./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor3799036575 <...> [ 4.159048][ T99] udevd[99]: starting eudev-3.2.11 [ 4.161739][ T98] udevd (98) used greatest stack depth: 23344 bytes left [ 5.289470][ T151] cmp (151) used greatest stack depth: 22992 bytes left [ 15.830142][ T28] kauditd_printk_skb: 50 callbacks suppressed [ 15.830155][ T28] audit: type=1400 audit(1684073058.772:61): avc: denied { transition } for pid=240 comm="sshd" path="/bin/sh" dev="sda1" ino=89 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 15.837006][ T28] audit: type=1400 audit(1684073058.772:62): avc: denied { noatsecure } for pid=240 comm="sshd" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 15.842914][ T28] audit: type=1400 audit(1684073058.772:63): avc: denied { write } for pid=240 comm="sh" path="pipe:[14350]" dev="pipefs" ino=14350 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 15.849917][ T28] audit: type=1400 audit(1684073058.772:64): avc: denied { rlimitinh } for pid=240 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 15.867611][ T28] audit: type=1400 audit(1684073058.772:65): avc: denied { siginh } for pid=240 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 17.856887][ T241] sshd (241) used greatest stack depth: 22640 bytes left Warning: Permanently added '10.128.0.193' (ECDSA) to the list of known hosts. execve("./syz-executor3799036575", ["./syz-executor3799036575"], 0x7ffc235306e0 /* 10 vars */) = 0 brk(NULL) = 0x555556528000 brk(0x555556528c40) = 0x555556528c40 arch_prctl(ARCH_SET_FS, 0x555556528300) = 0 uname({sysname="Linux", nodename="syzkaller", ...}) = 0 set_tid_address(0x5555565285d0) = 295 set_robust_list(0x5555565285e0, 24) = 0 rt_sigaction(SIGRTMIN, {sa_handler=0x7fb0c02512b0, sa_mask=[], sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7fb0c0251980}, NULL, 8) = 0 rt_sigaction(SIGRT_1, {sa_handler=0x7fb0c0251350, sa_mask=[], sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x7fb0c0251980}, NULL, 8) = 0 rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0 prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor3799036575", 4096) = 28 brk(0x555556549c40) = 0x555556549c40 brk(0x55555654a000) = 0x55555654a000 mprotect(0x7fb0c0313000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 futex(0x7fb0c03194cc, FUTEX_WAKE_PRIVATE, 1000000) = 0 mmap(NULL, 135168, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS|MAP_STACK, -1, 0) = 0x7fb0c0221000 mprotect(0x7fb0c0222000, 131072, PROT_READ|PROT_WRITE) = 0 clone(child_stack=0x7fb0c02413f0, flags=CLONE_VM|CLONE_FS|CLONE_FILES|CLONE_SIGHAND|CLONE_THREAD|CLONE_SYSVSEM|CLONE_SETTLS|CLONE_PARENT_SETTID|CLONE_CHILD_CLEARTID, parent_tid=[296], tls=0x7fb0c0241700, child_tidptr=0x7fb0c02419d0) = 296 futex(0x7fb0c03194c8, FUTEX_WAKE_PRIVATE, 1000000) = 0 futex(0x7fb0c03194cc, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000}./strace-static-x86_64: Process 296 attached [pid 296] set_robust_list(0x7fb0c02419e0, 24) = 0 [pid 296] mkdirat(AT_FDCWD, "./file0", 000) = 0 [pid 296] futex(0x7fb0c03194cc, FUTEX_WAKE_PRIVATE, 1000000 [pid 295] <... futex resumed>) = 0 [pid 295] futex(0x7fb0c03194c8, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 295] futex(0x7fb0c03194cc, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 296] <... futex resumed>) = 1 [pid 296] openat(AT_FDCWD, "/dev/fuse", O_RDWR) = 3 [pid 296] futex(0x7fb0c03194cc, FUTEX_WAKE_PRIVATE, 1000000 [pid 295] <... futex resumed>) = 0 [pid 295] futex(0x7fb0c03194c8, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 295] futex(0x7fb0c03194cc, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 296] <... futex resumed>) = 1 [pid 296] mount(NULL, "./file0", "fuse", 0, "fd=0x0000000000000003,rootmode=00000000000000000040000,user_id=00000000000000000000,group_id=0000000"...) = 0 [pid 296] futex(0x7fb0c03194cc, FUTEX_WAKE_PRIVATE, 1000000 [pid 295] <... futex resumed>) = 0 [pid 295] futex(0x7fb0c03194c8, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 