audit: type=1400 audit(1555439798.663:99): avc: denied { map } for pid=14723 comm="syz-executor.2" path="/dev/usbmon0" dev="devtmpfs" ino=428 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:usbmon_device_t:s0 tclass=chr_file permissive=1 ====================================================== WARNING: possible circular locking dependency detected 4.14.111 #1 Not tainted ------------------------------------------------------ syz-executor.2/14724 is trying to acquire lock: (&rp->fetch_lock){+.+.}, at: [] mon_bin_vma_fault+0x6f/0x280 drivers/usb/mon/mon_bin.c:1236 but task is already holding lock: (&mm->mmap_sem){++++}, at: [] __mm_populate+0x1e5/0x2c0 mm/gup.c:1247 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #1 (&mm->mmap_sem){++++}: lock_acquire+0x16f/0x430 kernel/locking/lockdep.c:3994 __might_fault mm/memory.c:4578 [inline] __might_fault+0x143/0x1d0 mm/memory.c:4563 _copy_to_user+0x2c/0xd0 lib/usercopy.c:25 copy_to_user include/linux/uaccess.h:155 [inline] mon_bin_get_event+0x10a/0x430 drivers/usb/mon/mon_bin.c:756 mon_bin_ioctl+0x9b4/0xb50 drivers/usb/mon/mon_bin.c:1067 vfs_ioctl fs/ioctl.c:46 [inline] file_ioctl fs/ioctl.c:500 [inline] do_vfs_ioctl+0x7b9/0x1070 fs/ioctl.c:684 SYSC_ioctl fs/ioctl.c:701 [inline] SyS_ioctl+0x8f/0xc0 fs/ioctl.c:692 do_syscall_64+0x1eb/0x630 arch/x86/entry/common.c:289 entry_SYSCALL_64_after_hwframe+0x42/0xb7 -> #0 (&rp->fetch_lock){+.+.}: check_prev_add kernel/locking/lockdep.c:1901 [inline] check_prevs_add kernel/locking/lockdep.c:2018 [inline] validate_chain kernel/locking/lockdep.c:2460 [inline] __lock_acquire+0x2c89/0x45e0 kernel/locking/lockdep.c:3487 lock_acquire+0x16f/0x430 kernel/locking/lockdep.c:3994 __mutex_lock_common kernel/locking/mutex.c:756 [inline] __mutex_lock+0xe8/0x1470 kernel/locking/mutex.c:893 mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:908 mon_bin_vma_fault+0x6f/0x280 drivers/usb/mon/mon_bin.c:1236 __do_fault+0x109/0x390 mm/memory.c:3217 do_cow_fault mm/memory.c:3656 [inline] do_fault mm/memory.c:3755 [inline] handle_pte_fault mm/memory.c:3983 [inline] __handle_mm_fault+0xde6/0x3470 mm/memory.c:4107 handle_mm_fault+0x293/0x7c0 mm/memory.c:4144 faultin_page mm/gup.c:502 [inline] __get_user_pages+0x465/0x1250 mm/gup.c:702 populate_vma_page_range+0x18e/0x230 mm/gup.c:1219 __mm_populate+0x198/0x2c0 mm/gup.c:1267 mm_populate include/linux/mm.h:2174 [inline] vm_mmap_pgoff+0x1be/0x1d0 mm/util.c:338 SYSC_mmap_pgoff mm/mmap.c:1550 [inline] SyS_mmap_pgoff+0x3ca/0x520 mm/mmap.c:1508 SYSC_mmap arch/x86/kernel/sys_x86_64.c:100 [inline] SyS_mmap+0x16/0x20 arch/x86/kernel/sys_x86_64.c:91 do_syscall_64+0x1eb/0x630 arch/x86/entry/common.c:289 entry_SYSCALL_64_after_hwframe+0x42/0xb7 other info that might help us debug this: Possible unsafe locking scenario: CPU0 CPU1 ---- ---- lock(&mm->mmap_sem); lock(&rp->fetch_lock); lock(&mm->mmap_sem); lock(&rp->fetch_lock); *** DEADLOCK *** 1 lock held by syz-executor.2/14724: #0: (&mm->mmap_sem){++++}, at: [] __mm_populate+0x1e5/0x2c0 mm/gup.c:1247 stack backtrace: CPU: 1 PID: 14724 Comm: syz-executor.2 Not tainted 4.14.111 #1 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x138/0x19c lib/dump_stack.c:53 print_circular_bug.isra.0.cold+0x1cc/0x28f kernel/locking/lockdep.c:1258 check_prev_add kernel/locking/lockdep.c:1901 [inline] check_prevs_add kernel/locking/lockdep.c:2018 [inline] validate_chain kernel/locking/lockdep.c:2460 [inline] __lock_acquire+0x2c89/0x45e0 kernel/locking/lockdep.c:3487 lock_acquire+0x16f/0x430 kernel/locking/lockdep.c:3994 __mutex_lock_common kernel/locking/mutex.c:756 [inline] __mutex_lock+0xe8/0x1470 kernel/locking/mutex.c:893 mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:908 mon_bin_vma_fault+0x6f/0x280 drivers/usb/mon/mon_bin.c:1236 __do_fault+0x109/0x390 mm/memory.c:3217 do_cow_fault mm/memory.c:3656 [inline] do_fault mm/memory.c:3755 [inline] handle_pte_fault mm/memory.c:3983 [inline] __handle_mm_fault+0xde6/0x3470 mm/memory.c:4107 handle_mm_fault+0x293/0x7c0 mm/memory.c:4144 faultin_page mm/gup.c:502 [inline] __get_user_pages+0x465/0x1250 mm/gup.c:702 populate_vma_page_range+0x18e/0x230 mm/gup.c:1219 __mm_populate+0x198/0x2c0 mm/gup.c:1267 mm_populate include/linux/mm.h:2174 [inline] vm_mmap_pgoff+0x1be/0x1d0 mm/util.c:338 SYSC_mmap_pgoff mm/mmap.c:1550 [inline] SyS_mmap_pgoff+0x3ca/0x520 mm/mmap.c:1508 SYSC_mmap arch/x86/kernel/sys_x86_64.c:100 [inline] SyS_mmap+0x16/0x20 arch/x86/kernel/sys_x86_64.c:91 do_syscall_64+0x1eb/0x630 arch/x86/entry/common.c:289 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x458c29 RSP: 002b:00007f412987ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000458c29 RDX: 0000000000000002 RSI: 0000000000400000 RDI: 0000000020a19000 RBP: 000000000073bf00 R08: 0000000000000004 R09: 0000000000000000 R10: 0000000000008012 R11: 0000000000000246 R12: 00007f412987f6d4 R13: 00000000004c4b5a R14: 00000000004d8780 R15: 00000000ffffffff kobject: 'loop2' (ffff8880a49d6f60): kobject_uevent_env kobject: 'loop2' (ffff8880a49d6f60): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop3' (ffff8880a4a411e0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a411e0): fill_kobj_path: path = '/devices/virtual/block/loop3' Invalid argument reading file caps for /dev/fd/4 kobject: 'loop5' (ffff8880a4a901a0): kobject_uevent_env Invalid argument reading file caps for /dev/fd/4 kobject: 'loop5' (ffff8880a4a901a0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop0' (ffff88809510d3a0): kobject_uevent_env kobject: 'loop0' (ffff88809510d3a0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop4' (ffff8880a4a5a120): kobject_uevent_env kobject: 