./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor2847509255 <...> Warning: Permanently added '10.128.1.62' (ED25519) to the list of known hosts. execve("./syz-executor2847509255", ["./syz-executor2847509255"], 0x7ffe519ba520 /* 10 vars */) = 0 brk(NULL) = 0x55557c910000 brk(0x55557c910d00) = 0x55557c910d00 arch_prctl(ARCH_SET_FS, 0x55557c910380) = 0 set_tid_address(0x55557c910650) = 358 set_robust_list(0x55557c910660, 24) = 0 rseq(0x55557c910ca0, 0x20, 0, 0x53053053) = -1 ENOSYS (Function not implemented) prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor2847509255", 4096) = 28 getrandom("\x9c\x70\x0b\x85\x0b\x5c\x74\xbc", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x55557c910d00 brk(0x55557c931d00) = 0x55557c931d00 brk(0x55557c932000) = 0x55557c932000 mprotect(0x7fd32e346000, 16384, PROT_READ) = 0 mmap(0x3ffffffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x3ffffffff000 mmap(0x400000000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x400000000000 mmap(0x400001000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x400001000000 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x55557c910650) = 359 ./strace-static-x86_64: Process 359 attached [pid 359] set_robust_list(0x55557c910660, 24) = 0 [pid 359] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0 [pid 359] setpgid(0, 0) = 0 [pid 359] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC) = 3 [pid 359] write(3, "1000", 4) = 4 [pid 359] close(3) = 0 [pid 359] write(1, "executing program\n", 18executing program ) = 18 [pid 359] openat(AT_FDCWD, "/dev/kvm", O_RDONLY|O_SYNC|O_CLOEXEC) = 3 [ 25.596898][ T23] audit: type=1400 audit(1739764619.560:66): avc: denied { execmem } for pid=358 comm="syz-executor284" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 25.622427][ T23] audit: type=1400 audit(1739764619.590:67): avc: denied { read } for pid=359 comm="syz-executor284" name="kvm" dev="devtmpfs" ino=114 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [pid 359] ioctl(3, KVM_CREATE_VM, 0) = 4 [ 25.629301][ T359] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 25.645803][ T23] audit: type=1400 audit(1739764619.590:68): avc: denied { open } for pid=359 comm="syz-executor284" path="/dev/kvm" dev="devtmpfs" ino=114 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [pid 359] ioctl(4, KVM_CREATE_VCPU, 0) = 5 [pid 359] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=0, flags=0, guest_phys_addr=0, memory_size=4096, userspace_addr=0x400000fe8000}) = 0 [pid 359] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=1, flags=0, guest_phys_addr=0x1000, memory_size=4096, userspace_addr=0x400000fe9000}) = 0 [pid 359] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=2, flags=0, guest_phys_addr=0x2000, memory_size=4096, userspace_addr=0x400000fea000}) = 0 [pid 359] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=3, flags=0, guest_phys_addr=0x3000, memory_size=4096, userspace_addr=0x400000feb000}) = 0 [pid 359] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=4, flags=0, guest_phys_addr=0x4000, memory_size=4096, userspace_addr=0x400000fec000}) = 0 [pid 359] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=5, flags=0, guest_phys_addr=0x5000, memory_size=4096, userspace_addr=0x400000fed000}) = 0 [pid 359] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=6, flags=0, guest_phys_addr=0x6000, memory_size=4096, userspace_addr=0x400000fee000}) = 0 [pid 359] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=7, flags=0, guest_phys_addr=0x7000, memory_size=4096, userspace_addr=0x400000fef000}) = 0 [pid 359] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=8, flags=0, guest_phys_addr=0x8000, memory_size=4096, userspace_addr=0x400000ff0000}) = 0 [pid 359] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=9, flags=0, guest_phys_addr=0x9000, memory_size=4096, userspace_addr=0x400000ff1000}) = 0 [pid 359] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=10, flags=0, guest_phys_addr=0xfec00000, memory_size=4096, userspace_addr=0x400000ff2000}) = 0 [pid 359] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=11, flags=0, guest_phys_addr=0xb000, memory_size=4096, userspace_addr=0x400000ff3000}) = 0 [pid 359] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=12, flags=0, guest_phys_addr=0xc000, memory_size=4096, userspace_addr=0x400000ff4000}) = 0 [pid 359] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=13, flags=0, guest_phys_addr=0xd000, memory_size=4096, userspace_addr=0x400000ff5000}) = 0 [pid 359] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=14, flags=0, guest_phys_addr=0xe000, memory_size=4096, userspace_addr=0x400000ff6000}) = 0 [pid 359] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=15, flags=0, guest_phys_addr=0xf000, memory_size=4096, userspace_addr=0x400000ff7000}) = 0 [pid 359] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=16, flags=0, guest_phys_addr=0x10000, memory_size=4096, userspace_addr=0x400000ff8000}) = 0 [pid 359] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=17, flags=0, guest_phys_addr=0x11000, memory_size=4096, userspace_addr=0x400000ff9000}) = 0 [pid 359] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=18, flags=0, guest_phys_addr=0x12000, memory_size=4096, userspace_addr=0x400000ffa000}) = 0 [pid 359] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=19, flags=0, guest_phys_addr=0x13000, memory_size=4096, userspace_addr=0x400000ffb000}) = 0 [pid 359] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=20, flags=0, guest_phys_addr=0x14000, memory_size=4096, userspace_addr=0x400000ffc000}) = 0 [pid 359] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=21, flags=0, guest_phys_addr=0x15000, memory_size=4096, userspace_addr=0x400000ffd000}) = 0 [pid 359] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=22, flags=0, guest_phys_addr=0x16000, memory_size=4096, userspace_addr=0x400000ffe000}) = 0 [pid 359] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=23, flags=0, guest_phys_addr=0x17000, memory_size=4096, userspace_addr=0x400000fff000}) = 0 [pid 359] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=65537, flags=0, guest_phys_addr=0x30000, memory_size=65536, userspace_addr=0x400000fe8000}) = 0 [pid 359] ioctl(-1, KVM_GET_SREGS, 0x7fffaeff33c0) = -1 EBADF (Bad file descriptor) [ 25.684332][ T23] audit: type=1400 audit(1739764619.600:69): avc: denied { ioctl } for pid=359 comm="syz-executor284" path="/dev/kvm" dev="devtmpfs" ino=114 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 25.747330][ T359] BUG: kernel NULL pointer dereference, address: 0000000000000086 [ 25.755065][ T359] #PF: supervisor instruction fetch in kernel mode [ 25.761398][ T359] #PF: error_code(0x0010) - not-present page [ 25.767213][ T359] PGD 0 P4D 0 [ 25.770427][ T359] Oops: 0010 [#1] PREEMPT SMP KASAN [ 25.775463][ T359] CPU: 1 PID: 359 Comm: syz-executor284 Not tainted 5.4.289-syzkaller-00011-g39762b7a60e9 #0 [ 25.785441][ T359] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 25.795355][ T359] RIP: 0010:0x86 [ 25.798723][ T359] Code: Bad RIP value. [ 25.802624][ T359] RSP: 0018:ffff8881dc677308 EFLAGS: 00010086 [ 25.808528][ T359] RAX: ffff8881dc677338 RBX: dffffc0000000000 RCX: ffff8881eeb8af40 [ 25.816338][ T359] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 [ 25.824158][ T359] RBP: 0000000000000270 R08: ffffffff8231cac1 R09: ffffffff811c8f95 [ 25.831962][ T359] R10: ffff8881eeb8af40 R11: 0000000000000002 R12: ffffffff84600228 [ 25.839774][ T359] R13: fffffe0000000278 R14: ffff8881d9130000 R15: fffffe000000027b [ 25.847587][ T359] FS: 000055557c910380(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 25.856353][ T359] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 25.862773][ T359] CR2: 000000000000005c CR3: 00000001de931000 CR4: 00000000003426a0 [ 25.870586][ T359] Call Trace: [ 25.873722][ T359] ? __die+0xb4/0x100 [ 25.877565][ T359] ? no_context+0xac7/0xd20 [ 25.881874][ T359] ? is_prefetch+0x4b0/0x4b0 [ 25.886298][ T359] ? rcu_preempt_deferred_qs+0xa4/0x2b0 [ 25.891683][ T359] ? __do_page_fault+0xa72/0xbb0 [ 25.896456][ T359] ? vmx_spec_ctrl_restore_host+0x83/0xfd [ 25.902009][ T359] ? __bad_area_nosemaphore+0xc0/0x470 [ 25.907307][ T359] ? page_fault+0x2f/0x40 [ 25.911470][ T359] ? irq_entries_start+0x38/0x660 [ 25.916334][ T359] ? vmx_handle_exit_irqoff+0x45/0x220 [ 25.921624][ T359] ? check_preemption_disabled+0x91/0x320 [ 25.927197][ T359] ? handle_external_interrupt_irqoff+0x148/0x2f0 [ 25.933428][ T359] ? handle_external_interrupt_irqoff+0x12a/0x2f0 [ 25.939675][ T359] ? irq_entries_start+0x38/0x660 [ 25.944537][ T359] ? vcpu_enter_guest+0x2d06/0x9f70 [ 25.949574][ T359] ? check_preemption_disabled+0x9f/0x320 [ 25.955125][ T359] ? debug_smp_processor_id+0x20/0x20 [ 25.960341][ T359] ? __free_pages_ok+0x847/0x950 [ 25.965109][ T359] ? __kvm_set_memory_region+0xda6/0xf60 [ 25.970575][ T359] ? kvm_vm_ioctl_set_memory_region+0x67/0x90 [ 25.976478][ T359] ? do_vfs_ioctl+0x742/0x1720 [ 25.981076][ T359] ? __x64_sys_ioctl+0xd4/0x110 [ 25.985765][ T359] ? do_syscall_64+0xca/0x1c0 [ 25.990281][ T359] ? local_bh_enable+0x20/0x20 [ 25.994881][ T359] ? __free_one_page+0x7f3/0xa60 [ 25.999655][ T359] ? _raw_spin_unlock+0x49/0x60 [ 26.004342][ T359] ? set_pageblock_migratetype+0x150/0x150 [ 26.009990][ T359] ? kvm_mmu_change_mmu_pages+0x2dc/0x320 [ 26.015548][ T359] ? synchronize_srcu_expedited+0x20/0x20 [ 26.021099][ T359] ? check_preemption_disabled+0x9f/0x320 [ 26.026647][ T359] ? update_load_avg+0x40f/0x1210 [ 26.031506][ T359] ? sched_clock_cpu+0x18/0x3a0 [ 26.036195][ T359] ? check_preemption_disabled+0x9f/0x320 [ 26.041746][ T359] ? debug_smp_processor_id+0x20/0x20 [ 26.046956][ T359] ? vmx_vcpu_load_vmcs+0x655/0x8b0 [ 26.051988][ T359] ? try_to_wake_up+0x7c5/0x14f0 [ 26.056760][ T359] ? read_msr+0x40/0x40 [ 26.060754][ T359] ? check_preemption_disabled+0x9f/0x320 [ 26.066311][ T359] ? check_preemption_disabled+0x9f/0x320 [ 26.071863][ T359] ? debug_smp_processor_id+0x20/0x20 [ 26.077074][ T359] ? kvm_arch_vcpu_ioctl_run+0x748/0x18d0 [ 26.082721][ T359] ? kvm_vcpu_ioctl+0x7f9/0xd10 [ 26.087401][ T359] ? create_vcpu_fd+0x120/0x120 [ 26.092092][ T359] ? _raw_spin_lock_irq+0xa5/0x1b0 [ 26.097044][ T359] ? _raw_spin_lock_irqsave+0x210/0x210 [ 26.102426][ T359] ? cgroup_update_frozen+0x157/0xab0 [ 26.107622][ T359] ? cgroup_update_frozen+0x157/0xab0 [ 26.112835][ T359] ? cgroup_leave_frozen+0x13c/0x290 [ 26.117957][ T359] ? ptrace_stop+0x6ee/0xa30 [ 26.122381][ T359] ? create_vcpu_fd+0x120/0x120 [ 26.127069][ T359] ? do_vfs_ioctl+0x742/0x1720 [ 26.131699][ T359] ? ioctl_preallocate+0x250/0x250 [ 26.136613][ T359] ? check_preemption_disabled+0x153/0x320 [ 26.142287][ T359] ? syscall_trace_enter+0x650/0x940 [ 26.147376][ T359] ? do_syscall_64+0x1c0/0x1c0 [ 26.151978][ T359] ? switch_fpu_return+0x1d4/0x410 [ 26.156923][ T359] ? security_file_ioctl+0x7d/0xa0 [ 26.161869][ T359] ? __x64_sys_ioctl+0xd4/0x110 [ 26.166568][ T359] ? do_syscall_64+0xca/0x1c0 [ 26.171074][ T359] ? entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 26.176973][ T359] Modules linked in: [ 26.180715][ T359] CR2: 0000000000000086 [ 26.184704][ T359] ---[ end trace bf50a2fc364e823d ]--- [ 26.190001][ T359] RIP: 0010:0x86 [ 26.193375][ T359] Code: Bad RIP value. [ 26.197277][ T359] RSP: 0018:ffff8881dc677308 EFLAGS: 00010086 [ 26.203183][ T359] RAX: ffff8881dc677338 RBX: dffffc0000000000 RCX: ffff8881eeb8af40 [ 26.210996][ T359] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 [ 26.218807][ T359] RBP: 0000000000000270 R08: ffffffff8231cac1 R09: ffffffff811c8f95 [ 26.226615][ T359] R10: ffff8881eeb8af40 R11: 0000000000000002 R12: ffffffff84600228 [ 26.234429][ T359] R13: fffffe0000000278 R14: ffff8881d9130000 R15: fffffe000000027b [ 26.242239][ T359] FS: 000055557c910380(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 26.251003][ T359] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 26.257428][ T359] CR2: 000000000000005c CR3: 00000001de931000 CR4: 00000000003426a0 [ 26.265239][ T359] Kernel panic - not syncing: Fatal exception [ 26.271497][ T359] Kernel Offset: disabled [ 26.275618][ T359] Rebooting in 86400 seconds..