./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor2591011375

<...>
Warning: Permanently added '10.128.1.75' (ED25519) to the list of known hosts.
execve("./syz-executor2591011375", ["./syz-executor2591011375"], 0x7fffd97b3760 /* 10 vars */) = 0
brk(NULL)                               = 0x5555572bf000
brk(0x5555572bfd00)                     = 0x5555572bfd00
arch_prctl(ARCH_SET_FS, 0x5555572bf380) = 0
set_tid_address(0x5555572bf650)         = 301
set_robust_list(0x5555572bf660, 24)     = 0
rseq(0x5555572bfca0, 0x20, 0, 0x53053053) = -1 ENOSYS (Function not implemented)
prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0
readlink("/proc/self/exe", "/root/syz-executor2591011375", 4096) = 28
getrandom("\x57\xa3\x42\xe7\xdb\x73\xd8\x99", 8, GRND_NONBLOCK) = 8
brk(NULL)                               = 0x5555572bfd00
brk(0x5555572e0d00)                     = 0x5555572e0d00
brk(0x5555572e1000)                     = 0x5555572e1000
mprotect(0x7f57c74ae000, 16384, PROT_READ) = 0
mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000
mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000
mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000
mkdir("./syzkaller.qPXlGP", 0700)       = 0
chmod("./syzkaller.qPXlGP", 0777)       = 0
chdir("./syzkaller.qPXlGP")             = 0
unshare(CLONE_NEWPID)                   = 0
clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x5555572bf650) = 302
./strace-static-x86_64: Process 302 attached
[pid   302] set_robust_list(0x5555572bf660, 24) = 0
[pid   302] mount(NULL, "/sys/fs/fuse/connections", "fusectl", 0, NULL) = -1 EBUSY (Device or resource busy)
[pid   302] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0
[pid   302] setsid()                    = 1
[pid   302] prlimit64(0, RLIMIT_AS, {rlim_cur=204800*1024, rlim_max=204800*1024}, NULL) = 0
[pid   302] prlimit64(0, RLIMIT_MEMLOCK, {rlim_cur=32768*1024, rlim_max=32768*1024}, NULL) = 0
[pid   302] prlimit64(0, RLIMIT_FSIZE, {rlim_cur=139264*1024, rlim_max=139264*1024}, NULL) = 0
[pid   302] prlimit64(0, RLIMIT_STACK, {rlim_cur=1024*1024, rlim_max=1024*1024}, NULL) = 0
[pid   302] prlimit64(0, RLIMIT_CORE, {rlim_cur=131072*1024, rlim_max=131072*1024}, NULL) = 0
[pid   302] prlimit64(0, RLIMIT_NOFILE, {rlim_cur=256, rlim_max=256}, NULL) = 0
[pid   302] unshare(CLONE_NEWNS)        = 0
[pid   302] mount(NULL, "/", NULL, MS_REC|MS_PRIVATE, NULL) = 0
[pid   302] unshare(CLONE_NEWIPC)       = -1 EINVAL (Invalid argument)
[pid   302] unshare(CLONE_NEWCGROUP)    = 0
[pid   302] unshare(CLONE_NEWUTS)       = 0
[pid   302] unshare(CLONE_SYSVSEM)      = 0
[pid   302] openat(AT_FDCWD, "/proc/sys/kernel/shmmax", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
[pid   302] openat(AT_FDCWD, "/proc/sys/kernel/shmall", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
[pid   302] openat(AT_FDCWD, "/proc/sys/kernel/shmmni", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
[pid   302] openat(AT_FDCWD, "/proc/sys/kernel/msgmax", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
