./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor308513831 <...> Warning: Permanently added '10.128.1.19' (ED25519) to the list of known hosts. execve("./syz-executor308513831", ["./syz-executor308513831"], 0x7ffd72572360 /* 10 vars */) = 0 brk(NULL) = 0x555569a23000 brk(0x555569a23d00) = 0x555569a23d00 arch_prctl(ARCH_SET_FS, 0x555569a23380) = 0 set_tid_address(0x555569a23650) = 296 set_robust_list(0x555569a23660, 24) = 0 rseq(0x555569a23ca0, 0x20, 0, 0x53053053) = -1 ENOSYS (Function not implemented) prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor308513831", 4096) = 27 getrandom("\x0a\x15\xff\xbd\x24\xf0\x0d\x22", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x555569a23d00 brk(0x555569a44d00) = 0x555569a44d00 brk(0x555569a45000) = 0x555569a45000 mprotect(0x7f04e9b58000, 16384, PROT_READ) = 0 mmap(0x1ffffffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffffffff000 mmap(0x200000000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0executing program ) = 0x200000000000 mmap(0x200001000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200001000000 write(1, "executing program\n", 18) = 18 openat(AT_FDCWD, "/dev/kvm", O_RDWR) = 3 ioctl(3, KVM_CREATE_VM, 0) = 4 ioctl(4, KVM_CREATE_VCPU, 3) = 5 [ 23.150865][ T36] audit: type=1400 audit(1752716565.630:64): avc: denied { execmem } for pid=296 comm="syz-executor308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 23.151755][ T296] kvm_intel: L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=0, flags=0, guest_phys_addr=0, memory_size=4096, userspace_addr=0x200000fe8000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=1, flags=0, guest_phys_addr=0x1000, memory_size=4096, userspace_addr=0x200000fe9000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=2, flags=0, guest_phys_addr=0x2000, memory_size=4096, userspace_addr=0x200000fea000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=3, flags=0, guest_phys_addr=0x3000, memory_size=4096, userspace_addr=0x200000feb000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=4, flags=0, guest_phys_addr=0x4000, memory_size=4096, userspace_addr=0x200000fec000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=5, flags=0, guest_phys_addr=0x5000, memory_size=4096, userspace_addr=0x200000fed000}) = 0 [ 23.170830][ T36] audit: type=1400 audit(1752716565.630:65): avc: denied { read write } for pid=296 comm="syz-executor308" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 23.217813][ T36] audit: type=1400 audit(1752716565.630:66): avc: denied { open } for pid=296 comm="syz-executor308" path="/dev/kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=6, flags=0, guest_phys_addr=0x6000, memory_size=4096, userspace_addr=0x200000fee000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=7, flags=0, guest_phys_addr=0x7000, memory_size=4096, userspace_addr=0x200000fef000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=8, flags=0, guest_phys_addr=0x8000, memory_size=4096, userspace_addr=0x200000ff0000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=9, flags=0, guest_phys_addr=0x9000, memory_size=4096, userspace_addr=0x200000ff1000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=10, flags=0, guest_phys_addr=0xfec00000, memory_size=4096, userspace_addr=0x200000ff2000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=11, flags=0, guest_phys_addr=0xb000, memory_size=4096, userspace_addr=0x200000ff3000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=12