./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor147005214 <...> audit(1708977314.428:63): avc: denied { write } for pid=225 comm="sh" path="pipe:[1477]" dev="pipefs" ino=1477 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 12.553926][ T28] audit: type=1400 audit(1708977314.428:64): avc: denied { rlimitinh } for pid=225 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 12.556719][ T28] audit: type=1400 audit(1708977314.428:65): avc: denied { siginh } for pid=225 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.0.233' (ED25519) to the list of known hosts. execve("./syz-executor147005214", ["./syz-executor147005214"], 0x7fffc8e9c910 /* 10 vars */) = 0 brk(NULL) = 0x555556a60000 brk(0x555556a60d00) = 0x555556a60d00 arch_prctl(ARCH_SET_FS, 0x555556a60380) = 0 set_tid_address(0x555556a60650) = 295 set_robust_list(0x555556a60660, 24) = 0 rseq(0x555556a60ca0, 0x20, 0, 0x53053053) = -1 ENOSYS (Function not implemented) prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor147005214", 4096) = 27 getrandom("\x9c\xa7\xf9\x87\xbf\x3d\x97\xf8", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x555556a60d00 brk(0x555556a81d00) = 0x555556a81d00 brk(0x555556a82000) = 0x555556a82000 mprotect(0x7f710cd60000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_SCHED_CLS, insn_cnt=19, insns=0x20000000, license="GPL", log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_INGRESS, prog_btf_fd=0, func_info_rec_size=0, func_info=NULL, func_info_cnt=0, line_info_rec_size=0, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL}, 144) = 3 [ 21.734464][ T28] audit: type=1400 audit(1708977323.598:66): avc: denied { execmem } for pid=295 comm="syz-executor147" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 21.739676][ T28] audit: type=1400 audit(1708977323.608:67): avc: denied { bpf } for pid=295 comm="syz-executor147" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 21.740772][ T295] BUG: unable to handle page fault for address: ffffffffff600000 [ 21.745283][ T28] audit: type=1400 audit(1708977323.608:68): avc: denied { prog_load } for pid=295 comm="syz-executor147" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 21.747544][ T295] #PF: supervisor read access in kernel mode [ 21.747562][ T295] #PF: error_code(0x0000) - not-present page [ 21.747572][ T295] PGD 6c12067 P4D 6c12067 PUD 6c14067 PMD 6c16067 PTE 0 [ 21.747603][ T295] Oops: 0000 [#1] PREEMPT SMP KASAN [ 21.747617][ T295] CPU: 0 PID: 295 Comm: syz-executor147 Not tainted 6.1.68-syzkaller-00030-gc622e98ddc8e #0 [ 21.747634][ T295] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 21.747643][ T295] RIP: 0010:copy_from_kernel_nofault+0x86/0x2d0 [ 21.753760][ T28] audit: type=1400 audit(1708977323.608:69): avc: denied { perfmon } for pid=295 comm="syz-executor147" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 21.754426][ T295] Code: 48 89 55 d0 0f 85 de 01 00 00 ff 02 bf 07 00 00 00 4c 89 ee e8 cb 51 d2 ff 49 83 fd 07 76 58 4d 89 fe 49 83 c7 08 49 83 c5 f8 <49> 8b 1c 24 4c 89 f0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df 80 [ 21.757749][ T28] audit: type=1400 audit(1708977323.608:70): avc: denied { prog_run } for pid=295 comm="syz-executor147" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 21.764639][ T295] RSP: 0018:ffffc90000da7890 EFLAGS: 00010257 [ 21.869217][ T295] RAX: 0000000000000000 RBX: 0000000000000008 RCX: ffff88810964e540 [ 21.877234][ T295] RDX: ffff88810964f0e0 RSI: 0000000000000008 RDI: 0000000000000007 [ 21.885041][ T295] RBP: ffffc90000da78c8 R08: ffffffff81a30ab5 R09: ffffffff818e8dec [ 21.893303][ T295] R10: 0000000000000005 R11: ffff88810964e540 R12: ffffffffff600000 [ 21.903751][ T295] R13: 0000000000000000 R14: ffffc90000da7908 R15: ffffc90000da7910 [ 21.912520][ T295] FS: 0000555556a60380(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 21.922053][ T295] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 21.928463][ T295] CR2: ffffffffff600000 CR3: 000000011dbcc000 CR4: 00000000003506b0 [ 21.938969][ T295] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 21.947755][ T295] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 21.956769][ T295] Call Trace: [ 21.963258][ T295] [ 21.967033][ T295] ? __die_body+0x62/0xb0 [ 21.972112][ T295] ? __die+0x7e/0x90 [ 21.976034][ T295] ? 