./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor4277931930 <...> [ 8.053041][ T23] audit: type=1400 audit(1742984569.380:27): avc: denied { create } for pid=185 comm="dbus-daemon" name="messagebus.pid" scontext=system_u:system_r:system_dbusd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 8.057370][ T23] audit: type=1400 audit(1742984569.380:28): avc: denied { write open } for pid=185 comm="dbus-daemon" path="/run/messagebus.pid" dev="tmpfs" ino=816 scontext=system_u:system_r:system_dbusd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 8.062101][ T23] audit: type=1400 audit(1742984569.380:29): avc: denied { getattr } for pid=185 comm="dbus-daemon" path="/run/messagebus.pid" dev="tmpfs" ino=816 scontext=system_u:system_r:system_dbusd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 8.194522][ T23] audit: type=1400 audit(1742984569.530:30): avc: denied { search } for pid=199 comm="dhcpcd" name="/" dev="tmpfs" ino=404 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 20.042670][ T23] kauditd_printk_skb: 30 callbacks suppressed [ 20.042680][ T23] audit: type=1400 audit(1742984581.380:61): avc: denied { transition } for pid=320 comm="sshd" path="/bin/sh" dev="sda1" ino=89 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 20.052503][ T23] audit: type=1400 audit(1742984581.380:62): avc: denied { noatsecure } for pid=320 comm="sshd" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 20.059833][ T23] audit: type=1400 audit(1742984581.380:63): avc: denied { write } for pid=320 comm="sh" path="pipe:[11384]" dev="pipefs" ino=11384 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 20.069912][ T23] audit: type=1400 audit(1742984581.380:64): avc: denied { rlimitinh } for pid=320 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 20.088767][ T23] audit: type=1400 audit(1742984581.380:65): avc: denied { siginh } for pid=320 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.1.190' (ED25519) to the list of known hosts. execve("./syz-executor4277931930", ["./syz-executor4277931930"], 0x7ffc79ba8220 /* 10 vars */) = 0 brk(NULL) = 0x55558119e000 brk(0x55558119ed00) = 0x55558119ed00 arch_prctl(ARCH_SET_FS, 0x55558119e380) = 0 set_tid_address(0x55558119e650) = 361 set_robust_list(0x55558119e660, 24) = 0 rseq(0x55558119eca0, 0x20, 0, 0x53053053) = -1 ENOSYS (Function not implemented) prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor4277931930", 4096) = 28 getrandom("\x4a\x3a\xda\xfb\xdd\xd0\x0b\x3b", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x55558119ed00 brk(0x5555811bfd00) = 0x5555811bfd00 brk(0x5555811c0000) = 0x5555811c0000 mprotect(0x7fec0261d000, 16384, PROT_READ) = 0 mmap(0x1ffffffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffffffff000 mmap(0x200000000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200000000000 mmap(0x200001000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200001000000 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x55558119e650) = 362 ./strace-static-x86_64: Process 362 attached [pid 362] set_robust_list(0x55558119e660, 24) = 0 [pid 362] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0 [pid 362] setpgid(0, 0) = 0 [pid 362] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC) = 3 [pid 362] write(3, "1000", 4) = 4 [pid 362] close(3executing program ) = 0 [pid 362] write(1, "executing program\n", 18) = 18 [pid 362] openat(AT_FDCWD, "/dev/kvm", O_RDONLY|O_CREAT|O_TRUNC|O_APPEND|O_NONBLOCK|FASYNC, 