syzbot


panic: 17 callbacks suppressed

Status: auto-obsoleted due to no activity on 2022/08/26 15:44
Reported-by: syzbot+5cfb067af56626692547@syzkaller.appspotmail.com
First crash: 1629d, last: 1629d
Cause bisection: failed (error log, bisect log)
  
Fix bisection: failed (error log, bisect log)
  
Last patch testing requests (1)
Created Duration User Patch Repo Result
2022/08/26 13:27 10m retest repro linux-4.19.y error OK

Sample crash report:
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000441139
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200004c0
RBP: 00007ffdb1980120 R08: 0000000000000002 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: ffffffffffffffff
R13: 0000000000000004 R14: 0000000000000000 R15: 0000000000000000
audit_panic: 17 callbacks suppressed
audit: error in audit_log_task_context
audit: type=1804 audit(1573081657.251:81): pid=7702 uid=0 auid=4294967295 ses=4294967295 op=invalid_pcr cause=open_writers comm="syz-executor036" name="/root/bus" dev="sda1" ino=1426 res=1
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
audit: type=1804 audit(1573081657.671:82): pid=7703 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor036" name="/root/bus" dev="sda1" ino=1426 res=1
CPU: 0 PID: 7703 Comm: syz-executor036 Not tainted 4.19.82 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x172/0x1f0 lib/dump_stack.c:113
 fail_dump lib/fault-inject.c:51 [inline]
 should_fail.cold+0xa/0x1b lib/fault-inject.c:149
 __should_failslab+0x121/0x190 mm/failslab.c:32
 should_failslab+0x9/0x14 mm/slab_common.c:1557
 slab_pre_alloc_hook mm/slab.h:424 [inline]
 slab_alloc mm/slab.c:3383 [inline]
 __do_kmalloc mm/slab.c:3725 [inline]
 __kmalloc+0x2e2/0x750 mm/slab.c:3736
 kmalloc include/linux/slab.h:520 [inline]
 kzalloc include/linux/slab.h:709 [inline]
 ima_alloc_init_template+0x65/0x3b0 security/integrity/ima/ima_api.c:47
 ima_store_measurement+0x1bc/0x3e0 security/integrity/ima/ima_api.c:294
 process_measurement+0x119e/0x1560 security/integrity/ima/ima_main.c:292
 ima_file_check+0xc5/0x110 security/integrity/ima/ima_main.c:391
 do_last fs/namei.c:3422 [inline]
 path_openat+0x1130/0x45e0 fs/namei.c:3534
 do_filp_open+0x1a1/0x280 fs/namei.c:3564
 do_sys_open+0x3fe/0x550 fs/open.c:1088
 __do_sys_open fs/open.c:1106 [inline]
 __se_sys_open fs/open.c:1101 [inline]
 __x64_sys_open+0x7e/0xc0 fs/open.c:1101
 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x441139
Code: e8 5c ae 02 00 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 bb 0a fc ff c3 66 2e 0f 1f 84 00 00 00 00
RSP: 002b:00007ffdb1980108 EFLAGS: 00000246 ORIG_RAX: 0000000000000002
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000441139
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200004c0
RBP: 00007ffdb1980120 R08: 0000000000000002 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: ffffffffffffffff
R13: 0000000000000004 R14: 0000000000000000 R15: 0000000000000000
audit: type=1804 audit(1573081658.011:83): pid=7703 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=add_template_measure cause=ENOMEM comm="syz-executor036" name="/root/bus" dev="sda1" ino=1426 res=0
FAULT_INJECTION: forcing a failure.
name fail_page_alloc, interval 1, probability 0, space 0, times 1
CPU: 1 PID: 7704 Comm: syz-executor036 Not tainted 4.19.82 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x172/0x1f0 lib/dump_stack.c:113
 fail_dump lib/fault-inject.c:51 [inline]
 should_fail.cold+0xa/0x1b lib/fault-inject.c:149
 should_fail_alloc_page mm/page_alloc.c:3078 [inline]
 prepare_alloc_pages mm/page_alloc.c:4336 [inline]
 __alloc_pages_nodemask+0x1ee/0x750 mm/page_alloc.c:4383
 __alloc_pages include/linux/gfp.h:473 [inline]
 __alloc_pages_node include/linux/gfp.h:486 [inline]
 kmem_getpages mm/slab.c:1412 [inline]
 cache_grow_begin+0x91/0x8c0 mm/slab.c:2682
 cache_alloc_refill mm/slab.c:3049 [inline]
 ____cache_alloc mm/slab.c:3132 [inline]
 ____cache_alloc mm/slab.c:3115 [inline]
 slab_alloc_node mm/slab.c:3327 [inline]
 kmem_cache_alloc_node_trace+0x655/0x720 mm/slab.c:3666
 __do_kmalloc_node mm/slab.c:3688 [inline]
 __kmalloc_node_track_caller+0x3d/0x80 mm/slab.c:3703
 __kmalloc_reserve.isra.0+0x40/0xf0 net/core/skbuff.c:137
 __alloc_skb+0x10b/0x5f0 net/core/skbuff.c:205
 alloc_skb include/linux/skbuff.h:995 [inline]
 nlmsg_new include/net/netlink.h:511 [inline]
 audit_buffer_alloc kernel/audit.c:1680 [inline]
 audit_log_start kernel/audit.c:1793 [inline]
 audit_log_start+0x302/0x7a0 kernel/audit.c:1744
 integrity_audit_msg+0xff/0x480 security/integrity/integrity_audit.c:41
 ima_add_violation+0x187/0x1f0 security/integrity/ima/ima_api.c:154
 ima_rdwr_violation_check security/integrity/ima/ima_main.c:119 [inline]
 process_measurement+0xb3e/0x1560 security/integrity/ima/ima_main.c:214
 ima_file_check+0xc5/0x110 security/integrity/ima/ima_main.c:391
 do_last fs/namei.c:3422 [inline]
 path_openat+0x1130/0x45e0 fs/namei.c:3534
 do_filp_open+0x1a1/0x280 fs/namei.c:3564
 do_sys_open+0x3fe/0x550 fs/open.c:1088
 __do_sys_open fs/open.c:1106 [inline]
 __se_sys_open fs/open.c:1101 [inline]
 __x64_sys_open+0x7e/0xc0 fs/open.c:1101
 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x441139
Code: e8 5c ae 02 00 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 bb 0a fc ff c3 66 2e 0f 1f 84 00 00 00 00
RSP: 002b:00007ffdb1980108 EFLAGS: 00000246 ORIG_RAX: 0000000000000002
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000441139
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200004c0
RBP: 00007ffdb1980120 R08: 0000000000000002 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: ffffffffffffffff
R13: 0000000000000004 R14: 0000000000000000 R15: 0000000000000000
audit: type=1804 audit(1573081658.451:84): pid=7704 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor036" name="/root/bus" dev="sda1" ino=1426 res=1
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
audit: type=1804 audit(1573081658.451:85): pid=7705 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor036" name="/root/bus" dev="sda1" ino=1426 res=1
CPU: 1 PID: 7705 Comm: syz-executor036 Not tainted 4.19.82 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x172/0x1f0 lib/dump_stack.c:113
 fail_dump lib/fault-inject.c:51 [inline]
 should_fail.cold+0xa/0x1b lib/fault-inject.c:149
 __should_failslab+0x121/0x190 mm/failslab.c:32
 should_failslab+0x9/0x14 mm/slab_common.c:1557
 slab_pre_alloc_hook mm/slab.h:424 [inline]
 slab_alloc mm/slab.c:3383 [inline]
 __do_kmalloc mm/slab.c:3725 [inline]
 __kmalloc+0x2e2/0x750 mm/slab.c:3736
 kmalloc include/linux/slab.h:520 [inline]
 kzalloc include/linux/slab.h:709 [inline]
 ima_alloc_init_template+0x65/0x3b0 security/integrity/ima/ima_api.c:47
 ima_store_measurement+0x1bc/0x3e0 security/integrity/ima/ima_api.c:294
 process_measurement+0x119e/0x1560 security/integrity/ima/ima_main.c:292
 ima_file_check+0xc5/0x110 security/integrity/ima/ima_main.c:391
 do_last fs/namei.c:3422 [inline]
 path_openat+0x1130/0x45e0 fs/namei.c:3534
 do_filp_open+0x1a1/0x280 fs/namei.c:3564
 do_sys_open+0x3fe/0x550 fs/open.c:1088
