bisecting fixing commit since 9f31eb60d7a23536bf3902d4dc602f10c822b79e building syzkaller on 34bf9440bd06034f86b5d9ac8afbf078129cbdae testing commit 9f31eb60d7a23536bf3902d4dc602f10c822b79e compiler: gcc version 8.4.1 20210217 (GCC) kernel signature: becfdf4c183438fac9c4d033a207c79363d00b49d55832cf5e3a59a498accaaa run #0: crashed: KASAN: slab-out-of-bounds Read in scatterwalk_copychunks run #1: crashed: KASAN: slab-out-of-bounds Read in scatterwalk_copychunks run #2: crashed: general protection fault in scatterwalk_copychunks run #3: crashed: KASAN: slab-out-of-bounds Read in scatterwalk_copychunks run #4: crashed: KASAN: slab-out-of-bounds Read in scatterwalk_copychunks run #5: crashed: general protection fault in scatterwalk_copychunks run #6: crashed: KASAN: use-after-free Read in scatterwalk_copychunks run #7: crashed: general protection fault in scatterwalk_copychunks run #8: crashed: general protection fault in scatterwalk_copychunks run #9: crashed: general protection fault in scatterwalk_copychunks run #10: crashed: general protection fault in scatterwalk_copychunks run #11: crashed: general protection fault in scatterwalk_copychunks run #12: crashed: KASAN: slab-out-of-bounds Read in scatterwalk_copychunks run #13: crashed: KASAN: slab-out-of-bounds Read in scatterwalk_copychunks run #14: crashed: KASAN: slab-out-of-bounds Read in scatterwalk_copychunks run #15: crashed: general protection fault in scatterwalk_copychunks run #16: crashed: KASAN: slab-out-of-bounds Read in scatterwalk_copychunks run #17: crashed: general protection fault in scatterwalk_copychunks run #18: crashed: general protection fault in scatterwalk_copychunks run #19: crashed: KASAN: use-after-free Read in scatterwalk_copychunks testing current HEAD 2950c9c5e0df6bd34af45a5168bbee345e95eae2 testing commit 2950c9c5e0df6bd34af45a5168bbee345e95eae2 compiler: gcc version 8.4.1 20210217 (GCC) kernel signature: 540fc682266351e629b31ea2092ab31fcdcd31ce4cecf9fed61be5412f809d09 run #0: crashed: KASAN: slab-out-of-bounds Read in scatterwalk_copychunks run #1: crashed: general protection fault in scatterwalk_copychunks run #2: crashed: general protection fault in scatterwalk_copychunks run #3: crashed: KASAN: slab-out-of-bounds Read in scatterwalk_copychunks run #4: crashed: KASAN: use-after-free Read in scatterwalk_copychunks run #5: crashed: KASAN: slab-out-of-bounds Read in scatterwalk_copychunks run #6: crashed: KASAN: slab-out-of-bounds Read in scatterwalk_copychunks run #7: crashed: KASAN: slab-out-of-bounds Read in scatterwalk_copychunks run #8: crashed: KASAN: slab-out-of-bounds Read in scatterwalk_copychunks run #9: crashed: KASAN: slab-out-of-bounds Read in scatterwalk_copychunks revisions tested: 2, total time: 23m51.246032765s (build: 16m40.541129708s, test: 6m32.723398099s) the crash still happens on HEAD commit msg: Linux 4.19.207 crash: KASAN: slab-out-of-bounds Read in scatterwalk_copychunks R13: 00000000004f7150 R14: 00000000004b4af0 R15: 00007fa6ee3af6bc ================================================================== FAULT_INJECTION: forcing a failure. name fail_page_alloc, interval 1, probability 0, space 0, times 0 BUG: KASAN: slab-out-of-bounds in memcpy include/linux/string.h:377 [inline] BUG: KASAN: slab-out-of-bounds in memcpy_dir crypto/scatterwalk.c:28 [inline] BUG: KASAN: slab-out-of-bounds in scatterwalk_copychunks+0x1e1/0x610 crypto/scatterwalk.c:43 Read of size 4094 at addr ffff8881f30d5000 by task syz-executor.2/6817 CPU: 0 PID: 6817 Comm: syz-executor.2 Not tainted 4.19.207-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x123/0x171 lib/dump_stack.c:118 print_address_description.cold.8+0x9/0x1ff mm/kasan/report.c:256 kasan_report_error mm/kasan/report.c:354 [inline] kasan_report mm/kasan/report.c:412 [inline] kasan_report.cold.9+0x242/0x2fe mm/kasan/report.c:396 check_memory_region_inline mm/kasan/kasan.c:260 [inline] check_memory_region+0x13e/0x1b0 mm/kasan/kasan.c:267 memcpy+0x23/0x50 mm/kasan/kasan.c:302 memcpy include/linux/string.h:377 [inline] memcpy_dir crypto/scatterwalk.c:28 [inline] scatterwalk_copychunks+0x1e1/0x610 crypto/scatterwalk.c:43 scatterwalk_map_and_copy crypto/scatterwalk.c:72 [inline] scatterwalk_map_and_copy+0x128/0x190 crypto/scatterwalk.c:60 gcmaes_encrypt.constprop.15+0x6d6/0xda0 arch/x86/crypto/aesni-intel_glue.c:956 kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] PREEMPT SMP KASAN generic_gcmaes_encrypt+0xfd/0x150 arch/x86/crypto/aesni-intel_glue.c:1297 CPU: 1 PID: 6818 Comm: syz-executor.3 Not tainted 4.19.207-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:scatterwalk_start include/crypto/scatterwalk.h:73 [inline] RIP: 0010:scatterwalk_pagedone include/crypto/scatterwalk.h:98 [inline] RIP: 0010:scatterwalk_pagedone include/crypto/scatterwalk.h:82 [inline] RIP: 0010:scatterwalk_copychunks+0x379/0x610 crypto/scatterwalk.c:55 Code: ff ff 48 89 c7 e8 e7 60 2a 00 4c 89 f2 48 c1 ea 03 42 80 3c 3a 00 0f 85 a8 01 00 00 48 8d 70 08 49 89 06 48 89 f2 48 c1 ea 03 <42> 0f b6 14 3a 84 d2 74 09 80 fa 03 0f 8e 6b 01 00 00 48 8b 5d d0 crypto_aead_encrypt include/crypto/aead.h:337 [inline] gcmaes_wrapper_encrypt+0x109/0x180 arch/x86/crypto/aesni-intel_glue.c:1130 RSP: 0018:ffff8881c7a7f498 EFLAGS: 00010202 crypto_aead_encrypt include/crypto/aead.h:337 [inline] tls_do_encryption net/tls/tls_sw.c:193 [inline] tls_push_record+0x9ae/0x1600 net/tls/tls_sw.c:228 RAX: 0000000000000000 RBX: ffff8881d432644c RCX: 000000000000401e RDX: 0000000000000001 RSI: 0000000000000008 RDI: ffff8881d4326440 tls_sw_sendpage+0x462/0xc00 net/tls/tls_sw.c:585 RBP: ffff8881c7a7f4f8 R08: ffffed1038f5a804 R09: ffffed1038f5a800 R10: 0000000000000000 R11: ffff8881c7ad401d R12: 0000000000000fff inet_sendpage+0x122/0x600 net/ipv4/af_inet.c:815 R13: 000000000000001e R14: ffff8881c7a7f538 R15: dffffc0000000000 FS: 00007f3460703700(0000) GS:ffff8881f6900000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f525ee21000 CR3: 00000001dc66b005 CR4: 00000000001606e0 kernel_sendpage+0x60/0xd0 net/socket.c:3585 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: sock_sendpage+0x6d/0xd0 net/socket.c:912 scatterwalk_map_and_copy crypto/scatterwalk.c:72 [inline] scatterwalk_map_and_copy+0x128/0x190 crypto/scatterwalk.c:60 pipe_to_sendpage+0x212/0x430 fs/splice.c:452 gcmaes_encrypt.constprop.15+0x81b/0xda0 arch/x86/crypto/aesni-intel_glue.c:980 splice_from_pipe_feed fs/splice.c:503 [inline] __splice_from_pipe+0x2cb/0x720 fs/splice.c:627 splice_from_pipe+0xbb/0x120 fs/splice.c:662 