./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor3684167952 <...> Warning: Permanently added '10.128.1.109' (ED25519) to the list of known hosts. execve("./syz-executor3684167952", ["./syz-executor3684167952"], 0x7ffcbca21db0 /* 10 vars */) = 0 brk(NULL) = 0x555556aa8000 brk(0x555556aa8d00) = 0x555556aa8d00 arch_prctl(ARCH_SET_FS, 0x555556aa8380) = 0 set_tid_address(0x555556aa8650) = 300 set_robust_list(0x555556aa8660, 24) = 0 rseq(0x555556aa8ca0, 0x20, 0, 0x53053053) = -1 ENOSYS (Function not implemented) prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor3684167952", 4096) = 28 getrandom("\x25\x03\xe8\x9a\x5c\x08\xc6\xdc", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x555556aa8d00 brk(0x555556ac9d00) = 0x555556ac9d00 brk(0x555556aca000) = 0x555556aca000 mprotect(0x7fb5ec2a5000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x555556aa8650) = 301 ./strace-static-x86_64: Process 301 attached [pid 301] set_robust_list(0x555556aa8660, 24) = 0 [pid 301] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0 [pid 301] setpgid(0, 0) = 0 [pid 301] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC) = 3 [pid 301] write(3, "1000", 4) = 4 [pid 301] close(3) = 0 [ 27.205448][ T30] audit: type=1400 audit(1700100459.974:66): avc: denied { execmem } for pid=300 comm="syz-executor368" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 27.225268][ T30] audit: type=1400 audit(1700100459.984:67): avc: denied { prog_load } for pid=301 comm="syz-executor368" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 27.244709][ T30] audit: type=1400 audit(1700100459.984:68): avc: denied { bpf } for pid=301 comm="syz-executor368" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 27.265351][ T30] audit: type=1400 audit(1700100459.984:69): avc: denied { perfmon } for pid=301 comm="syz-executor368" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [pid 301] bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_RAW_TRACEPOINT, insn_cnt=11, insns=0x20000180, license="GPL", log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_INGRESS, prog_btf_fd=0, func_info_rec_size=0, func_info=NULL, func_info_cnt=0, line_info_rec_size=0, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL}, 144) = 3 [ 27.365690][ T30] audit: type=1400 audit(1700100460.134:70): avc: denied { confidentiality } for pid=301 comm="syz-executor368" lockdown_reason="use of bpf to read kernel RAM" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=lockdown permissive=1 [ 27.390079][ T30] audit: type=1400 audit(1700100460.164:71): avc: denied { prog_run } for pid=301 comm="syz-executor368" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 27.409188][ T82] BUG: unable to handle page fault for address: ffffffffff600000 [ 27.416699][ T82] #PF: supervisor read access in kernel mode [ 27.422513][ T82] #PF: error_code(0x0001) - permissions violation [ 27.428764][ T82] PGD 6812067 P4D 6812067 PUD 6814067 PMD 6816067 PTE 8000000006809165 [ 27.436835][ T82] Oops: 0001 [#1] PREEMPT SMP KASAN [ 27.441869][ T82] CPU: 1 PID: 82 Comm: syslogd Not tainted 5.15.137-syzkaller-01792-g61cfd264993d #0 [ 27.451154][ T82] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 27.461052][ T82] RIP: 0010:copy_from_kernel_nofault+0x86/0x2e0 [ 27.467131][ T82] Code: 48 89 55 d0 0f 85 ea 01 00 00 ff 02 bf 07 00 00 00 4c 89 ee e8 3b ac d6 ff 49 83 fd 07 76 5c 4d 89 fe 49 83 c5 f8 49 83 c7 08 <49> 8b 1c 24 4c 89 f0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df 80 [ 27.486573][ T82] RSP: 0018:ffffc90000927670 EFLAGS: 00010296 [ 27.492467][ T82] RAX: 0000000000000000 RBX: 0000000000000008 RCX: ffff88810b7e13c0 [ 27.500284][ T82] RDX: ffff88810b7e1f50 RSI: 0000000000000008 RDI: 0000000000000007 [ 27.508091][ T82] RBP: ffffc900009276a8 R08: ffffffff81994f35 R09: ffffed1021863c1b [ 27.515905][ T82] R10: 0000000000000000 R11: dffffc0000000001 R12: ffffffffff600000 [ 27.523715][ T82] R13: 0000000000000000 R14: ffffc900009276e8 R15: ffffc900009276f0 [ 27.531529][ T82] FS: 00007f89316cc380(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 27.540292][ T82] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 27.546715][ T82] CR2: ffffffffff600000 CR3: 000000010c4e7000 CR4: 00000000003506a0 [ 27.554529][ T82] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 27.562338][ T82] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 27.570150][ T82] Call Trace: [ 27.573276][ T82] [ 27.576055][ T82] ? __die_body+0x62/0xb0 [ 