'loop4' (ffff8880a4a5a120): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop0' (ffff88809510d3a0): kobject_uevent_env overlayfs: unrecognized mount option "lowerdip=./file1" or missing value kobject: 'loop0' (ffff88809510d3a0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop5' (ffff8880a4a901a0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a411e0): kobject_uevent_env kobject: 'loop5' (ffff8880a4a901a0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop3' (ffff8880a4a411e0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop4' (ffff8880a4a5a120): kobject_uevent_env kobject: 'loop4' (ffff8880a4a5a120): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop5' (ffff8880a4a901a0): kobject_uevent_env kobject: 'loop5' (ffff8880a4a901a0): kobject_uevent_env kobject: 'loop5' (ffff8880a4a901a0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop5' (ffff8880a4a901a0): fill_kobj_path: path = '/devices/virtual/block/loop5' overlayfs: unrecognized mount option "lowerdip=./file1" or missing value kobject: 'loop3' (ffff8880a4a411e0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a411e0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop5' (ffff8880a4a901a0): kobject_uevent_env kobject: 'loop5' (ffff8880a4a901a0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop4' (ffff8880a4a5a120): kobject_uevent_env kobject: 'loop4' (ffff8880a4a5a120): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop3' (ffff8880a4a411e0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a411e0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop4' (ffff8880a4a5a120): kobject_uevent_env kobject: 'loop5' (ffff8880a4a901a0): kobject_uevent_env kobject: 'loop4' (ffff8880a4a5a120): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop5' (ffff8880a4a901a0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop3' (ffff8880a4a411e0): kobject_uevent_env kobject: 'nr0' (ffff88805d6095b0): kobject_add_internal: parent: 'net', set: 'devices' kobject: 'loop3' (ffff8880a4a411e0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'nr0' (ffff88805d6095b0): kobject_uevent_env kobject: 'loop5' (ffff8880a4a901a0): kobject_uevent_env kobject: 'nr0' (ffff88805d6095b0): fill_kobj_path: path = '/devices/virtual/net/nr0' kobject: 'loop5' (ffff8880a4a901a0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'queues' (ffff8880865ea148): kobject_add_internal: parent: 'nr0', set: '' kobject: 'loop2' (ffff8880a49d6f60): kobject_uevent_env kobject: 'queues' (ffff8880865ea148): kobject_uevent_env kobject: 'loop2' (ffff8880a49d6f60): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'queues' (ffff8880865ea148): kobject_uevent_env: filter function caused the event to drop! kobject: 'loop0' (ffff88809510d3a0): kobject_uevent_env kobject: 'loop0' (ffff88809510d3a0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'rx-0' (ffff8880595a4890): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'loop3' (ffff8880a4a411e0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a411e0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'rx-0' (ffff8880595a4890): kobject_uevent_env kobject: 'rx-0' (ffff8880595a4890): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' kobject: 'loop5' (ffff8880a4a901a0): kobject_uevent_env kobject: 'tx-0' (ffff88805ec802d8): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'loop5' (ffff8880a4a901a0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'tx-0' (ffff88805ec802d8): kobject_uevent_env kobject: 'loop3' (ffff8880a4a411e0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a411e0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'tx-0' (ffff88805ec802d8): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' kobject: 'loop5' (ffff8880a4a901a0): kobject_uevent_env kobject: 'batman_adv' (ffff88808e7b5480): kobject_add_internal: parent: 'nr0', set: '' kobject: 'loop5' (ffff8880a4a901a0): fill_kobj_path: path = '/devices/virtual/block/loop5' device nr0 entered promiscuous mode kobject: 'loop3' (ffff8880a4a411e0): kobject_uevent_env kobject: 'tx-1' (ffff88805ec80458): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'loop3' (ffff8880a4a411e0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'tx-1' (ffff88805ec80458): kobject_uevent_env kobject: 'loop2' (ffff8880a49d6f60): kobject_uevent_env kobject: 'tx-1' (ffff88805ec80458): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-1' kobject: 'loop2' (ffff8880a49d6f60): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'rx-1' (ffff8880595a4910): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'loop3' (ffff8880a4a411e0): kobject_uevent_env kobject: 'rx-1' (ffff8880595a4910): kobject_uevent_env kobject: 'loop3' (ffff8880a4a411e0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'rx-1' (ffff8880595a4910): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-1' kobject: 'tx-1' (ffff88805ec80458): kobject_cleanup, parent ffff8880865ea148 kobject: 'tx-1' (ffff88805ec80458): auto cleanup 'remove' event kobject: 'tx-1' (ffff88805ec80458): kobject_uevent_env kobject: 'tx-1' (ffff88805ec80458): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-1' kobject: 'tx-1' (ffff88805ec80458): auto cleanup kobject_del kobject: 'tx-1' (ffff88805ec80458): calling ktype release kobject: 'tx-1': free name kobject: 'rx-1' (ffff8880595a4910): kobject_cleanup, parent ffff8880865ea148 kobject: 'rx-1' (ffff8880595a4910): auto cleanup 'remove' event kobject: 'rx-1' (ffff8880595a4910): kobject_uevent_env kobject: 'rx-1' (ffff8880595a4910): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-1' kobject: 'rx-1' (ffff8880595a4910): auto cleanup kobject_del kobject: 