./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor314640743 <...> Warning: Permanently added '10.128.1.211' (ED25519) to the list of known hosts. execve("./syz-executor314640743", ["./syz-executor314640743"], 0x7ffc8eb5f820 /* 10 vars */) = 0 brk(NULL) = 0x55555fcc9000 brk(0x55555fcc9d00) = 0x55555fcc9d00 arch_prctl(ARCH_SET_FS, 0x55555fcc9380) = 0 set_tid_address(0x55555fcc9650) = 296 set_robust_list(0x55555fcc9660, 24) = 0 rseq(0x55555fcc9ca0, 0x20, 0, 0x53053053) = -1 ENOSYS (Function not implemented) prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor314640743", 4096) = 27 getrandom("\xbc\xa1\xac\x2c\xe7\x9c\xb3\x54", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x55555fcc9d00 brk(0x55555fcead00) = 0x55555fcead00 brk(0x55555fceb000) = 0x55555fceb000 mprotect(0x7efdc76cb000, 16384, PROT_READ) = 0 mmap(0x1ffffffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffffffff000 mmap(0x200000000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0executing program ) = 0x200000000000 mmap(0x200001000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200001000000 write(1, "executing program\n", 18) = 18 openat(AT_FDCWD, "/dev/kvm", O_RDWR) = 3 ioctl(3, KVM_CREATE_VM, 0) = 4 ioctl(4, KVM_CREATE_VCPU, 3) = 5 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=0, flags=0, guest_phys_addr=0, memory_size=4096, userspace_addr=0x200000fe8000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=1, flags=0, guest_phys_addr=0x1000, memory_size=4096, userspace_addr=0x200000fe9000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=2, flags=0, guest_phys_addr=0x2000, memory_size=4096, userspace_addr=0x200000fea000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=3, flags=0, guest_phys_addr=0x3000, memory_size=4096, userspace_addr=0x200000feb000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=4, flags=0, guest_phys_addr=0x4000, memory_size=4096, userspace_addr=0x200000fec000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=5, flags=0, guest_phys_addr=0x5000, memory_size=4096, userspace_addr=0x200000fed000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=6, flags=0, guest_phys_addr=0x6000, memory_size=4096, userspace_addr=0x200000fee000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=7, flags=0, guest_phys_addr=0x7000, memory_size=4096, userspace_addr=0x200000fef000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=8, flags=0, guest_phys_addr=0x8000, memory_size=4096, userspace_addr=0x200000ff0000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=9, flags=0, guest_phys_addr=0x9000, memory_size=4096, userspace_addr=0x200000ff1000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=10, flags=0, guest_phys_addr=0xfec00000, memory_size=4096, userspace_addr=0x200000ff2000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=11, flags=0, guest_phys_addr=0xb000, memory_size=4096, userspace_addr=0x200000ff3000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=12, flags=0, guest_phys_addr=0xc000, memory_size=4096, userspace_addr=0x200000ff4000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=13, flags=0, guest_phys_addr=0xd000, memory_size=4096, userspace_addr=0x200000ff5000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=14, flags=0, guest_phys_addr=0xe000, memory_size=4096, userspace_addr=0x200000ff6000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=15, flags=0, guest_phys_addr=0xf000, memory_size=4096, userspace_addr=0x200000ff7000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=16, flags=0, guest_phys_addr=0x10000, memory_size=4096, userspace_addr=0x200000ff8000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=17, flags=0, guest_phys_addr=0x11000, memory_size=4096, userspace_addr=0x200000ff9000