[....] Starting OpenBSD Secure Shell server: sshd[ 47.229929] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. [ 47.544740] audit: type=1800 audit(1538959631.597:29): pid=5916 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 47.564421] audit: type=1800 audit(1538959631.597:30): pid=5916 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 49.973656] random: sshd: uninitialized urandom read (32 bytes read) [ 50.427101] random: sshd: uninitialized urandom read (32 bytes read) [ 51.692258] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.10.59' (ECDSA) to the list of known hosts. [ 57.399396] random: sshd: uninitialized urandom read (32 bytes read) 2018/10/08 00:47:23 fuzzer started [ 61.381308] random: cc1: uninitialized urandom read (8 bytes read) 2018/10/08 00:47:27 dialing manager at 10.128.0.26:36867 2018/10/08 00:47:27 syscalls: 1 2018/10/08 00:47:27 code coverage: enabled 2018/10/08 00:47:27 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/10/08 00:47:27 setuid sandbox: enabled 2018/10/08 00:47:27 namespace sandbox: enabled 2018/10/08 00:47:27 Android sandbox: /sys/fs/selinux/policy does not exist 2018/10/08 00:47:27 fault injection: enabled 2018/10/08 00:47:27 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/10/08 00:47:27 net packed injection: enabled 2018/10/08 00:47:27 net device setup: enabled [ 66.666156] random: crng init done 00:49:01 executing program 0: syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0xffffffffffffffff, 0xc0) [ 158.484757] IPVS: ftp: loaded support on port[0] = 21 [ 160.336955] bridge0: port 1(bridge_slave_0) entered blocking state [ 160.343815] bridge0: port 1(bridge_slave_0) entered disabled state [ 160.351829] device bridge_slave_0 entered promiscuous mode [ 160.457245] bridge0: port 2(bridge_slave_1) entered blocking state [ 160.463797] bridge0: port 2(bridge_slave_1) entered disabled state [ 160.471822] device bridge_slave_1 entered promiscuous mode [ 160.575340] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 160.680075] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 00:49:05 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000600)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000080)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000000), 0xffffffffffffffff, 0x0, 0x0, 0x1}}, 0x20) [ 161.001499] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 161.113461] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 161.663827] IPVS: ftp: loaded support on port[0] = 21 [ 162.069121] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 162.076907] team0: Port device team_slave_0 added [ 162.238787] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 162.246681] team0: Port device team_slave_1 added [ 162.431065] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 162.440215] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 162.448799] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 162.561416] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 162.681969] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 162.689490] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 162.698333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 162.863277] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 162.870754] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 162.879525] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 164.283554] ip (6198) used greatest stack depth: 53056 bytes left [ 164.496642] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.503156] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.510961] device bridge_slave_0 entered promiscuous mode [ 164.729738] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.736290] bridge0: port 2(bridge_slave_1) entered disabled state [ 164.744315] device bridge_slave_1 entered promiscuous mode [ 164.853044] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.859590] bridge0: port 2(bridge_slave_1) entered forwarding state [ 164.866567] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.873075] bridge0: port 1(bridge_slave_0) entered forwarding state [ 164.881296] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 164.914502] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 165.104447] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 165.553821] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 165.723542] bond0: Enslaving bond_slave_1 as an active interface with an up link 00:49:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0xfffffff0}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x28, 0xb01, 0x0, 0x0, {0x10}}, 0x165}}, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20080}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[]}}, 0x0) [ 165.862349] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 165.969440] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 165.976627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 166.228276] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 166.235494] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 166.745301] IPVS: ftp: loaded support on port[0] = 21 [ 166.900770] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 166.908588] team0: Port device team_slave_0 added [ 167.150744] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 167.158488] team0: Port device team_slave_1 added [ 167.360907] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 167.368070] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 167.376508] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 