./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor2605177579

<...>
Warning: Permanently added '10.128.0.55' (ED25519) to the list of known hosts.
execve("./syz-executor2605177579", ["./syz-executor2605177579"], 0x7ffe25a5af60 /* 10 vars */) = 0
brk(NULL)                               = 0x555556d10000
brk(0x555556d10d00)                     = 0x555556d10d00
arch_prctl(ARCH_SET_FS, 0x555556d10380) = 0
set_tid_address(0x555556d10650)         = 341
set_robust_list(0x555556d10660, 24)     = 0
rseq(0x555556d10ca0, 0x20, 0, 0x53053053) = -1 ENOSYS (Function not implemented)
prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0
readlink("/proc/self/exe", "/root/syz-executor2605177579", 4096) = 28
getrandom("\xfe\xb5\x26\x96\xee\x18\xa8\xe0", 8, GRND_NONBLOCK) = 8
brk(NULL)                               = 0x555556d10d00
brk(0x555556d31d00)                     = 0x555556d31d00
brk(0x555556d32000)                     = 0x555556d32000
mprotect(0x7fb916733000, 16384, PROT_READ) = 0
mmap(0x1ffffffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffffffff000
mmap(0x200000000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200000000000
mmap(0x200001000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200001000000
mkdir("./syzkaller.cTl253", 0700)       = 0
chmod("./syzkaller.cTl253", 0777)       = 0
chdir("./syzkaller.cTl253")             = 0
unshare(CLONE_NEWPID)                   = 0
clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x555556d10650) = 343
./strace-static-x86_64: Process 343 attached
[pid   343] set_robust_list(0x555556d10660, 24) = 0
[pid   343] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0
[pid   343] getppid()                   = 0
[pid   343] prlimit64(0, RLIMIT_AS, {rlim_cur=204800*1024, rlim_max=204800*1024}, NULL) = 0
[pid   343] prlimit64(0, RLIMIT_MEMLOCK, {rlim_cur=32768*1024, rlim_max=32768*1024}, NULL) = 0
[pid   343] prlimit64(0, RLIMIT_FSIZE, {rlim_cur=139264*1024, rlim_max=139264*1024}, NULL) = 0
[pid   343] prlimit64(0, RLIMIT_STACK, {rlim_cur=1024*1024, rlim_max=1024*1024}, NULL) = 0
[pid   343] prlimit64(0, RLIMIT_CORE, {rlim_cur=131072*1024, rlim_max=131072*1024}, NULL) = 0
[pid   343] prlimit64(0, RLIMIT_NOFILE, {rlim_cur=256, rlim_max=256}, NULL) = 0
[pid   343] unshare(CLONE_NEWNS)        = 0
[pid   343] mount(NULL, "/", NULL, MS_REC|MS_PRIVATE, NULL) = 0
[pid   343] unshare(CLONE_NEWIPC)       = -1 EINVAL (Invalid argument)
[pid   343] unshare(CLONE_NEWCGROUP)    = 0
[pid   343] unshare(CLONE_NEWUTS)       = 0
[pid   343] unshare(CLONE_SYSVSEM)      = 0
[pid   343] openat(AT_FDCWD, "/proc/sys/kernel/shmmax", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
[pid   343] openat(AT_FDCWD, "/proc/sys/kernel/shmall", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
[pid   343] openat(AT_FDCWD, "/proc/sys/kernel/shmmni", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
[pid   343] openat(AT_FDCWD, "/proc/sys/kernel/msgmax", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
[pid   343] openat(AT_FDCWD, "/proc/sys/kernel/msgmni", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
[pid   343] openat(AT_FDCWD, "/proc/sys/kernel/msgmnb", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
