should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc_trace+0x29a/0x3d0 mm/slab.c:3616 kmalloc include/linux/slab.h:488 [inline] kzalloc include/linux/slab.h:661 [inline] call_usermodehelper_setup+0x73/0x2e0 kernel/umh.c:383 ====================================================== kobject_uevent_env+0xc28/0xf40 lib/kobject_uevent.c:525 WARNING: possible circular locking dependency detected loop_set_fd drivers/block/loop.c:948 [inline] lo_ioctl+0x11a6/0x1cd0 drivers/block/loop.c:1417 4.14.212-syzkaller #0 Not tainted ------------------------------------------------------ __blkdev_driver_ioctl block/ioctl.c:297 [inline] blkdev_ioctl+0x540/0x1830 block/ioctl.c:594 syz-executor.2/28127 is trying to acquire lock: (&table[i].mutex ){+.+.} , at: [] ip_set_nfnl_put+0x11a/0x310 net/netfilter/ipset/ip_set_core.c:732 block_ioctl+0xd9/0x120 fs/block_dev.c:1893 but task is already holding lock: ( vfs_ioctl fs/ioctl.c:46 [inline] file_ioctl fs/ioctl.c:500 [inline] do_vfs_ioctl+0x75a/0xff0 fs/ioctl.c:684 &xt[i].mutex ){+.+.} , at: [] xt_find_table_lock+0x38/0x3d0 net/netfilter/x_tables.c:1092 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: SYSC_ioctl fs/ioctl.c:701 [inline] SyS_ioctl+0x7f/0xb0 fs/ioctl.c:692 -> #1 ( do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 &xt[i].mutex){+.+.} entry_SYSCALL_64_after_hwframe+0x46/0xbb : RIP: 0033:0x45dfb7 __mutex_lock_common kernel/locking/mutex.c:756 [inline] __mutex_lock+0xc4/0x1310 kernel/locking/mutex.c:893 RSP: 002b:00007ff27b16ba18 EFLAGS: 00000246 xt_find_revision+0x88/0x200 net/netfilter/x_tables.c:373 ORIG_RAX: 0000000000000010 nfnl_compat_get+0x1f7/0x870 net/netfilter/nft_compat.c:678 RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 000000000045dfb7 nfnetlink_rcv_msg+0x9bb/0xc00 net/netfilter/nfnetlink.c:214 RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 netlink_rcv_skb+0x125/0x390 net/netlink/af_netlink.c:2433 RBP: 0000000000000000 R08: 0000000020000230 R09: 0000000000000000 nfnetlink_rcv+0x1ab/0x1da0 net/netfilter/nfnetlink.c:515 R10: 000000000008b000 R11: 0000000000000246 R12: 0000000000000002 netlink_unicast_kernel net/netlink/af_netlink.c:1287 [inline] netlink_unicast+0x437/0x610 net/netlink/af_netlink.c:1313 R13: 0000000000000005 R14: 0000000000000005 R15: 0000000020000240 netlink_sendmsg+0x62e/0xb80 net/netlink/af_netlink.c:1878 sock_sendmsg_nosec net/socket.c:646 [inline] sock_sendmsg+0xb5/0x100 net/socket.c:656 ___sys_sendmsg+0x6c8/0x800 net/socket.c:2062 __sys_sendmsg+0xa3/0x120 net/socket.c:2096 SYSC_sendmsg net/socket.c:2107 [inline] SyS_sendmsg+0x27/0x40 net/socket.c:2103 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 ISO 9660 Extensions: Microsoft Joliet Level 3 entry_SYSCALL_64_after_hwframe+0x46/0xbb -> #0 (&table[i].mutex){+.+.}: lock_acquire+0x170/0x3f0 kernel/locking/lockdep.c:3998 __mutex_lock_common kernel/locking/mutex.c:756 [inline] __mutex_lock+0xc4/0x1310 kernel/locking/mutex.c:893 ip_set_nfnl_put+0x11a/0x310 net/netfilter/ipset/ip_set_core.c:732 set_target_v1_destroy+0xd7/0x150 net/netfilter/xt_set.c:392 cleanup_entry+0x1fd/0x2d0 net/ipv4/netfilter/ip_tables.c:666 __do_replace+0x38d/0x570 net/ipv4/netfilter/ip_tables.c:1086 do_replace net/ipv4/netfilter/ip_tables.c:1142 [inline] do_ipt_set_ctl+0x256/0x39e net/ipv4/netfilter/ip_tables.c:1674 nf_sockopt net/netfilter/nf_sockopt.c:106 [inline] nf_setsockopt+0x5f/0xb0 net/netfilter/nf_sockopt.c:115 