./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor497767637 <...> Warning: Permanently added '10.128.0.183' (ED25519) to the list of known hosts. execve("./syz-executor497767637", ["./syz-executor497767637"], 0x7fff216fc7f0 /* 10 vars */) = 0 brk(NULL) = 0x55557a784000 brk(0x55557a784d00) = 0x55557a784d00 arch_prctl(ARCH_SET_FS, 0x55557a784380) = 0 set_tid_address(0x55557a784650) = 296 set_robust_list(0x55557a784660, 24) = 0 rseq(0x55557a784ca0, 0x20, 0, 0x53053053) = -1 ENOSYS (Function not implemented) prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor497767637", 4096) = 27 getrandom("\xb4\xab\xcc\x7a\xe2\x16\x96\x31", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x55557a784d00 brk(0x55557a7a5d00) = 0x55557a7a5d00 brk(0x55557a7a6000) = 0x55557a7a6000 mprotect(0x7fbe5246a000, 16384, PROT_READ) = 0 mmap(0x1ffffffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffffffff000 mmap(0x200000000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0executing program ) = 0x200000000000 mmap(0x200001000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200001000000 write(1, "executing program\n", 18) = 18 mkdirat(AT_FDCWD, "./file0", 000) = 0 mount("./file0", "./file0", "incremental-fs", 0, NULL) = 0 openat(AT_FDCWD, "/dev/kvm", O_RDONLY|O_CREAT|O_NOATIME, 000) = 3 [ 28.253672][ T36] audit: type=1400 audit(1751710578.590:64): avc: denied { execmem } for pid=296 comm="syz-executor497" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 28.257226][ T296] kvm_intel: L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. ioctl(3, KVM_CREATE_VM, 0) = 4 ioctl(4, KVM_CREATE_VCPU, 0) = 5 ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=0, flags=0, guest_phys_addr=0, memory_size=4096, userspace_addr=0x200000000000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=1, flags=0, guest_phys_addr=0x1000, memory_size=4096, userspace_addr=0x200000001000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=2, flags=0, guest_phys_addr=0x2000, memory_size=4096, userspace_addr=0x200000002000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=3, flags=0, guest_phys_addr=0x3000, memory_size=4096, userspace_addr=0x200000003000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=4, flags=0, guest_phys_addr=0x4000, memory_size=4096, userspace_addr=0x200000004000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=5, flags=0, guest_phys_addr=0x5000, memory_size=4096, userspace_addr=0x200000005000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=6, flags=0, guest_phys_addr=0x6000, memory_size=4096, userspace_addr=0x200000006000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=7, flags=0, guest_phys_addr=0x7000, memory_size=4096, userspace_addr=0x200000007000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=8, flags=0, guest_phys_addr=0x8000, memory_size=4096, userspace_addr=0x200000008000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=9, flags=0, guest_phys_addr=0x9000, memory_size=4096, userspace_addr=0x200000009000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=10, flags=0, guest_phys_addr=0xfec00000, memory_size=4096, userspace_addr=0x20000000a000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=11, flags=0, guest_phys_addr=0xb000, memory_size=4096, userspace_addr=0x20000000b000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=12, flags=0, guest_phys_addr=0xc000, memory_size=4096, userspace_addr=0x20000000c000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=13, flags=0, guest_phys_addr=0xd000, memory_size=4096, userspace_addr=0x20000000d000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=14, flags=0, guest_phys_addr=0xe000, memory_size=4096, userspace_addr=0x20000000e000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=15, flags=0, guest_phys_addr=0xf000, memory_size=4096, userspace_addr=0x20000000f000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=16, flags=0, guest_phys_