./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor1682605307 <...> Warning: Permanently added '10.128.1.197' (ED25519) to the list of known hosts. execve("./syz-executor1682605307", ["./syz-executor1682605307"], 0x7ffe81377ce0 /* 10 vars */) = 0 brk(NULL) = 0x55557fcc7000 brk(0x55557fcc7d40) = 0x55557fcc7d40 arch_prctl(ARCH_SET_FS, 0x55557fcc73c0) = 0 set_tid_address(0x55557fcc7690) = 282 set_robust_list(0x55557fcc76a0, 24) = 0 rseq(0x55557fcc7ce0, 0x20, 0, 0x53053053) = -1 ENOSYS (Function not implemented) prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor1682605307", 4096) = 28 getrandom("\xac\x8a\xdc\x7a\x54\xf6\xda\x94", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x55557fcc7d40 brk(0x55557fce8d40) = 0x55557fce8d40 brk(0x55557fce9000) = 0x55557fce9000 mprotect(0x7f0fe7dd2000, 16384, PROT_READ) = 0 mmap(0x1ffffffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffffffff000 mmap(0x200000000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200000000000 mmap(0x200001000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200001000000 write(1, "executing program\n", 18executing program ) = 18 futex(0x7f0fe7dd83ec, FUTEX_WAKE_PRIVATE, 1000000) = 0 rt_sigaction(SIGRT_1, {sa_handler=0x7f0fe7d713e0, sa_mask=[], sa_flags=SA_RESTORER|SA_ONSTACK|SA_RESTART|SA_SIGINFO, sa_restorer=0x7f0fe7d62a60}, NULL, 8) = 0 rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0 mmap(NULL, 135168, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS|MAP_STACK, -1, 0) = 0x7f0fe7ced000 mprotect(0x7f0fe7cee000, 131072, PROT_READ|PROT_WRITE) = 0 rt_sigprocmask(SIG_BLOCK, ~[], [], 8) = 0 clone3({flags=CLONE_VM|CLONE_FS|CLONE_FILES|CLONE_SIGHAND|CLONE_THREAD|CLONE_SYSVSEM|CLONE_SETTLS|CLONE_PARENT_SETTID|CLONE_CHILD_CLEARTID, child_tid=0x7f0fe7d0d990, parent_tid=0x7f0fe7d0d990, exit_signal=0, stack=0x7f0fe7ced000, stack_size=0x20300, tls=0x7f0fe7d0d6c0}./strace-static-x86_64: Process 283 attached => {parent_tid=[283]}, 88) = 283 [pid 283] set_robust_list(0x7f0fe7d0d9a0, 24 [pid 282] rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0 [pid 282] futex(0x7f0fe7dd83e8, FUTEX_WAKE_PRIVATE, 1000000 [pid 283] <... set_robust_list resumed>) = 0 [pid 282] <... futex resumed>) = 0 [pid 283] rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0 [pid 282] futex(0x7f0fe7dd83ec, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 283] mkdirat(AT_FDCWD, "./file0", 000) = 0 [pid 283] futex(0x7f0fe7dd83ec, FUTEX_WAKE_PRIVATE, 1000000) = 1 [pid 283] futex(0x7f0fe7dd83e8, FUTEX_WAIT_PRIVATE, 0, NULL [pid 282] <... futex resumed>) = 0 [pid 282] futex(0x7f0fe7dd83e8, FUTEX_WAKE_PRIVATE, 1000000) = 1 [pid 282] futex(0x7f0fe7dd83ec, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 283] <... futex resumed>) = 0 [pid 283] openat(AT_FDCWD, "/dev/fuse", O_RDWR|O_CREAT, 000) = 3 [pid 283] futex(0x7f0fe7dd83ec, FUTEX_WAKE_PRIVATE, 1000000) = 1 [pid 282] <... futex resumed>) = 0 [pid 282] futex(0x7f0fe7dd83e8, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 282] futex(0x7f0fe7dd83ec, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 283] mount(NULL, "./file0", "fuse", 0, "fd=0x0000000000000003,rootmode=00000000000000000040000,user_id=00000000000000000000,group_id=0000000"...) = 0 [pid 283] futex(0x7f0fe7dd83ec, FUTEX_WAKE_PRIVATE, 1000000 [pid 282] <... futex resumed>) = 0 [pid 282] futex(0x7f0fe7dd83e8, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 282] futex(0x7f0fe7dd83ec, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 283] <... futex resumed>) = 1 [ 26.663384][ T24] audit: type=1400 audit(1756392191.470:64): avc: denied { execmem } for pid=282 comm="syz-executor168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [pid 283] openat2(AT_FDCWD, "./file0/file1", {flags=O_RDONLY|O_NOCTTY|O_SYNC|O_NOATIME, resolve=0}, 24 [pid 282] <... futex resumed>) = -1 ETIMEDOUT (Connection timed out) [pid 282] futex(0x7f0fe7dd83fc, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 282] mmap(NULL, 135168, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS|MAP_STACK, -1, 0) = 0x7f0fe7ccc000 [pid 282] mprotect(0x7f0fe7ccd000, 131072, PROT_READ|PROT_WRITE) = 0 [pid 282] rt_sigprocmask(SIG_BLOCK, ~[], [], 8) = 0 [pid 