./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor3723039206 <...> [ 3.837167][ T24] audit: type=1400 audit(1684072902.590:9): avc: denied { append open } for pid=75 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3.844015][ T24] audit: type=1400 audit(1684072902.590:10): avc: denied { getattr } for pid=75 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4.159671][ T92] udevd[92]: starting version 3.2.11 [ 4.252966][ T93] udevd[93]: starting eudev-3.2.11 [ 13.884968][ T24] kauditd_printk_skb: 50 callbacks suppressed [ 13.884981][ T24] audit: type=1400 audit(1684072912.680:61): avc: denied { transition } for pid=219 comm="sshd" path="/bin/sh" dev="sda1" ino=89 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 13.895612][ T24] audit: type=1400 audit(1684072912.680:62): avc: denied { noatsecure } for pid=219 comm="sshd" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 13.902548][ T24] audit: type=1400 audit(1684072912.680:63): avc: denied { write } for pid=219 comm="sh" path="pipe:[13508]" dev="pipefs" ino=13508 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 13.918834][ T24] audit: type=1400 audit(1684072912.680:64): avc: denied { rlimitinh } for pid=219 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 13.937433][ T24] audit: type=1400 audit(1684072912.680:65): avc: denied { siginh } for pid=219 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.0.176' (ECDSA) to the list of known hosts. execve("./syz-executor3723039206", ["./syz-executor3723039206"], 0x7fffc5df7080 /* 10 vars */) = 0 brk(NULL) = 0x5555566bf000 brk(0x5555566bfc40) = 0x5555566bfc40 arch_prctl(ARCH_SET_FS, 0x5555566bf300) = 0 uname({sysname="Linux", nodename="syzkaller", ...}) = 0 set_tid_address(0x5555566bf5d0) = 288 set_robust_list(0x5555566bf5e0, 24) = 0 rt_sigaction(SIGRTMIN, {sa_handler=0x7f12969592b0, sa_mask=[], sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7f1296959980}, NULL, 8) = 0 rt_sigaction(SIGRT_1, {sa_handler=0x7f1296959350, sa_mask=[], sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x7f1296959980}, NULL, 8) = 0 rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0 prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor3723039206", 4096) = 28 brk(0x5555566e0c40) = 0x5555566e0c40 brk(0x5555566e1000) = 0x5555566e1000 mprotect(0x7f1296a1b000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 futex(0x7f1296a214cc, FUTEX_WAKE_PRIVATE, 1000000) = 0 mmap(NULL, 135168, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS|MAP_STACK, -1, 0) = 0x7f1296929000 mprotect(0x7f129692a000, 131072, PROT_READ|PROT_WRITE) = 0 clone(child_stack=0x7f12969493f0, flags=CLONE_VM|CLONE_FS|CLONE_FILES|CLONE_SIGHAND|CLONE_THREAD|CLONE_SYSVSEM|CLONE_SETTLS|CLONE_PARENT_SETTID|CLONE_CHILD_CLEARTID, parent_tid=[289], tls=0x7f1296949700, child_tidptr=0x7f12969499d0) = 289 futex(0x7f1296a214c8, FUTEX_WAKE_PRIVATE, 1000000) = 0 futex(0x7f1296a214cc, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000}./strace-static-x86_64: Process 289 attached [pid 289] set_robust_list(0x7f12969499e0, 24) = 0 [pid 289] mkdirat(AT_FDCWD, "./file0", 000) = 0 [pid 289] futex(0x7f1296a214cc, FUTEX_WAKE_PRIVATE, 1000000 [pid 288] <... futex resumed>) = 0 [pid 288] futex(0x7f1296a214c8, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 288] futex(0x7f1296a214cc, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 289] <... futex resumed>) = 1 [pid 289] openat(AT_FDCWD, "/dev/fuse", O_RDWR) = 3 [pid 289] futex(0x7f1296a214cc, FUTEX_WAKE_PRIVATE, 1000000 [pid 288] <... futex resumed>) = 0 [pid 288] futex(0x7f1296a214c8, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 288] futex(0x7f1296a214cc, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 289] <... futex resumed>) = 1 [pid 289] mount(NULL, "./file0", "fuse", 0, "fd=0x0000000000000003,rootmode=00000000000000000040000,user_id=00000000000000000000,group_id=0000000"...) = 0 [pid 289] futex(0x7f1296a214cc, FUTEX_WAKE_PRIVATE, 1000000 [pid 288] <... futex resumed>) = 0 [pid 288] futex(0x7f1296a214c8, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 