./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor266074680 <...> Warning: Permanently added '10.128.0.16' (ED25519) to the list of known hosts. execve("./syz-executor266074680", ["./syz-executor266074680"], 0x7ffc0926ba20 /* 10 vars */) = 0 brk(NULL) = 0x55558c27b000 brk(0x55558c27bd00) = 0x55558c27bd00 arch_prctl(ARCH_SET_FS, 0x55558c27b380) = 0 set_tid_address(0x55558c27b650) = 296 set_robust_list(0x55558c27b660, 24) = 0 rseq(0x55558c27bca0, 0x20, 0, 0x53053053) = -1 ENOSYS (Function not implemented) prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor266074680", 4096) = 27 getrandom("\x3c\x2e\x6e\x37\xb4\xf8\x9f\xeb", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x55558c27bd00 brk(0x55558c29cd00) = 0x55558c29cd00 brk(0x55558c29d000) = 0x55558c29d000 mprotect(0x7ff935a45000, 16384, PROT_READ) = 0 mmap(0x1ffffffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffffffff000 mmap(0x200000000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200000000000 mmap(0x200001000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200001000000 executing program write(1, "executing program\n", 18) = 18 openat(AT_FDCWD, "/dev/kvm", O_RDWR) = 3 [ 27.418190][ T36] audit: type=1400 audit(1752947877.480:64): avc: denied { execmem } for pid=296 comm="syz-executor266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 27.421301][ T296] kvm_intel: L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. ioctl(3, KVM_CREATE_VM, 0) = 4 ioctl(4, KVM_CREATE_VCPU, 7) = 5 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=0, flags=0, guest_phys_addr=0, memory_size=4096, userspace_addr=0x200000fe8000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=1, flags=0, guest_phys_addr=0x1000, memory_size=4096, userspace_addr=0x200000fe9000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=2, flags=0, guest_phys_addr=0x2000, memory_size=4096, userspace_addr=0x200000fea000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=3, flags=0, guest_phys_addr=0x3000, memory_size=4096, userspace_addr=0x200000feb000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=4, flags=0, guest_phys_addr=0x4000, memory_size=4096, userspace_addr=0x200000fec000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=5, flags=0, guest_phys_addr=0x5000, memory_size=4096, userspace_addr=0x200000fed000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=6, flags=0, guest_phys_addr=0x6000, memory_size=4096, userspace_addr=0x200000fee000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=7, flags=0, guest_phys_addr=0x7000, memory_size=4096, userspace_addr=0x200000fef000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=8, flags=0, guest_phys_addr=0x8000, memory_size=4096, userspace_addr=0x200000ff0000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=9, flags=0, guest_phys_addr=0x9000, memory_size=4096, userspace_addr=0x200000ff1000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=10, flags=0, guest_phys_addr=0xfec00000, memory_size=4096, userspace_addr=0x200000ff2000}) = 0 [ 27.437645][ T36] audit: type=1400 audit(1752947877.480:65): avc: denied { read write } for pid=296 comm="syz-executor266" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 27.485168][ T36] audit: type=1400 audit(1752947877.480:66): avc: denied { open } for pid=296 