282] clone3({flags=CLONE_VM|CLONE_FS|CLONE_FILES|CLONE_SIGHAND|CLONE_THREAD|CLONE_SYSVSEM|CLONE_SETTLS|CLONE_PARENT_SETTID|CLONE_CHILD_CLEARTID, child_tid=0x7f0fe7cec990, parent_tid=0x7f0fe7cec990, exit_signal=0, stack=0x7f0fe7ccc000, stack_size=0x20300, tls=0x7f0fe7cec6c0} => {parent_tid=[285]}, 88) = 285 [pid 282] rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0 [pid 282] futex(0x7f0fe7dd83f8, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 282] futex(0x7f0fe7dd83fc, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000}./strace-static-x86_64: Process 285 attached [pid 285] set_robust_list(0x7f0fe7cec9a0, 24) = 0 [pid 285] rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0 [pid 285] read(3, "\x38\x00\x00\x00\x1a\x00\x00\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x07\x00\x00\x00\x20\x00\x00\x00\x00\x00\x02\x00\xfb\xff\xff\x83", 8224) = 56 [pid 285] futex(0x7f0fe7dd83fc, FUTEX_WAKE_PRIVATE, 1000000 [pid 282] <... futex resumed>) = 0 [pid 282] futex(0x7f0fe7dd83f8, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 282] futex(0x7f0fe7dd83fc, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 285] <... futex resumed>) = 1 [pid 285] write(3, "\x50\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00\x00\x00\x00\x00\x07\x00\x00\x00\x1f\x00\x00\x00\x00\x00\x04\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", 80) = 80 [pid 285] futex(0x7f0fe7dd83fc, FUTEX_WAKE_PRIVATE, 1000000 [pid 282] <... futex resumed>) = 0 [pid 282] futex(0x7f0fe7dd83f8, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 282] futex(0x7f0fe7dd83fc, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 285] <... futex resumed>) = 1 [pid 285] read(3, "\x2e\x00\x00\x00\x01\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1b\x01\x00\x00\x00\x00\x00\x00\x66\x69\x6c\x65\x31\x00", 8192) = 46 [ 26.697771][ T24] audit: type=1400 audit(1756392191.500:65): avc: denied { read write } for pid=282 comm="syz-executor168" name="fuse" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 26.721797][ T24] audit: type=1400 audit(1756392191.500:66): avc: denied { open } for pid=282 comm="syz-executor168" path="/dev/fuse" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 26.748310][ T24] audit: type=1400 audit(1756392191.500:67): avc: denied { mounton } for pid=282 comm="syz-executor168" path="/root/file0" dev="sda1" ino=2024 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 26.758091][ T283] general protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] PREEMPT SMP KASAN [ 26.771894][ T24] audit: type=1400 audit(1756392191.500:68): avc: denied { mount } for pid=282 comm="syz-executor168" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 26.783677][ T283] KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f] [ 26.783702][ T283] CPU: 0 PID: 283 Comm: syz-executor168 Not tainted 5.10.240-syzkaller #0 [ 26.783707][ T283] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 26.783739][ T283] RIP: 0010:path_openat+0x1738/0x3160 [ 26.783749][ T283] Code: ae 61 02 00 49 63 de 4c 8b 74 24 38 e9 86 fb ff ff e8 ec 79 bb ff 44 8b 6c 24 14 44 8b a4 24 80 00 00 00 48 89 d8 48 c1 e8 03 <42> 0f b6 04 38 84 c0 0f 85 75 09 00 00 44 8b 33 be 00 00 70 00 44 [pid 285] write(3, "\x98\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\xfc\xff\xff\xff\xff\xff\xff\xff\x00\x00\x20\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfc\xff\xff\xff\xff\xff\xff\xff\xfe\xff\xff\xff\xff\xff\xff\xdf\x09\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\xff"..., 152 [pid 282] <... futex resumed>) = -1 ETIMEDOUT (Connection timed out) [pid 285] <... write resumed>) = 152 [pid 285] futex(0x7f0fe7dd83fc, FUTEX_WAKE_PRIVATE, 1000000) = 0 [ 26.783766][ T283] RSP: 0018:ffffc90000b37960 EFLAGS: 00010202 [ 26.808722][ T24] audit: type=1400 audit(1756392191.560:69): avc: denied { read } for pid=77 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 26.815734][ T283] [ 26.815744][ T283] RAX: 0000000000000001 RBX: 0000000000000008 RCX: ffff888107ffe2c0 [ 26.815750][ T283] RDX: 0000000000000000 RSI: 0000000000000003 RDI: ffff888107ffe2c0 [ 26.815755][ T283] RBP: ffffc90000b37b70 R08: dffffc0000000000 R09: ffffed102428f3a4 [ 26.815761][ T283] R10: ffffed102428f3a4 R11: 1ffff1102428f3a3 R12: 0000000000000000 [ 26.815766][ T283] R13: 0000000000000000 R14: ffff88811be9ac18 R15: dffffc0000000000 [ 26.815774][ T283] FS: 00007f0fe7d0d6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 26.815780][ T283] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 26.815786][ T283] CR2: 0000200000006000 CR3: 000000011de7f000 CR4: 00000000003506b0 [ 26.815793][ T283] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 26.815799][ T283] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 26.815802][ T283] Call Trace: [ 26.815822][ T283] ? __stack_depot_save+0x479/0x4c0 [ 26.815843][ T283] ? do_filp_open+0x3e0/0x3e0 [ 26.825474][ T24] audit: type=1400 audit(1756392191.560:70): avc: denied { search } for pid=77 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 26.835401][ T283] do_filp_open+0x1b3/0x3e0 [pid 285] futex(0x7f0fe7dd83f8, FUTEX_WAIT_PRIVATE, 0, NULL [pid 282] exit_group(0) = ? [pid 285] <... futex resumed>) = ? [pid 285] +++ exited with 0 +++ [ 26.835413][ T283] ? vfs_tmpfile+0x2c0/0x2c0 [ 26.835424][ T283] ? get_unused_fd_flags+0x92/0xa0 [ 26.835432][ T283] do_sys_openat2+0x14c/0x6d0 [ 26.835440][ T283] ? do_sys_open+0xe0/0xe0 [ 26.835451][ T283] ? __kasan_check_write+0x14/0x20 [ 26.835461][ T283] ? _copy_from_user+0x95/0xd0 [ 26.835469][ T283] __x64_sys_openat2+0x20e/0x270 [ 26.835476][ T283] ? __ia32_sys_openat+0x160/0x160 [ 26.835499][ T283] ? debug_smp_processor_id+0x17/0x20 [ 26.841486][ T24] audit: type=1400 audit(1756392191.560:71): avc: denied { write } for pid=77 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 26.860553][ T283] ? syscall_trace_enter+0x4b/0x170 [ 26.860565][ T283] do_syscall_64+0x31/0x40 [ 26.860577][ T283] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 26.860586][ T283] RIP: 0033:0x7f0fe7d4b539 [ 26.860598][ T283] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 c1 17 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 26.860615][ T283] RSP: 002b:00007f0fe7d0d218 EFLAGS: 00000246 [ 26.867064][ T24] audit: type=1400 audit(1756392191.560:72): avc: denied { add_name } for pid=77 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 26.888781][ T283] ORIG_RAX: 00000000000001b5 [ 26.888791][ T283] RAX: ffffffffffffffda RBX: 00007f0fe7dd83e8 RCX: 00007f0fe7d4b539 [ 26.888797][ T283] RDX: 0000200000000100 RSI: 0000200000000000 RDI: 00000000ffffff9c [ 26.888802][ T283] RBP: 00007f0fe7dd83e0 R08: 0000000000000000 R09: 0000000000000000 [ 26.888807][ T283] R10: 0000000000000018 R11: 0000000000000246 R12: 00007f0fe7da5034 [ 26.888812][ T283] R13: 0000200000004280 R14: 00007f0fe7da300e R15: 00002000000020c0 [ 26.888820][ T283] Modules linked in: [ 26.889523][ T283] ---[ end trace 77739026dae48e03 ]--- [ 26.892098][ T24] audit: type=1400 audit(1756392191.560:73): avc: denied { create } for pid=77 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 26.900467][ T283] RIP: 0010:path_openat+0x1738/0x3160 [ 27.225157][ T283] Code: ae 61 02 00 49 63 de 4c 8b 74 24 38 e9 86 fb ff ff e8 ec 79 bb ff 44 8b 6c 24 14 44 8b a4 24 80 00 00 00 48 89 d8 48 c1 e8 03 <42> 0f b6 04 38 84 c0 0f 85 75 09 00 00 44 8b 33 be 00 00 70 00 44 [ 27.245175][ T283] RSP: 0018:ffffc90000b37960 EFLAGS: 00010202 [ 27.251329][ T283] RAX: 0000000000000001 RBX: 0000000000000008 RCX: ffff888107ffe2c0 [ 27.259376][ T283] RDX: 0000000000000000 RSI: 0000000000000003 RDI: ffff888107ffe2c0 [ 27.267390][ T283] RBP: ffffc90000b37b70 R08: dffffc0000000000 R09: ffffed102428f3a4 [ 27.275437][ T283] R10: ffffed102428f3a4 R11: 1ffff1102428f3a3 R12: 0000000000000000 [ 27.283456][ T283] R13: 0000000000000000 R14: ffff88811be9ac18 R15: dffffc0000000000 [ 27.291409][ T283] FS: 00007f0fe7d0d6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 27.300403][ T283] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 27.307181][ T283] CR2: 00007f0fe7da2118 CR3: 000000011de7f000 CR4: 00000000003506a0 [ 27.315868][ T283] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 27.323961][ T283] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 27.331926][ T283] Kernel panic - not syncing: Fatal exception [ 27.338293][ T283] Kernel Offset: disabled [ 27.342602][ T283] Rebooting in 86400 seconds..