./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor1690949314 <...> Warning: Permanently added '10.128.0.123' (ECDSA) to the list of known hosts. execve("./syz-executor1690949314", ["./syz-executor1690949314"], 0x7ffd97bd63a0 /* 10 vars */) = 0 brk(NULL) = 0x555556c8d000 brk(0x555556c8dc40) = 0x555556c8dc40 arch_prctl(ARCH_SET_FS, 0x555556c8d300) = 0 uname({sysname="Linux", nodename="syzkaller", ...}) = 0 readlink("/proc/self/exe", "/root/syz-executor1690949314", 4096) = 28 brk(0x555556caec40) = 0x555556caec40 brk(0x555556caf000) = 0x555556caf000 mprotect(0x7f56efb5c000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 openat(AT_FDCWD, "/dev/kvm", O_RDONLY) = 3 ioctl(3, KVM_CREATE_VM, 0) = 4 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=0, flags=0, guest_phys_addr=0, memory_size=4096, userspace_addr=0x20fe8000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=1, flags=0, guest_phys_addr=0x1000, memory_size=4096, userspace_addr=0x20fe9000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=2, flags=0, guest_phys_addr=0x2000, memory_size=4096, userspace_addr=0x20fea000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=3, flags=0, guest_phys_addr=0x3000, memory_size=4096, userspace_addr=0x20feb000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=4, flags=0, guest_phys_addr=0x4000, memory_size=4096, userspace_addr=0x20fec000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=5, flags=0, guest_phys_addr=0x5000, memory_size=4096, userspace_addr=0x20fed000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=6, flags=0, guest_phys_addr=0x6000, memory_size=4096, userspace_addr=0x20fee000}) = 0 [ 44.950084][ T3609] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=7, flags=0, guest_phys_addr=0x7000, memory_size=4096, userspace_addr=0x20fef000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=8, flags=0, guest_phys_addr=0x8000, memory_size=4096, userspace_addr=0x20ff0000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=9, flags=0, guest_phys_addr=0x9000, memory_size=4096, userspace_addr=0x20ff1000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=10, flags=0, guest_phys_addr=0xfec00000, memory_size=4096, userspace_addr=0x20ff2000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=11, flags=0, guest_phys_addr=0xb000, memory_size=4096, userspace_addr=0x20ff3000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=12, flags=0, guest_phys_addr=0xc000, memory_size=4096, userspace_addr=0x20ff4000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=13, flags=0, guest_phys_addr=0xd000, memory_size=4096, userspace_addr=0x20ff5000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=14, flags=0, guest_phys_addr=0xe000, memory_size=4096, userspace_addr=0x20ff6000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=15, flags=0, guest_phys_addr=0xf000, memory_size=4096, userspace_addr=0x20ff7000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=16, flags=0, guest_phys_addr=0x10000, memory_size=4096, userspace_addr=0x20ff8000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=17, flags=0, guest_phys_addr=0x11000, memory_size=4096, userspace_addr=0x20ff9000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=18, flags=0, guest_phys_addr=0x12000, memory_size=4096, userspace_addr=0x20ffa000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=19, flags=0, guest_phys_addr=0x13000, memory_size=4096, userspace_addr=0x20ffb000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=20, flags=0, guest_phys_addr=0x14000, memory_size=4096, userspace_addr=0x20ffc000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=21, flags=0, guest_phys_addr=0x15000, memory_size=4096, userspace_addr=0x20ffd000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=22, flags=0, guest_phys_addr=0x16000, memory_size=4096, userspace_addr=0x20ffe000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=23, flags=0, guest_phys_addr=0x17000, memory_size=4096, userspace_addr=0x20fff000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=65537, flags=0, guest_phys_addr=0x30000, memory_size=65536, userspace_addr=0x20fe8000}) = 