000) = 3 [ 29.381401][ T23] audit: type=1400 audit(1742984590.720:66): avc: denied { execmem } for pid=361 comm="syz-executor427" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 29.391736][ T362] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [pid 362] ioctl(3, KVM_CREATE_VM, 0) = 4 [pid 362] bpf(BPF_RAW_TRACEPOINT_OPEN, NULL, 0) = -1 EFAULT (Bad address) [pid 362] ioctl(4, KVM_CREATE_VCPU, 0) = 5 [pid 362] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=0, flags=0, guest_phys_addr=0, memory_size=8192, userspace_addr=0x200000000000}) = 0 [ 29.401879][ T23] audit: type=1400 audit(1742984590.730:67): avc: denied { read append } for pid=362 comm="syz-executor427" name="kvm" dev="devtmpfs" ino=113 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 29.440956][ T23] audit: type=1400 audit(1742984590.730:68): avc: denied { open } for pid=362 comm="syz-executor427" path="/dev/kvm" dev="devtmpfs" ino=113 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 29.467719][ T23] audit: type=1400 audit(1742984590.730:69): avc: denied { ioctl } for pid=362 comm="syz-executor427" path="/dev/kvm" dev="devtmpfs" ino=113 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 29.485452][ T362] BUG: kernel NULL pointer dereference, address: 0000000000000086 [ 29.500081][ T362] #PF: supervisor instruction fetch in kernel mode [ 29.506414][ T362] #PF: error_code(0x0010) - not-present page [ 29.512401][ T362] PGD 0 P4D 0 [ 29.515666][ T362] Oops: 0010 [#1] PREEMPT SMP KASAN [ 29.520651][ T362] CPU: 0 PID: 362 Comm: syz-executor427 Not tainted 5.4.290-syzkaller-00002-g41adfeb3d639 #0 [ 29.530647][ T362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 29.540714][ T362] RIP: 0010:0x86 [ 29.544084][ T362] Code: Bad RIP value. [ 29.548224][ T362] RSP: 0018:ffff8881f56cf308 EFLAGS: 00010086 [ 29.554318][ T362] RAX: ffff8881f56cf338 RBX: dffffc0000000000 RCX: ffff8881f0d82f40 [ 29.562388][ T362] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 [ 29.570190][ T362] RBP: 0000000000000260 R08: ffffffff8231cd01 R09: ffffffff811c8f95 [ 29.578003][ T362] R10: ffff8881f0d82f40 R11: 0000000000000002 R12: ffffffff84600220 [ 29.585900][ T362] R13: fffffe0000000268 R14: ffff8881f4cd0000 R15: fffffe000000026b [ 29.594152][ T362] FS: 000055558119e380(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 29.602924][ T362] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 29.609685][ T362] CR2: 000000000000005c CR3: 00000001dddfc000 CR4: 00000000003426b0 [ 29.617768][ T362] Call Trace: [ 29.621087][ T362] ? __die+0xb4/0x100 [ 29.624987][ T362] ? no_context+0xac7/0xd20 [ 29.629411][ T362] ? is_prefetch+0x4b0/0x4b0 [ 29.633835][ T362] ? rcu_preempt_deferred_qs+0xa4/0x2b0 [ 29.639217][ T362] ? __do_page_fault+0xa72/0xbb0 [ 29.643992][ T362] ? vmx_spec_ctrl_restore_host+0x83/0xfd [ 29.649542][ T362] ? __bad_area_nosemaphore+0xc0/0x470 [ 29.655010][ T362] ? page_fault+0x2f/0x40 [ 29.659226][ T362] ? irq_entries_start+0x30/0x660 [ 29.664135][ T362] ? vmx_handle_exit_irqoff+0x45/0x220 [ 29.669430][ T362] ? check_preemption_disabled+0x91/0x320 [ 29.675003][ T362] ? handle_external_interrupt_irqoff+0x148/0x2f0 [ 29.681234][ T362] ? handle_external_interrupt_irqoff+0x12a/0x2f0 [ 29.687576][ T362] ? irq_entries_start+0x30/0x660 [ 29.692465][ T362] ? vcpu_enter_guest+0x2d06/0x9f70 [ 29.697469][ T362] ? check_preemption_disabled+0x9f/0x320 [ 29.703291][ T362] ? debug_smp_processor_id+0x20/0x20 [ 