./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor2079006920 <...> Warning: Permanently added '10.128.0.199' (ED25519) to the list of known hosts. execve("./syz-executor2079006920", ["./syz-executor2079006920"], 0x7fffe91af930 /* 10 vars */) = 0 brk(NULL) = 0x5555573e6000 brk(0x5555573e6d00) = 0x5555573e6d00 arch_prctl(ARCH_SET_FS, 0x5555573e6380) = 0 set_tid_address(0x5555573e6650) = 5009 set_robust_list(0x5555573e6660, 24) = 0 rseq(0x5555573e6ca0, 0x20, 0, 0x53053053) = 0 prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor2079006920", 4096) = 28 getrandom("\xbb\x4a\x53\xe3\x5b\x60\x87\x32", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x5555573e6d00 brk(0x555557407d00) = 0x555557407d00 brk(0x555557408000) = 0x555557408000 mprotect(0x7f4d4e1e1000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x5555573e6650) = 5010 ./strace-static-x86_64: Process 5010 attached [pid 5010] set_robust_list(0x5555573e6660, 24) = 0 [pid 5010] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0 [pid 5010] setpgid(0, 0) = 0 [pid 5010] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC) = 3 [pid 5010] write(3, "1000", 4) = 4 [pid 5010] close(3) = 0 [pid 5010] openat(AT_FDCWD, "/dev/kvm", O_RDONLY) = 3 [pid 5010] ioctl(3, KVM_CREATE_VM, 0) = 4 [pid 5010] dup(4) = 5 [pid 5010] ioctl(5, KVM_CREATE_VCPU, 0) = 6 [pid 5010] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=0, flags=KVM_MEM_READONLY, guest_phys_addr=0, memory_size=8192, userspace_addr=0x20000000}) = 0 [pid 5010] ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=0, flags=0, guest_phys_addr=0, memory_size=4096, userspace_addr=0x20000000}) = -1 EBADF (Bad file descriptor) [pid 5010] ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=1, flags=0, guest_phys_addr=0x1000, memory_size=4096, userspace_addr=0x20001000}) = -1 EBADF (Bad file descriptor) [ 137.123643][ T5010] kvm_intel: L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [pid 5010] ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=2, flags=0, guest_phys_addr=0x2000, memory_size=4096, userspace_addr=0x20002000}) = -1 EBADF (Bad file descriptor) [pid 5010] ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=3, flags=0, guest_phys_addr=0x3000, memory_size=4096, userspace_addr=0x20003000}) = -1 EBADF (Bad file descriptor) [pid 5010] ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=4, flags=0, guest_phys_addr=0x4000, memory_size=4096, userspace_addr=0x20004000}) = -1 EBADF (Bad file descriptor) [pid 5010] ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=5, flags=0, guest_phys_addr=0x5000, memory_size=4096, userspace_addr=0x20005000}) = -1 EBADF (Bad file descriptor) [pid 5010] ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=6, flags=0, guest_phys_addr=0x6000, memory_size=4096, userspace_addr=0x20006000}) = -1 EBADF (Bad file descriptor) [pid 5010] ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=7, flags=0, guest_phys_addr=0x7000, memory_size=4096, userspace_addr=0x20007000}) = -1 EBADF (Bad file descriptor) [pid 5010] ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=8, flags=0, guest_phys_addr=0x8000, memory_size=4096, userspace_addr=0x20008000}) = -1 EBADF (Bad file descriptor) [pid 5010] ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=9, flags=0, guest_phys_addr=0x9000, memory_size=4096, userspace_addr=0x20009000}) = -1 EBADF (Bad file descriptor) [pid 5010] ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=10, flags=0, guest_phys_addr=0xfec00000, memory_size=4096, userspace_addr=0x2000a000}) = -1 EBADF (Bad file descriptor) [pid 5010] ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=11, flags=0, guest_phys_addr=0xb000, memory_size=4096, userspace_addr=0x2000b000}) = -1 EBADF (Bad file descriptor) [pid 5010] ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=12, flags=0, guest_phys_addr=0xc000, memory_size=4096, userspace_addr=0x2000c000}) = -1 EBADF (Bad file descriptor) [pid 5010] ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=13, flags=0, guest_phys_addr=0xd000, memory_size=4096, userspace_addr=0x2000d000}) = -1 