./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor1162059287 <...> Warning: Permanently added '10.128.0.136' (ED25519) to the list of known hosts. execve("./syz-executor1162059287", ["./syz-executor1162059287"], 0x7ffef550d020 /* 10 vars */) = 0 brk(NULL) = 0x55557f482000 brk(0x55557f482d40) = 0x55557f482d40 arch_prctl(ARCH_SET_FS, 0x55557f4823c0) = 0 set_tid_address(0x55557f482690) = 287 set_robust_list(0x55557f4826a0, 24) = 0 rseq(0x55557f482ce0, 0x20, 0, 0x53053053) = -1 ENOSYS (Function not implemented) prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor1162059287", 4096) = 28 getrandom("\x61\xcf\xe4\xcb\xfe\x87\xa8\x76", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x55557f482d40 brk(0x55557f4a3d40) = 0x55557f4a3d40 brk(0x55557f4a4000) = 0x55557f4a4000 executing program mprotect(0x7feeebc78000, 16384, PROT_READ) = 0 mmap(0x1ffffffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffffffff000 mmap(0x200000000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200000000000 mmap(0x200001000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200001000000 write(1, "executing program\n", 18) = 18 futex(0x7feeebc7e3ec, FUTEX_WAKE_PRIVATE, 1000000) = 0 rt_sigaction(SIGRT_1, {sa_handler=0x7feeebc173a0, sa_mask=[], sa_flags=SA_RESTORER|SA_ONSTACK|SA_RESTART|SA_SIGINFO, sa_restorer=0x7feeebc08a20}, NULL, 8) = 0 rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0 mmap(NULL, 135168, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS|MAP_STACK, -1, 0) = 0x7feeebb93000 mprotect(0x7feeebb94000, 131072, PROT_READ|PROT_WRITE) = 0 rt_sigprocmask(SIG_BLOCK, ~[], [], 8) = 0 clone3({flags=CLONE_VM|CLONE_FS|CLONE_FILES|CLONE_SIGHAND|CLONE_THREAD|CLONE_SYSVSEM|CLONE_SETTLS|CLONE_PARENT_SETTID|CLONE_CHILD_CLEARTID, child_tid=0x7feeebbb3990, parent_tid=0x7feeebbb3990, exit_signal=0, stack=0x7feeebb93000, stack_size=0x20300, tls=0x7feeebbb36c0} => {parent_tid=[288]}, 88) = 288 rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0 futex(0x7feeebc7e3e8, FUTEX_WAKE_PRIVATE, 1000000) = 0 futex(0x7feeebc7e3ec, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000}./strace-static-x86_64: Process 288 attached [pid 288] set_robust_list(0x7feeebbb39a0, 24) = 0 [pid 288] rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0 [pid 288] mkdirat(AT_FDCWD, "./file0", 000) = 0 [pid 288] futex(0x7feeebc7e3ec, FUTEX_WAKE_PRIVATE, 1000000 [pid 287] <... futex resumed>) = 0 [pid 287] futex(0x7feeebc7e3e8, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 287] futex(0x7feeebc7e3ec, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 288] <... futex resumed>) = 1 [pid 288] openat(AT_FDCWD, "/dev/fuse", O_RDWR|O_CREAT, 000) = 3 [pid 288] futex(0x7feeebc7e3ec, FUTEX_WAKE_PRIVATE, 1000000 [pid 287] <... futex resumed>) = 0 [pid 287] futex(0x7feeebc7e3e8, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 287] futex(0x7feeebc7e3ec, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 288] <... futex resumed>) = 1 [pid 288] mount(NULL, "./file0", "fuse", 0, "fd=0x0000000000000003,rootmode=0000000000000000040000,user_id=00000000000000000000,group_id=00000000"...) = 0 [pid 288] futex(0x7feeebc7e3ec, FUTEX_WAKE_PRIVATE, 1000000 [pid 287] <... futex resumed>) = 0 [pid 287] futex(0x7feeebc7e3e8, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 287] futex(0x7feeebc7e3ec, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 288] <... futex resumed>) = 1 [pid 288] read(3, "\x68\x00\x00\x00\x1a\x00\x00\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x07\x00\x00\x00\x24\x00\x00\x00\x00\x00\x02\x00\xfb\xff\xff\x73\x01\x00\x00\x80\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., 8224) = 104 [pid 288] futex(0x7feeebc7e3ec, FUTEX_WAKE_PRIVATE, 1000000 [pid 287] <... futex resumed>) = 0 [pid 287] futex(0x7feeebc7e3e8, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 287] futex(0x7feeebc7e3ec, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 288] <... futex resumed>) = 1 [ 29.084096][ T30] audit: type=1400 audit(1754360945.667:64): avc: denied { execmem } for pid=287 comm="syz-executor116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 