./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor348554444 <...> Warning: Permanently added '10.128.1.52' (ED25519) to the list of known hosts. execve("./syz-executor348554444", ["./syz-executor348554444"], 0x7ffd10288d40 /* 10 vars */) = 0 brk(NULL) = 0x55557d945000 brk(0x55557d945d00) = 0x55557d945d00 arch_prctl(ARCH_SET_FS, 0x55557d945380) = 0 set_tid_address(0x55557d945650) = 288 set_robust_list(0x55557d945660, 24) = 0 rseq(0x55557d945ca0, 0x20, 0, 0x53053053) = -1 ENOSYS (Function not implemented) prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor348554444", 4096) = 27 getrandom("\x50\x8f\x8f\xd5\xb3\x9c\x36\xa8", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x55557d945d00 brk(0x55557d966d00) = 0x55557d966d00 brk(0x55557d967000) = 0x55557d967000 mprotect(0x7f8c7c887000, 16384, PROT_READ) = 0 mmap(0x1ffffffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffffffff000 mmap(0x200000000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200000000000 mmap(0x200001000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200001000000 write(1, "executing program\n", 18executing program ) = 18 mkdir("./file0", 000) = 0 mkdirat(AT_FDCWD, "./file1", 000) = 0 mkdir("./bus", 0222) = 0 mount(NULL, "./bus", "overlay", 0, "workdir=./bus,lowerdir=./file0,upperdir=./file1,metacopy=on,") = 0 [ 29.408077][ T30] audit: type=1400 audit(1753265674.994:64): avc: denied { execmem } for pid=288 comm="syz-executor348" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 29.432766][ T30] audit: type=1400 audit(1753265675.024:65): avc: denied { mounton } for pid=288 comm="syz-executor348" path="/root/bus" dev="sda1" ino=2026 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 mount("./bus", "./bus", "incremental-fs", 0, NULL) = 0 open("./file0", O_RDONLY) = 3 mknodat(3, "./file1", 000) = 0 chdir("./bus") = 0 link("./file1", "./bus") = 0 [ 29.455689][ T30] audit: type=1400 audit(1753265675.024:66): avc: denied { unlink } for pid=288 comm="syz-executor348" name="#1" dev="sda1" ino=2029 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=chr_file permissive=1 [ 29.477593][ T288] general protection fault, probably for non-canonical address 0xdffffc0000000006: 0000 [#1] PREEMPT SMP KASAN [ 29.479008][ T30] audit: type=1400 audit(1753265675.024:67): avc: denied { mount } for pid=288 comm="syz-executor348" name="/" dev="overlay" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 29.490517][ T288] KASAN: null-ptr-deref in range [0x0000000000000030-0x0000000000000037] [ 29.490533][ T288] CPU: 1 PID: 288 Comm: syz-executor348 Not tainted 5.15.189-syzkaller-00079-ga71626bd56a5 #0 [ 29.490555][ T288] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 29.514302][ T30] audit: type=1400 audit(1753265675.064:68): avc: denied { mount } for pid=288 comm="syz-executor348" name="/" dev="incremental-fs" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 29.521172][ T288] RIP: 0010:security_inode_getattr+0x47/0x130 [ 29.531679][ T30] audit: type=1400 audit(1753265675.064:69): avc: denied { write } for pid=288 