, flags=0, guest_phys_addr=0xc000, memory_size=4096, userspace_addr=0x200000ff4000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=13, flags=0, guest_phys_addr=0xd000, memory_size=4096, userspace_addr=0x200000ff5000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=14, flags=0, guest_phys_addr=0xe000, memory_size=4096, userspace_addr=0x200000ff6000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=15, flags=0, guest_phys_addr=0xf000, memory_size=4096, userspace_addr=0x200000ff7000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=16, flags=0, guest_phys_addr=0x10000, memory_size=4096, userspace_addr=0x200000ff8000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=17, flags=0, guest_phys_addr=0x11000, memory_size=4096, userspace_addr=0x200000ff9000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=18, flags=0, guest_phys_addr=0x12000, memory_size=4096, userspace_addr=0x200000ffa000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=19, flags=0, guest_phys_addr=0x13000, memory_size=4096, userspace_addr=0x200000ffb000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=20, flags=0, guest_phys_addr=0x14000, memory_size=4096, userspace_addr=0x200000ffc000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=21, flags=0, guest_phys_addr=0x15000, memory_size=4096, userspace_addr=0x200000ffd000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=22, flags=0, guest_phys_addr=0x16000, memory_size=4096, userspace_addr=0x200000ffe000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=23, flags=0, guest_phys_addr=0x17000, memory_size=4096, userspace_addr=0x200000fff000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=65537, flags=0, guest_phys_addr=0x30000, memory_size=65536, userspace_addr=0x200000fe8000}) = 0 ioctl(5, KVM_GET_SREGS, {cs={base=0xffff0000, limit=65535, selector=61440, type=11, present=1, dpl=0, db=0, s=1, l=0, g=0, avl=0}, ...}) = 0 openat(AT_FDCWD, "/dev/kvm", O_RDWR) = 6 ioctl(6, KVM_GET_SUPPORTED_CPUID, {nent=31, entries=[...]}) = 0 ioctl(5, KVM_SET_CPUID2, {nent=31, entries=[...]}) = 0 close(6) = 0 ioctl(5, KVM_SET_MSRS, 0x7ffc9951df50) = 5 ioctl(5, KVM_SET_SREGS, {cs={base=0, limit=1048575, selector=48, type=11, present=1, dpl=0, db=1, s=1, l=0, g=0, avl=0}, ...}) = 0 ioctl(5, KVM_SET_REGS, {rax=0, ..., rsp=0xf80, rbp=0, ..., rip=0, rflags=0x2}) = 0 ioctl(5, KVM_SET_REGS, {rax=0x3, ..., rsp=0x8000000000000001, rbp=0x80000001, ..., rip=0, rflags=0x2280}) = 0 ioctl(5, KVM_RUN, 0) = 0 socket(AF_PACKET, SOCK_RAW, htons(0 /* ETH_P_??? */)) = 6 [ 23.241124][ T36] audit: type=1400 audit(1752716565.630:67): avc: denied { ioctl } for pid=296 comm="syz-executor308" path="/dev/kvm" dev="devtmpfs" ino=13 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 mmap(0x200000fe8000, 8192, PROT_READ|PROT_EXEC, MAP_SHARED_VALIDATE|MAP_FIXED, 6, 0x836f3000) = -1 EINVAL (Invalid argument) ioctl(5, KVM_RUN, 0) = -1 EFAULT (Bad address) [ 23.304827][ T36] audit: type=1400 audit(1752716565.780:68): avc: denied { create } for pid=296 comm="syz-executor308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 23.325004][ T36] audit: type=1400 audit(1752716565.810:69): avc: denied { map } for pid=296 comm="syz-executor308" path="socket:[1703]" dev="sockfs" ino=1703 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 23.348969][ T296] ------------[ cut here ]------------ [ 23.349157][ T36] audit: type=1400 audit(1752716565.810:70): avc: denied { read accept } for pid=296 