./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor2807079475 <...> Warning: Permanently added '10.128.0.181' (ED25519) to the list of known hosts. execve("./syz-executor2807079475", ["./syz-executor2807079475"], 0x7ffceb782df0 /* 10 vars */) = 0 brk(NULL) = 0x5555559c0000 brk(0x5555559c0d40) = 0x5555559c0d40 arch_prctl(ARCH_SET_FS, 0x5555559c03c0) = 0 set_tid_address(0x5555559c0690) = 303 set_robust_list(0x5555559c06a0, 24) = 0 rseq(0x5555559c0ce0, 0x20, 0, 0x53053053) = -1 ENOSYS (Function not implemented) prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor2807079475", 4096) = 28 getrandom("\x0a\x6e\x88\x03\xc9\x44\xd2\xdc", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x5555559c0d40 brk(0x5555559e1d40) = 0x5555559e1d40 brk(0x5555559e2000) = 0x5555559e2000 mprotect(0x7fe95422c000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 unshare(CLONE_NEWPID) = 0 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x5555559c0690) = 304 ./strace-static-x86_64: Process 304 attached [pid 304] set_robust_list(0x5555559c06a0, 24) = 0 [pid 304] mount(NULL, "/sys/fs/fuse/connections", "fusectl", 0, NULL) = -1 EBUSY (Device or resource busy) [pid 304] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0 [pid 304] setsid() = 1 [pid 304] prlimit64(0, RLIMIT_AS, {rlim_cur=204800*1024, rlim_max=204800*1024}, NULL) = 0 [pid 304] prlimit64(0, RLIMIT_MEMLOCK, {rlim_cur=32768*1024, rlim_max=32768*1024}, NULL) = 0 [pid 304] prlimit64(0, RLIMIT_FSIZE, {rlim_cur=139264*1024, rlim_max=139264*1024}, NULL) = 0 [pid 304] prlimit64(0, RLIMIT_STACK, {rlim_cur=1024*1024, rlim_max=1024*1024}, NULL) = 0 [pid 304] prlimit64(0, RLIMIT_CORE, {rlim_cur=131072*1024, rlim_max=131072*1024}, NULL) = 0 [pid 304] prlimit64(0, RLIMIT_NOFILE, {rlim_cur=256, rlim_max=256}, NULL) = 0 [pid 304] unshare(CLONE_NEWNS) = 0 [pid 304] mount(NULL, "/", NULL, MS_REC|MS_PRIVATE, NULL) = 0 [pid 304] unshare(CLONE_NEWIPC) = -1 EINVAL (Invalid argument) [pid 304] unshare(CLONE_NEWCGROUP) = 0 [pid 304] unshare(CLONE_NEWUTS) = 0 [pid 304] unshare(CLONE_SYSVSEM) = 0 [pid 304] openat(AT_FDCWD, "/proc/sys/kernel/shmmax", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) [pid 304] openat(AT_FDCWD, "/proc/sys/kernel/shmall", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) [pid 304] openat(AT_FDCWD, "/proc/sys/kernel/shmmni", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) [pid 304] openat(AT_FDCWD, "/proc/sys/kernel/msgmax", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) [pid 304] openat(AT_FDCWD, "/proc/sys/kernel/msgmni", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) [pid 304] openat(AT_FDCWD, "/proc/sys/kernel/msgmnb", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) [pid 304] openat(AT_FDCWD, "/proc/sys/kernel/sem", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) [pid 304] getpid() = 1 [pid 304] capget({version=_LINUX_CAPABILITY_VERSION_3, pid=1}, {effective=1< {parent_tid=[3]}, 88) = 3 [pid 305] rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0 [pid 305] futex(0x7fe954232308, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 305] futex(0x7fe95423230c, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=550000000}./strace-static-x86_64: Process 306 attached [pid 306] set_robust_list(0x7fe9541699a0, 24) = 0 [pid 306] rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0 [ 31.361670][ T30] audit: type=1400 audit(1708798857.982:66): avc: denied { execmem } for pid=303 comm="syz-executor280" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 31.366656][ T30] audit: type=1400 audit(1708798857.992:67): avc: denied { mounton } for pid=304 comm="syz-executor280" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 31.370006][ T30] audit: type=1400 audit(1708798857.992:68): avc: denied { mount } for pid=304 comm="syz-executor280" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 31.373426][ T30] audit: type=1400 audit(1708798857.992:69): avc: denied { mounton } for pid=304 comm="syz-executor280" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 31.383353][ T30] audit: type=1400 audit(1708798858.002:70): avc: denied { mounton } for pid=304 comm="syz-executor280" path="/dev/binderfs" dev="devtmpfs" ino=362 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 31.406524][ T30] audit: type=1400 audit(1708798858.002:71): avc: denied { mount } for pid=304 