./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor608794002 <...> [ 3.836467][ T99] udevd[99]: starting version 3.2.11 [ 4.036088][ T100] udevd[100]: starting eudev-3.2.11 [ 7.730034][ T109] udevd (109) used greatest stack depth: 22576 bytes left [ 13.801653][ T30] kauditd_printk_skb: 50 callbacks suppressed [ 13.801663][ T30] audit: type=1400 audit(1708978912.781:61): avc: denied { transition } for pid=225 comm="sshd" path="/bin/sh" dev="sda1" ino=89 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 13.805551][ T30] audit: type=1400 audit(1708978912.781:62): avc: denied { noatsecure } for pid=225 comm="sshd" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 13.812651][ T30] audit: type=1400 audit(1708978912.791:63): avc: denied { write } for pid=225 comm="sh" path="pipe:[11671]" dev="pipefs" ino=11671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 13.816047][ T30] audit: type=1400 audit(1708978912.791:64): avc: denied { rlimitinh } for pid=225 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 13.818644][ T30] audit: type=1400 audit(1708978912.791:65): avc: denied { siginh } for pid=225 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 15.010331][ T228] sftp-server (228) used greatest stack depth: 22288 bytes left Warning: Permanently added '10.128.1.149' (ED25519) to the list of known hosts. execve("./syz-executor608794002", ["./syz-executor608794002"], 0x7fff1527a9f0 /* 10 vars */) = 0 brk(NULL) = 0x555555db4000 brk(0x555555db4d00) = 0x555555db4d00 arch_prctl(ARCH_SET_FS, 0x555555db4380) = 0 set_tid_address(0x555555db4650) = 293 set_robust_list(0x555555db4660, 24) = 0 rseq(0x555555db4ca0, 0x20, 0, 0x53053053) = -1 ENOSYS (Function not implemented) prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor608794002", 4096) = 27 getrandom("\x3c\x59\x1f\x22\x11\x5e\x93\x0e", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x555555db4d00 brk(0x555555dd5d00) = 0x555555dd5d00 brk(0x555555dd6000) = 0x555555dd6000 mprotect(0x7f96d9489000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 [ 22.185492][ T30] audit: type=1400 audit(1708978921.161:66): avc: denied { execmem } for pid=293 comm="syz-executor608" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 22.205067][ T30] audit: type=1400 audit(1708978921.171:67): avc: denied { prog_load } for pid=293 comm="syz-executor608" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 22.224315][ T30] audit: type=1400 audit(1708978921.171:68): avc: denied { bpf } for pid=293 comm="syz-executor608" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_SCHED_CLS, insn_cnt=19, insns=0x20000000, license="GPL", log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_INGRESS, prog_btf_fd=0, func_info_rec_size=0, func_info=NULL, func_info_cnt=0, line_info_rec_size=0, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL}, 144) = 3 [ 22.326271][ T30] audit: type=1400 audit(1708978921.311:69): avc: denied { perfmon } for pid=293 comm="syz-executor608" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 22.347876][ T30] audit: type=1400 audit(1708978921.331:70): avc: denied { confidentiality } for pid=293 comm="syz-executor608" lockdown_reason="use of bpf to read kernel RAM" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=lockdown permissive=1 [ 22.372420][ T293] BUG: unable to handle page fault for address: ffffffffff600000 [ 22.372573][ T30] audit: type=1400 audit(1708978921.351:71): avc: denied { prog_run } for pid=293 comm="syz-executor608" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 22.379943][ T293] #PF: supervisor read access in kernel mode [ 22.379952][ T293] #PF: error_code(0x0001) - permissions violation [ 22.379960][ T293] PGD 6812067 P4D 6812067 PUD 6814067 PMD 6816067 PTE 8000000006809165 [ 22.379990][ T293] Oops: 0001 [#1] PREEMPT SMP KASAN [ 22.424298][ T293] CPU: 1 PID: 293 Comm: syz-executor608 Not tainted 5.15.148-syzkaller-00718-g993bed180178 #0 [ 22.434363][ T293] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 22.444342][ T293] RIP: 0010:copy_from_kernel_nofault+0x86/0x2e0 [ 22.450420][ T293] Code: 48 89 55 d0 0f 85 ea 01 00 00 ff 02 bf 07 00 00 00 4c 89 ee e8 db a8 d6 ff 49 83 fd 07 76 5c 4d 89 fe 49 83 c5 f8 49 83 c7 08 <49> 8b 1c 24 4c 89 f0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df 80 [ 22.469879][ T293] RSP: 0018:ffffc900007cf8d0 EFLAGS: 00010296 [ 22.475760][ T293] RAX: 0000000000000000 RBX: 0000000000000008 RCX: ffff88811f15e2c0 [ 22.483659][ T293] RDX: ffff88811f15ee50 RSI: 0000000000000008 RDI: 0000000000000007 [ 22.491472][ T293] RBP: ffffc900007cf908 R08: ffffffff81997ce5 R09: ffffffff8187ca3c [ 22.499282][ T293] R10: 0000000000000005 