./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor2018928384 <...> "/bin/sh" dev="sda1" ino=89 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 21.160801][ T28] audit: type=1400 audit(1742517230.264:62): avc: denied { noatsecure } for pid=277 comm="sshd" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 21.166609][ T28] audit: type=1400 audit(1742517230.264:63): avc: denied { write } for pid=277 comm="sh" path="pipe:[14667]" dev="pipefs" ino=14667 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 21.173201][ T28] audit: type=1400 audit(1742517230.264:64): avc: denied { rlimitinh } for pid=277 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 21.188276][ T28] audit: type=1400 audit(1742517230.264:65): avc: denied { siginh } for pid=277 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.10.4' (ED25519) to the list of known hosts. execve("./syz-executor2018928384", ["./syz-executor2018928384"], 0x7fffb9d2f0d0 /* 10 vars */) = 0 brk(NULL) = 0x55555be31000 brk(0x55555be31d00) = 0x55555be31d00 arch_prctl(ARCH_SET_FS, 0x55555be31380) = 0 set_tid_address(0x55555be31650) = 322 set_robust_list(0x55555be31660, 24) = 0 rseq(0x55555be31ca0, 0x20, 0, 0x53053053) = -1 ENOSYS (Function not implemented) prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor2018928384", 4096) = 28 getrandom("\xeb\xfc\xac\x3f\xb0\x66\x25\xbf", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x55555be31d00 brk(0x55555be52d00) = 0x55555be52d00 brk(0x55555be53000) = 0x55555be53000 mprotect(0x7f34c02e9000, 16384, PROT_READ) = 0 mmap(0x1ffffffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffffffff000 mmap(0x200000000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200000000000 mmap(0x200001000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0executing program ) = 0x200001000000 write(1, "executing program\n", 18) = 18 memfd_create("syzkaller", 0) = 3 mmap(NULL, 138412032, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f34b7e39000 write(3, "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., 524288) = 524288 munmap(0x7f34b7e39000, 138412032) = 0 openat(AT_FDCWD, "/dev/loop0", O_RDWR) = 4 ioctl(4, LOOP_SET_FD, 3) = 0 close(3) = 0 close(4) = 0 mkdir("./file1", 0777) = 0 [ 48.315461][ T28] audit: type=1400 audit(1742517257.424:66): avc: denied { execmem } for pid=322 comm="syz-executor201" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 48.322866][ T322] loop0: detected capacity change from 0 to 1024 [ 48.335000][ T28] audit: type=1400 audit(1742517257.424:67): avc: denied { read write } for pid=322 comm="syz-executor201" name="loop0" dev="devtmpfs" ino=114 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 mount("/dev/loop0", "./file1", "ext4", MS_RELATIME, ",errors=continue") = 0 openat(AT_FDCWD, "./file1", O_RDONLY|O_DIRECTORY) = 3 chdir("./file1") = 0 openat(AT_FDCWD, "/dev/loop0", O_RDWR) = 4 ioctl(4, LOOP_CLR_FD) = 0 close(4) = 0 setrlimit(RLIMIT_FSIZE, {rlim_cur=RLIM64_INFINITY, rlim_max=RLIM64_INFINITY}) = 0 open("./bus", O_RDWR|O_CREAT|O_NOCTTY|O_SYNC|O_NOATIME|FASYNC, 000) = 4 [ 48.365191][ T28] audit: type=1400 audit(1742517257.424:68): avc: denied { open } for pid=322 comm="syz-executor201" path="/dev/loop0" dev="devtmpfs" ino=114 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 48.369414][ T322] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: none. [ 48.389203][ T28] audit: type=1400 audit(1742517257.424:69): avc: denied { ioctl } for pid=322 comm="syz-executor201" path="/dev/loop0" dev="devtmpfs" ino=114 