./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor1367916751 <...> _r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 12.809638][ T23] audit: type=1400 audit(1747365991.960:79): avc: denied { siginh } for pid=281 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 12.944809][ T23] audit: type=1400 audit(1747365992.120:80): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 15.691509][ T288] sshd (288) used greatest stack depth: 22720 bytes left Warning: Permanently added '10.128.0.23' (ED25519) to the list of known hosts. execve("./syz-executor1367916751", ["./syz-executor1367916751"], 0x7ffdeef83930 /* 10 vars */) = 0 brk(NULL) = 0x5555742d4000 brk(0x5555742d4d00) = 0x5555742d4d00 arch_prctl(ARCH_SET_FS, 0x5555742d4380) = 0 set_tid_address(0x5555742d4650) = 341 set_robust_list(0x5555742d4660, 24) = 0 rseq(0x5555742d4ca0, 0x20, 0, 0x53053053) = -1 ENOSYS (Function not implemented) prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor1367916751", 4096) = 28 getrandom("\x92\xf3\xdd\x13\xc2\x2a\xeb\x2b", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x5555742d4d00 brk(0x5555742f5d00) = 0x5555742f5d00 brk(0x5555742f6000) = 0x5555742f6000 mprotect(0x7fc525071000, 16384, PROT_READ) = 0 mmap(0x1ffffffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffffffff000 mmap(0x200000000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200000000000 mmap(0x200001000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200001000000 write(1, "executing program\n", 18executing program ) = 18 bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_SCHED_CLS, insn_cnt=4, insns=0x200000000700, license="GPL", log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_INGRESS, prog_btf_fd=0, func_info_rec_size=0, func_info=NULL, func_info_cnt=0, line_info_rec_size=0, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL}, 148) = 3 [ 21.850228][ T23] audit: type=1400 audit(1747366001.020:81): avc: denied { execmem } for pid=341 comm="syz-executor136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 21.870094][ T23] audit: type=1400 audit(1747366001.030:82): avc: denied { prog_load } for pid=341 comm="syz-executor136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 21.870389][ T341] kasan: CONFIG_KASAN_INLINE enabled [ 21.889945][ T23] audit: type=1400 audit(1747366001.040:83): avc: denied { prog_run } for pid=341 comm="syz-executor136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 21.894679][ T341] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 21.921937][ T341] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 21.929049][ T341] CPU: 0 PID: 341 Comm: syz-executor136 Not tainted 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0 [ 21.939290][ T341] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 21.949452][ T341] RIP: 0010:bpf_skb_cgroup_id+0x118/0x1a0 [ 21.955168][ T341] Code: a0 02 00 00 48 89 d8 48 c1 e8 03 42 80 3c 38 00 74 08 48 89 df e8 38 44 26 fe 41 be 40 01 00 00 4c 03 33 4c 89 f0 48 c1 e8 03 <42> 80 3c 38 00 74 08 4c 89 f7 e8 19 44 26 fe 49 8b 1e 48 83 c3 68 [ 21.975043][ T341] RSP: 0018:ffff8881d9a27b00 EFLAGS: 00010206 [ 21.981280][ T341] RAX: 0000000000000028 RBX: ffff8881ef6f32a0 RCX: ffff8881f37d3f00 [ 21.989232][ T341] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 0000000000000000 [ 21.997365][ T341] RBP: ffff8881d9a27b18 R08: ffff8881d9a27d20 R09: ffffed103dda7815 [ 22.005314][ T341] R10: ffffed103dda7815 R11: 1ffff1103dda7814 R12: dffffc0000000000 [ 22.013262][ T341] R13: ffffc90000044020 R14: 0000000000000140 R15: dffffc0000000000 [ 22.021402][ T341] FS: 00005555742d4380(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 22.030326][ T341] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 22.036886][ T341] CR2: 000000000064a110 CR3: 00000001ef03a000 CR4: 00000000003406b0 [ 22.045059][ T341] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 22.053165][ T341] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 22.061128][ T341] Call Trace: [ 22.064403][ T341] ? bpf_test_run+0x1ea/0x5d0 [ 22.069080][ T341] ? eth_type_trans+0x2c2/0x5e0 [ 22.074164][ T341] ? bpf_ctx_init+0x1b0/0x1b0 [ 22.078978][ T341] ? eth_get_headlen+0x1f0/0x1f0 [ 22.083906][ T341] ? __kasan_check_write+0x14/0x20 [ 22.089015][ T341] ? bpf_prog_test_run_skb+0x721/0xdc0 [ 22.094469][ T341] ? __bpf_trace_bpf_test_finish+0x30/0x30 [ 22.100303][ T341] ? bpf_prog_test_run+0x21a/0x2a0 [ 22.105417][ T341] ? __se_sys_bpf+0x49a/0x570 [ 22.110076][ T341] ? __x64_sys_bpf+0x90/0x90 [ 22.114652][ T341] ? do_syscall_64+0x170/0x170 [ 22.119401][ T341] ? __kasan_check_read+0x11/0x20 [ 22.124411][ T341] ? __x64_sys_bpf+0x7b/0x90 [ 22.128984][ T341] ? do_syscall_64+0xcf/0x170 [ 22.133649][ T341] ? entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 22.139707][ T341] Modules linked in: [ 22.143639][ T341] ---[ end trace f6641a891005655b ]--- [ 22.149137][ T341] RIP: 0010:bpf_skb_cgroup_id+0x118/0x1a0 [ 22.154867][ T341] Code: a0 02 00 00 48 89 d8 48 c1 e8 03 42 80 3c 38 00 74 08 48 89 df e8 38 44 26 fe 41 be 40 01 00 00 4c 03 33 4c 89 f0 48 c1 e8 03 <42> 80 3c 38 00 74 08 4c 89 f7 e8 19 44 26 fe 49 8b 1e 48 83 c3 68 [ 22.174700][ T341] RSP: 0018:ffff8881d9a27b00 EFLAGS: 00010206 [ 22.180809][ T341] RAX: 0000000000000028 RBX: ffff8881ef6f32a0 RCX: ffff8881f37d3f00 [ 22.188804][ T341] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 0000000000000000 [ 22.196850][ T341] RBP: ffff8881d9a27b18 R08: ffff8881d9a27d20 R09: ffffed103dda7815 [ 22.205112][ T341] R10: ffffed103dda7815 R11: 1ffff1103dda7814 R12: dffffc0000000000 [ 22.213131][ T341] R13: ffffc90000044020 R14: 0000000000000140 R15: dffffc0000000000 [ 22.221135][ T341] FS: 00005555742d4380(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 22.230073][ T341] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 22.236668][ T341] CR2: 000000000064a110 CR3: 00000001ef03a000 CR4: 00000000003406b0 [ 22.244632][ T341] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 22.252703][ T341] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 22.260686][ T341] Kernel panic - not syncing: Fatal exception [ 22.266991][ T341] Kernel Offset: disabled [ 22.271302][ T341] Rebooting in 86400 seconds..