 __do_sys_open fs/open.c:1106 [inline]
 __se_sys_open fs/open.c:1101 [inline]
 __x64_sys_open+0x7e/0xc0 fs/open.c:1101
 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x441139
Code: e8 5c ae 02 00 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 bb 0a fc ff c3 66 2e 0f 1f 84 00 00 00 00
RSP: 002b:00007ffdb1980108 EFLAGS: 00000246 ORIG_RAX: 0000000000000002
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000441139
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200004c0
RBP: 00007ffdb1980120 R08: 0000000000000002 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: ffffffffffffffff
R13: 0000000000000004 R14: 0000000000000000 R15: 0000000000000000
audit: type=1804 audit(1573081658.821:86): pid=7705 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=add_template_measure cause=ENOMEM comm="syz-executor036" name="/root/bus" dev="sda1" ino=1426 res=0
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
audit: type=1804 audit(1573081658.841:87): pid=7706 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor036" name="/root/bus" dev="sda1" ino=1426 res=1
CPU: 1 PID: 7706 Comm: syz-executor036 Not tainted 4.19.82 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x172/0x1f0 lib/dump_stack.c:113
 fail_dump lib/fault-inject.c:51 [inline]
 should_fail.cold+0xa/0x1b lib/fault-inject.c:149
 __should_failslab+0x121/0x190 mm/failslab.c:32
 should_failslab+0x9/0x14 mm/slab_common.c:1557
 slab_pre_alloc_hook mm/slab.h:424 [inline]
 slab_alloc mm/slab.c:3383 [inline]
 __do_kmalloc mm/slab.c:3725 [inline]
 __kmalloc+0x2e2/0x750 mm/slab.c:3736
 kmalloc include/linux/slab.h:520 [inline]
 kzalloc include/linux/slab.h:709 [inline]
 ima_alloc_init_template+0x65/0x3b0 security/integrity/ima/ima_api.c:47
 ima_store_measurement+0x1bc/0x3e0 security/integrity/ima/ima_api.c:294
 process_measurement+0x119e/0x1560 security/integrity/ima/ima_main.c:292
 ima_file_check+0xc5/0x110 security/integrity/ima/ima_main.c:391
 do_last fs/namei.c:3422 [inline]
 path_openat+0x1130/0x45e0 fs/namei.c:3534
 do_filp_open+0x1a1/0x280 fs/namei.c:3564
 do_sys_open+0x3fe/0x550 fs/open.c:1088
 __do_sys_open fs/open.c:1106 [inline]
 __se_sys_open fs/open.c:1101 [inline]
 __x64_sys_open+0x7e/0xc0 fs/open.c:1101
 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x441139
Code: e8 5c ae 02 00 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 bb 0a fc ff c3 66 2e 0f 1f 84 00 00 00 00
RSP: 002b:00007ffdb1980108 EFLAGS: 00000246 ORIG_RAX: 0000000000000002
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000441139
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200004c0
RBP: 00007ffdb1980120 R08: 0000000000000002 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: ffffffffffffffff
R13: 0000000000000004 R14: 0000000000000000 R15: 0000000000000000
audit: type=1804 audit(1573081659.181:88): pid=7706 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=add_template_measure cause=ENOMEM comm="syz-executor036" name="/root/bus" dev="sda1" ino=1426 res=0
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
audit: type=1804 audit(1573081659.181:89): pid=7707 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor036" name="/root/bus" dev="sda1" ino=1426 res=1
CPU: 1 PID: 7707 Comm: syz-executor036 Not tainted 4.19.82 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x172/0x1f0 lib/dump_stack.c:113
 fail_dump lib/fault-inject.c:51 [inline]
 should_fail.cold+0xa/0x1b lib/fault-inject.c:149
 __should_failslab+0x121/0x190 mm/failslab.c:32
 should_failslab+0x9/0x14 mm/slab_common.c:1557
 slab_pre_alloc_hook mm/slab.h:424 [inline]
 slab_alloc mm/slab.c:3383 [inline]
 __do_kmalloc mm/slab.c:3725 [inline]
 __kmalloc+0x2e2/0x750 mm/slab.c:3736
 kmalloc include/linux/slab.h:520 [inline]
 kzalloc include/linux/slab.h:709 [inline]
 ima_write_template_field_data.isra.0+0x56/0x210 security/integrity/ima/ima_template_lib.c:45
 ima_eventdigest_init_common+0x126/0x250 security/integrity/ima/ima_template_lib.c:257
 ima_eventdigest_ng_init+0x60/0x150 security/integrity/ima/ima_template_lib.c:324
 ima_alloc_init_template+0x24f/0x3b0 security/integrity/ima/ima_api.c:57
 ima_store_measurement+0x1bc/0x3e0 security/integrity/ima/ima_api.c:294
 process_measurement+0x119e/0x1560 security/integrity/ima/ima_main.c:292
 ima_file_check+0xc5/0x110 security/integrity/ima/ima_main.c:391
 do_last fs/namei.c:3422 [inline]
 path_openat+0x1130/0x45e0 fs/namei.c:3534
 do_filp_open+0x1a1/0x280 fs/namei.c:3564
 do_sys_open+0x3fe/0x550 fs/open.c:1088
 __do_sys_open fs/open.c:1106 [inline]
 __se_sys_open fs/open.c:1101 [inline]
 __x64_sys_open+0x7e/0xc0 fs/open.c:1101
 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x441139
Code: e8 5c ae 02 00 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 bb 0a fc ff c3 66 2e 0f 1f 84 00 00 00 00
RSP: 002b:00007ffdb1980108 EFLAGS: 00000246 ORIG_RAX: 0000000000000002
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000441139
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200004c0
RBP: 00007ffdb1980120 R08: 0000000000000002 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: ffffffffffffffff
R13: 0000000000000004 R14: 0000000000000000 R15: 0000000000000000
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
CPU: 1 PID: 7708 Comm: syz-executor036 Not tainted 4.19.82 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x172/0x1f0 lib/dump_stack.c:113
 fail_dump lib/fault-inject.c:51 [inline]
 should_fail.cold+0xa/0x1b lib/fault-inject.c:149
 __should_failslab+0x121/0x190 mm/failslab.c:32
 should_failslab+0x9/0x14 mm/slab_common.c:1557
 slab_pre_alloc_hook mm/slab.h:424 [inline]
 slab_alloc mm/slab.c:3383 [inline]
 __do_kmalloc mm/slab.c:3725 [inline]
 __kmalloc+0x2e2/0x750 mm/slab.c:3736
 kmalloc include/linux/slab.h:520 [inline]
 kzalloc include/linux/slab.h:709 [inline]
 ima_write_template_field_data.isra.0+0x56/0x210 security/integrity/ima/ima_template_lib.c:45
 ima_eventdigest_init_common+0x126/0x250 security/integrity/ima/ima_template_lib.c:257
 ima_eventdigest_ng_init+0x60/0x150 security/integrity/ima/ima_template_lib.c:324
 ima_alloc_init_template+0x24f/0x3b0 security/integrity/ima/ima_api.c:57
 ima_store_measurement+0x1bc/0x3e0 security/integrity/ima/ima_api.c:294
 process_measurement+0x119e/0x1560 security/integrity/ima/ima_main.c:292
 ima_file_check+0xc5/0x110 security/integrity/ima/ima_main.c:391
 do_last fs/namei.c:3422 [inline]
 path_openat+0x1130/0x45e0 fs/namei.c:3534
 do_filp_open+0x1a1/0x280 fs/namei.c:3564
 do_sys_open+0x3fe/0x550 fs/open.c:1088
 __do_sys_open fs/open.c:1106 [inline]
 __se_sys_open fs/open.c:1101 [inline]
 __x64_sys_open+0x7e/0xc0 fs/open.c:1101
 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x441139
Code: e8 5c ae 02 00 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 bb 0a fc ff c3 66 2e 0f 1f 84 00 00 00 00
RSP: 002b:00007ffdb1980108 EFLAGS: 00000246 ORIG_RAX: 0000000000000002
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000441139
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200004c0
RBP: 00007ffdb1980120 R08: 0000000000000002 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: ffffffffffffffff
R13: 0000000000000004 R14: 0000000000000000 R15: 0000000000000000