comm="syz-executor348" name="/" dev="incremental-fs" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 29.541597][ T288] Code: 48 ff 4c 8d 73 08 4c 89 f0 48 c1 e8 03 42 80 3c 28 00 74 08 4c 89 f7 e8 67 a8 86 ff 4d 8b 36 49 83 c6 30 4c 89 f0 48 c1 e8 03 <42> 80 3c 28 00 74 08 4c 89 f7 e8 4a a8 86 ff 4d 8b 36 49 83 c6 0c [ 29.541616][ T288] RSP: 0018:ffffc900009f70e0 EFLAGS: 00010206 [ 29.541633][ T288] RAX: 0000000000000006 RBX: ffffc900009f74d0 RCX: ffff8881061dcf00 [ 29.541655][ T288] RDX: 0000000000000000 RSI: ffffc900009f74e0 RDI: ffffc900009f74d0 [ 29.565563][ T30] audit: type=1400 audit(1753265675.064:70): avc: denied { add_name } for pid=288 comm="syz-executor348" name="file1" dev="incremental-fs" ino=2030 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 29.571231][ T288] RBP: ffffc900009f7108 R08: dffffc0000000000 R09: ffffc900009f74d0 [ 29.571249][ T288] R10: 0000000000000000 R11: 0000000000000020 R12: ffffc900009f74d0 [ 29.571262][ T288] R13: dffffc0000000000 R14: 0000000000000030 R15: ffffc900009f7480 [ 29.594588][ T30] audit: type=1400 audit(1753265675.064:71): avc: denied { link } for pid=288 comm="syz-executor348" name="file1" dev="incremental-fs" ino=2030 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 29.613947][ T288] FS: 000055557d945380(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 29.613969][ T288] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 29.613983][ T288] CR2: 0000200000001600 CR3: 0000000107b80000 CR4: 00000000003506a0 [ 29.620406][ T30] audit: type=1400 audit(1753265675.064:72): avc: denied { write } for pid=288 comm="syz-executor348" name="bus" dev="incremental-fs" ino=2030 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 29.628026][ T288] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 29.636244][ T30] audit: type=1400 audit(1753265675.064:73): avc: denied { open } for pid=288 comm="syz-executor348" path="/root/bus/bus" dev="incremental-fs" ino=2030 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 29.659774][ T288] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 29.659793][ T288] Call Trace: [ 29.659799][ T288] [ 29.659806][ T288] vfs_getattr+0x29/0x310 [ 29.804035][ T288] ovl_copy_up_flags+0x3d9/0x1b20 [ 29.809071][ T288] ? ovl_maybe_copy_up+0x190/0x190 [ 29.814185][ T288] ? is_bpf_text_address+0x177/0x190 [ 29.819478][ T288] ? __kernel_text_address+0xa0/0x100 [ 29.824968][ T288] ? unwind_get_return_address+0x4d/0x90 [ 29.830774][ T288] ? __kasan_check_write+0x14/0x20 [ 29.835909][ T288] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 29.841371][ T288] ? _raw_spin_lock+0xe0/0xe0 [ 29.846050][ T288] ? stack_trace_save+0x98/0xe0 [ 29.850902][ T288] ? memcpy+0x56/0x70 [ 29.854891][ T288] ? avc_has_perm_noaudit+0x2f4/0x460 [ 29.860268][ T288] ? avc_denied+0x1b0/0x1b0 [ 29.864774][ T288] ? slab_post_alloc_hook+0x4f/0x2b0 [ 29.870064][ T288] ? vfs_open+0x73/0x80 [ 29.874230][ T288] ? mnt_want_write+0x20b/0x2e0 [ 29.879083][ T288] ovl_maybe_copy_up+0x160/0x190 [ 29.884021][ T288] ovl_open+0x9d/0x1f0 [ 29.888095][ T288] ? ovl_mmap+0x4d0/0x4d0 [ 29.892424][ T288] do_dentry_open+0x834/0x1010 [ 29.897190][ T288] dentry_open+0xbb/0x100 [ 29.901521][ T288] file_open+0x298/0x630 [ 29.905769][ T288] ? incfs_file_mmap+0x130/0x130 [ 29.911227][ T288] ? incfs_file_mmap+0x130/0x130 [ 29.916183][ T288] do_dentry_open+0x834/0x1010 [ 29.920952][ T288] vfs_open+0x73/0x80 [ 29.924941][ T288] path_openat+0x2646/0x2f10 [ 29.929533][ T288] ? do_syscall_64+0x4c/0xa0 [ 29.934129][ T288] ? do_filp_open+0x3e0/0x3e0 [ 29.938983][ T288] do_filp_open+0x1b3/0x3e0 [ 29.943490][ T288] ? vfs_tmpfile+0x2d0/0x2d0 [ 29.948090][ T288] do_sys_openat2+0x14c/0x7b0 [ 29.952770][ T288] ? _raw_spin_unlock_irq+0x4e/0x70 [ 29.957968][ T288] ? do_sys_open+0xe0/0xe0 [ 29.962385][ T288] ? do_notify_parent+0x800/0x800 [ 29.967413][ T288] ? __kasan_check_write+0x14/0x20 [ 29.972546][ T288] __x64_sys_creat+0x8e/0xb0 [ 29.977162][ T288] x64_sys_call+0x94a/0x9a0 [ 29.981766][ T288] do_syscall_64+0x4c/0xa0 [ 29.986179][ T288] ? clear_bhb_loop+0x50/0xa0 [ 29.991078][ T288] ? clear_bhb_loop+0x50/0xa0 [ 29.995759][ T288] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 30.001654][ T288] RIP: 0033:0x7f8c7c814569 [ 30.006071][ T288] Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 30.025712][ T288] RSP: 002b:00007ffc02ef8568 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 30.034141][ T288] RAX: ffffffffffffffda RBX: 0031656c69662f2e RCX: 00007f8c7c814569 [ 30.042137][ T288] RDX: 00007f8c7c814569 RSI: 0000000000000000 RDI: 0000200000000100 [ 30.050211][ T288] RBP: 00002000000000c0 R08: 00007ffc02ef8748 R09: 00007ffc02ef8748 [ 30.058288][ T288] R10: 00007ffc02ef8748 R11: 0000000000000246 R12: 0030656c69662f2e [ 30.066276][ T288] R13: 00007ffc02ef8738 R14: 0000000000000001 R15: 0000000000000001 [ 30.074257][ T288] [ 30.077276][ T288] Modules linked in: [ 30.081365][ T288] ---[ end trace ae308cfbedbc8e36 ]--- [ 30.086850][ T288] RIP: 0010:security_inode_getattr+0x47/0x130 [ 30.093077][ T288] Code: 48 ff 4c 8d 73 08 4c 89 f0 48 c1 e8 03 42 80 3c 28 00 74 08 4c 89 f7 e8 67 a8 86 ff 4d 8b 36 49 83 c6 30 4c 89 f0 48 c1 e8 03 <42> 80 3c 28 00 74 08 4c 89 f7 e8 4a a8 86 ff 4d 8b 36 49 83 c6 0c [ 30.113065][ T288] RSP: 0018:ffffc900009f70e0 EFLAGS: 00010206 [ 30.119169][ T288] RAX: 0000000000000006 RBX: ffffc900009f74d0 RCX: ffff8881061dcf00 [ 30.127659][ T288] RDX: 0000000000000000 RSI: ffffc900009f74e0 RDI: ffffc900009f74d0 [ 30.135720][ T288] RBP: ffffc900009f7108 R08: dffffc0000000000 R09: ffffc900009f74d0 [ 30.144210][ T288] R10: 0000000000000000 R11: 0000000000000020 R12: ffffc900009f74d0 [ 30.152430][ T288] R13: dffffc0000000000 R14: 0000000000000030 R15: ffffc900009f7480 [ 30.160619][ T288] FS: 000055557d945380(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 30.169882][ T288] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 30.176471][ T288] CR2: 0000200000001600 CR3: 0000000107b80000 CR4: 00000000003506a0 [ 30.184526][ T288] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 30.192551][ T288] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 30.200560][ T288] Kernel panic - not syncing: Fatal exception [ 30.206968][ T288] Kernel Offset: disabled [ 30.211321][ T288] Rebooting in 86400 seconds..