'rx-1' (ffff8880595a4910): calling ktype release kobject: 'rx-1': free name kobject: 'loop2' (ffff8880a49d6f60): kobject_uevent_env kobject: 'loop2' (ffff8880a49d6f60): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'batman_adv' (ffff88808e7b5480): kobject_uevent_env kobject: 'batman_adv' (ffff88808e7b5480): kobject_uevent_env: filter function caused the event to drop! kobject: 'batman_adv' (ffff88808e7b5480): kobject_cleanup, parent (null) kobject: 'loop5' (ffff8880a4a901a0): kobject_uevent_env kobject: 'batman_adv' (ffff88808e7b5480): calling ktype release kobject: 'loop5' (ffff8880a4a901a0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: (ffff88808e7b5480): dynamic_kobj_release kobject: 'batman_adv': free name kobject: 'rx-0' (ffff8880595a4890): kobject_cleanup, parent ffff8880865ea148 kobject: 'rx-0' (ffff8880595a4890): auto cleanup 'remove' event kobject: 'loop3' (ffff8880a4a411e0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a411e0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'rx-0' (ffff8880595a4890): kobject_uevent_env kobject: 'loop2' (ffff8880a49d6f60): kobject_uevent_env kobject: 'rx-0' (ffff8880595a4890): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' kobject: 'loop2' (ffff8880a49d6f60): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'rx-0' (ffff8880595a4890): auto cleanup kobject_del kobject: 'rx-0' (ffff8880595a4890): calling ktype release kobject: 'rx-0': free name kobject: 'loop4' (ffff8880a4a5a120): kobject_uevent_env kobject: 'tx-0' (ffff88805ec802d8): kobject_cleanup, parent ffff8880865ea148 kobject: 'tx-0' (ffff88805ec802d8): auto cleanup 'remove' event kobject: 'loop4' (ffff8880a4a5a120): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'tx-0' (ffff88805ec802d8): kobject_uevent_env kobject: 'kvm' (ffff888219feedd0): kobject_uevent_env kobject: 'tx-0' (ffff88805ec802d8): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' kobject: 'kvm' (ffff888219feedd0): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'tx-0' (ffff88805ec802d8): auto cleanup kobject_del kobject: 'tx-0' (ffff88805ec802d8): calling ktype release kobject: 'tx-0': free name kobject: 'queues' (ffff8880865ea148): kobject_cleanup, parent (null) kobject: 'queues' (ffff8880865ea148): calling ktype release kobject: 'queues' (ffff8880865ea148): kset_release kobject: 'queues': free name kobject: 'nr0' (ffff88805d6095b0): kobject_uevent_env kobject: 'nr0' (ffff88805d6095b0): fill_kobj_path: path = '/devices/virtual/net/nr0' kobject: 'kvm' (ffff888219feedd0): kobject_uevent_env kobject: 'kvm' (ffff888219feedd0): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop4' (ffff8880a4a5a120): kobject_uevent_env kobject: 'loop4' (ffff8880a4a5a120): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'nr0' (ffff88805d6095b0): kobject_cleanup, parent (null) kobject: 'nr0' (ffff88805d6095b0): calling ktype release kobject: 'nr0': free name kobject: 'loop0' (ffff88809510d3a0): kobject_uevent_env kobject: 'loop0' (ffff88809510d3a0): fill_kobj_path: path = '/devices/virtual/block/loop0' QAT: Invalid ioctl kobject: 'loop4' (ffff8880a4a5a120): kobject_uevent_env kobject: 'loop4' (ffff8880a4a5a120): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop3' (ffff8880a4a411e0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a411e0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'kvm' (ffff888219feedd0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a411e0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a411e0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'kvm' (ffff888219feedd0): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop0' (ffff88809510d3a0): kobject_uevent_env mmap: syz-executor.0 (14909): VmData 18538496 exceed data ulimit 0. Update limits or use boot option ignore_rlimit_data. kobject: 'loop0' (ffff88809510d3a0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'kvm' (ffff888219feedd0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a411e0): kobject_uevent_env kobject: 'kvm' (ffff888219feedd0): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop3' (ffff8880a4a411e0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'kvm' (ffff888219feedd0): kobject_uevent_env kobject: 'loop5' (ffff8880a4a901a0): kobject_uevent_env kobject: 'kvm' (ffff888219feedd0): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop5' (ffff8880a4a901a0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'kvm' (ffff888219feedd0): kobject_uevent_env kobject: 'kvm' (ffff888219feedd0): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop5' (ffff8880a4a901a0): kobject_uevent_env kobject: 'loop5' (ffff8880a4a901a0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop0' (ffff88809510d3a0): kobject_uevent_env kobject: 'loop0' (ffff88809510d3a0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop2' (ffff8880a49d6f60): kobject_uevent_env kobject: 'loop2' (ffff8880a49d6f60): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop4' (ffff8880a4a5a120): kobject_uevent_env kobject: 'loop4' (ffff8880a4a5a120): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop3' (ffff8880a4a411e0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a411e0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop5' (ffff8880a4a901a0): kobject_uevent_env kobject: 'loop5' (ffff8880a4a901a0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop3' (ffff8880a4a411e0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a411e0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop5' (ffff8880a4a901a0): kobject_uevent_env kobject: 'loop5' (ffff8880a4a901a0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop4' (ffff8880a4a5a120): kobject_uevent_env