reason=80000021 qualification=0000000000000000 IDTVectoring: info=00000000 errcode=00000000 TSC Offset = 0xffffff0662911e91 EPT pointer = 0x000000010057b01e ================================================================== BUG: KMSAN: kernel-infoleak in _copy_to_user+0x19a/0x230 lib/usercopy.c:32 CPU: 0 PID: 12277 Comm: syz-executor2 Not tainted 4.20.0-rc3+ #97 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x32d/0x480 lib/dump_stack.c:113 kmsan_report+0x12c/0x290 mm/kmsan/kmsan.c:682 kmsan_internal_check_memory+0x32a/0xa50 mm/kmsan/kmsan.c:742 kmsan_copy_to_user+0x78/0xd0 mm/kmsan/kmsan_hooks.c:634 _copy_to_user+0x19a/0x230 lib/usercopy.c:32 copy_to_user include/linux/uaccess.h:177 [inline] kvm_vcpu_ioctl+0x15aa/0x1cc0 arch/x86/kvm/../../../virt/kvm/kvm_main.c:2640 do_vfs_ioctl+0xefc/0x2ca0 fs/ioctl.c:46 ksys_ioctl fs/ioctl.c:713 [inline] __do_sys_ioctl fs/ioctl.c:720 [inline] __se_sys_ioctl+0x1da/0x270 fs/ioctl.c:718 __x64_sys_ioctl+0x4a/0x70 fs/ioctl.c:718 do_syscall_64+0xcf/0x110 arch/x86/entry/common.c:291 entry_SYSCALL_64_after_hwframe+0x63/0xe7 RIP: 0033:0x4573d7 Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f9ed60d6098 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 0000000000000018 RCX: 00000000004573d7 RDX: 00007f9ed60d66f0 RSI: 000000008138ae83 RDI: 0000000000000006 RBP: 0000000020017000 R08: 0000000000000001 R09: 0000000000000048 R10: 00007f9ed60d89d0 R11: 0000000000000246 R12: 00000000fec00000 R13: 00000000ffffffff R14: 00000000004d8ec0 R15: 00000000ffffffff Uninit was stored to memory at: kmsan_save_stack_with_flags mm/kmsan/kmsan.c:245 [inline] kmsan_save_stack mm/kmsan/kmsan.c:260 [inline] kmsan_internal_chain_origin+0x13d/0x240 mm/kmsan/kmsan.c:468 __msan_chain_origin+0x6d/0xb0 mm/kmsan/kmsan_instr.c:197 __get_sregs+0x976/0x1050 arch/x86/kvm/x86.c:8201 kvm_arch_vcpu_ioctl_get_sregs+0x71/0xb0 arch/x86/kvm/x86.c:8219 kvm_vcpu_ioctl+0x40e/0x1cc0 arch/x86/kvm/../../../virt/kvm/kvm_main.c:2636 do_vfs_ioctl+0xefc/0x2ca0 fs/ioctl.c:46 ksys_ioctl fs/ioctl.c:713 [inline] __do_sys_ioctl fs/ioctl.c:720 [inline] __se_sys_ioctl+0x1da/0x270 fs/ioctl.c:718 __x64_sys_ioctl+0x4a/0x70 fs/ioctl.c:718 do_syscall_64+0xcf/0x110 arch/x86/entry/common.c:291 entry_SYSCALL_64_after_hwframe+0x63/0xe7 Uninit was stored to memory at: kmsan_save_stack_with_flags mm/kmsan/kmsan.c:245 [inline] kmsan_save_stack mm/kmsan/kmsan.c:260 [inline] kmsan_internal_chain_origin+0x13d/0x240 mm/kmsan/kmsan.c:468 __msan_chain_origin+0x6d/0xb0 mm/kmsan/kmsan_instr.c:197 kvm_deliver_exception_payload arch/x86/kvm/x86.c:436 [inline] kvm_multiple_exception arch/x86/kvm/x86.c:499 [inline] kvm_queue_exception_e_p arch/x86/kvm/x86.c:554 [inline] kvm_inject_page_fault+0xbb6/0xef0 arch/x86/kvm/x86.c:578 nested_vmx_get_vmptr+0x36f/0x3d0 arch/x86/kvm/vmx.c:8264 handle_vmclear+0x4aa/0x14f0 arch/x86/kvm/vmx.c:8555 vmx_handle_exit+0x21bd/0xb980 arch/x86/kvm/vmx.c:10600 vcpu_enter_guest arch/x86/kvm/x86.c:7809 [inline] vcpu_run arch/x86/kvm/x86.c:7872 [inline] kvm_arch_vcpu_ioctl_run+0xaeee/0x12040 arch/x86/kvm/x86.c:8072 kvm_vcpu_ioctl+0xfe4/0x1cc0 arch/x86/kvm/../../../virt/kvm/kvm_main.c:2596 do_vfs_ioctl+0xefc/0x2ca0 fs/ioctl.c:46 ksys_ioctl fs/ioctl.c:713 [inline] __do_sys_ioctl fs/ioctl.c:720 [inline] __se_sys_ioctl+0x1da/0x270 fs/ioctl.c:718 __x64_sys_ioctl+0x4a/0x70 fs/ioctl.c:718 do_syscall_64+0xcf/0x110 arch/x86/entry/common.c:291 entry_SYSCALL_64_after_hwframe+0x63/0xe7 Local variable description: ----e@nested_vmx_get_vmptr Variable was created at: nested_vmx_get_vmptr+0xa5/0x3d0 arch/x86/kvm/vmx.c:8255 handle_vmclear+0x4aa/0x14f0 arch/x86/kvm/vmx.c:8555 Bytes 232-239 of 312 are uninitialized Memory access of size 312 starts at ffff8881327f4e00 Data copied to user address 00007f9ed60d66f0 ==================================================================