bisecting fixing commit since 9f31eb60d7a23536bf3902d4dc602f10c822b79e building syzkaller on 34bf9440bd06034f86b5d9ac8afbf078129cbdae testing commit 9f31eb60d7a23536bf3902d4dc602f10c822b79e with gcc (GCC) 8.4.1 20210217 kernel signature: becfdf4c183438fac9c4d033a207c79363d00b49d55832cf5e3a59a498accaaa run #0: crashed: KASAN: slab-out-of-bounds Read in scatterwalk_copychunks run #1: crashed: general protection fault in scatterwalk_copychunks run #2: crashed: KASAN: slab-out-of-bounds Read in scatterwalk_copychunks run #3: crashed: general protection fault in scatterwalk_copychunks run #4: crashed: general protection fault in scatterwalk_copychunks run #5: crashed: KASAN: slab-out-of-bounds Read in scatterwalk_copychunks run #6: crashed: KASAN: use-after-free Read in scatterwalk_copychunks run #7: crashed: KASAN: slab-out-of-bounds Read in scatterwalk_copychunks run #8: crashed: general protection fault in scatterwalk_copychunks run #9: crashed: KASAN: use-after-free Read in scatterwalk_copychunks run #10: crashed: general protection fault in scatterwalk_copychunks run #11: crashed: KASAN: use-after-free Read in scatterwalk_copychunks run #12: crashed: general protection fault in scatterwalk_copychunks run #13: crashed: KASAN: slab-out-of-bounds Read in scatterwalk_copychunks run #14: crashed: KASAN: slab-out-of-bounds Read in scatterwalk_copychunks run #15: crashed: general protection fault in scatterwalk_copychunks run #16: crashed: general protection fault in scatterwalk_copychunks run #17: crashed: general protection fault in scatterwalk_copychunks run #18: crashed: KASAN: slab-out-of-bounds Read in scatterwalk_copychunks run #19: crashed: KASAN: use-after-free Read in scatterwalk_copychunks testing current HEAD eb575cd5d7f60241d016fdd13a9e86d962093c9b testing commit eb575cd5d7f60241d016fdd13a9e86d962093c9b with gcc (GCC) 8.4.1 20210217 kernel signature: ac12294998abe9604f6089388fa66038edd2c8c248b4f7f50a46638860f00be9 run #0: crashed: KASAN: slab-out-of-bounds Read in scatterwalk_copychunks run #1: crashed: general protection fault in scatterwalk_copychunks run #2: crashed: general protection fault in scatterwalk_copychunks run #3: crashed: general protection fault in scatterwalk_copychunks run #4: crashed: general protection fault in scatterwalk_copychunks run #5: crashed: general protection fault in scatterwalk_copychunks run #6: crashed: KASAN: slab-out-of-bounds Read in scatterwalk_copychunks run #7: crashed: general protection fault in scatterwalk_copychunks run #8: crashed: general protection fault in scatterwalk_copychunks run #9: crashed: KASAN: use-after-free Read in scatterwalk_copychunks revisions tested: 2, total time: 21m0.408969614s (build: 14m20.148721364s, test: 6m16.827478588s) the crash still happens on HEAD commit msg: Linux 4.19.195 crash: KASAN: use-after-free Read in scatterwalk_copychunks sock_sendpage+0x6d/0xd0 net/socket.c:847 pipe_to_sendpage+0x212/0x430 fs/splice.c:452 ================================================================== BUG: KASAN: use-after-free in memcpy include/linux/string.h:377 [inline] BUG: KASAN: use-after-free in memcpy_dir crypto/scatterwalk.c:28 [inline] BUG: KASAN: use-after-free in scatterwalk_copychunks+0x1e1/0x610 crypto/scatterwalk.c:43 Read of size 4094 at addr ffff8881e1772000 by task syz-executor.0/6657 splice_from_pipe_feed fs/splice.c:503 [inline] __splice_from_pipe+0x2cb/0x720 fs/splice.c:627 splice_from_pipe+0xbb/0x120 fs/splice.c:662 generic_splice_sendpage+0x10/0x20 fs/splice.c:833 do_splice_from fs/splice.c:852 [inline] do_splice+0xa25/0x12b0 fs/splice.c:1154 __do_sys_splice fs/splice.c:1428 [inline] __se_sys_splice fs/splice.c:1408 [inline] __x64_sys_splice+0x248/0x300 fs/splice.c:1408 do_syscall_64+0xd0/0x4e0 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x460b89 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f8cf5e381a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 RAX: ffffffffffffffda RBX: 000000000052bf00 RCX: 0000000000460b89 RDX: 0000000000000004 RSI: 0000000000000000 RDI: 0000000000000003 RBP: 0000000000000001 R08: 0000000100000300 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 R13: 00000000004f7150 R14: 00000000004b4af0 R15: 00007f8cf5e386bc CPU: 1 PID: 6657 Comm: syz-executor.0 Not tainted 4.19.195-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x123/0x171 lib/dump_stack.c:118 print_address_description.cold.8+0x9/0x1ff mm/kasan/report.c:256 kasan_report_error mm/kasan/report.c:354 [inline] kasan_report mm/kasan/report.c:412 [inline] kasan_report.cold.9+0x242/0x2fe mm/kasan/report.c:396 check_memory_region_inline mm/kasan/kasan.c:260 [inline] check_memory_region+0x13e/0x1b0 mm/kasan/kasan.c:267 memcpy+0x23/0x50 mm/kasan/kasan.c:302 memcpy include/linux/string.h:377 [inline] memcpy_dir crypto/scatterwalk.c:28 [inline] scatterwalk_copychunks+0x1e1/0x610 crypto/scatterwalk.c:43 scatterwalk_map_and_copy crypto/scatterwalk.c:72 [inline] scatterwalk_map_and_copy+0x128/0x190 crypto/scatterwalk.c:60 gcmaes_encrypt.constprop.15+0x6d6/0xda0 arch/x86/crypto/aesni-intel_glue.c:956 generic_gcmaes_encrypt+0xfd/0x150 arch/x86/crypto/aesni-intel_glue.c:1297 crypto_aead_encrypt include/crypto/aead.h:337 [inline] gcmaes_wrapper_encrypt+0x109/0x180 arch/x86/crypto/aesni-intel_glue.c:1130 crypto_aead_encrypt include/crypto/aead.h:337 [inline] tls_do_encryption net/tls/tls_sw.c:193 [inline] tls_push_record+0x9ae/0x1600 net/tls/tls_sw.c:228 tls_sw_sendpage+0x462/0xc00 net/tls/tls_sw.c:585 inet_sendpage+0x122/0x600 net/ipv4/af_inet.c:815 kernel_sendpage+0x60/0xd0 net/socket.c:3378 sock_sendpage+0x6d/0xd0 net/socket.c:847 pipe_to_sendpage+0x212/0x430 fs/splice.c:452 splice_from_pipe_feed fs/splice.c:503 [inline] __splice_from_pipe+0x2cb/0x720 fs/splice.c:627 splice_from_pipe+0xbb/0x120 fs/splice.c:662 generic_splice_sendpage+0x10/0x20 fs/splice.c:833 do_splice_from fs/splice.c:852 [inline] do_splice+0xa25/0x12b0 fs/splice.c:1154 __do_sys_splice fs/splice.c:1428 [inline] __se_sys_splice fs/splice.c:1408 [inline] __x64_sys_splice+0x248/0x300 fs/splice.c:1408 do_syscall_64+0xd0/0x4e0 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x460b89 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f51925d71a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 RAX: ffffffffffffffda RBX: 000000000052bf00 RCX: 0000000000460b89 RDX: 0000000000000004 RSI: 0000000000000000 RDI: 0000000000000003 RBP: 0000000000000001 R08: 0000000100000300 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 R13: 00000000004f7150 R14: 00000000004b4af0 R15: 00007f51925d76bc Allocated by task 3297: save_stack+0x43/0xd0 mm/kasan/kasan.c:448 set_track mm/kasan/kasan.c:460 [inline] kasan_kmalloc mm/kasan/kasan.c:553 [inline] kasan_kmalloc+0xc7/0xe0 mm/kasan/kasan.c:531 kasan_slab_alloc+0x12/0x20 mm/kasan/kasan.c:490 kmem_cache_alloc+0x12e/0x720 mm/slab.c:3559 vm_area_dup+0x1b/0x150 kernel/fork.c:329 dup_mmap kernel/fork.c:489 [inline] dup_mm kernel/fork.c:1284 [inline] copy_mm kernel/fork.c:1340 [inline] copy_process.part.34+0x307c/0x76d0 kernel/fork.c:1912 copy_process kernel/fork.c:1718 [inline] _do_fork+0x16a/0xcb0 kernel/fork.c:2218 __do_sys_clone kernel/fork.c:2325 [inline] __se_sys_clone kernel/fork.c:2319 [inline] __x64_sys_clone+0xba/0x140 kernel/fork.c:2319 do_syscall_64+0xd0/0x4e0 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe Freed by task 6636: save_stack+0x43/0xd0 mm/kasan/kasan.c:448 set_track mm/kasan/kasan.c:460 [inline] __kasan_slab_free+0x102/0x150 mm/kasan/kasan.c:521 kasan_slab_free+0xe/0x10 mm/kasan/kasan.c:528 __cache_free mm/slab.c:3503 [inline] kmem_cache_free+0x83/0x290 mm/slab.c:3765 vm_area_free+0x13/0x20 kernel/fork.c:340 remove_vma+0x105/0x140 mm/mmap.c:180 exit_mmap+0x2d1/0x470 mm/mmap.c:3104 __mmput kernel/fork.c:1015 [inline] mmput+0x107/0x3f0 kernel/fork.c:1036 exit_mm kernel/exit.c:549 [inline] do_exit+0x9ce/0x2cf0 kernel/exit.c:857 do_group_exit+0xf4/0x2f0 kernel/exit.c:967 __do_sys_exit_group kernel/exit.c:978 [inline] __se_sys_exit_group kernel/exit.c:976 [inline] __x64_sys_exit_group+0x39/0x40 kernel/exit.c:976 do_syscall_64+0xd0/0x4e0 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe The buggy address belongs to the object at ffff8881e1772000 which belongs to the cache vm_area_struct of size 200 The buggy address is located 0 bytes inside of 200-byte region [ffff8881e1772000, ffff8881e17720c8) The buggy address belongs to the page: page:ffffea000785dc80 count:1 mapcount:0 mapping:ffff8881f654e840 index:0x0 flags: 0x2fffc0000000100(slab) raw: 02fffc0000000100 ffffea000785c208 ffffea0007963788 ffff8881f654e840 raw: 0000000000000000 ffff8881e1772000 000000010000000f 0000000000000000 page dumped because: kasan: bad access detected Memory state around the buggy address: ffff8881e1771f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff8881e1771f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffff8881e1772000: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ^ ffff8881e1772080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc ffff8881e1772100: fc fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ================================================================== FAULT_INJECTION: forcing a failure. name fail_page_alloc, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 6643 Comm: syz-executor.4 Tainted: G B 4.19.195-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x123/0x171 lib/dump_stack.c:118 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold.4+0x5/0xa lib/fault-inject.c:149 __should_failslab+0xba/0xf0 mm/failslab.c:32 should_failslab+0x9/0x20 mm/slab_common.c:1588 slab_pre_alloc_hook mm/slab.h:424 [inline] slab_alloc_node mm/slab.c:3304 [inline] kmem_cache_alloc_node+0x262/0x720 mm/slab.c:3647 __alloc_skb+0xa7/0x580 net/core/skbuff.c:193 alloc_skb_fclone include/linux/skbuff.h:1037 [inline] sk_stream_alloc_skb+0x9e/0x810 net/ipv4/tcp.c:884 do_tcp_sendpages+0x774/0x1d30 net/ipv4/tcp.c:1003 tcp_sendpage_locked net/ipv4/tcp.c:1106 [inline] tcp_sendpage_locked+0x63/0xa0 net/ipv4/tcp.c:1098 tcp_sendpage+0x37/0x50 net/ipv4/tcp.c:1116 inet_sendpage+0x122/0x600 net/ipv4/af_inet.c:815 kernel_sendpage+0x60/0xd0 net/socket.c:3378 sock_sendpage+0x6d/0xd0 net/socket.c:847 pipe_to_sendpage+0x212/0x430 fs/splice.c:452 splice_from_pipe_feed fs/splice.c:503 [inline] __splice_from_pipe+0x2cb/0x720 fs/splice.c:627 splice_from_pipe+0xbb/0x120 fs/splice.c:662 generic_splice_sendpage+0x10/0x20 fs/splice.c:833 do_splice_from fs/splice.c:852 [inline] do_splice+0xa25/0x12b0 fs/splice.c:1154 __do_sys_splice fs/splice.c:1428 [inline] __se_sys_splice fs/splice.c:1408 [inline] __x64_sys_splice+0x248/0x300 fs/splice.c:1408 do_syscall_64+0xd0/0x4e0 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x460b89 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f51cfe0d1a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 RAX: ffffffffffffffda RBX: 000000000052c0f8 RCX: 0000000000460b89 RDX: 0000000000000004 RSI: 0000000000000000 RDI: 0000000000000003 RBP: 0000000000000001 R08: 0000000100000300 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 R13: 00000000004f7150 R14: 00000000004b4af0 R15: 00007f51cfe0d6bc CPU: 1 PID: 6666 Comm: syz-executor.5 Tainted: G B 4.19.195-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x123/0x171 lib/dump_stack.c:118 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold.4+0x5/0xa lib/fault-inject.c:149 kasan: CONFIG_KASAN_INLINE enabled should_fail_alloc_page mm/page_alloc.c:3088 [inline] prepare_alloc_pages mm/page_alloc.c:4346 [inline] __alloc_pages_nodemask+0x1d5/0x710 mm/page_alloc.c:4393 alloc_pages_current+0xd6/0x1b0 mm/mempolicy.c:2197 alloc_pages include/linux/gfp.h:532 [inline] skb_page_frag_refill+0x20b/0x400 net/core/sock.c:2220 sk_page_frag_refill+0x46/0x1d0 net/core/sock.c:2240 sk_alloc_sg+0x108/0x7d0 net/core/sock.c:2264 kasan: GPF could be caused by NULL-ptr deref or user memory access alloc_encrypted_sg+0x81/0x100 net/tls/tls_sw.c:123 tls_sw_sendpage+0x502/0xc00 net/tls/tls_sw.c:555 inet_sendpage+0x122/0x600 net/ipv4/af_inet.c:815 kernel_sendpage+0x60/0xd0 net/socket.c:3378 sock_sendpage+0x6d/0xd0 net/socket.c:847 general protection fault: 0000 [#1] PREEMPT SMP KASAN pipe_to_sendpage+0x212/0x430 fs/splice.c:452 CPU: 0 PID: 6657 Comm: syz-executor.0 Tainted: G B 4.19.195-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:scatterwalk_start