R11: ffff88811f15e2c0 R12: ffffffffff600000 [ 22.507090][ T293] R13: 0000000000000000 R14: ffffc900007cf948 R15: ffffc900007cf950 [ 22.514917][ T293] FS: 0000555555db4380(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 22.523667][ T293] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 22.530115][ T293] CR2: ffffffffff600000 CR3: 000000011f1d5000 CR4: 00000000003506a0 [ 22.537909][ T293] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 22.545725][ T293] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 22.553534][ T293] Call Trace: [ 22.556652][ T293] [ 22.559524][ T293] ? __die_body+0x62/0xb0 [ 22.563772][ T293] ? __die+0x7e/0x90 [ 22.567500][ T293] ? page_fault_oops+0x7f9/0xa90 [ 22.572274][ T293] ? kernelmode_fixup_or_oops+0x270/0x270 [ 22.577849][ T293] ? 0xffffffffa002876c [ 22.581823][ T293] ? is_bpf_text_address+0x172/0x190 [ 22.586942][ T293] ? stack_trace_save+0x1c0/0x1c0 [ 22.591813][ T293] ? __kernel_text_address+0x9b/0x110 [ 22.597014][ T293] ? exc_page_fault+0x521/0x830 [ 22.601700][ T293] ? asm_exc_page_fault+0x27/0x30 [ 22.606567][ T293] ? bpf_bprintf_prepare+0x65c/0x1360 [ 22.611773][ T293] ? copy_from_kernel_nofault+0x75/0x2e0 [ 22.617231][ T293] ? copy_from_kernel_nofault+0x86/0x2e0 [ 22.622701][ T293] bpf_probe_read_kernel+0x2a/0x70 [ 22.627647][ T293] bpf_prog_3aa1bfad0585af26+0x5b/0x894 [ 22.633030][ T293] bpf_test_run+0x478/0xa10 [ 22.637370][ T293] ? convert___skb_to_skb+0x570/0x570 [ 22.642577][ T293] ? skb_header_pointer+0x98/0x120 [ 22.647523][ T293] ? eth_type_trans+0x3b4/0x600 [ 22.652207][ T293] ? eth_get_headlen+0x240/0x240 [ 22.656991][ T293] ? convert___skb_to_skb+0x44/0x570 [ 22.662193][ T293] bpf_prog_test_run_skb+0xb41/0x1420 [ 22.667403][ T293] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 22.673127][ T293] ? __kasan_check_read+0x11/0x20 [ 22.677987][ T293] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 22.683716][ T293] bpf_prog_test_run+0x3b0/0x630 [ 22.688486][ T293] ? _raw_spin_unlock_irq+0x4e/0x70 [ 22.693522][ T293] ? bpf_prog_query+0x220/0x220 [ 22.698209][ T293] ? selinux_bpf+0xd2/0x100 [ 22.702547][ T293] ? security_bpf+0x82/0xb0 [ 22.706889][ T293] __sys_bpf+0x525/0x760 [ 22.710969][ T293] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 22.716174][ T293] ? ptrace_notify+0x24c/0x350 [ 22.720861][ T293] ? __kasan_check_read+0x11/0x20 [ 22.725721][ T293] __x64_sys_bpf+0x7c/0x90 [ 22.729975][ T293] do_syscall_64+0x3d/0xb0 [ 22.734228][ T293] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 22.739956][ T293] RIP: 0033:0x7f96d9416769 [ 22.744210][ T293] Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 22.763651][ T293] RSP: 002b:00007ffc61614328 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 22.771895][ T293] RAX: ffffffffffffffda RBX: 00007ffc616144f8 RCX: 00007f96d9416769 [ 22.779801][ T293] RDX: 000000000000004c RSI: 0000000020000240 RDI: 000000000000000a [ 22.787604][ T293] RBP: 00007f96d9489610 R08: 0000000000000000 R09: 00007ffc616144f8 [ 22.795500][ T293] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 22.803318][ T293] R13: 00007ffc616144e8 R14: 0000000000000001 R15: 0000000000000001 [ 22.811126][ T293] [ 22.813989][ T293] Modules linked in: [ 22.817722][ T293] CR2: ffffffffff600000 [ 22.821714][ T293] ---[ end trace 3452be7e3777b6ab ]--- [ 22.827095][ T293] RIP: 0010:copy_from_kernel_nofault+0x86/0x2e0 [ 22.833168][ T293] Code: 48 89 55 d0 0f 85 ea 01 00 00 ff 02 bf 07 00 00 00 4c 89 ee e8 db a8 d6 ff 49 83 fd 07 76 5c 4d 89 fe 49 83 c5 f8 49 83 c7 08 <49> 8b 1c 24 4c 89 f0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df 80 [ 22.852611][ T293] RSP: 0018:ffffc900007cf8d0 EFLAGS: 00010296 [ 22.858513][ T293] RAX: 0000000000000000 RBX: 0000000000000008 RCX: ffff88811f15e2c0 [ 22.866323][ T293] RDX: ffff88811f15ee50 RSI: 0000000000000008 RDI: 0000000000000007 [ 22.874140][ T293] RBP: ffffc900007cf908 R08: ffffffff81997ce5 R09: ffffffff8187ca3c [ 22.881947][ T293] R10: 0000000000000005 R11: ffff88811f15e2c0 R12: ffffffffff600000 [ 22.889755][ T293] R13: 0000000000000000 R14: ffffc900007cf948 R15: ffffc900007cf950 [ 22.897567][ T293] FS: 0000555555db4380(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 22.906334][ T293] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 22.912756][ T293] CR2: ffffffffff600000 CR3: 000000011f1d5000 CR4: 00000000003506a0 [ 22.920571][ T293] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 22.928387][ T293] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 22.936191][ T293] Kernel panic - not syncing: Fatal exception [ 22.942295][ T293] Kernel Offset: disabled [ 22.946420][ T293] Rebooting in 86400 seconds..