ip_setsockopt net/ipv4/ip_sockglue.c:1255 [inline] ip_setsockopt+0x94/0xb0 net/ipv4/ip_sockglue.c:1240 raw_setsockopt+0xac/0xd0 net/ipv4/raw.c:857 SYSC_setsockopt net/socket.c:1865 [inline] SyS_setsockopt+0x110/0x1e0 net/socket.c:1844 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb other info that might help us debug this: Possible unsafe locking scenario: CPU0 CPU1 ---- ---- lock(&xt[i].mutex); lock(&table[i].mutex); lock(&xt[i].mutex); lock(&table[i].mutex); *** DEADLOCK *** 1 lock held by syz-executor.2/28127: #0: (&xt[i].mutex){+.+.}, at: [] xt_find_table_lock+0x38/0x3d0 net/netfilter/x_tables.c:1092 stack backtrace: CPU: 1 PID: 28127 Comm: syz-executor.2 Not tainted 4.14.212-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 print_circular_bug.constprop.0.cold+0x2d7/0x41e kernel/locking/lockdep.c:1258 check_prev_add kernel/locking/lockdep.c:1905 [inline] check_prevs_add kernel/locking/lockdep.c:2022 [inline] validate_chain kernel/locking/lockdep.c:2464 [inline] __lock_acquire+0x2e0e/0x3f20 kernel/locking/lockdep.c:3491 lock_acquire+0x170/0x3f0 kernel/locking/lockdep.c:3998 __mutex_lock_common kernel/locking/mutex.c:756 [inline] __mutex_lock+0xc4/0x1310 kernel/locking/mutex.c:893 ip_set_nfnl_put+0x11a/0x310 net/netfilter/ipset/ip_set_core.c:732 set_target_v1_destroy+0xd7/0x150 net/netfilter/xt_set.c:392 cleanup_entry+0x1fd/0x2d0 net/ipv4/netfilter/ip_tables.c:666 __do_replace+0x38d/0x570 net/ipv4/netfilter/ip_tables.c:1086 do_replace net/ipv4/netfilter/ip_tables.c:1142 [inline] do_ipt_set_ctl+0x256/0x39e net/ipv4/netfilter/ip_tables.c:1674 nf_sockopt net/netfilter/nf_sockopt.c:106 [inline] nf_setsockopt+0x5f/0xb0 net/netfilter/nf_sockopt.c:115 ip_setsockopt net/ipv4/ip_sockglue.c:1255 [inline] ip_setsockopt+0x94/0xb0 net/ipv4/ip_sockglue.c:1240 raw_setsockopt+0xac/0xd0 net/ipv4/raw.c:857 SYSC_setsockopt net/socket.c:1865 [inline] SyS_setsockopt+0x110/0x1e0 net/socket.c:1844 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x45e149 RSP: 002b:00007f7842fcdc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045e149 RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000003 RBP: 000000000119bfd0 R08: 0000000000000230 R09: 0000000000000000 R10: 0000000020000140 R11: 0000000000000246 R12: 000000000119bf8c R13: 00007ffd7f25335f R14: 00007f7842fce9c0 R15: 000000000119bf8c ip_tables: iptables: counters copy to user failed while replacing table ISOFS: Unable to identify CD-ROM format. print_req_error: 211 callbacks suppressed print_req_error: I/O error, dev loop1, sector 0 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 ISO 9660 Extensions: Microsoft Joliet Level 3 CPU: 1 PID: 28155 Comm: syz-executor.4 Not tainted 4.14.212-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x154 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc+0x28e/0x3c0 mm/slab.c:3550 ext4_alloc_inode+0x1a/0x640 fs/ext4/super.c:1013 alloc_inode+0x5d/0x170 fs/inode.c:210 new_inode_pseudo fs/inode.c:899 [inline] new_inode+0x1d/0xf0 fs/inode.c:928 __ext4_new_inode+0x360/0x4eb0 fs/ext4/ialloc.c:840 ext4_mkdir+0x2e4/0xbd0 fs/ext4/namei.c:2675 vfs_mkdir+0x463/0x6e0 fs/namei.c:3849 SYSC_mkdirat fs/namei.c:3872 [inline] SyS_mkdirat+0x1fd/0x270 fs/namei.c:3856 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x45d567 RSP: 002b:00007fecb7186a78 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 RAX: ffffffffffffffda RBX: 00007fecb7186b10 