generic_splice_sendpage+0x10/0x20 fs/splice.c:833 do_splice_from fs/splice.c:852 [inline] do_splice+0xa25/0x12b0 fs/splice.c:1154 __do_sys_splice fs/splice.c:1428 [inline] __se_sys_splice fs/splice.c:1408 [inline] __x64_sys_splice+0x248/0x300 fs/splice.c:1408 generic_gcmaes_encrypt+0xfd/0x150 arch/x86/crypto/aesni-intel_glue.c:1297 do_syscall_64+0xd0/0x4e0 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x460b89 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 crypto_aead_encrypt include/crypto/aead.h:337 [inline] gcmaes_wrapper_encrypt+0x109/0x180 arch/x86/crypto/aesni-intel_glue.c:1130 RSP: 002b:00007fc5cc78f1a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 crypto_aead_encrypt include/crypto/aead.h:337 [inline] tls_do_encryption net/tls/tls_sw.c:193 [inline] tls_push_record+0x9ae/0x1600 net/tls/tls_sw.c:228 RAX: ffffffffffffffda RBX: 000000000052bf00 RCX: 0000000000460b89 RDX: 0000000000000004 RSI: 0000000000000000 RDI: 0000000000000003 tls_sw_sendpage+0x462/0xc00 net/tls/tls_sw.c:585 RBP: 0000000000000001 R08: 0000000100000300 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 R13: 00000000004f7150 R14: 00000000004b4af0 R15: 00007fc5cc78f6bc inet_sendpage+0x122/0x600 net/ipv4/af_inet.c:815 Allocated by task 1: kernel_sendpage+0x60/0xd0 net/socket.c:3585 save_stack+0x43/0xd0 mm/kasan/kasan.c:448 set_track mm/kasan/kasan.c:460 [inline] kasan_kmalloc mm/kasan/kasan.c:553 [inline] kasan_kmalloc+0xc7/0xe0 mm/kasan/kasan.c:531 kasan_slab_alloc+0x12/0x20 mm/kasan/kasan.c:490 sock_sendpage+0x6d/0xd0 net/socket.c:912 kmem_cache_alloc+0x12e/0x720 mm/slab.c:3559 pipe_to_sendpage+0x212/0x430 fs/splice.c:452 kmem_cache_zalloc include/linux/slab.h:699 [inline] __kernfs_new_node+0xe7/0x6f0 fs/kernfs/dir.c:633 kernfs_new_node+0x62/0x110 fs/kernfs/dir.c:693 kernfs_create_link+0xb4/0x230 fs/kernfs/symlink.c:40 sysfs_do_create_link_sd.isra.2+0x7d/0xf0 fs/sysfs/symlink.c:43 splice_from_pipe_feed fs/splice.c:503 [inline] __splice_from_pipe+0x2cb/0x720 fs/splice.c:627 sysfs_do_create_link fs/sysfs/symlink.c:79 [inline] sysfs_create_link+0x43/0xb0 fs/sysfs/symlink.c:91 bus_add_device+0x1aa/0x4e0 drivers/base/bus.c:492 device_add+0x84e/0x1630 drivers/base/core.c:2142 acpi_device_add+0x510/0xf00 drivers/acpi/scan.c:727 splice_from_pipe+0xbb/0x120 fs/splice.c:662 acpi_add_single_object+0x6d3/0x16e0 drivers/acpi/scan.c:1682 acpi_bus_check_add+0x1a9/0x480 drivers/acpi/scan.c:1922 acpi_ns_walk_namespace+0x172/0x27f drivers/acpi/acpica/nswalk.c:237 generic_splice_sendpage+0x10/0x20 fs/splice.c:833 acpi_walk_namespace drivers/acpi/acpica/nsxfeval.c:606 [inline] acpi_walk_namespace+0x99/0xc6 drivers/acpi/acpica/nsxfeval.c:554 do_splice_from fs/splice.c:852 [inline] do_splice+0xa25/0x12b0 fs/splice.c:1154 acpi_bus_scan+0xcb/0xe0 drivers/acpi/scan.c:2103 acpi_scan_init+0x232/0x587 drivers/acpi/scan.c:2260 acpi_init+0x552/0x5e1 drivers/acpi/bus.c:1250 __do_sys_splice fs/splice.c:1428 [inline] __se_sys_splice fs/splice.c:1408 [inline] __x64_sys_splice+0x248/0x300 fs/splice.c:1408 do_one_initcall+0xbc/0x520 init/main.c:884 do_initcall_level init/main.c:952 [inline] do_initcalls init/main.c:960 [inline] do_basic_setup init/main.c:978 [inline] kernel_init_freeable+0x47e/0x522 init/main.c:1145 kernel_init+0xc/0x10f