./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor3180393888 <...> Warning: Permanently added '10.128.1.96' (ED25519) to the list of known hosts. execve("./syz-executor3180393888", ["./syz-executor3180393888"], 0x7ffcfd68eb10 /* 10 vars */) = 0 brk(NULL) = 0x5555736e4000 brk(0x5555736e4d00) = 0x5555736e4d00 arch_prctl(ARCH_SET_FS, 0x5555736e4380) = 0 set_tid_address(0x5555736e4650) = 296 set_robust_list(0x5555736e4660, 24) = 0 rseq(0x5555736e4ca0, 0x20, 0, 0x53053053) = -1 ENOSYS (Function not implemented) prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor3180393888", 4096) = 28 getrandom("\x1d\x62\xe6\x6f\x67\x9a\x0b\x5d", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x5555736e4d00 brk(0x555573705d00) = 0x555573705d00 brk(0x555573706000) = 0x555573706000 mprotect(0x7f1983586000, 16384, PROT_READ) = 0 mmap(0x1ffffffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffffffff000 mmap(0x200000000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200000000000 mmap(0x200001000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200001000000 executing program write(1, "executing program\n", 18) = 18 openat(AT_FDCWD, "/dev/kvm", O_RDWR) = 3 [ 23.614022][ T36] audit: type=1400 audit(1755235220.270:64): avc: denied { execmem } for pid=296 comm="syz-executor318" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 23.616253][ T296] kvm_intel: L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. ioctl(3, KVM_CREATE_VM, 0) = 4 ioctl(4, KVM_CREATE_VCPU, 3) = 5 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=0, flags=0, guest_phys_addr=0, memory_size=4096, userspace_addr=0x200000fe8000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=1, flags=0, guest_phys_addr=0x1000, memory_size=4096, userspace_addr=0x200000fe9000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=2, flags=0, guest_phys_addr=0x2000, memory_size=4096, userspace_addr=0x200000fea000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=3, flags=0, guest_phys_addr=0x3000, memory_size=4096, userspace_addr=0x200000feb000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=4, flags=0, guest_phys_addr=0x4000, memory_size=4096, userspace_addr=0x200000fec000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=5, flags=0, guest_phys_addr=0x5000, memory_size=4096, userspace_addr=0x200000fed000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=6, flags=0, guest_phys_addr=0x6000, memory_size=4096, userspace_addr=0x200000fee000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=7, flags=0, guest_phys_addr=0x7000, memory_size=4096, userspace_addr=0x200000fef000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=8, flags=0, guest_phys_addr=0x8000, memory_size=4096, userspace_addr=0x200000ff0000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=9, flags=0, guest_phys_addr=0x9000, memory_size=4096, userspace_addr=0x200000ff1000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=10, flags=0, guest_phys_addr=0xfec00000, memory_size=4096, userspace_addr=0x200000ff2000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=11, flags=0, guest_phys_addr=0xb000, memory_size=4096, userspace_addr=0x200000ff3000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=12, flags=0, guest_phys_addr=0xc000, memory_size=4096, userspace_addr=0x200000ff4000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=13, flags=0, guest_phys_addr=0xd000, memory_size=4096, userspace_addr=0x200000ff5000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=14, flags=0, guest_phys_addr=0xe000, memory_size=4096, userspace_addr=0x200000ff6000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