./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor4138228312 <...> Warning: Permanently added '10.128.0.162' (ED25519) to the list of known hosts. execve("./syz-executor4138228312", ["./syz-executor4138228312"], 0x7ffe8c039ea0 /* 10 vars */) = 0 brk(NULL) = 0x55558000d000 brk(0x55558000dd40) = 0x55558000dd40 arch_prctl(ARCH_SET_FS, 0x55558000d3c0) = 0 set_tid_address(0x55558000d690) = 288 set_robust_list(0x55558000d6a0, 24) = 0 rseq(0x55558000dce0, 0x20, 0, 0x53053053) = -1 ENOSYS (Function not implemented) prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor4138228312", 4096) = 28 getrandom("\xee\x1d\x50\xd3\x57\x19\x05\x26", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x55558000dd40 brk(0x55558002ed40) = 0x55558002ed40 brk(0x55558002f000) = 0x55558002f000 mprotect(0x7fb3f8ed4000, 16384, PROT_READ) = 0 mmap(0x1ffffffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffffffff000 mmap(0x200000000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200000000000 mmap(0x200001000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200001000000 write(1, "executing program\n", 18executing program ) = 18 futex(0x7fb3f8eda3ec, FUTEX_WAKE_PRIVATE, 1000000) = 0 rt_sigaction(SIGRT_1, {sa_handler=0x7fb3f8e73620, sa_mask=[], sa_flags=SA_RESTORER|SA_ONSTACK|SA_RESTART|SA_SIGINFO, sa_restorer=0x7fb3f8e64ca0}, NULL, 8) = 0 rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0 mmap(NULL, 135168, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS|MAP_STACK, -1, 0) = 0x7fb3f8def000 mprotect(0x7fb3f8df0000, 131072, PROT_READ|PROT_WRITE) = 0 rt_sigprocmask(SIG_BLOCK, ~[], [], 8) = 0 clone3({flags=CLONE_VM|CLONE_FS|CLONE_FILES|CLONE_SIGHAND|CLONE_THREAD|CLONE_SYSVSEM|CLONE_SETTLS|CLONE_PARENT_SETTID|CLONE_CHILD_CLEARTID, child_tid=0x7fb3f8e0f990, parent_tid=0x7fb3f8e0f990, exit_signal=0, stack=0x7fb3f8def000, stack_size=0x20300, tls=0x7fb3f8e0f6c0} => {parent_tid=[289]}, 88) = 289 rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0 futex(0x7fb3f8eda3e8, FUTEX_WAKE_PRIVATE, 1000000) = 0 futex(0x7fb3f8eda3ec, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000}./strace-static-x86_64: Process 289 attached [pid 289] set_robust_list(0x7fb3f8e0f9a0, 24) = 0 [pid 289] rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0 [pid 289] mkdirat(AT_FDCWD, "./file0", 000) = 0 [pid 289] futex(0x7fb3f8eda3ec, FUTEX_WAKE_PRIVATE, 1000000 [pid 288] <... futex resumed>) = 0 [pid 288] futex(0x7fb3f8eda3e8, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 288] futex(0x7fb3f8eda3ec, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 289] <... futex resumed>) = 1 [pid 289] openat(AT_FDCWD, "/dev/fuse", O_RDWR|O_CREAT, 000) = 3 [pid 289] futex(0x7fb3f8eda3ec, FUTEX_WAKE_PRIVATE, 1000000 [pid 288] <... futex resumed>) = 0 [pid 288] futex(0x7fb3f8eda3e8, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 288] futex(0x7fb3f8eda3ec, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 289] <... futex resumed>) = 1 [pid 289] mount(NULL, "./file0", "fuse", 0, "fd=0x0000000000000003,rootmode=00000000000000000040000,user_id=00000000000000000000,group_id=0000000"...) = 0 [pid 289] futex(0x7fb3f8eda3ec, FUTEX_WAKE_PRIVATE, 1000000 [pid 288] <... futex resumed>) = 0 [pid 288] futex(0x7fb3f8eda3e8, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 288] futex(0x7fb3f8eda3ec, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 289] <... futex resumed>) = 1 [pid 289] read(3, "\x68\x00\x00\x00\x1a\x00\x00\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x07\x00\x00\x00\x24\x00\x00\x00\x00\x00\x02\x00\xfb\xff\xff\x73\x01\x00\x00\x80\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., 8224) = 104 [pid 289] futex(0x7fb3f8eda3ec, FUTEX_WAKE_PRIVATE, 1000000 [pid 288] <... futex resumed>) = 0 [pid 288] futex(0x7fb3f8eda3e8, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 288] futex(0x7fb3f8eda3ec, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 289] <... futex resumed>) = 1 [ 29.697557][ T30] audit: type=1400 audit(1753222082.652:64): avc: denied { execmem } for pid=288 comm="syz-executor413" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 29.717306][ T30] audit: type=1400 audit(1753222082.672:65): avc: denied { read write } for