init/main.c:1062 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 Freed by task 0: (stack is not available) The buggy address belongs to the object at ffff8881f30d5000 which belongs to the cache kernfs_node_cache of size 160 The buggy address is located 0 bytes inside of 160-byte region [ffff8881f30d5000, ffff8881f30d50a0) The buggy address belongs to the page: page:ffffea0007cc3540 count:1 mapcount:0 mapping:ffff8881f6556600 index:0xffff8881f30d5fee do_syscall_64+0xd0/0x4e0 arch/x86/entry/common.c:293 flags: 0x2fffc0000000100(slab) entry_SYSCALL_64_after_hwframe+0x49/0xbe raw: 02fffc0000000100 ffffea0007cdab48 ffffea0007cc36c8 ffff8881f6556600 RIP: 0033:0x460b89 raw: ffff8881f30d5fee ffff8881f30d5000 0000000100000012 0000000000000000 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 page dumped because: kasan: bad access detected RSP: 002b:00007f34607031a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 RAX: ffffffffffffffda RBX: 000000000052bf00 RCX: 0000000000460b89 Memory state around the buggy address: RDX: 0000000000000004 RSI: 0000000000000000 RDI: 0000000000000003 ffff8881f30d4f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 RBP: 0000000000000001 R08: 0000000100000300 R09: 0000000000000000 ffff8881f30d5000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 >ffff8881f30d5080: 00 00 00 00 fc fc fc fc fc fc fc fc 00 00 00 00 R13: 00000000004f7150 R14: 00000000004b4af0 R15: 00007f34607036bc ^ Modules linked in: ffff8881f30d5100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 CPU: 1 PID: 6827 Comm: syz-executor.0 Tainted: G D 4.19.207-syzkaller #0 ffff8881f30d5180: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ================================================================== Call Trace: kasan: CONFIG_KASAN_INLINE enabled __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x123/0x171 lib/dump_stack.c:118 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold.4+0x5/0xa lib/fault-inject.c:149 should_fail_alloc_page mm/page_alloc.c:3088 [inline] prepare_alloc_pages mm/page_alloc.c:4346 [inline] __alloc_pages_nodemask+0x1d5/0x710 mm/page_alloc.c:4393 kasan: GPF could be caused by NULL-ptr deref or user memory access alloc_pages_current+0xd6/0x1b0 mm/mempolicy.c:2197 alloc_pages include/linux/gfp.h:532 [inline] skb_page_frag_refill+0x20b/0x400 net/core/sock.c:2220 sk_page_frag_refill+0x46/0x1d0 net/core/sock.c:2240 sk_alloc_sg+0x108/0x7d0 net/core/sock.c:2264 general protection fault: 0000 [#2] PREEMPT SMP KASAN alloc_encrypted_sg+0x81/0x100 net/tls/tls_sw.c:123 CPU: 0 PID: 6817 Comm: syz-executor.2 Tainted: G B D 4.19.207-syzkaller #0 tls_sw_sendpage+0x502/0xc00 net/tls/tls_sw.c:555 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:scatterwalk_start include/crypto/scatterwalk.h:73 [inline] RIP: 0010:scatterwalk_pagedone include/crypto/scatterwalk.h:98 [inline] RIP: 0010:scatterwalk_pagedone include/crypto/scatterwalk.h:82 [inline] RIP: 0010:scatterwalk_copychunks+0x379/0x610 crypto/scatterwalk.c:55 inet_sendpage+0x122/0x600 net/ipv4/af_inet.c:815 Code: ff ff 48 89 c7 e8 e7 60 2a 00 4c 89 f2 48 c1 ea 03 42 80 3c 3a 00 0f 85 a8 01 00 00 48 8d 70 08 49 89 06 48 89 f2 48 c1 ea 03 <42> 0f b6 14 3a 84 d2 74 09 80 fa 03 0f 8e 6b 01 00 00 48 8b 5d d0 