[pid   302] openat(AT_FDCWD, "/proc/sys/kernel/msgmni", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
[pid   302] openat(AT_FDCWD, "/proc/sys/kernel/msgmnb", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
[pid   302] openat(AT_FDCWD, "/proc/sys/kernel/sem", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
[pid   302] getpid()                    = 1
[pid   302] capget({version=_LINUX_CAPABILITY_VERSION_3, pid=1}, {effective=1<<CAP_CHOWN|1<<CAP_DAC_OVERRIDE|1<<CAP_DAC_READ_SEARCH|1<<CAP_FOWNER|1<<CAP_FSETID|1<<CAP_KILL|1<<CAP_SETGID|1<<CAP_SETUID|1<<CAP_SETPCAP|1<<CAP_LINUX_IMMUTABLE|1<<CAP_NET_BIND_SERVICE|1<<CAP_NET_BROADCAST|1<<CAP_NET_ADMIN|1<<CAP_NET_RAW|1<<CAP_IPC_LOCK|1<<CAP_IPC_OWNER|1<<CAP_SYS_MODULE|1<<CAP_SYS_RAWIO|1<<CAP_SYS_CHROOT|1<<CAP_SYS_PTRACE|1<<CAP_SYS_PACCT|1<<CAP_SYS_ADMIN|1<<CAP_SYS_BOOT|1<<CAP_SYS_NICE|1<<CAP_SYS_RESOURCE|1<<CAP_SYS_TIME|1<<CAP_SYS_TTY_CONFIG|1<<CAP_MKNOD|1<<CAP_LEASE|1<<CAP_AUDIT_WRITE|1<<CAP_AUDIT_CONTROL|1<<CAP_SETFCAP|1<<CAP_MAC_OVERRIDE|1<<CAP_MAC_ADMIN|1<<CAP_SYSLOG|1<<CAP_WAKE_ALARM|1<<CAP_BLOCK_SUSPEND|1<<CAP_AUDIT_READ|1<<CAP_PERFMON|1<<CAP_BPF|1<<CAP_CHECKPOINT_RESTORE, permitted=1<<CAP_CHOWN|1<<CAP_DAC_OVERRIDE|1<<CAP_DAC_READ_SEARCH|1<<CAP_FOWNER|1<<CAP_FSETID|1<<CAP_KILL|1<<CAP_SETGID|1<<CAP_SETUID|1<<CAP_SETPCAP|1<<CAP_LINUX_IMMUTABLE|1<<CAP_NET_BIND_SERVICE|1<<CAP_NET_BROADCAST|1<<CAP_NET_ADMIN|1<<CAP_NET_RAW|1<<CAP_IPC_LOCK|1<<CAP_IPC_OWNER|1<<CAP_SYS_MODULE|1<<CAP_SYS_RAWIO|1<<CAP_SYS_CHROOT|1<<CAP_SYS_PTRACE|1<<CAP_SYS_PACCT|1<<CAP_SYS_ADMIN|1<<CAP_SYS_BOOT|1<<CAP_SYS_NICE|1<<CAP_SYS_RESOURCE|1<<CAP_SYS_TIME|1<<CAP_SYS_TTY_CONFIG|1<<CAP_MKNOD|1<<CAP_LEASE|1<<CAP_AUDIT_WRITE|1<<CAP_AUDIT_CONTROL|1<<CAP_SETFCAP|1<<CAP_MAC_OVERRIDE|1<<CAP_MAC_ADMIN|1<<CAP_SYSLOG|1<<CAP_WAKE_ALARM|1<<CAP_BLOCK_SUSPEND|1<<CAP_AUDIT_READ|1<<CAP_PERFMON|1<<CAP_BPF|1<<CAP_CHECKPOINT_RESTORE, inheritable=0}) = 0
[pid   302] capset({version=_LINUX_CAPABILITY_VERSION_3, pid=1}, {effective=1<<CAP_CHOWN|1<<CAP_DAC_OVERRIDE|1<<CAP_DAC_READ_SEARCH|1<<CAP_FOWNER|1<<CAP_FSETID|1<<CAP_KILL|1<<CAP_SETGID|1<<CAP_SETUID|1<<CAP_SETPCAP|1<<CAP_LINUX_IMMUTABLE|1<<CAP_NET_BIND_SERVICE|1<<CAP_NET_BROADCAST|1<<CAP_NET_ADMIN|1<<CAP_NET_RAW|1<<CAP_IPC_LOCK|1<<CAP_IPC_OWNER|1<<CAP_SYS_MODULE|1<<CAP_SYS_RAWIO|1<<CAP_SYS_CHROOT|1<<CAP_SYS_PACCT|1<<CAP_SYS_ADMIN|1<<CAP_SYS_BOOT|1<<CAP_SYS_RESOURCE|1<<CAP_SYS_TIME|1<<CAP_SYS_TTY_CONFIG|1<<CAP_MKNOD|1<<CAP_LEASE|1<<CAP_AUDIT_WRITE|1<<CAP_AUDIT_CONTROL|1<<CAP_SETFCAP|1<<CAP_MAC_OVERRIDE|1<<CAP_MAC_ADMIN|1<<CAP_SYSLOG|1<<CAP_WAKE_ALARM|1<<CAP_BLOCK_SUSPEND|1<<CAP_AUDIT_READ|1<<CAP_PERFMON|1<<CAP_BPF|1<<CAP_CHECKPOINT_RESTORE, permitted=1<<CAP_CHOWN|1<<CAP_DAC_OVERRIDE|1<<CAP_DAC_READ_SEARCH|1<<CAP_FOWNER|1<<CAP_FSETID|1<<CAP_KILL|1<<CAP_SETGID|1<<CAP_SETUID|1<<CAP_SETPCAP|1<<CAP_LINUX_IMMUTABLE|1<<CAP_NET_BIND_SERVICE|1<<CAP_NET_BROADCAST|1<<CAP_NET_ADMIN|1<<CAP_NET_RAW|1<<CAP_IPC_LOCK|1<<CAP_IPC_OWNER|1<<CAP_SYS_MODULE|1<<CAP_SYS_RAWIO|1<<CAP_SYS_CHROOT|1<<CAP_SYS_PACCT|1<<CAP_SYS_ADMIN|1<<CAP_SYS_BOOT|1<<CAP_SYS_RESOURCE|1<<CAP_SYS_TIME|1<<CAP_SYS_TTY_CONFIG|1<<CAP_MKNOD|1<<CAP_LEASE|1<<CAP_AUDIT_WRITE|1<<CAP_AUDIT_CONTROL|1<<CAP_SETFCAP|1<<CAP_MAC_OVERRIDE|1<<CAP_MAC_ADMIN|1<<CAP_SYSLOG|1<<CAP_WAKE_ALARM|1<<CAP_BLOCK_SUSPEND|1<<CAP_AUDIT_READ|1<<CAP_PERFMON|1<<CAP_BPF|1<<CAP_CHECKPOINT_RESTORE, inheritable=0}) = 0
