./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor1747112611 <...> Warning: Permanently added '10.128.0.112' (ED25519) to the list of known hosts. execve("./syz-executor1747112611", ["./syz-executor1747112611"], 0x7ffc7e8beca0 /* 10 vars */) = 0 brk(NULL) = 0x555555566000 brk(0x555555566d00) = 0x555555566d00 arch_prctl(ARCH_SET_FS, 0x555555566380) = 0 set_tid_address(0x555555566650) = 355 set_robust_list(0x555555566660, 24) = 0 rseq(0x555555566ca0, 0x20, 0, 0x53053053) = -1 ENOSYS (Function not implemented) prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor1747112611", 4096) = 28 getrandom("\xec\x0f\x29\x93\x1a\xe2\x2b\x7f", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x555555566d00 brk(0x555555587d00) = 0x555555587d00 brk(0x555555588000) = 0x555555588000 mprotect(0x7f6cea01c000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD./strace-static-x86_64: Process 356 attached , child_tidptr=0x555555566650) = 356 [pid 356] set_robust_list(0x555555566660, 24) = 0 [pid 356] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0 [pid 356] setpgid(0, 0) = 0 [pid 356] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC) = 3 [pid 356] write(3, "1000", 4) = 4 [pid 356] close(3) = 0 [pid 356] openat(AT_FDCWD, "/dev/kvm", O_RDONLY) = 3 [ 22.083984][ T23] audit: type=1400 audit(1713490273.529:66): avc: denied { execmem } for pid=355 comm="syz-executor174" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 22.109508][ T23] audit: type=1400 audit(1713490273.549:67): avc: denied { read } for pid=356 comm="syz-executor174" name="kvm" dev="devtmpfs" ino=1134 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 22.124964][ T356] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 22.132759][ T23] audit: type=1400 audit(1713490273.549:68): avc: denied { open } for pid=356 comm="syz-executor174" path="/dev/kvm" dev="devtmpfs" ino=1134 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [pid 356] ioctl(3, KVM_CREATE_VM, 0) = 4 [pid 356] ioctl(4, KVM_CREATE_VCPU, 0) = 5 [pid 356] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=0, flags=0, guest_phys_addr=0, memory_size=8192, userspace_addr=0x20000000}) = 0 [ 22.179989][ T23] audit: type=1400 audit(1713490273.569:69): avc: denied { ioctl } for pid=356 comm="syz-executor174" path="/dev/kvm" dev="devtmpfs" ino=1134 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 22.222809][ T356] BUG: kernel NULL pointer dereference, address: 0000000000000086 [ 22.230584][ T356] #PF: supervisor instruction fetch in kernel mode [ 22.236920][ T356] #PF: error_code(0x0010) - not-present page [ 22.242737][ T356] PGD 1dc4d8067 P4D 1dc4d8067 PUD 1dc4d9067 PMD 0 [ 22.249073][ T356] Oops: 0010 [#1] PREEMPT SMP KASAN [ 22.254371][ T356] CPU: 1 PID: 356 Comm: syz-executor174 Not tainted 5.4.268-syzkaller-00003-g2d5d8240a7cb #0 [ 22.264436][ T356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 22.274529][ T356] RIP: 0010:0x86 [ 22.278065][ T356] Code: Bad RIP value. [ 22.281966][ T356] RSP: 0018:ffff8881e0d0f308 EFLAGS: 00010086 [ 22.287865][ T356] RAX: ffff8881e0d0f338 RBX: dffffc0000000000 RCX: ffff8881dc93de80 [ 22.295795][ T356] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 [ 22.303598][ T356] RBP: 0000000000000270 R08: ffffffff82315341 R09: ffffffff811c9085 [ 22.311414][ T356] R10: ffff8881dc93de80 R11: 0000000000000002 R12: ffffffff84600228 [ 22.319214][ T356] R13: fffffe0000000278 R14: ffff8881dc640000 R15: fffffe000000027b [ 22.327028][ T356] FS: 0000555555566380(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 22.335801][ T356] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 22.342218][ T356] CR2: 000000000000005c CR3: 00000001dc48a000 CR4: 00000000003426a0 [ 22.350026][ T356] Call Trace: [ 22.353183][ T356] ? __die+0xb4/0x100 [ 22.356971][ T356] ? no_context+0xbda/0xe50 [ 22.361311][ T356] ? is_prefetch+0x4b0/0x4b0 [ 22.366084][ T356] ? rcu_preempt_deferred_qs+0xa4/0x2b0 [ 22.371467][ T356] ? __do_page_fault+0xa7d/0xbb0 [ 22.376253][ T356] ? vmx_spec_ctrl_restore_host+0x83/0xfd [ 22.381803][ T356] ? __bad_area_nosemaphore+0xc0/0x460 [ 22.387094][ T356] ? page_fault+0x2f/0x40 [ 22.391255][ T356] ? irq_entries_start+0x38/0x660 [ 22.396119][ T356] ? vmx_handle_exit_irqoff+0x45/0x220 [ 22.401411][ T356] ? check_preemption_disabled+0x91/0x320 [ 22.406965][ T356] ? handle_external_interrupt_irqoff+0x148/0x2f0 [ 22.413216][ T356] ? handle_external_interrupt_irqoff+0x12a/0x2f0 [ 22.419461][ T356] ? irq_entries_start+0x38/0x660 [ 22.424325][ T356] ? vcpu_enter_guest+0x2d06/0x9f70 [ 22.429359][ T356] ? find_next_and_bit+0x156/0x190 [ 22.434303][ T356] ? load_balance+0x43e1/0x7a40 [ 22.438995][ T356] ? __free_pages_ok+0x847/0x950 [ 22.443764][ T356] ? local_bh_enable+0x20/0x20 [ 22.448377][ T356] ? check_preemption_disabled+0x9f/0x320 [ 22.453922][ T356] ? update_blocked_averages+0xd50/0xd50 [ 22.459405][ T356] ? vmx_vcpu_load_vmcs+0x655/0x8b0 [ 22.464429][ T356] ? read_msr+0x40/0x40 [ 22.468698][ T356] ? update_rq_clock+0x67/0x350 [ 22.473450][ T356] ? check_preemption_disabled+0x9f/0x320 [ 22.479006][ T356] ? kvm_sched_clock_read+0x14/0x40 [ 22.484125][ T356] ? check_preemption_disabled+0x9f/0x320 [ 22.489699][ T356] ? debug_smp_processor_id+0x20/0x20 [ 22.494888][ T356] ? kvm_arch_vcpu_ioctl_run+0x748/0x18d0 [ 22.500450][ T356] ? kvm_vcpu_ioctl+0x7f9/0xd10 [ 22.505302][ T356] ? create_vcpu_fd+0x120/0x120 [ 22.510072][ T356] ? _raw_spin_lock_irq+0xa5/0x1b0 [ 22.515211][ T356] ? _raw_spin_lock_irqsave+0x210/0x210 [ 22.520749][ T356] ? cgroup_update_frozen+0x157/0xab0 [ 22.526044][ T356] ? cgroup_update_frozen+0x157/0xab0 [ 22.531246][ T356] ? cgroup_leave_frozen+0x13c/0x290 [ 22.536469][ T356] ? ptrace_stop+0x6ee/0xa30 [ 22.540885][ T356] ? create_vcpu_fd+0x120/0x120 [ 22.545571][ T356] ? do_vfs_ioctl+0x742/0x1720 [ 22.550171][ T356] ? ioctl_preallocate+0x250/0x250 [ 22.555118][ T356] ? check_preemption_disabled+0x153/0x320 [ 22.560759][ T356] ? syscall_trace_enter+0x650/0x940 [ 22.565968][ T356] ? do_syscall_64+0x1c0/0x1c0 [ 22.570565][ T356] ? switch_fpu_return+0x1d4/0x410 [ 22.575601][ T356] ? security_file_ioctl+0x7d/0xa0 [ 22.580551][ T356] ? __x64_sys_ioctl+0xd4/0x110 [ 22.585324][ T356] ? do_syscall_64+0xca/0x1c0 [ 22.589933][ T356] ? entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 22.595835][ T356] Modules linked in: [ 22.599667][ T356] CR2: 0000000000000086 [ 22.603662][ T356] ---[ end trace d3020fe48603094c ]--- [ 22.608954][ T356] RIP: 0010:0x86 [ 22.612328][ T356] Code: Bad RIP value. [ 22.616227][ T356] RSP: 0018:ffff8881e0d0f308 EFLAGS: 00010086 [ 22.622133][ T356] RAX: ffff8881e0d0f338 RBX: dffffc0000000000 RCX: ffff8881dc93de80 [ 22.629940][ T356] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 [ 22.637750][ T356] RBP: 0000000000000270 R08: ffffffff82315341 R09: ffffffff811c9085 [ 22.645649][ T356] R10: ffff8881dc93de80 R11: 0000000000000002 R12: ffffffff84600228 [ 22.653635][ T356] R13: fffffe0000000278 R14: ffff8881dc640000 R15: fffffe000000027b [ 22.661641][ T356] FS: 0000555555566380(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 22.670411][ T356] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 22.676840][ T356] CR2: 000000000000005c CR3: 00000001dc48a000 CR4: 00000000003426a0 [ 22.685205][ T356] Kernel panic - not syncing: Fatal exception [ 22.691346][ T356] Kernel Offset: disabled [ 22.695492][ T356] Rebooting in 86400 seconds..