=15, flags=0, guest_phys_addr=0xf000, memory_size=4096, userspace_addr=0x200000ff7000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=16, flags=0, guest_phys_addr=0x10000, memory_size=4096, userspace_addr=0x200000ff8000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=17, flags=0, guest_phys_addr=0x11000, memory_size=4096, userspace_addr=0x200000ff9000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=18, flags=0, guest_phys_addr=0x12000, memory_size=4096, userspace_addr=0x200000ffa000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=19, flags=0, guest_phys_addr=0x13000, memory_size=4096, userspace_addr=0x200000ffb000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=20, flags=0, guest_phys_addr=0x14000, memory_size=4096, userspace_addr=0x200000ffc000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=21, flags=0, guest_phys_addr=0x15000, memory_size=4096, userspace_addr=0x200000ffd000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=22, flags=0, guest_phys_addr=0x16000, memory_size=4096, userspace_addr=0x200000ffe000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=23, flags=0, guest_phys_addr=0x17000, memory_size=4096, userspace_addr=0x200000fff000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=65537, flags=0, guest_phys_addr=0x30000, memory_size=65536, userspace_addr=0x200000fe8000}) = 0 ioctl(5, KVM_GET_SREGS, {cs={base=0xffff0000, limit=65535, selector=61440, type=11, present=1, dpl=0, db=0, s=1, l=0, g=0, avl=0}, ...}) = 0 openat(AT_FDCWD, "/dev/kvm", O_RDWR) = 6 ioctl(6, KVM_GET_SUPPORTED_CPUID, {nent=31, entries=[...]}) = 0 ioctl(5, KVM_SET_CPUID2, {nent=31, entries=[...]}) = 0 [ 23.633918][ T36] audit: type=1400 audit(1755235220.270:65): avc: denied { read write } for pid=296 comm="syz-executor318" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 23.681112][ T36] audit: type=1400 audit(1755235220.270:66): avc: denied { open } for pid=296 comm="syz-executor318" path="/dev/kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 close(6) = 0 ioctl(5, KVM_SET_MSRS, 0x7ffe2bb48470) = 5 ioctl(5, KVM_SET_SREGS, {cs={base=0, limit=1048575, selector=48, type=11, present=1, dpl=0, db=1, s=1, l=0, g=0, avl=0}, ...}) = 0 ioctl(5, KVM_SET_REGS, {rax=0, ..., rsp=0xf80, rbp=0, ..., rip=0, rflags=0x2}) = 0 ioctl(5, KVM_SET_REGS, {rax=0x3, ..., rsp=0x8000000000000001, rbp=0x80000001, ..., rip=0, rflags=0x2280}) = 0 ioctl(5, KVM_RUN, 0) = 0 socket(AF_PACKET, SOCK_RAW, htons(0 /* ETH_P_??? */)) = 6 mmap(0x200000fe8000, 8192, PROT_READ|PROT_EXEC, MAP_SHARED_VALIDATE|MAP_FIXED, 6, 0x836f3000) = -1 EINVAL (Invalid argument) ioctl(5, KVM_RUN, 0) = -1 EFAULT (Bad address) [ 23.704432][ T36] audit: type=1400 audit(1755235220.270:67): avc: denied { ioctl } for pid=296 comm="syz-executor318" path="/dev/kvm" dev="devtmpfs" ino=13 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 23.729346][ T36] audit: type=1400 audit(1755235220.370:68): avc: denied { create } for pid=296 comm="syz-executor318" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 23.731233][ T296] ------------[ cut here ]------------ [ 23.749401][ T36] audit: type=1400 audit(1755235220.390:69): avc: denied { map } for pid=296 comm="syz-executor318" path="socket:[2891]" dev="sockfs" ino=2891 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 23.754858][ T296] WARNING: CPU: 0 PID: 296 at arch/x86/kvm/x86.c:11569 kvm_arch_vcpu_ioctl_run+0x12af/0x1aa0 [ 23.778251][ T36] audit: type=1400 audit(1755235220.390:70): avc: denied { read accept } for pid=296 comm="syz-executor318" path="socket:[2891]" dev="sockfs" ino=2891 