[   33.485756][   T28] audit: type=1400 audit(1721008479.391:66): avc:  denied  { execmem } for  pid=301 comm="syz-executor259" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
[   33.505743][   T28] audit: type=1400 audit(1721008479.391:67): avc:  denied  { mounton } for  pid=302 comm="syz-executor259" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1
[pid   302] unshare(CLONE_NEWNET)       = 0
[pid   302] openat(AT_FDCWD, "/proc/sys/net/ipv4/ping_group_range", O_WRONLY|O_CLOEXEC) = 3
[pid   302] write(3, "0 65535", 7)      = 7
[pid   302] close(3)                    = 0
[pid   302] openat(AT_FDCWD, "/proc/sys/fs/mount-max", O_WRONLY|O_CLOEXEC) = 3
[pid   302] write(3, "100000", 6)       = 6
[pid   302] close(3)                    = 0
[pid   302] mkdir("./syz-tmp", 0777)    = 0
[pid   302] mount("", "./syz-tmp", "tmpfs", 0, NULL) = 0
[pid   302] mkdir("./syz-tmp/newroot", 0777) = 0
[pid   302] mkdir("./syz-tmp/newroot/dev", 0700) = 0
[pid   302] mount("/dev", "./syz-tmp/newroot/dev", NULL, MS_BIND|MS_REC|MS_PRIVATE, NULL) = 0
[pid   302] mkdir("./syz-tmp/newroot/proc", 0700) = 0
[pid   302] mount("syz-proc", "./syz-tmp/newroot/proc", "proc", 0, NULL) = 0
[pid   302] mkdir("./syz-tmp/newroot/selinux", 0700) = 0
[pid   302] mount("/selinux", "./syz-tmp/newroot/selinux", NULL, MS_BIND|MS_REC|MS_PRIVATE, NULL) = -1 ENOENT (No such file or directory)
[pid   302] mount("/sys/fs/selinux", "./syz-tmp/newroot/selinux", NULL, MS_BIND|MS_REC|MS_PRIVATE, NULL) = 0
[pid   302] mkdir("./syz-tmp/newroot/sys", 0700) = 0
[pid   302] mount("/sys", "./syz-tmp/newroot/sys", NULL, MS_BIND|MS_REC|MS_PRIVATE, NULL) = 0
[pid   302] mkdir("./syz-tmp/pivot", 0777) = 0
[pid   302] pivot_root("./syz-tmp", "./syz-tmp/pivot") = 0
[pid   302] chdir("/")                  = 0
[pid   302] umount2("./pivot", MNT_DETACH) = 0
[pid   302] chroot("./newroot")         = 0
[pid   302] chdir("/")                  = 0
[pid   302] mkdir("/dev/binderfs", 0777) = 0
[pid   302] mount("binder", "/dev/binderfs", "binder", 0, NULL) = 0
[pid   302] mkdir("./0", 0777)          = 0
[pid   302] clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x5555572bf650) = 2
[   33.530540][   T28] audit: type=1400 audit(1721008479.391:68): avc:  denied  { mount } for  pid=302 comm="syz-executor259" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1
[   33.553218][   T28] audit: type=1400 audit(1721008479.391:69): avc:  denied  { mounton } for  pid=302 comm="syz-executor259" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1
./strace-static-x86_64: Process 303 attached
[pid   303] set_robust_list(0x5555572bf660, 24) = 0
[pid   303] chdir("./0")                = 0
[pid   303] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0