kobject: 'loop4' (ffff8880a4a5a120): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop3' (ffff8880a4a411e0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a411e0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop2' (ffff8880a49d6f60): kobject_uevent_env kobject: 'loop2' (ffff8880a49d6f60): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop2' (ffff8880a49d6f60): kobject_uevent_env kobject: 'loop2' (ffff8880a49d6f60): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop0' (ffff88809510d3a0): kobject_uevent_env kobject: 'loop0' (ffff88809510d3a0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop5' (ffff8880a4a901a0): kobject_uevent_env kobject: 'loop5' (ffff8880a4a901a0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop3' (ffff8880a4a411e0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a411e0): fill_kobj_path: path = '/devices/virtual/block/loop3' overlayfs: filesystem on './file0' not supported as upperdir kobject: 'loop3' (ffff8880a4a411e0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a411e0): fill_kobj_path: path = '/devices/virtual/block/loop3' FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 15004 Comm: syz-executor.3 Not tainted 4.14.111 #1 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x138/0x19c lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10f/0x159 lib/fault-inject.c:149 should_failslab+0xdb/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc+0x2d9/0x780 mm/slab.c:3550 getname_flags fs/namei.c:138 [inline] getname_flags+0xcb/0x580 fs/namei.c:128 getname+0x1a/0x20 fs/namei.c:209 do_sys_open+0x1e7/0x430 fs/open.c:1059 SYSC_open fs/open.c:1083 [inline] SyS_open+0x2d/0x40 fs/open.c:1078 do_syscall_64+0x1eb/0x630 arch/x86/entry/common.c:289 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x412bc1 RSP: 002b:00007f10b5075bb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 RAX: ffffffffffffffda RBX: 00007f10b5075c90 RCX: 0000000000412bc1 RDX: 00007f10b5075bdf RSI: 0000000000000002 RDI: 00007f10b5075bd0 RBP: 000000000073bf00 R08: 0000000000000000 R09: 000000000000000f R10: 0000000000000004 R11: 0000000000000293 R12: 00007f10b50766d4 R13: 00000000004c7bc0 R14: 00000000004ddcd0 R15: 0000000000000005 kobject: 'loop4' (ffff8880a4a5a120): kobject_uevent_env kobject: 'loop4' (ffff8880a4a5a120): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop3' (ffff8880a4a411e0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a411e0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop0' (ffff88809510d3a0): kobject_uevent_env kobject: 'loop0' (ffff88809510d3a0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop2' (ffff8880a49d6f60): kobject_uevent_env kobject: 'loop2' (ffff8880a49d6f60): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop2' (ffff8880a49d6f60): kobject_uevent_env kobject: 'loop2' (ffff8880a49d6f60): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop4' (ffff8880a4a5a120): kobject_uevent_env kobject: 'loop4' (ffff8880a4a5a120): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop5' (ffff8880a4a901a0): kobject_uevent_env kobject: 'loop5' (ffff8880a4a901a0): fill_kobj_path: path = '/devices/virtual/block/loop5' FAULT_INJECTION: forcing a failure. name fail_page_alloc, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 15030 Comm: syz-executor.3 Not tainted 4.14.111 #1 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x138/0x19c lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10f/0x159 lib/fault-inject.c:149 should_fail_alloc_page mm/page_alloc.c:2891 [inline] prepare_alloc_pages mm/page_alloc.c:4124 [inline] __alloc_pages_nodemask+0x1d6/0x7a0 mm/page_alloc.c:4172 __alloc_pages include/linux/gfp.h:461 [inline] __alloc_pages_node include/linux/gfp.h:474 [inline] kmem_getpages mm/slab.c:1419 [inline] cache_grow_begin+0x80/0x410 mm/slab.c:2676 cache_alloc_refill mm/slab.c:3043 [inline] ____cache_alloc mm/slab.c:3125 [inline] ____cache_alloc mm/slab.c:3108 [inline] __do_cache_alloc mm/slab.c:3347 [inline] slab_alloc mm/slab.c:3382 [inline] kmem_cache_alloc+0x6a8/0x780 mm/slab.c:3550 getname_flags fs/namei.c:138 [inline] getname_flags+0xcb/0x580 fs/namei.c:128 getname+0x1a/0x20 fs/namei.c:209 do_sys_open+0x1e7/0x430 fs/open.c:1059 SYSC_open fs/open.c:1083 [inline] SyS_open+0x2d/0x40 fs/open.c:1078 do_syscall_64+0x1eb/0x630 arch/x86/entry/common.c:289 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x412bc1 RSP: 002b:00007f10b5075bb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 RAX: ffffffffffffffda RBX: 00007f10b5075c90 RCX: 0000000000412bc1 RDX: 00007f10b5075bdf RSI: 0000000000000002 RDI: 00007f10b5075bd0 RBP: 000000000073bf00 R08: 0000000000000000 R09: 000000000000000f R10: 0000000000000004 R11: 0000000000000293 R12: 00007f10b50766d4 R13: 00000000004c7bc0 R14: 00000000004ddcd0 R15: 0000000000000005 kobject: 'loop2' (ffff8880a49d6f60): kobject_uevent_env kobject: 'loop2' (ffff8880a49d6f60): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop0' (ffff88809510d3a0): kobject_uevent_env kobject: 'loop0' (ffff88809510d3a0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop2' (ffff8880a49d6f60): kobject_uevent_env kobject: 'loop2' (ffff8880a49d6f60): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop3' (ffff8880a4a411e0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a411e0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop4' (ffff8880a4a5a120): kobject_uevent_env kobject: 'loop4' (ffff8880a4a5a120): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop0' (ffff88809510d3a0): kobject_uevent_env kobject: 'loop0' (ffff88809510d3a0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop5' (ffff8880a4a901a0): kobject_uevent_env