./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor460134052 <...> Warning: Permanently added '10.128.1.150' (ED25519) to the list of known hosts. execve("./syz-executor460134052", ["./syz-executor460134052"], 0x7ffeb506fe30 /* 10 vars */) = 0 brk(NULL) = 0x55556ba00000 brk(0x55556ba00d40) = 0x55556ba00d40 arch_prctl(ARCH_SET_FS, 0x55556ba003c0) = 0 set_tid_address(0x55556ba00690) = 289 set_robust_list(0x55556ba006a0, 24) = 0 rseq(0x55556ba00ce0, 0x20, 0, 0x53053053) = -1 ENOSYS (Function not implemented) prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor460134052", 4096) = 27 getrandom("\x0a\x45\x70\x20\x01\x6c\x6a\x5e", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x55556ba00d40 brk(0x55556ba21d40) = 0x55556ba21d40 brk(0x55556ba22000) = 0x55556ba22000 mprotect(0x7f85d8e4b000, 16384, PROT_READ) = 0 mmap(0x1ffffffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffffffff000 mmap(0x200000000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0executing program ) = 0x200000000000 mmap(0x200001000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200001000000 write(1, "executing program\n", 18) = 18 futex(0x7f85d8e513ec, FUTEX_WAKE_PRIVATE, 1000000) = 0 rt_sigaction(SIGRT_1, {sa_handler=0x7f85d8dea3a0, sa_mask=[], sa_flags=SA_RESTORER|SA_ONSTACK|SA_RESTART|SA_SIGINFO, sa_restorer=0x7f85d8ddba20}, NULL, 8) = 0 rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0 mmap(NULL, 135168, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS|MAP_STACK, -1, 0) = 0x7f85d8d66000 mprotect(0x7f85d8d67000, 131072, PROT_READ|PROT_WRITE) = 0 rt_sigprocmask(SIG_BLOCK, ~[], [], 8) = 0 clone3({flags=CLONE_VM|CLONE_FS|CLONE_FILES|CLONE_SIGHAND|CLONE_THREAD|CLONE_SYSVSEM|CLONE_SETTLS|CLONE_PARENT_SETTID|CLONE_CHILD_CLEARTID, child_tid=0x7f85d8d86990, parent_tid=0x7f85d8d86990, exit_signal=0, stack=0x7f85d8d66000, stack_size=0x20300, tls=0x7f85d8d866c0} => {parent_tid=[290]}, 88) = 290 rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0 futex(0x7f85d8e513e8, FUTEX_WAKE_PRIVATE, 1000000) = 0 futex(0x7f85d8e513ec, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000}./strace-static-x86_64: Process 290 attached [pid 290] set_robust_list(0x7f85d8d869a0, 24) = 0 [pid 290] rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0 [pid 290] mkdir("./file0", 000) = 0 [pid 290] futex(0x7f85d8e513ec, FUTEX_WAKE_PRIVATE, 1000000 [pid 289] <... futex resumed>) = 0 [pid 289] futex(0x7f85d8e513e8, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 289] futex(0x7f85d8e513ec, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 290] <... futex resumed>) = 1 [pid 290] openat(AT_FDCWD, "/dev/fuse", O_RDWR|O_CREAT, 000) = 3 [pid 290] futex(0x7f85d8e513ec, FUTEX_WAKE_PRIVATE, 1000000 [pid 289] <... futex resumed>) = 0 [pid 289] futex(0x7f85d8e513e8, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 289] futex(0x7f85d8e513ec, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 290] <... futex resumed>) = 1 [pid 290] mount(NULL, "./file0", "fuse", 0, "fd=00000000000000000000003,rootmode=0000000000000000040000,user_id=00000000000000000000,group_id=000"...) = 0 [pid 290] futex(0x7f85d8e513ec, FUTEX_WAKE_PRIVATE, 1000000 [pid 289] <... futex resumed>) = 0 [pid 289] futex(0x7f85d8e513e8, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 289] futex(0x7f85d8e513ec, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 290] <... futex resumed>) = 1 [pid 290] read(3, "\x68\x00\x00\x00\x1a\x00\x00\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x07\x00\x00\x00\x26\x00\x00\x00\x00\x00\x02\x00\xfb\xff\xff\x73\x09\x00\x00\x80\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., 8224) = 104 [pid 290] futex(0x7f85d8e513ec, FUTEX_WAKE_PRIVATE, 1000000 [pid 289] <... futex resumed>) = 0 [pid 289] futex(0x7f85d8e513e8, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 289] futex(0x7f85d8e513ec, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 290] <... futex resumed>) = 1 [pid 