[pid   303] setpgid(0, 0)               = 0
[pid   303] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC) = 3
[pid   303] write(3, "1000", 4)         = 4
[pid   303] close(3)                    = 0
[pid   303] symlink("/dev/binderfs", "./binderfs") = 0
[pid   303] write(1, "executing program\n", 18executing program
) = 18
[pid   303] mkdir("./file0", 000)       = 0
[pid   303] mount(".", "./file0", NULL, MS_RDONLY|MS_SYNCHRONOUS|MS_DIRSYNC|MS_BIND|MS_SHARED, NULL) = 0
[pid   303] mount("./file0", "./file0", "incremental-fs", 0, NULL) = 0
[pid   303] close(3)                    = -1 EBADF (Bad file descriptor)
[pid   303] close(4)                    = -1 EBADF (Bad file descriptor)
[pid   303] close(5)                    = -1 EBADF (Bad file descriptor)
[pid   303] close(6)                    = -1 EBADF (Bad file descriptor)
[pid   303] close(7)                    = -1 EBADF (Bad file descriptor)
[pid   303] close(8)                    = -1 EBADF (Bad file descriptor)
[pid   303] close(9)                    = -1 EBADF (Bad file descriptor)
[   33.574931][   T28] audit: type=1400 audit(1721008479.461:70): avc:  denied  { mounton } for  pid=302 comm="syz-executor259" path="/root/syzkaller.qPXlGP/syz-tmp" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1
[   33.599425][   T28] audit: type=1400 audit(1721008479.461:71): avc:  denied  { mount } for  pid=302 comm="syz-executor259" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1
[   33.602986][  T303] incfs: ino conflict with backing FS 8
[pid   303] close(10)                   = -1 EBADF (Bad file descriptor)
[pid   303] close(11)                   = -1 EBADF (Bad file descriptor)
[pid   303] close(12)                   = -1 EBADF (Bad file descriptor)
[pid   303] close(13)                   = -1 EBADF (Bad file descriptor)
[pid   303] close(14)                   = -1 EBADF (Bad file descriptor)
[pid   303] close(15)                   = -1 EBADF (Bad file descriptor)
[pid   303] close(16)                   = -1 EBADF (Bad file descriptor)
[pid   303] close(17)                   = -1 EBADF (Bad file descriptor)
[pid   303] close(18)                   = -1 EBADF (Bad file descriptor)
[pid   303] close(19)                   = -1 EBADF (Bad file descriptor)
[pid   303] close(20)                   = -1 EBADF (Bad file descriptor)
[pid   303] close(21)                   = -1 EBADF (Bad file descriptor)
[pid   303] close(22)                   = -1 EBADF (Bad file descriptor)
[pid   303] close(23)                   = -1 EBADF (Bad file descriptor)
[pid   303] close(24)                   = -1 EBADF (Bad file descriptor)
[pid   303] close(25)                   = -1 EBADF (Bad file descriptor)
[pid   303] close(26)                   = -1 EBADF (Bad file descriptor)
[pid   303] close(27)                   = -1 EBADF (Bad file descriptor)
[pid   303] close(28)                   = -1 EBADF (Bad file descriptor)
[pid   303] close(29)                   = -1 EBADF (Bad file descriptor)
[pid   303] exit_group(0)               = ?