[pid   343] openat(AT_FDCWD, "/proc/sys/kernel/sem", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
[pid   343] getpid()                    = 1
[pid   343] capget({version=_LINUX_CAPABILITY_VERSION_3, pid=1}, {effective=1<<CAP_CHOWN|1<<CAP_DAC_OVERRIDE|1<<CAP_DAC_READ_SEARCH|1<<CAP_FOWNER|1<<CAP_FSETID|1<<CAP_KILL|1<<CAP_SETGID|1<<CAP_SETUID|1<<CAP_SETPCAP|1<<CAP_LINUX_IMMUTABLE|1<<CAP_NET_BIND_SERVICE|1<<CAP_NET_BROADCAST|1<<CAP_NET_ADMIN|1<<CAP_NET_RAW|1<<CAP_IPC_LOCK|1<<CAP_IPC_OWNER|1<<CAP_SYS_MODULE|1<<CAP_SYS_RAWIO|1<<CAP_SYS_CHROOT|1<<CAP_SYS_PTRACE|1<<CAP_SYS_PACCT|1<<CAP_SYS_ADMIN|1<<CAP_SYS_BOOT|1<<CAP_SYS_NICE|1<<CAP_SYS_RESOURCE|1<<CAP_SYS_TIME|1<<CAP_SYS_TTY_CONFIG|1<<CAP_MKNOD|1<<CAP_LEASE|1<<CAP_AUDIT_WRITE|1<<CAP_AUDIT_CONTROL|1<<CAP_SETFCAP|1<<CAP_MAC_OVERRIDE|1<<CAP_MAC_ADMIN|1<<CAP_SYSLOG|1<<CAP_WAKE_ALARM|1<<CAP_BLOCK_SUSPEND|1<<CAP_AUDIT_READ, permitted=1<<CAP_CHOWN|1<<CAP_DAC_OVERRIDE|1<<CAP_DAC_READ_SEARCH|1<<CAP_FOWNER|1<<CAP_FSETID|1<<CAP_KILL|1<<CAP_SETGID|1<<CAP_SETUID|1<<CAP_SETPCAP|1<<CAP_LINUX_IMMUTABLE|1<<CAP_NET_BIND_SERVICE|1<<CAP_NET_BROADCAST|1<<CAP_NET_ADMIN|1<<CAP_NET_RAW|1<<CAP_IPC_LOCK|1<<CAP_IPC_OWNER|1<<CAP_SYS_MODULE|1<<CAP_SYS_RAWIO|1<<CAP_SYS_CHROOT|1<<CAP_SYS_PTRACE|1<<CAP_SYS_PACCT|1<<CAP_SYS_ADMIN|1<<CAP_SYS_BOOT|1<<CAP_SYS_NICE|1<<CAP_SYS_RESOURCE|1<<CAP_SYS_TIME|1<<CAP_SYS_TTY_CONFIG|1<<CAP_MKNOD|1<<CAP_LEASE|1<<CAP_AUDIT_WRITE|1<<CAP_AUDIT_CONTROL|1<<CAP_SETFCAP|1<<CAP_MAC_OVERRIDE|1<<CAP_MAC_ADMIN|1<<CAP_SYSLOG|1<<CAP_WAKE_ALARM|1<<CAP_BLOCK_SUSPEND|1<<CAP_AUDIT_READ, inheritable=0}) = 0
[pid   343] capset({version=_LINUX_CAPABILITY_VERSION_3, pid=1}, {effective=1<<CAP_CHOWN|1<<CAP_DAC_OVERRIDE|1<<CAP_DAC_READ_SEARCH|1<<CAP_FOWNER|1<<CAP_FSETID|1<<CAP_KILL|1<<CAP_SETGID|1<<CAP_SETUID|1<<CAP_SETPCAP|1<<CAP_LINUX_IMMUTABLE|1<<CAP_NET_BIND_SERVICE|1<<CAP_NET_BROADCAST|1<<CAP_NET_ADMIN|1<<CAP_NET_RAW|1<<CAP_IPC_LOCK|1<<CAP_IPC_OWNER|1<<CAP_SYS_MODULE|1<<CAP_SYS_RAWIO|1<<CAP_SYS_CHROOT|1<<CAP_SYS_PACCT|1<<CAP_SYS_ADMIN|1<<CAP_SYS_BOOT|1<<CAP_SYS_RESOURCE|1<<CAP_SYS_TIME|1<<CAP_SYS_TTY_CONFIG|1<<CAP_MKNOD|1<<CAP_LEASE|1<<CAP_AUDIT_WRITE|1<<CAP_AUDIT_CONTROL|1<<CAP_SETFCAP|1<<CAP_MAC_OVERRIDE|1<<CAP_MAC_ADMIN|1<<CAP_SYSLOG|1<<CAP_WAKE_ALARM|1<<CAP_BLOCK_SUSPEND|1<<CAP_AUDIT_READ, permitted=1<<CAP_CHOWN|1<<CAP_DAC_OVERRIDE|1<<CAP_DAC_READ_SEARCH|1<<CAP_FOWNER|1<<CAP_FSETID|1<<CAP_KILL|1<<CAP_SETGID|1<<CAP_SETUID|1<<CAP_SETPCAP|1<<CAP_LINUX_IMMUTABLE|1<<CAP_NET_BIND_SERVICE|1<<CAP_NET_BROADCAST|1<<CAP_NET_ADMIN|1<<CAP_NET_RAW|1<<CAP_IPC_LOCK|1<<CAP_IPC_OWNER|1<<CAP_SYS_MODULE|1<<CAP_SYS_RAWIO|1<<CAP_SYS_CHROOT|1<<CAP_SYS_PACCT|1<<CAP_SYS_ADMIN|1<<CAP_SYS_BOOT|1<<CAP_SYS_RESOURCE|1<<CAP_SYS_TIME|1<<CAP_SYS_TTY_CONFIG|1<<CAP_MKNOD|1<<CAP_LEASE|1<<CAP_AUDIT_WRITE|1<<CAP_AUDIT_CONTROL|1<<CAP_SETFCAP|1<<CAP_MAC_OVERRIDE|1<<CAP_MAC_ADMIN|1<<CAP_SYSLOG|1<<CAP_WAKE_ALARM|1<<CAP_BLOCK_SUSPEND|1<<CAP_AUDIT_READ, inheritable=0}) = 0
[pid   343] unshare(CLONE_NEWNET)       = 0
[pid   343] openat(AT_FDCWD, "/proc/sys/net/ipv4/ping_group_range", O_WRONLY|O_CLOEXEC) = 3
[pid   343] write(3, "0 65535", 7)      = 7
[pid   343] close(3)                    = 0