295] futex(0x7fb0c03194cc, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 296] <... futex resumed>) = 1 [pid 296] read(3, "\x68\x00\x00\x00\x1a\x00\x00\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x07\x00\x00\x00\x25\x00\x00\x00\x00\x00\x02\x00\xfb\xff\xff\x73\x01\x00\x00\x80\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., 8192) = 104 [pid 296] write(3, "\x50\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00\x00\x00\x00\x00\x07\x00\x00\x00\x26\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", 80) = 80 [pid 296] futex(0x7fb0c03194cc, FUTEX_WAKE_PRIVATE, 1000000 [pid 295] <... futex resumed>) = 0 [pid 295] futex(0x7fb0c03194c8, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 295] futex(0x7fb0c03194cc, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 296] <... futex resumed>) = 1 [ 25.662830][ T28] audit: type=1400 audit(1684073068.602:66): avc: denied { execmem } for pid=295 comm="syz-executor379" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 25.682198][ T28] audit: type=1400 audit(1684073068.612:67): avc: denied { read write } for pid=295 comm="syz-executor379" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [pid 296] mount(NULL, "./file0/file0/file0", NULL, 0, NULL [pid 295] <... futex resumed>) = -1 ETIMEDOUT (Connection timed out) [pid 295] futex(0x7fb0c03194dc, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 295] mmap(NULL, 135168, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS|MAP_STACK, -1, 0) = 0x7fb0c0200000 [pid 295] mprotect(0x7fb0c0201000, 131072, PROT_READ|PROT_WRITE) = 0 [pid 295] clone(child_stack=0x7fb0c02203f0, flags=CLONE_VM|CLONE_FS|CLONE_FILES|CLONE_SIGHAND|CLONE_THREAD|CLONE_SYSVSEM|CLONE_SETTLS|CLONE_PARENT_SETTID|CLONE_CHILD_CLEARTID, parent_tid=[299], tls=0x7fb0c0220700, child_tidptr=0x7fb0c02209d0) = 299 [pid 295] futex(0x7fb0c03194d8, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 295] futex(0x7fb0c03194dc, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000}./strace-static-x86_64: Process 299 attached [pid 299] set_robust_list(0x7fb0c02209e0, 24) = 0 [pid 299] read(3, "\x2e\x00\x00\x00\x01\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x28\x01\x00\x00\x00\x00\x00\x00\x66\x69\x6c\x65\x30\x00", 8224) = 46 [pid 299] futex(0x7fb0c03194dc, FUTEX_WAKE_PRIVATE, 1000000 [pid 295] <... futex resumed>) = 0 [pid 295] futex(0x7fb0c03194d8, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 295] futex(0x7fb0c03194dc, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 299] <... futex resumed>) = 1 [ 25.705633][ T28] audit: type=1400 audit(1684073068.612:68): avc: denied { open } for pid=295 comm="syz-executor379" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 25.729069][ T28] audit: type=1400 audit(1684073068.612:69): avc: denied { mounton } for pid=295 comm="syz-executor379" path="/root/file0" dev="sda1" ino=1927 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 25.733390][ T296] general protection fault, probably for non-canonical address 0xdffffc0000000002: 0000 [#1] PREEMPT SMP KASAN [ 25.751843][ T28] audit: type=1400 audit(1684073068.612:70): avc: denied { mount } for pid=295 comm="syz-executor379" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 25.763087][ T296] KASAN: null-ptr-deref in range [0x0000000000000010-0x0000000000000017] [ 25.763102][ T296] CPU: 1 PID: 296 Comm: syz-executor379 Not tainted 6.1.25-syzkaller-00149-g6f4553626dbd #0 [ 25.763121][ T296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/28/2023 [ 25.763133][ T296] RIP: 0010:step_into+0x1c4/0x1090 [ 25.818023][ T296] Code: c0 0f 85 bb 0b 00 00 44 8b 3b 43 80 3c 34 00 74 0a 48 8b 7c 24 10 e8 5b 23 f3 ff 48 8b 9c 24 d8 00 00 00 48 89 d8 48 c1 e8 03 <42> 0f b6 04 30 84 c0 0f 85 a8 0b 00 00 8b 1b 89 de 81 e6 00 00 07 [ 25.837487][ T296] RSP: 0018:ffffc90000e378a0 EFLAGS: 00010202 [ 25.843371][ T296] RAX: 0000000000000002 RBX: 0000000000000010 RCX: ffff88810f235f00 [ 25.851172][ T296] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [pid 299] write(3, "\xa0\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., 