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
CPU: 0 PID: 7709 Comm: syz-executor036 Not tainted 4.19.82 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x172/0x1f0 lib/dump_stack.c:113
 fail_dump lib/fault-inject.c:51 [inline]
 should_fail.cold+0xa/0x1b lib/fault-inject.c:149
 __should_failslab+0x121/0x190 mm/failslab.c:32
 should_failslab+0x9/0x14 mm/slab_common.c:1557
 slab_pre_alloc_hook mm/slab.h:424 [inline]
 slab_alloc mm/slab.c:3383 [inline]
 __do_kmalloc mm/slab.c:3725 [inline]
 __kmalloc+0x2e2/0x750 mm/slab.c:3736
 kmalloc include/linux/slab.h:520 [inline]
 kzalloc include/linux/slab.h:709 [inline]
 ima_write_template_field_data.isra.0+0x56/0x210 security/integrity/ima/ima_template_lib.c:45
 ima_eventdigest_init_common+0x126/0x250 security/integrity/ima/ima_template_lib.c:257
 ima_eventdigest_ng_init+0x60/0x150 security/integrity/ima/ima_template_lib.c:324
 ima_alloc_init_template+0x24f/0x3b0 security/integrity/ima/ima_api.c:57
 ima_store_measurement+0x1bc/0x3e0 security/integrity/ima/ima_api.c:294
 process_measurement+0x119e/0x1560 security/integrity/ima/ima_main.c:292
 ima_file_check+0xc5/0x110 security/integrity/ima/ima_main.c:391
 do_last fs/namei.c:3422 [inline]
 path_openat+0x1130/0x45e0 fs/namei.c:3534
 do_filp_open+0x1a1/0x280 fs/namei.c:3564
 do_sys_open+0x3fe/0x550 fs/open.c:1088
 __do_sys_open fs/open.c:1106 [inline]
 __se_sys_open fs/open.c:1101 [inline]
 __x64_sys_open+0x7e/0xc0 fs/open.c:1101
 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x441139
Code: e8 5c ae 02 00 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 bb 0a fc ff c3 66 2e 0f 1f 84 00 00 00 00
RSP: 002b:00007ffdb1980108 EFLAGS: 00000246 ORIG_RAX: 0000000000000002
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000441139
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200004c0
RBP: 00007ffdb1980120 R08: 0000000000000002 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: ffffffffffffffff
R13: 0000000000000004 R14: 0000000000000000 R15: 0000000000000000
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
CPU: 1 PID: 7710 Comm: syz-executor036 Not tainted 4.19.82 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x172/0x1f0 lib/dump_stack.c:113
 fail_dump lib/fault-inject.c:51 [inline]
 should_fail.cold+0xa/0x1b lib/fault-inject.c:149
 __should_failslab+0x121/0x190 mm/failslab.c:32
 should_failslab+0x9/0x14 mm/slab_common.c:1557
 slab_pre_alloc_hook mm/slab.h:424 [inline]
 slab_alloc mm/slab.c:3383 [inline]
 __do_kmalloc mm/slab.c:3725 [inline]
 __kmalloc+0x2e2/0x750 mm/slab.c:3736
 kmalloc include/linux/slab.h:520 [inline]
 kzalloc include/linux/slab.h:709 [inline]
 ima_alloc_init_template+0x65/0x3b0 security/integrity/ima/ima_api.c:47
 ima_store_measurement+0x1bc/0x3e0 security/integrity/ima/ima_api.c:294
 process_measurement+0x119e/0x1560 security/integrity/ima/ima_main.c:292
 ima_file_check+0xc5/0x110 security/integrity/ima/ima_main.c:391
 do_last fs/namei.c:3422 [inline]
 path_openat+0x1130/0x45e0 fs/namei.c:3534
 do_filp_open+0x1a1/0x280 fs/namei.c:3564
 do_sys_open+0x3fe/0x550 fs/open.c:1088
 __do_sys_open fs/open.c:1106 [inline]
 __se_sys_open fs/open.c:1101 [inline]
 __x64_sys_open+0x7e/0xc0 fs/open.c:1101
 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x441139
Code: e8 5c ae 02 00 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 bb 0a fc ff c3 66 2e 0f 1f 84 00 00 00 00
RSP: 002b:00007ffdb1980108 EFLAGS: 00000246 ORIG_RAX: 0000000000000002
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000441139
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200004c0
RBP: 00007ffdb1980120 R08: 0000000000000002 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: ffffffffffffffff
R13: 0000000000000004 R14: 0000000000000000 R15: 0000000000000000
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
CPU: 0 PID: 7711 Comm: syz-executor036 Not tainted 4.19.82 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x172/0x1f0 lib/dump_stack.c:113
 fail_dump lib/fault-inject.c:51 [inline]
 should_fail.cold+0xa/0x1b lib/fault-inject.c:149
 __should_failslab+0x121/0x190 mm/failslab.c:32
 should_failslab+0x9/0x14 mm/slab_common.c:1557
 slab_pre_alloc_hook mm/slab.h:424 [inline]
 slab_alloc mm/slab.c:3383 [inline]
 __do_kmalloc mm/slab.c:3725 [inline]
 __kmalloc+0x71/0x750 mm/slab.c:3736
 kmalloc include/linux/slab.h:520 [inline]
 context_struct_to_string security/selinux/ss/services.c:1253 [inline]
 context_struct_to_string+0x428/0x880 security/selinux/ss/services.c:1223
 security_sid_to_context_core.isra.0+0x226/0x2f0 security/selinux/ss/services.c:1329
 security_sid_to_context+0x35/0x40 security/selinux/ss/services.c:1351
 selinux_secid_to_secctx+0x2d/0x40 security/selinux/hooks.c:6615
 security_secid_to_secctx+0x75/0xc0 security/security.c:1321
 audit_log_task_context+0xf7/0x170 kernel/audit.c:2214
 integrity_audit_msg+0x265/0x480 security/integrity/integrity_audit.c:47
 ima_add_violation+0x187/0x1f0 security/integrity/ima/ima_api.c:154
 ima_rdwr_violation_check security/integrity/ima/ima_main.c:119 [inline]
 process_measurement+0xb3e/0x1560 security/integrity/ima/ima_main.c:214
 ima_file_check+0xc5/0x110 security/integrity/ima/ima_main.c:391
 do_last fs/namei.c:3422 [inline]
 path_openat+0x1130/0x45e0 fs/namei.c:3534
 do_filp_open+0x1a1/0x280 fs/namei.c:3564
 do_sys_open+0x3fe/0x550 fs/open.c:1088
 __do_sys_open fs/open.c:1106 [inline]
 __se_sys_open fs/open.c:1101 [inline]
 __x64_sys_open+0x7e/0xc0 fs/open.c:1101
 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x441139
Code: e8 5c ae 02 00 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 bb 0a fc ff c3 66 2e 0f 1f 84 00 00 00 00
RSP: 002b:00007ffdb1980108 EFLAGS: 00000246 ORIG_RAX: 0000000000000002
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000441139
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200004c0
RBP: 00007ffdb1980120 R08: 0000000000000002 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: ffffffffffffffff
R13: 0000000000000004 R14: 0000000000000000 R15: 0000000000000000
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
CPU: 0 PID: 7712 Comm: syz-executor036 Not tainted 4.19.82 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x172/0x1f0 lib/dump_stack.c:113
 fail_dump lib/fault-inject.c:51 [inline]
 should_fail.cold+0xa/0x1b lib/fault-inject.c:149
 __should_failslab+0x121/0x190 mm/failslab.c:32
 should_failslab+0x9/0x14 mm/slab_common.c:1557
 slab_pre_alloc_hook mm/slab.h:424 [inline]
 slab_alloc mm/slab.c:3383 [inline]
 __do_kmalloc mm/slab.c:3725 [inline]
 __kmalloc+0x71/0x750 mm/slab.c:3736
 kmalloc include/linux/slab.h:520 [inline]
 context_struct_to_string security/selinux/ss/services.c:1253 [inline]
 context_struct_to_string+0x428/0x880 security/selinux/ss/services.c:1223
 security_sid_to_context_core.isra.0+0x226/0x2f0 security/selinux/ss/services.c:1329
 security_sid_to_context+0x35/0x40 security/selinux/ss/services.c:1351
 selinux_secid_to_secctx+0x2d/0x40 security/selinux/hooks.c:6615
 security_secid_to_secctx+0x75/0xc0 security/security.c:1321
 audit_log_task_context+0xf7/0x170 kernel/audit.c:2214