0 ioctl(-1, KVM_GET_SREGS, 0x7ffc37351bd0) = -1 EBADF (Bad file descriptor) ioctl(4, KVM_CREATE_VCPU, 0) = 5 ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=0, flags=0, guest_phys_addr=0, memory_size=4096, userspace_addr=0x20fe8000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=1, flags=0, guest_phys_addr=0x1000, memory_size=4096, userspace_addr=0x20fe9000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=2, flags=0, guest_phys_addr=0x2000, memory_size=4096, userspace_addr=0x20fea000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=3, flags=0, guest_phys_addr=0x3000, memory_size=4096, userspace_addr=0x20feb000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=4, flags=0, guest_phys_addr=0x4000, memory_size=4096, userspace_addr=0x20fec000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=5, flags=0, guest_phys_addr=0x5000, memory_size=4096, userspace_addr=0x20fed000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=6, flags=0, guest_phys_addr=0x6000, memory_size=4096, userspace_addr=0x20fee000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=7, flags=0, guest_phys_addr=0x7000, memory_size=4096, userspace_addr=0x20fef000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=8, flags=0, guest_phys_addr=0x8000, memory_size=4096, userspace_addr=0x20ff0000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=9, flags=0, guest_phys_addr=0x9000, memory_size=4096, userspace_addr=0x20ff1000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=10, flags=0, guest_phys_addr=0xfec00000, memory_size=4096, userspace_addr=0x20ff2000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=11, flags=0, guest_phys_addr=0xb000, memory_size=4096, userspace_addr=0x20ff3000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=12, flags=0, guest_phys_addr=0xc000, memory_size=4096, userspace_addr=0x20ff4000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=13, flags=0, guest_phys_addr=0xd000, memory_size=4096, userspace_addr=0x20ff5000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=14, flags=0, guest_phys_addr=0xe000, memory_size=4096, userspace_addr=0x20ff6000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=15, flags=0, guest_phys_addr=0xf000, memory_size=4096, userspace_addr=0x20ff7000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=16, flags=0, guest_phys_addr=0x10000, memory_size=4096, userspace_addr=0x20ff8000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=17, flags=0, guest_phys_addr=0x11000, memory_size=4096, userspace_addr=0x20ff9000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=18, flags=0, guest_phys_addr=0x12000, memory_size=4096, userspace_addr=0x20ffa000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=19, flags=0, guest_phys_addr=0x13000, memory_size=4096, userspace_addr=0x20ffb000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=20, flags=0, guest_phys_addr=0x14000, memory_size=4096, userspace_addr=0x20ffc000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=21, flags=0, guest_phys_addr=0x15000, memory_size=4096, userspace_addr=0x20ffd000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=22, flags=0, guest_phys_addr=0x16000, memory_size=4096, userspace_addr=0x20ffe000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=23, flags=0, guest_phys_addr=0x17000, memory_size=4096, userspace_addr=0x20fff000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=65537, flags=0, guest_phys_addr=0x30000, memory_size=65536, userspace_addr=0x20fe8000}) = -1 EBADF (Bad file descriptor) ioctl(5, KVM_GET_SREGS, {cs={base=0xffff0000, limit=65535, selector=61440, type=11, present=1, dpl=0, db=0, s=1, l=0, g=0, avl=0}, ...