167.635112] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 167.642457] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 167.650871] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 167.838607] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 167.846219] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 167.854808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 168.131425] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 168.139002] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 168.147852] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 170.531533] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.538345] bridge0: port 1(bridge_slave_0) entered disabled state [ 170.546734] device bridge_slave_0 entered promiscuous mode [ 170.557471] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.563981] bridge0: port 2(bridge_slave_1) entered forwarding state [ 170.570839] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.577378] bridge0: port 1(bridge_slave_0) entered forwarding state [ 170.585871] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 170.798888] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.805479] bridge0: port 2(bridge_slave_1) entered disabled state [ 170.813474] device bridge_slave_1 entered promiscuous mode [ 171.050571] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 171.284058] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 171.542485] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 172.046606] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 172.266484] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 172.707705] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 172.714834] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 00:49:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev}, 0x10) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[]}}, 0x44801) sendmsg$FOU_CMD_DEL(r0, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[]}}, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty, [0x0, 0x3e8]}, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000040)=@assoc_value={0x0}, &(0x7f0000000100)=0x8) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x0, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000440)={0x10, 0x30, 0xfa00, {&(0x7f0000000300), 0x0, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x14}, 0x1401}, r2}}, 0x38) setsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000200)={r1, 0x0, 0x0, 0xffff}, 0x14) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETOWNER(r0, 0x400454cc, r3) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000000)=""/146) [ 173.261316] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 173.269152] team0: Port device team_slave_0 added [ 173.509545] 8021q: adding VLAN 0 to HW filter on device bond0 [ 173.536787] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 173.545041] team0: Port device team_slave_1 added [ 173.799097] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 173.806206] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 173.814627] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 173.904166] IPVS: ftp: loaded support on port[0] = 21 [ 174.076877] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 174.084049] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 174.092556] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 174.421017] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 174.429136] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 174.437857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 174.563791] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 174.782177] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 174.789622] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 174.798410] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 175.675261] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 175.681769] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 175.689425] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 176.759467] 8021q: adding VLAN 0 to HW filter on device team0 [ 178.086926] bridge0: port 2(bridge_slave_1) entered blocking state [ 178.093414] bridge0: port 2(bridge_slave_1) entered forwarding state [ 178.100197] bridge0: port 1(bridge_slave_0) entered blocking state [ 178.106713] bridge0: port 1(bridge_slave_0) entered forwarding state [ 178.114774] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 178.291807] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 178.479521] bridge0: port 1(bridge_slave_0) entered blocking state [ 178.486153] bridge0: port 1(bridge_slave_0) entered disabled state [ 178.494130] device bridge_slave_0 entered promiscuous mode [ 178.730503] bridge0: port 2(bridge_slave_1) entered blocking state [ 178.737163] bridge0: port 2(bridge_slave_1) entered disabled state [ 178.745305] device bridge_slave_1 entered promiscuous mode [ 179.020450] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 179.319068] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 180.128662] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 180.411196] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 180.661160] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 180.668341] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 00:49:24 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000800)={&(0x7f00000000c0), 0xc, &(0x7f00000007c0)={&(0x7f0000000780)=@mpls_getnetconf={0x14, 0x52, 0x303}, 0x14}}, 0x0) [ 180.916968] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 