 integrity_audit_msg+0x265/0x480 security/integrity/integrity_audit.c:47
 ima_add_violation+0x187/0x1f0 security/integrity/ima/ima_api.c:154
 ima_rdwr_violation_check security/integrity/ima/ima_main.c:119 [inline]
 process_measurement+0xb3e/0x1560 security/integrity/ima/ima_main.c:214
 ima_file_check+0xc5/0x110 security/integrity/ima/ima_main.c:391
 do_last fs/namei.c:3422 [inline]
 path_openat+0x1130/0x45e0 fs/namei.c:3534
 do_filp_open+0x1a1/0x280 fs/namei.c:3564
 do_sys_open+0x3fe/0x550 fs/open.c:1088
 __do_sys_open fs/open.c:1106 [inline]
 __se_sys_open fs/open.c:1101 [inline]
 __x64_sys_open+0x7e/0xc0 fs/open.c:1101
 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x441139
Code: e8 5c ae 02 00 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 bb 0a fc ff c3 66 2e 0f 1f 84 00 00 00 00
RSP: 002b:00007ffdb1980108 EFLAGS: 00000246 ORIG_RAX: 0000000000000002
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000441139
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200004c0
RBP: 00007ffdb1980120 R08: 0000000000000002 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: ffffffffffffffff
R13: 0000000000000004 R14: 0000000000000000 R15: 0000000000000000
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
CPU: 1 PID: 7713 Comm: syz-executor036 Not tainted 4.19.82 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x172/0x1f0 lib/dump_stack.c:113
 fail_dump lib/fault-inject.c:51 [inline]
 should_fail.cold+0xa/0x1b lib/fault-inject.c:149
 __should_failslab+0x121/0x190 mm/failslab.c:32
 should_failslab+0x9/0x14 mm/slab_common.c:1557
 slab_pre_alloc_hook mm/slab.h:424 [inline]
 slab_alloc mm/slab.c:3383 [inline]
 __do_kmalloc mm/slab.c:3725 [inline]
 __kmalloc+0x71/0x750 mm/slab.c:3736
 kmalloc include/linux/slab.h:520 [inline]
 context_struct_to_string security/selinux/ss/services.c:1253 [inline]
 context_struct_to_string+0x428/0x880 security/selinux/ss/services.c:1223
 security_sid_to_context_core.isra.0+0x226/0x2f0 security/selinux/ss/services.c:1329
 security_sid_to_context+0x35/0x40 security/selinux/ss/services.c:1351
 selinux_secid_to_secctx+0x2d/0x40 security/selinux/hooks.c:6615
 security_secid_to_secctx+0x75/0xc0 security/security.c:1321
 audit_log_task_context+0xf7/0x170 kernel/audit.c:2214
 integrity_audit_msg+0x265/0x480 security/integrity/integrity_audit.c:47
 ima_add_violation+0x187/0x1f0 security/integrity/ima/ima_api.c:154
 ima_rdwr_violation_check security/integrity/ima/ima_main.c:119 [inline]
 process_measurement+0xb3e/0x1560 security/integrity/ima/ima_main.c:214
 ima_file_check+0xc5/0x110 security/integrity/ima/ima_main.c:391
 do_last fs/namei.c:3422 [inline]
 path_openat+0x1130/0x45e0 fs/namei.c:3534
 do_filp_open+0x1a1/0x280 fs/namei.c:3564
 do_sys_open+0x3fe/0x550 fs/open.c:1088
 __do_sys_open fs/open.c:1106 [inline]
 __se_sys_open fs/open.c:1101 [inline]
 __x64_sys_open+0x7e/0xc0 fs/open.c:1101
 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x441139
Code: e8 5c ae 02 00 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 bb 0a fc ff c3 66 2e 0f 1f 84 00 00 00 00
RSP: 002b:00007ffdb1980108 EFLAGS: 00000246 ORIG_RAX: 0000000000000002
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000441139
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200004c0
RBP: 00007ffdb1980120 R08: 0000000000000002 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: ffffffffffffffff
R13: 0000000000000004 R14: 0000000000000000 R15: 0000000000000000
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
CPU: 0 PID: 7714 Comm: syz-executor036 Not tainted 4.19.82 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x172/0x1f0 lib/dump_stack.c:113
 fail_dump lib/fault-inject.c:51 [inline]
 should_fail.cold+0xa/0x1b lib/fault-inject.c:149
 __should_failslab+0x121/0x190 mm/failslab.c:32
 should_failslab+0x9/0x14 mm/slab_common.c:1557
 slab_pre_alloc_hook mm/slab.h:424 [inline]
 slab_alloc mm/slab.c:3383 [inline]
 __do_kmalloc mm/slab.c:3725 [inline]
 __kmalloc+0x71/0x750 mm/slab.c:3736
 kmalloc include/linux/slab.h:520 [inline]
 context_struct_to_string security/selinux/ss/services.c:1253 [inline]
 context_struct_to_string+0x428/0x880 security/selinux/ss/services.c:1223
 security_sid_to_context_core.isra.0+0x226/0x2f0 security/selinux/ss/services.c:1329
 security_sid_to_context+0x35/0x40 security/selinux/ss/services.c:1351
 selinux_secid_to_secctx+0x2d/0x40 security/selinux/hooks.c:6615
 security_secid_to_secctx+0x75/0xc0 security/security.c:1321
 audit_log_task_context+0xf7/0x170 kernel/audit.c:2214
 integrity_audit_msg+0x265/0x480 security/integrity/integrity_audit.c:47
 ima_add_violation+0x187/0x1f0 security/integrity/ima/ima_api.c:154
 ima_rdwr_violation_check security/integrity/ima/ima_main.c:119 [inline]
 process_measurement+0xb3e/0x1560 security/integrity/ima/ima_main.c:214
 ima_file_check+0xc5/0x110 security/integrity/ima/ima_main.c:391
 do_last fs/namei.c:3422 [inline]
 path_openat+0x1130/0x45e0 fs/namei.c:3534
 do_filp_open+0x1a1/0x280 fs/namei.c:3564
 do_sys_open+0x3fe/0x550 fs/open.c:1088
 __do_sys_open fs/open.c:1106 [inline]
 __se_sys_open fs/open.c:1101 [inline]
 __x64_sys_open+0x7e/0xc0 fs/open.c:1101
 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x441139
Code: e8 5c ae 02 00 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 bb 0a fc ff c3 66 2e 0f 1f 84 00 00 00 00
RSP: 002b:00007ffdb1980108 EFLAGS: 00000246 ORIG_RAX: 0000000000000002
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000441139
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200004c0
RBP: 00007ffdb1980120 R08: 0000000000000002 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: ffffffffffffffff
R13: 0000000000000004 R14: 0000000000000000 R15: 0000000000000000
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
CPU: 1 PID: 7715 Comm: syz-executor036 Not tainted 4.19.82 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x172/0x1f0 lib/dump_stack.c:113
 fail_dump lib/fault-inject.c:51 [inline]
 should_fail.cold+0xa/0x1b lib/fault-inject.c:149
 __should_failslab+0x121/0x190 mm/failslab.c:32
 should_failslab+0x9/0x14 mm/slab_common.c:1557
 slab_pre_alloc_hook mm/slab.h:424 [inline]
 slab_alloc mm/slab.c:3383 [inline]
 __do_kmalloc mm/slab.c:3725 [inline]
 __kmalloc+0x2e2/0x750 mm/slab.c:3736
 kmalloc include/linux/slab.h:520 [inline]
 kzalloc include/linux/slab.h:709 [inline]
 ima_alloc_init_template+0x65/0x3b0 security/integrity/ima/ima_api.c:47
 ima_store_measurement+0x1bc/0x3e0 security/integrity/ima/ima_api.c:294
 process_measurement+0x119e/0x1560 security/integrity/ima/ima_main.c:292
 ima_file_check+0xc5/0x110 security/integrity/ima/ima_main.c:391
 do_last fs/namei.c:3422 [inline]
 path_openat+0x1130/0x45e0 fs/namei.c:3534
 do_filp_open+0x1a1/0x280 fs/namei.c:3564
 do_sys_open+0x3fe/0x550 fs/open.c:1088
 __do_sys_open fs/open.c:1106 [inline]
 __se_sys_open fs/open.c:1101 [inline]
 __x64_sys_open+0x7e/0xc0 fs/open.c:1101
 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x441139
Code: e8 5c ae 02 00 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 bb 0a fc ff c3 66 2e 0f 1f 84 00 00 00 00
RSP: 002b:00007ffdb1980108 EFLAGS: 00000246 ORIG_RAX: 0000000000000002