[pid   343] openat(AT_FDCWD, "/proc/sys/fs/mount-max", O_WRONLY|O_CLOEXEC) = 3
[pid   343] write(3, "100000", 6)       = 6
[pid   343] close(3)                    = 0
[pid   343] mkdir("./syz-tmp", 0777)    = 0
[   23.226561][   T23] audit: type=1400 audit(1747352172.280:81): avc:  denied  { execmem } for  pid=341 comm="syz-executor260" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
[   23.253017][   T23] audit: type=1400 audit(1747352172.310:82): avc:  denied  { mounton } for  pid=343 comm="syz-executor260" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1
[pid   343] mount("", "./syz-tmp", "tmpfs", 0, NULL) = 0
[pid   343] mkdir("./syz-tmp/newroot", 0777) = 0
[pid   343] mkdir("./syz-tmp/newroot/dev", 0700) = 0
[pid   343] mount("/dev", "./syz-tmp/newroot/dev", NULL, MS_BIND|MS_REC|MS_PRIVATE, NULL) = 0
[pid   343] mkdir("./syz-tmp/newroot/proc", 0700) = 0
[pid   343] mount("syz-proc", "./syz-tmp/newroot/proc", "proc", 0, NULL) = 0
[pid   343] mkdir("./syz-tmp/newroot/selinux", 0700) = 0
[pid   343] mount("/selinux", "./syz-tmp/newroot/selinux", NULL, MS_BIND|MS_REC|MS_PRIVATE, NULL) = -1 ENOENT (No such file or directory)
[pid   343] mount("/sys/fs/selinux", "./syz-tmp/newroot/selinux", NULL, MS_BIND|MS_REC|MS_PRIVATE, NULL) = 0
[pid   343] mkdir("./syz-tmp/newroot/sys", 0700) = 0
[pid   343] mount("/sys", "./syz-tmp/newroot/sys", NULL, MS_BIND|MS_REC|MS_PRIVATE, NULL) = 0
[pid   343] mount("/sys/kernel/debug", "./syz-tmp/newroot/sys/kernel/debug", NULL, MS_BIND|MS_REC|MS_PRIVATE, NULL) = 0
[pid   343] mount("/sys/fs/smackfs", "./syz-tmp/newroot/sys/fs/smackfs", NULL, MS_BIND|MS_REC|MS_PRIVATE, NULL) = -1 ENOENT (No such file or directory)
[pid   343] mount("/proc/sys/fs/binfmt_misc", "./syz-tmp/newroot/proc/sys/fs/binfmt_misc", NULL, MS_BIND|MS_REC|MS_PRIVATE, NULL) = 0
[pid   343] mkdir("./syz-tmp/newroot/syz-inputs", 0700) = 0
[pid   343] mount("/syz-inputs", "./syz-tmp/newroot/syz-inputs", NULL, MS_RDONLY|MS_BIND|MS_REC|MS_PRIVATE, NULL) = -1 ENOENT (No such file or directory)
[pid   343] mkdir("./syz-tmp/pivot", 0777) = 0
[pid   343] pivot_root("./syz-tmp", "./syz-tmp/pivot") = 0
[pid   343] chdir("/")                  = 0
[pid   343] umount2("./pivot", MNT_DETACH) = 0
[pid   343] chroot("./newroot")         = 0
[pid   343] chdir("/")                  = 0
[   23.292601][   T23] audit: type=1400 audit(1747352172.350:83): avc:  denied  { mounton } for  pid=343 comm="syz-executor260" path="/root/syzkaller.cTl253/syz-tmp" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1
[   23.317816][   T23] audit: type=1400 audit(1747352172.350:84): avc:  denied  { mount } for  pid=343 comm="syz-executor260" name="/" dev="tmpfs" ino=11546 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1
[pid   343] mkdir("/dev/gadgetfs", 0777) = 0
[pid   343] mount("gadgetfs", "/dev/gadgetfs", "gadgetfs", 0, NULL) = -1 ENODEV (No such device)
[pid   343] mkdir("/dev/binderfs", 0777) = 0
[pid   343] mount("binder", "/dev/binderfs", "binder", 0, NULL) = 0
[pid   343] mount(NULL, "/sys/fs/fuse/connections", "fusectl", 0, NULL) = -1 EBUSY (Device or resource busy)
[pid   343] mkdir("./0", 0777)          = 0