kobject: 'loop5' (ffff8880a4a901a0): fill_kobj_path: path = '/devices/virtual/block/loop5' FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 15064 Comm: syz-executor.3 Not tainted 4.14.111 #1 kobject: 'loop5' (ffff8880a4a901a0): kobject_uevent_env Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x138/0x19c lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10f/0x159 lib/fault-inject.c:149 kobject: 'loop5' (ffff8880a4a901a0): fill_kobj_path: path = '/devices/virtual/block/loop5' should_failslab+0xdb/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc+0x2d9/0x780 mm/slab.c:3550 kmem_cache_zalloc include/linux/slab.h:651 [inline] get_empty_filp+0x8c/0x3b0 fs/file_table.c:123 path_openat+0x8f/0x3f70 fs/namei.c:3542 do_filp_open+0x18e/0x250 fs/namei.c:3600 kobject: 'loop2' (ffff8880a49d6f60): kobject_uevent_env kobject: 'loop2' (ffff8880a49d6f60): fill_kobj_path: path = '/devices/virtual/block/loop2' do_sys_open+0x2c5/0x430 fs/open.c:1065 SYSC_open fs/open.c:1083 [inline] SyS_open+0x2d/0x40 fs/open.c:1078 do_syscall_64+0x1eb/0x630 arch/x86/entry/common.c:289 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x412bc1 kobject: 'loop5' (ffff8880a4a901a0): kobject_uevent_env RSP: 002b:00007f10b5075bb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 RAX: ffffffffffffffda RBX: 00007f10b5075c90 RCX: 0000000000412bc1 RDX: 00007f10b5075bdf RSI: 0000000000000002 RDI: 00007f10b5075bd0 RBP: 000000000073bf00 R08: 0000000000000000 R09: 000000000000000f kobject: 'loop5' (ffff8880a4a901a0): fill_kobj_path: path = '/devices/virtual/block/loop5' R10: 0000000000000004 R11: 0000000000000293 R12: 00007f10b50766d4 R13: 00000000004c7bc0 R14: 00000000004ddcd0 R15: 0000000000000005 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 15082 Comm: syz-executor.3 Not tainted 4.14.111 #1 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x138/0x19c lib/dump_stack.c:53 kobject: 'loop3' (ffff8880a4a411e0): kobject_uevent_env fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10f/0x159 lib/fault-inject.c:149 should_failslab+0xdb/0x130 mm/failslab.c:32 kobject: 'loop3' (ffff8880a4a411e0): fill_kobj_path: path = '/devices/virtual/block/loop3' slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc_trace+0x4b/0x790 mm/slab.c:3616 kobject: 'loop4' (ffff8880a4a5a120): kobject_uevent_env kmalloc include/linux/slab.h:488 [inline] proc_self_get_link+0x165/0x1c0 fs/proc/self.c:21 get_link fs/namei.c:1091 [inline] link_path_walk+0xca9/0x10b0 fs/namei.c:2159 kobject: 'loop4' (ffff8880a4a5a120): fill_kobj_path: path = '/devices/virtual/block/loop4' path_openat+0x189/0x3f70 fs/namei.c:3565 overlayfs: failed to resolve './file1': -2 do_filp_open+0x18e/0x250 fs/namei.c:3600 kobject: 'loop4' (ffff8880a4a5a120): kobject_uevent_env kobject: 'loop4' (ffff8880a4a5a120): fill_kobj_path: path = '/devices/virtual/block/loop4' do_sys_open+0x2c5/0x430 fs/open.c:1065 kobject: 'loop5' (ffff8880a4a901a0): kobject_uevent_env kobject: 'loop5' (ffff8880a4a901a0): fill_kobj_path: path = '/devices/virtual/block/loop5' SYSC_open fs/open.c:1083 [inline] SyS_open+0x2d/0x40 fs/open.c:1078 do_syscall_64+0x1eb/0x630 arch/x86/entry/common.c:289 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x412bc1 RSP: 002b:00007f10b5075bb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 kobject: 'loop5' (ffff8880a4a901a0): kobject_uevent_env RAX: ffffffffffffffda RBX: 00007f10b5075c90 RCX: 0000000000412bc1 RDX: 00007f10b5075bdf RSI: 0000000000000002 RDI: 00007f10b5075bd0 RBP: 000000000073bf00 R08: 0000000000000000 R09: 000000000000000f R10: 0000000000000004 R11: 0000000000000293 R12: 00007f10b50766d4 R13: 00000000004c7bc0 R14: 00000000004ddcd0 R15: 0000000000000005 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 kobject: 'loop5' (ffff8880a4a901a0): fill_kobj_path: path = '/devices/virtual/block/loop5' CPU: 1 PID: 15108 Comm: syz-executor.3 Not tainted 4.14.111 #1 kobject: 'loop2' (ffff8880a49d6f60): kobject_uevent_env Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x138/0x19c lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10f/0x159 lib/fault-inject.c:149 should_failslab+0xdb/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc+0x2d9/0x780 mm/slab.c:3550 __d_alloc+0x2d/0x9f0 fs/dcache.c:1623 d_alloc+0x4d/0x270 fs/dcache.c:1710 d_alloc_parallel+0xe5/0x1800 fs/dcache.c:2492 lookup_slow+0x188/0x440 fs/namei.c:1678 kobject: 'loop2' (ffff8880a49d6f60): fill_kobj_path: path = '/devices/virtual/block/loop2' walk_component+0x69d/0x1d00 fs/namei.c:1824 kobject: 'loop3' (ffff8880a4a411e0): kobject_uevent_env link_path_walk+0x81f/0x10b0 fs/namei.c:2153 kobject: 'loop3' (ffff8880a4a411e0): fill_kobj_path: path = '/devices/virtual/block/loop3' path_openat+0x189/0x3f70 fs/namei.c:3565 kobject: 'loop0' (ffff88809510d3a0): kobject_uevent_env kobject: 'loop0' (ffff88809510d3a0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop2' (ffff8880a49d6f60): kobject_uevent_env do_filp_open+0x18e/0x250 fs/namei.c:3600 kobject: 'loop2' (ffff8880a49d6f60): fill_kobj_path: path = '/devices/virtual/block/loop2' do_sys_open+0x2c5/0x430 fs/open.c:1065 SYSC_open fs/open.c:1083 [inline] SyS_open+0x2d/0x40 fs/open.c:1078 do_syscall_64+0x1eb/0x630 arch/x86/entry/common.c:289 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x412bc1 RSP: 002b:00007f10b5075bb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 RAX: ffffffffffffffda RBX: 00007f10b5075c90 RCX: 0000000000412bc1 RDX: 00007f10b5075bdf RSI: 0000000000000002 RDI: 00007f10b5075bd0 RBP: 000000000073bf00 R08: 0000000000000000 R09: 000000000000000f R10: 0000000000000004 