./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor1271163047 <...> sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 19.834640][ T30] audit: type=1400 audit(1748468677.510:63): avc: denied { siginh } for pid=251 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.0.5' (ED25519) to the list of known hosts. execve("./syz-executor1271163047", ["./syz-executor1271163047"], 0x7ffc9f83a840 /* 10 vars */) = 0 brk(NULL) = 0x55556c000000 brk(0x55556c000d40) = 0x55556c000d40 arch_prctl(ARCH_SET_FS, 0x55556c0003c0) = 0 set_tid_address(0x55556c000690) = 288 set_robust_list(0x55556c0006a0, 24) = 0 rseq(0x55556c000ce0, 0x20, 0, 0x53053053) = -1 ENOSYS (Function not implemented) prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor1271163047", 4096) = 28 getrandom("\xe5\x56\x37\x2b\x5c\x2a\xaa\x9f", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x55556c000d40 brk(0x55556c021d40) = 0x55556c021d40 brk(0x55556c022000) = 0x55556c022000 mprotect(0x7f17671b6000, 16384, PROT_READ) = 0 mmap(0x1ffffffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffffffff000 mmap(0x200000000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200000000000 mmap(0x200001000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200001000000 write(1, "executing program\n", 18executing program ) = 18 futex(0x7f17671bc3ec, FUTEX_WAKE_PRIVATE, 1000000) = 0 rt_sigaction(SIGRT_1, {sa_handler=0x7f1767158400, sa_mask=[], sa_flags=SA_RESTORER|SA_ONSTACK|SA_RESTART|SA_SIGINFO, sa_restorer=0x7f1767149a80}, NULL, 8) = 0 rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0 mmap(NULL, 135168, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS|MAP_STACK, -1, 0) = 0x7f17670d1000 mprotect(0x7f17670d2000, 131072, PROT_READ|PROT_WRITE) = 0 rt_sigprocmask(SIG_BLOCK, ~[], [], 8) = 0 clone3({flags=CLONE_VM|CLONE_FS|CLONE_FILES|CLONE_SIGHAND|CLONE_THREAD|CLONE_SYSVSEM|CLONE_SETTLS|CLONE_PARENT_SETTID|CLONE_CHILD_CLEARTID, child_tid=0x7f17670f1990, parent_tid=0x7f17670f1990, exit_signal=0, stack=0x7f17670d1000, stack_size=0x20300, tls=0x7f17670f16c0} => {parent_tid=[289]}, 88) = 289 rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0 futex(0x7f17671bc3e8, FUTEX_WAKE_PRIVATE, 1000000) = 0 futex(0x7f17671bc3ec, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000}./strace-static-x86_64: Process 289 attached [pid 289] set_robust_list(0x7f17670f19a0, 24) = 0 [pid 289] rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0 [pid 289] mkdir("./file0", 000) = 0 [pid 289] futex(0x7f17671bc3ec, FUTEX_WAKE_PRIVATE, 1000000 [pid 288] <... futex resumed>) = 0 [pid 288] futex(0x7f17671bc3e8, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 288] futex(0x7f17671bc3ec, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 289] <... futex resumed>) = 1 [pid 289] openat(AT_FDCWD, "/dev/fuse", O_RDWR|O_CREAT, 000) = 3 [pid 289] futex(0x7f17671bc3ec, FUTEX_WAKE_PRIVATE, 1000000 [pid 288] <... futex resumed>) = 0 [pid 288] futex(0x7f17671bc3e8, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 288] futex(0x7f17671bc3ec, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 289] <... futex resumed>) = 1 [pid 289] mount(NULL, "./file0", "fuse", 0, "fd=0x0000000000000003,rootmode=0000000000000000040000,user_id=00000000000000000000,group_id=00000000"...) = 0 [pid 289] futex(0x7f17671bc3ec, FUTEX_WAKE_PRIVATE, 1000000) = 1 [pid 289] futex(0x7f17671bc3e8, FUTEX_WAIT_PRIVATE, 0, NULL [pid 288] <... futex resumed>) = 0 [pid 288] futex(0x7f17671bc3e8, FUTEX_WAKE_PRIVATE, 1000000) = 1 [pid 288] futex(0x7f17671bc3ec, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 289] <... futex resumed>) = 0 [pid 289] read(3, "\x68\x00\x00\x00\x1a\x00\x00\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x07\x00\x00\x00\x24\x00\x00\x00\x00\x00\x02\x00\xfb\xff\xff\x73\x01\x00\x00\x80\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., 8224) = 104 [pid 289] futex(0x7f17671bc3ec, FUTEX_WAKE_PRIVATE, 1000000 [pid 288] <... futex resumed>) = 0 [pid 289] <... futex resumed>) = 1 [pid 288] futex(0x7f17671bc3e8, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 288] futex(0x7f17671bc3ec, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [ 30.691136][ T30] audit: type=1400 