[pid   343] clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x555556d10650) = 2
./strace-static-x86_64: Process 344 attached
[pid   344] set_robust_list(0x555556d10660, 24) = 0
[pid   344] chdir("./0")                = 0
[pid   344] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0
[pid   344] setpgid(0, 0)               = 0
[pid   344] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC) = 3
[pid   344] write(3, "1000", 4executing program
)         = 4
[pid   344] close(3)                    = 0
[pid   344] symlink("/dev/binderfs", "./binderfs") = 0
[pid   344] write(1, "executing program\n", 18) = 18
[pid   344] mkdirat(AT_FDCWD, "./file0", 000) = 0
[pid   344] mount(".", "./file0/../file0", NULL, MS_RDONLY|MS_SYNCHRONOUS|MS_DIRSYNC|MS_BIND|MS_SHARED, NULL) = 0
[pid   344] mount("./file0", "./file0", "incremental-fs", 0, NULL) = 0
[pid   344] close(3)                    = -1 EBADF (Bad file descriptor)
[pid   344] close(4)                    = -1 EBADF (Bad file descriptor)
[pid   344] close(5)                    = -1 EBADF (Bad file descriptor)
[pid   344] close(6)                    = -1 EBADF (Bad file descriptor)
[pid   344] close(7)                    = -1 EBADF (Bad file descriptor)
[   23.341054][   T23] audit: type=1400 audit(1747352172.370:85): avc:  denied  { mounton } for  pid=343 comm="syz-executor260" path="/root/syzkaller.cTl253/syz-tmp/newroot/dev" dev="tmpfs" ino=11548 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1
[   23.342968][  T343] request_module fs-gadgetfs succeeded, but still no fs?
[pid   344] close(8)                    = -1 EBADF (Bad file descriptor)
[pid   344] close(9)                    = -1 EBADF (Bad file descriptor)
[pid   344] close(10)                   = -1 EBADF (Bad file descriptor)
[pid   344] close(11)                   = -1 EBADF (Bad file descriptor)
[pid   344] close(12)                   = -1 EBADF (Bad file descriptor)
[pid   344] close(13)                   = -1 EBADF (Bad file descriptor)
[pid   344] close(14)                   = -1 EBADF (Bad file descriptor)
[pid   344] close(15)                   = -1 EBADF (Bad file descriptor)
[pid   344] close(16)                   = -1 EBADF (Bad file descriptor)
[pid   344] close(17)                   = -1 EBADF (Bad file descriptor)
[pid   344] close(18)                   = -1 EBADF (Bad file descriptor)
[pid   344] close(19)                   = -1 EBADF (Bad file descriptor)
[pid   344] close(20)                   = -1 EBADF (Bad file descriptor)
[pid   344] close(21)                   = -1 EBADF (Bad file descriptor)
[pid   344] close(22)                   = -1 EBADF (Bad file descriptor)
[pid   344] close(23)                   = -1 EBADF (Bad file descriptor)
[pid   344] close(24)                   = -1 EBADF (Bad file descriptor)
[pid   344] close(25)                   = -1 EBADF (Bad file descriptor)
[pid   344] close(26)                   = -1 EBADF (Bad file descriptor)
[pid   344] close(27)                   = -1 EBADF (Bad file descriptor)
[pid   344] close(28)                   = -1 EBADF (Bad file descriptor)
[pid   344] close(29)                   = -1 EBADF (Bad file descriptor)
[pid   344] exit_group(0)               = ?
