------------[ cut here ]------------ kernel BUG at mm/usercopy.c:102! invalid opcode: 0000 [#1] PREEMPT SMP KASAN CPU: 0 PID: 16906 Comm: syz-executor2 Not tainted 4.19.0-rc3+ #216 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:usercopy_abort+0xbb/0xbd mm/usercopy.c:90 Code: c0 e8 77 1c b2 ff 48 8b 55 c0 49 89 d9 4d 89 f0 ff 75 c8 4c 89 e1 4c 89 ee 48 c7 c7 80 49 35 88 ff 75 d0 41 57 e8 e7 30 98 ff <0f> 0b e8 4c 1c b2 ff e8 37 75 f5 ff 8b 95 e4 fe ff ff 4c 89 e1 31 RSP: 0018:ffff88019ae77570 EFLAGS: 00010286 RAX: 0000000000000067 RBX: ffffffff89253037 RCX: ffffc90003664000 RDX: 0000000000000000 RSI: ffffffff8164f955 RDI: 0000000000000005 RBP: ffff88019ae775c8 R08: ffff88019ce4a6c0 R09: ffffed003b5a4fe8 R10: ffffed003b5a4fe8 R11: ffff8801dad27f47 R12: ffffffff89257b55 R13: ffffffff88354860 R14: ffffffff88354720 R15: ffffffff883546e0 FS: 00007fdfe4d35700(0000) GS:ffff8801dac00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b32f23000 CR3: 00000001c2f35000 CR4: 00000000001406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: __check_heap_object+0xb5/0xb5 mm/slab.c:4445 check_heap_object mm/usercopy.c:238 [inline] __check_object_size+0x41b/0x782 mm/usercopy.c:266 check_object_size include/linux/thread_info.h:119 [inline] check_copy_size include/linux/thread_info.h:150 [inline] copy_to_iter include/linux/uio.h:103 [inline] skb_copy_datagram_iter+0x1ec/0xc10 net/core/datagram.c:431 kobject: 'loop3' (000000008d1a8a66): kobject_uevent_env skb_copy_datagram_msg include/linux/skbuff.h:3293 [inline] packet_recvmsg+0x2ed/0x16d0 net/packet/af_packet.c:3324 kobject: 'loop3' (000000008d1a8a66): fill_kobj_path: path = '/devices/virtual/block/loop3' sock_recvmsg_nosec net/socket.c:794 [inline] sock_recvmsg+0xd0/0x110 net/socket.c:801 ___sys_recvmsg+0x2b6/0x680 net/socket.c:2276 __sys_recvmsg+0x11a/0x280 net/socket.c:2325 kobject: 'loop3' (000000008d1a8a66): kobject_uevent_env kobject: 'loop3' (000000008d1a8a66): fill_kobj_path: path = '/devices/virtual/block/loop3' __do_sys_recvmsg net/socket.c:2335 [inline] __se_sys_recvmsg net/socket.c:2332 [inline] __x64_sys_recvmsg+0x78/0xb0 net/socket.c:2332 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x4572d9 Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007fdfe4d34c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f RAX: ffffffffffffffda RBX: 00007fdfe4d356d4 RCX: 00000000004572d9 RDX: 0000000000000060 RSI: 0000000020000a40 RDI: 0000000000000004 RBP: 0000000000930140 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff R13: 00000000004d4638 R14: 00000000004c8dd6 R15: 0000000000000001 Modules linked in: ---[ end trace 8ac3d08166f4476d ]--- kobject: 'loop0' (00000000fb67ad85): kobject_uevent_env RIP: 0010:usercopy_abort+0xbb/0xbd mm/usercopy.c:90 Code: c0 e8 77 1c b2 ff 48 8b 55 c0 49 89 d9 4d 89 f0 ff 75 c8 4c 89 e1 4c 89 ee 48 c7 c7 80 49 35 88 ff 75 d0 41 57 e8 e7 30 98 ff <0f> 0b e8 4c 1c b2 ff e8 37 75 f5 ff 8b 95 e4 fe ff ff 4c 89 e1 31 RSP: 0018:ffff88019ae77570 EFLAGS: 00010286 RAX: 0000000000000067 RBX: ffffffff89253037 RCX: ffffc90003664000 RDX: 0000000000000000 RSI: ffffffff8164f955 RDI: 0000000000000005 RBP: ffff88019ae775c8 R08: ffff88019ce4a6c0 R09: ffffed003b5a4fe8 R10: ffffed003b5a4fe8 R11: ffff8801dad27f47 R12: ffffffff89257b55 R13: ffffffff88354860 R14: ffffffff88354720 R15: ffffffff883546e0 FS: 00007fdfe4d35700(0000) GS:ffff8801dac00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b32c45000 CR3: 00000001c2f35000 CR4: 00000000001406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400