[ OK ] Started OpenBSD Secure Shell server. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.65' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 33.890683] audit: type=1400 audit(1588115356.478:8): avc: denied { execmem } for pid=6333 comm="syz-executor167" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 [ 33.892944] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 33.943976] faulting far call emulation tainted memory [ 34.178279] ------------[ cut here ]------------ [ 34.178298] WARNING: CPU: 1 PID: 6338 at arch/x86/kvm/x86.c:7541 kvm_arch_vcpu_ioctl_run+0xe7/0xfd0 [ 34.178302] Kernel panic - not syncing: panic_on_warn set ... [ 34.178302] [ 34.178310] CPU: 1 PID: 6338 Comm: syz-executor167 Not tainted 4.14.177-syzkaller #0 [ 34.178314] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 34.178316] Call Trace: [ 34.178328] dump_stack+0x13e/0x194 [ 34.178338] panic+0x1f9/0x42d [ 34.178344] ? add_taint.cold+0x16/0x16 [ 34.178355] ? kvm_arch_vcpu_ioctl_run+0xe7/0xfd0 [ 34.178374] ? kvm_arch_vcpu_ioctl_run+0xe7/0xfd0 [ 34.178379] __warn.cold+0x2f/0x30 [ 34.178389] ? ist_end_non_atomic+0x10/0x10 [ 34.178396] ? kvm_arch_vcpu_ioctl_run+0xe7/0xfd0 [ 34.178404] report_bug+0x20a/0x248 [ 34.256135] do_error_trap+0x195/0x2d0 [ 34.260015] ? math_error+0x2d0/0x2d0 [ 34.263792] ? lock_acquire+0x170/0x3f0 [ 34.267739] ? lock_downgrade+0x6e0/0x6e0 [ 34.271862] ? do_raw_spin_lock+0x189/0x230 [ 34.276190] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 34.281009] invalid_op+0x1b/0x40 [ 34.284450] RIP: 0010:kvm_arch_vcpu_ioctl_run+0xe7/0xfd0 [ 34.289876] RSP: 0018:ffff888097db7c00 EFLAGS: 00010297 [ 34.295352] RAX: ffff8880975006c0 RBX: ffff8880a9323000 RCX: 0000000000000000 [ 34.302865] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff888097db8268 [ 34.310111] RBP: ffff888097db8040 R08: 0000000000000001 R09: 0000000000000000 [ 34.317368] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 34.324631] R13: ffff888097db8118 R14: ffff888097db845c R15: ffff888097db8040 [ 34.331891] ? rcu_read_lock_sched_held+0x10a/0x130 [ 34.336888] ? kmem_cache_free+0x23a/0x2b0 [ 34.341098] ? put_pid_ns+0x16/0x80 [ 34.344702] kvm_vcpu_ioctl+0x3df/0xc70 [ 34.348671] ? kvm_vcpu_block+0xb70/0xb70 [ 34.352796] ? trace_hardirqs_on+0x10/0x10 [ 34.357008] ? save_trace+0x290/0x290 [ 34.360788] ? kvm_vcpu_block+0xb70/0xb70 [ 34.364929] do_vfs_ioctl+0x75a/0xfe0 [ 34.368710] ? selinux_file_mprotect+0x5c0/0x5c0 [ 34.373528] ? ioctl_preallocate+0x1a0/0x1a0 [ 34.377925] ? security_file_ioctl+0x76/0xb0 [ 34.382320] ? security_file_ioctl+0x83/0xb0 [ 34.386716] SyS_ioctl+0x7f/0xb0 [ 34.390058] ? do_vfs_ioctl+0xfe0/0xfe0 [ 34.394009] do_syscall_64+0x1d5/0x640 [ 34.397882] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 34.403081] RIP: 0033:0x449c09 [ 34.406262] RSP: 002b:00007fcf543f3ce8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 34.413945] RAX: ffffffffffffffda RBX: 00000000006dfc58 RCX: 0000000000449c09 [ 34.421190] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 34.428445] RBP: 00000000006dfc50 R08: 00007fcf543f4700 R09: 0000000000000000 [ 34.435685] R10: 00007fcf543f4700 R11: 0000000000000246 R12: 00000000006dfc5c [ 34.442933] R13: 00007ffc3bcf55cf R14: 00007fcf543f49c0 R15: 20c49ba5e353f7cf [ 34.451699] Kernel Offset: disabled [ 34.455355] Rebooting in 86400 seconds..