./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor1450500358 <...> Warning: Permanently added '10.128.0.40' (ECDSA) to the list of known hosts. execve("./syz-executor1450500358", ["./syz-executor1450500358"], 0x7ffd5c7665d0 /* 10 vars */) = 0 brk(NULL) = 0x5555566c0000 brk(0x5555566c0c40) = 0x5555566c0c40 arch_prctl(ARCH_SET_FS, 0x5555566c0300) = 0 uname({sysname="Linux", nodename="syzkaller", ...}) = 0 readlink("/proc/self/exe", "/root/syz-executor1450500358", 4096) = 28 brk(0x5555566e1c40) = 0x5555566e1c40 brk(0x5555566e2000) = 0x5555566e2000 mprotect(0x7f137ca88000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 memfd_create("syzkaller", 0) = 3 mmap(NULL, 138412032, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f13745cf000 write(3, "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., 262144) = 262144 munmap(0x7f13745cf000, 262144) = 0 openat(AT_FDCWD, "/dev/loop0", O_RDWR) = 4 ioctl(4, LOOP_SET_FD, 3) = 0 close(3) = 0 mkdir("./file1", 0777) = 0 mount("/dev/loop0", "./file1", "ext3", MS_MGC_VAL|MS_NOSUID|MS_NODEV, "debug_want_extra_isize=0x0000000000000080,quota,auto_da_alloc=0x0000000000000800,max_batch_time=0x00"...) = 0 openat(AT_FDCWD, "./file1", O_RDONLY|O_DIRECTORY) = 3 chdir("./file1") = 0 ioctl(4, LOOP_CLR_FD) = 0 close(4) = 0 [ 18.945059][ T22] audit: type=1400 audit(1672603580.290:73): avc: denied { execmem } for pid=304 comm="syz-executor145" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 18.948459][ T22] audit: type=1400 audit(1672603580.300:74): avc: denied { read write } for pid=304 comm="syz-executor145" name="loop0" dev="devtmpfs" ino=9278 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 18.952335][ T22] audit: type=1400 audit(1672603580.300:75): avc: denied { open } for pid=304 comm="syz-executor145" path="/dev/loop0" dev="devtmpfs" ino=9278 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 18.955824][ T304] EXT4-fs (loop0): mounting ext3 file system using the ext4 subsystem [ 18.955946][ T22] audit: type=1400 audit(1672603580.300:76): avc: denied { ioctl } for pid=304 comm="syz-executor145" path="/dev/loop0" dev="devtmpfs" ino=9278 ioctlcmd=0x4c00 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 18.961188][ T22] audit: type=1400 audit(1672603580.300:77): avc: denied { mounton } for pid=304 comm="syz-executor145" path="/root/file1" dev="sda1" ino=1138 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 18.966513][ T304] EXT4-fs (loop0): 1 truncate cleaned up [ 18.972142][ T304] EXT4-fs (loop0): mounted filesystem without journal. Opts: debug_want_extra_isize=0x0000000000000080,quota,auto_da_alloc=0x0000000000000800,max_batch_time=0x0000000000000008,noload,usrjquota=,,errors=continue [ 18.993072][ T22] audit: type=1400 audit(1672603580.340:78): avc: denied { mount } for pid=304 comm="syz-executor145" name="/" dev="loop0" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 18.995200][ T304] kasan: CONFIG_KASAN_INLINE enabled [ 19.019618][ T22] audit: type=1400 audit(1672603580.340:79): avc: denied { write } for pid=304 comm="syz-executor145" name="/" dev="loop0" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 19.022917][ T304] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 19.042390][ T22] audit: type=1400 audit(1672603580.340:80): avc: denied { add_name } for pid=304 comm="syz-executor145" name="cgroup.controllers" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 19.050389][ T304] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 19.072380][ T22] audit: type=1400 audit(1672603580.340:81): avc: denied { create } for pid=304 comm="syz-executor145" name="cgroup.controllers" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 19.078981][ T304] CPU: 1 PID: 304 Comm: syz-executor145 Not tainted 5.4.219-syzkaller-00012-ga8aad8851131 #0 [ 19.078986][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 19.079016][ T304] RIP: 0010:ext4_xattr_set_entry+0x48e/0x37b0 [ 19.079029][ T304] Code: 24 70 48 89 d8 48 c1 e8 03 48 89 84 24 08 01 00 00 42 80 3c 38 00 74 08 48 89 df e8 2c f1 c0 ff 4c 8b 33 4c 89 f0 48 c1 e8 03 <42> 8a 04 38 84 c0 0f 85 6c 2d 00 00 4c 89 e0 48 2b 44 24 08 48 89 [ 19.146252][ T304] RSP: 0018:ffff8881dcc5f000 EFLAGS: 00010246 [ 19.152320][ T304] RAX: 0000000000000000 RBX: ffff8881dcc5f3e0 RCX: ffff8881dd1c4ec0 [ 19.160259][ T304] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000001c [ 19.168200][ T304] RBP: ffff8881dcc5f270 