288] futex(0x7f1296a214cc, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 289] <... futex resumed>) = 1 [pid 289] read(3, "\x38\x00\x00\x00\x1a\x00\x00\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x07\x00\x00\x00\x20\x00\x00\x00\x00\x00\x02\x00\xfb\xff\xff\x83", 8192) = 56 [pid 289] write(3, "\x50\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00\x00\x00\x00\x00\x07\x00\x00\x00\x26\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", 80) = 80 [pid 289] futex(0x7f1296a214cc, FUTEX_WAKE_PRIVATE, 1000000 [pid 288] <... futex resumed>) = 0 [pid 288] futex(0x7f1296a214c8, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 288] futex(0x7f1296a214cc, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 289] <... futex resumed>) = 1 [ 23.477618][ T24] audit: type=1400 audit(1684072922.270:66): avc: denied { execmem } for pid=288 comm="syz-executor372" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 23.496880][ T24] audit: type=1400 audit(1684072922.280:67): avc: denied { read write } for pid=288 comm="syz-executor372" name="fuse" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [pid 289] mount(NULL, "./file0/file0/file0", NULL, 0, NULL [pid 288] <... futex resumed>) = -1 ETIMEDOUT (Connection timed out) [pid 288] futex(0x7f1296a214dc, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 288] mmap(NULL, 135168, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS|MAP_STACK, -1, 0) = 0x7f1296908000 [pid 288] mprotect(0x7f1296909000, 131072, PROT_READ|PROT_WRITE) = 0 [pid 288] clone(child_stack=0x7f12969283f0, flags=CLONE_VM|CLONE_FS|CLONE_FILES|CLONE_SIGHAND|CLONE_THREAD|CLONE_SYSVSEM|CLONE_SETTLS|CLONE_PARENT_SETTID|CLONE_CHILD_CLEARTID, parent_tid=[291], tls=0x7f1296928700, child_tidptr=0x7f12969289d0) = 291 [pid 288] futex(0x7f1296a214d8, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 288] futex(0x7f1296a214dc, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000}./strace-static-x86_64: Process 291 attached [pid 291] set_robust_list(0x7f12969289e0, 24) = 0 [pid 291] read(3, "\x2e\x00\x00\x00\x01\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x21\x01\x00\x00\x00\x00\x00\x00\x66\x69\x6c\x65\x30\x00", 8224) = 46 [pid 291] futex(0x7f1296a214dc, FUTEX_WAKE_PRIVATE, 1000000 [pid 288] <... futex resumed>) = 0 [pid 288] futex(0x7f1296a214d8, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 288] futex(0x7f1296a214dc, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 291] <... futex resumed>) = 1 [ 23.520652][ T24] audit: type=1400 audit(1684072922.280:68): avc: denied { open } for pid=288 comm="syz-executor372" path="/dev/fuse" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 23.544403][ T24] audit: type=1400 audit(1684072922.280:69): avc: denied { mounton } for pid=288 comm="syz-executor372" path="/root/file0" dev="sda1" ino=1927 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 23.546561][ T289] general protection fault, probably for non-canonical address 0xdffffc0000000002: 0000 [#1] PREEMPT SMP KASAN [ 23.567289][ T24] audit: type=1400 audit(1684072922.280:70): avc: denied { mount } for pid=288 comm="syz-executor372" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 23.578520][ T289] KASAN: null-ptr-deref in range [0x0000000000000010-0x0000000000000017] [ 23.578534][ T289] CPU: 0 PID: 289 Comm: syz-executor372 Not tainted 5.10.178-syzkaller-00127-g43c801dc3325 #0 [ 23.578540][ T289] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/28/2023 [ 23.578580][ T289] RIP: 0010:step_into+0x1b9/0xec0 [ 23.633530][ T289] Code: 24 0f 85 cf 0a 00 00 44 8b 3a 43 80 3c 2c 00 74 0a 48 8b 7c 24 18 e8 56 a2 f3 ff 48 8b 9c 24 b8 00 00 00 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 0f 85 c1 0a 00 00 8b 1b 89 de 81 e6 00 00 07 [ 23.652967][ T289] RSP: 0018:ffffc9000093f820 EFLAGS: 00010202 [ 23.658864][ T289] RAX: 0000000000000002 RBX: 0000000000000010 RCX: ffff88811ea7e2c0 [ 23.666677][ T289] RDX: ffffc9000093fc98 RSI: 0000000000000000 RDI: 0000000000000000 [pid 291] write(3, "\xa0\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., 160) = 160 [pid 