[pid   303] +++ exited with 0 +++
[pid   302] --- SIGCHLD {si_signo=SIGCHLD, si_code=CLD_EXITED, si_pid=2, si_uid=0, si_status=0, si_utime=0, si_stime=0} ---
[pid   302] umount2("./0", MNT_FORCE|UMOUNT_NOFOLLOW) = -1 EINVAL (Invalid argument)
[pid   302] openat(AT_FDCWD, "./0", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 3
[pid   302] newfstatat(3, "", {st_mode=S_IFDIR|0700, st_size=120, ...}, AT_EMPTY_PATH) = 0
[pid   302] getdents64(3, 0x5555572c06f0 /* 6 entries */, 32768) = 176
[pid   302] umount2("./0/.incomplete", MNT_FORCE|UMOUNT_NOFOLLOW) = -1 EINVAL (Invalid argument)
[pid   302] newfstatat(AT_FDCWD, "./0/.incomplete", {st_mode=S_IFDIR|0700, st_size=40, ...}, AT_SYMLINK_NOFOLLOW) = 0
[pid   302] umount2("./0/.incomplete", MNT_FORCE|UMOUNT_NOFOLLOW) = -1 EINVAL (Invalid argument)
[pid   302] openat(AT_FDCWD, "./0/.incomplete", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 4
[pid   302] newfstatat(4, "", {st_mode=S_IFDIR|0700, st_size=40, ...}, AT_EMPTY_PATH) = 0
[pid   302] getdents64(4, 0x5555572c8730 /* 2 entries */, 32768) = 48
[pid   302] getdents64(4, 0x5555572c8730 /* 0 entries */, 32768) = 0
[pid   302] close(4)                    = 0
[pid   302] rmdir("./0/.incomplete")    = 0
[pid   302] umount2("./0/.index", MNT_FORCE|UMOUNT_NOFOLLOW) = -1 EINVAL (Invalid argument)
[pid   302] newfstatat(AT_FDCWD, "./0/.index", {st_mode=S_IFDIR|0700, st_size=40, ...}, AT_SYMLINK_NOFOLLOW) = 0
[pid   302] umount2("./0/.index", MNT_FORCE|UMOUNT_NOFOLLOW) = -1 EINVAL (Invalid argument)
[pid   302] openat(AT_FDCWD, "./0/.index", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 4
[pid   302] newfstatat(4, "", {st_mode=S_IFDIR|0700, st_size=40, ...}, AT_EMPTY_PATH) = 0
[pid   302] getdents64(4, 0x5555572c8730 /* 2 entries */, 32768) = 48
[pid   302] getdents64(4, 0x5555572c8730 /* 0 entries */, 32768) = 0
[pid   302] close(4)                    = 0
[pid   302] rmdir("./0/.index")         = 0
[   33.622446][   T28] audit: type=1400 audit(1721008479.461:72): avc:  denied  { mounton } for  pid=302 comm="syz-executor259" path="/root/syzkaller.qPXlGP/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1
[   33.654181][   T28] audit: type=1400 audit(1721008479.461:73): avc:  denied  { mount } for  pid=302 comm="syz-executor259" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1
[   33.677385][   T28] audit: type=1400 audit(1721008479.461:74): avc:  denied  { unmount } for  pid=302 comm="syz-executor259" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1
[   33.678232][  T302] ------------[ cut here ]------------
[   33.697620][   T28] audit: type=1400 audit(1721008479.491:75): avc:  denied  { mounton } for  pid=302 comm="syz-executor259" path="/dev/binderfs" dev="devtmpfs" ino=370 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1
[   33.726409][  T302] WARNING: CPU: 0 PID: 302 at fs/inode.c:332 drop_nlink+0xc1/0x110
[   33.735229][  T302] Modules linked in:
[   33.739002][  T302] CPU: 0 PID: 302 Comm: syz-executor259 Not tainted 6.1.84-syzkaller-00005-g96d66062d076 #0
[   33.749075][  T302] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[   33.760124][  T302] RIP: 0010:drop_nlink+0xc1/0x110
[   33.765333][  T302] Code: 1e 48 8d bb b8 04 00 00 be 08 00 00 00 e8 67 e8 ef ff f0 48 ff 83 b8 04 00 00 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 9f d9 a8 ff <0f> 0b eb 88 44 89 f9 80 e1 07 80 c1 03 38 c1 0f 8c 62 ff ff ff 4c
[   33.785213][  T302] RSP: 0018:ffffc90000d97b30 EFLAGS: 00010293
[   33.791155][  T302] RAX: ffffffff81ccac31 RBX: 0000000000000000 RCX: ffff88811b4fe540
[   33.799012][  T302] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[   33.807363][  T302] RBP: ffffc90000d97b58 R08: ffffffff81ccabb4 R09: 0000000000000003
