./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor2748591480 <...> Warning: Permanently added '10.128.1.72' (ED25519) to the list of known hosts. execve("./syz-executor2748591480", ["./syz-executor2748591480"], 0x7ffe654eb720 /* 10 vars */) = 0 brk(NULL) = 0x555555f7e000 brk(0x555555f7ed00) = 0x555555f7ed00 arch_prctl(ARCH_SET_FS, 0x555555f7e380) = 0 set_tid_address(0x555555f7e650) = 294 set_robust_list(0x555555f7e660, 24) = 0 rseq(0x555555f7eca0, 0x20, 0, 0x53053053) = -1 ENOSYS (Function not implemented) prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor2748591480", 4096) = 28 getrandom("\xfc\x07\x86\xc1\x16\x95\x89\x7b", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x555555f7ed00 brk(0x555555f9fd00) = 0x555555f9fd00 brk(0x555555fa0000) = 0x555555fa0000 mprotect(0x7fc69af6e000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 [ 21.956143][ T30] audit: type=1400 audit(1709243509.864:66): avc: denied { execmem } for pid=294 comm="syz-executor274" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 21.975524][ T30] audit: type=1400 audit(1709243509.874:67): avc: denied { prog_load } for pid=294 comm="syz-executor274" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 21.994660][ T30] audit: type=1400 audit(1709243509.874:68): avc: denied { bpf } for pid=294 comm="syz-executor274" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_SCHED_CLS, insn_cnt=19, insns=0x20000000, license="GPL", log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_INGRESS, prog_btf_fd=0, func_info_rec_size=0, func_info=NULL, func_info_cnt=0, line_info_rec_size=0, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL}, 144) = 3 [ 22.097359][ T30] audit: type=1400 audit(1709243510.014:69): avc: denied { perfmon } for pid=294 comm="syz-executor274" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 22.118967][ T30] audit: type=1400 audit(1709243510.034:70): avc: denied { confidentiality } for pid=294 comm="syz-executor274" lockdown_reason="use of bpf to read kernel RAM" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=lockdown permissive=1 [ 22.143333][ T30] audit: type=1400 audit(1709243510.054:71): avc: denied { prog_run } for pid=294 comm="syz-executor274" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 22.144006][ T294] BUG: unable to handle page fault for address: ffffffffff600000 [ 22.169878][ T294] #PF: supervisor read access in kernel mode [ 22.175673][ T294] #PF: error_code(0x0001) - permissions violation [ 22.181927][ T294] PGD 6812067 P4D 6812067 PUD 6814067 PMD 6816067 PTE 8000000006809165 [ 22.190000][ T294] Oops: 0001 [#1] PREEMPT SMP KASAN [ 22.195029][ T294] CPU: 0 PID: 294 Comm: syz-executor274 Not tainted 5.15.148-syzkaller-00718-g993bed180178 #0 [ 22.205098][ T294] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 22.214991][ T294] RIP: 0010:copy_from_kernel_nofault+0x86/0x2e0 [ 22.221066][ T294] Code: 48 89 55 d0 0f 85 ea 01 00 00 ff 02 bf 07 00 00 00 4c 89 ee e8 db a8 d6 ff 49 83 fd 07 76 5c 4d 89 fe 49 83 c5 f8 49 83 c7 08 <49> 8b 1c 24 4c 89 f0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df 80 [ 22.240508][ T294] RSP: 0018:ffffc900009b78d0 EFLAGS: 00010296 [ 22.246407][ T294] RAX: 0000000000000000 RBX: 0000000000000008 RCX: ffff88811e260000 [ 22.254230][ T294] RDX: ffff88811e260b90 RSI: 0000000000000008 RDI: 0000000000000007 [ 22.262033][ T294] RBP: ffffc900009b7908 R08: ffffffff81997ce5 R09: ffffffff8187ca3c [ 22.269853][ T294] R10: 0000000000000005 R11: ffff88811e260000 R12: ffffffffff600000 [ 22.277653][ T294] R13: 0000000000000000 R14: ffffc900009b7948 R15: ffffc900009b7950 [ 22.285473][ T294] FS: 0000555555f7e380(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 22.294233][ T294] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 22.300652][ T294] CR2: ffffffffff600000 CR3: 000000011e28a000 CR4: 00000000003506b0 [ 22.308466][ T294] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 22.316274][ T294] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 22.324086][ T294] Call Trace: [ 22.327210][ T294] [ 22.329990][ T294] ? __die_body+0x62/0xb0 [ 22.334155][ T294] ? __die+0x7e/0x90 [ 22.337888][ T294] ? page_fault_oops+0x7f9/0xa90 [ 22.342663][ T294] ? kernelmode_fixup_or_oops+0x270/0x270 [ 22.348213][ T294] ? 