FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
BUG: GPF in non-whitelisted uaccess (non-canonical address?)
CPU: 1 PID: 15218 Comm: syz-executor2 Not tainted 4.20.0-rc2+ #118
kasan: CONFIG_KASAN_INLINE enabled
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x244/0x39d lib/dump_stack.c:113
 fail_dump lib/fault-inject.c:51 [inline]
 should_fail.cold.4+0xa/0x17 lib/fault-inject.c:149
 __should_failslab+0x124/0x180 mm/failslab.c:32
 should_failslab+0x9/0x14 mm/slab_common.c:1578
 slab_pre_alloc_hook mm/slab.h:423 [inline]
 slab_alloc mm/slab.c:3378 [inline]
 kmem_cache_alloc+0x2be/0x730 mm/slab.c:3552
 kmem_cache_zalloc include/linux/slab.h:731 [inline]
 inode_alloc_security security/selinux/hooks.c:255 [inline]
 selinux_inode_alloc_security+0x107/0x3a0 security/selinux/hooks.c:2982
 security_inode_alloc+0x73/0xd0 security/security.c:459
 inode_init_always+0x68f/0xd80 fs/inode.c:168
 alloc_inode+0x80/0x190 fs/inode.c:217
 new_inode_pseudo+0x71/0x1a0 fs/inode.c:903
 new_inode+0x1c/0x40 fs/inode.c:932
 proc_pid_make_inode+0x23/0x210 fs/proc/base.c:1739
 proc_ns_instantiate+0x5a/0x100 fs/proc/namespaces.c:97
 proc_ns_dir_lookup+0x1c1/0x220 fs/proc/namespaces.c:164
 __lookup_slow+0x2b5/0x540 fs/namei.c:1671
 lookup_slow+0x57/0x80 fs/namei.c:1688
 walk_component+0x92b/0x2590 fs/namei.c:1810
 link_path_walk.part.40+0xa61/0x1530 fs/namei.c:2141
 link_path_walk fs/namei.c:2072 [inline]
 path_openat+0x270/0x5150 fs/namei.c:3533
 do_filp_open+0x255/0x380 fs/namei.c:3564
 do_sys_open+0x568/0x700 fs/open.c:1063
 __do_sys_open fs/open.c:1081 [inline]
 __se_sys_open fs/open.c:1076 [inline]
 __x64_sys_open+0x7e/0xc0 fs/open.c:1076
 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x4111a1
Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01
RSP: 002b:00007f849d0b9bb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002
RAX: ffffffffffffffda RBX: 00007f849d0b9c90 RCX: 00000000004111a1
RDX: 00007f849d0b9bf7 RSI: 0000000000000002 RDI: 00007f849d0b9bd0
RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000027
R10: 0000000000000015 R11: 0000000000000293 R12: 00007f849d0ba6d4
R13: 00000000004c51bc R14: 00000000004d89d0 R15: 0000000000000003
kasan: GPF could be caused by NULL-ptr deref or user memory access
general protection fault: 0000 [#1] PREEMPT SMP KASAN
CPU: 1 PID: 15225 Comm: syz-executor3 Not tainted 4.20.0-rc2+ #118
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:copy_user_generic_unrolled+0x86/0xc0 arch/x86/lib/copy_user_64.S:65
Code: 4c 8b 5e 38 4c 89 47 20 4c 89 4f 28 4c 89 57 30 4c 89 5f 38 48 8d 76 40 48 8d 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 <4c> 8b 06 4c 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10
kobject: 'loop4' (00000000e70e4ceb): kobject_uevent_env
RSP: 0018:ffff888176c97398 EFLAGS: 00010206
RAX: ffffed102fd4b4a6 RBX: 0000000000000031 RCX: 0000000000000006
RDX: 0000000000000001 RSI: 7a79730000000000 RDI: ffff88817ea5a4f8
RBP: ffff888176c973d0 R08: ffffed102fd4b4a6 R09: ffffed102fd4b49f
R10: ffffed102fd4b4a5 R11: ffff88817ea5a528 R12: 7a79730000000031
R13: 7a79730000000000 R14: ffff88817ea5a4f8 R15: ffffffffffffffff
FS:  00007f54d248a700(0000) GS:ffff8881daf00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
kobject: 'loop4' (00000000e70e4ceb): fill_kobj_path: path = '/devices/virtual/block/loop4'