pid=288 comm="syz-executor413" name="fuse" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [pid 289] read(3, [pid 288] <... futex resumed>) = -1 ETIMEDOUT (Connection timed out) [pid 288] futex(0x7fb3f8eda3fc, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 288] mmap(NULL, 135168, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS|MAP_STACK, -1, 0) = 0x7fb3f8dce000 [pid 288] mprotect(0x7fb3f8dcf000, 131072, PROT_READ|PROT_WRITE) = 0 [pid 288] rt_sigprocmask(SIG_BLOCK, ~[], [], 8) = 0 [pid 288] clone3({flags=CLONE_VM|CLONE_FS|CLONE_FILES|CLONE_SIGHAND|CLONE_THREAD|CLONE_SYSVSEM|CLONE_SETTLS|CLONE_PARENT_SETTID|CLONE_CHILD_CLEARTID, child_tid=0x7fb3f8dee990, parent_tid=0x7fb3f8dee990, exit_signal=0, stack=0x7fb3f8dce000, stack_size=0x20300, tls=0x7fb3f8dee6c0} => {parent_tid=[291]}, 88) = 291 [pid 288] rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0 [pid 288] futex(0x7fb3f8eda3f8, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 288] futex(0x7fb3f8eda3fc, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000}./strace-static-x86_64: Process 291 attached [pid 291] set_robust_list(0x7fb3f8dee9a0, 24) = 0 [pid 291] rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0 [pid 291] write(3, "\x50\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00\x00\x00\x00\x00\x07\x00\x00\x00\x2b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", 80) = 80 [pid 291] futex(0x7fb3f8eda3fc, FUTEX_WAKE_PRIVATE, 1000000 [pid 288] <... futex resumed>) = 0 [pid 288] futex(0x7fb3f8eda3f8, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 288] futex(0x7fb3f8eda3fc, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 291] <... futex resumed>) = 1 [pid 291] futex(0x7fb3f8eda3fc, FUTEX_WAKE_PRIVATE, 1000000 [pid 288] <... futex resumed>) = 0 [pid 288] futex(0x7fb3f8eda3f8, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 288] futex(0x7fb3f8eda3fc, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 291] <... futex resumed>) = 1 [pid 291] futex(0x7fb3f8eda3fc, FUTEX_WAKE_PRIVATE, 1000000 [pid 288] <... futex resumed>) = 0 [pid 288] futex(0x7fb3f8eda3f8, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 288] futex(0x7fb3f8eda3fc, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 291] <... futex resumed>) = 1 [pid 291] open("./file0/file0", O_RDWR [pid 289] <... read resumed>"\x2e\x00\x00\x00\x01\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x23\x01\x00\x00\x00\x00\x00\x00\x66\x69\x6c\x65\x30\x00", 8192) = 46 [pid 289] write(3, "\xa7\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., 167) = 167 [pid 289] futex(0x7fb3f8eda3ec, FUTEX_WAKE_PRIVATE, 1000000) = 0 [ 29.740947][ T30] audit: type=1400 audit(1753222082.672:66): avc: denied { open } for pid=288 comm="syz-executor413" path="/dev/fuse" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 29.764374][ T30] audit: type=1400 audit(1753222082.672:67): avc: denied { mounton } for pid=288 comm="syz-executor413" path="/root/file0" dev="sda1" ino=2024 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 29.787201][ T30] audit: type=1400 audit(1753222082.672:68): avc: denied { mount } for pid=288 comm="syz-executor413" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 29.791825][ T291] general protection fault, probably for non-canonical address 0xdffffc0000000002: 0000 [#1] PREEMPT SMP KASAN [ 29.820932][ T291] KASAN: null-ptr-deref in range [0x0000000000000010-0x0000000000000017] [ 29.829319][ T291] CPU: 1 PID: 291 Comm: syz-executor413 Not tainted 5.15.189-syzkaller-00079-ga71626bd56a5 #0 [ 29.839524][ T291] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 29.849558][ T291] RIP: 0010:path_openat+0x11ff/0x2f10 [ 29.854918][ T291] Code: 48 89 df e8 03 81 02 00 49 63 de 48 81 fb 00 f0 ff ff 0f 87 05 f8 ff ff eb 62 e8 3c 25 b7 ff 4c 8b 2c 24 48 89 d8 48 c1 e8 03 <42> 0f b6 04 38 84 c0 0f 85 6b 0d 00 00 44 8b 33 be 00 00 70 00 44 [ 29.874500][ T291] RSP: 0018:ffffc900009b79c0 EFLAGS: 00010203 [ 29.880565][ T291] RAX: 0000000000000002 RBX: 0000000000000017 RCX: ffff8881212f3b40 [ 29.888520][ T291] RDX: 0000000000000000 RSI: 0000000000000003 RDI: ffff8881212f3b40 [ 29.896471][ T291] RBP: ffffc900009b7bd0 R08: dffffc0000000000 R09: ffffed1024532fa4 [ 29.904421][ T291] R10: ffffed1024532fa4 R11: 1ffff11024532fa3 R12: 0000000000000002 [ 29.912372][ T291] R13: ffffc900009b7c20 R14: ffff88811da20318 R15: dffffc0000000000 [ 29.920317][ T291] FS: 00007fb3f8dee6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 29.929215][ T291] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 29.935769][ T291] CR2: 000055d156ce9eb8 CR3: 000000011d96c000 CR4: 00000000003506a0 [ 29.943712][ T291] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 29.951655][ T291] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 29.959595][ T291] Call Trace: [ 29.962846][ T291] [ 29.965754][ T291] ? do_filp_open+0x3e0/0x3e0 [ 29.970839][ T291] do_filp_open+0x1b3/0x3e0 [ 29.975310][ T291] ? vfs_tmpfile+0x2d0/0x2d0 [ 29.979870][ T291] do_sys_openat2+0x14c/0x7b0 [ 29.984516][ T291] ? _raw_spin_unlock_irq+0x4e/0x70 [ 29.989682][ T291] ? do_sys_open+0xe0/0xe0 [ 29.994068][ T291] ? do_notify_parent+0x800/0x800 [ 29.999061][ T291] __x64_sys_open+0x11c/0x140 [ 30.003791][ T291] x64_sys_call+0x3fc/0x9a0 [ 30.008262][ T291] do_syscall_64+0x4c/0xa0 [ 30.012648][ T291] ? clear_bhb_loop+0x50/0xa0 [ 30.017294][ T291] ? clear_bhb_loop+0x50/0xa0 [ 30.021941][ T291] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 30.027811][ T291] RIP: 0033:0x7fb3f8e4d779 [ 30.032203][ T291] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 c1 17 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 30.051785][ T291] RSP: 002b:00007fb3f8dee218 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 30.060176][ T291] RAX: ffffffffffffffda RBX: 00007fb3f8eda3f8 RCX: 00007fb3f8e4d779 [ 30.068126][ T291] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 00002000000001c0 [ 30.076072][ T291] RBP: 00007fb3f8eda3f0 R08: 0000000000000000 R09: 0000000000000000 [ 30.084022][ T291] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb3f8ea703c [pid 289] futex(0x7fb3f8eda3e8, FUTEX_WAIT_PRIVATE, 0, NULL [pid 288] <... futex resumed>) = -1 ETIMEDOUT (Connection timed out) [ 30.091968][ T291] R13: 00002000000042c0 R14: 00002000000001c0 R15: 00007ffdce08c818 [ 30.099922][ T291] [ 30.102917][ T291] Modules linked in: [ 30.107394][ T291] ---[ end trace 29ea3c43abb0d3e2 ]--- [ 30.108489][ T30] audit: type=1400 audit(1753222083.072:69): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 30.112971][ T291] RIP: 0010:path_openat+0x11ff/0x2f10 [ 30.135534][ T30] audit: type=1400 audit(1753222083.072:70): avc: denied { search } for pid=83 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 30.139912][ T291] Code: 48 89 df e8 03 81 02 00 49 63 de 48 81 fb 00 f0 ff ff 0f 87 05 f8 ff ff eb 62 e8 3c 25 b7 ff 4c 8b 2c 24 48 89 d8 48 c1 e8 03 <42> 0f b6 04 38 84 c0 0f 85 6b 0d 00 00 44 8b 33 be 00 00 70 00 44 [ 30.161148][ T30] audit: type=1400 audit(1753222083.072:71): avc: denied { write } for pid=83 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 30.180702][ T291] RSP: 0018:ffffc900009b79c0 EFLAGS: 00010203 [ 30.201895][ T30] audit: type=1400 audit(1753222083.072:72): avc: denied { add_name } for pid=83 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 30.207908][ T291] RAX: 0000000000000002 RBX: 0000000000000017 RCX: ffff8881212f3b40 [ 30.228384][ T30] audit: type=1400 audit(1753222083.072:73): avc: denied { create } for pid=83 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 30.236282][ T291] RDX: 0000000000000000 RSI: 0000000000000003 RDI: ffff8881212f3b40 [ 30.264451][ T291] RBP: ffffc900009b7bd0 R08: dffffc0000000000 R09: ffffed1024532fa4 [ 30.272421][ T291] R10: ffffed1024532fa4 R11: 1ffff11024532fa3 R12: 0000000000000002 [ 30.280399][ T291] R13: ffffc900009b7c20 R14: ffff88811da20318 R15: dffffc0000000000 [ 30.288350][ T291] FS: 00007fb3f8dee6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 30.297279][ T291] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 30.303863][ T291] CR2: 000055d156ce9eb8 CR3: 000000011d96c000 CR4: 00000000003506a0 [ 30.311832][ T291] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 30.319790][ T291] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 30.327763][ T291] Kernel panic - not syncing: Fatal exception [ 30.333993][ T291] Kernel Offset: disabled [ 30.338299][ T291] Rebooting in 86400 seconds..