}) = 0 openat(AT_FDCWD, "/dev/kvm", O_RDWR) = 6 ioctl(6, KVM_GET_SUPPORTED_CPUID, {nent=33, entries=[...]}) = 0 ioctl(5, KVM_SET_CPUID2, {nent=33, entries=[...]}) = 0 close(6) = 0 ioctl(5, KVM_SET_MSRS, 0x7ffc373515b0) = 5 ioctl(5, KVM_SET_SREGS, {cs={base=0, limit=1048575, selector=48, type=11, present=1, dpl=0, db=1, s=1, l=0, g=0, avl=0}, ...}) = 0 ioctl(5, KVM_SET_REGS, {rax=0, ..., rsp=0xf80, rbp=0, ..., rip=0, rflags=0x2}) = 0 ioctl(5, KVM_RUN, 0) = 0 ioctl(5, KVM_SET_NESTED_STATE, 0x20000280) = -1 EINVAL (Invalid argument) [ 45.779838][ T3609] ------------[ cut here ]------------ [ 45.779847][ T3609] WARNING: CPU: 0 PID: 3609 at arch/x86/kvm/vmx/vmx.c:4896 handle_exception_nmi+0xfdc/0x1190 [ 45.795679][ T3609] Modules linked in: [ 45.799694][ T3609] CPU: 0 PID: 3609 Comm: syz-executor169 Not tainted 5.19.0-rc1-syzkaller-00303-g7a68065eb9cd #0 [ 45.810329][ T3609] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 45.820486][ T3609] RIP: 0010:handle_exception_nmi+0xfdc/0x1190 [ 45.826559][ T3609] Code: 0f 84 c8 f3 ff ff e8 33 5c 58 00 48 89 ef c7 85 84 0d 00 00 00 00 00 00 e8 21 35 ec ff 41 89 c4 e9 af f3 ff ff e8 14 5c 58 00 <0f> 0b e9 69 f6 ff ff e8 08 5c 58 00 be f5 ff ff ff bf 01 00 00 00 [ 45.846822][ T3609] RSP: 0018:ffffc9000309faf8 EFLAGS: 00010293 [ 45.852937][ T3609] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 45.861011][ T3609] RDX: ffff88801ba1d880 RSI: ffffffff8122171c RDI: 0000000000000001 [ 45.869310][ T3609] RBP: ffff88807cd88000 R08: 0000000000000001 R09: 0000000000000000 [ 45.877762][ T3609] R10: 0000000000000000 R11: 0000000000000001 R12: 00000000a0000975 [ 45.885764][ T3609] R13: ffff88807cd88248 R14: 0000000000000000 R15: 0000000080000300 [ 45.893922][ T3609] FS: 0000555556c8d300(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000 [ 45.903251][ T3609] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 45.910085][ T3609] CR2: 0000000000000000 CR3: 00000000229ca000 CR4: 00000000003526e0 [ 45.918212][ T3609] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 45.927084][ T3609] DR3: 00000000b8fecd19 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 45.935069][ T3609] Call Trace: [ 45.938434][ T3609] [ 45.941383][ T3609] ? vmx_guest_inject_ac+0x160/0x160 [ 45.946857][ T3609] vmx_handle_exit+0x498/0x1950 [ 45.951726][ T3609] kvm_arch_vcpu_ioctl_run+0x4208/0x66f0 [ 45.957478][ T3609] ? kvm_arch_vcpu_runnable+0x790/0x790 [ 45.963058][ T3609] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 45.968954][ T3609] ? kvm_vcpu_ioctl+0x570/0xf30 [ 45.973822][ T3609] kvm_vcpu_ioctl+0x570/0xf30 [ 45.978974][ T3609] ? kvm_vcpu_kick+0x2f0/0x2f0 [ 45.983789][ T3609] ? find_held_lock+0x2d/0x110 [ 45.988871][ T3609] ? ptrace_notify+0xfa/0x140 [ 45.993610][ T3609] ? lock_downgrade+0x6e0/0x6e0 [ 45.998788][ T3609] ? _raw_spin_unlock_irq+0x1f/0x40 [ 46.004035][ T3609] ? bpf_lsm_file_ioctl+0x5/0x10 [ 46.009199][ T3609] ? kvm_vcpu_kick+0x2f0/0x2f0 [ 46.014017][ T3609] __x64_sys_ioctl+0x193/0x200 [ 46.018970][ T3609] do_syscall_64+0x35/0xb0 [ 46.023408][ T3609] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 46.029418][ T3609] RIP: 0033:0x7f56efaee199 [ 46.033861][ T3609] Code: 28 c3 e8 2a 14 00 00 66 2e 0f 1f 84 00 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 [ 46.054211][ T3609] RSP: 002b:00007ffc37353158 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 46.062856][ T3609] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f56efaee199 [ 46.070990][ T3609] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 46.079132][ T3609] RBP: 00007f56efab1bf0 R08: 0000000000000000 R09: 0000000000000000 [ 46.087239][ T3609] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f56efab1c80 [ 46.095237][ T3609] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 46.103768][ T3609] [ 46.106952][ T3609] Kernel panic - not syncing: panic_on_warn set ... [ 46.113553][ T3609] CPU: 0 PID: 3609 Comm: syz-executor169 Not tainted 5.19.0-rc1-syzkaller-00303-g7a68065eb9cd #0 [ 46.124059][ T3609] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 46.134124][ T3609] Call Trace: [ 46.137412][ T3609] [ 46.140338][ T3609] dump_stack_lvl+0xcd/0x134 [ 46.144959][ T3609] panic+0x2d7/0x636 [ 46.148864][ T3609] ? panic_print_sys_info.part.0+0x10b/0x10b [ 46.154859][ T3609] ? __warn.cold+0x1d9/0x2cd [ 46.159441][ T3609] ? handle_exception_nmi+0xfdc/0x1190 [ 46.164896][ T3609] __warn.cold+0x1ea/0x2cd [ 46.169305][ T3609] ? handle_exception_nmi+0xfdc/0x1190 [ 46.174933][ T3609] report_bug+0x1bc/0x210 [ 46.179259][ T3609] handle_bug+0x3c/0x60 [ 46.183406][ T3609] exc_invalid_op+0x14/0x40 [ 46.187901][ T3609] asm_exc_invalid_op+0x1b/0x20 [ 46.192746][ T3609] RIP: 0010:handle_exception_nmi+0xfdc/0x1190 [ 46.198804][ T3609] Code: 0f 84 c8 f3 ff ff e8 33 5c 58 00 48 89 ef c7 85 84 0d 00 00 00 00 00 00 e8 21 35 ec ff 41 89 c4 e9 af f3 ff ff e8 14 5c 58 00 <0f> 0b e9 69 f6 ff ff e8 08 5c 58 00 be f5 ff ff ff bf 01 00 00 00 [ 46.220329][ T3609] RSP: 0018:ffffc9000309faf8 EFLAGS: 00010293 [ 46.226407][ T3609] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 46.234371][ T3609] RDX: ffff88801ba1d880 RSI: ffffffff8122171c RDI: 0000000000000001 [ 46.242374][ T3609] RBP: ffff88807cd88000 R08: 0000000000000001 R09: 0000000000000000 [ 46.250336][ T3609] R10: 0000000000000000 R11: 0000000000000001 R12: 00000000a0000975 [ 46.258296][ T3609] R13: ffff88807cd88248 R14: 0000000000000000 R15: 0000000080000300 [ 46.266269][ T3609] ? handle_exception_nmi+0xfdc/0x1190 [ 46.271736][ T3609] ? handle_exception_nmi+0xfdc/0x1190 [ 46.277194][ T3609] ? vmx_guest_inject_ac+0x160/0x160 [ 46.282474][ T3609] vmx_handle_exit+0x498/0x1950 [ 46.287328][ T3609] kvm_arch_vcpu_ioctl_run+0x4208/0x66f0 [ 46.292981][ T3609] ? kvm_arch_vcpu_runnable+0x790/0x790 [ 46.298524][ T3609] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 46.304344][ T3609] ? kvm_vcpu_ioctl+0x570/0xf30 [ 46.309186][ T3609] kvm_vcpu_ioctl+0x570/0xf30 [ 46.313857][ T3609] ? kvm_vcpu_kick+0x2f0/0x2f0 [ 46.318623][ T3609] ? find_held_lock+0x2d/0x110 [ 46.323389][ T3609] ? ptrace_notify+0xfa/0x140 [ 46.328059][ T3609] ? lock_downgrade+0x6e0/0x6e0 [ 46.332914][ T3609] ? _raw_spin_unlock_irq+0x1f/0x40 [ 46.338106][ T3609] ? bpf_lsm_file_ioctl+0x5/0x10 [ 46.343037][ T3609] ? kvm_vcpu_kick+0x2f0/0x2f0 [ 46.347795][ T3609] __x64_sys_ioctl+0x193/0x200 [ 46.352552][ T3609] do_syscall_64+0x35/0xb0 [ 46.356966][ T3609] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 46.362850][ T3609] RIP: 0033:0x7f56efaee199 [ 46.367253][ T3609] Code: 28 c3 e8 2a 14 00 00 66 2e 0f 1f 84 00 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 [ 46.386849][ T3609] RSP: 002b:00007ffc37353158 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 46.395270][ T3609] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f56efaee199 [ 46.403250][ T3609] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 46.411226][ T3609] RBP: 00007f56efab1bf0 R08: 0000000000000000 R09: 0000000000000000 [ 46.419189][ T3609] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f56efab1c80 [ 46.427150][ T3609] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 46.435121][ T3609] [ 46.438485][ T3609] Kernel Offset: disabled [ 46.442884][ T3609] Rebooting in 86400 seconds..