29.104331][ T30] audit: type=1400 audit(1754360945.667:65): avc: denied { read write } for pid=287 comm="syz-executor116" name="fuse" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [pid 288] read(3, [pid 287] <... futex resumed>) = -1 ETIMEDOUT (Connection timed out) [pid 287] futex(0x7feeebc7e3fc, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 287] mmap(NULL, 135168, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS|MAP_STACK, -1, 0) = 0x7feeebb72000 [pid 287] mprotect(0x7feeebb73000, 131072, PROT_READ|PROT_WRITE) = 0 [pid 287] rt_sigprocmask(SIG_BLOCK, ~[], [], 8) = 0 [pid 287] clone3({flags=CLONE_VM|CLONE_FS|CLONE_FILES|CLONE_SIGHAND|CLONE_THREAD|CLONE_SYSVSEM|CLONE_SETTLS|CLONE_PARENT_SETTID|CLONE_CHILD_CLEARTID, child_tid=0x7feeebb92990, parent_tid=0x7feeebb92990, exit_signal=0, stack=0x7feeebb72000, stack_size=0x20300, tls=0x7feeebb926c0} => {parent_tid=[290]}, 88) = 290 [pid 287] rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0 [pid 287] futex(0x7feeebc7e3f8, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 287] futex(0x7feeebc7e3fc, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000}./strace-static-x86_64: Process 290 attached [pid 290] set_robust_list(0x7feeebb929a0, 24) = 0 [pid 290] rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0 [pid 290] write(3, "\x50\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00\x00\x00\x00\x00\x07\x00\x00\x00\x2b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", 80) = 80 [pid 290] futex(0x7feeebc7e3fc, FUTEX_WAKE_PRIVATE, 1000000 [pid 287] <... futex resumed>) = 0 [pid 287] futex(0x7feeebc7e3f8, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 287] futex(0x7feeebc7e3fc, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 290] <... futex resumed>) = 1 [pid 290] link("./file0/../file0/file0", NULL [pid 288] <... read resumed>"\x2e\x00\x00\x00\x01\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x22\x01\x00\x00\x00\x00\x00\x00\x66\x69\x6c\x65\x30\x00", 8192) = 46 [pid 288] write(3, "\xa9\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., 169) = 169 [pid 288] futex(0x7feeebc7e3ec, FUTEX_WAKE_PRIVATE, 1000000) = 0 [ 29.128516][ T30] audit: type=1400 audit(1754360945.667:66): avc: denied { open } for pid=287 comm="syz-executor116" path="/dev/fuse" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 29.151519][ T290] general protection fault, probably for non-canonical address 0xdffffc0000000003: 0000 [#1] PREEMPT SMP KASAN [ 29.153453][ T30] audit: type=1400 audit(1754360945.667:67): avc: denied { mounton } for pid=287 comm="syz-executor116" path="/root/file0" dev="sda1" ino=2024 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 29.165698][ T290] KASAN: null-ptr-deref in range [0x0000000000000018-0x000000000000001f] [ 29.165727][ T290] CPU: 0 PID: 290 Comm: syz-executor116 Not tainted 5.15.189-syzkaller-00091-gf32b52534f1d #0 [ 29.165749][ T290] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 29.165761][ T290] RIP: 0010:step_into+0x12e/0xd10 [ 29.165816][ T290] Code: 4c 8b 74 24 18 c6 44 24 7f 00 43 0f b6 44 25 00 84 c0 0f 85 6f 0a 00 00 45 8b 36 4c 8b bc 24 a8 00 00 00 4c 89 f8 48 c1 e8 03 <42> 0f b6 04 20 84 c0 0f 85 6e 0a 00 00 45 8b 3f 44 89 fe 81 e6 00 [ 29.165832][ T290] RSP: 0018:ffffc90000a47a80 EFLAGS: 00010206 [ 29.165852][ T290] RAX: 0000000000000003 RBX: ffffc90000a47cc0 RCX: ffff8881047a62c0 [ 29.165866][ T290] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 29.165877][ T290] RBP: ffffc90000a47b88 R08: 0000000000000000 R09: ffffed10241ba9c5 [ 29.165890][ T290] R10: ffffed10241ba9c5 R11: 1ffff110241ba9c4 R12: dffffc0000000000 [ 29.189537][ T30] audit: type=1400 audit(1754360945.667:68): avc: denied { mount } for pid=287 comm="syz-executor116" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 29.198332][ T290] R13: 1ffff92000148f9f R14: 0000000000000000 R15: 0000000000000019 [ 29.198359][ T290] FS: 00007feeebb926c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 29.198377][ T290] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 29.198390][ T290] CR2: 00005600ee6cbeb8 CR3: 00000001238c9000 CR4: 00000000003506b0 [ 29.198407][ T290] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 29.211625][ T30] audit: type=1400 audit(1754360945.797:69): avc: denied { read } for pid=82 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 29.219820][ T290] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 29.219840][ T290] Call Trace: [ 29.219847][ T290] [ 29.219855][ T290] ? down_read+0xa5/0xf0 [ 29.219886][ T290] ? set_root+0x400/0x400 [ 29.225990][ T30] audit: type=1400 audit(1754360945.797:70): avc: denied { search } for pid=82 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 29.245389][ T290] ? up_read+0x56/0x1d0 [ 29.245423][ T290] walk_component+0x26a/0x460 [ 29.245446][ T290] path_lookupat+0x180/0x490 [ 29.245465][ T290] filename_lookup+0x1e2/0x4f0 [ 29.245484][ T290] ? hashlen_string+0x120/0x120 [ 29.252453][ T30] audit: type=1400 audit(1754360945.797:71): avc: denied { write } for pid=82 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 29.260823][ T290] ? __kasan_slab_free+0x11/0x20 [ 29.260863][ T290] ? slab_free_freelist_hook+0xc2/0x190 [ 29.260903][ T290] ? getname_flags+0x273/0x500 [ 29.269466][ T30] audit: type=1400 audit(1754360945.797:72): avc: denied { add_name } for pid=82 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 29.277056][ T290] do_linkat+0xed/0x730 [ 29.277088][ T290] __x64_sys_link+0x86/0x90 [ 29.277108][ T290] x64_sys_call+0x34d/0x9a0 [ 29.285957][ T30] audit: type=1400 audit(1754360945.797:73): avc: denied { create } for pid=82 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 29.308240][ T290] do_syscall_64+0x4c/0xa0 [ 29.308278][ T290] ? clear_bhb_loop+0x50/0xa0 [ 29.308298][ T290] ? clear_bhb_loop+0x50/0xa0 [ 29.308315][ T290] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 29.308335][ T290] RIP: 0033:0x7feeebbf14f9 [ 29.557154][ T290] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 c1 17 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 29.576896][ T290] RSP: 002b:00007feeebb92218 EFLAGS: 00000246 ORIG_RAX: 0000000000000056 [pid 288] futex(0x7feeebc7e3e8, FUTEX_WAIT_PRIVATE, 0, NULL [pid 287] <... futex resumed>) = -1 ETIMEDOUT (Connection timed out) [ 29.585456][ T290] RAX: ffffffffffffffda RBX: 00007feeebc7e3f8 RCX: 00007feeebbf14f9 [ 29.593540][ T290] RDX: 00007feeebbf14f9 RSI: 0000000000000000 RDI: 0000200000000280 [ 29.601636][ T290] RBP: 00007feeebc7e3f0 R08: 0000000000000000 R09: 0000000000000000 [ 29.609647][ T290] R10: 0000000000000000 R11: 0000000000000246 R12: 00007feeebc4b034 [ 29.617723][ T290] R13: 000020000000c280 R14: 0000200000000280 R15: 00007ffd9acf4f78 [ 29.626370][ T290] [ 29.629498][ T290] Modules linked in: [ 29.634186][ T290] ---[ end trace 72e32d9c4102c027 ]--- [ 29.639694][ T290] RIP: 0010:step_into+0x12e/0xd10 [ 29.645339][ T290] Code: 4c 8b 74 24 18 c6 44 24 7f 00 43 0f b6 44 25 00 84 c0 0f 85 6f 0a 00 00 45 8b 36 4c 8b bc 24 a8 00 00 00 4c 89 f8 48 c1 e8 03 <42> 0f b6 04 20 84 c0 0f 85 6e 0a 00 00 45 8b 3f 44 89 fe 81 e6 00 [ 29.665442][ T290] RSP: 0018:ffffc90000a47a80 EFLAGS: 00010206 [ 29.671549][ T290] RAX: 0000000000000003 RBX: ffffc90000a47cc0 RCX: ffff8881047a62c0 [ 29.680044][ T290] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 29.688069][ T290] RBP: ffffc90000a47b88 R08: 0000000000000000 R09: ffffed10241ba9c5 [ 29.696280][ T290] R10: ffffed10241ba9c5 R11: 1ffff110241ba9c4 R12: dffffc0000000000 [ 29.704317][ T290] R13: 1ffff92000148f9f R14: 0000000000000000 R15: 0000000000000019 [ 29.712762][ T290] FS: 00007feeebb926c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 29.721966][ T290] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 29.728752][ T290] CR2: 00007ffd9adc2020 CR3: 00000001238c9000 CR4: 00000000003506a0 [pid 287] exit_group(0 [pid 288] <... futex resumed>) = ? [pid 288] +++ exited with 0 +++ [pid 287] <... exit_group resumed>) = ? [ 29.736812][ T290] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 29.744952][ T290] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 29.752954][ T290] Kernel panic - not syncing: Fatal exception [ 29.759404][ T290] Kernel Offset: disabled [ 29.763751][ T290] Rebooting in 86400 seconds..