RSP: 0018:ffff8881c87f7498 EFLAGS: 00010202 kernel_sendpage+0x60/0xd0 net/socket.c:3585 RAX: 0000000000000000 RBX: ffff8881f3ae0b4c RCX: 000000000000401e RDX: 0000000000000001 RSI: 0000000000000008 RDI: ffff8881f3ae0b40 RBP: ffff8881c87f74f8 R08: ffffed1038f51804 R09: ffffed1038f51800 R10: 0000000000000000 R11: ffff8881c7a8c01d R12: 0000000000000fff sock_sendpage+0x6d/0xd0 net/socket.c:912 R13: 000000000000001e R14: ffff8881c87f7538 R15: dffffc0000000000 pipe_to_sendpage+0x212/0x430 fs/splice.c:452 FS: 00007fc5cc78f700(0000) GS:ffff8881f6800000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000000052c071 CR3: 00000001d8507005 CR4: 00000000001606f0 splice_from_pipe_feed fs/splice.c:503 [inline] __splice_from_pipe+0x2cb/0x720 fs/splice.c:627 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: scatterwalk_map_and_copy crypto/scatterwalk.c:72 [inline] scatterwalk_map_and_copy+0x128/0x190 crypto/scatterwalk.c:60 splice_from_pipe+0xbb/0x120 fs/splice.c:662 generic_splice_sendpage+0x10/0x20 fs/splice.c:833 gcmaes_encrypt.constprop.15+0x81b/0xda0 arch/x86/crypto/aesni-intel_glue.c:980 do_splice_from fs/splice.c:852 [inline] do_splice+0xa25/0x12b0 fs/splice.c:1154 __do_sys_splice fs/splice.c:1428 [inline] __se_sys_splice fs/splice.c:1408 [inline] __x64_sys_splice+0x248/0x300 fs/splice.c:1408 do_syscall_64+0xd0/0x4e0 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x460b89 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f6d6da4e1a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 RAX: ffffffffffffffda RBX: 000000000052bfa8 RCX: 0000000000460b89 RDX: 0000000000000004 RSI: 0000000000000000 RDI: 0000000000000003 generic_gcmaes_encrypt+0xfd/0x150 arch/x86/crypto/aesni-intel_glue.c:1297 RBP: 0000000000000001 R08: 0000000100000300 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 R13: 00000000004f7150 R14: 00000000004b4af0 R15: 00007f6d6da4e6bc ---[ end trace d9ec84b70b3502d9 ]--- crypto_aead_encrypt include/crypto/aead.h:337 [inline] gcmaes_wrapper_encrypt+0x109/0x180 arch/x86/crypto/aesni-intel_glue.c:1130 crypto_aead_encrypt include/crypto/aead.h:337 [inline] tls_do_encryption net/tls/tls_sw.c:193 [inline] tls_push_record+0x9ae/0x1600 net/tls/tls_sw.c:228 tls_sw_sendpage+0x462/0xc00 net/tls/tls_sw.c:585 inet_sendpage+0x122/0x600 net/ipv4/af_inet.c:815 kernel_sendpage+0x60/0xd0 net/socket.c:3585 sock_sendpage+0x6d/0xd0 net/socket.c:912 pipe_to_sendpage+0x212/0x430 fs/splice.c:452 RIP: 0010:scatterwalk_start include/crypto/scatterwalk.h:73 [inline] RIP: 0010:scatterwalk_pagedone include/crypto/scatterwalk.h:98 [inline] RIP: 0010:scatterwalk_pagedone include/crypto/scatterwalk.h:82 [inline] RIP: 0010:scatterwalk_copychunks+0x379/0x610 crypto/scatterwalk.c:55 splice_from_pipe_feed fs/splice.c:503 [inline] __splice_from_pipe+0x2cb/0x720 fs/splice.c:627 splice_from_pipe+0xbb/0x120 fs/splice.c:662 generic_splice_sendpage+0x10/0x20 fs/splice.c:833 do_splice_from fs/splice.c:852 [inline] do_splice+0xa25/0x12b0 fs/splice.c:1154 Code: ff ff 48 89 c7 e8 e7 60 2a 00 4c 89 f2 48 c1 ea 03 42 80 3c 3a 00 0f 85 a8 01 00 00 48 8d 70 08 49 89 06 48 89 f2 48 c1 ea 03 <42> 0f b6 14 3a 84 d2 74 09 80 fa 03 0f 8e 6b 01 00 00 48 8b 5d d0 __do_sys_splice fs/splice.c:1428 [inline] __se_sys_splice