RCX: 000000000045d567 RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 RBP: 00007fecb7186ad0 R08: 00000000200001f0 R09: 0000000000000000 R10: 000000000008b000 R11: 0000000000000213 R12: 0000000020000000 R13: 0000000020000100 R14: 00000000200001c0 R15: 0000000020000200 ip_tables: iptables: counters copy to user failed while replacing table ISO 9660 Extensions: Microsoft Joliet Level 3 ISOFS: Unable to identify CD-ROM format. FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 print_req_error: I/O error, dev loop1, sector 0 ISO 9660 Extensions: Microsoft Joliet Level 3 print_req_error: I/O error, dev loop1, sector 0 buffer_io_error: 202 callbacks suppressed Buffer I/O error on dev loop1, logical block 0, async page read CPU: 0 PID: 28184 Comm: syz-executor.1 Not tainted 4.14.212-syzkaller #0 print_req_error: I/O error, dev loop1, sector 0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x154 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc_trace+0x29a/0x3d0 mm/slab.c:3616 kmalloc include/linux/slab.h:488 [inline] kzalloc include/linux/slab.h:661 [inline] call_usermodehelper_setup+0x73/0x2e0 kernel/umh.c:383 kobject_uevent_env+0xc28/0xf40 lib/kobject_uevent.c:525 loop_set_fd drivers/block/loop.c:948 [inline] lo_ioctl+0x11a6/0x1cd0 drivers/block/loop.c:1417 __blkdev_driver_ioctl block/ioctl.c:297 [inline] blkdev_ioctl+0x540/0x1830 block/ioctl.c:594 block_ioctl+0xd9/0x120 fs/block_dev.c:1893 vfs_ioctl fs/ioctl.c:46 [inline] file_ioctl fs/ioctl.c:500 [inline] do_vfs_ioctl+0x75a/0xff0 fs/ioctl.c:684 SYSC_ioctl fs/ioctl.c:701 [inline] SyS_ioctl+0x7f/0xb0 fs/ioctl.c:692 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x45dfb7 RSP: 002b:00007ff27b16ba18 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 000000000045dfb7 RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 RBP: 0000000000000000 R08: 0000000020000230 R09: 0000000000000000 R10: 000000000008b000 R11: 0000000000000246 R12: 0000000000000002 R13: 0000000000000005 R14: 0000000000000005 R15: 0000000020000240 print_req_error: I/O error, dev loop4, sector 0 Buffer I/O error on dev loop1, logical block 0, async page read FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 print_req_error: I/O error, dev loop3, sector 0 CPU: 0 PID: 28194 Comm: syz-executor.4 Not tainted 4.14.212-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x154 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc+0x28e/0x3c0 mm/slab.c:3550 ext4_alloc_inode+0x1a/0x640 fs/ext4/super.c:1013 alloc_inode+0x5d/0x170 fs/inode.c:210 new_inode_pseudo fs/inode.c:899 [inline] new_inode+0x1d/0xf0 fs/inode.c:928 __ext4_new_inode+0x360/0x4eb0 fs/ext4/ialloc.c:840 ext4_mkdir+0x2e4/0xbd0 fs/ext4/namei.c:2675 vfs_mkdir+0x463/0x6e0 fs/namei.c:3849 SYSC_mkdirat fs/namei.c:3872 [inline] SyS_mkdirat+0x1fd/0x270 fs/namei.c:3856 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x45d567 RSP: 002b:00007fecb7186a78 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 RAX: ffffffffffffffda RBX: 00007fecb7186b10 RCX: 000000000045d567 RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 RBP: 00007fecb7186ad0 R08: 00000000200001f0 R09: 0000000000000000 R10: 000000000008b000 R11: 0000000000000213 R12: 0000000020000000 R13: 0000000020000100 R14: 00000000200001c0 R15: 0000000020000200 ISO 9660 Extensions: Microsoft Joliet Level 3 ip_tables: iptables: counters copy to user failed while replacing table ISO 9660 