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 23.812729][ T296] Modules linked in: [ 23.816642][ T296] CPU: 0 UID: 0 PID: 296 Comm: syz-executor318 Not tainted 6.12.38-syzkaller-g450db842cf3b #0 67dc9e25005870c23be976f8e40d6eb6654f4075 [ 23.830501][ T296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 23.840697][ T296] RIP: 0010:kvm_arch_vcpu_ioctl_run+0x12af/0x1aa0 [ 23.847147][ T296] Code: 7e 3b e8 34 06 6a 00 49 bd 00 00 00 00 00 fc ff df 4c 8b 7c 24 20 4c 8b 64 24 40 48 8b 5c 24 28 e9 26 fd ff ff e8 11 06 6a 00 <0f> 0b e9 e4 fc ff ff e8 05 06 6a 00 0f 0b e9 0e fd ff ff e8 f9 05 [ 23.866844][ T296] RSP: 0018:ffffc9000122f9c0 EFLAGS: 00010293 [ 23.872980][ T296] RAX: ffffffff811bd81f RBX: ffff888118bfc300 RCX: ffff8881027aa600 [ 23.881202][ T296] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 [ 23.889395][ T296] RBP: ffffc9000122fc70 R08: ffff8881027aa607 R09: 1ffff110204f54c0 [ 23.897368][ T296] R10: dffffc0000000000 R11: ffffed10204f54c1 R12: ffff88810c6c1000 [ 23.905472][ T296] R13: dffffc0000000000 R14: 0000000000000001 R15: ffff888118bfc378 [ 23.913500][ T296] FS: 00005555736e4380(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 23.922514][ T296] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 23.929180][ T296] CR2: 000000005200000c CR3: 000000012d576000 CR4: 00000000003526b0 [ 23.937268][ T296] Call Trace: [ 23.940604][ T296] [ 23.943635][ T296] ? save_fpregs_to_fpstate+0x196/0x230 [ 23.949254][ T296] ? __cfi_kvm_arch_vcpu_ioctl_run+0x10/0x10 [ 23.955327][ T296] ? __cfi___switch_to+0x10/0x10 [ 23.960365][ T296] ? ioctl_has_perm+0x1aa/0x4d0 [ 23.965331][ T296] ? __asan_memcpy+0x5a/0x80 [ 23.969977][ T296] ? ioctl_has_perm+0x3e0/0x4d0 [ 23.974934][ T296] ? has_cap_mac_admin+0xd0/0xd0 [ 23.979899][ T296] ? __kasan_check_write+0x18/0x20 [ 23.985033][ T296] ? mutex_lock_killable+0x92/0x1c0 [ 23.990262][ T296] ? __cfi_mutex_lock_killable+0x10/0x10 [ 23.995918][ T296] kvm_vcpu_ioctl+0x96f/0xee0 [ 24.000727][ T296] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 24.005949][ T296] ? _raw_spin_lock_irq+0x8d/0x120 [ 24.011303][ T296] ? __cfi__raw_spin_lock_irq+0x10/0x10 [ 24.016918][ T296] ? __asan_memset+0x39/0x50 [ 24.021583][ T296] ? ptrace_stop+0x6c9/0x8c0 [ 24.026191][ T296] ? _raw_spin_unlock_irq+0x45/0x70 [ 24.031504][ T296] ? ptrace_notify+0x1e8/0x270 [ 24.036309][ T296] ? bpf_lsm_file_ioctl+0xd/0x20 [ 24.041308][ T296] ? security_file_ioctl+0x34/0xd0 [ 24.046652][ T296] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 24.052005][ T296] __se_sys_ioctl+0x135/0x1b0 [ 24.056802][ T296] __x64_sys_ioctl+0x7f/0xa0 [ 24.061429][ T296] x64_sys_call+0x1878/0x2ee0 [ 24.066140][ T296] do_syscall_64+0x58/0xf0 [ 24.070634][ T296] ? clear_bhb_loop+0x50/0xa0 [ 24.075333][ T296] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 24.081291][ T296] RIP: 0033:0x7f1983513439 [ 24.085722][ T296] Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 24.105582][ T296] RSP: 002b:00007ffe2bb49fc8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 ioctl(5, KVM_RUN, 0) = -1 EFAULT (Bad address) exit_group(0) = ? [ 24.114053][ T296] RAX: ffffffffffffffda RBX: 00007ffe2bb4a1a8 RCX: 00007f1983513439 [ 24.122156][ T296] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 24.130412][ T296] RBP: 00007f1983586610 R08: 00000000836f3000 R09: 00000000836f3000 [ 24.139217][ T296] R10: 00000000836f3000 R11: 0000000000000246 R12: 0000000000000001 [ 24.147291][ T296] R13: 00007ffe2bb4a198 R14: 0000000000000001 R15: 0000000000000001 [ 24.155355][ T296] [ 24.158398][ T296] ---[ end trace 0000000000000000 ]--- +++ exited with 0 +++