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=18, flags=0, guest_phys_addr=0x12000, memory_size=4096, userspace_addr=0x200000ffa000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=19, flags=0, guest_phys_addr=0x13000, memory_size=4096, userspace_addr=0x200000ffb000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=20, flags=0, guest_phys_addr=0x14000, memory_size=4096, userspace_addr=0x200000ffc000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=21, flags=0, guest_phys_addr=0x15000, memory_size=4096, userspace_addr=0x200000ffd000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=22, flags=0, guest_phys_addr=0x16000, memory_size=4096, userspace_addr=0x200000ffe000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=23, flags=0, guest_phys_addr=0x17000, memory_size=4096, userspace_addr=0x200000fff000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=65537, flags=0, guest_phys_addr=0x30000, memory_size=65536, userspace_addr=0x200000fe8000}) = 0 ioctl(5, KVM_GET_SREGS, {cs={base=0xffff0000, limit=65535, selector=61440, type=11, present=1, dpl=0, db=0, s=1, l=0, g=0, avl=0}, ...}) = 0 openat(AT_FDCWD, "/dev/kvm", O_RDWR) = 6 ioctl(6, KVM_GET_SUPPORTED_CPUID, {nent=31, entries=[...]}) = 0 ioctl(5, KVM_SET_CPUID2, {nent=31, entries=[...]}) = 0 close(6) = 0 ioctl(5, KVM_SET_MSRS, 0x7fffb182e0d0) = 5 ioctl(5, KVM_SET_SREGS, {cs={base=0, limit=1048575, selector=48, type=11, present=1, dpl=0, db=1, s=1, l=0, g=0, avl=0}, ...}) = 0 ioctl(5, KVM_SET_REGS, {rax=0, ..., rsp=0xf80, rbp=0, ..., rip=0, rflags=0x2}) = 0 ioctl(5, KVM_SET_REGS, {rax=0x3, ..., rsp=0x8000000000000001, rbp=0x80000001, ..., rip=0, rflags=0x2a80}) = 0 ioctl(5, KVM_RUN, 0) = 0 ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=0, flags=0, guest_phys_addr=0, memory_size=4096, userspace_addr=0x200000fe8000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=1, flags=0, guest_phys_addr=0x1000, memory_size=4096, userspace_addr=0x200000fe9000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=2, flags=0, guest_phys_addr=0x2000, memory_size=4096, userspace_addr=0x200000fea000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=3, flags=0, guest_phys_addr=0x3000, memory_size=4096, userspace_addr=0x200000feb000}) = -1 EBADF (Bad file descriptor) [ 21.822081][ T36] audit: type=1400 audit(1754961885.820:64): avc: denied { execmem } for pid=296 comm="syz-executor314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 21.823007][ T296] kvm_intel: L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 21.825015][ T36] audit: type=1400 audit(1754961885.820:65): avc: denied { read write } for pid=296 comm="syz-executor314" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 21.831603][ T36] audit: type=1400 audit(1754961885.820:66): avc: denied { open } for pid=296 comm="syz-executor314" path="/dev/kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 21.835290][ T36] audit: type=1400 audit(1754961885.820:67): avc: denied { ioctl } for pid=296 comm="syz-executor314" path="/dev/kvm" dev="devtmpfs" ino=13 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=4, flags=0, guest_phys_addr=0x4000, memory_size=4096, userspace_addr=0x200000fec000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=5, flags=0, guest_phys_addr=0x5000, memory_size=4096, userspace_addr=0x200000fed000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=6, flags=0, guest_phys_addr=0x6000, memory_size=4096, userspace_addr=0x200000fee000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=7, flags=0, guest_phys_addr=0x7000, memory_size=4096, userspace_addr=0x200000fef000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=8, flags=0, guest_phys_addr=0x8000, memory_size=4096, userspace_addr=0x200000ff0000