addr=0x10000, memory_size=4096, userspace_addr=0x200000010000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=17, flags=0, guest_phys_addr=0x11000, memory_size=4096, userspace_addr=0x200000011000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=18, flags=0, guest_phys_addr=0x12000, memory_size=4096, userspace_addr=0x200000012000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=19, flags=0, guest_phys_addr=0x13000, memory_size=4096, userspace_addr=0x200000013000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=20, flags=0, guest_phys_addr=0x14000, memory_size=4096, userspace_addr=0x200000014000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=21, flags=0, guest_phys_addr=0x15000, memory_size=4096, userspace_addr=0x200000015000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=22, flags=0, guest_phys_addr=0x16000, memory_size=4096, userspace_addr=0x200000016000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=23, flags=0, guest_phys_addr=0x17000, memory_size=4096, userspace_addr=0x200000017000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=65537, flags=0, guest_phys_addr=0x30000, memory_size=65536, userspace_addr=0x200000000000}) = -1 EBADF (Bad file descriptor) ioctl(5, KVM_GET_SREGS, {cs={base=0xffff0000, limit=65535, selector=61440, type=11, present=1, dpl=0, db=0, s=1, l=0, g=0, avl=0}, ...}) = 0 openat(AT_FDCWD, "/dev/kvm", O_RDWR) = 6 [ 28.274137][ T36] audit: type=1400 audit(1751710578.590:65): avc: denied { mounton } for pid=296 comm="syz-executor497" path="/root/file0" dev="sda1" ino=2024 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 28.313250][ T36] audit: type=1400 audit(1751710578.590:66): avc: denied { mount } for pid=296 comm="syz-executor497" name="/" dev="incremental-fs" ino=2024 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 ioctl(6, KVM_GET_SUPPORTED_CPUID, {nent=31, entries=[...]}) = 0 ioctl(5, KVM_SET_CPUID2, {nent=31, entries=[...]}) = 0 close(6) = 0 ioctl(5, KVM_SET_MSRS, 0x7ffd4a9ede70) = 5 ioctl(5, KVM_SET_SREGS, {cs={base=0, limit=1048575, selector=48, type=11, present=1, dpl=0, db=1, s=1, l=0, g=0, avl=0}, ...}) = 0 ioctl(5, KVM_SET_REGS, {rax=0, ..., rsp=0xf80, rbp=0, ..., rip=0, rflags=0x2}) = 0 openat(AT_FDCWD, "./file0", O_RDONLY) = 6 openat(6, ".pending_reads", O_RDONLY) = 7 [ 28.341899][ T36] audit: type=1400 audit(1751710578.590:67): avc: denied { read } for pid=296 comm="syz-executor497" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 28.348475][ T296] ------------[ cut here ]------------ [ 28.366048][ T36] audit: type=1400 audit(1751710578.590:68): avc: denied { open } for pid=296 comm="syz-executor497" path="/dev/kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 28.370206][ T296] WARNING: CPU: 0 PID: 296 at mm/page_alloc.c:5159 __alloc_pages_noprof+0xe4/0x6c0 [ 28.393745][ T36] audit: type=1400 audit(1751710578.590:69): avc: denied { ioctl } for pid=296 comm="syz-executor497" path="/dev/kvm" dev="devtmpfs" ino=13 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 28.402728][ T296] Modules linked in: [ 28.427710][ T36] audit: type=1400 audit(1751710578.680:70): avc: denied { write } for pid=296 comm="syz-executor497" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 28.431376][ T296] CPU: 0 UID: 0 PID: 296 Comm: syz-executor497 Not tainted 6.12.30-syzkaller-ge2bf362ee23b #0 e1c904518e9113895a28c59b25a6002cdacb68bf [ 28.454452][ T36] audit: type=1400 audit(1751710578.680:71): avc: denied { read } for pid=296 comm="syz-executor497" name=".pending_reads" dev="incremental-fs" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 28.468089][ T296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 28.492043][ T36] audit: type=1400 audit(1751710578.680:72): avc: denied { open } for pid=296 comm="syz-executor497" path="/root/file0/.pending_reads" dev="incremental-fs" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 28.501894][ T296] RIP: 