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000441139
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200004c0
RBP: 00007ffdb1980120 R08: 0000000000000002 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: ffffffffffffffff
R13: 0000000000000004 R14: 0000000000000000 R15: 0000000000000000
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
CPU: 0 PID: 7716 Comm: syz-executor036 Not tainted 4.19.82 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x172/0x1f0 lib/dump_stack.c:113
 fail_dump lib/fault-inject.c:51 [inline]
 should_fail.cold+0xa/0x1b lib/fault-inject.c:149
 __should_failslab+0x121/0x190 mm/failslab.c:32
 should_failslab+0x9/0x14 mm/slab_common.c:1557
 slab_pre_alloc_hook mm/slab.h:424 [inline]
 slab_alloc mm/slab.c:3383 [inline]
 __do_kmalloc mm/slab.c:3725 [inline]
 __kmalloc+0x71/0x750 mm/slab.c:3736
 kmalloc include/linux/slab.h:520 [inline]
 context_struct_to_string security/selinux/ss/services.c:1253 [inline]
 context_struct_to_string+0x428/0x880 security/selinux/ss/services.c:1223
 security_sid_to_context_core.isra.0+0x226/0x2f0 security/selinux/ss/services.c:1329
 security_sid_to_context+0x35/0x40 security/selinux/ss/services.c:1351
 selinux_secid_to_secctx+0x2d/0x40 security/selinux/hooks.c:6615
 security_secid_to_secctx+0x75/0xc0 security/security.c:1321
 audit_log_task_context+0xf7/0x170 kernel/audit.c:2214
 integrity_audit_msg+0x265/0x480 security/integrity/integrity_audit.c:47
 ima_add_violation+0x187/0x1f0 security/integrity/ima/ima_api.c:154
 ima_rdwr_violation_check security/integrity/ima/ima_main.c:119 [inline]
 process_measurement+0xb3e/0x1560 security/integrity/ima/ima_main.c:214
 ima_file_check+0xc5/0x110 security/integrity/ima/ima_main.c:391
 do_last fs/namei.c:3422 [inline]
 path_openat+0x1130/0x45e0 fs/namei.c:3534
 do_filp_open+0x1a1/0x280 fs/namei.c:3564
 do_sys_open+0x3fe/0x550 fs/open.c:1088
 __do_sys_open fs/open.c:1106 [inline]
 __se_sys_open fs/open.c:1101 [inline]
 __x64_sys_open+0x7e/0xc0 fs/open.c:1101
 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x441139
Code: e8 5c ae 02 00 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 bb 0a fc ff c3 66 2e 0f 1f 84 00 00 00 00
RSP: 002b:00007ffdb1980108 EFLAGS: 00000246 ORIG_RAX: 0000000000000002
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000441139
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200004c0
RBP: 00007ffdb1980120 R08: 0000000000000002 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: ffffffffffffffff
R13: 0000000000000004 R14: 0000000000000000 R15: 0000000000000000
audit_panic: 17 callbacks suppressed
audit: error in audit_log_task_context
audit: type=1804 audit(1573081662.581:103): pid=7716 uid=0 auid=4294967295 ses=4294967295 op=invalid_pcr cause=open_writers comm="syz-executor036" name="/root/bus" dev="sda1" ino=1426 res=1
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
audit: type=1804 audit(1573081663.001:104): pid=7717 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor036" name="/root/bus" dev="sda1" ino=1426 res=1
CPU: 0 PID: 7717 Comm: syz-executor036 Not tainted 4.19.82 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x172/0x1f0 lib/dump_stack.c:113
 fail_dump lib/fault-inject.c:51 [inline]
 should_fail.cold+0xa/0x1b lib/fault-inject.c:149
 __should_failslab+0x121/0x190 mm/failslab.c:32
 should_failslab+0x9/0x14 mm/slab_common.c:1557
 slab_pre_alloc_hook mm/slab.h:424 [inline]
 slab_alloc mm/slab.c:3383 [inline]
 __do_kmalloc mm/slab.c:3725 [inline]
 __kmalloc+0x2e2/0x750 mm/slab.c:3736
 kmalloc include/linux/slab.h:520 [inline]
 kzalloc include/linux/slab.h:709 [inline]
 ima_alloc_init_template+0x65/0x3b0 security/integrity/ima/ima_api.c:47
 ima_store_measurement+0x1bc/0x3e0 security/integrity/ima/ima_api.c:294
 process_measurement+0x119e/0x1560 security/integrity/ima/ima_main.c:292
 ima_file_check+0xc5/0x110 security/integrity/ima/ima_main.c:391
 do_last fs/namei.c:3422 [inline]
 path_openat+0x1130/0x45e0 fs/namei.c:3534
 do_filp_open+0x1a1/0x280 fs/namei.c:3564
 do_sys_open+0x3fe/0x550 fs/open.c:1088
 __do_sys_open fs/open.c:1106 [inline]
 __se_sys_open fs/open.c:1101 [inline]
 __x64_sys_open+0x7e/0xc0 fs/open.c:1101
 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x441139
Code: e8 5c ae 02 00 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 bb 0a fc ff c3 66 2e 0f 1f 84 00 00 00 00
RSP: 002b:00007ffdb1980108 EFLAGS: 00000246 ORIG_RAX: 0000000000000002
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000441139
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200004c0
RBP: 00007ffdb1980120 R08: 0000000000000002 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: ffffffffffffffff
R13: 0000000000000004 R14: 0000000000000000 R15: 0000000000000000
audit: type=1804 audit(1573081663.351:105): pid=7717 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=add_template_measure cause=ENOMEM comm="syz-executor036" name="/root/bus" dev="sda1" ino=1426 res=0
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
CPU: 1 PID: 7718 Comm: syz-executor036 Not tainted 4.19.82 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x172/0x1f0 lib/dump_stack.c:113
 fail_dump lib/fault-inject.c:51 [inline]
 should_fail.cold+0xa/0x1b lib/fault-inject.c:149
 __should_failslab+0x121/0x190 mm/failslab.c:32
 should_failslab+0x9/0x14 mm/slab_common.c:1557
 slab_pre_alloc_hook mm/slab.h:424 [inline]
 slab_alloc mm/slab.c:3383 [inline]
 __do_kmalloc mm/slab.c:3725 [inline]
 __kmalloc+0x71/0x750 mm/slab.c:3736
 kmalloc include/linux/slab.h:520 [inline]
 context_struct_to_string security/selinux/ss/services.c:1253 [inline]
 context_struct_to_string+0x428/0x880 security/selinux/ss/services.c:1223
 security_sid_to_context_core.isra.0+0x226/0x2f0 security/selinux/ss/services.c:1329
 security_sid_to_context+0x35/0x40 security/selinux/ss/services.c:1351
 selinux_secid_to_secctx+0x2d/0x40 security/selinux/hooks.c:6615
 security_secid_to_secctx+0x75/0xc0 security/security.c:1321
 audit_log_task_context+0xf7/0x170 kernel/audit.c:2214
 integrity_audit_msg+0x265/0x480 security/integrity/integrity_audit.c:47
 ima_add_violation+0x187/0x1f0 security/integrity/ima/ima_api.c:154
 ima_rdwr_violation_check security/integrity/ima/ima_main.c:119 [inline]
 process_measurement+0xb3e/0x1560 security/integrity/ima/ima_main.c:214
 ima_file_check+0xc5/0x110 security/integrity/ima/ima_main.c:391
 do_last fs/namei.c:3422 [inline]
 path_openat+0x1130/0x45e0 fs/namei.c:3534
 do_filp_open+0x1a1/0x280 fs/namei.c:3564
 do_sys_open+0x3fe/0x550 fs/open.c:1088
 __do_sys_open fs/open.c:1106 [inline]
 __se_sys_open fs/open.c:1101 [inline]
 __x64_sys_open+0x7e/0xc0 fs/open.c:1101
 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x441139
Code: e8 5c ae 02 00 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 bb 0a fc ff c3 66 2e 0f 1f 84 00 00 00 00
RSP: 002b:00007ffdb1980108 EFLAGS: 00000246 ORIG_RAX: 0000000000000002
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000441139
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200004c0
RBP: 00007ffdb1980120 R08: 0000000000000002 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: ffffffffffffffff
