./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor1690949314
<...>
Warning: Permanently added '10.128.0.123' (ECDSA) to the list of known hosts.
execve("./syz-executor1690949314", ["./syz-executor1690949314"], 0x7ffd97bd63a0 /* 10 vars */) = 0
brk(NULL) = 0x555556c8d000
brk(0x555556c8dc40) = 0x555556c8dc40
arch_prctl(ARCH_SET_FS, 0x555556c8d300) = 0
uname({sysname="Linux", nodename="syzkaller", ...}) = 0
readlink("/proc/self/exe", "/root/syz-executor1690949314", 4096) = 28
brk(0x555556caec40) = 0x555556caec40
brk(0x555556caf000) = 0x555556caf000
mprotect(0x7f56efb5c000, 16384, PROT_READ) = 0
mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000
mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000
mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000
openat(AT_FDCWD, "/dev/kvm", O_RDONLY) = 3
ioctl(3, KVM_CREATE_VM, 0) = 4
ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=0, flags=0, guest_phys_addr=0, memory_size=4096, userspace_addr=0x20fe8000}) = 0
ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=1, flags=0, guest_phys_addr=0x1000, memory_size=4096, userspace_addr=0x20fe9000}) = 0
ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=2, flags=0, guest_phys_addr=0x2000, memory_size=4096, userspace_addr=0x20fea000}) = 0
ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=3, flags=0, guest_phys_addr=0x3000, memory_size=4096, userspace_addr=0x20feb000}) = 0
ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=4, flags=0, guest_phys_addr=0x4000, memory_size=4096, userspace_addr=0x20fec000}) = 0
ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=5, flags=0, guest_phys_addr=0x5000, memory_size=4096, userspace_addr=0x20fed000}) = 0
ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=6, flags=0, guest_phys_addr=0x6000, memory_size=4096, userspace_addr=0x20fee000}) = 0
[ 44.950084][ T3609] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details.
ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=7, flags=0, guest_phys_addr=0x7000, memory_size=4096, userspace_addr=0x20fef000}) = 0
ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=8, flags=0, guest_phys_addr=0x8000, memory_size=4096, userspace_addr=0x20ff0000}) = 0
ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=9, flags=0, guest_phys_addr=0x9000, memory_size=4096, userspace_addr=0x20ff1000}) = 0
ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=10, flags=0, guest_phys_addr=0xfec00000, memory_size=4096, userspace_addr=0x20ff2000}) = 0
ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=11, flags=0, guest_phys_addr=0xb000, memory_size=4096, userspace_addr=0x20ff3000}) = 0
ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=12, flags=0, guest_phys_addr=0xc000, memory_size=4096, userspace_addr=0x20ff4000}) = 0
ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=13, flags=0, guest_phys_addr=0xd000, memory_size=4096, userspace_addr=0x20ff5000}) = 0
ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=14, flags=0, guest_phys_addr=0xe000, memory_size=4096, userspace_addr=0x20ff6000}) = 0
ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=15, flags=0, guest_phys_addr=0xf000, memory_size=4096, userspace_addr=0x20ff7000}) = 0
ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=16, flags=0, guest_phys_addr=0x10000, memory_size=4096, userspace_addr=0x20ff8000}) = 0
ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=17, flags=0, guest_phys_addr=0x11000, memory_size=4096, userspace_addr=0x20ff9000}) = 0
ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=18, flags=0, guest_phys_addr=0x12000, memory_size=4096, userspace_addr=0x20ffa000}) = 0
ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=19, flags=0, guest_phys_addr=0x13000, memory_size=4096, userspace_addr=0x20ffb000}) = 0
ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=20, flags=0, guest_phys_addr=0x14000, memory_size=4096, userspace_addr=0x20ffc000}) = 0
ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=21, flags=0, guest_phys_addr=0x15000, memory_size=4096, userspace_addr=0x20ffd000}) = 0
ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=22, flags=0, guest_phys_addr=0x16000, memory_size=4096, userspace_addr=0x20ffe000}) = 0
ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=23, flags=0, guest_phys_addr=0x17000, memory_size=4096, userspace_addr=0x20fff000}) = 0
ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=65537, flags=0, guest_phys_addr=0x30000, memory_size=65536, userspace_addr=0x20fe8000}) = 0
ioctl(-1, KVM_GET_SREGS, 0x7ffc37351bd0) = -1 EBADF (Bad file descriptor)
ioctl(4, KVM_CREATE_VCPU, 0) = 5
ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=0, flags=0, guest_phys_addr=0, memory_size=4096, userspace_addr=0x20fe8000}) = -1 EBADF (Bad file descriptor)
ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=1, flags=0, guest_phys_addr=0x1000, memory_size=4096, userspace_addr=0x20fe9000}) = -1 EBADF (Bad file descriptor)
ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=2, flags=0, guest_phys_addr=0x2000, memory_size=4096, userspace_addr=0x20fea000}) = -1 EBADF (Bad file descriptor)
ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=3, flags=0, guest_phys_addr=0x3000, memory_size=4096, userspace_addr=0x20feb000}) = -1 EBADF (Bad file descriptor)
ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=4, flags=0, guest_phys_addr=0x4000, memory_size=4096, userspace_addr=0x20fec000}) = -1 EBADF (Bad file descriptor)
ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=5, flags=0, guest_phys_addr=0x5000, memory_size=4096, userspace_addr=0x20fed000}) = -1 EBADF (Bad file descriptor)
ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=6, flags=0, guest_phys_addr=0x6000, memory_size=4096, userspace_addr=0x20fee000}) = -1 EBADF (Bad file descriptor)
ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=7, flags=0, guest_phys_addr=0x7000, memory_size=4096, userspace_addr=0x20fef000}) = -1 EBADF (Bad file descriptor)
ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=8, flags=0, guest_phys_addr=0x8000, memory_size=4096, userspace_addr=0x20ff0000}) = -1 EBADF (Bad file descriptor)
ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=9, flags=0, guest_phys_addr=0x9000, memory_size=4096, userspace_addr=0x20ff1000}) = -1 EBADF (Bad file descriptor)
ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=10, flags=0, guest_phys_addr=0xfec00000, memory_size=4096, userspace_addr=0x20ff2000}) = -1 EBADF (Bad file descriptor)
ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=11, flags=0, guest_phys_addr=0xb000, memory_size=4096, userspace_addr=0x20ff3000}) = -1 EBADF (Bad file descriptor)
ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=12, flags=0, guest_phys_addr=0xc000, memory_size=4096, userspace_addr=0x20ff4000}) = -1 EBADF (Bad file descriptor)
ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=13, flags=0, guest_phys_addr=0xd000, memory_size=4096, userspace_addr=0x20ff5000}) = -1 EBADF (Bad file descriptor)
ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=14, flags=0, guest_phys_addr=0xe000, memory_size=4096, userspace_addr=0x20ff6000}) = -1 EBADF (Bad file descriptor)
ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=15, flags=0, guest_phys_addr=0xf000, memory_size=4096, userspace_addr=0x20ff7000}) = -1 EBADF (Bad file descriptor)
ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=16, flags=0, guest_phys_addr=0x10000, memory_size=4096, userspace_addr=0x20ff8000}) = -1 EBADF (Bad file descriptor)
ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=17, flags=0, guest_phys_addr=0x11000, memory_size=4096, userspace_addr=0x20ff9000}) = -1 EBADF (Bad file descriptor)
ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=18, flags=0, guest_phys_addr=0x12000, memory_size=4096, userspace_addr=0x20ffa000}) = -1 EBADF (Bad file descriptor)
ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=19, flags=0, guest_phys_addr=0x13000, memory_size=4096, userspace_addr=0x20ffb000}) = -1 EBADF (Bad file descriptor)
ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=20, flags=0, guest_phys_addr=0x14000, memory_size=4096, userspace_addr=0x20ffc000}) = -1 EBADF (Bad file descriptor)
ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=21, flags=0, guest_phys_addr=0x15000, memory_size=4096, userspace_addr=0x20ffd000}) = -1 EBADF (Bad file descriptor)
ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=22, flags=0, guest_phys_addr=0x16000, memory_size=4096, userspace_addr=0x20ffe000}) = -1 EBADF (Bad file descriptor)
ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=23, flags=0, guest_phys_addr=0x17000, memory_size=4096, userspace_addr=0x20fff000}) = -1 EBADF (Bad file descriptor)
ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=65537, flags=0, guest_phys_addr=0x30000, memory_size=65536, userspace_addr=0x20fe8000}) = -1 EBADF (Bad file descriptor)
ioctl(5, KVM_GET_SREGS, {cs={base=0xffff0000, limit=65535, selector=61440, type=11, present=1, dpl=0, db=0, s=1, l=0, g=0, avl=0}, ...}) = 0
openat(AT_FDCWD, "/dev/kvm", O_RDWR) = 6
ioctl(6, KVM_GET_SUPPORTED_CPUID, {nent=33, entries=[...]}) = 0
ioctl(5, KVM_SET_CPUID2, {nent=33, entries=[...]}) = 0
close(6) = 0
ioctl(5, KVM_SET_MSRS, 0x7ffc373515b0) = 5
ioctl(5, KVM_SET_SREGS, {cs={base=0, limit=1048575, selector=48, type=11, present=1, dpl=0, db=1, s=1, l=0, g=0, avl=0}, ...}) = 0
ioctl(5, KVM_SET_REGS, {rax=0, ..., rsp=0xf80, rbp=0, ..., rip=0, rflags=0x2}) = 0
ioctl(5, KVM_RUN, 0) = 0
ioctl(5, KVM_SET_NESTED_STATE, 0x20000280) = -1 EINVAL (Invalid argument)
[ 45.779838][ T3609] ------------[ cut here ]------------
[ 45.779847][ T3609] WARNING: CPU: 0 PID: 3609 at arch/x86/kvm/vmx/vmx.c:4896 handle_exception_nmi+0xfdc/0x1190
[ 45.795679][ T3609] Modules linked in:
[ 45.799694][ T3609] CPU: 0 PID: 3609 Comm: syz-executor169 Not tainted 5.19.0-rc1-syzkaller-00303-g7a68065eb9cd #0
[ 45.810329][ T3609] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 45.820486][ T3609] RIP: 0010:handle_exception_nmi+0xfdc/0x1190
[ 45.826559][ T3609] Code: 0f 84 c8 f3 ff ff e8 33 5c 58 00 48 89 ef c7 85 84 0d 00 00 00 00 00 00 e8 21 35 ec ff 41 89 c4 e9 af f3 ff ff e8 14 5c 58 00 <0f> 0b e9 69 f6 ff ff e8 08 5c 58 00 be f5 ff ff ff bf 01 00 00 00
[ 45.846822][ T3609] RSP: 0018:ffffc9000309faf8 EFLAGS: 00010293
[ 45.852937][ T3609] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000
[ 45.861011][ T3609] RDX: ffff88801ba1d880 RSI: ffffffff8122171c RDI: 0000000000000001
[ 45.869310][ T3609] RBP: ffff88807cd88000 R08: 0000000000000001 R09: 0000000000000000
[ 45.877762][ T3609] R10: 0000000000000000 R11: 0000000000000001 R12: 00000000a0000975
[ 45.885764][ T3609] R13: ffff88807cd88248 R14: 0000000000000000 R15: 0000000080000300
[ 45.893922][ T3609] FS: 0000555556c8d300(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000
[ 45.903251][ T3609] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 45.910085][ T3609] CR2: 0000000000000000 CR3: 00000000229ca000 CR4: 00000000003526e0
[ 45.918212][ T3609] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 45.927084][ T3609] DR3: 00000000b8fecd19 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 45.935069][ T3609] Call Trace:
[ 45.938434][ T3609]
[ 45.941383][ T3609] ? vmx_guest_inject_ac+0x160/0x160
[ 45.946857][ T3609] vmx_handle_exit+0x498/0x1950
[ 45.951726][ T3609] kvm_arch_vcpu_ioctl_run+0x4208/0x66f0
[ 45.957478][ T3609] ? kvm_arch_vcpu_runnable+0x790/0x790
[ 45.963058][ T3609] ? tomoyo_execute_permission+0x4a0/0x4a0
[ 45.968954][ T3609] ? kvm_vcpu_ioctl+0x570/0xf30
[ 45.973822][ T3609] kvm_vcpu_ioctl+0x570/0xf30
[ 45.978974][ T3609] ? kvm_vcpu_kick+0x2f0/0x2f0
[ 45.983789][ T3609] ? find_held_lock+0x2d/0x110
[ 45.988871][ T3609] ? ptrace_notify+0xfa/0x140
[ 45.993610][ T3609] ? lock_downgrade+0x6e0/0x6e0
[ 45.998788][ T3609] ? _raw_spin_unlock_irq+0x1f/0x40
[ 46.004035][ T3609] ? bpf_lsm_file_ioctl+0x5/0x10
[ 46.009199][ T3609] ? kvm_vcpu_kick+0x2f0/0x2f0
[ 46.014017][ T3609] __x64_sys_ioctl+0x193/0x200
[ 46.018970][ T3609] do_syscall_64+0x35/0xb0
[ 46.023408][ T3609] entry_SYSCALL_64_after_hwframe+0x46/0xb0
[ 46.029418][ T3609] RIP: 0033:0x7f56efaee199
[ 46.033861][ T3609] Code: 28 c3 e8 2a 14 00 00 66 2e 0f 1f 84 00 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48
[ 46.054211][ T3609] RSP: 002b:00007ffc37353158 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 46.062856][ T3609] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f56efaee199
[ 46.070990][ T3609] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005
[ 46.079132][ T3609] RBP: 00007f56efab1bf0 R08: 0000000000000000 R09: 0000000000000000
[ 46.087239][ T3609] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f56efab1c80
[ 46.095237][ T3609] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[ 46.103768][ T3609]
[ 46.106952][ T3609] Kernel panic - not syncing: panic_on_warn set ...