0xffffffffa002671c [ 22.352206][ T294] ? is_bpf_text_address+0x172/0x190 [ 22.357327][ T294] ? stack_trace_save+0x1c0/0x1c0 [ 22.362187][ T294] ? __kernel_text_address+0x9b/0x110 [ 22.367395][ T294] ? exc_page_fault+0x521/0x830 [ 22.372084][ T294] ? asm_exc_page_fault+0x27/0x30 [ 22.376948][ T294] ? bpf_bprintf_prepare+0x65c/0x1360 [ 22.382149][ T294] ? copy_from_kernel_nofault+0x75/0x2e0 [ 22.387617][ T294] ? copy_from_kernel_nofault+0x86/0x2e0 [ 22.393100][ T294] bpf_probe_read_kernel+0x2a/0x70 [ 22.398063][ T294] bpf_prog_3aa1bfad0585af26+0x5b/0x8e4 [ 22.403413][ T294] bpf_test_run+0x478/0xa10 [ 22.407755][ T294] ? convert___skb_to_skb+0x570/0x570 [ 22.412964][ T294] ? skb_header_pointer+0x98/0x120 [ 22.417997][ T294] ? eth_type_trans+0x3b4/0x600 [ 22.422683][ T294] ? eth_get_headlen+0x240/0x240 [ 22.427456][ T294] ? convert___skb_to_skb+0x44/0x570 [ 22.432577][ T294] bpf_prog_test_run_skb+0xb41/0x1420 [ 22.437785][ T294] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 22.443519][ T294] ? __kasan_check_read+0x11/0x20 [ 22.448373][ T294] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 22.454103][ T294] bpf_prog_test_run+0x3b0/0x630 [ 22.458876][ T294] ? _raw_spin_unlock_irq+0x4e/0x70 [ 22.463913][ T294] ? bpf_prog_query+0x220/0x220 [ 22.468596][ T294] ? selinux_bpf+0xd2/0x100 [ 22.472938][ T294] ? security_bpf+0x82/0xb0 [ 22.477276][ T294] __sys_bpf+0x525/0x760 [ 22.481356][ T294] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 22.486561][ T294] ? ptrace_notify+0x24c/0x350 [ 22.491163][ T294] ? __kasan_check_read+0x11/0x20 [ 22.496023][ T294] __x64_sys_bpf+0x7c/0x90 [ 22.500275][ T294] do_syscall_64+0x3d/0xb0 [ 22.504526][ T294] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 22.510257][ T294] RIP: 0033:0x7fc69aefb769 [ 22.514510][ T294] Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 22.533958][ T294] RSP: 002b:00007ffd5a9a27b8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 22.542196][ T294] RAX: ffffffffffffffda RBX: 00007ffd5a9a2988 RCX: 00007fc69aefb769 [ 22.550008][ T294] RDX: 000000000000004c RSI: 0000000020000240 RDI: 000000000000000a [ 22.557818][ T294] RBP: 00007fc69af6e610 R08: 0000000000000000 R09: 00007ffd5a9a2988 [ 22.565636][ T294] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 22.573440][ T294] R13: 00007ffd5a9a2978 R14: 0000000000000001 R15: 0000000000000001 [ 22.581255][ T294] [ 22.584129][ T294] Modules linked in: [ 22.587848][ T294] CR2: ffffffffff600000 [ 22.591842][ T294] ---[ end trace b23b15184643eb9b ]--- [ 22.597309][ T294] RIP: 0010:copy_from_kernel_nofault+0x86/0x2e0 [ 22.603384][ T294] Code: 48 89 55 d0 0f 85 ea 01 00 00 ff 02 bf 07 00 00 00 4c 89 ee e8 db a8 d6 ff 49 83 fd 07 76 5c 4d 89 fe 49 83 c5 f8 49 83 c7 08 <49> 8b 1c 24 4c 89 f0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df 80 [ 22.623041][ T294] RSP: 0018:ffffc900009b78d0 EFLAGS: 00010296 [ 22.628908][ T294] RAX: 0000000000000000 RBX: 0000000000000008 RCX: ffff88811e260000 [ 22.636720][ T294] RDX: ffff88811e260b90 RSI: 0000000000000008 RDI: 0000000000000007 [ 22.644538][ T294] RBP: ffffc900009b7908 R08: ffffffff81997ce5 R09: ffffffff8187ca3c [ 22.652341][ T294] R10: 0000000000000005 R11: ffff88811e260000 R12: ffffffffff600000 [ 22.660152][ T294] R13: 0000000000000000 R14: ffffc900009b7948 R15: ffffc900009b7950 [ 22.668053][ T294] FS: 0000555555f7e380(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 22.676826][ T294] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 22.683239][ T294] CR2: ffffffffff600000 CR3: 000000011e28a000 CR4: 00000000003506b0 [ 22.691146][ T294] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 22.698947][ T294] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 22.706759][ T294] Kernel panic - not syncing: Fatal exception [ 22.712833][ T294] Kernel Offset: disabled [ 22.716951][ T294] Rebooting in 86400 seconds..