CR2: 0000000000000001 CR3: 00000001bce4d000 CR4: 00000000001426e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 copy_from_user include/linux/uaccess.h:147 [inline]
 uhid_dev_create+0x20c/0xb40 drivers/hid/uhid.c:542
kobject: 'loop5' (00000000991654b3): kobject_uevent_env
kobject: 'loop5' (00000000991654b3): fill_kobj_path: path = '/devices/virtual/block/loop5'
 uhid_char_write+0xc74/0xef0 drivers/hid/uhid.c:725
 __vfs_write+0x119/0x9f0 fs/read_write.c:485
kobject: 'loop0' (000000008796d3c1): kobject_uevent_env
kobject: 'loop0' (000000008796d3c1): fill_kobj_path: path = '/devices/virtual/block/loop0'
 __kernel_write+0x10c/0x370 fs/read_write.c:506
 write_pipe_buf+0x180/0x240 fs/splice.c:797
 splice_from_pipe_feed fs/splice.c:503 [inline]
 __splice_from_pipe+0x38b/0x7c0 fs/splice.c:627
 splice_from_pipe+0x1ec/0x340 fs/splice.c:662
kobject: 'loop0' (000000008796d3c1): kobject_uevent_env
 default_file_splice_write+0x3c/0x90 fs/splice.c:809
kobject: 'loop0' (000000008796d3c1): fill_kobj_path: path = '/devices/virtual/block/loop0'
 do_splice_from fs/splice.c:851 [inline]
 direct_splice_actor+0x128/0x190 fs/splice.c:1018
 splice_direct_to_actor+0x318/0x8f0 fs/splice.c:973
 do_splice_direct+0x2d4/0x420 fs/splice.c:1061
 do_sendfile+0x62a/0xe20 fs/read_write.c:1439
 __do_sys_sendfile64 fs/read_write.c:1494 [inline]
 __se_sys_sendfile64 fs/read_write.c:1486 [inline]
 __x64_sys_sendfile64+0x15d/0x250 fs/read_write.c:1486
 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x457569
Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00
RSP: 002b:00007f54d2489c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028
RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000457569
RDX: 0000000020d83ff8 RSI: 0000000000000004 RDI: 0000000000000005
RBP: 000000000072c040 R08: 0000000000000000 R09: 0000000000000000
R10: 00008000fffffffe R11: 0000000000000246 R12: 00007f54d248a6d4
R13: 00000000004c37cc R14: 00000000004d5958 R15: 00000000ffffffff
Modules linked in:
---[ end trace 6285c7881b54487d ]---
RIP: 0010:copy_user_generic_unrolled+0x86/0xc0 arch/x86/lib/copy_user_64.S:65
Code: 4c 8b 5e 38 4c 89 47 20 4c 89 4f 28 4c 89 57 30 4c 89 5f 38 48 8d 76 40 48 8d 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 <4c> 8b 06 4c 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10
kobject: 'loop2' (00000000785426f9): kobject_uevent_env
RSP: 0018:ffff888176c97398 EFLAGS: 00010206
kobject: 'loop2' (00000000785426f9): fill_kobj_path: path = '/devices/virtual/block/loop2'
RAX: ffffed102fd4b4a6 RBX: 0000000000000031 RCX: 0000000000000006
RDX: 0000000000000001 RSI: 7a79730000000000 RDI: ffff88817ea5a4f8
RBP: ffff888176c973d0 R08: ffffed102fd4b4a6 R09: ffffed102fd4b49f
R10: ffffed102fd4b4a5 R11: ffff88817ea5a528 R12: 7a79730000000031
R13: 7a79730000000000 R14: ffff88817ea5a4f8 R15: ffffffffffffffff
FS:  00007f54d248a700(0000) GS:ffff8881dae00000(0000) knlGS:0000000000000000
kobject: 'loop0' (000000008796d3c1): kobject_uevent_env
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
kobject: 'loop0' (000000008796d3c1): fill_kobj_path: path = '/devices/virtual/block/loop0'
CR2: 00007fde29b35000 CR3: 00000001bce4d000 CR4: 00000000001426f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400