[   33.815325][  T302] R10: ffffffffffffffff R11: dffffc0000000001 R12: dffffc0000000000
[   33.823247][  T302] R13: 1ffff11023888892 R14: ffff88811c444448 R15: ffff88811c444490
[   33.831364][  T302] FS:  00005555572bf380(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000
[   33.840448][  T302] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   33.847045][  T302] CR2: 00005555572d0738 CR3: 0000000122b2a000 CR4: 00000000003506b0
[   33.855500][  T302] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[   33.863976][  T302] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[   33.872344][  T302] Call Trace:
[   33.875481][  T302]  <TASK>
[   33.878267][  T302]  ? show_regs+0x58/0x60
[   33.882396][  T302]  ? __warn+0x160/0x3d0
[   33.886808][  T302]  ? drop_nlink+0xc1/0x110
[   33.891235][  T302]  ? report_bug+0x4d5/0x7d0
[   33.895837][  T302]  ? drop_nlink+0xc1/0x110
[   33.900093][  T302]  ? handle_bug+0x41/0x70
[   33.904333][  T302]  ? exc_invalid_op+0x1b/0x50
[   33.909256][  T302]  ? asm_exc_invalid_op+0x1b/0x20
[   33.914532][  T302]  ? drop_nlink+0x44/0x110
[   33.919056][  T302]  ? drop_nlink+0xc1/0x110
[   33.923402][  T302]  ? drop_nlink+0xc1/0x110
[   33.927721][  T302]  shmem_rmdir+0x59/0x90
[   33.931884][  T302]  vfs_rmdir+0x398/0x500
[   33.936207][  T302]  incfs_kill_sb+0x113/0x230
[   33.940695][  T302]  deactivate_locked_super+0xad/0x110
[   33.945973][  T302]  deactivate_super+0xbe/0xf0
[   33.950522][  T302]  cleanup_mnt+0x485/0x510
[   33.955144][  T302]  __cleanup_mnt+0x19/0x20
[   33.962525][  T302]  task_work_run+0x24d/0x2e0
[   33.967520][  T302]  ? task_work_cancel+0x2b0/0x2b0
[   33.972481][  T302]  ptrace_notify+0x29e/0x350
[   33.977132][  T302]  ? do_notify_parent+0xa20/0xa20
[   33.982103][  T302]  ? user_path_at_empty+0x14e/0x1a0
[   33.987221][  T302]  ? __x64_sys_umount+0x122/0x170
[   33.992508][  T302]  ? path_umount+0xe70/0xe70
[   33.997027][  T302]  syscall_exit_to_user_mode+0x99/0x130
[   34.002770][  T302]  do_syscall_64+0x49/0xb0
[   34.007099][  T302]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
[   34.013064][  T302] RIP: 0033:0x7f57c743b9a7
[   34.018401][  T302] Code: 07 00 48 83 c4 08 5b 5d c3 66 2e 0f 1f 84 00 00 00 00 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8
[   34.038499][  T302] RSP: 002b:00007ffdca9536b8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a6
[   34.047084][  T302] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f57c743b9a7
[   34.055105][  T302] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffdca953770
[   34.063503][  T302] RBP: 00007ffdca953770 R08: 0000000000000000 R09: 0000000000000000
[   34.072372][  T302] R10: 00000000ffffffff R11: 0000000000000206 R12: 00007ffdca9547e0
[   34.080501][  T302] R13: 00005555572c06c0 R14: 00007ffdca9547e0 R15: 0000000000000001
[   34.089185][  T302]  </TASK>
[   34.092154][  T302] ---[ end trace 0000000000000000 ]---
[   34.097805][  T302] ==================================================================
[   34.105715][  T302] BUG: KASAN: null-ptr-deref in ihold+0x20/0x60
[   34.111793][  T302] Write of size 4 at addr 0000000000000170 by task syz-executor259/302
[   34.119862][  T302] 
[   34.122050][  T302] CPU: 1 PID: 302 Comm: syz-executor259 Tainted: G        W          6.1.84-syzkaller-00005-g96d66062d076 #0
[   34.133787][  T302] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[   34.143767][  T302] Call Trace:
[   34.146888][  T302]  <TASK>
[   34.149663][  T302]  dump_stack_lvl+0x151/0x1b7
[   34.154284][  T302]  ? nf_tcp_handle_invalid+0x3f1/0x3f1
[   34.159597][  T302]  ? _printk+0xd1/0x111
[   34.163587][  T302]  print_report+0xe1/0x4e0
[   34.167972][  T302]  ? __virt_addr_valid+0x59/0x2f0
[   34.172842][  T302]  ? kasan_addr_to_slab+0xd/0x80