R13: 0000000000000004 R14: 0000000000000000 R15: 0000000000000000
audit: error in audit_log_task_context
audit: type=1804 audit(1573081663.351:106): pid=7718 uid=0 auid=4294967295 ses=4294967295 op=invalid_pcr cause=open_writers comm="syz-executor036" name="/root/bus" dev="sda1" ino=1426 res=1
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
audit: type=1804 audit(1573081663.791:107): pid=7719 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor036" name="/root/bus" dev="sda1" ino=1426 res=1
CPU: 1 PID: 7719 Comm: syz-executor036 Not tainted 4.19.82 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x172/0x1f0 lib/dump_stack.c:113
 fail_dump lib/fault-inject.c:51 [inline]
 should_fail.cold+0xa/0x1b lib/fault-inject.c:149
 __should_failslab+0x121/0x190 mm/failslab.c:32
 should_failslab+0x9/0x14 mm/slab_common.c:1557
 slab_pre_alloc_hook mm/slab.h:424 [inline]
 slab_alloc mm/slab.c:3383 [inline]
 __do_kmalloc mm/slab.c:3725 [inline]
 __kmalloc+0x2e2/0x750 mm/slab.c:3736
 kmalloc include/linux/slab.h:520 [inline]
 kzalloc include/linux/slab.h:709 [inline]
 ima_alloc_init_template+0x65/0x3b0 security/integrity/ima/ima_api.c:47
 ima_store_measurement+0x1bc/0x3e0 security/integrity/ima/ima_api.c:294
 process_measurement+0x119e/0x1560 security/integrity/ima/ima_main.c:292
 ima_file_check+0xc5/0x110 security/integrity/ima/ima_main.c:391
 do_last fs/namei.c:3422 [inline]
 path_openat+0x1130/0x45e0 fs/namei.c:3534
 do_filp_open+0x1a1/0x280 fs/namei.c:3564
 do_sys_open+0x3fe/0x550 fs/open.c:1088
 __do_sys_open fs/open.c:1106 [inline]
 __se_sys_open fs/open.c:1101 [inline]
 __x64_sys_open+0x7e/0xc0 fs/open.c:1101
 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x441139
Code: e8 5c ae 02 00 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 bb 0a fc ff c3 66 2e 0f 1f 84 00 00 00 00
RSP: 002b:00007ffdb1980108 EFLAGS: 00000246 ORIG_RAX: 0000000000000002
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000441139
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200004c0
RBP: 00007ffdb1980120 R08: 0000000000000002 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: ffffffffffffffff
R13: 0000000000000004 R14: 0000000000000000 R15: 0000000000000000
audit: type=1804 audit(1573081664.141:108): pid=7719 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=add_template_measure cause=ENOMEM comm="syz-executor036" name="/root/bus" dev="sda1" ino=1426 res=0
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
CPU: 1 PID: 7720 Comm: syz-executor036 Not tainted 4.19.82 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x172/0x1f0 lib/dump_stack.c:113
 fail_dump lib/fault-inject.c:51 [inline]
 should_fail.cold+0xa/0x1b lib/fault-inject.c:149
 __should_failslab+0x121/0x190 mm/failslab.c:32
 should_failslab+0x9/0x14 mm/slab_common.c:1557
 slab_pre_alloc_hook mm/slab.h:424 [inline]
 slab_alloc mm/slab.c:3383 [inline]
 __do_kmalloc mm/slab.c:3725 [inline]
 __kmalloc+0x71/0x750 mm/slab.c:3736
 kmalloc include/linux/slab.h:520 [inline]
 context_struct_to_string security/selinux/ss/services.c:1253 [inline]
 context_struct_to_string+0x428/0x880 security/selinux/ss/services.c:1223
 security_sid_to_context_core.isra.0+0x226/0x2f0 security/selinux/ss/services.c:1329
 security_sid_to_context+0x35/0x40 security/selinux/ss/services.c:1351
 selinux_secid_to_secctx+0x2d/0x40 security/selinux/hooks.c:6615
 security_secid_to_secctx+0x75/0xc0 security/security.c:1321
 audit_log_task_context+0xf7/0x170 kernel/audit.c:2214
 integrity_audit_msg+0x265/0x480 security/integrity/integrity_audit.c:47
 ima_add_violation+0x187/0x1f0 security/integrity/ima/ima_api.c:154
 ima_rdwr_violation_check security/integrity/ima/ima_main.c:119 [inline]
 process_measurement+0xb3e/0x1560 security/integrity/ima/ima_main.c:214
 ima_file_check+0xc5/0x110 security/integrity/ima/ima_main.c:391
 do_last fs/namei.c:3422 [inline]
 path_openat+0x1130/0x45e0 fs/namei.c:3534
 do_filp_open+0x1a1/0x280 fs/namei.c:3564
 do_sys_open+0x3fe/0x550 fs/open.c:1088
 __do_sys_open fs/open.c:1106 [inline]
 __se_sys_open fs/open.c:1101 [inline]
 __x64_sys_open+0x7e/0xc0 fs/open.c:1101
 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x441139
Code: e8 5c ae 02 00 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 bb 0a fc ff c3 66 2e 0f 1f 84 00 00 00 00
RSP: 002b:00007ffdb1980108 EFLAGS: 00000246 ORIG_RAX: 0000000000000002
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000441139
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200004c0
RBP: 00007ffdb1980120 R08: 0000000000000002 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: ffffffffffffffff
R13: 0000000000000004 R14: 0000000000000000 R15: 0000000000000000
audit: error in audit_log_task_context
audit: type=1804 audit(1573081664.161:109): pid=7720 uid=0 auid=4294967295 ses=4294967295 op=invalid_pcr cause=open_writers comm="syz-executor036" name="/root/bus" dev="sda1" ino=1426 res=1
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
CPU: 1 PID: 7721 Comm: syz-executor036 Not tainted 4.19.82 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x172/0x1f0 lib/dump_stack.c:113
 fail_dump lib/fault-inject.c:51 [inline]
 should_fail.cold+0xa/0x1b lib/fault-inject.c:149
 __should_failslab+0x121/0x190 mm/failslab.c:32
 should_failslab+0x9/0x14 mm/slab_common.c:1557
 slab_pre_alloc_hook mm/slab.h:424 [inline]
 slab_alloc mm/slab.c:3383 [inline]
 __do_kmalloc mm/slab.c:3725 [inline]
 __kmalloc+0x2e2/0x750 mm/slab.c:3736
 kmalloc include/linux/slab.h:520 [inline]
 kzalloc include/linux/slab.h:709 [inline]
 ima_alloc_init_template+0x65/0x3b0 security/integrity/ima/ima_api.c:47
 ima_store_measurement+0x1bc/0x3e0 security/integrity/ima/ima_api.c:294
 process_measurement+0x119e/0x1560 security/integrity/ima/ima_main.c:292
 ima_file_check+0xc5/0x110 security/integrity/ima/ima_main.c:391
 do_last fs/namei.c:3422 [inline]
 path_openat+0x1130/0x45e0 fs/namei.c:3534
 do_filp_open+0x1a1/0x280 fs/namei.c:3564
 do_sys_open+0x3fe/0x550 fs/open.c:1088
 __do_sys_open fs/open.c:1106 [inline]
 __se_sys_open fs/open.c:1101 [inline]
 __x64_sys_open+0x7e/0xc0 fs/open.c:1101
 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x441139
Code: e8 5c ae 02 00 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 bb 0a fc ff c3 66 2e 0f 1f 84 00 00 00 00
RSP: 002b:00007ffdb1980108 EFLAGS: 00000246 ORIG_RAX: 0000000000000002
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000441139
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200004c0
RBP: 00007ffdb1980120 R08: 0000000000000002 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: ffffffffffffffff
R13: 0000000000000004 R14: 0000000000000000 R15: 0000000000000000
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
CPU: 0 PID: 7722 Comm: syz-executor036 Not tainted 4.19.82 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x172/0x1f0 lib/dump_stack.c:113
 fail_dump lib/fault-inject.c:51 [inline]
 should_fail.cold+0xa/0x1b lib/fault-inject.c:149
 __should_failslab+0x121/0x190 mm/failslab.c:32
 should_failslab+0x9/0x14 mm/slab_common.c:1557
 slab_pre_alloc_hook mm/slab.h:424 [inline]