291] futex(0x7f1296a214dc, FUTEX_WAKE_PRIVATE, 1000000) = 1 [pid 291] futex(0x7f1296a214d8, FUTEX_WAIT_PRIVATE, 0, NULL [pid 288] <... futex resumed>) = 0 [pid 288] exit_group(0) = ? [pid 291] <... futex resumed>) = ? [ 23.674498][ T289] RBP: ffffc9000093f950 R08: ffffffff81b3ddff R09: ffffed102391c815 [ 23.682309][ T289] R10: 0000000000000000 R11: dffffc0000000001 R12: 1ffff92000127f1b [ 23.690209][ T289] R13: dffffc0000000000 R14: ffffc9000093fc60 R15: 0000000000000011 [ 23.698015][ T289] FS: 00007f1296949700(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 23.706786][ T289] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 23.713284][ T289] CR2: 00007f1296928718 CR3: 000000011eba5000 CR4: 00000000003506b0 [pid 291] +++ exited with 0 +++ [ 23.721194][ T289] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 23.728992][ T289] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 23.736800][ T289] Call Trace: [ 23.739940][ T289] ? set_root+0x3d0/0x3d0 [ 23.744107][ T289] ? __kasan_check_write+0x14/0x20 [ 23.749046][ T289] ? up_read+0x14/0x90 [ 23.752958][ T289] walk_component+0x359/0x610 [ 23.757466][ T289] ? nd_alloc_stack+0xf0/0xf0 [ 23.762211][ T289] ? security_inode_permission+0xb0/0xf0 [ 23.767673][ T289] ? inode_permission+0xf1/0x500 [ 23.772443][ T289] ? fuse_do_getattr+0x7e0/0x7e0 [ 23.777220][ T289] link_path_walk+0x5c7/0xbd0 [ 23.781737][ T289] ? handle_lookup_down+0x130/0x130 [ 23.786768][ T289] path_lookupat+0xa0/0x450 [ 23.791110][ T289] filename_lookup+0x26a/0x6f0 [ 23.795703][ T289] ? hashlen_string+0x120/0x120 [ 23.800396][ T289] ? getname_flags+0x1fd/0x520 [ 23.804989][ T289] user_path_at_empty+0x40/0x50 [ 23.809674][ T289] __se_sys_mount+0x285/0x3b0 [ 23.814189][ T289] ? __x64_sys_mount+0xd0/0xd0 [ 23.818843][ T289] ? fpu__clear_all+0x20/0x20 [ 23.823317][ T289] __x64_sys_mount+0xbf/0xd0 [ 23.827731][ T289] do_syscall_64+0x34/0x70 [ 23.831995][ T289] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 23.837713][ T289] RIP: 0033:0x7f1296997469 [ 23.841966][ T289] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 81 14 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 23.861412][ T289] RSP: 002b:00007f12969492f8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 23.869657][ T289] RAX: ffffffffffffffda RBX: 00007f1296a214c0 RCX: 00007f1296997469 [ 23.877612][ T289] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000000 [ 23.885510][ T289] RBP: 00007f12969ef01c R08: 0000000000000000 R09: 0000000000000000 [ 23.893312][ T289] R10: 0000000000000000 R11: 0000000000000246 R12: 0030656c69662f2e [ 23.901212][ T289] R13: 0000000000000003 R14: 00007f12969ef038 R15: 00007f1296a214c8 [ 23.909224][ T289] Modules linked in: [ 23.913754][ T289] ---[ end trace d9075ee4feb240b4 ]--- [ 23.919047][ T289] RIP: 0010:step_into+0x1b9/0xec0 [ 23.923931][ T289] Code: 24 0f 85 cf 0a 00 00 44 8b 3a 43 80 3c 2c 00 74 0a 48 8b 7c 24 18 e8 56 a2 f3 ff 48 8b 9c 24 b8 00 00 00 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 0f 85 c1 0a 00 00 8b 1b 89 de 81 e6 00 00 07 [ 23.943545][ T289] RSP: 0018:ffffc9000093f820 EFLAGS: 00010202 [ 23.949425][ T289] RAX: 0000000000000002 RBX: 0000000000000010 RCX: ffff88811ea7e2c0 [ 23.957366][ T289] RDX: ffffc9000093fc98 RSI: 0000000000000000 RDI: 0000000000000000 [ 23.965194][ T289] RBP: ffffc9000093f950 R08: ffffffff81b3ddff R09: ffffed102391c815 [ 23.973094][ T289] R10: 0000000000000000 R11: dffffc0000000001 R12: 1ffff92000127f1b [ 23.980901][ T289] R13: dffffc0000000000 R14: ffffc9000093fc60 R15: 0000000000000011 [ 23.988844][ T289] FS: 00007f1296949700(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 23.997765][ T289] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 24.004246][ T289] CR2: 00007f1296928718 CR3: 000000011eba5000 CR4: 00000000003506b0 [ 24.012134][ T289] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 24.019914][ T289] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 24.027766][ T289] Kernel panic - not syncing: Fatal exception [ 24.033857][ T289] Kernel Offset: disabled [ 24.037985][ T289] Rebooting in 86400 seconds..