./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor3784514848 <...> DUID 00:04:5e:0c:a2:1f:75:5d:71:31:20:b7:6a:78:b2:8c:4a:f5 forked to background, child pid 192 Starting sshd: OK syzkaller syzkaller login: [ 14.353865][ T23] kauditd_printk_skb: 60 callbacks suppressed [ 14.353872][ T23] audit: type=1400 audit(1669625635.940:71): avc: denied { transition } for pid=265 comm="sshd" path="/bin/sh" dev="sda1" ino=73 scontext=system_u:system_r:initrc_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 14.360546][ T23] audit: type=1400 audit(1669625635.940:72): avc: denied { write } for pid=265 comm="sh" path="pipe:[10611]" dev="pipefs" ino=10611 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:initrc_t tclass=fifo_file permissive=1 Warning: Permanently added '10.128.10.19' (ECDSA) to the list of known hosts. execve("./syz-executor3784514848", ["./syz-executor3784514848"], 0x7ffebc443320 /* 10 vars */) = 0 brk(NULL) = 0x555555d43000 brk(0x555555d43c40) = 0x555555d43c40 arch_prctl(ARCH_SET_FS, 0x555555d43300) = 0 uname({sysname="Linux", nodename="syzkaller", ...}) = 0 readlink("/proc/self/exe", "/root/syz-executor3784514848", 4096) = 28 brk(0x555555d64c40) = 0x555555d64c40 brk(0x555555d65000) = 0x555555d65000 mprotect(0x7f3d49b1e000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_SCHED_ACT, insn_cnt=14, insns=0x200009c0, license="syzkaller", log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_INGRESS}, 72) = 3 [ 22.225840][ T23] audit: type=1400 audit(1669625643.810:73): avc: denied { execmem } for pid=304 comm="syz-executor378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 22.245595][ T23] audit: type=1400 audit(1669625643.830:74): avc: denied { prog_load } for pid=304 comm="syz-executor378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 22.245899][ T304] kasan: CONFIG_KASAN_INLINE enabled [ 22.265488][ T23] audit: type=1400 audit(1669625643.830:75): avc: denied { prog_run } for pid=304 comm="syz-executor378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 22.270071][ T304] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 22.297494][ T304] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 22.304406][ T304] CPU: 1 PID: 304 Comm: syz-executor378 Not tainted 5.4.210-syzkaller-00006-gc80a5b2e7f63 #0 [ 22.314521][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 22.324608][ T304] RIP: 0010:bpf_skb_ancestor_cgroup_id+0x111/0x280 [ 22.331077][ T304] Code: 02 00 00 48 89 d8 48 c1 e8 03 42 80 3c 20 00 74 08 48 89 df e8 a0 64 14 fe 48 8b 1b 48 8d bb 1c 01 00 00 48 89 f8 48 c1 e8 03 <42> 8a 04 20 84 c0 0f 85 3e 01 00 00 8b ab 1c 01 00 00 89 ef 44 89 [ 22.350649][ T304] RSP: 0018:ffff8881dcc5f4b8 EFLAGS: 00010203 [ 22.356690][ T304] RAX: 0000000000000023 RBX: 0000000000000000 RCX: 0000000000000000 [ 22.364638][ T304] RDX: ffff8881e1136e40 RSI: 0000000000000080 RDI: 000000000000011c [ 22.372586][ T304] RBP: 0000000000000080 R08: ffffffff837f3ed7 R09: ffff8881dcc5f760 [ 22.380530][ T304] R10: ffffed103b98beee R11: 1ffff1103b98beec R12: dffffc0000000000 [ 22.388471][ T304] R13: fffffffad3235e7a R14: 0000000000000000 R15: ffff8881dcc06812 [ 22.396413][ T304] FS: 0000555555d43300(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 22.405310][ T304] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 22.411864][ T304] CR2: 000000000064a110 CR3: 00000001dd328000 CR4: 00000000003406e0 [ 22.419808][ T304] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 22.427748][ T304] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 22.435685][ T304] Call Trace: [ 22.438949][ T304] ? __kasan_kmalloc+0x131/0x1e0 [ 22.443856][ T304] ? kmem_cache_alloc+0xd0/0x210 [ 22.448764][ T304] ? build_skb+0x27/0x450 [ 22.453062][ T304] ? bpf_prog_test_run_skb+0x3f6/0xf80 [ 22.458486][ T304] ? __se_sys_bpf+0x2bbc/0xbba0 [ 22.463305][ T304] ? do_syscall_64+0xcb/0x1c0 [ 22.467952][ T304] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 22.473991][ T304] ? ktime_get+0xfd/0x130 [ 22.478289][ T304] ? bpf_test_run+0x2b4/0x6a0 [ 22.482937][ T304] ? bpf_ctx_init+0x1b0/0x1b0 [ 22.487585][ T304] ? bpf_prog_test_run_skb+0x842/0xf80 [ 22.493016][ T304] ? __bpf_trace_bpf_test_finish+0x20/0x20 [ 22.498789][ T304] ? __fdget+0x14f/0x200 [ 22.503000][ T304] ? bpf_prog_get+0x183/0x1b0 [ 22.507648][ T304] ? __bpf_trace_bpf_test_finish+0x20/0x20 [ 22.513424][ T304] ? __se_sys_bpf+0x2bbc/0xbba0 [ 22.518244][ T304] ? check_preemption_disabled+0x9e/0x330 [ 22.523930][ T304] ? rcu_softirq_qs+0x90/0x90 [ 22.528576][ T304] ? debug_smp_processor_id+0x20/0x20 [ 22.533916][ T304] ? check_preemption_disabled+0x9e/0x330 [ 22.539605][ T304] ? check_preemption_disabled+0x9e/0x330 [ 22.545290][ T304] ? debug_smp_processor_id+0x20/0x20 [ 22.550632][ T304] ? switch_mm_irqs_off+0x542/0x960 [ 22.555797][ T304] ? debug_smp_processor_id+0x20/0x20 [ 22.561137][ T304] ? __x64_sys_bpf+0x80/0x80 [ 22.565693][ T304] ? switch_mm+0x100/0x100 [ 22.570077][ T304] ? _raw_spin_unlock_irq+0x4a/0x60 [ 22.575243][ T304] ? finish_task_switch+0x130/0x560 [ 22.580410][ T304] ? __schedule+0x98e/0x1050 [ 22.584972][ T304] ? _raw_spin_lock_irq+0xa4/0x1b0 [ 22.590048][ T304] ? _raw_spin_lock_irqsave+0x210/0x210 [ 22.595560][ T304] ? cgroup_update_frozen+0x139/0x360 [ 22.600907][ T304] ? cgroup_update_frozen+0x139/0x360 [ 22.606249][ T304] ? cgroup_leave_frozen+0x13b/0x290 [ 22.611506][ T304] ? ptrace_stop+0x6eb/0xa30 [ 22.616064][ T304] ? _raw_spin_unlock_irq+0x4a/0x60 [ 22.621233][ T304] ? ptrace_notify+0x248/0x340 [ 22.625964][ T304] ? do_notify_parent+0xa40/0xa40 [ 22.630960][ T304] ? check_preemption_disabled+0x154/0x330 [ 22.636733][ T304] ? syscall_trace_enter+0x652/0x940 [ 22.641989][ T304] ? switch_fpu_return+0x10/0x10 [ 22.646896][ T304] ? do_syscall_64+0xcb/0x1c0 [ 22.651540][ T304] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 22.657578][ T304] Modules linked in: [ 22.661479][ T304] ---[ end trace ac866cecbd3dc386 ]--- [ 22.667042][ T304] RIP: 0010:bpf_skb_ancestor_cgroup_id+0x111/0x280 [ 22.673541][ T304] Code: 02 00 00 48 89 d8 48 c1 e8 03 42 80 3c 20 00 74 08 48 89 df e8 a0 64 14 fe 48 8b 1b 48 8d bb 1c 01 00 00 48 89 f8 48 c1 e8 03 <42> 8a 04 20 84 c0 0f 85 3e 01 00 00 8b ab 1c 01 00 00 89 ef 44 89 [ 22.693151][ T304] RSP: 0018:ffff8881dcc5f4b8 EFLAGS: 00010203 [ 22.699275][ T304] RAX: 0000000000000023 RBX: 0000000000000000 RCX: 0000000000000000 [ 22.707249][ T304] RDX: ffff8881e1136e40 RSI: 0000000000000080 RDI: 000000000000011c [ 22.715219][ T304] RBP: 0000000000000080 R08: ffffffff837f3ed7 R09: ffff8881dcc5f760 [ 22.723168][ T304] R10: ffffed103b98beee R11: 1ffff1103b98beec R12: dffffc0000000000 [ 22.731139][ T304] R13: fffffffad3235e7a R14: 0000000000000000 R15: ffff8881dcc06812 [ 22.739113][ T304] FS: 0000555555d43300(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 22.748039][ T304] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 22.754641][ T304] CR2: 000000000064a110 CR3: 00000001dd328000 CR4: 00000000003406e0 [ 22.762600][ T304] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 22.770572][ T304] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 22.778550][ T304] Kernel panic - not syncing: Fatal exception [ 22.784757][ T304] Kernel Offset: disabled [ 22.789065][ T304] Rebooting in 86400 seconds..