 slab_alloc mm/slab.c:3383 [inline]
 __do_kmalloc mm/slab.c:3725 [inline]
 __kmalloc+0x71/0x750 mm/slab.c:3736
 kmalloc include/linux/slab.h:520 [inline]
 context_struct_to_string security/selinux/ss/services.c:1253 [inline]
 context_struct_to_string+0x428/0x880 security/selinux/ss/services.c:1223
 security_sid_to_context_core.isra.0+0x226/0x2f0 security/selinux/ss/services.c:1329
 security_sid_to_context+0x35/0x40 security/selinux/ss/services.c:1351
 selinux_secid_to_secctx+0x2d/0x40 security/selinux/hooks.c:6615
 security_secid_to_secctx+0x75/0xc0 security/security.c:1321
 audit_log_task_context+0xf7/0x170 kernel/audit.c:2214
 integrity_audit_msg+0x265/0x480 security/integrity/integrity_audit.c:47
 ima_add_violation+0x187/0x1f0 security/integrity/ima/ima_api.c:154
 ima_rdwr_violation_check security/integrity/ima/ima_main.c:119 [inline]
 process_measurement+0xb3e/0x1560 security/integrity/ima/ima_main.c:214
 ima_file_check+0xc5/0x110 security/integrity/ima/ima_main.c:391
 do_last fs/namei.c:3422 [inline]
 path_openat+0x1130/0x45e0 fs/namei.c:3534
 do_filp_open+0x1a1/0x280 fs/namei.c:3564
 do_sys_open+0x3fe/0x550 fs/open.c:1088
 __do_sys_open fs/open.c:1106 [inline]
 __se_sys_open fs/open.c:1101 [inline]
 __x64_sys_open+0x7e/0xc0 fs/open.c:1101
 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x441139
Code: e8 5c ae 02 00 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 bb 0a fc ff c3 66 2e 0f 1f 84 00 00 00 00
RSP: 002b:00007ffdb1980108 EFLAGS: 00000246 ORIG_RAX: 0000000000000002
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000441139
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200004c0
RBP: 00007ffdb1980120 R08: 0000000000000002 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: ffffffffffffffff
R13: 0000000000000004 R14: 0000000000000000 R15: 0000000000000000
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
CPU: 1 PID: 7723 Comm: syz-executor036 Not tainted 4.19.82 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x172/0x1f0 lib/dump_stack.c:113
 fail_dump lib/fault-inject.c:51 [inline]
 should_fail.cold+0xa/0x1b lib/fault-inject.c:149
 __should_failslab+0x121/0x190 mm/failslab.c:32
 should_failslab+0x9/0x14 mm/slab_common.c:1557
 slab_pre_alloc_hook mm/slab.h:424 [inline]
 slab_alloc mm/slab.c:3383 [inline]
 __do_kmalloc mm/slab.c:3725 [inline]
 __kmalloc+0x2e2/0x750 mm/slab.c:3736
 kmalloc include/linux/slab.h:520 [inline]
 kzalloc include/linux/slab.h:709 [inline]
 ima_alloc_init_template+0x65/0x3b0 security/integrity/ima/ima_api.c:47
 ima_store_measurement+0x1bc/0x3e0 security/integrity/ima/ima_api.c:294
 process_measurement+0x119e/0x1560 security/integrity/ima/ima_main.c:292
 ima_file_check+0xc5/0x110 security/integrity/ima/ima_main.c:391
 do_last fs/namei.c:3422 [inline]
 path_openat+0x1130/0x45e0 fs/namei.c:3534
 do_filp_open+0x1a1/0x280 fs/namei.c:3564
 do_sys_open+0x3fe/0x550 fs/open.c:1088
 __do_sys_open fs/open.c:1106 [inline]
 __se_sys_open fs/open.c:1101 [inline]
 __x64_sys_open+0x7e/0xc0 fs/open.c:1101
 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x441139
Code: e8 5c ae 02 00 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 bb 0a fc ff c3 66 2e 0f 1f 84 00 00 00 00
RSP: 002b:00007ffdb1980108 EFLAGS: 00000246 ORIG_RAX: 0000000000000002
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000441139
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200004c0
RBP: 00007ffdb1980120 R08: 0000000000000002 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: ffffffffffffffff
R13: 0000000000000004 R14: 0000000000000000 R15: 0000000000000000
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
CPU: 0 PID: 7724 Comm: syz-executor036 Not tainted 4.19.82 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x172/0x1f0 lib/dump_stack.c:113
 fail_dump lib/fault-inject.c:51 [inline]
 should_fail.cold+0xa/0x1b lib/fault-inject.c:149
 __should_failslab+0x121/0x190 mm/failslab.c:32
 should_failslab+0x9/0x14 mm/slab_common.c:1557
 slab_pre_alloc_hook mm/slab.h:424 [inline]
 slab_alloc mm/slab.c:3383 [inline]
 __do_kmalloc mm/slab.c:3725 [inline]
 __kmalloc+0x2e2/0x750 mm/slab.c:3736
 kmalloc include/linux/slab.h:520 [inline]
 kzalloc include/linux/slab.h:709 [inline]
 ima_alloc_init_template+0x65/0x3b0 security/integrity/ima/ima_api.c:47
 ima_store_measurement+0x1bc/0x3e0 security/integrity/ima/ima_api.c:294
 process_measurement+0x119e/0x1560 security/integrity/ima/ima_main.c:292
 ima_file_check+0xc5/0x110 security/integrity/ima/ima_main.c:391
 do_last fs/namei.c:3422 [inline]
 path_openat+0x1130/0x45e0 fs/namei.c:3534
 do_filp_open+0x1a1/0x280 fs/namei.c:3564
 do_sys_open+0x3fe/0x550 fs/open.c:1088
 __do_sys_open fs/open.c:1106 [inline]
 __se_sys_open fs/open.c:1101 [inline]
 __x64_sys_open+0x7e/0xc0 fs/open.c:1101
 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x441139
Code: e8 5c ae 02 00 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 bb 0a fc ff c3 66 2e 0f 1f 84 00 00 00 00
RSP: 002b:00007ffdb1980108 EFLAGS: 00000246 ORIG_RAX: 0000000000000002
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000441139
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200004c0
RBP: 00007ffdb1980120 R08: 0000000000000002 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: ffffffffffffffff
R13: 0000000000000004 R14: 0000000000000000 R15: 0000000000000000
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
CPU: 0 PID: 7725 Comm: syz-executor036 Not tainted 4.19.82 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x172/0x1f0 lib/dump_stack.c:113
 fail_dump lib/fault-inject.c:51 [inline]
 should_fail.cold+0xa/0x1b lib/fault-inject.c:149
 __should_failslab+0x121/0x190 mm/failslab.c:32
 should_failslab+0x9/0x14 mm/slab_common.c:1557
 slab_pre_alloc_hook mm/slab.h:424 [inline]
 slab_alloc mm/slab.c:3383 [inline]
 __do_kmalloc mm/slab.c:3725 [inline]
 __kmalloc+0x2e2/0x750 mm/slab.c:3736
 kmalloc include/linux/slab.h:520 [inline]
 kzalloc include/linux/slab.h:709 [inline]
 ima_alloc_init_template+0x65/0x3b0 security/integrity/ima/ima_api.c:47
 ima_store_measurement+0x1bc/0x3e0 security/integrity/ima/ima_api.c:294
 process_measurement+0x119e/0x1560 security/integrity/ima/ima_main.c:292
 ima_file_check+0xc5/0x110 security/integrity/ima/ima_main.c:391
 do_last fs/namei.c:3422 [inline]
 path_openat+0x1130/0x45e0 fs/namei.c:3534
 do_filp_open+0x1a1/0x280 fs/namei.c:3564
 do_sys_open+0x3fe/0x550 fs/open.c:1088
 __do_sys_open fs/open.c:1106 [inline]
 __se_sys_open fs/open.c:1101 [inline]
 __x64_sys_open+0x7e/0xc0 fs/open.c:1101
 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x441139
Code: e8 5c ae 02 00 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 bb 0a fc ff c3 66 2e 0f 1f 84 00 00 00 00
RSP: 002b:00007ffdb1980108 EFLAGS: 00000246 ORIG_RAX: 0000000000000002
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000441139
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200004c0
RBP: 00007ffdb1980120 R08: 0000000000000002 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: ffffffffffffffff
R13: 0000000000000004 R14: 0000000000000000 R15: 0000000000000000
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
CPU: 1 PID: 7726 Comm: syz-executor036 Not tainted 4.19.82 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x172/0x1f0 lib/dump_stack.c:113
 fail_dump lib/fault-inject.c:51 [inline]
 should_fail.cold+0xa/0x1b lib/fault-inject.c:149
 __should_failslab+0x121/0x190 mm/failslab.c:32
 should_failslab+0x9/0x14 mm/slab_common.c:1557
 slab_pre_alloc_hook mm/slab.h:424 [inline]
 slab_alloc mm/slab.c:3383 [inline]
 __do_kmalloc mm/slab.c:3725 [inline]
 __kmalloc+0x2e2/0x750 mm/slab.c:3736
 kmalloc include/linux/slab.h:520 [inline]
 kzalloc include/linux/slab.h:709 [inline]
 ima_alloc_init_template+0x65/0x3b0 security/integrity/ima/ima_api.c:47
 ima_store_measurement+0x1bc/0x3e0 security/integrity/ima/ima_api.c:294
 process_measurement+0x119e/0x1560 security/integrity/ima/ima_main.c:292
 ima_file_check+0xc5/0x110 security/integrity/ima/ima_main.c:391
 do_last fs/namei.c:3422 [inline]
 path_openat+0x1130/0x45e0 fs/namei.c:3534
 do_filp_open+0x1a1/0x280 fs/namei.c:3564
 do_sys_open+0x3fe/0x550 fs/open.c:1088
 __do_sys_open fs/open.c:1106 [inline]
 __se_sys_open fs/open.c:1101 [inline]
 __x64_sys_open+0x7e/0xc0 fs/open.c:1101
 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x441139
Code: e8 5c ae 02 00 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 bb 0a fc ff c3 66 2e 0f 1f 84 00 00 00 00
RSP: 002b:00007ffdb1980108 EFLAGS: 00000246 ORIG_RAX: 0000000000000002
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000441139
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200004c0
RBP: 00007ffdb1980120 R08: 0000000000000002 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: ffffffffffffffff
R13: 0000000000000004 R14: 0000000000000000 R15: 0000000000000000
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
CPU: 0 PID: 7727 Comm: syz-executor036 Not tainted 4.19.82 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x172/0x1f0 lib/dump_stack.c:113
 fail_dump lib/fault-inject.c:51 [inline]
 should_fail.cold+0xa/0x1b lib/fault-inject.c:149
 __should_failslab+0x121/0x190 mm/failslab.c:32
 should_failslab+0x9/0x14 mm/slab_common.c:1557
 slab_pre_alloc_hook mm/slab.h:424 [inline]
 slab_alloc mm/slab.c:3383 [inline]
 __do_kmalloc mm/slab.c:3725 [inline]
 __kmalloc+0x2e2/0x750 mm/slab.c:3736
 kmalloc include/linux/slab.h:520 [inline]
 kzalloc include/linux/slab.h:709 [inline]
 ima_alloc_init_template+0x65/0x3b0 security/integrity/ima/ima_api.c:47
 ima_store_measurement+0x1bc/0x3e0 security/integrity/ima/ima_api.c:294
 process_measurement+0x119e/0x1560 security/integrity/ima/ima_main.c:292
 ima_file_check+0xc5/0x110 security/integrity/ima/ima_main.c:391
 do_last fs/namei.c:3422 [inline]
 path_openat+0x1130/0x45e0 fs/namei.c:3534
 do_filp_open+0x1a1/0x280 fs/namei.c:3564
 do_sys_open+0x3fe/0x550 fs/open.c:1088
 __do_sys_open fs/open.c:1106 [inline]
 __se_sys_open fs/open.c:1101 [inline]
 __x64_sys_open+0x7e/0xc0 fs/open.c:1101
 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x441139
Code: e8 5c ae 02 00 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 bb 0a fc ff c3 66 2e 0f 1f 84 00 00 00 00
RSP: 002b:00007ffdb1980108 EFLAGS: 00000246 ORIG_RAX: 0000000000000002
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000441139
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200004c0
RBP: 00007ffdb1980120 R08: 0000000000000002 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: ffffffffffffffff
R13: 0000000000000004 R14: 0000000000000000 R15: 0000000000000000
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
CPU: 1 PID: 7728 Comm: syz-executor036 Not tainted 4.19.82 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x172/0x1f0 lib/dump_stack.c:113
 fail_dump lib/fault-inject.c:51 [inline]
 should_fail.cold+0xa/0x1b lib/fault-inject.c:149
 __should_failslab+0x121/0x190 mm/failslab.c:32
 should_failslab+0x9/0x14 mm/slab_common.c:1557
 slab_pre_alloc_hook mm/slab.h:424 [inline]
 slab_alloc mm/slab.c:3383 [inline]
 __do_kmalloc mm/slab.c:3725 [inline]
 __kmalloc+0x2e2/0x750 mm/slab.c:3736
 kmalloc include/linux/slab.h:520 [inline]
 kzalloc include/linux/slab.h:709 [inline]
 ima_alloc_init_template+0x65/0x3b0 security/integrity/ima/ima_api.c:47
 ima_store_measurement+0x1bc/0x3e0 security/integrity/ima/ima_api.c:294
 process_measurement+0x119e/0x1560 security/integrity/ima/ima_main.c:292
 ima_file_check+0xc5/0x110 security/integrity/ima/ima_main.c:391
 do_last fs/namei.c:3422 [inline]
 path_openat+0x1130/0x45e0 fs/namei.c:3534
 do_filp_open+0x1a1/0x280 fs/namei.c:3564
 do_sys_open+0x3fe/0x550 fs/open.c:1088
 __do_sys_open fs/open.c:1106 [inline]
 __se_sys_open fs/open.c:1101 [inline]
 __x64_sys_open+0x7e/0xc0 fs/open.c:1101
 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x441139
Code: e8 5c ae 02 00 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 bb 0a fc ff c3 66 2e 0f 1f 84 00 00 00 00
RSP: 002b:00007ffdb1980108 EFLAGS: 00000246 ORIG_RAX: 0000000000000002
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000441139
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200004c0
RBP: 00007ffdb1980120 R08: 0000000000000002 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: ffffffffffffffff
R13: 0000000000000004 R14: 0000000000000000 R15: 0000000000000000
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
CPU: 0 PID: 7729 Comm: syz-executor036 Not tainted 4.19.82 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x172/0x1f0 lib/dump_stack.c:113
 fail_dump lib/fault-inject.c:51 [inline]
 should_fail.cold+0xa/0x1b lib/fault-inject.c:149
 __should_failslab+0x121/0x190 mm/failslab.c:32
 should_failslab+0x9/0x14 mm/slab_common.c:1557
 slab_pre_alloc_hook mm/slab.h:424 [inline]
 slab_alloc mm/slab.c:3383 [inline]
 __do_kmalloc mm/slab.c:3725 [inline]
 __kmalloc+0x2e2/0x750 mm/slab.c:3736
 kmalloc include/linux/slab.h:520 [inline]
 kzalloc include/linux/slab.h:709 [inline]
 ima_alloc_init_template+0x65/0x3b0 security/integrity/ima/ima_api.c:47
 ima_store_measurement+0x1bc/0x3e0 security/integrity/ima/ima_api.c:294
 process_measurement+0x119e/0x1560 security/integrity/ima/ima_main.c:292
 ima_file_check+0xc5/0x110 security/integrity/ima/ima_main.c:391
 do_last fs/namei.c:3422 [inline]
 path_openat+0x1130/0x45e0 fs/namei.c:3534
 do_filp_open+0x1a1/0x280 fs/namei.c:3564
 do_sys_open+0x3fe/0x550 fs/open.c:1088
 __do_sys_open fs/open.c:1106 [inline]
 __se_sys_open fs/open.c:1101 [inline]
 __x64_sys_open+0x7e/0xc0 fs/open.c:1101
 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x441139
Code: e8 5c ae 02 00 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 bb 0a fc ff c3 66 2e 0f 1f 84 00 00 00 00
RSP: 002b:00007ffdb1980108 EFLAGS: 00000246 ORIG_RAX: 0000000000000002
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000441139
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200004c0
RBP: 00007ffdb1980120 R08: 0000000000000002 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: ffffffffffffffff

Crashes (1):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2019/11/06 23:10 linux-4.19.y 5ee93551c703 da505f84 .config console log report syz C ci2-linux-4-19
* Struck through repros no longer work on HEAD.