[pid   344] +++ exited with 0 +++
[pid   343] --- SIGCHLD {si_signo=SIGCHLD, si_code=CLD_EXITED, si_pid=2, si_uid=0, si_status=0, si_utime=0, si_stime=0} ---
[pid   343] restart_syscall(<... resuming interrupted clone ...>) = 0
[pid   343] umount2("./0", MNT_FORCE|UMOUNT_NOFOLLOW) = -1 EINVAL (Invalid argument)
[pid   343] openat(AT_FDCWD, "./0", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 3
[pid   343] newfstatat(3, "", {st_mode=S_IFDIR|0700, st_size=120, ...}, AT_EMPTY_PATH) = 0
[pid   343] getdents64(3, 0x555556d116f0 /* 6 entries */, 32768) = 176
[pid   343] umount2("./0/.incomplete", MNT_FORCE|UMOUNT_NOFOLLOW) = -1 EINVAL (Invalid argument)
[pid   343] newfstatat(AT_FDCWD, "./0/.incomplete", {st_mode=S_IFDIR|0700, st_size=40, ...}, AT_SYMLINK_NOFOLLOW) = 0
[pid   343] umount2("./0/.incomplete", MNT_FORCE|UMOUNT_NOFOLLOW) = -1 EINVAL (Invalid argument)
[pid   343] openat(AT_FDCWD, "./0/.incomplete", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 4
[pid   343] newfstatat(4, "", {st_mode=S_IFDIR|0700, st_size=40, ...}, AT_EMPTY_PATH) = 0
[pid   343] getdents64(4, 0x555556d19730 /* 2 entries */, 32768) = 48
[pid   343] getdents64(4, 0x555556d19730 /* 0 entries */, 32768) = 0
[pid   343] close(4)                    = 0
[pid   343] rmdir("./0/.incomplete")    = 0
[pid   343] umount2("./0/.index", MNT_FORCE|UMOUNT_NOFOLLOW) = -1 EINVAL (Invalid argument)
[pid   343] newfstatat(AT_FDCWD, "./0/.index", {st_mode=S_IFDIR|0700, st_size=40, ...}, AT_SYMLINK_NOFOLLOW) = 0
[pid   343] umount2("./0/.index", MNT_FORCE|UMOUNT_NOFOLLOW) = -1 EINVAL (Invalid argument)
[pid   343] openat(AT_FDCWD, "./0/.index", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 4
[pid   343] newfstatat(4, "", {st_mode=S_IFDIR|0700, st_size=40, ...}, AT_EMPTY_PATH) = 0
[pid   343] getdents64(4, 0x555556d19730 /* 2 entries */, 32768) = 48
[pid   343] getdents64(4, 0x555556d19730 /* 0 entries */, 32768) = 0
[pid   343] close(4)                    = 0
[pid   343] rmdir("./0/.index")         = 0
[   23.367307][   T23] audit: type=1400 audit(1747352172.370:86): avc:  denied  { mount } for  pid=343 comm="syz-executor260" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1
[   23.396969][   T23] audit: type=1400 audit(1747352172.370:87): avc:  denied  { mounton } for  pid=343 comm="syz-executor260" path="/root/syzkaller.cTl253/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1
[   23.424456][   T23] audit: type=1400 audit(1747352172.370:88): avc:  denied  { mounton } for  pid=343 comm="syz-executor260" path="/root/syzkaller.cTl253/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=11553 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1
[   23.424613][  T343] ------------[ cut here ]------------
[   23.452385][   T23] audit: type=1400 audit(1747352172.370:89): avc:  denied  { unmount } for  pid=343 comm="syz-executor260" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1
[   23.458050][  T343] WARNING: CPU: 1 PID: 343 at fs/inode.c:302 drop_nlink+0xc5/0x110
[   23.478240][   T23] audit: type=1400 audit(1747352172.390:90): avc:  denied  { mounton } for  pid=343 comm="syz-executor260" path="/dev/gadgetfs" dev="devtmpfs" ino=11556 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1
[   23.486159][  T343] Modules linked in:
[   23.486179][  T343] CPU: 1 PID: 343 Comm: syz-executor260 Not tainted 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0
[   23.486183][  T343] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
[   23.486199][  T343] RIP: 0010:drop_nlink+0xc5/0x110