R08: ffffffff81d2bed8 R09: ffffed103cc1ee69 [ 19.176140][ T304] R10: ffffed103cc1ee69 R11: 1ffff1103cc1ee68 R12: 0000000000000000 [ 19.184079][ T304] R13: 0000000000000000 R14: 0000000000000000 R15: dffffc0000000000 [ 19.192019][ T304] FS: 00005555566c0300(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 19.200915][ T304] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 19.207461][ T304] CR2: 0000560e50ec40f8 CR3: 00000001dd39f000 CR4: 00000000003406e0 [ 19.215402][ T304] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 19.223344][ T304] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 19.231280][ T304] Call Trace: [ 19.234542][ T304] ? ext4_create+0x253/0x5d0 [ 19.239186][ T304] ? ext4_get_group_desc+0x253/0x2a0 [ 19.244436][ T304] ? __ext4_get_inode_loc+0x4b4/0xf40 [ 19.249776][ T304] ? ext4_xattr_ibody_inline_set+0x360/0x360 [ 19.255722][ T304] ? ext4_get_inode_loc+0x60/0x60 [ 19.260710][ T304] ? __ext4_journal_get_write_access+0x83/0x300 [ 19.266914][ T304] ? down_write+0xd8/0x150 [ 19.271293][ T304] ? ext4_xattr_ibody_find+0xed/0xa60 [ 19.276630][ T304] ? ext4_xattr_block_find+0x102/0x570 [ 19.282055][ T304] ext4_xattr_ibody_set+0x71/0x290 [ 19.287155][ T304] ext4_xattr_set_handle+0xbf7/0x14e0 [ 19.292524][ T304] ? ext4_xattr_set_entry+0x37b0/0x37b0 [ 19.298047][ T304] ? selinux_inode_free_security+0x1d0/0x1d0 [ 19.303994][ T304] ? ext4_get_acl+0x5c7/0x620 [ 19.308643][ T304] ? __xa_set_mark+0x3d0/0x4e0 [ 19.313394][ T304] ext4_initxattrs+0xa1/0x110 [ 19.318051][ T304] security_inode_init_security+0x26c/0x3c0 [ 19.323919][ T304] ? ext4_init_security+0x40/0x40 [ 19.328915][ T304] ? security_dentry_create_files_as+0xd0/0xd0 [ 19.335034][ T304] ? ext4_init_acl+0x3a7/0x410 [ 19.339768][ T304] ? prandom_u32+0x21a/0x240 [ 19.344323][ T304] ? ext4_has_metadata_csum+0x12d/0x1c0 [ 19.350059][ T304] __ext4_new_inode+0x3207/0x4140 [ 19.355077][ T304] ? ext4_lock_group+0x3f0/0x3f0 [ 19.359988][ T304] ? ext4_lookup+0x594/0xb20 [ 19.364547][ T304] ? may_create+0x6bc/0x950 [ 19.369020][ T304] ? ext4_orphan_del+0x7d0/0x7d0 [ 19.373922][ T304] ext4_create+0x253/0x5d0 [ 19.378304][ T304] ? ext4_lookup+0xb20/0xb20 [ 19.382868][ T304] ? security_inode_create+0xdd/0x120 [ 19.388210][ T304] ? ext4_lookup+0xb20/0xb20 [ 19.392771][ T304] path_openat+0x1ea2/0x3ea0 [ 19.397331][ T304] ? do_filp_open+0x450/0x450 [ 19.401970][ T304] ? do_sys_open+0x34e/0x7e0 [ 19.406526][ T304] ? do_syscall_64+0xcb/0x1c0 [ 19.411171][ T304] ? entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 19.417204][ T304] do_filp_open+0x208/0x450 [ 19.421675][ T304] ? vfs_tmpfile+0x280/0x280 [ 19.426230][ T304] ? _raw_spin_unlock+0x49/0x60 [ 19.431046][ T304] ? __alloc_fd+0x4e0/0x580 [ 19.435687][ T304] do_sys_open+0x393/0x7e0 [ 19.440157][ T304] ? file_open_root+0x4b0/0x4b0 [ 19.444972][ T304] ? __fpregs_load_activate+0x1d7/0x3c0 [ 19.450480][ T304] do_syscall_64+0xcb/0x1c0 [ 19.454949][ T304] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 19.460801][ T304] Modules linked in: [ 19.465078][ T304] ---[ end trace f49e0bdde8765fac ]--- [ 19.470544][ T304] RIP: 0010:ext4_xattr_set_entry+0x48e/0x37b0 [ 19.476625][ T304] Code: 24 70 48 89 d8 48 c1 e8 03 48 89 84 24 08 01 00 00 42 80 3c 38 00 74 08 48 89 df e8 2c f1 c0 ff 4c 8b 33 4c 89 f0 48 c1 e8 03 <42> 8a 04 38 84 c0 0f 85 6c 2d 00 00 4c 89 e0 48 2b 44 24 08 48 89 [ 19.496259][ T304] RSP: 0018:ffff8881dcc5f000 EFLAGS: 00010246 [ 19.502293][ T304] RAX: 0000000000000000 RBX: ffff8881dcc5f3e0 RCX: ffff8881dd1c4ec0 [ 19.510259][ T304] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000001c [ 19.518242][ T304] RBP: ffff8881dcc5f270 R08: ffffffff81d2bed8 R09: ffffed103cc1ee69 [ 19.526265][ T304] R10: ffffed103cc1ee69 R11: 1ffff1103cc1ee68 R12: 0000000000000000 [ 19.534383][ T304] R13: 0000000000000000 R14: 0000000000000000 R15: dffffc0000000000 [ 19.542367][ T304] FS: 00005555566c0300(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 19.551285][ T304] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 19.557878][ T304] CR2: 0000560e50ec40f8 CR3: 00000001dd39f000 CR4: 00000000003406e0 [ 19.565826][ T304] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 19.573789][ T304] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 19.581755][ T304] Kernel panic - not syncing: Fatal exception [ 19.587954][ T304] Kernel Offset: disabled [ 19.592259][ T304] Rebooting in 86400 seconds..