fs/splice.c:1408 [inline] __x64_sys_splice+0x248/0x300 fs/splice.c:1408 RSP: 0018:ffff8881c7a7f498 EFLAGS: 00010202 do_syscall_64+0xd0/0x4e0 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x460b89 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fc5cc78f1a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 RAX: ffffffffffffffda RBX: 000000000052bf00 RCX: 0000000000460b89 RDX: 0000000000000004 RSI: 0000000000000000 RDI: 0000000000000003 RBP: 0000000000000001 R08: 0000000100000300 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 R13: 00000000004f7150 R14: 00000000004b4af0 R15: 00007fc5cc78f6bc Modules linked in: RAX: 0000000000000000 RBX: ffff8881d432644c RCX: 000000000000401e FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 RDX: 0000000000000001 RSI: 0000000000000008 RDI: ffff8881d4326440 CPU: 1 PID: 6837 Comm: syz-executor.1 Tainted: G B D 4.19.207-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RBP: ffff8881c7a7f4f8 R08: ffffed1038f5a804 R09: ffffed1038f5a800 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x123/0x171 lib/dump_stack.c:118 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold.4+0x5/0xa lib/fault-inject.c:149 __should_failslab+0xba/0xf0 mm/failslab.c:32 should_failslab+0x9/0x20 mm/slab_common.c:1590 R10: 0000000000000000 R11: ffff8881c7ad401d R12: 0000000000000fff slab_pre_alloc_hook mm/slab.h:424 [inline] slab_alloc mm/slab.c:3383 [inline] __do_kmalloc mm/slab.c:3725 [inline] __kmalloc+0x2dd/0x770 mm/slab.c:3736 kmalloc include/linux/slab.h:520 [inline] aead_request_alloc include/crypto/aead.h:427 [inline] tls_push_record+0xff/0x1600 net/tls/tls_sw.c:209 R13: 000000000000001e R14: ffff8881c7a7f538 R15: dffffc0000000000 tls_sw_sendpage+0x462/0xc00 net/tls/tls_sw.c:585 inet_sendpage+0x122/0x600 net/ipv4/af_inet.c:815 kernel_sendpage+0x60/0xd0 net/socket.c:3585 FS: 00007f3460703700(0000) GS:ffff8881f6800000(0000) knlGS:0000000000000000 sock_sendpage+0x6d/0xd0 net/socket.c:912 pipe_to_sendpage+0x212/0x430 fs/splice.c:452 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 splice_from_pipe_feed fs/splice.c:503 [inline] __splice_from_pipe+0x2cb/0x720 fs/splice.c:627 splice_from_pipe+0xbb/0x120 fs/splice.c:662 CR2: 000000000052c000 CR3: 00000001dc66b003 CR4: 00000000001606f0 generic_splice_sendpage+0x10/0x20 fs/splice.c:833 do_splice_from fs/splice.c:852 [inline] do_splice+0xa25/0x12b0 fs/splice.c:1154 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 __do_sys_splice fs/splice.c:1428 [inline] __se_sys_splice fs/splice.c:1408 [inline] __x64_sys_splice+0x248/0x300 fs/splice.c:1408 do_syscall_64+0xd0/0x4e0 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 RIP: 0033:0x460b89 ---------------- Code disassembly (best guess), 2 bytes skipped: 0: 48 89 c7 mov %rax,%rdi 3: e8 e7 60 2a 00 callq 0x2a60ef 8: 4c 89 f2 mov %r14,%rdx b: 48 c1 ea 03 shr $0x3,%rdx f: 42 80 3c 3a 00 cmpb $0x0,(%rdx,%r15,1) 14: 0f 85 a8 01 00 00 jne 0x1c2 1a: 48 8d 70 08 lea 0x8(%rax),%rsi 1e: 49 89 06 mov %rax,(%r14) 21: 48 89 f2 mov %rsi,%rdx 24: 48 c1 ea 03 shr $0x3,%rdx * 28: 42 0f b6 14 3a movzbl (%rdx,%r15,1),%edx <-- trapping instruction 2d: 84 d2 test %dl,%dl 2f: 74 09 je 0x3a 31: 80 fa 03 cmp $0x3,%dl 34: 0f 8e 6b 01 00 00 jle 0x1a5 3a: 48 8b 5d d0 mov -0x30(%rbp),%rbx