[   23.486208][  T343] Code: 1b 48 8d bb d0 04 00 00 be 08 00 00 00 e8 b3 a4 f3 ff f0 48 ff 83 d0 04 00 00 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 4b d0 c5 ff <0f> 0b eb 86 44 89 f1 80 e1 07 80 c1 03 38 c1 0f 8c 5e ff ff ff 4c
[   23.486223][  T343] RSP: 0018:ffff8881f3fc7b40 EFLAGS: 00010293
[   23.564948][  T343] RAX: ffffffff8199ae95 RBX: ffff8881ee042688 RCX: ffff8881f30c8000
[   23.573364][  T343] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[   23.581469][  T343] RBP: ffff8881f3fc7b68 R08: 0000000000000004 R09: 0000000000000003
[   23.589434][  T343] R10: ffffed103e7f8f58 R11: 1ffff1103e7f8f58 R12: dffffc0000000000
[   23.597593][  T343] R13: 1ffff1103dc084da R14: ffff8881ee0426d0 R15: 0000000000000000
[   23.605572][  T343] FS:  0000555556d10380(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000
[   23.614600][  T343] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   23.621317][  T343] CR2: 0000559f8d2fd338 CR3: 00000001dfce0000 CR4: 00000000003406a0
[   23.629320][  T343] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[   23.637406][  T343] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[   23.645473][  T343] Call Trace:
[   23.648918][  T343]  shmem_rmdir+0x5b/0x90
[   23.653420][  T343]  vfs_rmdir+0x1b3/0x3e0
[   23.657650][  T343]  incfs_kill_sb+0xfe/0x210
[   23.662519][  T343]  deactivate_locked_super+0xa0/0x100
[   23.668005][  T343]  deactivate_super+0x14f/0x1d0
[   23.672857][  T343]  ? __kasan_check_write+0x14/0x20
[   23.677975][  T343]  ? deactivate_locked_super+0x100/0x100
[   23.683641][  T343]  ? fast_dput+0x83/0x290
[   23.688227][  T343]  cleanup_mnt+0x446/0x500
[   23.692642][  T343]  __cleanup_mnt+0x19/0x20
[   23.697060][  T343]  task_work_run+0x146/0x170
[   23.701643][  T343]  ptrace_notify+0x212/0x250
[   23.706308][  T343]  ? do_notify_parent+0x7e0/0x7e0
[   23.711321][  T343]  ? ksys_umount+0x266/0x360
[   23.716082][  T343]  ? namespace_unlock+0x3e0/0x3e0
[   23.721178][  T343]  syscall_slow_exit_work+0x17e/0x440
[   23.726558][  T343]  do_syscall_64+0x160/0x170
[   23.731157][  T343]  entry_SYSCALL_64_after_hwframe+0x5c/0xc1
[   23.737075][  T343] RIP: 0033:0x7fb9166c0ac7
[   23.741494][  T343] Code: 07 00 48 83 c4 08 5b 5d c3 66 2e 0f 1f 84 00 00 00 00 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8
[   23.761578][  T343] RSP: 002b:00007ffff5a6cc88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a6
[   23.770064][  T343] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fb9166c0ac7
[   23.778021][  T343] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffff5a6cd40
[   23.785994][  T343] RBP: 00007ffff5a6cd40 R08: 0000000000000000 R09: 0000000000000000
[   23.794059][  T343] R10: 00000000ffffffff R11: 0000000000000206 R12: 00007ffff5a6ddb0
[   23.802146][  T343] R13: 0000555556d116c0 R14: 00007ffff5a6ddb0 R15: 0000000000000001
[   23.810113][  T343] ---[ end trace a41a975ef7435e85 ]---
[   23.815719][  T343] ==================================================================
[   23.823878][  T343] BUG: KASAN: null-ptr-deref in ihold+0x20/0x60
[   23.830103][  T343] Write of size 4 at addr 0000000000000160 by task syz-executor260/343
[   23.838323][  T343] 
[   23.840694][  T343] CPU: 1 PID: 343 Comm: syz-executor260 Tainted: G        W         5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0
[   23.852225][  T343] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
[   23.862376][  T343] Call Trace:
[   23.865656][  T343]  __dump_stack+0x1e/0x20
[   23.869968][  T343]  dump_stack+0x15b/0x1b8
[   23.874280][  T343]  ? thaw_kernel_threads+0x220/0x220
[   23.879672][  T343]  ? show_regs_print_info+0x18/0x18