comm="syz-executor266" path="/dev/kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=11, flags=0, guest_phys_addr=0xb000, memory_size=4096, userspace_addr=0x200000ff3000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=12, flags=0, guest_phys_addr=0xc000, memory_size=4096, userspace_addr=0x200000ff4000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=13, flags=0, guest_phys_addr=0xd000, memory_size=4096, userspace_addr=0x200000ff5000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=14, flags=0, guest_phys_addr=0xe000, memory_size=4096, userspace_addr=0x200000ff6000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=15, flags=0, guest_phys_addr=0xf000, memory_size=4096, userspace_addr=0x200000ff7000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=16, flags=0, guest_phys_addr=0x10000, memory_size=4096, userspace_addr=0x200000ff8000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=17, flags=0, guest_phys_addr=0x11000, memory_size=4096, userspace_addr=0x200000ff9000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=18, flags=0, guest_phys_addr=0x12000, memory_size=4096, userspace_addr=0x200000ffa000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=19, flags=0, guest_phys_addr=0x13000, memory_size=4096, userspace_addr=0x200000ffb000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=20, flags=0, guest_phys_addr=0x14000, memory_size=4096, userspace_addr=0x200000ffc000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=21, flags=0, guest_phys_addr=0x15000, memory_size=4096, userspace_addr=0x200000ffd000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=22, flags=0, guest_phys_addr=0x16000, memory_size=4096, userspace_addr=0x200000ffe000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=23, flags=0, guest_phys_addr=0x17000, memory_size=4096, userspace_addr=0x200000fff000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=65537, flags=0, guest_phys_addr=0x30000, memory_size=65536, userspace_addr=0x200000fe8000}) = 0 ioctl(5, KVM_GET_SREGS, {cs={base=0xffff0000, limit=65535, selector=61440, type=11, present=1, dpl=0, db=0, s=1, l=0, g=0, avl=0}, ...}) = 0 openat(AT_FDCWD, "/dev/kvm", O_RDWR) = 6 ioctl(6, KVM_GET_SUPPORTED_CPUID, {nent=31, entries=[...]}) = 0 ioctl(5, KVM_SET_CPUID2, {nent=31, entries=[...]}) = 0 close(6) = 0 ioctl(5, KVM_SET_MSRS, 0x7ffd439bad90) = 5 ioctl(5, KVM_SET_SREGS, {cs={base=0, limit=1048575, selector=48, type=11, present=1, dpl=0, db=1, s=1, l=0, g=0, avl=0}, ...}) = 0 ioctl(5, KVM_SET_REGS, {rax=0, ..., rsp=0xf80, rbp=0, ..., rip=0, rflags=0x2}) = 0 ioctl(5, KVM_SET_REGS, {rax=0x3, ..., rsp=0x8000000000000001, rbp=0x80000001, ..., rip=0, rflags=0x2280}) = 0 ioctl(5, KVM_RUN, 0) = 0 [ 27.508529][ T36] audit: type=1400 audit(1752947877.480:67): avc: denied { ioctl } for pid=296 comm="syz-executor266" path="/dev/kvm" dev="devtmpfs" ino=13 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 socket(AF_PACKET, SOCK_RAW, htons(0 /* ETH_P_??? */)) = 6 mmap(0x200000fe8000, 8192, PROT_READ|PROT_EXEC, MAP_SHARED_VALIDATE|MAP_FIXED, 6, 0x836f3000) = -1 EINVAL (Invalid argument) [ 27.571197][ T36] audit: type=1400 audit(1752947877.630:68): avc: denied { create } for pid=296 comm="syz-executor266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 27.591600][ T36] audit: type=1400 audit(1752947877.650:69): avc: denied { map } for pid=296 comm="syz-executor266" path="socket:[1685]" dev="sockfs" ino=1685 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 ioctl(5, KVM_RUN, 0) = -1 EFAULT (Bad address) [ 27.615193][ T36] audit: type=1400 audit(1752947877.650:70): avc: denied { read accept } for pid=296 comm="syz-executor266" path="socket:[1685]" dev="sockfs" ino=1685 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 27.640239][ T296] ------------[ cut here ]------------ [ 27.645807][ T296] WARNING: CPU: 1 PID: 296 at arch/x86/kvm/x86.c:11569 kvm_arch_vcpu_ioctl_run+0x12af/0x1aa0 [ 27.656045][ T296] Modules