R11: 0000000000000293 R12: 00007f10b50766d4 R13: 00000000004c7bc0 R14: 00000000004ddcd0 R15: 0000000000000005 kobject: 'loop5' (ffff8880a4a901a0): kobject_uevent_env kobject: 'loop5' (ffff8880a4a901a0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop4' (ffff8880a4a5a120): kobject_uevent_env FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 kobject: 'loop4' (ffff8880a4a5a120): fill_kobj_path: path = '/devices/virtual/block/loop4' CPU: 0 PID: 15130 Comm: syz-executor.3 Not tainted 4.14.111 #1 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x138/0x19c lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10f/0x159 lib/fault-inject.c:149 should_failslab+0xdb/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc+0x2d9/0x780 mm/slab.c:3550 __d_alloc+0x2d/0x9f0 fs/dcache.c:1623 d_alloc+0x4d/0x270 fs/dcache.c:1710 d_alloc_parallel+0xe5/0x1800 fs/dcache.c:2492 lookup_slow+0x188/0x440 fs/namei.c:1678 walk_component+0x69d/0x1d00 fs/namei.c:1824 link_path_walk+0x81f/0x10b0 fs/namei.c:2153 path_openat+0x189/0x3f70 fs/namei.c:3565 do_filp_open+0x18e/0x250 fs/namei.c:3600 do_sys_open+0x2c5/0x430 fs/open.c:1065 SYSC_open fs/open.c:1083 [inline] SyS_open+0x2d/0x40 fs/open.c:1078 do_syscall_64+0x1eb/0x630 arch/x86/entry/common.c:289 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x412bc1 RSP: 002b:00007f10b5075bb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 RAX: ffffffffffffffda RBX: 00007f10b5075c90 RCX: 0000000000412bc1 RDX: 00007f10b5075bdf RSI: 0000000000000002 RDI: 00007f10b5075bd0 RBP: 000000000073bf00 R08: 0000000000000000 R09: 000000000000000f R10: 0000000000000004 R11: 0000000000000293 R12: 00007f10b50766d4 R13: 00000000004c7bc0 R14: 00000000004ddcd0 R15: 0000000000000005 kobject: 'loop3' (ffff8880a4a411e0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a411e0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop0' (ffff88809510d3a0): kobject_uevent_env kobject: 'loop0' (ffff88809510d3a0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop5' (ffff8880a4a901a0): kobject_uevent_env kobject: 'loop5' (ffff8880a4a901a0): fill_kobj_path: path = '/devices/virtual/block/loop5' FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 15154 Comm: syz-executor.3 Not tainted 4.14.111 #1 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x138/0x19c lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10f/0x159 lib/fault-inject.c:149 should_failslab+0xdb/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc+0x2d9/0x780 mm/slab.c:3550 proc_alloc_inode+0x1c/0x1a0 fs/proc/inode.c:62 alloc_inode+0x66/0x190 fs/inode.c:209 new_inode_pseudo+0x19/0xf0 fs/inode.c:891 new_inode+0x1f/0x40 fs/inode.c:920 proc_pid_make_inode+0x22/0x230 fs/proc/base.c:1763 proc_pident_instantiate+0x7f/0x290 fs/proc/base.c:2449 proc_pident_lookup+0x17e/0x1f0 fs/proc/base.c:2498 proc_tgid_base_lookup+0x2a/0x30 fs/proc/base.c:3051 lookup_slow+0x22c/0x440 fs/namei.c:1695 walk_component+0x69d/0x1d00 fs/namei.c:1824 link_path_walk+0x81f/0x10b0 fs/namei.c:2153 path_openat+0x189/0x3f70 fs/namei.c:3565 do_filp_open+0x18e/0x250 fs/namei.c:3600 do_sys_open+0x2c5/0x430 fs/open.c:1065 SYSC_open fs/open.c:1083 [inline] SyS_open+0x2d/0x40 fs/open.c:1078 do_syscall_64+0x1eb/0x630 arch/x86/entry/common.c:289 kobject: 'loop2' (ffff8880a49d6f60): kobject_uevent_env entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x412bc1 kobject: 'loop2' (ffff8880a49d6f60): fill_kobj_path: path = '/devices/virtual/block/loop2' RSP: 002b:00007f10b5075bb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 RAX: ffffffffffffffda RBX: 00007f10b5075c90 RCX: 0000000000412bc1 RDX: 00007f10b5075bdf RSI: 0000000000000002 RDI: 00007f10b5075bd0 RBP: 000000000073bf00 R08: 0000000000000000 R09: 000000000000000f R10: 0000000000000004 R11: 0000000000000293 R12: 00007f10b50766d4 R13: 00000000004c7bc0 R14: 00000000004ddcd0 R15: 0000000000000005 FAULT_INJECTION: forcing a failure. name fail_page_alloc, interval 1, probability 0, space 0, times 0 kobject: 'loop3' (ffff8880a4a411e0): kobject_uevent_env CPU: 0 PID: 15187 Comm: syz-executor.3 Not tainted 4.14.111 #1 kobject: 'loop3' (ffff8880a4a411e0): fill_kobj_path: path = '/devices/virtual/block/loop3' Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x138/0x19c lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10f/0x159 lib/fault-inject.c:149 kobject: 'loop5' (ffff8880a4a901a0): kobject_uevent_env should_fail_alloc_page mm/page_alloc.c:2891 [inline] prepare_alloc_pages mm/page_alloc.c:4124 [inline] __alloc_pages_nodemask+0x1d6/0x7a0 mm/page_alloc.c:4172 kobject: 'loop5' (ffff8880a4a901a0): fill_kobj_path: path = '/devices/virtual/block/loop5' __alloc_pages include/linux/gfp.h:461 [inline] __alloc_pages_node include/linux/gfp.h:474 [inline] kmem_getpages mm/slab.c:1419 [inline] cache_grow_begin+0x80/0x410 mm/slab.c:2676 kobject: 'loop0' (ffff88809510d3a0): kobject_uevent_env cache_alloc_refill mm/slab.c:3043 [inline] ____cache_alloc mm/slab.c:3125 [inline] ____cache_alloc mm/slab.c:3108 [inline] __do_cache_alloc mm/slab.c:3347 [inline] slab_alloc mm/slab.c:3382 [inline] kmem_cache_alloc+0x6a8/0x780 mm/slab.c:3550 kobject: 'loop0' (ffff88809510d3a0): fill_kobj_path: path = '/devices/virtual/block/loop0' proc_alloc_inode+0x1c/0x1a0 fs/proc/inode.c:62 kobject: 'loop2' (ffff8880a49d6f60): kobject_uevent_env alloc_inode+0x66/0x190 fs/inode.c:209 kobject: 'loop2' (ffff8880a49d6f60): fill_kobj_path: path = '/devices/virtual/block/loop2' new_inode_pseudo+0x19/0xf0 fs/inode.c:891 new_inode+0x1f/0x40 fs/inode.c:920 proc_pid_make_inode+0x22/0x230 fs/proc/base.c:1763 proc_pident_instantiate+0x7f/0x290 