27.580217][ T82] ? __die+0x7e/0x90 [ 27.583949][ T82] ? page_fault_oops+0x7f9/0xa90 [ 27.588725][ T82] ? kernelmode_fixup_or_oops+0x270/0x270 [ 27.594280][ T82] ? __update_load_avg_cfs_rq+0xb1/0x2f0 [ 27.599749][ T82] ? update_load_avg+0x43a/0x1150 [ 27.604611][ T82] ? exc_page_fault+0x521/0x830 [ 27.609298][ T82] ? asm_exc_page_fault+0x27/0x30 [ 27.614158][ T82] ? copy_from_kernel_nofault+0x75/0x2e0 [ 27.619623][ T82] ? copy_from_kernel_nofault+0x86/0x2e0 [ 27.625090][ T82] ? skb_release_data+0x8a9/0xa80 [ 27.629952][ T82] bpf_probe_read_kernel+0x2a/0x70 [ 27.634904][ T82] bpf_prog_bd8b22826c103b08+0x3a/0xafc [ 27.640278][ T82] bpf_trace_run2+0xec/0x210 [ 27.644708][ T82] ? bpf_trace_run1+0x1c0/0x1c0 [ 27.649392][ T82] ? skb_release_data+0x8a9/0xa80 [ 27.654252][ T82] ? asm_sysvec_call_function_single+0x1b/0x20 [ 27.660243][ T82] ? skb_release_data+0x8a9/0xa80 [ 27.665102][ T82] __bpf_trace_kfree+0x6f/0x90 [ 27.669706][ T82] ? skb_release_data+0x8a9/0xa80 [ 27.674565][ T82] kfree+0x1f3/0x220 [ 27.678294][ T82] ? unix_detach_fds+0x190/0x190 [ 27.683069][ T82] skb_release_data+0x8a9/0xa80 [ 27.687757][ T82] consume_skb+0xac/0x250 [ 27.691923][ T82] skb_free_datagram+0x28/0xe0 [ 27.696523][ T82] __unix_dgram_recvmsg+0xcb1/0x1260 [ 27.701643][ T82] ? selinux_socket_recvmsg+0x243/0x340 [ 27.707024][ T82] ? unix_unhash+0x10/0x10 [ 27.711278][ T82] ? file_has_perm+0x508/0x6c0 [ 27.715878][ T82] unix_dgram_recvmsg+0xc4/0xe0 [ 27.720563][ T82] ? unix_dgram_sendmsg+0x2090/0x2090 [ 27.725773][ T82] sock_read_iter+0x353/0x480 [ 27.730285][ T82] ? kernel_sock_ip_overhead+0x280/0x280 [ 27.735754][ T82] ? iov_iter_init+0x53/0x190 [ 27.740265][ T82] vfs_read+0xa7e/0xd40 [ 27.744259][ T82] ? kernel_read+0x1f0/0x1f0 [ 27.748687][ T82] ? __kasan_check_read+0x11/0x20 [ 27.753546][ T82] ? __fdget_pos+0x209/0x3a0 [ 27.757972][ T82] ksys_read+0x199/0x2c0 [ 27.762051][ T82] ? vfs_write+0x1110/0x1110 [ 27.766478][ T82] ? debug_smp_processor_id+0x17/0x20 [ 27.771685][ T82] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 27.777588][ T82] __x64_sys_read+0x7b/0x90 [ 27.781927][ T82] do_syscall_64+0x3d/0xb0 [ 27.786181][ T82] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 27.791908][ T82] RIP: 0033:0x7f8931820b6a [ 27.796163][ T82] Code: 00 3d 00 00 41 00 75 0d 50 48 8d 3d 2d 08 0a 00 e8 ea 7d 01 00 31 c0 e9 07 ff ff ff 64 8b 04 25 18 00 00 00 85 c0 75 1b 0f 05 <48> 3d 00 f0 ff ff 76 6c 48 8b 15 8f a2 0d 00 f7 d8 64 89 02 48 83 [ 27.815602][ T82] RSP: 002b:00007ffc70a369d8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 27.823849][ T82] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f8931820b6a [ 27.831660][ T82] RDX: 00000000000000ff RSI: 0000562fa0af6300 RDI: 0000000000000000 [ 27.839472][ T82] RBP: 0000562fa0af62c0 R08: 0000000000000001 R09: 0000000000000000 [ 27.847282][ T82] R10: 00007f89319bf3a3 R11: 0000000000000246 R12: 0000562fa0af63ff [ 27.855093][ T82] R13: 0000562fa0af6300 R14: 0000000000000000 R15: 00007f89319fda80 [ 27.862907][ T82] [ 27.865771][ T82] Modules linked in: [ 27.869503][ T82] CR2: ffffffffff600000 [ 27.873497][ T82] ---[ end trace 98676cdd4fb87fa7 ]--- [ 27.878791][ T82] RIP: 0010:copy_from_kernel_nofault+0x86/0x2e0 [ 27.884863][ T82] Code: 48 89 55 d0 0f 85 ea 01 00 00 ff 02 bf 07 00 00 00 4c 89 ee e8 3b ac d6 ff 49 83 fd 07 76 5c 4d 89 fe 49 83 c5 f8 49 83 c7 08 <49> 8b 1c 24 4c 89 f0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df 80 [ 27.904305][ T82] RSP: 0018:ffffc90000927670 EFLAGS: 00010296 [ 27.910207][ T82] RAX: 0000000000000000 RBX: 0000000000000008 RCX: ffff88810b7e13c0 [ 27.918023][ T82] RDX: ffff88810b7e1f50 RSI: 0000000000000008 RDI: 0000000000000007 [ 27.925832][ T82] RBP: ffffc900009276a8 R08: ffffffff81994f35 R09: ffffed1021863c1b [ 27.933641][ T82] R10: 0000000000000000 R11: dffffc0000000001 R12: ffffffffff600000 [ 27.941453][ T82] R13: 0000000000000000 R14: ffffc900009276e8 R15: ffffc900009276f0 [ 27.949265][ T82] FS: 00007f89316cc380(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 27.958031][ T82] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 27.964453][ T82] CR2: ffffffffff600000 CR3: 000000010c4e7000 CR4: 00000000003506a0 [ 27.972267][ T82] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 27.980077][ T82] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 27.987890][ T82] Kernel panic - not syncing: Fatal exception [ 27.994008][ T82] Kernel Offset: disabled [ 27.998126][ T82] Rebooting in 86400 seconds..