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=9, flags=0, guest_phys_addr=0x9000, memory_size=4096, userspace_addr=0x200000ff1000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=10, flags=0, guest_phys_addr=0xfec00000, memory_size=4096, userspace_addr=0x200000ff2000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=11, flags=0, guest_phys_addr=0xb000, memory_size=4096, userspace_addr=0x200000ff3000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=12, flags=0, guest_phys_addr=0xc000, memory_size=4096, userspace_addr=0x200000ff4000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=13, flags=0, guest_phys_addr=0xd000, memory_size=4096, userspace_addr=0x200000ff5000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=14, flags=0, guest_phys_addr=0xe000, memory_size=4096, userspace_addr=0x200000ff6000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=15, flags=0, guest_phys_addr=0xf000, memory_size=4096, userspace_addr=0x200000ff7000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=16, flags=0, guest_phys_addr=0x10000, memory_size=4096, userspace_addr=0x200000ff8000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=17, flags=0, guest_phys_addr=0x11000, memory_size=4096, userspace_addr=0x200000ff9000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=18, flags=0, guest_phys_addr=0x12000, memory_size=4096, userspace_addr=0x200000ffa000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=19, flags=0, guest_phys_addr=0x13000, memory_size=4096, userspace_addr=0x200000ffb000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=20, flags=0, guest_phys_addr=0x14000, memory_size=4096, userspace_addr=0x200000ffc000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=21, flags=0, guest_phys_addr=0x15000, memory_size=4096, userspace_addr=0x200000ffd000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=22, flags=0, guest_phys_addr=0x16000, memory_size=4096, userspace_addr=0x200000ffe000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=23, flags=0, guest_phys_addr=0x17000, memory_size=4096, userspace_addr=0x200000fff000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=65537, flags=0, guest_phys_addr=0x30000, memory_size=65536, userspace_addr=0x200000fe8000}) = -1 EBADF (Bad file descriptor) ioctl(5, KVM_GET_SREGS, {cs={base=0, limit=65535, selector=80, type=11, present=1, dpl=0, db=0, s=1, l=1, g=0, avl=0}, ...}) = 0 openat(AT_FDCWD, "/dev/kvm", O_RDWR) = 6 ioctl(6, KVM_GET_SUPPORTED_CPUID, {nent=31, entries=[...]}) = 0 ioctl(5, KVM_SET_CPUID2, {nent=31, entries=[...]}) = -1 EINVAL (Invalid argument) close(6) = 0 ioctl(5, KVM_SMI, 0) = 0 ioctl(5, KVM_SET_SREGS, {cs={base=0, limit=1048575, selector=16, type=11, present=1, dpl=0, db=0, s=1, l=0, g=0, avl=0}, ...}) = 0 ioctl(5, KVM_SET_REGS, {rax=0, ..., rsp=0xf80, rbp=0, ..., rip=0, rflags=0x2}) = 0 [ 21.892755][ T296] ------------[ cut here ]------------ [ 21.898319][ T296] WARNING: CPU: 1 PID: 296 at arch/x86/kvm/x86.c:8135 emulator_pio_in_out+0x38a/0x490 [ 21.907928][ T296] Modules linked in: [ 21.911852][ T296] CPU: 1 UID: 0 PID: 296 Comm: syz-executor314 Not tainted 6.12.38-syzkaller-gb632dc2e1d79 #0 9921eaa9ec7b66c9f160f95d92f0c8099666722b [ 21.925674][ T296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 21.935770][ T296] RIP: 0010:emulator_pio_in_out+0x38a/0x490 [ 21.941890][ T296] Code: b6 04 38 84 c0 0f 85 ec 00 00 00 66 44 89 23 31 c0 48 83 c4 38 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc cc e8 66 16 68 00 <0f> 0b e9 e6 fc ff ff 89 f9 80 e1 07 80 c1 03 38 c1 0f 8c ff fd ff [ 21.961528][ T296] RSP: 0018:ffffc9000127f250 EFLAGS: 00010293 [ 21.967639][ T296] RAX: ffffffff811dc6ca RBX: ffffc9000127f340 RCX: ffff888102b2df00 [ 21.975617][ T296] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 [ 21.983627][ T296] RBP: ffffc9000127f2b0 R08: 0000000000000001 R09: 0000000000000000 [ 21.991636][ T296] R10: 0000000000000000 R11: ffffffff812f9cd0 R12: 0000000000000cf8 [ 21.999634][ T296] R13: 0000000000000001 R14: 0000000000000001 R15: ffff8881037687f8 [ 22.007654][ T296] FS: 000055555fcc9380(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 22.016601][ T296] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 22.023210][ T296] CR2: 000000005200000c CR3: 0000000102fb6000 CR4: 00000000003526b0 [ 22.031225][ T296] Call Trace: [ 22.034518][ T296] [ 22.037442][ T296] ? kvm_arch_async_page_ready+0x480/0x480 [ 22.043269][ T296] emulator_pio_out+0x41/0x150 [ 22.048088][ T296] kvm_fast_pio+0x141/0x5f0 [ 22.052595][ T296] ? __cfi_kvm_fast_pio+0x10/0x10 [ 22.057645][ T296] ? clear_bhb_loop+0x50/0xa0 [ 22.062347][ T296] ? clear_bhb_loop+0x50/0xa0 [ 22.067023][ T296] ? clear_bhb_loop+0x50/0xa0 [ 22.071719][ T296] ? clear_bhb_loop+0x50/0xa0 [ 22.076415][ T296] ? clear_bhb_loop+0x50/0xa0 [ 22.081114][ T296] ? clear_bhb_loop+0x12/0xa0 [ 22.085811][ T296] handle_io+0xfe/0x150 [ 22.089996][ T296] ? __cfi_handle_io+0x10/0x10 [ 22.094771][ T296] vmx_handle_exit+0x12c5/0x1b40 [ 22.099729][ T296] ? __cfi_vmx_vcpu_run+0x10/0x10 [ 22.104775][ T296] ? vmx_handle_exit_irqoff+0xe9/0x7a0 [ 22.110273][ T296] vcpu_run+0x481a/0x7260 [ 22.114626][ T296] ? signal_pending+0xc0/0xc0 [ 22.119335][ T296] ? x86_emulate_instruction+0x217/0x1870 [ 22.125086][ T296] ? __cfi_complete_emulated_pio+0x10/0x10 [ 22.130974][ T296] kvm_arch_vcpu_ioctl_run+0x101a/0x1aa0 [ 22.136630][ T296] ? __cfi_kvm_arch_vcpu_ioctl_run+0x10/0x10 [ 22.142649][ T296] ? __cfi___switch_to+0x10/0x10 [ 22.147646][ T296] ? ioctl_has_perm+0x1aa/0x4d0 [ 22.152498][ T296] ? __asan_memcpy+0x5a/0x80 [ 22.157096][ T296] ? ioctl_has_perm+0x3e0/0x4d0 [ 22.161966][ T296] ? has_cap_mac_admin+0xd0/0xd0 [ 22.166915][ T296] ? __kasan_check_write+0x18/0x20 [ 22.172054][ T296] ? mutex_lock_killable+0x92/0x1c0 [ 22.177285][ T296] ? __cfi_mutex_lock_killable+0x10/0x10 [ 22.182943][ T296] kvm_vcpu_ioctl+0x96f/0xee0 [ 22.187663][ T296] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 22.192874][ T296] ? _raw_spin_lock_irq+0x8d/0x120 [ 22.198014][ T296] ? __cfi__raw_spin_lock_irq+0x10/0x10 [ 22.203583][ T296] ? __asan_memset+0x39/0x50 [ 22.208203][ T296] ? ptrace_stop+0x6c9/0x8c0 [ 22.212891][ T296] ? _raw_spin_unlock_irq+0x45/0x70 [ 22.218107][ T296] ? ptrace_notify+0x1e8/0x270 [ 22.222886][ T296] ? bpf_lsm_file_ioctl+0xd/0x20 [ 22.227945][ T296] ? security_file_ioctl+0x34/0xd0 [ 22.233086][ T296] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 22.238307][ T296] __se_sys_ioctl+0x132/0x1b0 [ 22.242997][ T296] __x64_sys_ioctl+0x7f/0xa0 [ 22.247695][ T296] x64_sys_call+0x1878/0x2ee0 [ 22.252393][ T296] do_syscall_64+0x58/0xf0 [ 22.256978][ T296] ? clear_bhb_loop+0x50/0xa0 [ 22.261687][ T296] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 22.267636][ T296] RIP: 0033:0x7efdc7658979 [ 22.272051][ T296] Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 22.291671][ T296] RSP: 002b:00007fffb182fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 22.300146][ T296] RAX: ffffffffffffffda RBX: 00007fffb182fe48 RCX: 00007efdc7658979 [ 22.308245][ T296] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 22.316238][ T296] RBP: 00007efdc76cb610 R08: 0000000000000000 R09: 00007fffb182fe48 [ 22.324224][ T296] R10: 0000000000009120 R11: 0000000000000246 R12: 0000000000000001 [ 22.332233][ T296] R13: 00007fffb182fe38 R14: 0000000000000001 R15: 0000000000000001 [ 22.340226][ T296] ioctl(5, KVM_RUN, 0) = 0 exit_group(0) = ? [ 22.343253][ T296] ---[ end trace 0000000000000000 ]--- +++ exited with 0 +++