290] write(3, "\x50\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00\x00\x00\x00\x00\x07\x00\x00\x00\x29\x00\x00\x00\x00\x08\x00\x00\x00\x00\x00\x00\x07\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", 80) = 80 [pid 290] futex(0x7f85d8e513ec, FUTEX_WAKE_PRIVATE, 1000000 [pid 289] <... futex resumed>) = 0 [pid 289] futex(0x7f85d8e513e8, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 289] futex(0x7f85d8e513ec, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 290] <... futex resumed>) = 1 [ 24.595916][ T28] audit: type=1400 audit(1754280373.300:64): avc: denied { execmem } for pid=289 comm="syz-executor460" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 24.615926][ T28] audit: type=1400 audit(1754280373.300:65): avc: denied { read write } for pid=289 comm="syz-executor460" name="fuse" dev="devtmpfs" ino=93 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [pid 290] read(3, [pid 289] <... futex resumed>) = -1 ETIMEDOUT (Connection timed out) [pid 289] futex(0x7f85d8e513ec, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=0}) = -1 ETIMEDOUT (Connection timed out) [pid 289] futex(0x7f85d8e513fc, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 289] mmap(NULL, 135168, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS|MAP_STACK, -1, 0) = 0x7f85d8d45000 [pid 289] mprotect(0x7f85d8d46000, 131072, PROT_READ|PROT_WRITE) = 0 [pid 289] rt_sigprocmask(SIG_BLOCK, ~[], [], 8) = 0 [pid 289] clone3({flags=CLONE_VM|CLONE_FS|CLONE_FILES|CLONE_SIGHAND|CLONE_THREAD|CLONE_SYSVSEM|CLONE_SETTLS|CLONE_PARENT_SETTID|CLONE_CHILD_CLEARTID, child_tid=0x7f85d8d65990, parent_tid=0x7f85d8d65990, exit_signal=0, stack=0x7f85d8d45000, stack_size=0x20300, tls=0x7f85d8d656c0} => {parent_tid=[292]}, 88) = 292 [pid 289] rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0 [pid 289] futex(0x7f85d8e513f8, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 289] futex(0x7f85d8e513fc, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000}./strace-static-x86_64: Process 292 attached [pid 292] set_robust_list(0x7f85d8d659a0, 24) = 0 [pid 292] rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0 [pid 292] rmdir("./file0/../file0/file0" [pid 290] <... read resumed>"\x2e\x00\x00\x00\x01\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x24\x01\x00\x00\x00\x00\x00\x00\x66\x69\x6c\x65\x30\x00", 8192) = 46 [pid 290] write(3, "\xa5\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., 165) = 165 [pid 290] futex(0x7f85d8e513ec, FUTEX_WAKE_PRIVATE, 1000000) = 0 [ 24.639515][ T28] audit: type=1400 audit(1754280373.300:66): avc: denied { open } for pid=289 comm="syz-executor460" path="/dev/fuse" dev="devtmpfs" ino=93 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 24.657798][ T292] general protection fault, probably for non-canonical address 0xdffffc0000000008: 0000 [#1] PREEMPT SMP KASAN [ 24.663538][ T28] audit: type=1400 audit(1754280373.300:67): avc: denied { mounton } for pid=289 comm="syz-executor460" path="/root/file0" dev="sda1" ino=2024 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 24.674828][ T292] KASAN: null-ptr-deref in range [0x0000000000000040-0x0000000000000047] [ 24.674843][ T292] CPU: 1 PID: 292 Comm: syz-executor460 Not tainted 6.1.145-syzkaller-00038-g3b4ff5af8d36 #0 [ 24.674862][ T292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 24.674873][ T292] RIP: 0010:do_rmdir+0x1f2/0x6a0 [ 24.697897][ T28] audit: type=1400 audit(1754280373.310:68): avc: denied { mount } for pid=289 comm="syz-executor460" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 24.705938][ T292] Code: ff ff 49 89 c6 48 3d 01 f0 ff ff 72 0d e8 b6 af af ff 45 89 f7 e9 94 00 00 00 4c 89 74 24 20 4d 8d 7e 30 4c 89 f8 48 c1 e8 03 <42> 80 3c 28 00 74 08 4c 89 ff e8 df 12 f4 ff 49 83 3f 00 4c 8b 34 [ 24.705957][ T292] RSP: 0018:ffffc90000dc7e20 EFLAGS: 00010203 [ 24.705974][ T292] RAX: 0000000000000008 RBX: 1ffff920001b8fcc RCX: ffff88810caebcc0 [ 24.705988][ T292] RDX: 0000000000000000 RSI: 0000000000000003 RDI: ffff88810caebcc0 [ 24.706001][ T292] RBP: ffffc90000dc7ee8 R08: dffffc0000000000 R09: fffff520001b8fa1 [ 24.717966][ T28] audit: type=1400 audit(1754280373.360:69): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 24.726240][ T292] R10: fffff520001b8fa1 R11: 1ffff920001b8fa0 R12: 00000000ffffff9c [ 24.726260][ T292] R13: dffffc0000000000 R14: 0000000000000015 R15: 0000000000000045 [ 24.726274][ T292] FS: 00007f85d8d656c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 24.726292][ T292] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 24.726305][ T292] CR2: 000055e86cf11eb8 CR3: 000000010a716000 CR4: 00000000003506a0 [ 24.863777][ T292] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 24.871753][ T292] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 24.879733][ T292] Call Trace: [ 24.883009][ T292] [ 24.885943][ T292] ? __cfi_do_rmdir+0x10/0x10 [ 24.890629][ T292] ? getname_flags+0x206/0x500 [ 24.895403][ T292] __x64_sys_rmdir+0x49/0x50 [ 24.899993][ T292] x64_sys_call+0x68e/0x9a0 [ 24.904512][ T292] do_syscall_64+0x4c/0xa0 [ 24.908931][ T292] ? clear_bhb_loop+0x30/0x80 [ 24.913611][ T292] ? clear_bhb_loop+0x30/0x80 [ 24.918289][ T292] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 24.924191][ T292] RIP: 0033:0x7f85d8dc44f9 [ 24.928650][ T292] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 c1 17 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 24.948265][ T292] RSP: 002b:00007f85d8d65218 EFLAGS: 00000246 ORIG_RAX: 0000000000000054 [ 24.956681][ T292] RAX: ffffffffffffffda RBX: 00007f85d8e513f8 RCX: 00007f85d8dc44f9 [ 24.964658][ T292] RDX: 00007f85d8da1c86 RSI: 0000000000000000 RDI: 0000200000000200 [ 24.972629][ T292] RBP: 00007f85d8e513f0 R08: 00007ffd63c6a3d7 R09: 0000000000000000 [ 24.980600][ T292] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f85d8e1e02c [ 24.988571][ T292] R13: 000020000000c280 R14: 0000200000000200 R15: 00007ffd63c6a3d8 [pid 290] futex(0x7f85d8e513e8, FUTEX_WAIT_PRIVATE, 0, NULL [pid 289] <... futex resumed>) = -1 ETIMEDOUT (Connection timed out) [ 24.996550][ T292] [ 24.999567][ T292] Modules linked in: [ 25.004033][ T292] ---[ end trace 0000000000000000 ]--- [ 25.005101][ T28] audit: type=1400 audit(1754280373.360:70): avc: denied { search } for pid=84 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 25.009626][ T292] RIP: 0010:do_rmdir+0x1f2/0x6a0 [ 25.030993][ T28] audit: type=1400 audit(1754280373.360:71): avc: denied { write } for pid=84 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 25.035955][ T292] Code: ff ff 49 89 c6 48 3d 01 f0 ff ff 72 0d e8 b6 af af ff 45 89 f7 e9 94 00 00 00 4c 89 74 24 20 4d 8d 7e 30 4c 89 f8 48 c1 e8 03 <42> 80 3c 28 00 74 08 4c 89 ff e8 df 12 f4 ff 49 83 3f 00 4c 8b 34 [ 25.057275][ T28] audit: type=1400 audit(1754280373.360:72): avc: denied { add_name } for pid=84 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 25.077152][ T292] RSP: 0018:ffffc90000dc7e20 EFLAGS: 00010203 [ 25.097391][ T28] audit: type=1400 audit(1754280373.360:73): avc: denied { create } for pid=84 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 25.103744][ T292] RAX: 0000000000000008 RBX: 1ffff920001b8fcc RCX: ffff88810caebcc0 [ 25.131902][ T292] RDX: 0000000000000000 RSI: 0000000000000003 RDI: ffff88810caebcc0 [ 25.139910][ T292] RBP: ffffc90000dc7ee8 R08: dffffc0000000000 R09: fffff520001b8fa1 [ 25.147928][ T292] R10: fffff520001b8fa1 R11: 1ffff920001b8fa0 R12: 00000000ffffff9c [ 25.155938][ T292] R13: dffffc0000000000 R14: 0000000000000015 R15: 0000000000000045 [ 25.163944][ T292] FS: 00007f85d8d656c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 25.172942][ T292] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 25.179543][ T292] CR2: 00007ffd63c69570 CR3: 000000010a716000 CR4: 00000000003506b0 [ 25.187544][ T292] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 25.195541][ T292] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 25.203551][ T292] Kernel panic - not syncing: Fatal exception [ 25.209923][ T292] Kernel Offset: disabled [ 25.214254][ T292] Rebooting in 86400 seconds..