./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor4284869652 <...> Warning: Permanently added '10.128.0.156' (ED25519) to the list of known hosts. execve("./syz-executor4284869652", ["./syz-executor4284869652"], 0x7ffc62b25aa0 /* 10 vars */) = 0 brk(NULL) = 0x55555607b000 brk(0x55555607bd00) = 0x55555607bd00 arch_prctl(ARCH_SET_FS, 0x55555607b380) = 0 set_tid_address(0x55555607b650) = 5000 set_robust_list(0x55555607b660, 24) = 0 rseq(0x55555607bca0, 0x20, 0, 0x53053053) = 0 prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor4284869652", 4096) = 28 getrandom("\xd5\x1a\x60\x40\xfb\x43\xca\xcd", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x55555607bd00 brk(0x55555609cd00) = 0x55555609cd00 brk(0x55555609d000) = 0x55555609d000 mprotect(0x7eff39810000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x55555607b650) = 5001 ./strace-static-x86_64: Process 5001 attached [pid 5001] set_robust_list(0x55555607b660, 24) = 0 [pid 5001] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0 [pid 5001] setpgid(0, 0) = 0 [pid 5001] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC) = 3 [pid 5001] write(3, "1000", 4) = 4 [pid 5001] close(3) = 0 [pid 5001] openat(AT_FDCWD, "/dev/kvm", O_RDONLY) = 3 [pid 5001] ioctl(3, KVM_CREATE_VM, 0) = 4 [pid 5001] openat(AT_FDCWD, "cpuacct.stat", O_RDWR|O_CREAT|O_NOCTTY|O_TRUNC|O_APPEND|FASYNC|0x18, 000) = 5 [ 160.200626][ T5001] kvm_intel: L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [pid 5001] write(5, "\x37\x7c\x88\x9c\xf7\x45\xa2\x2e\x44\xb0\x45\xa9\xaa\xf4\x56\xdd\xb4\xd5\xb0\x05\xc2\xd4\xea\x04\x00\x00\x00\x00\x00\xeb\xeb\x78\x7c\xe4\x72\xac\xf3\xc2\x57\x00\x00\x00\x00\x00\x00\x00\x00\xf9\x8e\xca\xa0\x40\x26\xb7\x35\xd7\x9a\xbc\x94\x68\x54\x88\x8c\x7a\x18\x0e\xca\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., 34136651) = 16776512 [pid 5001] mmap(0x20000000, 11755520, PROT_READ|PROT_WRITE|PROT_SEM|PROT_GROWSUP|0x800000, MAP_SHARED|MAP_FIXED|MAP_POPULATE|MAP_STACK, 5, 0) = 0x20000000 [pid 5001] dup(4) = 6 [pid 5001] ioctl(6, KVM_CREATE_VCPU, 0) = 7 [pid 5001] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=0, flags=KVM_MEM_LOG_DIRTY_PAGES|KVM_MEM_READONLY, guest_phys_addr=0, memory_size=8192, userspace_addr=0x20000000}) = 0 [pid 5001] ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=0, flags=0, guest_phys_addr=0, memory_size=4096, userspace_addr=0x20000000}) = -1 EBADF (Bad file descriptor) [pid 5001] ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=1, flags=0, guest_phys_addr=0x1000, memory_size=4096, userspace_addr=0x20001000}) = -1 EBADF (Bad file descriptor) [pid 5001] ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=2, flags=0, guest_phys_addr=0x2000, memory_size=4096, userspace_addr=0x20002000}) = -1 EBADF (Bad file descriptor) [pid 5001] ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=3, flags=0, guest_phys_addr=0x3000, memory_size=4096, userspace_addr=0x20003000}) = -1 EBADF (Bad file descriptor) [pid 5001] ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=4, flags=0, guest_phys_addr=0x4000, memory_size=4096, userspace_addr=0x20004000}) = -1 EBADF (Bad file descriptor) [pid 5001] ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=5, flags=0, guest_phys_addr=0x5000, memory_size=4096, userspace_addr=0x20005000}) = -1 