fs/proc/base.c:2449 kobject: 'loop5' (ffff8880a4a901a0): kobject_uevent_env proc_pident_lookup+0x17e/0x1f0 fs/proc/base.c:2498 kobject: 'loop5' (ffff8880a4a901a0): fill_kobj_path: path = '/devices/virtual/block/loop5' proc_tgid_base_lookup+0x2a/0x30 fs/proc/base.c:3051 kobject: 'loop2' (ffff8880a49d6f60): kobject_uevent_env lookup_slow+0x22c/0x440 fs/namei.c:1695 kobject: 'loop2' (ffff8880a49d6f60): fill_kobj_path: path = '/devices/virtual/block/loop2' walk_component+0x69d/0x1d00 fs/namei.c:1824 kobject: 'loop5' (ffff8880a4a901a0): kobject_uevent_env kobject: 'loop5' (ffff8880a4a901a0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop2' (ffff8880a49d6f60): kobject_uevent_env kobject: 'loop2' (ffff8880a49d6f60): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop5' (ffff8880a4a901a0): kobject_uevent_env link_path_walk+0x81f/0x10b0 fs/namei.c:2153 kobject: 'loop5' (ffff8880a4a901a0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop2' (ffff8880a49d6f60): kobject_uevent_env path_openat+0x189/0x3f70 fs/namei.c:3565 kobject: 'loop2' (ffff8880a49d6f60): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop5' (ffff8880a4a901a0): kobject_uevent_env kobject: 'loop5' (ffff8880a4a901a0): fill_kobj_path: path = '/devices/virtual/block/loop5' do_filp_open+0x18e/0x250 fs/namei.c:3600 do_sys_open+0x2c5/0x430 fs/open.c:1065 SYSC_open fs/open.c:1083 [inline] SyS_open+0x2d/0x40 fs/open.c:1078 do_syscall_64+0x1eb/0x630 arch/x86/entry/common.c:289 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x412bc1 RSP: 002b:00007f10b5075bb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 RAX: ffffffffffffffda RBX: 00007f10b5075c90 RCX: 0000000000412bc1 RDX: 00007f10b5075bdf RSI: 0000000000000002 RDI: 00007f10b5075bd0 kobject: 'loop2' (ffff8880a49d6f60): kobject_uevent_env RBP: 000000000073bf00 R08: 0000000000000000 R09: 000000000000000f R10: 0000000000000004 R11: 0000000000000293 R12: 00007f10b50766d4 R13: 00000000004c7bc0 R14: 00000000004ddcd0 R15: 0000000000000005 kobject: 'loop2' (ffff8880a49d6f60): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop3' (ffff8880a4a411e0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a411e0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop4' (ffff8880a4a5a120): kobject_uevent_env kobject: 'loop4' (ffff8880a4a5a120): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop0' (ffff88809510d3a0): kobject_uevent_env kobject: 'loop0' (ffff88809510d3a0): fill_kobj_path: path = '/devices/virtual/block/loop0' FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 kobject: 'loop0' (ffff88809510d3a0): kobject_uevent_env kobject: 'loop0' (ffff88809510d3a0): fill_kobj_path: path = '/devices/virtual/block/loop0' CPU: 1 PID: 15214 Comm: syz-executor.3 Not tainted 4.14.111 #1 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x138/0x19c lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10f/0x159 lib/fault-inject.c:149 should_failslab+0xdb/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc+0x2d9/0x780 mm/slab.c:3550 __d_alloc+0x2d/0x9f0 fs/dcache.c:1623 d_alloc+0x4d/0x270 fs/dcache.c:1710 d_alloc_parallel+0xe5/0x1800 fs/dcache.c:2492 lookup_open+0x498/0x1870 fs/namei.c:3153 do_last fs/namei.c:3331 [inline] path_openat+0x193d/0x3f70 fs/namei.c:3566 do_filp_open+0x18e/0x250 fs/namei.c:3600 do_sys_open+0x2c5/0x430 fs/open.c:1065 SYSC_open fs/open.c:1083 [inline] SyS_open+0x2d/0x40 fs/open.c:1078 do_syscall_64+0x1eb/0x630 arch/x86/entry/common.c:289 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x412bc1 RSP: 002b:00007f10b5075bb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 RAX: ffffffffffffffda RBX: 00007f10b5075c90 RCX: 0000000000412bc1 RDX: 00007f10b5075bdf RSI: 0000000000000002 RDI: 00007f10b5075bd0 RBP: 000000000073bf00 R08: 0000000000000000 R09: 000000000000000f R10: 0000000000000004 R11: 0000000000000293 R12: 00007f10b50766d4 R13: 00000000004c7bc0 R14: 00000000004ddcd0 R15: 0000000000000005 kobject: 'loop5' (ffff8880a4a901a0): kobject_uevent_env kobject: 'loop5' (ffff8880a4a901a0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop2' (ffff8880a49d6f60): kobject_uevent_env kobject: 'loop2' (ffff8880a49d6f60): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop5' (ffff8880a4a901a0): kobject_uevent_env kobject: 'loop5' (ffff8880a4a901a0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop2' (ffff8880a49d6f60): kobject_uevent_env kobject: 'loop2' (ffff8880a49d6f60): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop4' (ffff8880a4a5a120): kobject_uevent_env kobject: 'loop4' (ffff8880a4a5a120): fill_kobj_path: path = '/devices/virtual/block/loop4' FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 kobject: 'loop3' (ffff8880a4a411e0): kobject_uevent_env CPU: 1 PID: 15252 Comm: syz-executor.3 Not tainted 4.14.111 #1 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x138/0x19c lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10f/0x159 lib/fault-inject.c:149 should_failslab+0xdb/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc+0x2d9/0x780 mm/slab.c:3550 proc_alloc_inode+0x1c/0x1a0 fs/proc/inode.c:62 alloc_inode+0x66/0x190 fs/inode.c:209 new_inode_pseudo+0x19/0xf0 fs/inode.c:891 new_inode+0x1f/0x40 fs/inode.c:920 proc_pid_make_inode+0x22/0x230 fs/proc/base.c:1763 proc_fd_instantiate+0x4e/0x180 fs/proc/fd.c:177 proc_lookupfd_common+0x1d0/0x2a0 fs/proc/fd.c:212 proc_lookupfd+0x25/0x30 fs/proc/fd.c:276 lookup_open+0x619/0x1870 fs/namei.c:3219 do_last fs/namei.c:3331 [inline] path_openat+0x193d/0x3f70 fs/namei.c:3566 do_filp_open+0x18e/0x250 fs/namei.c:3600 do_sys_open+0x2c5/0x430 fs/open.c:1065 SYSC_open fs/open.c:1083 [inline] SyS_open+0x2d/0x40 