./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor360314815 <...> DUID 00:04:60:e5:09:56:5b:9a:56:fa:71:26:6d:18:b4:a5:33:88 forked to background, child pid 192 Starting sshd: OK syzkaller syzkaller login: [ 12.834597][ T22] kauditd_printk_skb: 60 callbacks suppressed [ 12.834603][ T22] audit: type=1400 audit(1678322631.529:71): avc: denied { transition } for pid=265 comm="sshd" path="/bin/sh" dev="sda1" ino=73 scontext=system_u:system_r:initrc_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 12.841305][ T22] audit: type=1400 audit(1678322631.529:72): avc: denied { write } for pid=265 comm="sh" path="pipe:[10483]" dev="pipefs" ino=10483 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:initrc_t tclass=fifo_file permissive=1 Warning: Permanently added '10.128.0.143' (ECDSA) to the list of known hosts. execve("./syz-executor360314815", ["./syz-executor360314815"], 0x7fffd6517690 /* 10 vars */) = 0 brk(NULL) = 0x555557107000 brk(0x555557107c40) = 0x555557107c40 arch_prctl(ARCH_SET_FS, 0x555557107300) = 0 uname({sysname="Linux", nodename="syzkaller", ...}) = 0 readlink("/proc/self/exe", "/root/syz-executor360314815", 4096) = 27 brk(0x555557128c40) = 0x555557128c40 brk(0x555557129000) = 0x555557129000 mprotect(0x7f5f629ae000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_SCHED_ACT, insn_cnt=14, insns=0x200019c0, license="syzkaller", log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_INGRESS}, 72) = 3 [ 20.779338][ T22] audit: type=1400 audit(1678322639.469:73): avc: denied { execmem } for pid=304 comm="syz-executor360" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 20.782490][ T22] audit: type=1400 audit(1678322639.469:74): avc: denied { prog_load } for pid=304 comm="syz-executor360" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 20.782998][ T304] kasan: CONFIG_KASAN_INLINE enabled [ 20.785447][ T22] audit: type=1400 audit(1678322639.479:75): avc: denied { prog_run } for pid=304 comm="syz-executor360" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 20.789423][ T304] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 20.790820][ T304] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 20.791944][ T304] CPU: 0 PID: 304 Comm: syz-executor360 Not tainted 5.4.225-syzkaller-00007-g250ac66f1853 #0 [ 20.793451][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 20.794829][ T304] RIP: 0010:bpf_skb_ancestor_cgroup_id+0x114/0x270 [ 20.795910][ T304] Code: 02 00 00 48 89 d8 48 c1 e8 03 42 80 3c 20 00 74 08 48 89 df e8 8d 64 1d fe 48 8b 1b 48 8d bb 1c 01 00 00 48 89 f8 48 c1 e8 03 <42> 0f b6 04 20 84 c0 0f 85 2f 01 00 00 8b ab 1c 01 00 00 89 ef 44 [ 20.799059][ T304] RSP: 0018:ffff8881dd6874b8 EFLAGS: 00010203 [ 20.803203][ T304] RAX: 0000000000000023 RBX: 0000000000000000 RCX: 0000000000000000 [ 20.811153][ T304] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 000000000000011c [ 20.819100][ T304] RBP: 0000000000000080 R08: ffffffff8373538a R09: ffff8881dd687760 [ 20.827067][ T304] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 20.835024][ T304] R13: fffffffb2a751a9a R14: 0000000000000000 R15: ffff8881dd6ef012 [ 20.842985][ T304] FS: 0000555557107300(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 20.851886][ T304] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 20.858452][ T304] CR2: 00007f351c10ca70 CR3: 00000001dd53a000 CR4: 00000000003406f0 [ 20.866404][ T304] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 20.874350][ T304] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 20.882308][ T304] Call Trace: [ 20.885587][ T304] ? __kasan_kmalloc+0x130/0x1d0 [ 20.890495][ T304] ? kmem_cache_alloc+0xd0/0x220 [ 20.895432][ T304] ? build_skb+0x26/0x440 [ 20.899730][ T304] ? bpf_prog_test_run_skb+0x302/0xf00 [ 20.905154][ T304] ? __se_sys_bpf+0x2b6f/0xb870 [ 20.909975][ T304] ? do_syscall_64+0xca/0x1c0 [ 20.914630][ T304] ? entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 20.920666][ T304] ? ktime_get+0xf9/0x130 [ 20.924980][ T304] ? bpf_test_run+0x2ae/0x680 [ 20.929628][ T304] ? bpf_ctx_init+0x1a0/0x1a0 [ 20.934295][ T304] ? bpf_prog_test_run_skb+0x75e/0xf00 [ 20.939741][ T304] ? __bpf_trace_bpf_test_finish+0x20/0x20 [ 20.945522][ T304] ? __bpf_prog_get+0x287/0x310 [ 20.950354][ T304] ? __bpf_trace_bpf_test_finish+0x20/0x20 [ 20.956140][ T304] ? __se_sys_bpf+0x2b6f/0xb870 [ 20.961001][ T304] ? check_preemption_disabled+0x9f/0x320 [ 20.966703][ T304] ? debug_smp_processor_id+0x20/0x20 [ 20.972046][ T304] ? check_preemption_disabled+0x9f/0x320 [ 20.977746][ T304] ? check_preemption_disabled+0x9f/0x320 [ 20.983439][ T304] ? debug_smp_processor_id+0x20/0x20 [ 20.988781][ T304] ? debug_smp_processor_id+0x20/0x20 [ 20.994125][ T304] ? __x64_sys_bpf+0x80/0x80 [ 20.998683][ T304] ? switch_mm_irqs_off+0x632/0x9b0 [ 21.003875][ T304] ? _raw_spin_unlock_irq+0x4a/0x60 [ 21.009045][ T304] ? finish_task_switch+0x127/0x560 [ 21.014212][ T304] ? __schedule+0xb03/0x12a0 [ 21.018773][ T304] ? _raw_spin_lock_irq+0xa5/0x1b0 [ 21.023850][ T304] ? _raw_spin_lock_irqsave+0x210/0x210 [ 21.029360][ T304] ? cgroup_update_frozen+0x157/0xab0 [ 21.034725][ T304] ? cgroup_update_frozen+0x157/0xab0 [ 21.040066][ T304] ? cgroup_leave_frozen+0x13c/0x290 [ 21.045334][ T304] ? ptrace_stop+0x6ee/0xa30 [ 21.049896][ T304] ? _raw_spin_unlock_irq+0x4a/0x60 [ 21.055062][ T304] ? ptrace_notify+0x24c/0x350 [ 21.059791][ T304] ? do_notify_parent+0xa10/0xa10 [ 21.064784][ T304] ? check_preemption_disabled+0x153/0x320 [ 21.070575][ T304] ? syscall_trace_enter+0x650/0x940 [ 21.075834][ T304] ? do_syscall_64+0xca/0x1c0 [ 21.080481][ T304] ? entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 21.086510][ T304] Modules linked in: [ 21.090450][ T304] ---[ end trace d3fcca9e62e8f29e ]--- [ 21.095923][ T304] RIP: 0010:bpf_skb_ancestor_cgroup_id+0x114/0x270 [ 21.102419][ T304] Code: 02 00 00 48 89 d8 48 c1 e8 03 42 80 3c 20 00 74 08 48 89 df e8 8d 64 1d fe 48 8b 1b 48 8d bb 1c 01 00 00 48 89 f8 48 c1 e8 03 <42> 0f b6 04 20 84 c0 0f 85 2f 01 00 00 8b ab 1c 01 00 00 89 ef 44 [ 21.122293][ T304] RSP: 0018:ffff8881dd6874b8 EFLAGS: 00010203 [ 21.128343][ T304] RAX: 0000000000000023 RBX: 0000000000000000 RCX: 0000000000000000 [ 21.136330][ T304] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 000000000000011c [ 21.144304][ T304] RBP: 0000000000000080 R08: ffffffff8373538a R09: ffff8881dd687760 [ 21.152281][ T304] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 21.160230][ T304] R13: fffffffb2a751a9a R14: 0000000000000000 R15: ffff8881dd6ef012 [ 21.168200][ T304] FS: 0000555557107300(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 21.177128][ T304] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 21.183733][ T304] CR2: 00007f351c10ca70 CR3: 00000001dd53a000 CR4: 00000000003406f0 [ 21.191717][ T304] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 21.199673][ T304] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 21.207641][ T304] Kernel panic - not syncing: Fatal exception [ 21.213849][ T304] Kernel Offset: disabled [ 21.218153][ T304] Rebooting in 86400 seconds..