[   34.177730][  T302]  ? ihold+0x20/0x60
[   34.181446][  T302]  kasan_report+0x13c/0x170
[   34.185972][  T302]  ? ihold+0x20/0x60
[   34.189692][  T302]  kasan_check_range+0x294/0x2a0
[   34.194598][  T302]  __kasan_check_write+0x14/0x20
[   34.199365][  T302]  ihold+0x20/0x60
[   34.202923][  T302]  vfs_rmdir+0x268/0x500
[   34.207275][  T302]  incfs_kill_sb+0x113/0x230
[   34.212483][  T302]  deactivate_locked_super+0xad/0x110
[   34.217688][  T302]  deactivate_super+0xbe/0xf0
[   34.222199][  T302]  cleanup_mnt+0x485/0x510
[   34.226453][  T302]  __cleanup_mnt+0x19/0x20
[   34.230701][  T302]  task_work_run+0x24d/0x2e0
[   34.235131][  T302]  ? task_work_cancel+0x2b0/0x2b0
[   34.240009][  T302]  ptrace_notify+0x29e/0x350
[   34.244422][  T302]  ? do_notify_parent+0xa20/0xa20
[   34.249277][  T302]  ? user_path_at_empty+0x14e/0x1a0
[   34.254416][  T302]  ? __x64_sys_umount+0x122/0x170
[   34.259342][  T302]  ? path_umount+0xe70/0xe70
[   34.263826][  T302]  syscall_exit_to_user_mode+0x99/0x130
[   34.269210][  T302]  do_syscall_64+0x49/0xb0
[   34.273442][  T302]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
[   34.279164][  T302] RIP: 0033:0x7f57c743b9a7
[   34.283418][  T302] Code: 07 00 48 83 c4 08 5b 5d c3 66 2e 0f 1f 84 00 00 00 00 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8
[   34.303050][  T302] RSP: 002b:00007ffdca9536b8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a6
[   34.311314][  T302] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f57c743b9a7
[   34.319292][  T302] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffdca953770
[   34.327187][  T302] RBP: 00007ffdca953770 R08: 0000000000000000 R09: 0000000000000000
[   34.335001][  T302] R10: 00000000ffffffff R11: 0000000000000206 R12: 00007ffdca9547e0
[   34.342811][  T302] R13: 00005555572c06c0 R14: 00007ffdca9547e0 R15: 0000000000000001
[   34.350807][  T302]  </TASK>
[   34.353660][  T302] ==================================================================
[   34.361843][  T302] Disabling lock debugging due to kernel taint
[   34.368152][  T302] BUG: kernel NULL pointer dereference, address: 0000000000000170
[   34.375937][  T302] #PF: supervisor write access in kernel mode
[   34.381999][  T302] #PF: error_code(0x0002) - not-present page
[   34.387759][  T302] PGD 0 P4D 0 
[   34.391169][  T302] Oops: 0002 [#1] PREEMPT SMP KASAN
[   34.396237][  T302] CPU: 1 PID: 302 Comm: syz-executor259 Tainted: G    B   W          6.1.84-syzkaller-00005-g96d66062d076 #0
[   34.407677][  T302] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
[   34.417580][  T302] RIP: 0010:ihold+0x25/0x60
[   34.421917][  T302] Code: 00 00 00 00 00 55 48 89 e5 41 56 53 49 89 fe e8 71 d1 a8 ff 49 8d be 70 01 00 00 be 04 00 00 00 e8 10 e0 ef ff bb 01 00 00 00 <f0> 41 0f c1 9e 70 01 00 00 ff c3 bf 02 00 00 00 89 de e8 f4 d4 a8
[   34.441596][  T302] RSP: 0018:ffffc90000d97b70 EFLAGS: 00010246
[   34.447494][  T302] RAX: ffff88811b4fe500 RBX: 0000000000000001 RCX: ffff88811b4fe540
[   34.455303][  T302] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[   34.463125][  T302] RBP: ffffc90000d97b80 R08: ffffffff81447283 R09: fffffbfff0f264fd
[   34.471014][  T302] R10: 0000000000000000 R11: dffffc0000000001 R12: 1ffff11023888906
[   34.478831][  T302] R13: ffff88812094a550 R14: 0000000000000000 R15: 1ffff110241294b0
[   34.486640][  T302] FS:  00005555572bf380(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000
[   34.495408][  T302] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   34.501848][  T302] CR2: 0000000000000170 CR3: 0000000122b2a000 CR4: 00000000003506a0
[   34.509646][  T302] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[   34.517459][  T302] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[   34.525310][  T302] Call Trace:
[   34.528417][  T302]  <TASK>
[   34.531194][  T302]  ? __die_body+0x62/0xb0
[   34.535333][  T302]  ? __die+0x7e/0x90
[   34.539682][  T302]  ? page_fault_oops+0x7f9/0xa90
[   34.544448][  T302]  ? vprintk_default+0x26/0x30
[   34.549051][  T302]  ? kernelmode_fixup_or_oops+0x270/0x270
[   34.554607][  T302]  ? add_taint+0x44/0xe0
[   34.558680][  T302]  ? panic+0x660/0x660
[   34.562596][  T302]  ? preempt_schedule_thunk+0x16/0x18
[   34.568034][  T302]  ? exc_page_fault+0x537/0x700
[   34.572716][  T302]  ? asm_exc_page_fault+0x27/0x30
[   34.577573][  T302]  ? add_taint+0x93/0xe0
[   34.581656][  T302]  ? ihold+0x25/0x60
[   34.585404][  T302]  vfs_rmdir+0x268/0x500
[   34.589468][  T302]  incfs_kill_sb+0x113/0x230
[   34.593898][  T302]  deactivate_locked_super+0xad/0x110
[   34.599199][  T302]  deactivate_super+0xbe/0xf0
[   34.603693][  T302]  cleanup_mnt+0x485/0x510
[   34.607949][  T302]  __cleanup_mnt+0x19/0x20
[   34.612207][  T302]  task_work_run+0x24d/0x2e0
[   34.616632][  T302]  ? task_work_cancel+0x2b0/0x2b0
[   34.621493][  T302]  ptrace_notify+0x29e/0x350
[   34.625920][  T302]  ? do_notify_parent+0xa20/0xa20
[   34.630793][  T302]  ? user_path_at_empty+0x14e/0x1a0
[   34.635840][  T302]  ? __x64_sys_umount+0x122/0x170
[   34.640671][  T302]  ? path_umount+0xe70/0xe70
[   34.645107][  T302]  syscall_exit_to_user_mode+0x99/0x130
[   34.650611][  T302]  do_syscall_64+0x49/0xb0
[   34.654839][  T302]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
[   34.660565][  T302] RIP: 0033:0x7f57c743b9a7
[   34.664821][  T302] Code: 07 00 48 83 c4 08 5b 5d c3 66 2e 0f 1f 84 00 00 00 00 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8
[   34.684599][  T302] RSP: 002b:00007ffdca9536b8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a6
[   34.692888][  T302] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f57c743b9a7
[   34.700695][  T302] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffdca953770
[   34.708595][  T302] RBP: 00007ffdca953770 R08: 0000000000000000 R09: 0000000000000000
[   34.716436][  T302] R10: 00000000ffffffff R11: 0000000000000206 R12: 00007ffdca9547e0
[   34.724325][  T302] R13: 00005555572c06c0 R14: 00007ffdca9547e0 R15: 0000000000000001
[   34.732150][  T302]  </TASK>
[   34.735058][  T302] Modules linked in:
[   34.738749][  T302] CR2: 0000000000000170
[   34.742842][  T302] ---[ end trace 0000000000000000 ]---
[   34.748228][  T302] RIP: 0010:ihold+0x25/0x60
[   34.752588][  T302] Code: 00 00 00 00 00 55 48 89 e5 41 56 53 49 89 fe e8 71 d1 a8 ff 49 8d be 70 01 00 00 be 04 00 00 00 e8 10 e0 ef ff bb 01 00 00 00 <f0> 41 0f c1 9e 70 01 00 00 ff c3 bf 02 00 00 00 89 de e8 f4 d4 a8
[   34.772106][  T302] RSP: 0018:ffffc90000d97b70 EFLAGS: 00010246
[   34.777989][  T302] RAX: ffff88811b4fe500 RBX: 0000000000000001 RCX: ffff88811b4fe540
[   34.785805][  T302] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[   34.793706][  T302] RBP: ffffc90000d97b80 R08: ffffffff81447283 R09: fffffbfff0f264fd
[   34.801512][  T302] R10: 0000000000000000 R11: dffffc0000000001 R12: 1ffff11023888906
[   34.809327][  T302] R13: ffff88812094a550 R14: 0000000000000000 R15: 1ffff110241294b0
[   34.817144][  T302] FS:  00005555572bf380(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000
[   34.826050][  T302] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   34.832538][  T302] CR2: 0000000000000170 CR3: 0000000122b2a000 CR4: 00000000003506a0
[   34.840368][  T302] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[   34.848163][  T302] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[   34.856597][  T302] Kernel panic - not syncing: Fatal exception
[   34.862755][  T302] Kernel Offset: disabled
[   34.866929][  T302] Rebooting in 86400 seconds..