ioctlcmd=0x4c00 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 48.414829][ T322] ------------[ cut here ]------------ [ 48.423211][ T28] audit: type=1400 audit(1742517257.454:70): avc: denied { mounton } for pid=322 comm="syz-executor201" path="/root/file1" dev="sda1" ino=1927 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 48.427978][ T322] kernel BUG at fs/ext4/inline.c:236! [ 48.450687][ T28] audit: type=1400 audit(1742517257.514:71): avc: denied { mount } for pid=322 comm="syz-executor201" name="/" dev="loop0" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 48.455680][ T322] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 48.477584][ T28] audit: type=1400 audit(1742517257.514:72): avc: denied { write } for pid=322 comm="syz-executor201" name="/" dev="loop0" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 48.483164][ T322] CPU: 0 PID: 322 Comm: syz-executor201 Not tainted 6.1.128-syzkaller-00027-gda6a42c111c8 #0 [ 48.504958][ T28] audit: type=1400 audit(1742517257.514:73): avc: denied { add_name } for pid=322 comm="syz-executor201" name="bus" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 48.514743][ T322] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 48.514756][ T322] RIP: 0010:ext4_write_inline_data+0x3a4/0x3b0 [ 48.535476][ T28] audit: type=1400 audit(1742517257.514:74): avc: denied { create } for pid=322 comm="syz-executor201" name="bus" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 48.545121][ T322] Code: 07 fe c1 38 c1 0f 8c 42 ff ff ff 4c 89 e7 49 89 d6 e8 e0 3f ca ff 4c 89 f2 e9 2f ff ff ff e8 73 97 82 ff 0f 0b e8 6c 97 82 ff <0f> 0b 66 2e 0f 1f 84 00 00 00 00 00 55 48 89 e5 41 57 41 56 41 55 [ 48.545138][ T322] RSP: 0018:ffffc90000f67748 EFLAGS: 00010293 [ 48.545153][ T322] RAX: ffffffff81f2ff24 RBX: 000000000000003c RCX: ffff88810f116540 [ 48.551457][ T28] audit: type=1400 audit(1742517257.514:75): avc: denied { read write open } for pid=322 comm="syz-executor201" path="/root/file1/bus" dev="loop0" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 48.571160][ T322] RDX: 0000000000000000 RSI: 000000000000003c RDI: 0000010000000006 [ 48.571173][ T322] RBP: ffffc90000f677b0 R08: ffffffff81f2fcad R09: ffffed102004ac4b [ 48.571186][ T322] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000010000000005 [ 48.571197][ T322] R13: ffffc90000f67840 R14: 0000010000000006 R15: 0000000000000001 [ 48.571209][ T322] FS: 000055555be31380(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 48.667860][ T322] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 48.674273][ T322] CR2: 000055ced1e70728 CR3: 00000001226de000 CR4: 00000000003506b0 [ 48.682095][ T322] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 48.689893][ T322] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 48.697707][ T322] Call Trace: [ 48.700830][ T322] [ 48.703610][ T322] ? __die_body+0x62/0xb0 [ 48.707780][ T322] ? die+0x88/0xb0 [ 48.711337][ T322] ? do_trap+0x103/0x330 [ 48.715412][ T322] ? ext4_write_inline_data+0x3a4/0x3b0 [ 48.720794][ T322] ? handle_invalid_op+0x95/0xc0 [ 48.725568][ T322] ? ext4_write_inline_data+0x3a4/0x3b0 [ 48.730950][ T322] ? exc_invalid_op+0x32/0x50 [ 48.735466][ T322] ? asm_exc_invalid_op+0x1b/0x20 [ 48.740350][ T322] ? ext4_write_inline_data+0x12d/0x3b0 [ 48.745713][ T322] ? ext4_write_inline_data+0x3a4/0x3b0 [ 48.751095][ T322] ? ext4_write_inline_data+0x3a4/0x3b0 [ 48.756467][ T322] ? ext4_write_inline_data+0x3a4/0x3b0 [ 48.761850][ T322] ext4_write_inline_data_end+0x328/0xa90 [ 48.767421][ T322] ? put_page+0xc0/0xc0 [ 48.771397][ T322] ? ext4_da_write_begin+0x489/0x920 [ 48.776513][ T322] ? pipe_zero+0x220/0x220 [ 48.780768][ T322] ext4_da_write_end+0x1ea/0x9a0 [ 48.785544][ T322] ? ext4_da_write_begin+0x920/0x920 [ 48.790665][ T322] generic_perform_write+0x416/0x780 [ 48.795802][ T322] ? generic_file_direct_write+0x6b0/0x6b0 [ 48.801426][ T322] ? generic_write_checks_count+0x490/0x490 [ 48.807156][ T322] ext4_buffered_write_iter+0x360/0x640 [ 48.812536][ T322] ext4_file_write_iter+0x194/0x1570 [ 48.817698][ T322] ? __update_idle_core+0x310/0x310 [ 48.822692][ T322] ? _raw_spin_unlock+0x4c/0x70 [ 48.827377][ T322] ? finish_task_switch+0x167/0x7b0 [ 48.832420][ T322] ? avc_policy_seqno+0x1b/0x70 [ 48.837099][ T322] ? ext4_file_read_iter+0x470/0x470 [ 48.842221][ T322] ? fsnotify_perm+0x6a/0x5b0 [ 48.846734][ T322] vfs_write+0xaf6/0xed0 [ 48.850814][ T322] ? _raw_spin_lock_irqsave+0x210/0x210 [ 48.856193][ T322] ? file_end_write+0x1c0/0x1c0 [ 48.860881][ T322] ? __kasan_check_read+0x11/0x20 [ 48.865741][ T322] ? __fdget+0x179/0x240 [ 48.869821][ T322] __x64_sys_pwrite64+0x1a6/0x230 [ 48.874682][ T322] ? ksys_pwrite64+0x1d0/0x1d0 [ 48.879283][ T322] x64_sys_call+0xa6/0x9a0 [ 48.883534][ T322] do_syscall_64+0x3b/0xb0 [ 48.887785][ T322] ? clear_bhb_loop+0x55/0xb0 [ 48.892304][ T322] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 48.898027][ T322] RIP: 0033:0x7f34c02766b9 [ 48.902281][ T322] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 61 17 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 48.921722][ T322] RSP: 002b:00007ffc23e3fec8 EFLAGS: 00000246 ORIG_RAX: 0000000000000012 [ 48.929968][ T322] RAX: ffffffffffffffda RBX: 00007ffc23e40098 RCX: 00007f34c02766b9 [ 48.937779][ T322] RDX: 0000000000000001 RSI: 0000200000000300 RDI: 0000000000000004 [ 48.945590][ T322] RBP: 00007f34c02e9610 R08: 0000000000000000 R09: 00007ffc23e40098 [ 48.953405][ T322] R10: 0000010000000005 R11: 0000000000000246 R12: 0000000000000001 [ 48.961215][ T322] R13: 00007ffc23e40088 R14: 0000000000000001 R15: 0000000000000001 [ 48.969027][ T322] [ 48.971891][ T322] Modules linked in: [ 48.975678][ T322] ---[ end trace 0000000000000000 ]--- [ 48.980932][ T322] RIP: 0010:ext4_write_inline_data+0x3a4/0x3b0 [ 48.986927][ T322] Code: 07 fe c1 38 c1 0f 8c 42 ff ff ff 4c 89 e7 49 89 d6 e8 e0 3f ca ff 4c 89 f2 e9 2f ff ff ff e8 73 97 82 ff 0f 0b e8 6c 97 82 ff <0f> 0b 66 2e 0f 1f 84 00 00 00 00 00 55 48 89 e5 41 57 41 56 41 55 [ 49.006357][ T322] RSP: 0018:ffffc90000f67748 EFLAGS: 00010293 [ 49.012282][ T322] RAX: ffffffff81f2ff24 RBX: 000000000000003c RCX: ffff88810f116540 [ 49.020066][ T322] RDX: 0000000000000000 RSI: 000000000000003c RDI: 0000010000000006 [ 49.027903][ T322] RBP: ffffc90000f677b0 R08: ffffffff81f2fcad R09: ffffed102004ac4b [ 49.035681][ T322] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000010000000005 [ 49.043516][ T322] R13: ffffc90000f67840 R14: 0000010000000006 R15: 0000000000000001 [ 49.051314][ T322] FS: 000055555be31380(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 49.060085][ T322] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 49.066491][ T322] CR2: 000055ced1e70728 CR3: 00000001226de000 CR4: 00000000003506b0 [ 49.074335][ T322] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 49.082128][ T322] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 49.089958][ T322] Kernel panic - not syncing: Fatal exception [ 49.096129][ T322] Kernel Offset: disabled [ 49.100258][ T322] Rebooting in 86400 seconds..