FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 BUG: GPF in non-whitelisted uaccess (non-canonical address?) CPU: 1 PID: 15218 Comm: syz-executor2 Not tainted 4.20.0-rc2+ #118 kasan: CONFIG_KASAN_INLINE enabled Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x244/0x39d lib/dump_stack.c:113 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold.4+0xa/0x17 lib/fault-inject.c:149 __should_failslab+0x124/0x180 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1578 slab_pre_alloc_hook mm/slab.h:423 [inline] slab_alloc mm/slab.c:3378 [inline] kmem_cache_alloc+0x2be/0x730 mm/slab.c:3552 kmem_cache_zalloc include/linux/slab.h:731 [inline] inode_alloc_security security/selinux/hooks.c:255 [inline] selinux_inode_alloc_security+0x107/0x3a0 security/selinux/hooks.c:2982 security_inode_alloc+0x73/0xd0 security/security.c:459 inode_init_always+0x68f/0xd80 fs/inode.c:168 alloc_inode+0x80/0x190 fs/inode.c:217 new_inode_pseudo+0x71/0x1a0 fs/inode.c:903 new_inode+0x1c/0x40 fs/inode.c:932 proc_pid_make_inode+0x23/0x210 fs/proc/base.c:1739 proc_ns_instantiate+0x5a/0x100 fs/proc/namespaces.c:97 proc_ns_dir_lookup+0x1c1/0x220 fs/proc/namespaces.c:164 __lookup_slow+0x2b5/0x540 fs/namei.c:1671 lookup_slow+0x57/0x80 fs/namei.c:1688 walk_component+0x92b/0x2590 fs/namei.c:1810 link_path_walk.part.40+0xa61/0x1530 fs/namei.c:2141 link_path_walk fs/namei.c:2072 [inline] path_openat+0x270/0x5150 fs/namei.c:3533 do_filp_open+0x255/0x380 fs/namei.c:3564 do_sys_open+0x568/0x700 fs/open.c:1063 __do_sys_open fs/open.c:1081 [inline] __se_sys_open fs/open.c:1076 [inline] __x64_sys_open+0x7e/0xc0 fs/open.c:1076 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x4111a1 Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 RSP: 002b:00007f849d0b9bb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 RAX: ffffffffffffffda RBX: 00007f849d0b9c90 RCX: 00000000004111a1 RDX: 00007f849d0b9bf7 RSI: 0000000000000002 RDI: 00007f849d0b9bd0 RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000027 R10: 0000000000000015 R11: 0000000000000293 R12: 00007f849d0ba6d4 R13: 00000000004c51bc R14: 00000000004d89d0 R15: 0000000000000003 kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] PREEMPT SMP KASAN CPU: 1 PID: 15225 Comm: syz-executor3 Not tainted 4.20.0-rc2+ #118 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:copy_user_generic_unrolled+0x86/0xc0 arch/x86/lib/copy_user_64.S:65 Code: 4c 8b 5e 38 4c 89 47 20 4c 89 4f 28 4c 89 57 30 4c 89 5f 38 48 8d 76 40 48 8d 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 <4c> 8b 06 4c 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 kobject: 'loop4' (00000000e70e4ceb): kobject_uevent_env RSP: 0018:ffff888176c97398 EFLAGS: 00010206 RAX: ffffed102fd4b4a6 RBX: 0000000000000031 RCX: 0000000000000006 RDX: 0000000000000001 RSI: 7a79730000000000 RDI: ffff88817ea5a4f8 RBP: ffff888176c973d0 R08: ffffed102fd4b4a6 R09: ffffed102fd4b49f R10: ffffed102fd4b4a5 R11: ffff88817ea5a528 R12: 7a79730000000031 R13: 7a79730000000000 R14: ffff88817ea5a4f8 R15: ffffffffffffffff FS: 00007f54d248a700(0000) GS:ffff8881daf00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 kobject: 'loop4' (00000000e70e4ceb): fill_kobj_path: path = '/devices/virtual/block/loop4' CR2: 0000000000000001 CR3: 00000001bce4d000 CR4: 00000000001426e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: copy_from_user include/linux/uaccess.h:147 [inline] uhid_dev_create+0x20c/0xb40 drivers/hid/uhid.c:542 kobject: 'loop5' (00000000991654b3): kobject_uevent_env kobject: 'loop5' (00000000991654b3): fill_kobj_path: path = '/devices/virtual/block/loop5' uhid_char_write+0xc74/0xef0 drivers/hid/uhid.c:725 __vfs_write+0x119/0x9f0 fs/read_write.c:485 kobject: 'loop0' (000000008796d3c1): kobject_uevent_env kobject: 'loop0' (000000008796d3c1): fill_kobj_path: path = '/devices/virtual/block/loop0' __kernel_write+0x10c/0x370 fs/read_write.c:506 write_pipe_buf+0x180/0x240 fs/splice.c:797 splice_from_pipe_feed fs/splice.c:503 [inline] __splice_from_pipe+0x38b/0x7c0 fs/splice.c:627 splice_from_pipe+0x1ec/0x340 fs/splice.c:662 kobject: 'loop0' (000000008796d3c1): kobject_uevent_env default_file_splice_write+0x3c/0x90 fs/splice.c:809 kobject: 'loop0' (000000008796d3c1): fill_kobj_path: path = '/devices/virtual/block/loop0' do_splice_from fs/splice.c:851 [inline] direct_splice_actor+0x128/0x190 fs/splice.c:1018 splice_direct_to_actor+0x318/0x8f0 fs/splice.c:973 do_splice_direct+0x2d4/0x420 fs/splice.c:1061 do_sendfile+0x62a/0xe20 fs/read_write.c:1439 __do_sys_sendfile64 fs/read_write.c:1494 [inline] __se_sys_sendfile64 fs/read_write.c:1486 [inline] __x64_sys_sendfile64+0x15d/0x250 fs/read_write.c:1486 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457569 Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f54d2489c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000457569 RDX: 0000000020d83ff8 RSI: 0000000000000004 RDI: 0000000000000005 RBP: 000000000072c040 R08: 0000000000000000 R09: 0000000000000000 R10: 00008000fffffffe R11: 0000000000000246 R12: 00007f54d248a6d4 R13: 00000000004c37cc R14: 00000000004d5958 R15: 00000000ffffffff Modules linked in: ---[ end trace 6285c7881b54487d ]--- RIP: 0010:copy_user_generic_unrolled+0x86/0xc0 arch/x86/lib/copy_user_64.S:65 Code: 4c 8b 5e 38 4c 89 47 20 4c 89 4f 28 4c 89 57 30 4c 89 5f 38 48 8d 76 40 48 8d 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 <4c> 8b 06 4c 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 kobject: 'loop2' (00000000785426f9): kobject_uevent_env RSP: 0018:ffff888176c97398 EFLAGS: 00010206 kobject: 'loop2' (00000000785426f9): fill_kobj_path: path = '/devices/virtual/block/loop2' RAX: ffffed102fd4b4a6 RBX: 0000000000000031 RCX: 0000000000000006 RDX: 0000000000000001 RSI: 7a79730000000000 RDI: ffff88817ea5a4f8 RBP: ffff888176c973d0 R08: ffffed102fd4b4a6 R09: ffffed102fd4b49f R10: ffffed102fd4b4a5 R11: ffff88817ea5a528 R12: 7a79730000000031 R13: 7a79730000000000 R14: ffff88817ea5a4f8 R15: ffffffffffffffff FS: 00007f54d248a700(0000) GS:ffff8881dae00000(0000) knlGS:0000000000000000 kobject: 'loop0' (000000008796d3c1): kobject_uevent_env CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 kobject: 'loop0' (000000008796d3c1): fill_kobj_path: path = '/devices/virtual/block/loop0' CR2: 00007fde29b35000 CR3: 00000001bce4d000 CR4: 00000000001426f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400