00 00 55 48 89 e5 41 56 53 49 89 fe e8 71 d1 a8 ff 49 8d be 70 01 00 00 be 04 00 00 00 e8 10 e0 ef ff bb 01 00 00 00 <f0> 41 0f c1 9e 70 01 00 00 ff c3 bf 02 00 00 00 89 de e8 f4 d4 a8 [ 34.441596][ T302] RSP: 0018:ffffc90000d97b70 EFLAGS: 00010246 [ 34.447494][ T302] RAX: ffff88811b4fe500 RBX: 0000000000000001 RCX: ffff88811b4fe540 [ 34.455303][ T302] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 34.463125][ T302] RBP: ffffc90000d97b80 R08: ffffffff81447283 R09: fffffbfff0f264fd [ 34.471014][ T302] R10: 0000000000000000 R11: dffffc0000000001 R12: 1ffff11023888906 [ 34.478831][ T302] R13: ffff88812094a550 R14: 0000000000000000 R15: 1ffff110241294b0 [ 34.486640][ T302] FS: 00005555572bf380(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 34.495408][ T302] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 34.501848][ T302] CR2: 0000000000000170 CR3: 0000000122b2a000 CR4: 00000000003506a0 [ 34.509646][ T302] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 34.517459][ T302] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 34.525310][ T302] Call Trace: [ 34.528417][ T302] <TASK> [ 34.531194][ T302] ? __die_body+0x62/0xb0 [ 34.535333][ T302] ? __die+0x7e/0x90 [ 34.539682][ T302] ? page_fault_oops+0x7f9/0xa90 [ 34.544448][ T302] ? vprintk_default+0x26/0x30 [ 34.549051][ T302] ? kernelmode_fixup_or_oops+0x270/0x270 [ 34.554607][ T302] ? add_taint+0x44/0xe0 [ 34.558680][ T302] ? panic+0x660/0x660 [ 34.562596][ T302] ? preempt_schedule_thunk+0x16/0x18 [ 34.568034][ T302] ? exc_page_fault+0x537/0x700 [ 34.572716][ T302] ? asm_exc_page_fault+0x27/0x30 [ 34.577573][ T302] ? add_taint+0x93/0xe0 [ 34.581656][ T302] ? ihold+0x25/0x60 [ 34.585404][ T302] vfs_rmdir+0x268/0x500 [ 34.589468][ T302] incfs_kill_sb+0x113/0x230 [ 34.593898][ T302] deactivate_locked_super+0xad/0x110 [ 34.599199][ T302] deactivate_super+0xbe/0xf0 [ 34.603693][ T302] cleanup_mnt+0x485/0x510 [ 34.607949][ T302] __cleanup_mnt+0x19/0x20 [ 34.612207][ T302] task_work_run+0x24d/0x2e0 [ 34.616632][ T302] ? task_work_cancel+0x2b0/0x2b0 [ 34.621493][ T302] ptrace_notify+0x29e/0x350 [ 34.625920][ T302] ? do_notify_parent+0xa20/0xa20 [ 34.630793][ T302] ? user_path_at_empty+0x14e/0x1a0 [ 34.635840][ T302] ? __x64_sys_umount+0x122/0x170 [ 34.640671][ T302] ? path_umount+0xe70/0xe70 [ 34.645107][ T302] syscall_exit_to_user_mode+0x99/0x130 [ 34.650611][ T302] do_syscall_64+0x49/0xb0 [ 34.654839][ T302] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 34.660565][ T302] RIP: 0033:0x7f57c743b9a7 [ 34.664821][ T302] Code: 07 00 48 83 c4 08 5b 5d c3 66 2e 0f 1f 84 00 00 00 00 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 [ 34.684599][ T302] RSP: 002b:00007ffdca9536b8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a6 [ 34.692888][ T302] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f57c743b9a7 [ 34.700695][ T302] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffdca953770 [ 34.708595][ T302] RBP: 00007ffdca953770 R08: 0000000000000000 R09: 0000000000000000 [ 34.716436][ T302] R10: 00000000ffffffff R11: 0000000000000206 R12: 00007ffdca9547e0 [ 34.724325][ T302] R13: 00005555572c06c0 R14: 00007ffdca9547e0 R15: 0000000000000001 [ 34.732150][ T302] </TASK> [ 34.735058][ T302] Modules linked in: [ 34.738749][ T302] CR2: 0000000000000170 [ 34.742842][ T302] ---[ end trace 0000000000000000 ]--- [ 34.748228][ T302] RIP: 0010:ihold+0x25/0x60 [ 34.752588][ T302] Code: 00 00 00 00 00 55 48 89 e5 41 56 53 49 89 fe e8 71 d1 a8 ff 49 8d be 70 01 00 00 be 04 00 00 00 e8 10 e0 ef ff bb 01 00 00 00 <f0> 41 0f c1 9e 70 01 00 00 ff c3 bf 02 00 00 00 89 de e8 f4 d4 a8 [ 34.772106][ T302] RSP: 0018:ffffc90000d97b70 EFLAGS: 00010246 [ 34.777989][ T302] RAX: ffff88811b4fe500 RBX: 0000000000000001 RCX: ffff88811b4fe540 [ 34.785805][ T302] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 34.793706][ T302] RBP: ffffc90000d97b80 R08: ffffffff81447283 R09: fffffbfff0f264fd [ 34.801512][ T302] R10: 0000000000000000 R11: dffffc0000000001 R12: 1ffff11023888906 [ 34.809327][ T302] R13: ffff88812094a550 R14: 0000000000000000 R15: 1ffff110241294b0 [ 34.817144][ T302] FS: 00005555572bf380(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 34.826050][ T302] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 34.832538][ T302] CR2: 0000000000000170 CR3: 0000000122b2a000 CR4: 00000000003506a0 [ 34.840368][ T302] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 34.848163][ T302] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 34.856597][ T302] Kernel panic - not syncing: Fatal exception [ 34.862755][ T302] Kernel Offset: disabled [ 34.866929][ T302] Rebooting in 86400 seconds..