================================================================== BUG: KMSAN: kernel-infoleak in copy_to_user include/linux/uaccess.h:184 [inline] BUG: KMSAN: kernel-infoleak in vcs_read+0x18ba/0x1cc0 drivers/tty/vt/vc_screen.c:352 CPU: 0 PID: 20241 Comm: syz-executor4 Not tainted 4.17.0+ #8 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x185/0x1d0 lib/dump_stack.c:113 kmsan_report+0x188/0x2a0 mm/kmsan/kmsan.c:1122 kmsan_internal_check_memory+0x17e/0x1f0 mm/kmsan/kmsan.c:1235 kmsan_copy_to_user+0x7a/0x160 mm/kmsan/kmsan.c:1258 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 copy_to_user include/linux/uaccess.h:184 [inline] vcs_read+0x18ba/0x1cc0 drivers/tty/vt/vc_screen.c:352 do_loop_readv_writev fs/read_write.c:700 [inline] do_iter_read+0x884/0xd80 fs/read_write.c:924 vfs_readv fs/read_write.c:986 [inline] do_readv+0x295/0x5f0 fs/read_write.c:1019 __do_sys_readv fs/read_write.c:1106 [inline] __se_sys_readv fs/read_write.c:1103 [inline] __x64_sys_readv+0xe1/0x120 fs/read_write.c:1103 do_syscall_64+0x15b/0x230 arch/x86/entry/common.c:287 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x455b29 RSP: 002b:00007f2ed6534c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 RAX: ffffffffffffffda RBX: 00007f2ed65356d4 RCX: 0000000000455b29 RDX: 0000000000000004 RSI: 0000000020001340 RDI: 0000000000000013 RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff R13: 00000000004c06ab R14: 00000000004cfef8 R15: 0000000000000000 CPU: 1 PID: 20243 Comm: syz-executor5 Not tainted 4.17.0+ #8 Uninit was stored to memory at: kmsan_save_stack_with_flags mm/kmsan/kmsan.c:279 [inline] kmsan_save_stack mm/kmsan/kmsan.c:294 [inline] kmsan_internal_chain_origin+0x12b/0x210 mm/kmsan/kmsan.c:686 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 __msan_chain_origin+0x69/0xc0 mm/kmsan/kmsan_instr.c:464 vcs_read+0x17a3/0x1cc0 drivers/tty/vt/vc_screen.c:333 Call Trace: do_loop_readv_writev fs/read_write.c:700 [inline] do_iter_read+0x884/0xd80 fs/read_write.c:924 vfs_readv fs/read_write.c:986 [inline] do_readv+0x295/0x5f0 fs/read_write.c:1019 __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x185/0x1d0 lib/dump_stack.c:113 __do_sys_readv fs/read_write.c:1106 [inline] __se_sys_readv fs/read_write.c:1103 [inline] __x64_sys_readv+0xe1/0x120 fs/read_write.c:1103 do_syscall_64+0x15b/0x230 arch/x86/entry/common.c:287 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x87b/0xab0 lib/fault-inject.c:149 entry_SYSCALL_64_after_hwframe+0x44/0xa9 kmsan_save_stack_with_flags mm/kmsan/kmsan.c:279 [inline] kmsan_internal_poison_shadow+0xb8/0x1b0 mm/kmsan/kmsan.c:189 __should_failslab+0x278/0x2a0 mm/failslab.c:32 kmsan_kmalloc+0x94/0x100 mm/kmsan/kmsan.c:315 __kmalloc+0x13a/0x350 mm/slub.c:3818 should_failslab+0x29/0x70 mm/slab_common.c:1522 kmalloc include/linux/slab.h:517 [inline] vc_allocate+0x438/0x800 drivers/tty/vt/vt.c:787 con_install+0x8c/0x640 drivers/tty/vt/vt.c:2880 slab_pre_alloc_hook mm/slab.h:423 [inline] slab_alloc_node mm/slub.c:2679 [inline] slab_alloc mm/slub.c:2761 [inline] __kmalloc+0xbe/0x350 mm/slub.c:3812 tty_driver_install_tty drivers/tty/tty_io.c:1224 [inline] tty_init_dev+0x1b5/0x1020 drivers/tty/tty_io.c:1324 tty_open_by_driver drivers/tty/tty_io.c:1959 [inline] tty_open+0x17b4/0x2ed0 drivers/tty/tty_io.c:2007 chrdev_open+0xc25/0xd90 fs/char_dev.c:417 do_dentry_open+0xccc/0x1440 fs/open.c:794 kmalloc include/linux/slab.h:517 [inline] rds_info_getsockopt+0x2a3/0xbb0 net/rds/info.c:191 vfs_open+0x1b6/0x2f0 fs/open.c:908 do_last fs/namei.c:3365 [inline] path_openat+0x4771/0x6640 fs/namei.c:3506 do_filp_open+0x261/0x640 fs/namei.c:3540 do_sys_open+0x624/0x960 fs/open.c:1101 __do_sys_open fs/open.c:1119 [inline] __se_sys_open fs/open.c:1114 [inline] __x64_sys_open+0xf2/0x130 fs/open.c:1114 do_syscall_64+0x15b/0x230 arch/x86/entry/common.c:287 rds_getsockopt+0x362/0x5e0 net/rds/af_rds.c:398 entry_SYSCALL_64_after_hwframe+0x44/0xa9