===================================================== BUG: KMSAN: kernel-infoleak-after-free in instrument_copy_to_user include/linux/instrumented.h:121 [inline] BUG: KMSAN: kernel-infoleak-after-free in _copy_to_user+0xbc/0x100 lib/usercopy.c:33 instrument_copy_to_user include/linux/instrumented.h:121 [inline] _copy_to_user+0xbc/0x100 lib/usercopy.c:33 copy_to_user include/linux/uaccess.h:169 [inline] vcs_read+0x1ef7/0x23c0 drivers/tty/vt/vc_screen.c:456 vfs_read+0x3a9/0x11b0 fs/read_write.c:480 ksys_read+0x21b/0x4e0 fs/read_write.c:620 __do_sys_read fs/read_write.c:630 [inline] __se_sys_read fs/read_write.c:628 [inline] __x64_sys_read+0x8f/0xd0 fs/read_write.c:628 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd Uninit was stored to memory at: vc_uniscr_copy_line+0x340/0x570 drivers/tty/vt/vt.c:565 vcs_read_buf_uni drivers/tty/vt/vc_screen.c:265 [inline] vcs_read+0x102d/0x23c0 drivers/tty/vt/vc_screen.c:436 vfs_read+0x3a9/0x11b0 fs/read_write.c:480 ksys_read+0x21b/0x4e0 fs/read_write.c:620 __do_sys_read fs/read_write.c:630 [inline] __se_sys_read fs/read_write.c:628 [inline] __x64_sys_read+0x8f/0xd0 fs/read_write.c:628 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd Uninit was created at: free_pages_prepare mm/page_alloc.c:1328 [inline] free_pcp_prepare+0x40/0x680 mm/page_alloc.c:1449 free_unref_page_prepare mm/page_alloc.c:3353 [inline] free_unref_page+0x3e/0x3f0 mm/page_alloc.c:3448 free_the_page mm/page_alloc.c:694 [inline] __free_pages+0x78/0x1c0 mm/page_alloc.c:5534 free_pages+0x96/0xb0 mm/page_alloc.c:5545 free_vmcs arch/x86/kvm/vmx/vmx.c:2717 [inline] free_loaded_vmcs arch/x86/kvm/vmx/vmx.c:2728 [inline] vmx_vcpu_free+0x348/0x510 arch/x86/kvm/vmx/vmx.c:7075 kvm_arch_vcpu_destroy+0x6f/0x340 arch/x86/kvm/x86.c:11424 kvm_vcpu_destroy arch/x86/kvm/../../../virt/kvm/kvm_main.c:447 [inline] kvm_destroy_vcpus+0xf4/0x340 arch/x86/kvm/../../../virt/kvm/kvm_main.c:467 kvm_arch_destroy_vm+0x476/0x520 arch/x86/kvm/x86.c:11995 kvm_destroy_vm arch/x86/kvm/../../../virt/kvm/kvm_main.c:1251 [inline] kvm_put_kvm+0xedd/0x2030 arch/x86/kvm/../../../virt/kvm/kvm_main.c:1285 kvm_vcpu_release+0x51/0x90 arch/x86/kvm/../../../virt/kvm/kvm_main.c:3708 __fput+0x660/0xe30 fs/file_table.c:317 ____fput+0x1a/0x20 fs/file_table.c:350 task_work_run+0x13c/0x280 kernel/task_work.c:177 resume_user_mode_work include/linux/resume_user_mode.h:49 [inline] exit_to_user_mode_loop+0x2a9/0x320 kernel/entry/common.c:171 exit_to_user_mode_prepare+0x16e/0x220 kernel/entry/common.c:203 __syscall_exit_to_user_mode_work kernel/entry/common.c:285 [inline] syscall_exit_to_user_mode+0x23/0x40 kernel/entry/common.c:296 do_syscall_64+0x49/0xb0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x63/0xcd Bytes 0-407 of 4096 are uninitialized Memory access of size 4096 starts at ffff8880964e7000 Data copied to user address 000000002000a880 CPU: 0 PID: 28786 Comm: syz-executor.4 Not tainted 5.19.0-syzkaller-32655-g1b070a5d1a2c #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 =====================================================