EBADF (Bad file descriptor) [pid 5001] ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=6, flags=0, guest_phys_addr=0x6000, memory_size=4096, userspace_addr=0x20006000}) = -1 EBADF (Bad file descriptor) [pid 5001] ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=7, flags=0, guest_phys_addr=0x7000, memory_size=4096, userspace_addr=0x20007000}) = -1 EBADF (Bad file descriptor) [pid 5001] ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=8, flags=0, guest_phys_addr=0x8000, memory_size=4096, userspace_addr=0x20008000}) = -1 EBADF (Bad file descriptor) [pid 5001] ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=9, flags=0, guest_phys_addr=0x9000, memory_size=4096, userspace_addr=0x20009000}) = -1 EBADF (Bad file descriptor) [pid 5001] ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=10, flags=0, guest_phys_addr=0xfec00000, memory_size=4096, userspace_addr=0x2000a000}) = -1 EBADF (Bad file descriptor) [pid 5001] ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=11, flags=0, guest_phys_addr=0xb000, memory_size=4096, userspace_addr=0x2000b000}) = -1 EBADF (Bad file descriptor) [pid 5001] ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=12, flags=0, guest_phys_addr=0xc000, memory_size=4096, userspace_addr=0x2000c000}) = -1 EBADF (Bad file descriptor) [pid 5001] ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=13, flags=0, guest_phys_addr=0xd000, memory_size=4096, userspace_addr=0x2000d000}) = -1 EBADF (Bad file descriptor) [pid 5001] ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=14, flags=0, guest_phys_addr=0xe000, memory_size=4096, userspace_addr=0x2000e000}) = -1 EBADF (Bad file descriptor) [pid 5001] ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=15, flags=0, guest_phys_addr=0xf000, memory_size=4096, userspace_addr=0x2000f000}) = -1 EBADF (Bad file descriptor) [pid 5001] ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=16, flags=0, guest_phys_addr=0x10000, memory_size=4096, userspace_addr=0x20010000}) = -1 EBADF (Bad file descriptor) [pid 5001] ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=17, flags=0, guest_phys_addr=0x11000, memory_size=4096, userspace_addr=0x20011000}) = -1 EBADF (Bad file descriptor) [pid 5001] ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=18, flags=0, guest_phys_addr=0x12000, memory_size=4096, userspace_addr=0x20012000}) = -1 EBADF (Bad file descriptor) [pid 5001] ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=19, flags=0, guest_phys_addr=0x13000, memory_size=4096, userspace_addr=0x20013000}) = -1 EBADF (Bad file descriptor) [pid 5001] ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=20, flags=0, guest_phys_addr=0x14000, memory_size=4096, userspace_addr=0x20014000}) = -1 EBADF (Bad file descriptor) [pid 5001] ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=21, flags=0, guest_phys_addr=0x15000, memory_size=4096, userspace_addr=0x20015000}) = -1 EBADF (Bad file descriptor) [pid 5001] ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=22, flags=0, guest_phys_addr=0x16000, memory_size=4096, userspace_addr=0x20016000}) = -1 EBADF (Bad file descriptor) [pid 5001] ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=23, flags=0, guest_phys_addr=0x17000, memory_size=4096, userspace_addr=0x20017000}) = -1 EBADF (Bad file descriptor) [pid 5001] ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=65537, flags=0, guest_phys_addr=0x30000, memory_size=65536, userspace_addr=0x20000000}) = -1 EBADF (Bad file descriptor) [pid 5001] ioctl(7, KVM_GET_SREGS, {cs={base=0xffff0000, limit=65535, selector=61440, type=11, present=1, dpl=0, db=0, s=1, l=0, g=0, avl=0}, ...