comm="syz-executor308" path="socket:[1703]" dev="sockfs" ino=1703 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 23.354471][ T296] WARNING: CPU: 0 PID: 296 at arch/x86/kvm/x86.c:11569 kvm_arch_vcpu_ioctl_run+0x12af/0x1aa0 [ 23.388586][ T296] Modules linked in: [ 23.392521][ T296] CPU: 0 UID: 0 PID: 296 Comm: syz-executor308 Not tainted 6.12.30-syzkaller-g3bff0858a069 #0 051941c7a2def972631bf72fe68480c4884f2578 [ 23.406356][ T296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 23.416442][ T296] RIP: 0010:kvm_arch_vcpu_ioctl_run+0x12af/0x1aa0 [ 23.422882][ T296] Code: 7e 3b e8 04 e6 69 00 49 bd 00 00 00 00 00 fc ff df 4c 8b 7c 24 20 4c 8b 64 24 40 48 8b 5c 24 28 e9 26 fd ff ff e8 e1 e5 69 00 <0f> 0b e9 e4 fc ff ff e8 d5 e5 69 00 0f 0b e9 0e fd ff ff e8 c9 e5 [ 23.442509][ T296] RSP: 0018:ffffc9000128f9c0 EFLAGS: 00010293 [ 23.448572][ T296] RAX: ffffffff811bc51f RBX: ffff8881023ca180 RCX: ffff888129cba600 [ 23.456558][ T296] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 [ 23.464541][ T296] RBP: ffffc9000128fc70 R08: ffff888129cba607 R09: 1ffff110253974c0 [ 23.472541][ T296] R10: dffffc0000000000 R11: ffffed10253974c1 R12: ffff888129cae000 [ 23.480528][ T296] R13: dffffc0000000000 R14: 0000000000000001 R15: ffff8881023ca1f8 [ 23.488494][ T296] FS: 0000555569a23380(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 23.497433][ T296] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 23.504030][ T296] CR2: 000000005200000c CR3: 0000000102fdc000 CR4: 00000000003526b0 [ 23.512020][ T296] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 23.520007][ T296] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 23.527967][ T296] Call Trace: [ 23.531253][ T296] [ 23.534173][ T296] ? save_fpregs_to_fpstate+0x196/0x230 [ 23.539737][ T296] ? __cfi_kvm_arch_vcpu_ioctl_run+0x10/0x10 [ 23.545747][ T296] ? __cfi___switch_to+0x10/0x10 [ 23.550824][ T296] ? ioctl_has_perm+0x1aa/0x4d0 [ 23.555706][ T296] ? __asan_memcpy+0x5a/0x80 [ 23.560320][ T296] ? ioctl_has_perm+0x3e0/0x4d0 [ 23.565172][ T296] ? has_cap_mac_admin+0xd0/0xd0 [ 23.570130][ T296] ? __kasan_check_write+0x18/0x20 [ 23.575239][ T296] ? mutex_lock_killable+0x92/0x1c0 [ 23.580447][ T296] ? __cfi_mutex_lock_killable+0x10/0x10 [ 23.586076][ T296] kvm_vcpu_ioctl+0x96f/0xee0 [ 23.590776][ T296] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 23.595971][ T296] ? _raw_spin_lock_irq+0x8d/0x120 [ 23.601087][ T296] ? __cfi__raw_spin_lock_irq+0x10/0x10 [ 23.606626][ T296] ? __asan_memset+0x39/0x50 [ 23.611227][ T296] ? ptrace_stop+0x6c9/0x8c0 [ 23.615820][ T296] ? _raw_spin_unlock_irq+0x45/0x70 [ 23.621033][ T296] ? ptrace_notify+0x1e8/0x270 [ 23.625791][ T296] ? bpf_lsm_file_ioctl+0xd/0x20 [ 23.630735][ T296] ? security_file_ioctl+0x34/0xd0 [ 23.635845][ T296] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 23.641052][ T296] __se_sys_ioctl+0x135/0x1b0 [ 23.645724][ T296] __x64_sys_ioctl+0x7f/0xa0 [ 23.650329][ T296] x64_sys_call+0x1878/0x2ee0 [ 23.655003][ T296] do_syscall_64+0x58/0xf0 [ 23.659395][ T296] ? clear_bhb_loop+0x50/0xa0 [ 23.664075][ T296] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 23.669980][ T296] RIP: 0033:0x7f04e9ae5439 [ 23.674395][ T296] Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 23.694014][ T296] RSP: 002b:00007ffc9951faa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 ioctl(5, KVM_RUN, 0) = -1 EFAULT (Bad address) exit_group(0) = ? +++ exited with 0 +++ [ 23.702445][ T296] RAX: ffffffffffffffda RBX: