Hello,
syzbot found the following crash on:
HEAD commit: 1ec8f1f0 Linux 4.14.111
git tree: linux-4.14.y
console output:
https://syzkaller.appspot.com/x/log.txt?x=1262026b200000
kernel config:
https://syzkaller.appspot.com/x/.config?x=fdadf290ea9fc6f9
dashboard link:
https://syzkaller.appspot.com/bug?extid=d7c97cadc3eee6ee853d
compiler: gcc (GCC) 9.0.0 20181231 (experimental)
Unfortunately, I don't have any reproducer for this crash yet.
IMPORTANT: if you fix the bug, please add the following tag to the commit:
Reported-by:
syzbot+d7c97c...@syzkaller.appspotmail.com
audit: type=1400 audit(1555439798.663:99): avc: denied { map } for
pid=14723 comm="syz-executor.2" path="/dev/usbmon0" dev="devtmpfs" ino=428
scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023
tcontext=system_u:object_r:usbmon_device_t:s0 tclass=chr_file permissive=1
======================================================
WARNING: possible circular locking dependency detected
4.14.111 #1 Not tainted
------------------------------------------------------
syz-executor.2/14724 is trying to acquire lock:
(&rp->fetch_lock){+.+.}, at: [<ffffffff83f7c73f>]
mon_bin_vma_fault+0x6f/0x280 drivers/usb/mon/mon_bin.c:1236
but task is already holding lock:
(&mm->mmap_sem){++++}, at: [<ffffffff817b8425>] __mm_populate+0x1e5/0x2c0
mm/gup.c:1247
which lock already depends on the new lock.
the existing dependency chain (in reverse order) is:
-> #1 (&mm->mmap_sem){++++}:
lock_acquire+0x16f/0x430 kernel/locking/lockdep.c:3994
__might_fault mm/memory.c:4578 [inline]
__might_fault+0x143/0x1d0 mm/memory.c:4563
_copy_to_user+0x2c/0xd0 lib/usercopy.c:25
copy_to_user include/linux/uaccess.h:155 [inline]
mon_bin_get_event+0x10a/0x430 drivers/usb/mon/mon_bin.c:756
mon_bin_ioctl+0x9b4/0xb50 drivers/usb/mon/mon_bin.c:1067
vfs_ioctl fs/ioctl.c:46 [inline]
file_ioctl fs/ioctl.c:500 [inline]
do_vfs_ioctl+0x7b9/0x1070 fs/ioctl.c:684
SYSC_ioctl fs/ioctl.c:701 [inline]
SyS_ioctl+0x8f/0xc0 fs/ioctl.c:692
do_syscall_64+0x1eb/0x630 arch/x86/entry/common.c:289
entry_SYSCALL_64_after_hwframe+0x42/0xb7
-> #0 (&rp->fetch_lock){+.+.}:
check_prev_add kernel/locking/lockdep.c:1901 [inline]
check_prevs_add kernel/locking/lockdep.c:2018 [inline]
validate_chain kernel/locking/lockdep.c:2460 [inline]
__lock_acquire+0x2c89/0x45e0 kernel/locking/lockdep.c:3487
lock_acquire+0x16f/0x430 kernel/locking/lockdep.c:3994
__mutex_lock_common kernel/locking/mutex.c:756 [inline]
__mutex_lock+0xe8/0x1470 kernel/locking/mutex.c:893
mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:908
mon_bin_vma_fault+0x6f/0x280 drivers/usb/mon/mon_bin.c:1236
__do_fault+0x109/0x390 mm/memory.c:3217
do_cow_fault mm/memory.c:3656 [inline]
do_fault mm/memory.c:3755 [inline]
handle_pte_fault mm/memory.c:3983 [inline]
__handle_mm_fault+0xde6/0x3470 mm/memory.c:4107
handle_mm_fault+0x293/0x7c0 mm/memory.c:4144
faultin_page mm/gup.c:502 [inline]
__get_user_pages+0x465/0x1250 mm/gup.c:702
populate_vma_page_range+0x18e/0x230 mm/gup.c:1219
__mm_populate+0x198/0x2c0 mm/gup.c:1267
mm_populate include/linux/mm.h:2174 [inline]
vm_mmap_pgoff+0x1be/0x1d0 mm/util.c:338
SYSC_mmap_pgoff mm/mmap.c:1550 [inline]
SyS_mmap_pgoff+0x3ca/0x520 mm/mmap.c:1508
SYSC_mmap arch/x86/kernel/sys_x86_64.c:100 [inline]
SyS_mmap+0x16/0x20 arch/x86/kernel/sys_x86_64.c:91
do_syscall_64+0x1eb/0x630 arch/x86/entry/common.c:289
entry_SYSCALL_64_after_hwframe+0x42/0xb7
other info that might help us debug this:
Possible unsafe locking scenario:
CPU0 CPU1
---- ----
lock(&mm->mmap_sem);
lock(&rp->fetch_lock);
lock(&mm->mmap_sem);
lock(&rp->fetch_lock);
*** DEADLOCK ***
1 lock held by syz-executor.2/14724:
#0: (&mm->mmap_sem){++++}, at: [<ffffffff817b8425>]
__mm_populate+0x1e5/0x2c0 mm/gup.c:1247
stack backtrace:
CPU: 1 PID: 14724 Comm: syz-executor.2 Not tainted 4.14.111 #1
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS
Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:17 [inline]
dump_stack+0x138/0x19c lib/dump_stack.c:53
print_circular_bug.isra.0.cold+0x1cc/0x28f kernel/locking/lockdep.c:1258
check_prev_add kernel/locking/lockdep.c:1901 [inline]
check_prevs_add kernel/locking/lockdep.c:2018 [inline]
validate_chain kernel/locking/lockdep.c:2460 [inline]
__lock_acquire+0x2c89/0x45e0 kernel/locking/lockdep.c:3487
lock_acquire+0x16f/0x430 kernel/locking/lockdep.c:3994
__mutex_lock_common kernel/locking/mutex.c:756 [inline]
__mutex_lock+0xe8/0x1470 kernel/locking/mutex.c:893
mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:908
mon_bin_vma_fault+0x6f/0x280 drivers/usb/mon/mon_bin.c:1236
__do_fault+0x109/0x390 mm/memory.c:3217
do_cow_fault mm/memory.c:3656 [inline]
do_fault mm/memory.c:3755 [inline]
handle_pte_fault mm/memory.c:3983 [inline]
__handle_mm_fault+0xde6/0x3470 mm/memory.c:4107
handle_mm_fault+0x293/0x7c0 mm/memory.c:4144
faultin_page mm/gup.c:502 [inline]
__get_user_pages+0x465/0x1250 mm/gup.c:702
populate_vma_page_range+0x18e/0x230 mm/gup.c:1219
__mm_populate+0x198/0x2c0 mm/gup.c:1267
mm_populate include/linux/mm.h:2174 [inline]
vm_mmap_pgoff+0x1be/0x1d0 mm/util.c:338
SYSC_mmap_pgoff mm/mmap.c:1550 [inline]
SyS_mmap_pgoff+0x3ca/0x520 mm/mmap.c:1508
SYSC_mmap arch/x86/kernel/sys_x86_64.c:100 [inline]
SyS_mmap+0x16/0x20 arch/x86/kernel/sys_x86_64.c:91
do_syscall_64+0x1eb/0x630 arch/x86/entry/common.c:289
entry_SYSCALL_64_after_hwframe+0x42/0xb7
RIP: 0033:0x458c29
RSP: 002b:00007f412987ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000009
RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000458c29
RDX: 0000000000000002 RSI: 0000000000400000 RDI: 0000000020a19000
RBP: 000000000073bf00 R08: 0000000000000004 R09: 0000000000000000
R10: 0000000000008012 R11: 0000000000000246 R12: 00007f412987f6d4
R13: 00000000004c4b5a R14: 00000000004d8780 R15: 00000000ffffffff
kobject: 'loop2' (ffff8880a49d6f60): kobject_uevent_env
kobject: 'loop2' (ffff8880a49d6f60): fill_kobj_path: path
= '/devices/virtual/block/loop2'
kobject: 'loop3' (ffff8880a4a411e0): kobject_uevent_env
kobject: 'loop3' (ffff8880a4a411e0): fill_kobj_path: path
= '/devices/virtual/block/loop3'
Invalid argument reading file caps for /dev/fd/4
kobject: 'loop5' (ffff8880a4a901a0): kobject_uevent_env
Invalid argument reading file caps for /dev/fd/4
kobject: 'loop5' (ffff8880a4a901a0): fill_kobj_path: path
= '/devices/virtual/block/loop5'
kobject: 'loop0' (ffff88809510d3a0): kobject_uevent_env
kobject: 'loop0' (ffff88809510d3a0): fill_kobj_path: path
= '/devices/virtual/block/loop0'
kobject: 'loop4' (ffff8880a4a5a120): kobject_uevent_env
kobject: 'loop4' (ffff8880a4a5a120): fill_kobj_path: path
= '/devices/virtual/block/loop4'
kobject: 'loop0' (ffff88809510d3a0): kobject_uevent_env
overlayfs: unrecognized mount option "lowerdip=./file1" or missing value
kobject: 'loop0' (ffff88809510d3a0): fill_kobj_path: path
= '/devices/virtual/block/loop0'
kobject: 'loop5' (ffff8880a4a901a0): kobject_uevent_env
kobject: 'loop3' (ffff8880a4a411e0): kobject_uevent_env
kobject: 'loop5' (ffff8880a4a901a0): fill_kobj_path: path
= '/devices/virtual/block/loop5'
kobject: 'loop3' (ffff8880a4a411e0): fill_kobj_path: path
= '/devices/virtual/block/loop3'
kobject: 'loop4' (ffff8880a4a5a120): kobject_uevent_env
kobject: 'loop4' (ffff8880a4a5a120): fill_kobj_path: path
= '/devices/virtual/block/loop4'
kobject: 'loop5' (ffff8880a4a901a0): kobject_uevent_env
kobject: 'loop5' (ffff8880a4a901a0): kobject_uevent_env
kobject: 'loop5' (ffff8880a4a901a0): fill_kobj_path: path
= '/devices/virtual/block/loop5'
kobject: 'loop5' (ffff8880a4a901a0): fill_kobj_path: path
= '/devices/virtual/block/loop5'
overlayfs: unrecognized mount option "lowerdip=./file1" or missing value
kobject: 'loop3' (ffff8880a4a411e0): kobject_uevent_env
kobject: 'loop3' (ffff8880a4a411e0): fill_kobj_path: path
= '/devices/virtual/block/loop3'
kobject: 'loop5' (ffff8880a4a901a0): kobject_uevent_env
kobject: 'loop5' (ffff8880a4a901a0): fill_kobj_path: path
= '/devices/virtual/block/loop5'
kobject: 'loop4' (ffff8880a4a5a120): kobject_uevent_env
kobject: 'loop4' (ffff8880a4a5a120): fill_kobj_path: path
= '/devices/virtual/block/loop4'
kobject: 'loop3' (ffff8880a4a411e0): kobject_uevent_env
kobject: 'loop3' (ffff8880a4a411e0): fill_kobj_path: path
= '/devices/virtual/block/loop3'
kobject: 'loop4' (ffff8880a4a5a120): kobject_uevent_env
kobject: 'loop5' (ffff8880a4a901a0): kobject_uevent_env
kobject: 'loop4' (ffff8880a4a5a120): fill_kobj_path: path
= '/devices/virtual/block/loop4'
kobject: 'loop5' (ffff8880a4a901a0): fill_kobj_path: path
= '/devices/virtual/block/loop5'
kobject: 'loop3' (ffff8880a4a411e0): kobject_uevent_env
kobject: 'nr0 ' (ffff88805d6095b0): kobject_add_internal: parent: 'net',
set: 'devices'
kobject: 'loop3' (ffff8880a4a411e0): fill_kobj_path: path
= '/devices/virtual/block/loop3'
kobject: 'nr0 ' (ffff88805d6095b0): kobject_uevent_env
kobject: 'loop5' (ffff8880a4a901a0): kobject_uevent_env
kobject: 'nr0 ' (ffff88805d6095b0): fill_kobj_path: path
= '/devices/virtual/net/nr0 '
kobject: 'loop5' (ffff8880a4a901a0): fill_kobj_path: path
= '/devices/virtual/block/loop5'
kobject: 'queues' (ffff8880865ea148): kobject_add_internal: parent: 'nr0 ',
set: '<NULL>'
kobject: 'loop2' (ffff8880a49d6f60): kobject_uevent_env
kobject: 'queues' (ffff8880865ea148): kobject_uevent_env
kobject: 'loop2' (ffff8880a49d6f60): fill_kobj_path: path
= '/devices/virtual/block/loop2'
kobject: 'queues' (ffff8880865ea148): kobject_uevent_env: filter function
caused the event to drop!
kobject: 'loop0' (ffff88809510d3a0): kobject_uevent_env
kobject: 'loop0' (ffff88809510d3a0): fill_kobj_path: path
= '/devices/virtual/block/loop0'
kobject: 'rx-0' (ffff8880595a4890): kobject_add_internal: parent: 'queues',
set: 'queues'
kobject: 'loop3' (ffff8880a4a411e0): kobject_uevent_env
kobject: 'loop3' (ffff8880a4a411e0): fill_kobj_path: path
= '/devices/virtual/block/loop3'
kobject: 'rx-0' (ffff8880595a4890): kobject_uevent_env
kobject: 'rx-0' (ffff8880595a4890): fill_kobj_path: path
= '/devices/virtual/net/nr0 /queues/rx-0'
kobject: 'loop5' (ffff8880a4a901a0): kobject_uevent_env
kobject: 'tx-0' (ffff88805ec802d8): kobject_add_internal: parent: 'queues',
set: 'queues'
kobject: 'loop5' (ffff8880a4a901a0): fill_kobj_path: path
= '/devices/virtual/block/loop5'
kobject: 'tx-0' (ffff88805ec802d8): kobject_uevent_env
kobject: 'loop3' (ffff8880a4a411e0): kobject_uevent_env
kobject: 'loop3' (ffff8880a4a411e0): fill_kobj_path: path
= '/devices/virtual/block/loop3'
kobject: 'tx-0' (ffff88805ec802d8): fill_kobj_path: path
= '/devices/virtual/net/nr0 /queues/tx-0'
kobject: 'loop5' (ffff8880a4a901a0): kobject_uevent_env
kobject: 'batman_adv' (ffff88808e7b5480): kobject_add_internal:
parent: 'nr0 ', set: '<NULL>'
kobject: 'loop5' (ffff8880a4a901a0): fill_kobj_path: path
= '/devices/virtual/block/loop5'
device nr0 entered promiscuous mode
kobject: 'loop3' (ffff8880a4a411e0): kobject_uevent_env
kobject: 'tx-1' (ffff88805ec80458): kobject_add_internal: parent: 'queues',
set: 'queues'
kobject: 'loop3' (ffff8880a4a411e0): fill_kobj_path: path
= '/devices/virtual/block/loop3'
kobject: 'tx-1' (ffff88805ec80458): kobject_uevent_env
kobject: 'loop2' (ffff8880a49d6f60): kobject_uevent_env
kobject: 'tx-1' (ffff88805ec80458): fill_kobj_path: path
= '/devices/virtual/net/nr0 /queues/tx-1'
kobject: 'loop2' (ffff8880a49d6f60): fill_kobj_path: path
= '/devices/virtual/block/loop2'
kobject: 'rx-1' (ffff8880595a4910): kobject_add_internal: parent: 'queues',
set: 'queues'
kobject: 'loop3' (ffff8880a4a411e0): kobject_uevent_env
kobject: 'rx-1' (ffff8880595a4910): kobject_uevent_env
kobject: 'loop3' (ffff8880a4a411e0): fill_kobj_path: path
= '/devices/virtual/block/loop3'
kobject: 'rx-1' (ffff8880595a4910): fill_kobj_path: path
= '/devices/virtual/net/nr0 /queues/rx-1'
kobject: 'tx-1' (ffff88805ec80458): kobject_cleanup, parent ffff8880865ea148
kobject: 'tx-1' (ffff88805ec80458): auto cleanup 'remove' event
kobject: 'tx-1' (ffff88805ec80458): kobject_uevent_env
kobject: 'tx-1' (ffff88805ec80458): fill_kobj_path: path
= '/devices/virtual/net/nr0 /queues/tx-1'
kobject: 'tx-1' (ffff88805ec80458): auto cleanup kobject_del
kobject: 'tx-1' (ffff88805ec80458): calling ktype release
kobject: 'tx-1': free name
kobject: 'rx-1' (ffff8880595a4910): kobject_cleanup, parent ffff8880865ea148
kobject: 'rx-1' (ffff8880595a4910): auto cleanup 'remove' event
kobject: 'rx-1' (ffff8880595a4910): kobject_uevent_env
kobject: 'rx-1' (ffff8880595a4910): fill_kobj_path: path
= '/devices/virtual/net/nr0 /queues/rx-1'
kobject: 'rx-1' (ffff8880595a4910): auto cleanup kobject_del
kobject: 'rx-1' (ffff8880595a4910): calling ktype release
kobject: 'rx-1': free name
kobject: 'loop2' (ffff8880a49d6f60): kobject_uevent_env
kobject: 'loop2' (ffff8880a49d6f60): fill_kobj_path: path
= '/devices/virtual/block/loop2'
kobject: 'batman_adv' (ffff88808e7b5480): kobject_uevent_env
kobject: 'batman_adv' (ffff88808e7b5480): kobject_uevent_env: filter
function caused the event to drop!
kobject: 'batman_adv' (ffff88808e7b5480): kobject_cleanup, parent
(null)
kobject: 'loop5' (ffff8880a4a901a0): kobject_uevent_env
kobject: 'batman_adv' (ffff88808e7b5480): calling ktype release
kobject: 'loop5' (ffff8880a4a901a0): fill_kobj_path: path
= '/devices/virtual/block/loop5'
kobject: (ffff88808e7b5480): dynamic_kobj_release
kobject: 'batman_adv': free name
kobject: 'rx-0' (ffff8880595a4890): kobject_cleanup, parent ffff8880865ea148
kobject: 'rx-0' (ffff8880595a4890): auto cleanup 'remove' event
kobject: 'loop3' (ffff8880a4a411e0): kobject_uevent_env
kobject: 'loop3' (ffff8880a4a411e0): fill_kobj_path: path
= '/devices/virtual/block/loop3'
kobject: 'rx-0' (ffff8880595a4890): kobject_uevent_env
kobject: 'loop2' (ffff8880a49d6f60): kobject_uevent_env
kobject: 'rx-0' (ffff8880595a4890): fill_kobj_path: path
= '/devices/virtual/net/nr0 /queues/rx-0'
kobject: 'loop2' (ffff8880a49d6f60): fill_kobj_path: path
= '/devices/virtual/block/loop2'
kobject: 'rx-0' (ffff8880595a4890): auto cleanup kobject_del
kobject: 'rx-0' (ffff8880595a4890): calling ktype release
kobject: 'rx-0': free name
kobject: 'loop4' (ffff8880a4a5a120): kobject_uevent_env
kobject: 'tx-0' (ffff88805ec802d8): kobject_cleanup, parent ffff8880865ea148
kobject: 'tx-0' (ffff88805ec802d8): auto cleanup 'remove' event
kobject: 'loop4' (ffff8880a4a5a120): fill_kobj_path: path
= '/devices/virtual/block/loop4'
kobject: 'tx-0' (ffff88805ec802d8): kobject_uevent_env
kobject: 'kvm' (ffff888219feedd0): kobject_uevent_env
kobject: 'tx-0' (ffff88805ec802d8): fill_kobj_path: path
= '/devices/virtual/net/nr0 /queues/tx-0'
kobject: 'kvm' (ffff888219feedd0): fill_kobj_path: path
= '/devices/virtual/misc/kvm'
kobject: 'tx-0' (ffff88805ec802d8): auto cleanup kobject_del
kobject: 'tx-0' (ffff88805ec802d8): calling ktype release
kobject: 'tx-0': free name
kobject: 'queues' (ffff8880865ea148): kobject_cleanup, parent
(null)
kobject: 'queues' (ffff8880865ea148): calling ktype release
kobject: 'queues' (ffff8880865ea148): kset_release
kobject: 'queues': free name
kobject: 'nr0 ' (ffff88805d6095b0): kobject_uevent_env
kobject: 'nr0 ' (ffff88805d6095b0): fill_kobj_path: path
= '/devices/virtual/net/nr0 '
kobject: 'kvm' (ffff888219feedd0): kobject_uevent_env
kobject: 'kvm' (ffff888219feedd0): fill_kobj_path: path
= '/devices/virtual/misc/kvm'
kobject: 'loop4' (ffff8880a4a5a120): kobject_uevent_env
kobject: 'loop4' (ffff8880a4a5a120): fill_kobj_path: path
= '/devices/virtual/block/loop4'
kobject: 'nr0 ' (ffff88805d6095b0): kobject_cleanup, parent (null)
kobject: 'nr0 ' (ffff88805d6095b0): calling ktype release
kobject: 'nr0 ': free name
kobject: 'loop0' (ffff88809510d3a0): kobject_uevent_env
kobject: 'loop0' (ffff88809510d3a0): fill_kobj_path: path
= '/devices/virtual/block/loop0'
QAT: Invalid ioctl
kobject: 'loop4' (ffff8880a4a5a120): kobject_uevent_env
kobject: 'loop4' (ffff8880a4a5a120): fill_kobj_path: path
= '/devices/virtual/block/loop4'
kobject: 'loop3' (ffff8880a4a411e0): kobject_uevent_env
kobject: 'loop3' (ffff8880a4a411e0): fill_kobj_path: path
= '/devices/virtual/block/loop3'
kobject: 'kvm' (ffff888219feedd0): kobject_uevent_env
kobject: 'loop3' (ffff8880a4a411e0): kobject_uevent_env
kobject: 'loop3' (ffff8880a4a411e0): fill_kobj_path: path
= '/devices/virtual/block/loop3'
kobject: 'kvm' (ffff888219feedd0): fill_kobj_path: path
= '/devices/virtual/misc/kvm'
kobject: 'loop0' (ffff88809510d3a0): kobject_uevent_env
mmap: syz-executor.0 (14909): VmData 18538496 exceed data ulimit 0. Update
limits or use boot option ignore_rlimit_data.
kobject: 'loop0' (ffff88809510d3a0): fill_kobj_path: path
= '/devices/virtual/block/loop0'
kobject: 'kvm' (ffff888219feedd0): kobject_uevent_env
kobject: 'loop3' (ffff8880a4a411e0): kobject_uevent_env
kobject: 'kvm' (ffff888219feedd0): fill_kobj_path: path
= '/devices/virtual/misc/kvm'
kobject: 'loop3' (ffff8880a4a411e0): fill_kobj_path: path
= '/devices/virtual/block/loop3'
kobject: 'kvm' (ffff888219feedd0): kobject_uevent_env
kobject: 'loop5' (ffff8880a4a901a0): kobject_uevent_env
kobject: 'kvm' (ffff888219feedd0): fill_kobj_path: path
= '/devices/virtual/misc/kvm'
kobject: 'loop5' (ffff8880a4a901a0): fill_kobj_path: path
= '/devices/virtual/block/loop5'
kobject: 'kvm' (ffff888219feedd0): kobject_uevent_env
kobject: 'kvm' (ffff888219feedd0): fill_kobj_path: path
= '/devices/virtual/misc/kvm'
kobject: 'loop5' (ffff8880a4a901a0): kobject_uevent_env
kobject: 'loop5' (ffff8880a4a901a0): fill_kobj_path: path
= '/devices/virtual/block/loop5'
kobject: 'loop0' (ffff88809510d3a0): kobject_uevent_env
kobject: 'loop0' (ffff88809510d3a0): fill_kobj_path: path
= '/devices/virtual/block/loop0'
kobject: 'loop2' (ffff8880a49d6f60): kobject_uevent_env
kobject: 'loop2' (ffff8880a49d6f60): fill_kobj_path: path
= '/devices/virtual/block/loop2'
kobject: 'loop4' (ffff8880a4a5a120): kobject_uevent_env
kobject: 'loop4' (ffff8880a4a5a120): fill_kobj_path: path
= '/devices/virtual/block/loop4'
kobject: 'loop3' (ffff8880a4a411e0): kobject_uevent_env
kobject: 'loop3' (ffff8880a4a411e0): fill_kobj_path: path
= '/devices/virtual/block/loop3'
kobject: 'loop5' (ffff8880a4a901a0): kobject_uevent_env
kobject: 'loop5' (ffff8880a4a901a0): fill_kobj_path: path
= '/devices/virtual/block/loop5'
kobject: 'loop3' (ffff8880a4a411e0): kobject_uevent_env
kobject: 'loop3' (ffff8880a4a411e0): fill_kobj_path: path
= '/devices/virtual/block/loop3'
kobject: 'loop5' (ffff8880a4a901a0): kobject_uevent_env
kobject: 'loop5' (ffff8880a4a901a0): fill_kobj_path: path
= '/devices/virtual/block/loop5'
kobject: 'loop4' (ffff8880a4a5a120): kobject_uevent_env
kobject: 'loop4' (ffff8880a4a5a120): fill_kobj_path: path
= '/devices/virtual/block/loop4'
kobject: 'loop3' (ffff8880a4a411e0): kobject_uevent_env
kobject: 'loop3' (ffff8880a4a411e0): fill_kobj_path: path
= '/devices/virtual/block/loop3'
kobject: 'loop2' (ffff8880a49d6f60): kobject_uevent_env
kobject: 'loop2' (ffff8880a49d6f60): fill_kobj_path: path
= '/devices/virtual/block/loop2'
kobject: 'loop2' (ffff8880a49d6f60): kobject_uevent_env
kobject: 'loop2' (ffff8880a49d6f60): fill_kobj_path: path
= '/devices/virtual/block/loop2'
kobject: 'loop0' (ffff88809510d3a0): kobject_uevent_env
kobject: 'loop0' (ffff88809510d3a0): fill_kobj_path: path
= '/devices/virtual/block/loop0'
kobject: 'loop5' (ffff8880a4a901a0): kobject_uevent_env
kobject: 'loop5' (ffff8880a4a901a0): fill_kobj_path: path
= '/devices/virtual/block/loop5'
kobject: 'loop3' (ffff8880a4a411e0): kobject_uevent_env
kobject: 'loop3' (ffff8880a4a411e0): fill_kobj_path: path
= '/devices/virtual/block/loop3'
overlayfs: filesystem on './file0' not supported as upperdir
kobject: 'loop3' (ffff8880a4a411e0): kobject_uevent_env
kobject: 'loop3' (ffff8880a4a411e0): fill_kobj_path: path
= '/devices/virtual/block/loop3'
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
CPU: 1 PID: 15004 Comm: syz-executor.3 Not tainted 4.14.111 #1
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS
Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:17 [inline]
dump_stack+0x138/0x19c lib/dump_stack.c:53
fail_dump lib/fault-inject.c:51 [inline]
should_fail.cold+0x10f/0x159 lib/fault-inject.c:149
should_failslab+0xdb/0x130 mm/failslab.c:32
slab_pre_alloc_hook mm/slab.h:421 [inline]
slab_alloc mm/slab.c:3376 [inline]
kmem_cache_alloc+0x2d9/0x780 mm/slab.c:3550
getname_flags fs/namei.c:138 [inline]
getname_flags+0xcb/0x580 fs/namei.c:128
getname+0x1a/0x20 fs/namei.c:209
do_sys_open+0x1e7/0x430 fs/open.c:1059
SYSC_open fs/open.c:1083 [inline]
SyS_open+0x2d/0x40 fs/open.c:1078
do_syscall_64+0x1eb/0x630 arch/x86/entry/common.c:289
entry_SYSCALL_64_after_hwframe+0x42/0xb7
RIP: 0033:0x412bc1
RSP: 002b:00007f10b5075bb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002
RAX: ffffffffffffffda RBX: 00007f10b5075c90 RCX: 0000000000412bc1
RDX: 00007f10b5075bdf RSI: 0000000000000002 RDI: 00007f10b5075bd0
RBP: 000000000073bf00 R08: 0000000000000000 R09: 000000000000000f
R10: 0000000000000004 R11: 0000000000000293 R12: 00007f10b50766d4
R13: 00000000004c7bc0 R14: 00000000004ddcd0 R15: 0000000000000005
kobject: 'loop4' (ffff8880a4a5a120): kobject_uevent_env
kobject: 'loop4' (ffff8880a4a5a120): fill_kobj_path: path
= '/devices/virtual/block/loop4'
kobject: 'loop3' (ffff8880a4a411e0): kobject_uevent_env
kobject: 'loop3' (ffff8880a4a411e0): fill_kobj_path: path
= '/devices/virtual/block/loop3'
kobject: 'loop0' (ffff88809510d3a0): kobject_uevent_env
kobject: 'loop0' (ffff88809510d3a0): fill_kobj_path: path
= '/devices/virtual/block/loop0'
kobject: 'loop2' (ffff8880a49d6f60): kobject_uevent_env
kobject: 'loop2' (ffff8880a49d6f60): fill_kobj_path: path
= '/devices/virtual/block/loop2'
kobject: 'loop2' (ffff8880a49d6f60): kobject_uevent_env
kobject: 'loop2' (ffff8880a49d6f60): fill_kobj_path: path
= '/devices/virtual/block/loop2'
kobject: 'loop4' (ffff8880a4a5a120): kobject_uevent_env
kobject: 'loop4' (ffff8880a4a5a120): fill_kobj_path: path
= '/devices/virtual/block/loop4'
kobject: 'loop5' (ffff8880a4a901a0): kobject_uevent_env
kobject: 'loop5' (ffff8880a4a901a0): fill_kobj_path: path
= '/devices/virtual/block/loop5'
FAULT_INJECTION: forcing a failure.
name fail_page_alloc, interval 1, probability 0, space 0, times 0
CPU: 1 PID: 15030 Comm: syz-executor.3 Not tainted 4.14.111 #1
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS
Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:17 [inline]
dump_stack+0x138/0x19c lib/dump_stack.c:53
fail_dump lib/fault-inject.c:51 [inline]
should_fail.cold+0x10f/0x159 lib/fault-inject.c:149
should_fail_alloc_page mm/page_alloc.c:2891 [inline]
prepare_alloc_pages mm/page_alloc.c:4124 [inline]
__alloc_pages_nodemask+0x1d6/0x7a0 mm/page_alloc.c:4172
__alloc_pages include/linux/gfp.h:461 [inline]
__alloc_pages_node include/linux/gfp.h:474 [inline]
kmem_getpages mm/slab.c:1419 [inline]
cache_grow_begin+0x80/0x410 mm/slab.c:2676
cache_alloc_refill mm/slab.c:3043 [inline]
____cache_alloc mm/slab.c:3125 [inline]
____cache_alloc mm/slab.c:3108 [inline]
__do_cache_alloc mm/slab.c:3347 [inline]
slab_alloc mm/slab.c:3382 [inline]
kmem_cache_alloc+0x6a8/0x780 mm/slab.c:3550
getname_flags fs/namei.c:138 [inline]
getname_flags+0xcb/0x580 fs/namei.c:128
getname+0x1a/0x20 fs/namei.c:209
do_sys_open+0x1e7/0x430 fs/open.c:1059
SYSC_open fs/open.c:1083 [inline]
SyS_open+0x2d/0x40 fs/open.c:1078
do_syscall_64+0x1eb/0x630 arch/x86/entry/common.c:289
entry_SYSCALL_64_after_hwframe+0x42/0xb7
RIP: 0033:0x412bc1
RSP: 002b:00007f10b5075bb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002
RAX: ffffffffffffffda RBX: 00007f10b5075c90 RCX: 0000000000412bc1
RDX: 00007f10b5075bdf RSI: 0000000000000002 RDI: 00007f10b5075bd0
RBP: 000000000073bf00 R08: 0000000000000000 R09: 000000000000000f
R10: 0000000000000004 R11: 0000000000000293 R12: 00007f10b50766d4
R13: 00000000004c7bc0 R14: 00000000004ddcd0 R15: 0000000000000005
kobject: 'loop2' (ffff8880a49d6f60): kobject_uevent_env
kobject: 'loop2' (ffff8880a49d6f60): fill_kobj_path: path
= '/devices/virtual/block/loop2'
kobject: 'loop0' (ffff88809510d3a0): kobject_uevent_env
kobject: 'loop0' (ffff88809510d3a0): fill_kobj_path: path
= '/devices/virtual/block/loop0'
kobject: 'loop2' (ffff8880a49d6f60): kobject_uevent_env
kobject: 'loop2' (ffff8880a49d6f60): fill_kobj_path: path
= '/devices/virtual/block/loop2'
kobject: 'loop3' (ffff8880a4a411e0): kobject_uevent_env
kobject: 'loop3' (ffff8880a4a411e0): fill_kobj_path: path
= '/devices/virtual/block/loop3'
kobject: 'loop4' (ffff8880a4a5a120): kobject_uevent_env
kobject: 'loop4' (ffff8880a4a5a120): fill_kobj_path: path
= '/devices/virtual/block/loop4'
kobject: 'loop0' (ffff88809510d3a0): kobject_uevent_env
kobject: 'loop0' (ffff88809510d3a0): fill_kobj_path: path
= '/devices/virtual/block/loop0'
kobject: 'loop5' (ffff8880a4a901a0): kobject_uevent_env
kobject: 'loop5' (ffff8880a4a901a0): fill_kobj_path: path
= '/devices/virtual/block/loop5'
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
CPU: 1 PID: 15064 Comm: syz-executor.3 Not tainted 4.14.111 #1
kobject: 'loop5' (ffff8880a4a901a0): kobject_uevent_env
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS
Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:17 [inline]
dump_stack+0x138/0x19c lib/dump_stack.c:53
fail_dump lib/fault-inject.c:51 [inline]
should_fail.cold+0x10f/0x159 lib/fault-inject.c:149
kobject: 'loop5' (ffff8880a4a901a0): fill_kobj_path: path
= '/devices/virtual/block/loop5'
should_failslab+0xdb/0x130 mm/failslab.c:32
slab_pre_alloc_hook mm/slab.h:421 [inline]
slab_alloc mm/slab.c:3376 [inline]
kmem_cache_alloc+0x2d9/0x780 mm/slab.c:3550
kmem_cache_zalloc include/linux/slab.h:651 [inline]
get_empty_filp+0x8c/0x3b0 fs/file_table.c:123
path_openat+0x8f/0x3f70 fs/namei.c:3542
do_filp_open+0x18e/0x250 fs/namei.c:3600
kobject: 'loop2' (ffff8880a49d6f60): kobject_uevent_env
kobject: 'loop2' (ffff8880a49d6f60): fill_kobj_path: path
= '/devices/virtual/block/loop2'
do_sys_open+0x2c5/0x430 fs/open.c:1065
SYSC_open fs/open.c:1083 [inline]
SyS_open+0x2d/0x40 fs/open.c:1078
do_syscall_64+0x1eb/0x630 arch/x86/entry/common.c:289
entry_SYSCALL_64_after_hwframe+0x42/0xb7
RIP: 0033:0x412bc1
kobject: 'loop5' (ffff8880a4a901a0): kobject_uevent_env
RSP: 002b:00007f10b5075bb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002
RAX: ffffffffffffffda RBX: 00007f10b5075c90 RCX: 0000000000412bc1
RDX: 00007f10b5075bdf RSI: 0000000000000002 RDI: 00007f10b5075bd0
RBP: 000000000073bf00 R08: 0000000000000000 R09: 000000000000000f
kobject: 'loop5' (ffff8880a4a901a0): fill_kobj_path: path
= '/devices/virtual/block/loop5'
R10: 0000000000000004 R11: 0000000000000293 R12: 00007f10b50766d4
R13: 00000000004c7bc0 R14: 00000000004ddcd0 R15: 0000000000000005
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
CPU: 1 PID: 15082 Comm: syz-executor.3 Not tainted 4.14.111 #1
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS
Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:17 [inline]
dump_stack+0x138/0x19c lib/dump_stack.c:53
kobject: 'loop3' (ffff8880a4a411e0): kobject_uevent_env
fail_dump lib/fault-inject.c:51 [inline]
should_fail.cold+0x10f/0x159 lib/fault-inject.c:149
should_failslab+0xdb/0x130 mm/failslab.c:32
kobject: 'loop3' (ffff8880a4a411e0): fill_kobj_path: path
= '/devices/virtual/block/loop3'
slab_pre_alloc_hook mm/slab.h:421 [inline]
slab_alloc mm/slab.c:3376 [inline]
kmem_cache_alloc_trace+0x4b/0x790 mm/slab.c:3616
kobject: 'loop4' (ffff8880a4a5a120): kobject_uevent_env
kmalloc include/linux/slab.h:488 [inline]
proc_self_get_link+0x165/0x1c0 fs/proc/self.c:21
get_link fs/namei.c:1091 [inline]
link_path_walk+0xca9/0x10b0 fs/namei.c:2159
kobject: 'loop4' (ffff8880a4a5a120): fill_kobj_path: path
= '/devices/virtual/block/loop4'
path_openat+0x189/0x3f70 fs/namei.c:3565
overlayfs: failed to resolve './file1': -2
do_filp_open+0x18e/0x250 fs/namei.c:3600
kobject: 'loop4' (ffff8880a4a5a120): kobject_uevent_env
kobject: 'loop4' (ffff8880a4a5a120): fill_kobj_path: path
= '/devices/virtual/block/loop4'
do_sys_open+0x2c5/0x430 fs/open.c:1065
kobject: 'loop5' (ffff8880a4a901a0): kobject_uevent_env
kobject: 'loop5' (ffff8880a4a901a0): fill_kobj_path: path
= '/devices/virtual/block/loop5'
SYSC_open fs/open.c:1083 [inline]
SyS_open+0x2d/0x40 fs/open.c:1078
do_syscall_64+0x1eb/0x630 arch/x86/entry/common.c:289
entry_SYSCALL_64_after_hwframe+0x42/0xb7
RIP: 0033:0x412bc1
RSP: 002b:00007f10b5075bb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002
kobject: 'loop5' (ffff8880a4a901a0): kobject_uevent_env
RAX: ffffffffffffffda RBX: 00007f10b5075c90 RCX: 0000000000412bc1
RDX: 00007f10b5075bdf RSI: 0000000000000002 RDI: 00007f10b5075bd0
RBP: 000000000073bf00 R08: 0000000000000000 R09: 000000000000000f
R10: 0000000000000004 R11: 0000000000000293 R12: 00007f10b50766d4
R13: 00000000004c7bc0 R14: 00000000004ddcd0 R15: 0000000000000005
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
kobject: 'loop5' (ffff8880a4a901a0): fill_kobj_path: path
= '/devices/virtual/block/loop5'
CPU: 1 PID: 15108 Comm: syz-executor.3 Not tainted 4.14.111 #1
kobject: 'loop2' (ffff8880a49d6f60): kobject_uevent_env
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS
Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:17 [inline]
dump_stack+0x138/0x19c lib/dump_stack.c:53
fail_dump lib/fault-inject.c:51 [inline]
should_fail.cold+0x10f/0x159 lib/fault-inject.c:149
should_failslab+0xdb/0x130 mm/failslab.c:32
slab_pre_alloc_hook mm/slab.h:421 [inline]
slab_alloc mm/slab.c:3376 [inline]
kmem_cache_alloc+0x2d9/0x780 mm/slab.c:3550
__d_alloc+0x2d/0x9f0 fs/dcache.c:1623
d_alloc+0x4d/0x270 fs/dcache.c:1710
d_alloc_parallel+0xe5/0x1800 fs/dcache.c:2492
lookup_slow+0x188/0x440 fs/namei.c:1678
kobject: 'loop2' (ffff8880a49d6f60): fill_kobj_path: path
= '/devices/virtual/block/loop2'
walk_component+0x69d/0x1d00 fs/namei.c:1824
kobject: 'loop3' (ffff8880a4a411e0): kobject_uevent_env
link_path_walk+0x81f/0x10b0 fs/namei.c:2153
kobject: 'loop3' (ffff8880a4a411e0): fill_kobj_path: path
= '/devices/virtual/block/loop3'
path_openat+0x189/0x3f70 fs/namei.c:3565
kobject: 'loop0' (ffff88809510d3a0): kobject_uevent_env
kobject: 'loop0' (ffff88809510d3a0): fill_kobj_path: path
= '/devices/virtual/block/loop0'
kobject: 'loop2' (ffff8880a49d6f60): kobject_uevent_env
do_filp_open+0x18e/0x250 fs/namei.c:3600
kobject: 'loop2' (ffff8880a49d6f60): fill_kobj_path: path
= '/devices/virtual/block/loop2'
do_sys_open+0x2c5/0x430 fs/open.c:1065
SYSC_open fs/open.c:1083 [inline]
SyS_open+0x2d/0x40 fs/open.c:1078
do_syscall_64+0x1eb/0x630 arch/x86/entry/common.c:289
entry_SYSCALL_64_after_hwframe+0x42/0xb7
RIP: 0033:0x412bc1
RSP: 002b:00007f10b5075bb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002
RAX: ffffffffffffffda RBX: 00007f10b5075c90 RCX: 0000000000412bc1
RDX: 00007f10b5075bdf RSI: 0000000000000002 RDI: 00007f10b5075bd0
RBP: 000000000073bf00 R08: 0000000000000000 R09: 000000000000000f
R10: 0000000000000004 R11: 0000000000000293 R12: 00007f10b50766d4
R13: 00000000004c7bc0 R14: 00000000004ddcd0 R15: 0000000000000005
kobject: 'loop5' (ffff8880a4a901a0): kobject_uevent_env
kobject: 'loop5' (ffff8880a4a901a0): fill_kobj_path: path
= '/devices/virtual/block/loop5'
kobject: 'loop4' (ffff8880a4a5a120): kobject_uevent_env
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
kobject: 'loop4' (ffff8880a4a5a120): fill_kobj_path: path
= '/devices/virtual/block/loop4'
CPU: 0 PID: 15130 Comm: syz-executor.3 Not tainted 4.14.111 #1
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS
Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:17 [inline]
dump_stack+0x138/0x19c lib/dump_stack.c:53
fail_dump lib/fault-inject.c:51 [inline]
should_fail.cold+0x10f/0x159 lib/fault-inject.c:149
should_failslab+0xdb/0x130 mm/failslab.c:32
slab_pre_alloc_hook mm/slab.h:421 [inline]
slab_alloc mm/slab.c:3376 [inline]
kmem_cache_alloc+0x2d9/0x780 mm/slab.c:3550
__d_alloc+0x2d/0x9f0 fs/dcache.c:1623
d_alloc+0x4d/0x270 fs/dcache.c:1710
d_alloc_parallel+0xe5/0x1800 fs/dcache.c:2492
lookup_slow+0x188/0x440 fs/namei.c:1678
walk_component+0x69d/0x1d00 fs/namei.c:1824
link_path_walk+0x81f/0x10b0 fs/namei.c:2153
path_openat+0x189/0x3f70 fs/namei.c:3565
do_filp_open+0x18e/0x250 fs/namei.c:3600
do_sys_open+0x2c5/0x430 fs/open.c:1065
SYSC_open fs/open.c:1083 [inline]
SyS_open+0x2d/0x40 fs/open.c:1078
do_syscall_64+0x1eb/0x630 arch/x86/entry/common.c:289
entry_SYSCALL_64_after_hwframe+0x42/0xb7
RIP: 0033:0x412bc1
RSP: 002b:00007f10b5075bb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002
RAX: ffffffffffffffda RBX: 00007f10b5075c90 RCX: 0000000000412bc1
RDX: 00007f10b5075bdf RSI: 0000000000000002 RDI: 00007f10b5075bd0
RBP: 000000000073bf00 R08: 0000000000000000 R09: 000000000000000f
R10: 0000000000000004 R11: 0000000000000293 R12: 00007f10b50766d4
R13: 00000000004c7bc0 R14: 00000000004ddcd0 R15: 0000000000000005
kobject: 'loop3' (ffff8880a4a411e0): kobject_uevent_env
kobject: 'loop3' (ffff8880a4a411e0): fill_kobj_path: path
= '/devices/virtual/block/loop3'
kobject: 'loop0' (ffff88809510d3a0): kobject_uevent_env
kobject: 'loop0' (ffff88809510d3a0): fill_kobj_path: path
= '/devices/virtual/block/loop0'
kobject: 'loop5' (ffff8880a4a901a0): kobject_uevent_env
kobject: 'loop5' (ffff8880a4a901a0): fill_kobj_path: path
= '/devices/virtual/block/loop5'
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
CPU: 0 PID: 15154 Comm: syz-executor.3 Not tainted 4.14.111 #1
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS
Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:17 [inline]
dump_stack+0x138/0x19c lib/dump_stack.c:53
fail_dump lib/fault-inject.c:51 [inline]
should_fail.cold+0x10f/0x159 lib/fault-inject.c:149
should_failslab+0xdb/0x130 mm/failslab.c:32
slab_pre_alloc_hook mm/slab.h:421 [inline]
slab_alloc mm/slab.c:3376 [inline]
kmem_cache_alloc+0x2d9/0x780 mm/slab.c:3550
proc_alloc_inode+0x1c/0x1a0 fs/proc/inode.c:62
alloc_inode+0x66/0x190 fs/inode.c:209
new_inode_pseudo+0x19/0xf0 fs/inode.c:891
new_inode+0x1f/0x40 fs/inode.c:920
proc_pid_make_inode+0x22/0x230 fs/proc/base.c:1763
proc_pident_instantiate+0x7f/0x290 fs/proc/base.c:2449
proc_pident_lookup+0x17e/0x1f0 fs/proc/base.c:2498
proc_tgid_base_lookup+0x2a/0x30 fs/proc/base.c:3051
lookup_slow+0x22c/0x440 fs/namei.c:1695
walk_component+0x69d/0x1d00 fs/namei.c:1824
link_path_walk+0x81f/0x10b0 fs/namei.c:2153
path_openat+0x189/0x3f70 fs/namei.c:3565
do_filp_open+0x18e/0x250 fs/namei.c:3600
do_sys_open+0x2c5/0x430 fs/open.c:1065
SYSC_open fs/open.c:1083 [inline]
SyS_open+0x2d/0x40 fs/open.c:1078
do_syscall_64+0x1eb/0x630 arch/x86/entry/common.c:289
kobject: 'loop2' (ffff8880a49d6f60): kobject_uevent_env
entry_SYSCALL_64_after_hwframe+0x42/0xb7
RIP: 0033:0x412bc1
kobject: 'loop2' (ffff8880a49d6f60): fill_kobj_path: path
= '/devices/virtual/block/loop2'
RSP: 002b:00007f10b5075bb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002
RAX: ffffffffffffffda RBX: 00007f10b5075c90 RCX: 0000000000412bc1
RDX: 00007f10b5075bdf RSI: 0000000000000002 RDI: 00007f10b5075bd0
RBP: 000000000073bf00 R08: 0000000000000000 R09: 000000000000000f
R10: 0000000000000004 R11: 0000000000000293 R12: 00007f10b50766d4
R13: 00000000004c7bc0 R14: 00000000004ddcd0 R15: 0000000000000005
FAULT_INJECTION: forcing a failure.
