./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor2972532541 <...> [ 5.079929][ T23] audit: type=1400 audit(1713949617.680:10): avc: denied { getattr } for pid=144 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9908 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5.192374][ T152] S02sysctl (152) used greatest stack depth: 22616 bytes left [ 5.377578][ T161] udevd[161]: starting version 3.2.11 [ 5.434799][ T162] udevd[162]: starting eudev-3.2.11 [ 14.263473][ T23] kauditd_printk_skb: 50 callbacks suppressed [ 14.263481][ T23] audit: type=1400 audit(1713949626.890:61): avc: denied { transition } for pid=287 comm="sshd" path="/bin/sh" dev="sda1" ino=89 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 14.267811][ T23] audit: type=1400 audit(1713949626.890:62): avc: denied { noatsecure } for pid=287 comm="sshd" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 14.270476][ T23] audit: type=1400 audit(1713949626.890:63): avc: denied { write } for pid=287 comm="sh" path="pipe:[10412]" dev="pipefs" ino=10412 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 14.273835][ T23] audit: type=1400 audit(1713949626.890:64): avc: denied { rlimitinh } for pid=287 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 14.276371][ T23] audit: type=1400 audit(1713949626.890:65): avc: denied { siginh } for pid=287 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.0.65' (ED25519) to the list of known hosts. execve("./syz-executor2972532541", ["./syz-executor2972532541"], 0x7ffd39389e70 /* 10 vars */) = 0 brk(NULL) = 0x555555778000 brk(0x555555778d00) = 0x555555778d00 arch_prctl(ARCH_SET_FS, 0x555555778380) = 0 set_tid_address(0x555555778650) = 355 set_robust_list(0x555555778660, 24) = 0 rseq(0x555555778ca0, 0x20, 0, 0x53053053) = -1 ENOSYS (Function not implemented) prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor2972532541", 4096) = 28 getrandom("\xf5\x38\xda\x0c\x55\x41\x7e\x58", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x555555778d00 brk(0x555555799d00) = 0x555555799d00 brk(0x55555579a000) = 0x55555579a000 mprotect(0x7f3c60881000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x555555778650) = 356 ./strace-static-x86_64: Process 356 attached [pid 356] set_robust_list(0x555555778660, 24) = 0 [pid 356] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0 [pid 356] setpgid(0, 0) = 0 [pid 356] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC) = 3 [pid 356] write(3, "1000", 4) = 4 [pid 356] close(3) = 0 [pid 356] openat(AT_FDCWD, "/dev/kvm", O_RDONLY) = 3 [ 22.636894][ T23] audit: type=1400 audit(1713949635.260:66): avc: denied { execmem } for pid=355 comm="syz-executor297" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 22.660850][ T23] audit: type=1400 audit(1713949635.290:67): avc: denied { read } for pid=356 comm="syz-executor297" name="kvm" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 22.665324][ T356] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 22.684040][ T23] audit: type=1400 audit(1713949635.290:68): avc: denied { open } for pid=356 comm="syz-executor297" path="/dev/kvm" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [pid 356] ioctl(3, KVM_CREATE_VM, 0) = 4 [pid 356] dup(4) = 5 [pid 356] ioctl(5, KVM_CREATE_VCPU, 0) = 6 [pid 356] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=0, flags=KVM_MEM_LOG_DIRTY_PAGES|KVM_MEM_READONLY, guest_phys_addr=0, memory_size=8192, userspace_addr=0x20000000}) = 0 [ 22.723485][ T23] audit: type=1400 audit(1713949635.290:69): avc: denied { ioctl } for pid=356 comm="syz-executor297" path="/dev/kvm" dev="devtmpfs" ino=116 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 22.768030][ T356] BUG: kernel NULL pointer dereference, address: 0000000000000086 [ 22.775645][ T356] #PF: supervisor instruction fetch in kernel mode [ 22.782107][ T356] #PF: error_code(0x0010) - not-present page [ 22.787920][ T356] PGD 1e0f89067 P4D 1e0f89067 PUD 1dc99d067 PMD 0 [ 22.794252][ T356] Oops: 0010 [#1] PREEMPT SMP KASAN [ 22.799287][ T356] CPU: 1 PID: 356 Comm: syz-executor297 Not tainted 5.4.268-syzkaller-00003-g2d5d8240a7cb #0 [ 22.809269][ T356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 22.819182][ T356] RIP: 0010:0x86 [ 22.822547][ T356] Code: Bad RIP value. [ 22.826450][ T356] RSP: 0018:ffff8881dbfcf308 EFLAGS: 00010086 [ 22.832349][ T356] RAX: ffff8881dbfcf338 RBX: dffffc0000000000 RCX: ffff8881dbccee40 [ 22.840159][ T356] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 [ 22.847973][ T356] RBP: 0000000000000270 R08: ffffffff82315341 R09: ffffffff811c9085 [ 22.855877][ T356] R10: ffff8881dbccee40 R11: 0000000000000002 R12: ffffffff84600228 [ 22.863688][ T356] R13: fffffe0000000278 R14: ffff8881db878000 R15: fffffe000000027b [ 22.871511][ T356] FS: 0000555555778380(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 22.880263][ T356] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 22.886683][ T356] CR2: 000000000000005c CR3: 00000001dc08b000 CR4: 00000000003426a0 [ 22.894494][ T356] Call Trace: [ 22.897627][ T356] ? __die+0xb4/0x100 [ 22.901440][ T356] ? no_context+0xbda/0xe50 [ 22.905886][ T356] ? is_prefetch+0x4b0/0x4b0 [ 22.910382][ T356] ? rcu_preempt_deferred_qs+0xa4/0x2b0 [ 22.915765][ T356] ? __do_page_fault+0xa7d/0xbb0 [ 22.920543][ T356] ? vmx_spec_ctrl_restore_host+0x83/0xfd [ 22.926092][ T356] ? __bad_area_nosemaphore+0xc0/0x460 [ 22.931385][ T356] ? page_fault+0x2f/0x40 [ 22.935548][ T356] ? irq_entries_start+0x38/0x660 [ 22.940499][ T356] ? vmx_handle_exit_irqoff+0x45/0x220 [ 22.945794][ T356] ? check_preemption_disabled+0x91/0x320 [ 22.951348][ T356] ? handle_external_interrupt_irqoff+0x148/0x2f0 [ 22.957595][ T356] ? handle_external_interrupt_irqoff+0x12a/0x2f0 [ 22.963843][ T356] ? irq_entries_start+0x38/0x660 [ 22.968703][ T356] ? vcpu_enter_guest+0x2d06/0x9f70 [ 22.973740][ T356] ? find_next_and_bit+0x156/0x190 [ 22.978684][ T356] ? load_balance+0x43e1/0x7a40 [ 22.983372][ T356] ? __free_pages_ok+0x847/0x950 [ 22.988144][ T356] ? local_bh_enable+0x20/0x20 [ 22.992754][ T356] ? check_preemption_disabled+0x9f/0x320 [ 22.998300][ T356] ? update_blocked_averages+0xd50/0xd50 [ 23.003772][ T356] ? vmx_vcpu_load_vmcs+0x655/0x8b0 [ 23.008801][ T356] ? read_msr+0x40/0x40 [ 23.012793][ T356] ? update_rq_clock+0x67/0x350 [ 23.017479][ T356] ? check_preemption_disabled+0x9f/0x320 [ 23.023127][ T356] ? kvm_sched_clock_read+0x14/0x40 [ 23.028153][ T356] ? check_preemption_disabled+0x9f/0x320 [ 23.033714][ T356] ? debug_smp_processor_id+0x20/0x20 [ 23.038920][ T356] ? kvm_arch_vcpu_ioctl_run+0x748/0x18d0 [ 23.044482][ T356] ? kvm_vcpu_ioctl+0x7f9/0xd10 [ 23.049157][ T356] ? create_vcpu_fd+0x120/0x120 [ 23.053845][ T356] ? _raw_spin_lock_irq+0xa5/0x1b0 [ 23.058792][ T356] ? _raw_spin_lock_irqsave+0x210/0x210 [ 23.064174][ T356] ? cgroup_update_frozen+0x157/0xab0 [ 23.069380][ T356] ? cgroup_update_frozen+0x157/0xab0 [ 23.074588][ T356] ? cgroup_leave_frozen+0x13c/0x290 [ 23.079794][ T356] ? ptrace_stop+0x6ee/0xa30 [ 23.084230][ T356] ? create_vcpu_fd+0x120/0x120 [ 23.088976][ T356] ? do_vfs_ioctl+0x742/0x1720 [ 23.093511][ T356] ? ioctl_preallocate+0x250/0x250 [ 23.098456][ T356] ? check_preemption_disabled+0x153/0x320 [ 23.104097][ T356] ? syscall_trace_enter+0x650/0x940 [ 23.109228][ T356] ? do_syscall_64+0x1c0/0x1c0 [ 23.113819][ T356] ? switch_fpu_return+0x1d4/0x410 [ 23.118763][ T356] ? security_file_ioctl+0x7d/0xa0 [ 23.123713][ T356] ? __x64_sys_ioctl+0xd4/0x110 [ 23.128398][ T356] ? do_syscall_64+0xca/0x1c0 [ 23.132914][ T356] ? entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 23.138809][ T356] Modules linked in: [ 23.142562][ T356] CR2: 0000000000000086 [ 23.146630][ T356] ---[ end trace d33fb54343a714a9 ]--- [ 23.151921][ T356] RIP: 0010:0x86 [ 23.155304][ T356] Code: Bad RIP value. [ 23.159207][ T356] RSP: 0018:ffff8881dbfcf308 EFLAGS: 00010086 [ 23.165109][ T356] RAX: ffff8881dbfcf338 RBX: dffffc0000000000 RCX: ffff8881dbccee40 [ 23.173093][ T356] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 [ 23.181340][ T356] RBP: 0000000000000270 R08: ffffffff82315341 R09: ffffffff811c9085 [ 23.189952][ T356] R10: ffff8881dbccee40 R11: 0000000000000002 R12: ffffffff84600228 [ 23.197841][ T356] R13: fffffe0000000278 R14: ffff8881db878000 R15: fffffe000000027b [ 23.205693][ T356] FS: 0000555555778380(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 23.214413][ T356] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 23.220835][ T356] CR2: 000000000000005c CR3: 00000001dc08b000 CR4: 00000000003426a0 [ 23.228650][ T356] Kernel panic - not syncing: Fatal exception [ 23.234745][ T356] Kernel Offset: disabled [ 23.238861][ T356] Rebooting in 86400 seconds..