linked in: [ 27.659962][ T296] CPU: 1 UID: 0 PID: 296 Comm: syz-executor266 Not tainted 6.12.30-syzkaller-g73009db42b37 #0 e78244f41b0e2dd383d6ada64249d7f830c3c2f3 [ 27.673921][ T296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 27.684043][ T296] RIP: 0010:kvm_arch_vcpu_ioctl_run+0x12af/0x1aa0 [ 27.690497][ T296] Code: 7e 3b e8 04 e6 69 00 49 bd 00 00 00 00 00 fc ff df 4c 8b 7c 24 20 4c 8b 64 24 40 48 8b 5c 24 28 e9 26 fd ff ff e8 e1 e5 69 00 <0f> 0b e9 e4 fc ff ff e8 d5 e5 69 00 0f 0b e9 0e fd ff ff e8 c9 e5 [ 27.710171][ T296] RSP: 0018:ffffc9000116f9c0 EFLAGS: 00010293 [ 27.716395][ T296] RAX: ffffffff811bc51f RBX: ffff888104f40000 RCX: ffff88812063a600 [ 27.724460][ T296] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 [ 27.732464][ T296] RBP: ffffc9000116fc70 R08: ffff88812063a607 R09: 1ffff110240c74c0 [ 27.740496][ T296] R10: dffffc0000000000 R11: ffffed10240c74c1 R12: ffff88810ba68000 [ 27.748517][ T296] R13: dffffc0000000000 R14: 0000000000000001 R15: ffff888104f40078 [ 27.756544][ T296] FS: 000055558c27b380(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 27.765610][ T296] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 27.772211][ T296] CR2: 000000005200000c CR3: 00000001261cc000 CR4: 00000000003526b0 [ 27.780230][ T296] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 27.788251][ T296] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 27.796264][ T296] Call Trace: [ 27.799554][ T296] [ 27.802483][ T296] ? __cfi_kvm_arch_vcpu_ioctl_run+0x10/0x10 [ 27.808506][ T296] ? __cfi___switch_to+0x10/0x10 [ 27.813490][ T296] ? ioctl_has_perm+0x1aa/0x4d0 [ 27.818472][ T296] ? __asan_memcpy+0x5a/0x80 [ 27.823106][ T296] ? ioctl_has_perm+0x3e0/0x4d0 [ 27.828080][ T296] ? has_cap_mac_admin+0xd0/0xd0 [ 27.833050][ T296] ? __kasan_check_write+0x18/0x20 [ 27.838274][ T296] ? mutex_lock_killable+0x92/0x1c0 [ 27.843507][ T296] ? __cfi_mutex_lock_killable+0x10/0x10 [ 27.849217][ T296] kvm_vcpu_ioctl+0x96f/0xee0 [ 27.853931][ T296] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 27.859176][ T296] ? _raw_spin_lock_irq+0x8d/0x120 [ 27.864349][ T296] ? __cfi__raw_spin_lock_irq+0x10/0x10 [ 27.869927][ T296] ? __asan_memset+0x39/0x50 [ 27.874561][ T296] ? ptrace_stop+0x6c9/0x8c0 [ 27.879180][ T296] ? _raw_spin_unlock_irq+0x45/0x70 [ 27.884420][ T296] ? ptrace_notify+0x1e8/0x270 [ 27.889203][ T296] ? bpf_lsm_file_ioctl+0xd/0x20 [ 27.894143][ T296] ? security_file_ioctl+0x34/0xd0 [ 27.899401][ T296] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 27.904670][ T296] __se_sys_ioctl+0x132/0x1b0 [ 27.909375][ T296] __x64_sys_ioctl+0x7f/0xa0 [ 27.913973][ T296] x64_sys_call+0x1878/0x2ee0 [ 27.918701][ T296] do_syscall_64+0x58/0xf0 [ 27.923140][ T296] ? clear_bhb_loop+0x50/0xa0 [ 27.927865][ T296] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 27.933785][ T296] RIP: 0033:0x7ff9359d2439 [ 27.938254][ T296] Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 27.957983][ T296] RSP: 002b:00007ffd439bc8e8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 ioctl(5, KVM_RUN, 0) = -1 EFAULT (Bad address) exit_group(0) = ? [ 27.966540][ T296] RAX: ffffffffffffffda RBX: 00007ffd439bcac8 RCX: 00007ff9359d2439 [ 27.974609][ T296] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 27.982627][ T296] RBP: 00007ff935a45610 R08: 00000000836f3000 R09: 00000000836f3000 [ 27.990788][ T296] R10: 00000000836f3000 R11: 0000000000000246 R12: 0000000000000001 [ 27.998819][ T296] R13: 00007ffd439bcab8 R14: 0000000000000001 R15: 0000000000000001 [ 28.006841][ T296] [ 28.009875][ T296] ---[ end trace 0000000000000000 ]--- +++ exited with 0 +++