[   23.884951][  T343]  ? __kasan_check_write+0x14/0x20
[   23.890053][  T343]  ? _raw_spin_lock+0x8e/0xe0
[   23.894715][  T343]  ? ihold+0x20/0x60
[   23.898693][  T343]  ? ihold+0x20/0x60
[   23.902581][  T343]  __kasan_report+0xe4/0x120
[   23.907155][  T343]  ? ihold+0x20/0x60
[   23.911034][  T343]  kasan_report+0x30/0x60
[   23.915434][  T343]  check_memory_region+0x274/0x280
[   23.920682][  T343]  __kasan_check_write+0x14/0x20
[   23.925599][  T343]  ihold+0x20/0x60
[   23.929332][  T343]  vfs_rmdir+0x247/0x3e0
[   23.933571][  T343]  incfs_kill_sb+0xfe/0x210
[   23.938076][  T343]  deactivate_locked_super+0xa0/0x100
[   23.943445][  T343]  deactivate_super+0x14f/0x1d0
[   23.948463][  T343]  ? __kasan_check_write+0x14/0x20
[   23.953559][  T343]  ? deactivate_locked_super+0x100/0x100
[   23.959390][  T343]  ? fast_dput+0x83/0x290
[   23.963747][  T343]  cleanup_mnt+0x446/0x500
[   23.968154][  T343]  __cleanup_mnt+0x19/0x20
[   23.972557][  T343]  task_work_run+0x146/0x170
[   23.977129][  T343]  ptrace_notify+0x212/0x250
[   23.981701][  T343]  ? do_notify_parent+0x7e0/0x7e0
[   23.986724][  T343]  ? ksys_umount+0x266/0x360
[   23.991296][  T343]  ? namespace_unlock+0x3e0/0x3e0
[   23.996307][  T343]  syscall_slow_exit_work+0x17e/0x440
[   24.001843][  T343]  do_syscall_64+0x160/0x170
[   24.006419][  T343]  entry_SYSCALL_64_after_hwframe+0x5c/0xc1
[   24.012512][  T343] RIP: 0033:0x7fb9166c0ac7
[   24.016921][  T343] Code: 07 00 48 83 c4 08 5b 5d c3 66 2e 0f 1f 84 00 00 00 00 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8
[   24.036705][  T343] RSP: 002b:00007ffff5a6cc88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a6
[   24.045246][  T343] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fb9166c0ac7
[   24.053205][  T343] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffff5a6cd40
[   24.061249][  T343] RBP: 00007ffff5a6cd40 R08: 0000000000000000 R09: 0000000000000000
[   24.069337][  T343] R10: 00000000ffffffff R11: 0000000000000206 R12: 00007ffff5a6ddb0
[   24.077585][  T343] R13: 0000555556d116c0 R14: 00007ffff5a6ddb0 R15: 0000000000000001
[   24.085736][  T343] ==================================================================
[   24.093784][  T343] Disabling lock debugging due to kernel taint
[   24.100324][  T343] BUG: kernel NULL pointer dereference, address: 0000000000000160
[   24.108318][  T343] #PF: supervisor write access in kernel mode
[   24.114374][  T343] #PF: error_code(0x0002) - not-present page
[   24.120341][  T343] PGD 0 P4D 0 
[   24.123722][  T343] Oops: 0002 [#1] PREEMPT SMP KASAN
[   24.128911][  T343] CPU: 1 PID: 343 Comm: syz-executor260 Tainted: G    B   W         5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0
[   24.140519][  T343] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
[   24.150588][  T343] RIP: 0010:ihold+0x26/0x60
[   24.155073][  T343] Code: 00 00 00 00 55 48 89 e5 41 56 53 48 89 fb e8 61 c8 c5 ff 48 8d bb 60 01 00 00 be 04 00 00 00 e8 a0 9c f3 ff 41 be 01 00 00 00 <f0> 44 0f c1 b3 60 01 00 00 41 ff c6 bf 02 00 00 00 44 89 f6 e8 81
[   24.175065][  T343] RSP: 0018:ffff8881f3fc7b80 EFLAGS: 00010246
[   24.181490][  T343] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffff8881f30c8000
[   24.189545][  T343] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 00000000ffffffff
[   24.197515][  T343] RBP: ffff8881f3fc7b90 R08: 0000000000000004 R09: 0000000000000003
[   24.205753][  T343] R10: fffffbfff0ca7a5c R11: 1ffffffff0ca7a5c R12: 1ffff1103b95a77c
[   24.213793][  T343] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000
[   24.221862][  T343] FS:  0000555556d10380(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000
[   24.230887][  T343] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   24.237564][  T343] CR2: 0000000000000160 CR3: 00000001dfce0000 CR4: 00000000003406a0
[   24.245535][  T343] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[   24.253500][  T343] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[   24.261455][  T343] Call Trace:
[   24.264731][  T343]  vfs_rmdir+0x247/0x3e0
[   24.269168][  T343]  incfs_kill_sb+0xfe/0x210
[   24.273671][  T343]  deactivate_locked_super+0xa0/0x100
[   24.279026][  T343]  deactivate_super+0x14f/0x1d0
[   24.283859][  T343]  ? __kasan_check_write+0x14/0x20
[   24.288950][  T343]  ? deactivate_locked_super+0x100/0x100
[   24.294655][  T343]  ? fast_dput+0x83/0x290
[   24.299062][  T343]  cleanup_mnt+0x446/0x500
[   24.303484][  T343]  __cleanup_mnt+0x19/0x20
[   24.308053][  T343]  task_work_run+0x146/0x170
[   24.312777][  T343]  ptrace_notify+0x212/0x250
[   24.317469][  T343]  ? do_notify_parent+0x7e0/0x7e0
[   24.322653][  T343]  ? ksys_umount+0x266/0x360
[   24.327284][  T343]  ? namespace_unlock+0x3e0/0x3e0
[   24.332495][  T343]  syscall_slow_exit_work+0x17e/0x440
[   24.337865][  T343]  do_syscall_64+0x160/0x170
[   24.342445][  T343]  entry_SYSCALL_64_after_hwframe+0x5c/0xc1
[   24.348410][  T343] RIP: 0033:0x7fb9166c0ac7
[   24.352958][  T343] Code: 07 00 48 83 c4 08 5b 5d c3 66 2e 0f 1f 84 00 00 00 00 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8
[   24.373241][  T343] RSP: 002b:00007ffff5a6cc88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a6
[   24.381734][  T343] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fb9166c0ac7
[   24.389871][  T343] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffff5a6cd40
[   24.397839][  T343] RBP: 00007ffff5a6cd40 R08: 0000000000000000 R09: 0000000000000000
[   24.406056][  T343] R10: 00000000ffffffff R11: 0000000000000206 R12: 00007ffff5a6ddb0
[   24.414222][  T343] R13: 0000555556d116c0 R14: 00007ffff5a6ddb0 R15: 0000000000000001
[   24.422219][  T343] Modules linked in:
[   24.426103][  T343] CR2: 0000000000000160
[   24.430254][  T343] ---[ end trace a41a975ef7435e86 ]---
[   24.435703][  T343] RIP: 0010:ihold+0x26/0x60
[   24.440279][  T343] Code: 00 00 00 00 55 48 89 e5 41 56 53 48 89 fb e8 61 c8 c5 ff 48 8d bb 60 01 00 00 be 04 00 00 00 e8 a0 9c f3 ff 41 be 01 00 00 00 <f0> 44 0f c1 b3 60 01 00 00 41 ff c6 bf 02 00 00 00 44 89 f6 e8 81
[   24.459883][  T343] RSP: 0018:ffff8881f3fc7b80 EFLAGS: 00010246
[   24.466145][  T343] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffff8881f30c8000
[   24.474494][  T343] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 00000000ffffffff
[   24.482466][  T343] RBP: ffff8881f3fc7b90 R08: 0000000000000004 R09: 0000000000000003
[   24.490435][  T343] R10: fffffbfff0ca7a5c R11: 1ffffffff0ca7a5c R12: 1ffff1103b95a77c
[   24.498645][  T343] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000
[   24.506856][  T343] FS:  0000555556d10380(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000
[   24.515858][  T343] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   24.522431][  T343] CR2: 0000000000000160 CR3: 00000001dfce0000 CR4: 00000000003406a0
[   24.530506][  T343] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[   24.538774][  T343] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[   24.547123][  T343] Kernel panic - not syncing: Fatal exception
[   24.553414][  T343] Kernel Offset: disabled
[   24.558204][  T343] Rebooting in 86400 seconds..