EBADF (Bad file descriptor) [pid 5010] ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=14, flags=0, guest_phys_addr=0xe000, memory_size=4096, userspace_addr=0x2000e000}) = -1 EBADF (Bad file descriptor) [pid 5010] ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=15, flags=0, guest_phys_addr=0xf000, memory_size=4096, userspace_addr=0x2000f000}) = -1 EBADF (Bad file descriptor) [pid 5010] ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=16, flags=0, guest_phys_addr=0x10000, memory_size=4096, userspace_addr=0x20010000}) = -1 EBADF (Bad file descriptor) [pid 5010] ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=17, flags=0, guest_phys_addr=0x11000, memory_size=4096, userspace_addr=0x20011000}) = -1 EBADF (Bad file descriptor) [pid 5010] ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=18, flags=0, guest_phys_addr=0x12000, memory_size=4096, userspace_addr=0x20012000}) = -1 EBADF (Bad file descriptor) [pid 5010] ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=19, flags=0, guest_phys_addr=0x13000, memory_size=4096, userspace_addr=0x20013000}) = -1 EBADF (Bad file descriptor) [pid 5010] ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=20, flags=0, guest_phys_addr=0x14000, memory_size=4096, userspace_addr=0x20014000}) = -1 EBADF (Bad file descriptor) [pid 5010] ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=21, flags=0, guest_phys_addr=0x15000, memory_size=4096, userspace_addr=0x20015000}) = -1 EBADF (Bad file descriptor) [pid 5010] ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=22, flags=0, guest_phys_addr=0x16000, memory_size=4096, userspace_addr=0x20016000}) = -1 EBADF (Bad file descriptor) [pid 5010] ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=23, flags=0, guest_phys_addr=0x17000, memory_size=4096, userspace_addr=0x20017000}) = -1 EBADF (Bad file descriptor) [pid 5010] ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=65537, flags=0, guest_phys_addr=0x30000, memory_size=65536, userspace_addr=0x20000000}) = -1 EBADF (Bad file descriptor) [pid 5010] ioctl(6, KVM_GET_SREGS, {cs={base=0xffff0000, limit=65535, selector=61440, type=11, present=1, dpl=0, db=0, s=1, l=0, g=0, avl=0}, ...}) = 0 [pid 5010] openat(AT_FDCWD, "/dev/kvm", O_RDWR) = 7 [pid 5010] ioctl(7, KVM_GET_SUPPORTED_CPUID, {nent=31, entries=[...]}) = 0 [pid 5010] ioctl(6, KVM_SET_CPUID2, {nent=31, entries=[...]}) = 0 [pid 5010] close(7) = 0 [pid 5010] ioctl(6, KVM_SET_SREGS, {cs={base=0, limit=1048575, selector=16, type=11, present=1, dpl=0, db=0, s=1, l=0, g=0, avl=0}, ...}) = 0 [pid 5010] ioctl(6, KVM_SET_REGS, {rax=0, ..., rsp=0xf80, rbp=0, ..., rip=0, rflags=0x2}) = 0 [pid 5010] sendmsg(-1, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base=NULL, iov_len=68}], msg_iovlen=1, msg_controllen=0, msg_flags=0}, 0) = -1 EBADF (Bad file descriptor) [pid 5010] ioctl(4, KVM_REGISTER_COALESCED_MMIO, 0x200001c0) = 0 [pid 5010] ioctl(6, KVM_NMI, 0) = 0 [ 137.243152][ T5010] ===================================================== [ 137.250363][ T5010] BUG: KMSAN: uninit-value in em_ret_far+0x332/0x340 [ 137.257306][ T5010] em_ret_far+0x332/0x340 [ 137.261864][ T5010] x86_emulate_insn+0x1d81/0x5800 [ 137.267050][ T5010] x86_emulate_instruction+0x13c5/0x3090 [ 137.272942][ T5010] kvm_mmu_page_fault+0x100a/0x1120 [ 137.278280][ T5010] handle_ept_violation+0x4ef/0x7e0 [ 137.283763][ T5010] vmx_handle_exit+0x1b01/0x2130 [ 137.288955][ T5010] kvm_arch_vcpu_ioctl_run+0x9d4f/0xc680 [ 137.294948][ T5010] kvm_vcpu_ioctl+0xbfc/0x1770 [ 137.299865][ T5010] __se_sys_ioctl+0x225/0x410 [ 137.304943][ T5010] __x64_sys_ioctl+0x96/0xe0 [ 137.309696][ T5010] do_syscall_64+0x44/0x110 [ 137.314417][ T5010] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 137.320580][ T5010] [ 137.322983][ T5010] Local variable eip created at: [ 137.327978][ T5010] em_ret_far+0x3a/0x340 [ 137.332407][ T5010] x86_emulate_insn+0x1d81/0x5800 [ 137.337567][ T5010] [ 137.339952][ T5010] CPU: 0 PID: 5010 Comm: syz-executor207 Not tainted 6.7.0-rc6-syzkaller-00010-g2cf4f94d8e86 #0 [ 137.350670][ T5010] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 137.361013][ T5010] ===================================================== [ 137.368034][ T5010] Disabling lock debugging due to kernel taint [ 137.374430][ T5010] Kernel panic - not syncing: kmsan.panic set ... [ 137.380942][ T5010] CPU: 0 PID: 5010 Comm: syz-executor207 Tainted: G B 6.7.0-rc6-syzkaller-00010-g2cf4f94d8e86 #0 [ 137.393053][ T5010] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 137.403197][ T5010] Call Trace: [ 137.406564][ T5010] [ 137.409578][ T5010] dump_stack_lvl+0x1bf/0x240 [ 137.414382][ T5010] dump_stack+0x1e/0x20 [ 137.418629][ T5010] panic+0x4de/0xc90 [ 137.422605][ T5010] ? add_taint+0x108/0x1a0 [ 137.427198][ T5010] kmsan_report+0x2d0/0x2d0 [ 137.431816][ T5010] ? __msan_warning+0x96/0x110 [ 137.436695][ T5010] ? em_ret_far+0x332/0x340 [ 137.441354][ T5010] ? x86_emulate_insn+0x1d81/0x5800 [ 137.446776][ T5010] ? x86_emulate_instruction+0x13c5/0x3090 [ 137.452685][ T5010] ? kvm_mmu_page_fault+0x100a/0x1120 [ 137.458162][ T5010] ? handle_ept_violation+0x4ef/0x7e0 [ 137.463680][ T5010] ? vmx_handle_exit+0x1b01/0x2130 [ 137.468903][ T5010] ? kvm_arch_vcpu_ioctl_run+0x9d4f/0xc680 [ 137.474874][ T5010] ? kvm_vcpu_ioctl+0xbfc/0x1770 [ 137.479915][ T5010] ? __se_sys_ioctl+0x225/0x410 [ 137.484951][ T5010] ? __x64_sys_ioctl+0x96/0xe0 [ 137.489860][ T5010] ? do_syscall_64+0x44/0x110 [ 137.494634][ T5010] ? entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 137.500872][ T5010] ? vmx_set_segment+0x24b/0x270 [ 137.505938][ T5010] ? emulator_set_segment+0x3bf/0x4b0 [ 137.511560][ T5010] ? kmsan_get_shadow_origin_ptr+0x4d/0xa0 [ 137.517554][ T5010] ? __load_segment_descriptor+0x394/0x1b70 [ 137.523657][ T5010] ? emulate_pop+0x9ed/0xb50 [ 137.528423][ T5010] ? kmsan_get_shadow_origin_ptr+0x4d/0xa0 [ 137.534436][ T5010] __msan_warning+0x96/0x110 [ 137.539299][ T5010] em_ret_far+0x332/0x340 [ 137.543807][ T5010] ? em_lseg+0x2b0/0x3e0 [ 137.548215][ T5010] x86_emulate_insn+0x1d81/0x5800 [ 137.553390][ T5010] ? em_ret_far_imm+0x4f0/0x4f0 [ 137.558386][ T5010] x86_emulate_instruction+0x13c5/0x3090 [ 137.564203][ T5010] kvm_mmu_page_fault+0x100a/0x1120 [ 137.569558][ T5010] handle_ept_violation+0x4ef/0x7e0 [ 137.574924][ T5010] ? handle_desc+0xc0/0xc0 [ 137.579431][ T5010] vmx_handle_exit+0x1b01/0x2130 [ 137.584481][ T5010] ? kmsan_get_shadow_origin_ptr+0x4d/0xa0 [ 137.590584][ T5010] kvm_arch_vcpu_ioctl_run+0x9d4f/0xc680 [ 137.596358][ T5010] ? kmsan_internal_set_shadow_origin+0x66/0xe0 [ 137.602855][ T5010] ? tomoyo_path_number_perm+0x82d/0x8e0 [ 137.608674][ T5010] ? kmsan_get_shadow_origin_ptr+0x4d/0xa0 [ 137.614662][ T5010] ? kmsan_get_shadow_origin_ptr+0x4d/0xa0 [ 137.620625][ T5010] ? put_pid+0xd8/0x150 [ 137.624868][ T5010] ? kvm_vcpu_ioctl+0x174c/0x1770 [ 137.630005][ T5010] kvm_vcpu_ioctl+0xbfc/0x1770 [ 137.634939][ T5010] ? kmsan_get_shadow_origin_ptr+0x4d/0xa0 [ 137.640963][ T5010] ? kvm_pm_notifier_call+0x50/0x50 [ 137.646317][ T5010] __se_sys_ioctl+0x225/0x410 [ 137.651121][ T5010] __x64_sys_ioctl+0x96/0xe0 [ 137.655826][ T5010] do_syscall_64+0x44/0x110 [ 137.660462][ T5010] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 137.666523][ T5010] RIP: 0033:0x7f4d4e16d839 [ 137.671000][ T5010] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 c1 17 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 137.690918][ T5010] RSP: 002b:00007fffc605deb8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 137.699427][ T5010] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f4d4e16d839 [ 137.707491][ T5010] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000006 [ 137.715591][ T5010] RBP: 0000000000000000 R08: 0000000000000006 R09: 0000000000000006 [ 137.723751][ T5010] R10: 0000000000000006 R11: 0000000000000246 R12: 0000000000003a28 [ 137.731816][ T5010] R13: 431bde82d7b634db R14: 0000000000000001 R15: 0000000000000001 [ 137.739910][ T5010] [ 137.743230][ T5010] Kernel Offset: disabled [ 137.747606][ T5010] Rebooting in 86400 seconds..