0xffffffffff600000 [ 21.980580][ T295] ? page_fault_oops+0x7f9/0xa90 [ 21.986153][ T295] ? unwind_get_return_address+0x4d/0x90 [ 21.992399][ T295] ? 0xffffffffff600000 [ 21.996846][ T295] ? kernelmode_fixup_or_oops+0x270/0x270 [ 22.003007][ T295] ? bpf_bprintf_prepare+0x11cc/0x1360 [ 22.008560][ T295] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 22.014189][ T295] ? 0xffffffffff600000 [ 22.018189][ T295] ? exc_page_fault+0x537/0x700 [ 22.022866][ T295] ? 0xffffffffff600000 [ 22.026866][ T295] ? asm_exc_page_fault+0x27/0x30 [ 22.031725][ T295] ? 0xffffffffff600000 [ 22.035897][ T295] ? bpf_bprintf_prepare+0x65c/0x1360 [ 22.041096][ T295] ? copy_from_kernel_nofault+0x75/0x2d0 [ 22.046563][ T295] ? copy_from_kernel_nofault+0x86/0x2d0 [ 22.052036][ T295] ? 0xffffffffff600000 [ 22.056021][ T295] bpf_probe_read_kernel+0x2a/0x70 [ 22.060969][ T295] bpf_prog_3aa1bfad0585af26+0x5b/0x5d [ 22.066265][ T295] bpf_test_run+0x4ab/0xa40 [ 22.070605][ T295] ? convert___skb_to_skb+0x670/0x670 [ 22.075810][ T295] ? skb_header_pointer+0x98/0x120 [ 22.080757][ T295] ? eth_type_trans+0x3aa/0x650 [ 22.085444][ T295] ? eth_get_headlen+0x240/0x240 [ 22.090220][ T295] ? convert___skb_to_skb+0x44/0x670 [ 22.095424][ T295] ? build_skb+0xde/0x220 [ 22.099592][ T295] bpf_prog_test_run_skb+0xaf1/0x13a0 [ 22.104803][ T295] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 22.110538][ T295] ? __kasan_check_read+0x11/0x20 [ 22.116363][ T295] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 22.122814][ T295] bpf_prog_test_run+0x3b0/0x630 [ 22.128121][ T295] ? bpf_prog_query+0x260/0x260 [ 22.133341][ T295] ? selinux_bpf+0xd2/0x100 [ 22.141392][ T295] ? security_bpf+0x82/0xb0 [ 22.145908][ T295] __sys_bpf+0x59f/0x7f0 [ 22.150077][ T295] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 22.156065][ T295] ? __kasan_check_write+0x14/0x20 [ 22.161011][ T295] ? fpregs_restore_userregs+0x130/0x290 [ 22.166470][ T295] __x64_sys_bpf+0x7c/0x90 [ 22.170721][ T295] do_syscall_64+0x3d/0xb0 [ 22.174981][ T295] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 22.180721][ T295] RIP: 0033:0x7f710cced769 [ 22.185518][ T295] Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 22.204943][ T295] RSP: 002b:00007ffe33702598 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 22.213187][ T295] RAX: ffffffffffffffda RBX: 00007ffe33702768 RCX: 00007f710cced769 [ 22.220994][ T295] RDX: 000000000000004c RSI: 0000000020000240 RDI: 000000000000000a [ 22.228802][ T295] RBP: 00007f710cd60610 R08: 0000000000000000 R09: 00007ffe33702768 [ 22.236615][ T295] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 22.244425][ T295] R13: 00007ffe33702758 R14: 0000000000000001 R15: 0000000000000001 [ 22.252242][ T295] [ 22.255103][ T295] Modules linked in: [ 22.258836][ T295] CR2: ffffffffff600000 [ 22.262829][ T295] ---[ end trace 0000000000000000 ]--- [ 22.268122][ T295] RIP: 0010:copy_from_kernel_nofault+0x86/0x2d0 [ 22.274195][ T295] Code: 48 89 55 d0 0f 85 de 01 00 00 ff 02 bf 07 00 00 00 4c 89 ee e8 cb 51 d2 ff 49 83 fd 07 76 58 4d 89 fe 49 83 c7 08 49 83 c5 f8 <49> 8b 1c 24 4c 89 f0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df 80 [ 22.293638][ T295] RSP: 0018:ffffc90000da7890 EFLAGS: 00010257 [ 22.299539][ T295] RAX: 0000000000000000 RBX: 0000000000000008 RCX: ffff88810964e540 [ 22.307350][ T295] RDX: ffff88810964f0e0 RSI: 0000000000000008 RDI: 0000000000000007 [ 22.315163][ T295] RBP: ffffc90000da78c8 R08: ffffffff81a30ab5 R09: ffffffff818e8dec [ 22.322972][ T295] R10: 0000000000000005 R11: ffff88810964e540 R12: ffffffffff600000 [ 22.330786][ T295] R13: 0000000000000000 R14: ffffc90000da7908 R15: ffffc90000da7910 [ 22.338597][ T295] FS: 0000555556a60380(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 22.347362][ T295] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 22.353785][ T295] CR2: ffffffffff600000 CR3: 000000011dbcc000 CR4: 00000000003506b0 [ 22.361600][ T295] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 22.369409][ T295] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 22.377220][ T295] Kernel panic - not syncing: Fatal exception [ 22.383333][ T295] Kernel Offset: disabled [ 22.387451][ T295] Rebooting in 86400 seconds..