include/crypto/scatterwalk.h:73 [inline] RIP: 0010:scatterwalk_pagedone include/crypto/scatterwalk.h:98 [inline] RIP: 0010:scatterwalk_pagedone include/crypto/scatterwalk.h:82 [inline] RIP: 0010:scatterwalk_copychunks+0x379/0x610 crypto/scatterwalk.c:55 Code: ff ff 48 89 c7 e8 17 69 2a 00 4c 89 f2 48 c1 ea 03 42 80 3c 3a 00 0f 85 a8 01 00 00 48 8d 70 08 49 89 06 48 89 f2 48 c1 ea 03 <42> 0f b6 14 3a 84 d2 74 09 80 fa 03 0f 8e 6b 01 00 00 48 8b 5d d0 RSP: 0018:ffff8881dd86f498 EFLAGS: 00010202 RAX: 0000000000000000 RBX: ffff8881dc37f74c RCX: 000000000000401e splice_from_pipe_feed fs/splice.c:503 [inline] __splice_from_pipe+0x2cb/0x720 fs/splice.c:627 RDX: 0000000000000001 RSI: 0000000000000008 RDI: ffff8881dc37f740 RBP: ffff8881dd86f4f8 R08: ffffed103b795804 R09: ffffed103b795800 R10: 0000000000000000 R11: ffff8881dbcac01d R12: 0000000000000fff R13: 000000000000001e R14: ffff8881dd86f538 R15: dffffc0000000000 splice_from_pipe+0xbb/0x120 fs/splice.c:662 FS: 00007f51925d7700(0000) GS:ffff8881f6800000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000556af867bc80 CR3: 00000001df0b0006 CR4: 00000000001606f0 generic_splice_sendpage+0x10/0x20 fs/splice.c:833 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 do_splice_from fs/splice.c:852 [inline] do_splice+0xa25/0x12b0 fs/splice.c:1154 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: scatterwalk_map_and_copy crypto/scatterwalk.c:72 [inline] scatterwalk_map_and_copy+0x128/0x190 crypto/scatterwalk.c:60 __do_sys_splice fs/splice.c:1428 [inline] __se_sys_splice fs/splice.c:1408 [inline] __x64_sys_splice+0x248/0x300 fs/splice.c:1408 do_syscall_64+0xd0/0x4e0 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x460b89 gcmaes_encrypt.constprop.15+0x81b/0xda0 arch/x86/crypto/aesni-intel_glue.c:980 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f32ae5651a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 RAX: ffffffffffffffda RBX: 000000000052bfa8 RCX: 0000000000460b89 RDX: 0000000000000004 RSI: 0000000000000000 RDI: 0000000000000003 RBP: 0000000000000001 R08: 0000000100000300 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 R13: 00000000004f7150 R14: 00000000004b4af0 R15: 00007f32ae5656bc generic_gcmaes_encrypt+0xfd/0x150 arch/x86/crypto/aesni-intel_glue.c:1297 crypto_aead_encrypt include/crypto/aead.h:337 [inline] gcmaes_wrapper_encrypt+0x109/0x180 arch/x86/crypto/aesni-intel_glue.c:1130 crypto_aead_encrypt include/crypto/aead.h:337 [inline] tls_do_encryption net/tls/tls_sw.c:193 [inline] tls_push_record+0x9ae/0x1600 net/tls/tls_sw.c:228 tls_sw_sendpage+0x462/0xc00 net/tls/tls_sw.c:585 inet_sendpage+0x122/0x600 net/ipv4/af_inet.c:815 kernel_sendpage+0x60/0xd0 net/socket.c:3378 sock_sendpage+0x6d/0xd0 net/socket.c:847 pipe_to_sendpage+0x212/0x430 fs/splice.c:452 splice_from_pipe_feed fs/splice.c:503 [inline] __splice_from_pipe+0x2cb/0x720 fs/splice.c:627 splice_from_pipe+0xbb/0x120 fs/splice.c:662 generic_splice_sendpage+0x10/0x20 fs/splice.c:833 do_splice_from fs/splice.c:852 [inline] do_splice+0xa25/0x12b0 fs/splice.c:1154 __do_sys_splice fs/splice.c:1428 [inline] __se_sys_splice fs/splice.c:1408 [inline] __x64_sys_splice+0x248/0x300 fs/splice.c:1408 do_syscall_64+0xd0/0x4e0 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x460b89 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f51925d71a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 RAX: ffffffffffffffda RBX: 000000000052bf00 RCX: 0000000000460b89 RDX: 0000000000000004 RSI: 0000000000000000 RDI: 0000000000000003 RBP: 0000000000000001 R08: 0000000100000300 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 R13: 00000000004f7150 R14: 00000000004b4af0 R15: 00007f51925d76bc Modules linked in: ---[ end trace 1bce3062390f7587 ]--- RIP: 0010:scatterwalk_start include/crypto/scatterwalk.h:73 [inline] RIP: 0010:scatterwalk_pagedone include/crypto/scatterwalk.h:98 [inline] RIP: 0010:scatterwalk_pagedone include/crypto/scatterwalk.h:82 [inline] RIP: 0010:scatterwalk_copychunks+0x379/0x610 crypto/scatterwalk.c:55 Code: ff ff 48 89 c7 e8 17 69 2a 00 4c 89 f2 48 c1 ea 03 42 80 3c 3a 00 0f 85 a8 01 00 00 48 8d 70 08 49 89 06 48 89 f2 48 c1 ea 03 <42> 0f b6 14 3a 84 d2 74 09 80 fa 03 0f 8e 6b 01 00 00 48 8b 5d d0 RSP: 0018:ffff8881dd86f498 EFLAGS: 00010202 RAX: 0000000000000000 RBX: ffff8881dc37f74c RCX: 000000000000401e RDX: 0000000000000001 RSI: 0000000000000008 RDI: ffff8881dc37f740 RBP: ffff8881dd86f4f8 R08: ffffed103b795804 R09: ffffed103b795800 R10: 0000000000000000 R11: ffff8881dbcac01d R12: 0000000000000fff FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 R13: 000000000000001e R14: ffff8881dd86f538 R15: dffffc0000000000 FAULT_INJECTION: forcing a failure. name fail_page_alloc, interval 1, probability 0, space 0, times 0 FS: 00007f51925d7700(0000) GS:ffff8881f6900000(0000) knlGS:0000000000000000 FAULT_INJECTION: forcing a failure. name fail_page_alloc, interval 1, probability 0, space 0, times 0 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000000052c071 CR3: 00000001df0b0002 CR4: 00000000001606e0 CPU: 0 PID: 6686 Comm: syz-executor.3 Tainted: G B D 4.19.195-syzkaller #0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x123/0x171 lib/dump_stack.c:118 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold.4+0x5/0xa lib/fault-inject.c:149 __should_failslab+0xba/0xf0 mm/failslab.c:32 should_failslab+0x9/0x20 mm/slab_common.c:1588 slab_pre_alloc_hook mm/slab.h:424 [inline] slab_alloc_node mm/slab.c:3304 [inline] kmem_cache_alloc_node+0x262/0x720 mm/slab.c:3647 __alloc_skb+0xa7/0x580 net/core/skbuff.c:193 alloc_skb_fclone include/linux/skbuff.h:1037 [inline] sk_stream_alloc_skb+0x9e/0x810 net/ipv4/tcp.c:884 do_tcp_sendpages+0x774/0x1d30 net/ipv4/tcp.c:1003 tcp_sendpage_locked net/ipv4/tcp.c:1106 [inline] tcp_sendpage_locked+0x63/0xa0 net/ipv4/tcp.c:1098 tcp_sendpage+0x37/0x50 net/ipv4/tcp.c:1116 inet_sendpage+0x122/0x600 net/ipv4/af_inet.c:815 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 kernel_sendpage+0x60/0xd0 net/socket.c:3378 sock_sendpage+0x6d/0xd0 net/socket.c:847 pipe_to_sendpage+0x212/0x430 fs/splice.c:452 splice_from_pipe_feed fs/splice.c:503 [inline] __splice_from_pipe+0x2cb/0x720 fs/splice.c:627