name fail_page_alloc, interval 1, probability 0, space 0, times 0
kobject: 'loop3' (ffff8880a4a411e0): kobject_uevent_env
CPU: 0 PID: 15187 Comm: syz-executor.3 Not tainted 4.14.111 #1
kobject: 'loop3' (ffff8880a4a411e0): fill_kobj_path: path
= '/devices/virtual/block/loop3'
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS
Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:17 [inline]
dump_stack+0x138/0x19c lib/dump_stack.c:53
fail_dump lib/fault-inject.c:51 [inline]
should_fail.cold+0x10f/0x159 lib/fault-inject.c:149
kobject: 'loop5' (ffff8880a4a901a0): kobject_uevent_env
should_fail_alloc_page mm/page_alloc.c:2891 [inline]
prepare_alloc_pages mm/page_alloc.c:4124 [inline]
__alloc_pages_nodemask+0x1d6/0x7a0 mm/page_alloc.c:4172
kobject: 'loop5' (ffff8880a4a901a0): fill_kobj_path: path
= '/devices/virtual/block/loop5'
__alloc_pages include/linux/gfp.h:461 [inline]
__alloc_pages_node include/linux/gfp.h:474 [inline]
kmem_getpages mm/slab.c:1419 [inline]
cache_grow_begin+0x80/0x410 mm/slab.c:2676
kobject: 'loop0' (ffff88809510d3a0): kobject_uevent_env
cache_alloc_refill mm/slab.c:3043 [inline]
____cache_alloc mm/slab.c:3125 [inline]
____cache_alloc mm/slab.c:3108 [inline]
__do_cache_alloc mm/slab.c:3347 [inline]
slab_alloc mm/slab.c:3382 [inline]
kmem_cache_alloc+0x6a8/0x780 mm/slab.c:3550
kobject: 'loop0' (ffff88809510d3a0): fill_kobj_path: path
= '/devices/virtual/block/loop0'
proc_alloc_inode+0x1c/0x1a0 fs/proc/inode.c:62
kobject: 'loop2' (ffff8880a49d6f60): kobject_uevent_env
alloc_inode+0x66/0x190 fs/inode.c:209
kobject: 'loop2' (ffff8880a49d6f60): fill_kobj_path: path
= '/devices/virtual/block/loop2'
new_inode_pseudo+0x19/0xf0 fs/inode.c:891
new_inode+0x1f/0x40 fs/inode.c:920
proc_pid_make_inode+0x22/0x230 fs/proc/base.c:1763
proc_pident_instantiate+0x7f/0x290 fs/proc/base.c:2449
kobject: 'loop5' (ffff8880a4a901a0): kobject_uevent_env
proc_pident_lookup+0x17e/0x1f0 fs/proc/base.c:2498
kobject: 'loop5' (ffff8880a4a901a0): fill_kobj_path: path
= '/devices/virtual/block/loop5'
proc_tgid_base_lookup+0x2a/0x30 fs/proc/base.c:3051
kobject: 'loop2' (ffff8880a49d6f60): kobject_uevent_env
lookup_slow+0x22c/0x440 fs/namei.c:1695
kobject: 'loop2' (ffff8880a49d6f60): fill_kobj_path: path
= '/devices/virtual/block/loop2'
walk_component+0x69d/0x1d00 fs/namei.c:1824
kobject: 'loop5' (ffff8880a4a901a0): kobject_uevent_env
kobject: 'loop5' (ffff8880a4a901a0): fill_kobj_path: path
= '/devices/virtual/block/loop5'
kobject: 'loop2' (ffff8880a49d6f60): kobject_uevent_env
kobject: 'loop2' (ffff8880a49d6f60): fill_kobj_path: path
= '/devices/virtual/block/loop2'
kobject: 'loop5' (ffff8880a4a901a0): kobject_uevent_env
link_path_walk+0x81f/0x10b0 fs/namei.c:2153
kobject: 'loop5' (ffff8880a4a901a0): fill_kobj_path: path
= '/devices/virtual/block/loop5'
kobject: 'loop2' (ffff8880a49d6f60): kobject_uevent_env
path_openat+0x189/0x3f70 fs/namei.c:3565
kobject: 'loop2' (ffff8880a49d6f60): fill_kobj_path: path
= '/devices/virtual/block/loop2'
kobject: 'loop5' (ffff8880a4a901a0): kobject_uevent_env
kobject: 'loop5' (ffff8880a4a901a0): fill_kobj_path: path
= '/devices/virtual/block/loop5'
do_filp_open+0x18e/0x250 fs/namei.c:3600
do_sys_open+0x2c5/0x430 fs/open.c:1065
SYSC_open fs/open.c:1083 [inline]
SyS_open+0x2d/0x40 fs/open.c:1078
do_syscall_64+0x1eb/0x630 arch/x86/entry/common.c:289
entry_SYSCALL_64_after_hwframe+0x42/0xb7
RIP: 0033:0x412bc1
RSP: 002b:00007f10b5075bb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002
RAX: ffffffffffffffda RBX: 00007f10b5075c90 RCX: 0000000000412bc1
RDX: 00007f10b5075bdf RSI: 0000000000000002 RDI: 00007f10b5075bd0
kobject: 'loop2' (ffff8880a49d6f60): kobject_uevent_env
RBP: 000000000073bf00 R08: 0000000000000000 R09: 000000000000000f
R10: 0000000000000004 R11: 0000000000000293 R12: 00007f10b50766d4
R13: 00000000004c7bc0 R14: 00000000004ddcd0 R15: 0000000000000005
kobject: 'loop2' (ffff8880a49d6f60): fill_kobj_path: path
= '/devices/virtual/block/loop2'
kobject: 'loop3' (ffff8880a4a411e0): kobject_uevent_env
kobject: 'loop3' (ffff8880a4a411e0): fill_kobj_path: path
= '/devices/virtual/block/loop3'
kobject: 'loop4' (ffff8880a4a5a120): kobject_uevent_env
kobject: 'loop4' (ffff8880a4a5a120): fill_kobj_path: path
= '/devices/virtual/block/loop4'
kobject: 'loop0' (ffff88809510d3a0): kobject_uevent_env
kobject: 'loop0' (ffff88809510d3a0): fill_kobj_path: path
= '/devices/virtual/block/loop0'
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
kobject: 'loop0' (ffff88809510d3a0): kobject_uevent_env
kobject: 'loop0' (ffff88809510d3a0): fill_kobj_path: path
= '/devices/virtual/block/loop0'
CPU: 1 PID: 15214 Comm: syz-executor.3 Not tainted 4.14.111 #1
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS
Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:17 [inline]
dump_stack+0x138/0x19c lib/dump_stack.c:53
fail_dump lib/fault-inject.c:51 [inline]
should_fail.cold+0x10f/0x159 lib/fault-inject.c:149
should_failslab+0xdb/0x130 mm/failslab.c:32
slab_pre_alloc_hook mm/slab.h:421 [inline]
slab_alloc mm/slab.c:3376 [inline]
kmem_cache_alloc+0x2d9/0x780 mm/slab.c:3550
__d_alloc+0x2d/0x9f0 fs/dcache.c:1623
d_alloc+0x4d/0x270 fs/dcache.c:1710
d_alloc_parallel+0xe5/0x1800 fs/dcache.c:2492
lookup_open+0x498/0x1870 fs/namei.c:3153
do_last fs/namei.c:3331 [inline]
path_openat+0x193d/0x3f70 fs/namei.c:3566
do_filp_open+0x18e/0x250 fs/namei.c:3600
do_sys_open+0x2c5/0x430 fs/open.c:1065
SYSC_open fs/open.c:1083 [inline]
SyS_open+0x2d/0x40 fs/open.c:1078
do_syscall_64+0x1eb/0x630 arch/x86/entry/common.c:289
entry_SYSCALL_64_after_hwframe+0x42/0xb7
RIP: 0033:0x412bc1
RSP: 002b:00007f10b5075bb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002
RAX: ffffffffffffffda RBX: 00007f10b5075c90 RCX: 0000000000412bc1
RDX: 00007f10b5075bdf RSI: 0000000000000002 RDI: 00007f10b5075bd0
RBP: 000000000073bf00 R08: 0000000000000000 R09: 000000000000000f
R10: 0000000000000004 R11: 0000000000000293 R12: 00007f10b50766d4
R13: 00000000004c7bc0 R14: 00000000004ddcd0 R15: 0000000000000005
kobject: 'loop5' (ffff8880a4a901a0): kobject_uevent_env
kobject: 'loop5' (ffff8880a4a901a0): fill_kobj_path: path
= '/devices/virtual/block/loop5'
kobject: 'loop2' (ffff8880a49d6f60): kobject_uevent_env
kobject: 'loop2' (ffff8880a49d6f60): fill_kobj_path: path
= '/devices/virtual/block/loop2'
kobject: 'loop5' (ffff8880a4a901a0): kobject_uevent_env
kobject: 'loop5' (ffff8880a4a901a0): fill_kobj_path: path
= '/devices/virtual/block/loop5'
kobject: 'loop2' (ffff8880a49d6f60): kobject_uevent_env
kobject: 'loop2' (ffff8880a49d6f60): fill_kobj_path: path
= '/devices/virtual/block/loop2'
kobject: 'loop4' (ffff8880a4a5a120): kobject_uevent_env
kobject: 'loop4' (ffff8880a4a5a120): fill_kobj_path: path
= '/devices/virtual/block/loop4'
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
kobject: 'loop3' (ffff8880a4a411e0): kobject_uevent_env
CPU: 1 PID: 15252 Comm: syz-executor.3 Not tainted 4.14.111 #1
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS
Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:17 [inline]
dump_stack+0x138/0x19c lib/dump_stack.c:53
fail_dump lib/fault-inject.c:51 [inline]
should_fail.cold+0x10f/0x159 lib/fault-inject.c:149
should_failslab+0xdb/0x130 mm/failslab.c:32
slab_pre_alloc_hook mm/slab.h:421 [inline]
slab_alloc mm/slab.c:3376 [inline]
kmem_cache_alloc+0x2d9/0x780 mm/slab.c:3550
proc_alloc_inode+0x1c/0x1a0 fs/proc/inode.c:62
alloc_inode+0x66/0x190 fs/inode.c:209
new_inode_pseudo+0x19/0xf0 fs/inode.c:891
new_inode+0x1f/0x40 fs/inode.c:920
proc_pid_make_inode+0x22/0x230 fs/proc/base.c:1763
proc_fd_instantiate+0x4e/0x180 fs/proc/fd.c:177
proc_lookupfd_common+0x1d0/0x2a0 fs/proc/fd.c:212
proc_lookupfd+0x25/0x30 fs/proc/fd.c:276
lookup_open+0x619/0x1870 fs/namei.c:3219
do_last fs/namei.c:3331 [inline]
path_openat+0x193d/0x3f70 fs/namei.c:3566
do_filp_open+0x18e/0x250 fs/namei.c:3600
do_sys_open+0x2c5/0x430 fs/open.c:1065
SYSC_open fs/open.c:1083 [inline]
SyS_open+0x2d/0x40 fs/open.c:1078
do_syscall_64+0x1eb/0x630 arch/x86/entry/common.c:289
entry_SYSCALL_64_after_hwframe+0x42/0xb7
RIP: 0033:0x412bc1
RSP: 002b:00007f10b5075bb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002
RAX: ffffffffffffffda RBX: 00007f10b5075c90 RCX: 0000000000412bc1
RDX: 00007f10b5075bdf RSI: 0000000000000002 RDI: 00007f10b5075bd0
RBP: 000000000073bf00 R08: 0000000000000000 R09: 000000000000000f
R10: 0000000000000004 R11: 0000000000000293 R12: 00007f10b50766d4
R13: 00000000004c7bc0 R14: 00000000004ddcd0 R15: 0000000000000005
kobject: 'loop3' (ffff8880a4a411e0): fill_kobj_path: path
= '/devices/virtual/block/loop3'
kobject: 'loop3' (ffff8880a4a411e0): kobject_uevent_env
kobject: 'loop3' (ffff8880a4a411e0): fill_kobj_path: path
= '/devices/virtual/block/loop3'
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
kobject: 'loop4' (ffff8880a4a5a120): kobject_uevent_env
CPU: 0 PID: 15275 Comm: syz-executor.3 Not tainted 4.14.111 #1
kobject: 'loop4' (ffff8880a4a5a120): fill_kobj_path: path
= '/devices/virtual/block/loop4'
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS
Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:17 [inline]
dump_stack+0x138/0x19c lib/dump_stack.c:53
kobject: 'loop0' (ffff88809510d3a0): kobject_uevent_env
fail_dump lib/fault-inject.c:51 [inline]
should_fail.cold+0x10f/0x159 lib/fault-inject.c:149
should_failslab+0xdb/0x130 mm/failslab.c:32
slab_pre_alloc_hook mm/slab.h:421 [inline]
slab_alloc mm/slab.c:3376 [inline]
kmem_cache_alloc+0x2d9/0x780 mm/slab.c:3550
kobject: 'loop0' (ffff88809510d3a0): fill_kobj_path: path
= '/devices/virtual/block/loop0'
kmem_cache_zalloc include/linux/slab.h:651 [inline]
inode_alloc_security security/selinux/hooks.c:233 [inline]
selinux_inode_alloc_security+0xb6/0x2a0 security/selinux/hooks.c:2871
kobject: 'loop5' (ffff8880a4a901a0): kobject_uevent_env
security_inode_alloc+0x9a/0xe0 security/security.c:438
inode_init_always+0x552/0xaf0 fs/inode.c:167
kobject: 'loop5' (ffff8880a4a901a0): fill_kobj_path: path
= '/devices/virtual/block/loop5'
alloc_inode+0x83/0x190 fs/inode.c:216
new_inode_pseudo+0x19/0xf0 fs/inode.c:891
new_inode+0x1f/0x40 fs/inode.c:920
proc_pid_make_inode+0x22/0x230 fs/proc/base.c:1763
kobject: 'loop5' (ffff8880a4a901a0): kobject_uevent_env
proc_fd_instantiate+0x4e/0x180 fs/proc/fd.c:177
kobject: 'loop5' (ffff8880a4a901a0): fill_kobj_path: path
= '/devices/virtual/block/loop5'
proc_lookupfd_common+0x1d0/0x2a0 fs/proc/fd.c:212
proc_lookupfd+0x25/0x30 fs/proc/fd.c:276
lookup_open+0x619/0x1870 fs/namei.c:3219
do_last fs/namei.c:3331 [inline]
path_openat+0x193d/0x3f70 fs/namei.c:3566
do_filp_open+0x18e/0x250 fs/namei.c:3600
do_sys_open+0x2c5/0x430 fs/open.c:1065
SYSC_open fs/open.c:1083 [inline]
SyS_open+0x2d/0x40 fs/open.c:1078
do_syscall_64+0x1eb/0x630 arch/x86/entry/common.c:289
entry_SYSCALL_64_after_hwframe+0x42/0xb7
RIP: 0033:0x412bc1
RSP: 002b:00007f10b5075bb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002
RAX: ffffffffffffffda RBX: 00007f10b5075c90 RCX: 0000000000412bc1
RDX: 00007f10b5075bdf RSI: 0000000000000002 RDI: 00007f10b5075bd0
RBP: 000000000073bf00 R08: 0000000000000000 R09: 000000000000000f
R10: 0000000000000004 R11: 0000000000000293 R12: 00007f10b50766d4
R13: 00000000004c7bc0 R14: 00000000004ddcd0 R15: 0000000000000005
kobject: 'loop2' (ffff8880a49d6f60): kobject_uevent_env
kobject: 'loop2' (ffff8880a49d6f60): fill_kobj_path: path
= '/devices/virtual/block/loop2'
kobject: 'loop4' (ffff8880a4a5a120): kobject_uevent_env
kobject: 'loop4' (ffff8880a4a5a120): fill_kobj_path: path
= '/devices/virtual/block/loop4'
kobject: 'loop5' (ffff8880a4a901a0): kobject_uevent_env
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
kobject: 'loop5' (ffff8880a4a901a0): fill_kobj_path: path
= '/devices/virtual/block/loop5'
CPU: 1 PID: 15296 Comm: syz-executor.3 Not tainted 4.14.111 #1
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS
Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:17 [inline]
dump_stack+0x138/0x19c lib/dump_stack.c:53
fail_dump lib/fault-inject.c:51 [inline]
should_fail.cold+0x10f/0x159 lib/fault-inject.c:149
should_failslab+0xdb/0x130 mm/failslab.c:32
slab_pre_alloc_hook mm/slab.h:421 [inline]
slab_alloc mm/slab.c:3376 [inline]
kmem_cache_alloc+0x2d9/0x780 mm/slab.c:3550
kmem_cache_zalloc include/linux/slab.h:651 [inline]
inode_alloc_security security/selinux/hooks.c:233 [inline]
selinux_inode_alloc_security+0xb6/0x2a0 security/selinux/hooks.c:2871
security_inode_alloc+0x9a/0xe0 security/security.c:438
inode_init_always+0x552/0xaf0 fs/inode.c:167
alloc_inode+0x83/0x190 fs/inode.c:216
new_inode_pseudo+0x19/0xf0 fs/inode.c:891
new_inode+0x1f/0x40 fs/inode.c:920
proc_pid_make_inode+0x22/0x230 fs/proc/base.c:1763
kobject: 'loop3' (ffff8880a4a411e0): kobject_uevent_env
proc_fd_instantiate+0x4e/0x180 fs/proc/fd.c:177
kobject: 'loop3' (ffff8880a4a411e0): fill_kobj_path: path
= '/devices/virtual/block/loop3'
proc_lookupfd_common+0x1d0/0x2a0 fs/proc/fd.c:212
proc_lookupfd+0x25/0x30 fs/proc/fd.c:276
lookup_open+0x619/0x1870 fs/namei.c:3219
do_last fs/namei.c:3331 [inline]
path_openat+0x193d/0x3f70 fs/namei.c:3566
do_filp_open+0x18e/0x250 fs/namei.c:3600
kobject: 'loop0' (ffff88809510d3a0): kobject_uevent_env
kobject: 'loop0' (ffff88809510d3a0): fill_kobj_path: path
= '/devices/virtual/block/loop0'
kobject: 'loop5' (ffff8880a4a901a0): kobject_uevent_env
do_sys_open+0x2c5/0x430 fs/open.c:1065
SYSC_open fs/open.c:1083 [inline]
SyS_open+0x2d/0x40 fs/open.c:1078
do_syscall_64+0x1eb/0x630 arch/x86/entry/common.c:289
entry_SYSCALL_64_after_hwframe+0x42/0xb7
RIP: 0033:0x412bc1
RSP: 002b:00007f10b5075bb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002
RAX: ffffffffffffffda RBX: 00007f10b5075c90 RCX: 0000000000412bc1
RDX: 00007f10b5075bdf RSI: 0000000000000002 RDI: 00007f10b5075bd0
RBP: 000000000073bf00 R08: 0000000000000000 R09: 000000000000000f
R10: 0000000000000004 R11: 0000000000000293 R12: 00007f10b50766d4
R13: 00000000004c7bc0 R14: 00000000004ddcd0 R15: 0000000000000005