Warning: Permanently added '10.128.0.7' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 43.930701][ T7016] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 43.966904][ T7016] ================================================================== [ 43.975770][ T7016] BUG: KASAN: slab-out-of-bounds in __kvm_gfn_to_hva_cache_init+0x30b/0x710 [ 43.984699][ T7016] Read of size 8 at addr ffff8880a6b60468 by task syz-executor122/7016 [ 43.992936][ T7016] [ 43.995259][ T7016] CPU: 0 PID: 7016 Comm: syz-executor122 Not tainted 5.7.0-rc1-syzkaller #0 [ 44.003927][ T7016] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 44.014205][ T7016] Call Trace: [ 44.017513][ T7016] dump_stack+0x1e9/0x30e [ 44.021831][ T7016] print_address_description+0x74/0x5c0 [ 44.027587][ T7016] ? printk+0x62/0x83 [ 44.031615][ T7016] ? vprintk_emit+0x339/0x3c0 [ 44.036436][ T7016] __kasan_report+0x103/0x1a0 [ 44.041242][ T7016] ? __kvm_gfn_to_hva_cache_init+0x30b/0x710 [ 44.047298][ T7016] ? __kvm_gfn_to_hva_cache_init+0x30b/0x710 [ 44.053380][ T7016] kasan_report+0x4d/0x80 [ 44.057695][ T7016] ? __kvm_gfn_to_hva_cache_init+0x30b/0x710 [ 44.063684][ T7016] ? kvm_lapic_set_vapic_addr+0x7d/0x130 [ 44.069403][ T7016] ? kvm_arch_vcpu_ioctl+0x1645/0x4010 [ 44.074961][ T7016] ? kvm_vcpu_ioctl+0xff/0xa80 [ 44.079761][ T7016] ? kvm_vcpu_ioctl+0x550/0xa80 [ 44.084599][ T7016] ? check_preemption_disabled+0xb0/0x240 [ 44.091000][ T7016] ? debug_smp_processor_id+0x5/0x20 [ 44.096272][ T7016] ? kvm_vm_ioctl_get_dirty_log+0x650/0x650 [ 44.102361][ T7016] ? __se_sys_ioctl+0xf9/0x160 [ 44.107123][ T7016] ? do_syscall_64+0xf3/0x1b0 [ 44.111797][ T7016] ? entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 44.117847][ T7016] [ 44.120155][ T7016] Allocated by task 7016: [ 44.124621][ T7016] __kasan_kmalloc+0x114/0x160 [ 44.129379][ T7016] kvmalloc_node+0x81/0x100 [ 44.133898][ T7016] kvm_set_memslot+0x124/0x15b0 [ 44.138755][ T7016] __kvm_set_memory_region+0x1388/0x16c0 [ 44.144376][ T7016] __x86_set_memory_region+0x319/0x620 [ 44.149922][ T7016] vmx_create_vcpu+0x843/0x1380 [ 44.154858][ T7016] kvm_arch_vcpu_create+0x660/0x950 [ 44.160036][ T7016] kvm_vm_ioctl+0xe6d/0x2530 [ 44.164789][ T7016] __se_sys_ioctl+0xf9/0x160 [ 44.169371][ T7016] do_syscall_64+0xf3/0x1b0 [ 44.173878][ T7016] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 44.180176][ T7016] [ 44.182624][ T7016] Freed by task 2704: [ 44.186608][ T7016] __kasan_slab_free+0x125/0x190 [ 44.191523][ T7016] kfree+0x10a/0x220 [ 44.195536][ T7016] process_one_work+0x76e/0xfd0 [ 44.200495][ T7016] worker_thread+0xa7f/0x1450 [ 44.205484][ T7016] kthread+0x353/0x380 [ 44.209636][ T7016] ret_from_fork+0x24/0x30 [ 44.214070][ T7016] [ 44.216388][ T7016] The buggy address belongs to the object at ffff8880a6b60000 [ 44.216388][ T7016] which belongs to the cache kmalloc-2k of size 2048 [ 44.230716][ T7016] The buggy address is located 1128 bytes inside of [ 44.230716][ T7016] 2048-byte region [ffff8880a6b60000, ffff8880a6b60800) [ 44.244142][ T7016] The buggy address belongs to the page: [ 44.249775][ T7016] page:ffffea00029ad800 refcount:1 mapcount:0 mapping:0000000080c84a18 index:0x0 [ 44.258858][ T7016] flags: 0xfffe0000000200(slab) [ 44.266568][ T7016] raw: 00fffe0000000200 ffffea00029ad208 ffffea00029adc48 ffff8880aa400e00 [ 44.275134][ T7016] raw: 0000000000000000 ffff8880a6b60000 0000000100000001 0000000000000000 [ 44.283780][ T7016] page dumped because: kasan: bad access detected [ 44.290167][ T7016] [ 44.292485][ T7016] Memory state around the buggy address: [ 44.298134][ T7016] ffff8880a6b60300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 44.306271][ T7016] ffff8880a6b60380: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 44.314343][ T7016] >ffff8880a6b60400: 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc [ 44.322675][ T7016] ^ [ 44.330302][ T7016] ffff8880a6b60480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.338814][ T7016] ffff8880a6b60500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.347240][ T7016] ================================================================== [ 44.355342][ T7016] Disabling lock debugging due to kernel taint [ 44.379865][ T7016] Kernel panic - not syncing: panic_on_warn set ... [ 44.386618][ T7016] CPU: 1 PID: 7016 Comm: syz-executor122 Tainted: G B 5.7.0-rc1-syzkaller #0 [ 44.396919][ T7016] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 44.407523][ T7016] Call Trace: [ 44.410817][ T7016] dump_stack+0x1e9/0x30e [ 44.415150][ T7016] panic+0x264/0x7a0 [ 44.420176][ T7016] ? trace_hardirqs_on+0x30/0x70 [ 44.425908][ T7016] __kasan_report+0x191/0x1a0 [ 44.430570][ T7016] ? __kvm_gfn_to_hva_cache_init+0x30b/0x710 [ 44.436582][ T7016] ? __kvm_gfn_to_hva_cache_init+0x30b/0x710 [ 44.442662][ T7016] kasan_report+0x4d/0x80 [ 44.447079][ T7016] ? __kvm_gfn_to_hva_cache_init+0x30b/0x710 [ 44.453060][ T7016] ? kvm_lapic_set_vapic_addr+0x7d/0x130 [ 44.458671][ T7016] ? kvm_arch_vcpu_ioctl+0x1645/0x4010 [ 44.464114][ T7016] ? kvm_vcpu_ioctl+0xff/0xa80 [ 44.468857][ T7016] ? kvm_vcpu_ioctl+0x550/0xa80 [ 44.473699][ T7016] ? check_preemption_disabled+0xb0/0x240 [ 44.479398][ T7016] ? debug_smp_processor_id+0x5/0x20 [ 44.484677][ T7016] ? kvm_vm_ioctl_get_dirty_log+0x650/0x650 [ 44.491239][ T7016] ? __se_sys_ioctl+0xf9/0x160 [ 44.496166][ T7016] ? do_syscall_64+0xf3/0x1b0 [ 44.501988][ T7016] ? entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 44.509713][ T7016] Kernel Offset: disabled [ 44.514048][ T7016] Rebooting in 86400 seconds..