0010:__alloc_pages_noprof+0xe4/0x6c0 [ 28.526921][ T36] audit: type=1400 audit(1751710578.680:73): avc: denied { ioctl } for pid=296 comm="syz-executor497" path="/root/file0/.pending_reads" dev="incremental-fs" ino=2 ioctlcmd=0x6726 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 28.532571][ T296] Code: 0f 1f 44 00 00 41 83 fd 0b 72 28 b8 00 20 00 00 23 44 24 40 75 1d 80 3d d4 32 ee 05 00 0f 85 c4 00 00 00 c6 05 c7 32 ee 05 01 <0f> 0b 31 c0 e9 b6 00 00 00 41 83 fd 0a 0f 87 aa 00 00 00 44 89 6c [ 28.578471][ T296] RSP: 0018:ffffc900011cf9a0 EFLAGS: 00010246 [ 28.584591][ T296] RAX: 0000000000000000 RBX: 1ffff92000239f38 RCX: 0000000000000000 [ 28.592612][ T296] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900011cfa48 [ 28.600635][ T296] RBP: ffffc900011cfad0 R08: ffffc900011cfa47 R09: 0000000000000000 [ 28.608630][ T296] R10: ffffc900011cfa30 R11: fffff52000239f49 R12: ffffc900011cf9e0 [ 28.616652][ T296] R13: 0000000000000034 R14: dffffc0000000000 R15: 0000000000000000 [ 28.624669][ T296] FS: 000055557a784380(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 28.633649][ T296] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 28.640250][ T296] CR2: 0000200000001008 CR3: 0000000102354000 CR4: 00000000003526b0 [ 28.648261][ T296] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 28.656279][ T296] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 28.664477][ T296] Call Trace: [ 28.667860][ T296] [ 28.670936][ T296] ? __ia32_compat_sys_ioctl+0x850/0x850 [ 28.676602][ T296] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 28.682384][ T296] ? pending_reads_dispatch_ioctl+0xc70/0x1fa0 [ 28.688582][ T296] ___kmalloc_large_node+0x9c/0x1d0 [ 28.693828][ T296] ? pending_reads_dispatch_ioctl+0xc70/0x1fa0 [ 28.700011][ T296] __kmalloc_large_node_noprof+0x1e/0xe0 [ 28.705690][ T296] ? pending_reads_dispatch_ioctl+0xc70/0x1fa0 [ 28.711904][ T296] __kmalloc_noprof+0x26d/0x450 [ 28.716768][ T296] ? __kasan_check_write+0x18/0x20 [ 28.721908][ T296] pending_reads_dispatch_ioctl+0xc70/0x1fa0 [ 28.727906][ T296] ? __cfi_pending_reads_dispatch_ioctl+0x10/0x10 [ 28.734630][ T296] ? selinux_file_ioctl+0x6e0/0x1360 [ 28.739946][ T296] ? __cfi_selinux_file_ioctl+0x10/0x10 [ 28.745535][ T296] ? __kasan_check_write+0x18/0x20 [ 28.750700][ T296] ? _raw_spin_lock_irq+0x8d/0x120 [ 28.755823][ T296] ? __cfi__raw_spin_lock_irq+0x10/0x10 [ 28.761403][ T296] ? __asan_memset+0x39/0x50 [ 28.766013][ T296] ? ptrace_stop+0x6c9/0x8c0 [ 28.770648][ T296] ? _raw_spin_unlock_irq+0x45/0x70 [ 28.775862][ T296] ? ptrace_notify+0x1e8/0x270 [ 28.780659][ T296] ? bpf_lsm_file_ioctl+0xd/0x20 [ 28.785617][ T296] ? security_file_ioctl+0x34/0xd0 [ 28.790768][ T296] ? __cfi_pending_reads_dispatch_ioctl+0x10/0x10 [ 28.797201][ T296] __se_sys_ioctl+0x132/0x1b0 [ 28.801927][ T296] __x64_sys_ioctl+0x7f/0xa0 [ 28.806557][ T296] x64_sys_call+0x1878/0x2ee0 [ 28.811272][ T296] do_syscall_64+0x58/0xf0 [ 28.815707][ T296] ? clear_bhb_loop+0x50/0xa0 [ 28.820423][ T296] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 28.826335][ T296] RIP: 0033:0x7fbe523f7279 [ 28.830938][ T296] Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 28.850625][ T296] RSP: 002b:00007ffd4a9ef9d8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 28.859055][ T296] RAX: ffffffffffffffda RBX: 0000200000000040 RCX: 00007fbe523f7279 [ 28.867065][ T296] RDX: 00002000000000c0 RSI: 0000000040106726 RDI: 0000000000000007 [ 28.875083][ T296] RBP: 00007fbe5246a610 R08: 00007ffd4a9efba8 R09: 00007ffd4a9efba8 [ 28.883103][ T296] R10: 00007ffd4a9efba8 R11: 0000000000000246 R12: 0000000000000001 [ 28.891121][ T296] R13: 00007ffd4a9efb98 R14: 0000000000000001 R15: 0000000000000001 [ 28.899114][ T296] ioctl(7, _IOC(_IOC_WRITE, 0x67, 0x26, 0x10), 0x2000000000c0) = -1 ENOMEM (Cannot allocate memory) exit_group(0) = ? [ 28.902162][ T296] ---[ end trace 0000000000000000 ]--- +++ exited with 0 +++