[ 46.113553][ T3609] CPU: 0 PID: 3609 Comm: syz-executor169 Not tainted 5.19.0-rc1-syzkaller-00303-g7a68065eb9cd #0
[ 46.124059][ T3609] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 46.134124][ T3609] Call Trace:
[ 46.137412][ T3609]
[ 46.140338][ T3609] dump_stack_lvl+0xcd/0x134
[ 46.144959][ T3609] panic+0x2d7/0x636
[ 46.148864][ T3609] ? panic_print_sys_info.part.0+0x10b/0x10b
[ 46.154859][ T3609] ? __warn.cold+0x1d9/0x2cd
[ 46.159441][ T3609] ? handle_exception_nmi+0xfdc/0x1190
[ 46.164896][ T3609] __warn.cold+0x1ea/0x2cd
[ 46.169305][ T3609] ? handle_exception_nmi+0xfdc/0x1190
[ 46.174933][ T3609] report_bug+0x1bc/0x210
[ 46.179259][ T3609] handle_bug+0x3c/0x60
[ 46.183406][ T3609] exc_invalid_op+0x14/0x40
[ 46.187901][ T3609] asm_exc_invalid_op+0x1b/0x20
[ 46.192746][ T3609] RIP: 0010:handle_exception_nmi+0xfdc/0x1190
[ 46.198804][ T3609] Code: 0f 84 c8 f3 ff ff e8 33 5c 58 00 48 89 ef c7 85 84 0d 00 00 00 00 00 00 e8 21 35 ec ff 41 89 c4 e9 af f3 ff ff e8 14 5c 58 00 <0f> 0b e9 69 f6 ff ff e8 08 5c 58 00 be f5 ff ff ff bf 01 00 00 00
[ 46.220329][ T3609] RSP: 0018:ffffc9000309faf8 EFLAGS: 00010293
[ 46.226407][ T3609] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000
[ 46.234371][ T3609] RDX: ffff88801ba1d880 RSI: ffffffff8122171c RDI: 0000000000000001
[ 46.242374][ T3609] RBP: ffff88807cd88000 R08: 0000000000000001 R09: 0000000000000000
[ 46.250336][ T3609] R10: 0000000000000000 R11: 0000000000000001 R12: 00000000a0000975
[ 46.258296][ T3609] R13: ffff88807cd88248 R14: 0000000000000000 R15: 0000000080000300
[ 46.266269][ T3609] ? handle_exception_nmi+0xfdc/0x1190
[ 46.271736][ T3609] ? handle_exception_nmi+0xfdc/0x1190
[ 46.277194][ T3609] ? vmx_guest_inject_ac+0x160/0x160
[ 46.282474][ T3609] vmx_handle_exit+0x498/0x1950
[ 46.287328][ T3609] kvm_arch_vcpu_ioctl_run+0x4208/0x66f0
[ 46.292981][ T3609] ? kvm_arch_vcpu_runnable+0x790/0x790
[ 46.298524][ T3609] ? tomoyo_execute_permission+0x4a0/0x4a0
[ 46.304344][ T3609] ? kvm_vcpu_ioctl+0x570/0xf30
[ 46.309186][ T3609] kvm_vcpu_ioctl+0x570/0xf30
[ 46.313857][ T3609] ? kvm_vcpu_kick+0x2f0/0x2f0
[ 46.318623][ T3609] ? find_held_lock+0x2d/0x110
[ 46.323389][ T3609] ? ptrace_notify+0xfa/0x140
[ 46.328059][ T3609] ? lock_downgrade+0x6e0/0x6e0
[ 46.332914][ T3609] ? _raw_spin_unlock_irq+0x1f/0x40
[ 46.338106][ T3609] ? bpf_lsm_file_ioctl+0x5/0x10
[ 46.343037][ T3609] ? kvm_vcpu_kick+0x2f0/0x2f0
[ 46.347795][ T3609] __x64_sys_ioctl+0x193/0x200
[ 46.352552][ T3609] do_syscall_64+0x35/0xb0
[ 46.356966][ T3609] entry_SYSCALL_64_after_hwframe+0x46/0xb0
[ 46.362850][ T3609] RIP: 0033:0x7f56efaee199
[ 46.367253][ T3609] Code: 28 c3 e8 2a 14 00 00 66 2e 0f 1f 84 00 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48
[ 46.386849][ T3609] RSP: 002b:00007ffc37353158 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 46.395270][ T3609] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f56efaee199
[ 46.403250][ T3609] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005
[ 46.411226][ T3609] RBP: 00007f56efab1bf0 R08: 0000000000000000 R09: 0000000000000000
[ 46.419189][ T3609] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f56efab1c80
[ 46.427150][ T3609] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[ 46.435121][ T3609]
[ 46.438485][ T3609] Kernel Offset: disabled
[ 46.442884][ T3609] Rebooting in 86400 seconds..