29.708483][ T362] ? __free_pages_ok+0x847/0x950 [ 29.713257][ T362] ? __kvm_set_memory_region+0xda6/0xf60 [ 29.718879][ T362] ? kvm_vm_ioctl_set_memory_region+0x67/0x90 [ 29.724770][ T362] ? do_vfs_ioctl+0x742/0x1720 [ 29.729375][ T362] ? __x64_sys_ioctl+0xd4/0x110 [ 29.734053][ T362] ? do_syscall_64+0xca/0x1c0 [ 29.738570][ T362] ? local_bh_enable+0x20/0x20 [ 29.743178][ T362] ? __free_one_page+0x7f3/0xa60 [ 29.747941][ T362] ? _raw_spin_unlock+0x49/0x60 [ 29.752627][ T362] ? set_pageblock_migratetype+0x150/0x150 [ 29.758271][ T362] ? kvm_mmu_change_mmu_pages+0x2dc/0x320 [ 29.763824][ T362] ? synchronize_srcu_expedited+0x20/0x20 [ 29.769391][ T362] ? check_preemption_disabled+0x9f/0x320 [ 29.774952][ T362] ? update_load_avg+0x40f/0x1210 [ 29.779808][ T362] ? check_preemption_disabled+0x9f/0x320 [ 29.785464][ T362] ? debug_smp_processor_id+0x20/0x20 [ 29.790653][ T362] ? resched_curr+0x9b/0x200 [ 29.796665][ T362] ? check_preempt_wakeup+0x4f6/0x9f0 [ 29.801791][ T362] ? vmx_vcpu_load_vmcs+0x655/0x8b0 [ 29.806983][ T362] ? try_to_wake_up+0x7c5/0x14f0 [ 29.811727][ T362] ? read_msr+0x40/0x40 [ 29.815723][ T362] ? check_preemption_disabled+0x9f/0x320 [ 29.821446][ T362] ? check_preemption_disabled+0x9f/0x320 [ 29.827002][ T362] ? debug_smp_processor_id+0x20/0x20 [ 29.832300][ T362] ? kvm_arch_vcpu_ioctl_run+0x748/0x18d0 [ 29.837905][ T362] ? kvm_vcpu_ioctl+0x7f9/0xd10 [ 29.842645][ T362] ? create_vcpu_fd+0x120/0x120 [ 29.847582][ T362] ? _raw_spin_lock_irq+0xa5/0x1b0 [ 29.852751][ T362] ? _raw_spin_lock_irqsave+0x210/0x210 [ 29.858167][ T362] ? cgroup_update_frozen+0x157/0xab0 [ 29.863565][ T362] ? cgroup_update_frozen+0x157/0xab0 [ 29.868942][ T362] ? cgroup_leave_frozen+0x13c/0x290 [ 29.874063][ T362] ? ptrace_stop+0x6ee/0xa30 [ 29.878501][ T362] ? create_vcpu_fd+0x120/0x120 [ 29.883266][ T362] ? do_vfs_ioctl+0x742/0x1720 [ 29.888297][ T362] ? ioctl_preallocate+0x250/0x250 [ 29.893246][ T362] ? check_preemption_disabled+0x153/0x320 [ 29.898952][ T362] ? syscall_trace_enter+0x650/0x940 [ 29.904077][ T362] ? do_syscall_64+0x1c0/0x1c0 [ 29.908663][ T362] ? switch_fpu_return+0x1d4/0x410 [ 29.913696][ T362] ? security_file_ioctl+0x7d/0xa0 [ 29.918644][ T362] ? __x64_sys_ioctl+0xd4/0x110 [ 29.923332][ T362] ? do_syscall_64+0xca/0x1c0 [ 29.927844][ T362] ? entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 29.933766][ T362] Modules linked in: [ 29.937476][ T362] CR2: 0000000000000086 [ 29.941472][ T362] ---[ end trace 27615fd20b775a1d ]--- [ 29.946767][ T362] RIP: 0010:0x86 [ 29.950160][ T362] Code: Bad RIP value. [ 29.954054][ T362] RSP: 0018:ffff8881f56cf308 EFLAGS: 00010086 [ 29.960061][ T362] RAX: ffff8881f56cf338 RBX: dffffc0000000000 RCX: ffff8881f0d82f40 [ 29.968027][ T362] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 [ 29.975929][ T362] RBP: 0000000000000260 R08: ffffffff8231cd01 R09: ffffffff811c8f95 [ 29.983750][ T362] R10: ffff8881f0d82f40 R11: 0000000000000002 R12: ffffffff84600220 [ 29.991740][ T362] R13: fffffe0000000268 R14: ffff8881f4cd0000 R15: fffffe000000026b [ 29.999558][ T362] FS: 000055558119e380(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 30.008492][ T362] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 30.015027][ T362] CR2: 000000000000005c CR3: 00000001dddfc000 CR4: 00000000003426b0 [ 30.022904][ T362] Kernel panic - not syncing: Fatal exception [ 30.029580][ T362] Kernel Offset: disabled [ 30.033835][ T362] Rebooting in 86400 seconds..