audit(1748468688.480:64): avc: denied { execmem } for pid=288 comm="syz-executor127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 30.719661][ T30] audit: type=1400 audit(1748468688.500:65): avc: denied { read write } for pid=288 comm="syz-executor127" name="fuse" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [pid 289] read(3, [pid 288] <... futex resumed>) = -1 ETIMEDOUT (Connection timed out) [pid 288] futex(0x7f17671bc3fc, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 288] mmap(NULL, 135168, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS|MAP_STACK, -1, 0) = 0x7f17670b0000 [pid 288] mprotect(0x7f17670b1000, 131072, PROT_READ|PROT_WRITE) = 0 [pid 288] rt_sigprocmask(SIG_BLOCK, ~[], [], 8) = 0 [pid 288] clone3({flags=CLONE_VM|CLONE_FS|CLONE_FILES|CLONE_SIGHAND|CLONE_THREAD|CLONE_SYSVSEM|CLONE_SETTLS|CLONE_PARENT_SETTID|CLONE_CHILD_CLEARTID, child_tid=0x7f17670d0990, parent_tid=0x7f17670d0990, exit_signal=0, stack=0x7f17670b0000, stack_size=0x20300, tls=0x7f17670d06c0} => {parent_tid=[291]}, 88) = 291 [pid 288] rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0 [pid 288] futex(0x7f17671bc3f8, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 288] futex(0x7f17671bc3fc, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000}./strace-static-x86_64: Process 291 attached [pid 291] set_robust_list(0x7f17670d09a0, 24) = 0 [pid 291] rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0 [pid 291] write(3, "\x50\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00\x00\x00\x00\x00\x07\x00\x00\x00\x27\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfd\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", 80) = 80 [pid 291] futex(0x7f17671bc3fc, FUTEX_WAKE_PRIVATE, 1000000 [pid 288] <... futex resumed>) = 0 [pid 288] futex(0x7f17671bc3f8, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 288] futex(0x7f17671bc3fc, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 291] <... futex resumed>) = 1 [pid 291] mkdir("./file0/file0/file0", 0777 [pid 289] <... read resumed>"\x2e\x00\x00\x00\x01\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x23\x01\x00\x00\x00\x00\x00\x00\x66\x69\x6c\x65\x30\x00", 8192) = 46 [pid 289] write(3, "\x9f\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., 159) = 159 [pid 289] futex(0x7f17671bc3ec, FUTEX_WAKE_PRIVATE, 1000000) = 0 [ 30.762194][ T30] audit: type=1400 audit(1748468688.500:66): avc: denied { open } for pid=288 comm="syz-executor127" path="/dev/fuse" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 30.793224][ T30] audit: type=1400 audit(1748468688.500:67): avc: denied { mounton } for pid=288 comm="syz-executor127" path="/root/file0" dev="sda1" ino=2024 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 30.797978][ T291] general protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] PREEMPT SMP KASAN [ 30.823788][ T30] audit: type=1400 audit(1748468688.510:68): avc: denied { mount } for pid=288 comm="syz-executor127" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 30.839096][ T291] KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f] [ 30.839126][ T291] CPU: 0 PID: 291 Comm: syz-executor127 Not tainted 5.15.184-syzkaller-00129-g4032a894ccb2 #0 [ 30.839147][ T291] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 30.839158][ T291] RIP: 0010:step_into+0x12e/0xd10 [ 30.869396][ T30] audit: type=1400 audit(1748468688.590:69): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 30.878811][ T291] Code: 4c 8b 74 24 18 c6 44 24 7f 00 43 0f b6 44 25 00 84 c0 0f 85 6f 0a 00 00 45 8b 36 4c 8b bc 24 a8 00 00 00 4c 89 f8 48 c1 e8 03 <42> 0f b6 04 20 84 c0 0f 85 6e 0a 00 00 45 8b 3f 44 89 fe 81 e6 00 [ 30.878837][ T291] RSP: 0018:ffffc90000997900 EFLAGS: 00010203 [ 30.878865][ T291] RAX: 0000000000000001 RBX: ffffc90000997c20 RCX: ffff888105bfe2c0 [ 30.892409][ T30] audit: type=1400 audit(1748468688.590:70): avc: denied { search } for pid=83 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 30.903426][ T291] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 30.903454][ T291] RBP: ffffc90000997a10 R08: 0000000000000000 R09: ffffed102429ff65 [ 30.903467][ T291] R10: ffffed102429ff65 R11: 1ffff1102429ff64 R12: dffffc0000000000 [ 30.903484][ T291] R13: 1ffff92000132f8b R14: 0000000000000010 R15: 000000000000000f [ 30.903497][ T291] FS: 00007f17670d06c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 30.903523][ T291] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 30.903536][ T291] CR2: 00005612f18eaeb8 CR3: 000000012408c000 CR4: 00000000003506b0 [ 31.064162][ T291] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 31.072942][ T291] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 31.081313][ T291] Call Trace: [ 31.084985][ T291] [ 31.088144][ T291] ? down_read+0xa5/0xf0 [ 31.093927][ T291] ? __down_common+0x370/0x370 [ 31.099828][ T291] ? set_root+0x400/0x400 [ 31.104661][ T291] walk_component+0x26a/0x460 [ 31.110385][ T291] link_path_walk+0x662/0xd40 [ 31.115920][ T291] ? handle_lookup_down+0x130/0x130 [ 31.121920][ T291] __filename_parentat+0x1f3/0x5f0 [ 31.127235][ T291] ? vfs_path_parent_lookup+0x60/0x60 [ 31.133493][ T291] filename_create+0xcc/0x450 [ 31.138504][ T291] ? check_stack_object+0x81/0x140 [ 31.144641][ T291] ? kern_path_create+0x1b0/0x1b0 [ 31.150315][ T291] do_mkdirat+0x5c/0x4c0 [ 31.154755][ T291] ? getname_flags+0x206/0x500 [ 31.159646][ T291] __x64_sys_mkdir+0x6e/0x80 [ 31.164554][ T291] x64_sys_call+0x124/0x9a0 [ 31.169622][ T291] do_syscall_64+0x4c/0xa0 [ 31.174126][ T291] ? clear_bhb_loop+0x50/0xa0 [ 31.179924][ T291] ? clear_bhb_loop+0x50/0xa0 [ 31.185666][ T291] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 31.193270][ T291] RIP: 0033:0x7f1767131687 [ 31.198250][ T291] Code: ff ff 77 07 31 c0 c3 0f 1f 40 00 48 c7 c2 b0 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff c3 66 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 31.220544][ T291] RSP: 002b:00007f17670d00f8 EFLAGS: 00000206 ORIG_RAX: 0000000000000053 [ 31.230735][ T291] RAX: ffffffffffffffda RBX: 00007f17671bc3f8 RCX: 00007f1767131687 [pid 289] futex(0x7f17671bc3e8, FUTEX_WAIT_PRIVATE, 0, NULL [pid 288] <... futex resumed>) = -1 ETIMEDOUT (Connection timed out) [ 31.239970][ T291] RDX: 00000000000f4240 RSI: 00000000000001ff RDI: 0000200000000200 [ 31.249982][ T291] RBP: 0000200000000200 R08: 0000000000000000 R09: 0000000000000000 [ 31.259034][ T291] R10: 00007ffe08e75ad7 R11: 0000000000000206 R12: 0000000000000001 [ 31.268008][ T291] R13: 000020000000c280 R14: 00007ffe08e759f0 R15: 00007ffe08e75ad8 [ 31.276578][ T291] [ 31.280951][ T291] Modules linked in: [ 31.285208][ T30] audit: type=1400 audit(1748468688.590:71): avc: denied { write } for pid=83 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 31.286265][ T291] ---[ end trace bdd91866de0e9717 ]--- [ 31.312887][ T30] audit: type=1400 audit(1748468688.590:72): avc: denied { add_name } for pid=83 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 31.320418][ T291] RIP: 0010:step_into+0x12e/0xd10 [ 31.342917][ T30] audit: type=1400 audit(1748468688.590:73): avc: denied { create } for pid=83 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 31.349297][ T291] Code: 4c 8b 74 24 18 c6 44 24 7f 00 43 0f b6 44 25 00 84 c0 0f 85 6f 0a 00 00 45 8b 36 4c 8b bc 24 a8 00 00 00 4c 89 f8 48 c1 e8 03 <42> 0f b6 04 20 84 c0 0f 85 6e 0a 00 00 45 8b 3f 44 89 fe 81 e6 00 [ 31.397334][ T291] RSP: 0018:ffffc90000997900 EFLAGS: 00010203 [ 31.404259][ T291] RAX: 0000000000000001 RBX: ffffc90000997c20 RCX: ffff888105bfe2c0 [ 31.413867][ T291] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 31.423910][ T291] RBP: ffffc90000997a10 R08: 0000000000000000 R09: ffffed102429ff65 [ 31.433874][ T291] R10: ffffed102429ff65 R11: 1ffff1102429ff64 R12: dffffc0000000000 [ 31.444324][ T291] R13: 1ffff92000132f8b R14: 0000000000000010 R15: 000000000000000f [ 31.453350][ T291] FS: 00007f17670d06c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 31.463235][ T291] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 31.469996][ T291] CR2: 00007f9e14c366e8 CR3: 000000012408c000 CR4: 00000000003506a0 [ 31.481592][ T291] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 31.491869][ T291] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 31.501962][ T291] Kernel panic - not syncing: Fatal exception [ 31.509764][ T291] Kernel Offset: disabled [ 31.516880][ T291] Rebooting in 86400 seconds..