Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.1.58' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 58.533617][ T7022] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 58.574909][ T7022] ================================================================== [ 58.583250][ T7022] BUG: KASAN: slab-out-of-bounds in kvm_vcpu_gfn_to_memslot+0x50e/0x540 [ 58.591606][ T7022] Read of size 8 at addr ffff8880a666a468 by task syz-executor772/7022 [ 58.600082][ T7022] [ 58.602420][ T7022] CPU: 0 PID: 7022 Comm: syz-executor772 Not tainted 5.6.0-syzkaller #0 [ 58.610721][ T7022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 58.621112][ T7022] Call Trace: [ 58.624399][ T7022] dump_stack+0x188/0x20d [ 58.628723][ T7022] print_address_description.constprop.0.cold+0xd3/0x315 [ 58.635738][ T7022] ? kvm_vcpu_gfn_to_memslot+0x50e/0x540 [ 58.641356][ T7022] __kasan_report.cold+0x35/0x4d [ 58.646290][ T7022] ? kvm_vcpu_gfn_to_memslot+0x50e/0x540 [ 58.651911][ T7022] ? kvm_vcpu_gfn_to_memslot+0x50e/0x540 [ 58.657524][ T7022] kasan_report+0x33/0x50 [ 58.661835][ T7022] kvm_vcpu_gfn_to_memslot+0x50e/0x540 [ 58.667290][ T7022] try_async_pf+0x12b/0xac0 [ 58.671771][ T7022] ? ept_gva_to_gpa+0x1e0/0x1e0 [ 58.676622][ T7022] ? mark_held_locks+0x9f/0xe0 [ 58.681377][ T7022] ? mmu_topup_memory_caches+0x325/0x460 [ 58.687003][ T7022] direct_page_fault+0x27d/0x1d70 [ 58.692021][ T7022] ? kvm_mmu_get_page+0x1e70/0x1e70 [ 58.697202][ T7022] ? kvm_mtrr_check_gfn_range_consistency+0x254/0x2e0 [ 58.703957][ T7022] ? kvm_vcpu_mtrr_init+0x70/0x70 [ 58.708974][ T7022] kvm_mmu_page_fault+0x187/0x15d0 [ 58.714067][ T7022] ? find_held_lock+0x2d/0x110 [ 58.718814][ T7022] ? kvm_nx_lpage_recovery_worker+0x790/0x790 [ 58.725053][ T7022] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 58.730623][ T7022] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 58.736621][ T7022] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 58.742158][ T7022] ? handle_ept_violation+0x206/0x550 [ 58.747524][ T7022] ? vmx_inject_irq+0x5b0/0x5b0 [ 58.752422][ T7022] vmx_handle_exit+0x2b8/0x1700 [ 58.757285][ T7022] vcpu_enter_guest+0xfea/0x59d0 [ 58.762242][ T7022] ? vmx_vcpu_load_vmcs+0x960/0x960 [ 58.767583][ T7022] ? kvm_vcpu_reload_apic_access_page+0x300/0x300 [ 58.774068][ T7022] ? kvm_arch_vcpu_ioctl_run+0x23a/0x16a0 [ 58.779783][ T7022] ? lock_release+0x800/0x800 [ 58.784445][ T7022] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 58.789987][ T7022] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 58.795948][ T7022] ? kvm_check_async_pf_completion+0x2a4/0x400 [ 58.802155][ T7022] ? lockdep_hardirqs_on+0x463/0x620 [ 58.807576][ T7022] ? kvm_arch_vcpu_ioctl_run+0x3fb/0x16a0 [ 58.813340][ T7022] kvm_arch_vcpu_ioctl_run+0x3fb/0x16a0 [ 58.818894][ T7022] kvm_vcpu_ioctl+0x493/0xe60 [ 58.823561][ T7022] ? kvm_get_dirty_log_protect.isra.0+0x670/0x670 [ 58.829980][ T7022] ? ioctl_file_clone+0x180/0x180 [ 58.835003][ T7022] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 58.840533][ T7022] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 58.846523][ T7022] ? kvm_get_dirty_log_protect.isra.0+0x670/0x670 [ 58.852941][ T7022] ksys_ioctl+0x11a/0x180 [ 58.857507][ T7022] __x64_sys_ioctl+0x6f/0xb0 [ 58.862083][ T7022] ? lockdep_hardirqs_on+0x463/0x620 [ 58.867378][ T7022] do_syscall_64+0xf6/0x7d0 [ 58.871886][ T7022] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 58.877774][ T7022] RIP: 0033:0x440359 [ 58.881663][ T7022] Code: 18 89 d0 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 fb 13 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 58.901251][ T7022] RSP: 002b:00007ffdeffdb0b8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 58.909642][ T7022] RAX: ffffffffffffffda RBX: 00000000004002c8 RCX: 0000000000440359 [ 58.917595][ T7022] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 58.925556][ T7022] RBP: 00000000006ca018 R08: 00000000004002c8 R09: 00000000004002c8 [ 58.933508][ T7022] R10: 00000000004002c8 R11: 0000000000000246 R12: 0000000000401be0 [ 58.941479][ T7022] R13: 0000000000401c70 R14: 0000000000000000 R15: 0000000000000000 [ 58.949445][ T7022] [ 58.951751][ T7022] Allocated by task 7022: [ 58.956059][ T7022] save_stack+0x1b/0x40 [ 58.960196][ T7022] __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 58.965824][ T7022] kvmalloc_node+0x61/0xf0 [ 58.970233][ T7022] kvm_set_memslot+0x115/0x1530 [ 58.975078][ T7022] __kvm_set_memory_region+0xcf7/0x1320 [ 58.980619][ T7022] __x86_set_memory_region+0x2a3/0x5a0 [ 58.986072][ T7022] vmx_create_vcpu+0x2107/0x2b40 [ 58.990992][ T7022] kvm_arch_vcpu_create+0x6ef/0xb80 [ 58.996202][ T7022] kvm_vm_ioctl+0x15f7/0x23e0 [ 59.000868][ T7022] ksys_ioctl+0x11a/0x180 [ 59.005179][ T7022] __x64_sys_ioctl+0x6f/0xb0 [ 59.009753][ T7022] do_syscall_64+0xf6/0x7d0 [ 59.014236][ T7022] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 59.020103][ T7022] [ 59.022412][ T7022] Freed by task 6931: [ 59.026379][ T7022] save_stack+0x1b/0x40 [ 59.030519][ T7022] __kasan_slab_free+0xf7/0x140 [ 59.035348][ T7022] kfree+0x109/0x2b0 [ 59.039333][ T7022] skb_free_head+0x8b/0xa0 [ 59.043727][ T7022] skb_release_data+0x42e/0x8b0 [ 59.048554][ T7022] skb_release_all+0x46/0x60 [ 59.053127][ T7022] consume_skb+0xf3/0x400 [ 59.057445][ T7022] unix_stream_read_generic+0x17e1/0x1c80 [ 59.063149][ T7022] unix_stream_recvmsg+0xb1/0xf0 [ 59.068168][ T7022] sock_recvmsg+0xca/0x110 [ 59.072747][ T7022] sock_read_iter+0x2c7/0x3d0 [ 59.077409][ T7022] new_sync_read+0x64d/0x7a0 [ 59.082004][ T7022] __vfs_read+0xc9/0x100 [ 59.086236][ T7022] vfs_read+0x1f0/0x420 [ 59.090395][ T7022] ksys_read+0x1ee/0x250 [ 59.097123][ T7022] do_syscall_64+0xf6/0x7d0 [ 59.102767][ T7022] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 59.109196][ T7022] [ 59.111606][ T7022] The buggy address belongs to the object at ffff8880a666a000 [ 59.111606][ T7022] which belongs to the cache kmalloc-2k of size 2048 [ 59.126439][ T7022] The buggy address is located 1128 bytes inside of [ 59.126439][ T7022] 2048-byte region [ffff8880a666a000, ffff8880a666a800) [ 59.140276][ T7022] The buggy address belongs to the page: [ 59.146008][ T7022] page:ffffea0002999a80 refcount:1 mapcount:0 mapping:00000000f67550cf index:0x0 [ 59.155799][ T7022] flags: 0xfffe0000000200(slab) [ 59.160639][ T7022] raw: 00fffe0000000200 ffffea0002999a08 ffffea0002998dc8 ffff8880aa000e00 [ 59.170962][ T7022] raw: 0000000000000000 ffff8880a666a000 0000000100000001 0000000000000000 [ 59.179543][ T7022] page dumped because: kasan: bad access detected [ 59.186049][ T7022] [ 59.188397][ T7022] Memory state around the buggy address: [ 59.194036][ T7022] ffff8880a666a300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 59.202184][ T7022] ffff8880a666a380: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 59.210604][ T7022] >ffff8880a666a400: 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc [ 59.219410][ T7022] ^ [ 59.226958][ T7022] ffff8880a666a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.235348][ T7022] ffff8880a666a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.243415][ T7022] ================================================================== [ 59.251639][ T7022] Disabling lock debugging due to kernel taint [ 59.259206][ T7022] Kernel panic - not syncing: panic_on_warn set ... [ 59.266102][ T7022] CPU: 1 PID: 7022 Comm: syz-executor772 Tainted: G B 5.6.0-syzkaller #0 [ 59.276642][ T7022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 59.286971][ T7022] Call Trace: [ 59.290302][ T7022] dump_stack+0x188/0x20d [ 59.294638][ T7022] panic+0x2e3/0x75c [ 59.298785][ T7022] ? add_taint.cold+0x16/0x16 [ 59.304155][ T7022] ? preempt_schedule_common+0x5e/0xc0 [ 59.309710][ T7022] ? kvm_vcpu_gfn_to_memslot+0x50e/0x540 [ 59.315330][ T7022] ? preempt_schedule_thunk+0x16/0x18 [ 59.320694][ T7022] ? trace_hardirqs_on+0x55/0x220 [ 59.325699][ T7022] ? kvm_vcpu_gfn_to_memslot+0x50e/0x540 [ 59.331665][ T7022] end_report+0x4d/0x53 [ 59.335923][ T7022] __kasan_report.cold+0xd/0x4d [ 59.340778][ T7022] ? kvm_vcpu_gfn_to_memslot+0x50e/0x540 [ 59.346446][ T7022] ? kvm_vcpu_gfn_to_memslot+0x50e/0x540 [ 59.352081][ T7022] kasan_report+0x33/0x50 [ 59.356412][ T7022] kvm_vcpu_gfn_to_memslot+0x50e/0x540 [ 59.361865][ T7022] try_async_pf+0x12b/0xac0 [ 59.366457][ T7022] ? ept_gva_to_gpa+0x1e0/0x1e0 [ 59.371305][ T7022] ? mark_held_locks+0x9f/0xe0 [ 59.376055][ T7022] ? mmu_topup_memory_caches+0x325/0x460 [ 59.381667][ T7022] direct_page_fault+0x27d/0x1d70 [ 59.386968][ T7022] ? kvm_mmu_get_page+0x1e70/0x1e70 [ 59.392176][ T7022] ? kvm_mtrr_check_gfn_range_consistency+0x254/0x2e0 [ 59.398935][ T7022] ? kvm_vcpu_mtrr_init+0x70/0x70 [ 59.404134][ T7022] kvm_mmu_page_fault+0x187/0x15d0 [ 59.409230][ T7022] ? find_held_lock+0x2d/0x110 [ 59.413970][ T7022] ? kvm_nx_lpage_recovery_worker+0x790/0x790 [ 59.420018][ T7022] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 59.425537][ T7022] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 59.431491][ T7022] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 59.437105][ T7022] ? handle_ept_violation+0x206/0x550 [ 59.442452][ T7022] ? vmx_inject_irq+0x5b0/0x5b0 [ 59.447716][ T7022] vmx_handle_exit+0x2b8/0x1700 [ 59.452574][ T7022] vcpu_enter_guest+0xfea/0x59d0 [ 59.457502][ T7022] ? vmx_vcpu_load_vmcs+0x960/0x960 [ 59.462679][ T7022] ? kvm_vcpu_reload_apic_access_page+0x300/0x300 [ 59.469085][ T7022] ? kvm_arch_vcpu_ioctl_run+0x23a/0x16a0 [ 59.474788][ T7022] ? lock_release+0x800/0x800 [ 59.479536][ T7022] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 59.485062][ T7022] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 59.491195][ T7022] ? kvm_check_async_pf_completion+0x2a4/0x400 [ 59.497341][ T7022] ? lockdep_hardirqs_on+0x463/0x620 [ 59.502616][ T7022] ? kvm_arch_vcpu_ioctl_run+0x3fb/0x16a0 [ 59.508427][ T7022] kvm_arch_vcpu_ioctl_run+0x3fb/0x16a0 [ 59.514030][ T7022] kvm_vcpu_ioctl+0x493/0xe60 [ 59.518708][ T7022] ? kvm_get_dirty_log_protect.isra.0+0x670/0x670 [ 59.525229][ T7022] ? ioctl_file_clone+0x180/0x180 [ 59.531035][ T7022] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 59.536597][ T7022] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 59.542622][ T7022] ? kvm_get_dirty_log_protect.isra.0+0x670/0x670 [ 59.549020][ T7022] ksys_ioctl+0x11a/0x180 [ 59.553459][ T7022] __x64_sys_ioctl+0x6f/0xb0 [ 59.558037][ T7022] ? lockdep_hardirqs_on+0x463/0x620 [ 59.563304][ T7022] do_syscall_64+0xf6/0x7d0 [ 59.567789][ T7022] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 59.573752][ T7022] RIP: 0033:0x440359 [ 59.577645][ T7022] Code: 18 89 d0 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 fb 13 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 59.597226][ T7022] RSP: 002b:00007ffdeffdb0b8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 59.605616][ T7022] RAX: ffffffffffffffda RBX: 00000000004002c8 RCX: 0000000000440359 [ 59.613751][ T7022] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 59.621717][ T7022] RBP: 00000000006ca018 R08: 00000000004002c8 R09: 00000000004002c8 [ 59.629666][ T7022] R10: 00000000004002c8 R11: 0000000000000246 R12: 0000000000401be0 [ 59.637624][ T7022] R13: 0000000000401c70 R14: 0000000000000000 R15: 0000000000000000 [ 59.647087][ T7022] Kernel Offset: disabled [ 59.651434][ T7022] Rebooting in 86400 seconds..