180.924327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 181.694335] 8021q: adding VLAN 0 to HW filter on device bond0 [ 181.935873] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 181.943980] team0: Port device team_slave_0 added [ 182.104880] IPVS: ftp: loaded support on port[0] = 21 [ 182.310650] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 182.318606] team0: Port device team_slave_1 added [ 182.583842] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 182.590862] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 182.599547] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 182.815119] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 182.822315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 182.830706] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 182.881175] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 183.142763] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 183.150248] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 183.158996] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 183.488304] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 183.496030] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 183.504644] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 00:49:27 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8188aea6, &(0x7f0000000000)) [ 183.894278] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 183.967114] ================================================================== [ 183.974542] BUG: KMSAN: uninit-value in vmx_create_vcpu+0x10df/0x7920 [ 183.981134] CPU: 0 PID: 6757 Comm: syz-executor0 Not tainted 4.19.0-rc4+ #63 [ 183.988318] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 183.997667] Call Trace: [ 184.000273] dump_stack+0x306/0x460 [ 184.003909] ? _raw_spin_lock_irqsave+0x227/0x340 [ 184.008759] ? vmx_create_vcpu+0x10df/0x7920 [ 184.013189] kmsan_report+0x1a3/0x2d0 [ 184.017002] __msan_warning+0x7c/0xe0 [ 184.020819] vmx_create_vcpu+0x10df/0x7920 [ 184.025066] ? kmsan_set_origin_inline+0x6b/0x120 [ 184.029915] ? __msan_poison_alloca+0x17a/0x210 [ 184.034600] ? vmx_vm_init+0x340/0x340 [ 184.038501] kvm_arch_vcpu_create+0x25d/0x2f0 [ 184.043010] kvm_vm_ioctl+0x13fd/0x33d0 [ 184.046998] ? __msan_poison_alloca+0x17a/0x210 [ 184.051686] ? do_vfs_ioctl+0x18a/0x2810 [ 184.055754] ? __se_sys_ioctl+0x1da/0x270 [ 184.059913] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 184.064764] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 184.069622] do_vfs_ioctl+0xcf3/0x2810 [ 184.074311] ? security_file_ioctl+0x92/0x200 [ 184.078816] __se_sys_ioctl+0x1da/0x270 [ 184.082800] __x64_sys_ioctl+0x4a/0x70 [ 184.087004] do_syscall_64+0xbe/0x100 [ 184.090809] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 184.096003] RIP: 0033:0x457579 [ 184.099205] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 184.118110] RSP: 002b:00007f16b68ccc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 184.125827] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457579 [ 184.133096] RDX: 0000000000000000 RSI: 000000000000ae41 RDI: 0000000000000004 [ 184.140374] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 184.147647] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f16b68cd6d4 [ 184.154917] R13: 00000000004bfc18 R14: 00000000004cfca0 R15: 00000000ffffffff [ 184.162195] [ 184.163828] Local variable description: ----c.i.i.i.i.i.i@vmx_create_vcpu [ 184.170745] Variable was created at: [ 184.174462] vmx_create_vcpu+0xd5/0x7920 [ 184.178539] kvm_arch_vcpu_create+0x25d/0x2f0 [ 184.183027] ================================================================== [ 184.190382] Disabling lock debugging due to kernel taint [ 184.195830] Kernel panic - not syncing: panic_on_warn set ... [ 184.195830] [ 184.203317] CPU: 0 PID: 6757 Comm: syz-executor0 Tainted: G B 4.19.0-rc4+ #63 [ 184.211888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 184.221239] Call Trace: [ 184.223843] dump_stack+0x306/0x460 [ 184.227512] panic+0x54c/0xafa [ 184.230739] kmsan_report+0x2cd/0x2d0 [ 184.234559] __msan_warning+0x7c/0xe0 [ 184.238391] vmx_create_vcpu+0x10df/0x7920 [ 184.242641] ? kmsan_set_origin_inline+0x6b/0x120 [ 184.247497] ? __msan_poison_alloca+0x17a/0x210 [ 184.252190] ? vmx_vm_init+0x340/0x340 [ 184.256104] kvm_arch_vcpu_create+0x25d/0x2f0 [ 184.260610] kvm_vm_ioctl+0x13fd/0x33d0 [ 184.264603] ? __msan_poison_alloca+0x17a/0x210 [ 184.269298] ? do_vfs_ioctl+0x18a/0x2810 [ 184.273370] ? __se_sys_ioctl+0x1da/0x270 [ 184.277528] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 184.282466] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 184.287328] do_vfs_ioctl+0xcf3/0x2810 [ 184.291236] ? security_file_ioctl+0x92/0x200 [ 184.295778] __se_sys_ioctl+0x1da/0x270 [ 184.299775] __x64_sys_ioctl+0x4a/0x70 [ 184.303693] do_syscall_64+0xbe/0x100 [ 184.307532] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 184.312729] RIP: 0033:0x457579 [ 184.316016] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 184.334923] RSP: 002b:00007f16b68ccc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 184.342642] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457579 [ 184.349922] RDX: 0000000000000000 RSI: 000000000000ae41 RDI: 0000000000000004 [ 184.357194] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 184.364461] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f16b68cd6d4 [ 184.371732] R13: 00000000004bfc18 R14: 00000000004cfca0 R15: 00000000ffffffff [ 184.380300] Kernel Offset: disabled [ 184.383940] Rebooting in 86400 seconds..