}) = 0 [pid 5001] openat(AT_FDCWD, "/dev/kvm", O_RDWR) = 8 [pid 5001] ioctl(8, KVM_GET_SUPPORTED_CPUID, {nent=31, entries=[...]}) = 0 [pid 5001] ioctl(7, KVM_SET_CPUID2, {nent=31, entries=[...]}) = 0 [pid 5001] close(8) = 0 [pid 5001] ioctl(7, KVM_SET_SREGS, {cs={base=0, limit=1048575, selector=16, type=11, present=1, dpl=0, db=0, s=1, l=0, g=0, avl=0}, ...}) = 0 [pid 5001] ioctl(7, KVM_SET_REGS, {rax=0, ..., rsp=0xf80, rbp=0, ..., rip=0, rflags=0x2}) = 0 [pid 5001] ioctl(4, KVM_REGISTER_COALESCED_MMIO, 0x200001c0) = 0 [pid 5001] ioctl(7, KVM_NMI, 0) = 0 [pid 5001] ioctl(-1, KVM_CREATE_PIT2, 0x20000000) = -1 EBADF (Bad file descriptor) [ 161.083533][ T5001] ===================================================== [ 161.090792][ T5001] BUG: KMSAN: uninit-value in em_ret_far+0x332/0x340 [ 161.097908][ T5001] em_ret_far+0x332/0x340 [ 161.102513][ T5001] em_ret_far_imm+0x39/0x4f0 [ 161.107227][ T5001] x86_emulate_insn+0x1d81/0x5800 [ 161.112608][ T5001] x86_emulate_instruction+0x13c5/0x3090 [ 161.118478][ T5001] kvm_mmu_page_fault+0x100a/0x1120 [ 161.124020][ T5001] handle_ept_violation+0x4ef/0x7e0 [ 161.129397][ T5001] vmx_handle_exit+0x1b01/0x2130 [ 161.134667][ T5001] kvm_arch_vcpu_ioctl_run+0x9d4f/0xc680 [ 161.140518][ T5001] kvm_vcpu_ioctl+0xbfc/0x1770 [ 161.145635][ T5001] __se_sys_ioctl+0x225/0x410 [ 161.150572][ T5001] __x64_sys_ioctl+0x96/0xe0 [ 161.155582][ T5001] do_syscall_64+0x6d/0x140 [ 161.160301][ T5001] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 161.166599][ T5001] [ 161.169026][ T5001] Local variable eip created at: [ 161.174257][ T5001] em_ret_far+0x3a/0x340 [ 161.178695][ T5001] em_ret_far_imm+0x39/0x4f0 [ 161.183664][ T5001] [ 161.186095][ T5001] CPU: 0 PID: 5001 Comm: syz-executor428 Not tainted 6.7.0-syzkaller-00562-g9f8413c4a66f #0 [ 161.196538][ T5001] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 161.206791][ T5001] ===================================================== [ 161.213933][ T5001] Disabling lock debugging due to kernel taint [ 161.220207][ T5001] Kernel panic - not syncing: kmsan.panic set ... [ 161.226722][ T5001] CPU: 0 PID: 5001 Comm: syz-executor428 Tainted: G B 6.7.0-syzkaller-00562-g9f8413c4a66f #0 [ 161.238466][ T5001] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 161.248698][ T5001] Call Trace: [ 161.252085][ T5001] [ 161.255106][ T5001] dump_stack_lvl+0x1bf/0x240 [ 161.260029][ T5001] dump_stack+0x1e/0x20 [ 161.264416][ T5001] panic+0x4de/0xc90 [ 161.268496][ T5001] ? add_taint+0x108/0x1a0 [ 161.273057][ T5001] kmsan_report+0x2d0/0x2d0 [ 161.277703][ T5001] ? __msan_warning+0x96/0x110 [ 161.282626][ T5001] ? em_ret_far+0x332/0x340 [ 161.287322][ T5001] ? em_ret_far_imm+0x39/0x4f0 [ 161.292285][ T5001] ? x86_emulate_insn+0x1d81/0x5800 [ 161.297664][ T5001] ? x86_emulate_instruction+0x13c5/0x3090 [ 161.303616][ T5001] ? kvm_mmu_page_fault+0x100a/0x1120 [ 161.309186][ T5001] ? handle_ept_violation+0x4ef/0x7e0 [ 161.314678][ T5001] ? vmx_handle_exit+0x1b01/0x2130 [ 161.319981][ T5001] ? kvm_arch_vcpu_ioctl_run+0x9d4f/0xc680 [ 161.325986][ T5001] ? kvm_vcpu_ioctl+0xbfc/0x1770 [ 161.331046][ T5001] ? __se_sys_ioctl+0x225/0x410 [ 161.336124][ T5001] ? __x64_sys_ioctl+0x96/0xe0 [ 161.341120][ T5001] ? do_syscall_64+0x6d/0x140 [ 161.345982][ T5001] ? entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 161.352216][ T5001] ? vmx_set_segment+0x24b/0x270 [ 161.357365][ T5001] ? emulator_set_segment+0x3bf/0x4b0 [ 161.362877][ T5001] ? kmsan_get_shadow_origin_ptr+0x4d/0xa0 [ 161.368917][ T5001] ? __load_segment_descriptor+0x394/0x1b70 [ 161.374979][ T5001] ? emulate_pop+0x9ed/0xb50 [ 161.379785][ T5001] ? kmsan_get_shadow_origin_ptr+0x4d/0xa0 [ 161.385817][ T5001] __msan_warning+0x96/0x110 [ 161.390545][ T5001] em_ret_far+0x332/0x340 [ 161.395003][ T5001] em_ret_far_imm+0x39/0x4f0 [ 161.399718][ T5001] ? kmsan_get_shadow_origin_ptr+0x4d/0xa0 [ 161.405704][ T5001] ? em_leave+0x7a0/0x7a0 [ 161.410238][ T5001] x86_emulate_insn+0x1d81/0x5800 [ 161.415453][ T5001] ? em_leave+0x7a0/0x7a0 [ 161.419936][ T5001] x86_emulate_instruction+0x13c5/0x3090 [ 161.425725][ T5001] kvm_mmu_page_fault+0x100a/0x1120 [ 161.431094][ T5001] handle_ept_violation+0x4ef/0x7e0 [ 161.436486][ T5001] ? handle_desc+0xc0/0xc0 [ 161.441037][ T5001] vmx_handle_exit+0x1b01/0x2130 [ 161.446173][ T5001] ? kmsan_get_shadow_origin_ptr+0x4d/0xa0 [ 161.452181][ T5001] kvm_arch_vcpu_ioctl_run+0x9d4f/0xc680 [ 161.458045][ T5001] ? kmsan_internal_set_shadow_origin+0x66/0xe0 [ 161.464561][ T5001] ? tomoyo_path_number_perm+0x82d/0x8e0 [ 161.470362][ T5001] ? kmsan_get_shadow_origin_ptr+0x4d/0xa0 [ 161.476412][ T5001] ? kmsan_get_shadow_origin_ptr+0x4d/0xa0 [ 161.482398][ T5001] ? put_pid+0xd8/0x150 [ 161.486758][ T5001] ? kvm_vcpu_ioctl+0x174c/0x1770 [ 161.492020][ T5001] kvm_vcpu_ioctl+0xbfc/0x1770 [ 161.497021][ T5001] ? kmsan_get_shadow_origin_ptr+0x4d/0xa0 [ 161.503046][ T5001] ? kvm_pm_notifier_call+0x50/0x50 [ 161.508449][ T5001] __se_sys_ioctl+0x225/0x410 [ 161.513359][ T5001] __x64_sys_ioctl+0x96/0xe0 [ 161.518126][ T5001] do_syscall_64+0x6d/0x140 [ 161.522775][ T5001] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 161.528839][ T5001] RIP: 0033:0x7eff3979c839 [ 161.533416][ T5001] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 c1 17 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 161.553218][ T5001] RSP: 002b:00007ffd7e4b61c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 161.561776][ T5001] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007eff3979c839 [ 161.569901][ T5001] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000007 [ 161.577988][ T5001] RBP: 00007eff398105f0 R08: 0000000000000006 R09: 0000000000000006 [ 161.586125][ T5001] R10: 0000000000000006 R11: 0000000000000246 R12: 0000000000000001 [ 161.594209][ T5001] R13: 431bde82d7b634db R14: 0000000000000001 R15: 0000000000000001 [ 161.602336][ T5001] [ 161.605788][ T5001] Kernel Offset: disabled [ 161.610274][ T5001] Rebooting in 86400 seconds..