comm="syz-executor280" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 31.429257][ T30] audit: type=1400 audit(1708798858.002:72): avc: denied { prog_load } for pid=305 comm="syz-executor280" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 31.448413][ T30] audit: type=1400 audit(1708798858.002:73): avc: denied { bpf } for pid=305 comm="syz-executor280" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 31.469023][ T30] audit: type=1400 audit(1708798858.002:74): avc: denied { perfmon } for pid=305 comm="syz-executor280" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [pid 306] bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_RAW_TRACEPOINT_WRITABLE, insn_cnt=4, insns=0x200002c0, license="GPL", log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_SOCK_CREATE, prog_btf_fd=-1, func_info_rec_size=8, func_info=NULL, func_info_cnt=0, line_info_rec_size=16, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL}, 128) = 3 [pid 306] futex(0x7fe95423230c, FUTEX_WAKE_PRIVATE, 1000000 [pid 305] <... futex resumed>) = 0 [pid 305] futex(0x7fe954232308, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 305] futex(0x7fe95423230c, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=550000000} [pid 306] <... futex resumed>) = 1 [pid 306] bpf(BPF_RAW_TRACEPOINT_OPEN, {raw_tracepoint={name="kfree", prog_fd=3}}, 16) = 4 [pid 306] futex(0x7fe95423230c, FUTEX_WAKE_PRIVATE, 1000000 [pid 305] <... futex resumed>) = 0 [pid 305] futex(0x7fe954232308, FUTEX_WAKE_PRIVATE, 1000000) = 0 [ 31.558403][ T30] audit: type=1400 audit(1708798858.182:75): avc: denied { prog_run } for pid=305 comm="syz-executor280" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 31.648205][ T310] syz-executor280 (310) used greatest stack depth: 21360 bytes left [ 34.238932][ T1] Kernel panic - not syncing: Attempted to kill init! exitcode=0x00000008 [ 34.247254][ T1] CPU: 1 PID: 1 Comm: init Not tainted 5.15.148-syzkaller-00718-g993bed180178 #0 [ 34.256189][ T1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 34.266082][ T1] Call Trace: [ 34.269207][ T1] [ 34.271984][ T1] dump_stack_lvl+0x151/0x1b7 [ 34.276502][ T1] ? io_uring_drop_tctx_refs+0x190/0x190 [ 34.281973][ T1] dump_stack+0x15/0x17 [ 34.286054][ T1] panic+0x287/0x751 [ 34.289788][ T1] ? do_exit+0x240b/0x2ca0 [ 34.294038][ T1] ? fb_is_primary_device+0xd4/0xd4 [ 34.299075][ T1] ? __kasan_check_write+0x14/0x20 [ 34.304023][ T1] ? sync_mm_rss+0x28a/0x2e0 [ 34.308533][ T1] do_exit+0x2425/0x2ca0 [ 34.312610][ T1] ? __sched_text_start+0x8/0x8 [ 34.317298][ T1] ? put_task_struct+0x80/0x80 [ 34.321898][ T1] ? schedule+0x136/0x1e0 [ 34.326064][ T1] ? __kasan_check_write+0x14/0x20 [ 34.331009][ T1] ? _raw_spin_lock_irq+0xa5/0x1b0 [ 34.335956][ T1] ? _raw_spin_lock_irqsave+0x210/0x210 [ 34.341341][ T1] do_group_exit+0x141/0x310 [ 34.345768][ T1] get_signal+0x7a3/0x1630 [ 34.350020][ T1] ? wait_for_common+0x366/0x420 [ 34.354795][ T1] arch_do_signal_or_restart+0xbd/0x1680 [ 34.360262][ T1] ? __kasan_check_write+0x14/0x20 [ 34.365207][ T1] ? put_pid+0xd7/0x110 [ 34.369202][ T1] ? kernel_clone+0x6cf/0x9e0 [ 34.373713][ T1] ? create_io_thread+0x1e0/0x1e0 [ 34.378575][ T1] ? get_sigframe_size+0x10/0x10 [ 34.383349][ T1] ? timespec64_add_safe+0x220/0x220 [ 34.388643][ T1] exit_to_user_mode_loop+0xa0/0xe0 [ 34.393680][ T1] exit_to_user_mode_prepare+0x5a/0xa0 [ 34.398971][ T1] syscall_exit_to_user_mode+0x26/0x160 [ 34.404365][ T1] do_syscall_64+0x49/0xb0 [ 34.408604][ T1] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 34.414332][ T1] RIP: 0033:0x7f8157892a68 [ 34.418588][ T1] Code: 00 48 8d b8 e0 02 00 00 48 89 b8 d8 02 00 00 48 89 b8 e0 02 00 00 b8 11 01 00 00 0f 05 44 89 c0 c3 90 5f b8 3a 00 00 00 0f 05 <57> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 90 43 0f 00 f7 d8 64 89 01 48 [ 34.438028][ T1] RSP: 002b:00007ffef9a5ef20 EFLAGS: 00000246 ORIG_RAX: 000000000000003a [ 34.446274][ T1] RAX: 00000000000001e5 RBX: 00005649c0201a50 RCX: 00007f8157892a68 [ 34.454084][ T1] RDX: 0000000000000008 RSI: 0000000000000000 RDI: 00007f8157a1dbed [ 34.461897][ T1] RBP: 00007f8157a58528 R08: 0000000000000007 R09: b697ec23145e59b3 [ 34.469706][ T1] R10: 00007ffef9a5ef60 R11: 0000000000000246 R12: 0000000000000000 [ 34.477517][ T1] R13: 0000000000000018 R14: 00005649bfae3169 R15: 00007f8157a89a80 [ 34.485331][ T1] [ 34.488345][ T1] Kernel Offset: disabled [ 34.492466][ T1] Rebooting in 86400 seconds..