160) = 160 [pid 299] futex(0x7fb0c03194dc, FUTEX_WAKE_PRIVATE, 1000000) = 1 [pid 299] futex(0x7fb0c03194d8, FUTEX_WAIT_PRIVATE, 0, NULL [pid 295] <... futex resumed>) = 0 [pid 295] exit_group(0) = ? [pid 299] <... futex resumed>) = ? [pid 299] +++ exited with 0 +++ [ 25.858987][ T296] RBP: ffffc90000e379f0 R08: ffffffff81c5d769 R09: ffffed10223b0395 [ 25.866795][ T296] R10: 0000000000000000 R11: dffffc0000000001 R12: 1ffff920001c6f2f [ 25.874609][ T296] R13: ffffc90000e37c20 R14: dffffc0000000000 R15: 0000000000000011 [ 25.882581][ T296] FS: 00007fb0c0241700(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 25.891348][ T296] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 25.897798][ T296] CR2: 00007fb0c0220718 CR3: 00000001223c5000 CR4: 00000000003506a0 [ 25.905674][ T296] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 25.913482][ T296] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 25.921572][ T296] Call Trace: [ 25.924676][ T296] [ 25.927452][ T296] ? __lookup_slow+0x36e/0x3e0 [ 25.932052][ T296] ? lookup_one_len+0x2c0/0x2c0 [ 25.936738][ T296] ? set_root+0x400/0x400 [ 25.940903][ T296] ? up_read+0x5a/0x180 [ 25.944899][ T296] link_path_walk+0x72c/0xee0 [ 25.949676][ T296] ? handle_lookup_down+0x130/0x130 [ 25.954707][ T296] path_lookupat+0xa0/0x450 [ 25.959047][ T296] filename_lookup+0x251/0x600 [ 25.963646][ T296] ? hashlen_string+0x120/0x120 [ 25.968332][ T296] ? strncpy_from_user+0x169/0x2b0 [ 25.973278][ T296] ? getname_flags+0x1fd/0x520 [ 25.977877][ T296] user_path_at_empty+0x43/0x1a0 [ 25.982650][ T296] __se_sys_mount+0x285/0x3b0 [ 25.987165][ T296] ? __x64_sys_mount+0xd0/0xd0 [ 25.991764][ T296] ? fpregs_restore_userregs+0x130/0x290 [ 25.997231][ T296] __x64_sys_mount+0xbf/0xd0 [ 26.001658][ T296] do_syscall_64+0x3d/0xb0 [ 26.005910][ T296] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 26.011641][ T296] RIP: 0033:0x7fb0c028f469 [ 26.015891][ T296] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 81 14 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 26.035419][ T296] RSP: 002b:00007fb0c02412f8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 26.043665][ T296] RAX: ffffffffffffffda RBX: 00007fb0c03194c0 RCX: 00007fb0c028f469 [ 26.051479][ T296] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000000 [ 26.059289][ T296] RBP: 00007fb0c02e701c R08: 0000000000000000 R09: 0000000000000000 [ 26.067185][ T296] R10: 0000000000000000 R11: 0000000000000246 R12: 0030656c69662f2e [ 26.074998][ T296] R13: 0000000000000003 R14: 00007fb0c02e7038 R15: 00007fb0c03194c8 [ 26.082814][ T296] [ 26.085670][ T296] Modules linked in: [ 26.089799][ T296] ---[ end trace 0000000000000000 ]--- [ 26.095159][ T296] RIP: 0010:step_into+0x1c4/0x1090 [ 26.100150][ T296] Code: c0 0f 85 bb 0b 00 00 44 8b 3b 43 80 3c 34 00 74 0a 48 8b 7c 24 10 e8 5b 23 f3 ff 48 8b 9c 24 d8 00 00 00 48 89 d8 48 c1 e8 03 <42> 0f b6 04 30 84 c0 0f 85 a8 0b 00 00 8b 1b 89 de 81 e6 00 00 07 [ 26.119602][ T296] RSP: 0018:ffffc90000e378a0 EFLAGS: 00010202 [ 26.125451][ T296] RAX: 0000000000000002 RBX: 0000000000000010 RCX: ffff88810f235f00 [ 26.133321][ T296] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 26.141106][ T296] RBP: ffffc90000e379f0 R08: ffffffff81c5d769 R09: ffffed10223b0395 [ 26.149058][ T296] R10: 0000000000000000 R11: dffffc0000000001 R12: 1ffff920001c6f2f [ 26.156855][ T296] R13: ffffc90000e37c20 R14: dffffc0000000000 R15: 0000000000000011 [ 26.164627][ T296] FS: 00007fb0c0241700(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 26.173533][ T296] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 26.179922][ T296] CR2: 00007fb0c0220718 CR3: 00000001223c5000 CR4: 00000000003506a0 [ 26.187830][ T296] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 26.195605][ T296] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 26.203464][ T296] Kernel panic - not syncing: Fatal exception [ 26.209507][ T296] Kernel Offset: disabled [ 26.213636][ T296] Rebooting in 86400 seconds..