fs/open.c:1078 do_syscall_64+0x1eb/0x630 arch/x86/entry/common.c:289 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x412bc1 RSP: 002b:00007f10b5075bb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 RAX: ffffffffffffffda RBX: 00007f10b5075c90 RCX: 0000000000412bc1 RDX: 00007f10b5075bdf RSI: 0000000000000002 RDI: 00007f10b5075bd0 RBP: 000000000073bf00 R08: 0000000000000000 R09: 000000000000000f R10: 0000000000000004 R11: 0000000000000293 R12: 00007f10b50766d4 R13: 00000000004c7bc0 R14: 00000000004ddcd0 R15: 0000000000000005 kobject: 'loop3' (ffff8880a4a411e0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop3' (ffff8880a4a411e0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a411e0): fill_kobj_path: path = '/devices/virtual/block/loop3' FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 kobject: 'loop4' (ffff8880a4a5a120): kobject_uevent_env CPU: 0 PID: 15275 Comm: syz-executor.3 Not tainted 4.14.111 #1 kobject: 'loop4' (ffff8880a4a5a120): fill_kobj_path: path = '/devices/virtual/block/loop4' Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x138/0x19c lib/dump_stack.c:53 kobject: 'loop0' (ffff88809510d3a0): kobject_uevent_env fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10f/0x159 lib/fault-inject.c:149 should_failslab+0xdb/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc+0x2d9/0x780 mm/slab.c:3550 kobject: 'loop0' (ffff88809510d3a0): fill_kobj_path: path = '/devices/virtual/block/loop0' kmem_cache_zalloc include/linux/slab.h:651 [inline] inode_alloc_security security/selinux/hooks.c:233 [inline] selinux_inode_alloc_security+0xb6/0x2a0 security/selinux/hooks.c:2871 kobject: 'loop5' (ffff8880a4a901a0): kobject_uevent_env security_inode_alloc+0x9a/0xe0 security/security.c:438 inode_init_always+0x552/0xaf0 fs/inode.c:167 kobject: 'loop5' (ffff8880a4a901a0): fill_kobj_path: path = '/devices/virtual/block/loop5' alloc_inode+0x83/0x190 fs/inode.c:216 new_inode_pseudo+0x19/0xf0 fs/inode.c:891 new_inode+0x1f/0x40 fs/inode.c:920 proc_pid_make_inode+0x22/0x230 fs/proc/base.c:1763 kobject: 'loop5' (ffff8880a4a901a0): kobject_uevent_env proc_fd_instantiate+0x4e/0x180 fs/proc/fd.c:177 kobject: 'loop5' (ffff8880a4a901a0): fill_kobj_path: path = '/devices/virtual/block/loop5' proc_lookupfd_common+0x1d0/0x2a0 fs/proc/fd.c:212 proc_lookupfd+0x25/0x30 fs/proc/fd.c:276 lookup_open+0x619/0x1870 fs/namei.c:3219 do_last fs/namei.c:3331 [inline] path_openat+0x193d/0x3f70 fs/namei.c:3566 do_filp_open+0x18e/0x250 fs/namei.c:3600 do_sys_open+0x2c5/0x430 fs/open.c:1065 SYSC_open fs/open.c:1083 [inline] SyS_open+0x2d/0x40 fs/open.c:1078 do_syscall_64+0x1eb/0x630 arch/x86/entry/common.c:289 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x412bc1 RSP: 002b:00007f10b5075bb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 RAX: ffffffffffffffda RBX: 00007f10b5075c90 RCX: 0000000000412bc1 RDX: 00007f10b5075bdf RSI: 0000000000000002 RDI: 00007f10b5075bd0 RBP: 000000000073bf00 R08: 0000000000000000 R09: 000000000000000f R10: 0000000000000004 R11: 0000000000000293 R12: 00007f10b50766d4 R13: 00000000004c7bc0 R14: 00000000004ddcd0 R15: 0000000000000005 kobject: 'loop2' (ffff8880a49d6f60): kobject_uevent_env kobject: 'loop2' (ffff8880a49d6f60): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop4' (ffff8880a4a5a120): kobject_uevent_env kobject: 'loop4' (ffff8880a4a5a120): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop5' (ffff8880a4a901a0): kobject_uevent_env FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 kobject: 'loop5' (ffff8880a4a901a0): fill_kobj_path: path = '/devices/virtual/block/loop5' CPU: 1 PID: 15296 Comm: syz-executor.3 Not tainted 4.14.111 #1 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x138/0x19c lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10f/0x159 lib/fault-inject.c:149 should_failslab+0xdb/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc+0x2d9/0x780 mm/slab.c:3550 kmem_cache_zalloc include/linux/slab.h:651 [inline] inode_alloc_security security/selinux/hooks.c:233 [inline] selinux_inode_alloc_security+0xb6/0x2a0 security/selinux/hooks.c:2871 security_inode_alloc+0x9a/0xe0 security/security.c:438 inode_init_always+0x552/0xaf0 fs/inode.c:167 alloc_inode+0x83/0x190 fs/inode.c:216 new_inode_pseudo+0x19/0xf0 fs/inode.c:891 new_inode+0x1f/0x40 fs/inode.c:920 proc_pid_make_inode+0x22/0x230 fs/proc/base.c:1763 kobject: 'loop3' (ffff8880a4a411e0): kobject_uevent_env proc_fd_instantiate+0x4e/0x180 fs/proc/fd.c:177 kobject: 'loop3' (ffff8880a4a411e0): fill_kobj_path: path = '/devices/virtual/block/loop3' proc_lookupfd_common+0x1d0/0x2a0 fs/proc/fd.c:212 proc_lookupfd+0x25/0x30 fs/proc/fd.c:276 lookup_open+0x619/0x1870 fs/namei.c:3219 do_last fs/namei.c:3331 [inline] path_openat+0x193d/0x3f70 fs/namei.c:3566 do_filp_open+0x18e/0x250 fs/namei.c:3600 kobject: 'loop0' (ffff88809510d3a0): kobject_uevent_env kobject: 'loop0' (ffff88809510d3a0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop5' (ffff8880a4a901a0): kobject_uevent_env do_sys_open+0x2c5/0x430 fs/open.c:1065 SYSC_open fs/open.c:1083 [inline] SyS_open+0x2d/0x40 fs/open.c:1078 do_syscall_64+0x1eb/0x630 arch/x86/entry/common.c:289 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x412bc1 RSP: 002b:00007f10b5075bb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 RAX: ffffffffffffffda RBX: 00007f10b5075c90 RCX: 0000000000412bc1 RDX: 00007f10b5075bdf RSI: 0000000000000002 RDI: 00007f10b5075bd0 RBP: 000000000073bf00 R08: 0000000000000000 R09: 000000000000000f R10: 0000000000000004 R11: 0000000000000293 R12: 00007f10b50766d4 R13: 00000000004c7bc0 R14: 00000000004ddcd0 R15: 0000000000000005