bisecting fixing commit since 9f31eb60d7a23536bf3902d4dc602f10c822b79e building syzkaller on 34bf9440bd06034f86b5d9ac8afbf078129cbdae testing commit 9f31eb60d7a23536bf3902d4dc602f10c822b79e compiler: gcc version 8.4.1 20210217 (GCC) kernel signature: becfdf4c183438fac9c4d033a207c79363d00b49d55832cf5e3a59a498accaaa run #0: crashed: general protection fault in scatterwalk_copychunks run #1: crashed: KASAN: slab-out-of-bounds Read in scatterwalk_copychunks run #2: crashed: general protection fault in scatterwalk_copychunks run #3: crashed: KASAN: slab-out-of-bounds Read in scatterwalk_copychunks run #4: crashed: KASAN: slab-out-of-bounds Read in scatterwalk_copychunks run #5: crashed: general protection fault in scatterwalk_copychunks run #6: crashed: general protection fault in corrupted run #7: crashed: general protection fault in scatterwalk_copychunks run #8: crashed: KASAN: slab-out-of-bounds Read in scatterwalk_copychunks run #9: crashed: KASAN: slab-out-of-bounds Read in scatterwalk_copychunks run #10: crashed: KASAN: slab-out-of-bounds Read in scatterwalk_copychunks run #11: crashed: general protection fault in scatterwalk_copychunks run #12: crashed: KASAN: slab-out-of-bounds Read in scatterwalk_copychunks run #13: crashed: KASAN: use-after-free Read in scatterwalk_copychunks run #14: crashed: KASAN: use-after-free Read in scatterwalk_copychunks run #15: crashed: general protection fault in scatterwalk_copychunks run #16: crashed: KASAN: slab-out-of-bounds Read in scatterwalk_copychunks run #17: crashed: general protection fault in scatterwalk_copychunks run #18: crashed: general protection fault in scatterwalk_copychunks run #19: crashed: general protection fault in scatterwalk_copychunks testing current HEAD 59456c9cc40c8f75b5a7efa0fe1f211d9c6fcaf1 testing commit 59456c9cc40c8f75b5a7efa0fe1f211d9c6fcaf1 compiler: gcc version 8.4.1 20210217 (GCC) kernel signature: e95eea07eccf8eebd3c0d34abb2e352bb9741113757a2f0eaed572b36e73136e run #0: crashed: KASAN: slab-out-of-bounds Read in scatterwalk_copychunks run #1: crashed: KASAN: slab-out-of-bounds Read in scatterwalk_copychunks run #2: crashed: KASAN: slab-out-of-bounds Read in scatterwalk_copychunks run #3: crashed: general protection fault in scatterwalk_copychunks run #4: crashed: general protection fault in scatterwalk_copychunks run #5: crashed: general protection fault in scatterwalk_copychunks run #6: crashed: general protection fault in scatterwalk_copychunks run #7: crashed: KASAN: slab-out-of-bounds Read in scatterwalk_copychunks run #8: crashed: KASAN: slab-out-of-bounds Read in scatterwalk_copychunks run #9: crashed: KASAN: slab-out-of-bounds Read in scatterwalk_copychunks revisions tested: 2, total time: 31m9.33944772s (build: 23m45.445325092s, test: 6m44.086700424s) the crash still happens on HEAD commit msg: Linux 4.19.204 crash: KASAN: slab-out-of-bounds Read in scatterwalk_copychunks RDX: 0000000000000004 RSI: 0000000000000000 RDI: 0000000000000003 RBP: 0000000000000001 R08: 0000000100000300 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 R13: 00000000004f7150 R14: 00000000004b4af0 R15: 00007f0e08e516bc ================================================================== BUG: KASAN: slab-out-of-bounds in memcpy include/linux/string.h:377 [inline] BUG: KASAN: slab-out-of-bounds in memcpy_dir crypto/scatterwalk.c:28 [inline] BUG: KASAN: slab-out-of-bounds in scatterwalk_copychunks+0x1e1/0x610 crypto/scatterwalk.c:43 CPU: 0 PID: 6898 Comm: syz-executor.0 Not tainted 4.19.204-syzkaller #0 Read of size 4094 at addr ffff8881ece0a000 by task syz-executor.5/6900 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x123/0x171 lib/dump_stack.c:118 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold.4+0x5/0xa lib/fault-inject.c:149 __should_failslab+0xba/0xf0 mm/failslab.c:32 should_failslab+0x9/0x20 mm/slab_common.c:1590 slab_pre_alloc_hook mm/slab.h:424 [inline] slab_alloc mm/slab.c:3383 [inline] __do_kmalloc mm/slab.c:3725 [inline] __kmalloc+0x2dd/0x770 mm/slab.c:3736 kmalloc include/linux/slab.h:520 [inline] aead_request_alloc include/crypto/aead.h:427 [inline] tls_push_record+0xff/0x1600 net/tls/tls_sw.c:209 tls_sw_sendpage+0x462/0xc00 net/tls/tls_sw.c:585 inet_sendpage+0x122/0x600 net/ipv4/af_inet.c:815 kernel_sendpage+0x60/0xd0 net/socket.c:3581 sock_sendpage+0x6d/0xd0 net/socket.c:912 pipe_to_sendpage+0x212/0x430 fs/splice.c:452 splice_from_pipe_feed fs/splice.c:503 [inline] __splice_from_pipe+0x2cb/0x720 fs/splice.c:627 splice_from_pipe+0xbb/0x120 fs/splice.c:662 generic_splice_sendpage+0x10/0x20 fs/splice.c:833 do_splice_from fs/splice.c:852 [inline] do_splice+0xa25/0x12b0 fs/splice.c:1154 __do_sys_splice fs/splice.c:1428 [inline] __se_sys_splice fs/splice.c:1408 [inline] __x64_sys_splice+0x248/0x300 fs/splice.c:1408 do_syscall_64+0xd0/0x4e0 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x460b89 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f2678f1f1a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 RAX: ffffffffffffffda RBX: 000000000052bf00 RCX: 0000000000460b89 RDX: 0000000000000004 RSI: 0000000000000000 RDI: 0000000000000003 RBP: 0000000000000001 R08: 0000000100000300 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 R13: 00000000004f7150 R14: 00000000004b4af0 R15: 00007f2678f1f6bc CPU: 1 PID: 6900 Comm: syz-executor.5 Not tainted 4.19.204-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x123/0x171 lib/dump_stack.c:118 print_address_description.cold.8+0x9/0x1ff mm/kasan/report.c:256 kasan_report_error mm/kasan/report.c:354 [inline] kasan_report mm/kasan/report.c:412 [inline] kasan_report.cold.9+0x242/0x2fe mm/kasan/report.c:396 check_memory_region_inline mm/kasan/kasan.c:260 [inline] check_memory_region+0x13e/0x1b0 mm/kasan/kasan.c:267 memcpy+0x23/0x50 mm/kasan/kasan.c:302 memcpy include/linux/string.h:377 [inline] memcpy_dir crypto/scatterwalk.c:28 [inline] scatterwalk_copychunks+0x1e1/0x610 crypto/scatterwalk.c:43 scatterwalk_map_and_copy crypto/scatterwalk.c:72 [inline] scatterwalk_map_and_copy+0x128/0x190 crypto/scatterwalk.c:60 gcmaes_encrypt.constprop.15+0x6d6/0xda0 arch/x86/crypto/aesni-intel_glue.c:956 generic_gcmaes_encrypt+0xfd/0x150 arch/x86/crypto/aesni-intel_glue.c:1297 crypto_aead_encrypt include/crypto/aead.h:337 [inline] gcmaes_wrapper_encrypt+0x109/0x180 arch/x86/crypto/aesni-intel_glue.c:1130 crypto_aead_encrypt include/crypto/aead.h:337 [inline] tls_do_encryption net/tls/tls_sw.c:193 [inline] tls_push_record+0x9ae/0x1600 net/tls/tls_sw.c:228 tls_sw_sendpage+0x462/0xc00 net/tls/tls_sw.c:585 inet_sendpage+0x122/0x600 net/ipv4/af_inet.c:815 kernel_sendpage+0x60/0xd0 net/socket.c:3581 sock_sendpage+0x6d/0xd0 net/socket.c:912 pipe_to_sendpage+0x212/0x430 fs/splice.c:452 splice_from_pipe_feed fs/splice.c:503 [inline] __splice_from_pipe+0x2cb/0x720 fs/splice.c:627 splice_from_pipe+0xbb/0x120 fs/splice.c:662 generic_splice_sendpage+0x10/0x20 fs/splice.c:833 do_splice_from fs/splice.c:852 [inline] do_splice+0xa25/0x12b0 fs/splice.c:1154 __do_sys_splice fs/splice.c:1428 [inline] __se_sys_splice fs/splice.c:1408 [inline] __x64_sys_splice+0x248/0x300 fs/splice.c:1408 do_syscall_64+0xd0/0x4e0 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x460b89 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fc46bb551a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 RAX: ffffffffffffffda RBX: 000000000052bf00 RCX: 0000000000460b89 RDX: 0000000000000004 RSI: 0000000000000000 RDI: 0000000000000003 RBP: 0000000000000001 R08: 0000000100000300 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 R13: 00000000004f7150 R14: 00000000004b4af0 R15: 00007fc46bb556bc Allocated by task 5619: save_stack+0x43/0xd0 mm/kasan/kasan.c:448 set_track mm/kasan/kasan.c:460 [inline] kasan_kmalloc mm/kasan/kasan.c:553 [inline] kasan_kmalloc+0xc7/0xe0 mm/kasan/kasan.c:531 kasan_slab_alloc+0x12/0x20 mm/kasan/kasan.c:490 kmem_cache_alloc+0x12e/0x720 mm/slab.c:3559 kmem_cache_zalloc include/linux/slab.h:699 [inline] __kernfs_new_node+0xe7/0x6f0 fs/kernfs/dir.c:633 kernfs_new_node+0x62/0x110 fs/kernfs/dir.c:693 __kernfs_create_file+0x35/0x2e0 fs/kernfs/file.c:992 sysfs_add_file_mode_ns+0x1b0/0x4e0 fs/sysfs/file.c:307 create_files fs/sysfs/group.c:63 [inline] internal_create_group+0x2d0/0xaf0 fs/sysfs/group.c:147 sysfs_create_group fs/sysfs/group.c:173 [inline] sysfs_create_groups fs/sysfs/group.c:200 [inline] sysfs_create_groups+0x81/0x110 fs/sysfs/group.c:190 device_add_groups drivers/base/core.c:1301 [inline] device_add_attrs drivers/base/core.c:1460 [inline] device_add+0x109b/0x1630 drivers/base/core.c:2138 netdev_register_kobject+0x16a/0x360 net/core/net-sysfs.c:1806 register_netdevice+0x6f4/0xf10 net/core/dev.c:8730 veth_newlink+0x4a9/0x950 drivers/net/veth.c:1169 rtnl_newlink+0xcf5/0x1340 net/core/rtnetlink.c:3141 rtnetlink_rcv_msg+0x34f/0x8f0 net/core/rtnetlink.c:4782 netlink_rcv_skb+0x13e/0x3d0 net/netlink/af_netlink.c:2457 rtnetlink_rcv+0x10/0x20 net/core/rtnetlink.c:4800 netlink_unicast_kernel net/netlink/af_netlink.c:1320 [inline] netlink_unicast+0x445/0x640 net/netlink/af_netlink.c:1346 netlink_sendmsg+0x764/0xc70 net/netlink/af_netlink.c:1911 sock_sendmsg_nosec net/socket.c:651 [inline] sock_sendmsg+0xb5/0xf0 net/socket.c:661 __sys_sendto+0x1f2/0x2e0 net/socket.c:1897 __do_sys_sendto net/socket.c:1909 [inline] __se_sys_sendto net/socket.c:1905 [inline] __x64_sys_sendto+0xdc/0x1a0 net/socket.c:1905 do_syscall_64+0xd0/0x4e0 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe Freed by task 0: (stack is not available) The buggy address belongs to the object at ffff8881ece0a000 which belongs to the cache kernfs_node_cache of size 160 The buggy address is located 0 bytes inside of 160-byte region [ffff8881ece0a000, ffff8881ece0a0a0) The buggy address belongs to the page: page:ffffea0007b38280 count:1 mapcount:0 mapping:ffff8881f6554600 index:0xffff8881ece0afee flags: 0x2fffc0000000100(slab) raw: 02fffc0000000100 ffffea0007b89a08 ffffea0007b89ac8 ffff8881f6554600 raw: ffff8881ece0afee ffff8881ece0a000 0000000100000012 0000000000000000 page dumped because: kasan: bad access detected Memory state around the buggy address: ffff8881ece09f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff8881ece0a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffff8881ece0a080: 00 00 00 00 fc fc fc fc fc fc fc fc 00 00 00 00 ^ ffff8881ece0a100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff8881ece0a180: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 ================================================================== CPU: 0 PID: 6895 Comm: syz-executor.2 Tainted: G B 4.19.204-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x123/0x171 lib/dump_stack.c:118 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold.4+0x5/0xa lib/fault-inject.c:149 __should_failslab+0xba/0xf0 mm/failslab.c:32 should_failslab+0x9/0x20 mm/slab_common.c:1590 slab_pre_alloc_hook mm/slab.h:424 [inline] slab_alloc mm/slab.c:3383 [inline] __do_kmalloc mm/slab.c:3725 [inline] __kmalloc+0x2dd/0x770 mm/slab.c:3736 kmalloc include/linux/slab.h:520 [inline] aead_request_alloc include/crypto/aead.h:427 [inline] tls_push_record+0xff/0x1600 net/tls/tls_sw.c:209 kasan: CONFIG_KASAN_INLINE enabled tls_sw_sendpage+0x462/0xc00 net/tls/tls_sw.c:585 kasan: GPF could be caused by NULL-ptr deref or user memory access inet_sendpage+0x122/0x600 net/ipv4/af_inet.c:815 kernel_sendpage+0x60/0xd0 net/socket.c:3581 sock_sendpage+0x6d/0xd0 net/socket.c:912 pipe_to_sendpage+0x212/0x430 fs/splice.c:452 splice_from_pipe_feed fs/splice.c:503 [inline] __splice_from_pipe+0x2cb/0x720 fs/splice.c:627 general protection fault: 0000 [#1] PREEMPT SMP KASAN CPU: 1 PID: 6900 Comm: syz-executor.5 Tainted: G B 4.19.204-syzkaller #0 splice_from_pipe+0xbb/0x120 fs/splice.c:662 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:scatterwalk_start include/crypto/scatterwalk.h:73 [inline] RIP: 0010:scatterwalk_pagedone include/crypto/scatterwalk.h:98 [inline] RIP: 0010:scatterwalk_pagedone include/crypto/scatterwalk.h:82 [inline] RIP: 0010:scatterwalk_copychunks+0x379/0x610 crypto/scatterwalk.c:55 Code: ff ff 48 89 c7 e8 a7 60 2a 00 4c 89 f2 48 c1 ea 03 42 80 3c 3a 00 0f 85 a8 01 00 00 48 8d 70 08 49 89 06 48 89 f2 48 c1 ea 03 <42> 0f b6 14 3a 84 d2 74 09 80 fa 03 0f 8e 6b 01 00 00 48 8b 5d d0 generic_splice_sendpage+0x10/0x20 fs/splice.c:833 RSP: 0018:ffff8881c6b87498 EFLAGS: 00010202 do_splice_from fs/splice.c:852 [inline] do_splice+0xa25/0x12b0 fs/splice.c:1154 RAX: 0000000000000000 RBX: ffff8881e29b10cc RCX: 000000000000401e RDX: 0000000000000001 RSI: 0000000000000008 RDI: ffff8881e29b10c0 RBP: ffff8881c6b874f8 R08: ffffed1038d7a804 R09: ffffed1038d7a800 __do_sys_splice fs/splice.c:1428 [inline] __se_sys_splice fs/splice.c:1408 [inline] __x64_sys_splice+0x248/0x300 fs/splice.c:1408 R10: 0000000000000000 R11: ffff8881c6bd401d R12: 0000000000000fff do_syscall_64+0xd0/0x4e0 arch/x86/entry/common.c:293 R13: 000000000000001e R14: ffff8881c6b87538 R15: dffffc0000000000 entry_SYSCALL_64_after_hwframe+0x49/0xbe FS: 00007fc46bb55700(0000) GS:ffff8881f6900000(0000) knlGS:0000000000000000 RIP: 0033:0x460b89 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 RSP: 002b:00007f500c28f1a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 CR2: 00007f5ef87a5000 CR3: 00000001edb50003 CR4: 00000000001606e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 RAX: ffffffffffffffda RBX: 000000000052bf00 RCX: 0000000000460b89 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 RDX: 0000000000000004 RSI: 0000000000000000 RDI: 0000000000000003 Call Trace: RBP: 0000000000000001 R08: 0000000100000300 R09: 0000000000000000 scatterwalk_map_and_copy crypto/scatterwalk.c:72 [inline] scatterwalk_map_and_copy+0x128/0x190 crypto/scatterwalk.c:60 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 R13: 00000000004f7150 R14: 00000000004b4af0 R15: 00007f500c28f6bc gcmaes_encrypt.constprop.15+0x81b/0xda0 arch/x86/crypto/aesni-intel_glue.c:980 generic_gcmaes_encrypt+0xfd/0x150 arch/x86/crypto/aesni-intel_glue.c:1297 crypto_aead_encrypt include/crypto/aead.h:337 [inline] gcmaes_wrapper_encrypt+0x109/0x180 arch/x86/crypto/aesni-intel_glue.c:1130 crypto_aead_encrypt include/crypto/aead.h:337 [inline] tls_do_encryption net/tls/tls_sw.c:193 [inline] tls_push_record+0x9ae/0x1600 net/tls/tls_sw.c:228 tls_sw_sendpage+0x462/0xc00 net/tls/tls_sw.c:585 inet_sendpage+0x122/0x600 net/ipv4/af_inet.c:815 kernel_sendpage+0x60/0xd0 net/socket.c:3581 sock_sendpage+0x6d/0xd0 net/socket.c:912 pipe_to_sendpage+0x212/0x430 fs/splice.c:452 splice_from_pipe_feed fs/splice.c:503 [inline] __splice_from_pipe+0x2cb/0x720 fs/splice.c:627 splice_from_pipe+0xbb/0x120 fs/splice.c:662 generic_splice_sendpage+0x10/0x20 fs/splice.c:833 do_splice_from fs/splice.c:852 [inline] do_splice+0xa25/0x12b0 fs/splice.c:1154 __do_sys_splice fs/splice.c:1428 [inline] __se_sys_splice fs/splice.c:1408 [inline] __x64_sys_splice+0x248/0x300 fs/splice.c:1408 do_syscall_64+0xd0/0x4e0 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x460b89 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fc46bb551a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 RAX: ffffffffffffffda RBX: 000000000052bf00 RCX: 0000000000460b89 RDX: 0000000000000004 RSI: 0000000000000000 RDI: 0000000000000003 RBP: 0000000000000001 R08: 0000000100000300 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 R13: 00000000004f7150 R14: 00000000004b4af0 R15: 00007fc46bb556bc Modules linked in: FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 ---[ end trace 376b0faf7617bd13 ]--- RIP: 0010:scatterwalk_start include/crypto/scatterwalk.h:73 [inline] RIP: 0010:scatterwalk_pagedone include/crypto/scatterwalk.h:98 [inline] RIP: 0010:scatterwalk_pagedone include/crypto/scatterwalk.h:82 [inline] RIP: 0010:scatterwalk_copychunks+0x379/0x610 crypto/scatterwalk.c:55 CPU: 1 PID: 6903 Comm: syz-executor.1 Tainted: G B D 4.19.204-syzkaller #0 Code: ff ff 48 89 c7 e8 a7 60 2a 00 4c 89 f2 48 c1 ea 03 42 80 3c 3a 00 0f 85 a8 01 00 00 48 8d 70 08 49 89 06 48 89 f2 48 c1 ea 03 <42> 0f b6 14 3a 84 d2 74 09 80 fa 03 0f 8e 6b 01 00 00 48 8b 5d d0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x123/0x171 lib/dump_stack.c:118 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold.4+0x5/0xa lib/fault-inject.c:149 __should_failslab+0xba/0xf0 mm/failslab.c:32 should_failslab+0x9/0x20 mm/slab_common.c:1590 slab_pre_alloc_hook mm/slab.h:424 [inline] slab_alloc_node mm/slab.c:3304 [inline] kmem_cache_alloc_node+0x262/0x720 mm/slab.c:3647 __alloc_skb+0xa7/0x580 net/core/skbuff.c:193 alloc_skb_fclone include/linux/skbuff.h:1037 [inline] sk_stream_alloc_skb+0x9e/0x810 net/ipv4/tcp.c:884 do_tcp_sendpages+0x774/0x1d30 net/ipv4/tcp.c:1003 tcp_sendpage_locked net/ipv4/tcp.c:1106 [inline] tcp_sendpage_locked+0x63/0xa0 net/ipv4/tcp.c:1098 tcp_sendpage+0x37/0x50 net/ipv4/tcp.c:1116 inet_sendpage+0x122/0x600 net/ipv4/af_inet.c:815 kernel_sendpage+0x60/0xd0 net/socket.c:3581 sock_sendpage+0x6d/0xd0 net/socket.c:912 pipe_to_sendpage+0x212/0x430 fs/splice.c:452 RSP: 0018:ffff8881c6b87498 EFLAGS: 00010202 splice_from_pipe_feed fs/splice.c:503 [inline] __splice_from_pipe+0x2cb/0x720 fs/splice.c:627 RAX: 0000000000000000 RBX: ffff8881e29b10cc RCX: 000000000000401e splice_from_pipe+0xbb/0x120 fs/splice.c:662 generic_splice_sendpage+0x10/0x20 fs/splice.c:833 do_splice_from fs/splice.c:852 [inline] do_splice+0xa25/0x12b0 fs/splice.c:1154 __do_sys_splice fs/splice.c:1428 [inline] __se_sys_splice fs/splice.c:1408 [inline] __x64_sys_splice+0x248/0x300 fs/splice.c:1408 do_syscall_64+0xd0/0x4e0 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RDX: 0000000000000001 RSI: 0000000000000008 RDI: ffff8881e29b10c0 RIP: 0033:0x460b89 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fbad32561a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 RAX: ffffffffffffffda RBX: 000000000052c0f8 RCX: 0000000000460b89 RDX: 0000000000000004 RSI: 0000000000000000 RDI: 0000000000000003 RBP: 0000000000000001 R08: 0000000100000300 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 R13: 00000000004f7150 R14: 00000000004b4af0 R15: 00007fbad32566bc FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 FAULT_INJECTION: forcing a failure. name fail_page_alloc, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 6927 Comm: syz-executor.3 Tainted: G B D 4.19.204-syzkaller #0 FAULT_INJECTION: forcing a failure. name fail_page_alloc, interval 1, probability 0, space 0, times 0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x123/0x171 lib/dump_stack.c:118 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold.4+0x5/0xa lib/fault-inject.c:149 RBP: ffff8881c6b874f8 R08: ffffed1038d7a804 R09: ffffed1038d7a800 R10: 0000000000000000 R11: ffff8881c6bd401d R12: 0000000000000fff __should_failslab+0xba/0xf0 mm/failslab.c:32 should_failslab+0x9/0x20 mm/slab_common.c:1590 slab_pre_alloc_hook mm/slab.h:424 [inline] slab_alloc_node mm/slab.c:3304 [inline] kmem_cache_alloc_node+0x262/0x720 mm/slab.c:3647 __alloc_skb+0xa7/0x580 net/core/skbuff.c:193 R13: 000000000000001e R14: ffff8881c6b87538 R15: dffffc0000000000 alloc_skb_fclone include/linux/skbuff.h:1037 [inline] sk_stream_alloc_skb+0x9e/0x810 net/ipv4/tcp.c:884 FS: 00007fc46bb55700(0000) GS:ffff8881f6800000(0000) knlGS:0000000000000000 do_tcp_sendpages+0x774/0x1d30 net/ipv4/tcp.c:1003 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f2678ebbf98 CR3: 00000001edb50004 CR4: 00000000001606f0 tcp_sendpage_locked net/ipv4/tcp.c:1106 [inline] tcp_sendpage_locked+0x63/0xa0 net/ipv4/tcp.c:1098 tcp_sendpage+0x37/0x50 net/ipv4/tcp.c:1116 inet_sendpage+0x122/0x600 net/ipv4/af_inet.c:815 kernel_sendpage+0x60/0xd0 net/socket.c:3581 sock_sendpage+0x6d/0xd0 net/socket.c:912 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 pipe_to_sendpage+0x212/0x430 fs/splice.c:452 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 splice_from_pipe_feed fs/splice.c:503 [inline] __splice_from_pipe+0x2cb/0x720 fs/splice.c:627 ---------------- Code disassembly (best guess), 2 bytes skipped: 0: 48 89 c7 mov %rax,%rdi 3: e8 a7 60 2a 00 callq 0x2a60af 8: 4c 89 f2 mov %r14,%rdx b: 48 c1 ea 03 shr $0x3,%rdx f: 42 80 3c 3a 00 cmpb $0x0,(%rdx,%r15,1) 14: 0f 85 a8 01 00 00 jne 0x1c2 1a: 48 8d 70 08 lea 0x8(%rax),%rsi 1e: 49 89 06 mov %rax,(%r14) 21: 48 89 f2 mov %rsi,%rdx 24: 48 c1 ea 03 shr $0x3,%rdx * 28: 42 0f b6 14 3a movzbl (%rdx,%r15,1),%edx <-- trapping instruction 2d: 84 d2 test %dl,%dl 2f: 74 09 je 0x3a 31: 80 fa 03 cmp $0x3,%dl 34: 0f 8e 6b 01 00 00 jle 0x1a5 3a: 48 8b 5d d0 mov -0x30(%rbp),%rbx