Extensions: Microsoft Joliet Level 3 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 28223 Comm: syz-executor.1 Not tainted 4.14.212-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x154 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] __do_kmalloc mm/slab.c:3718 [inline] __kmalloc_track_caller+0x2bc/0x400 mm/slab.c:3735 ISOFS: Unable to identify CD-ROM format. memdup_user+0x22/0xa0 mm/util.c:164 strndup_user+0x5b/0xf0 mm/util.c:195 copy_mount_string fs/namespace.c:2783 [inline] SYSC_mount fs/namespace.c:3080 [inline] SyS_mount+0x39/0x120 fs/namespace.c:3072 ip_tables: iptables: counters copy to user failed while replacing table do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x460b9a RSP: 002b:00007ff27b16ba78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007ff27b16bb10 RCX: 0000000000460b9a RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff27b16bad0 RBP: 00007ff27b16bad0 R08: 00007ff27b16bb10 R09: 0000000020000000 R10: 0000000000000001 R11: 0000000000000202 R12: 0000000020000000 R13: 0000000020000100 R14: 0000000020000200 R15: 00000000200000c0 CPU: 0 PID: 28224 Comm: syz-executor.4 Not tainted 4.14.212-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x154 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] __do_kmalloc mm/slab.c:3718 [inline] __kmalloc+0x2c1/0x400 mm/slab.c:3729 kmalloc include/linux/slab.h:493 [inline] kzalloc include/linux/slab.h:661 [inline] ext4_find_extent+0x879/0xbc0 fs/ext4/extents.c:909 ext4_ext_map_blocks+0x19a/0x6b10 fs/ext4/extents.c:4322 ext4_map_blocks+0x675/0x1730 fs/ext4/inode.c:648 ext4_getblk+0x98/0x3f0 fs/ext4/inode.c:984 ext4_bread+0x6c/0x1a0 fs/ext4/inode.c:1034 ext4_append+0x143/0x350 fs/ext4/namei.c:65 ext4_init_new_dir fs/ext4/namei.c:2638 [inline] ext4_mkdir+0x4c9/0xbd0 fs/ext4/namei.c:2685 vfs_mkdir+0x463/0x6e0 fs/namei.c:3849 SYSC_mkdirat fs/namei.c:3872 [inline] SyS_mkdirat+0x1fd/0x270 fs/namei.c:3856 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x45d567 RSP: 002b:00007fecb7186a78 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 RAX: ffffffffffffffda RBX: 00007fecb7186b10 RCX: 000000000045d567 RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 RBP: 00007fecb7186ad0 R08: 00000000200001f0 R09: 0000000000000000 R10: 000000000008b000 R11: 0000000000000213 R12: 0000000020000000 R13: 0000000020000100 R14: 00000000200001c0 R15: 0000000020000200 print_req_error: I/O error, dev loop5, sector 0 ISO 9660 Extensions: Microsoft Joliet Level 3 ISO 9660 Extensions: Microsoft Joliet Level 3 ISOFS: Logical zone size(0) < hardware blocksize(1024) FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 28260 Comm: syz-executor.4 Not tainted 4.14.212-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x154 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] __do_kmalloc mm/slab.c:3718 [inline] __kmalloc+0x2c1/0x400 mm/slab.c:3729 kmalloc include/linux/slab.h:493 [inline] kzalloc include/linux/slab.h:661 [inline] ext4_find_extent+0x879/0xbc0 fs/ext4/extents.c:909 ext4_ext_map_blocks+0x19a/0x6b10 fs/ext4/extents.c:4322 ext4_map_blocks+0x675/0x1730 fs/ext4/inode.c:648 ext4_getblk+0x98/0x3f0 fs/ext4/inode.c:984 ext4_bread+0x6c/0x1a0 fs/ext4/inode.c:1034 ext4_append+0x143/0x350 fs/ext4/namei.c:65 ext4_init_new_dir fs/ext4/namei.c:2638 [inline] ext4_mkdir+0x4c9/0xbd0 fs/ext4/namei.c:2685 vfs_mkdir+0x463/0x6e0 fs/namei.c:3849 SYSC_mkdirat fs/namei.c:3872 [inline] SyS_mkdirat+0x1fd/0x270 fs/namei.c:3856 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x45d567 RSP: 002b:00007fecb7186a78 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 RAX: ffffffffffffffda RBX: 00007fecb7186b10 RCX: 000000000045d567 RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 RBP: 00007fecb7186ad0 R08: 00000000200001f0 R09: 0000000000000000 R10: 000000000008b000 R11: 0000000000000213 R12: 0000000020000000 R13: 0000000020000100 R14: 00000000200001c0 R15: 0000000020000200 ISO 9660 Extensions: Microsoft Joliet Level 3 ISO 9660 Extensions: Microsoft Joliet Level 3 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 ISOFS: Logical zone size(0) < hardware blocksize(1024) CPU: 0 PID: 28265 Comm: syz-executor.1 Not tainted 4.14.212-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x154 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] __do_kmalloc mm/slab.c:3718 [inline] __kmalloc_track_caller+0x2bc/0x400 mm/slab.c:3735 memdup_user+0x22/0xa0 mm/util.c:164 strndup_user+0x5b/0xf0 mm/util.c:195 copy_mount_string fs/namespace.c:2783 [inline] SYSC_mount fs/namespace.c:3080 [inline] SyS_mount+0x39/0x120 fs/namespace.c:3072 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x460b9a RSP: 002b:00007ff27b16ba78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007ff27b16bb10 RCX: 0000000000460b9a RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff27b16bad0 RBP: 00007ff27b16bad0 R08: 00007ff27b16bb10 R09: 0000000020000000 R10: 0000000000000001 R11: 0000000000000202 R12: 0000000020000000 R13: 0000000020000100 R14: 0000000020000200 R15: 00000000200000c0 print_req_error: I/O error, dev loop3, sector 0 ISO 9660 Extensions: Microsoft Joliet Level 3 ISO 9660 Extensions: Microsoft Joliet Level 3 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 ISO 9660 Extensions: Microsoft Joliet Level 3 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 28311 Comm: syz-executor.1 Not tainted 4.14.212-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x154 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] __do_kmalloc mm/slab.c:3718 [inline] __kmalloc_track_caller+0x2bc/0x400 mm/slab.c:3735 memdup_user+0x22/0xa0 mm/util.c:164 strndup_user+0x5b/0xf0 mm/util.c:195 copy_mount_string fs/namespace.c:2783 [inline] SYSC_mount fs/namespace.c:3080 [inline] SyS_mount+0x39/0x120 fs/namespace.c:3072 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x460b9a RSP: 002b:00007ff27b16ba78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007ff27b16bb10 RCX: 0000000000460b9a RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff27b16bad0 RBP: 00007ff27b16bad0 R08: 00007ff27b16bb10 R09: 0000000020000000 R10: 0000000000000001 R11: 0000000000000202 R12: 0000000020000000 R13: 0000000020000100 R14: 0000000020000200 R15: 00000000200000c0 CPU: 1 PID: 28315 Comm: syz-executor.4 Not tainted 4.14.212-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ISOFS: Logical zone size(0) < hardware blocksize(1024) Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x154 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc+0x40/0x3c0 mm/slab.c:3550 ext4_es_alloc_extent fs/ext4/extents_status.c:334 [inline] __es_insert_extent+0x338/0x1360 fs/ext4/extents_status.c:673 ext4_es_insert_extent+0x1b9/0x530 fs/ext4/extents_status.c:727 ext4_map_blocks+0x887/0x1730 fs/ext4/inode.c:719 ext4_getblk+0x98/0x3f0 fs/ext4/inode.c:984 ext4_bread+0x6c/0x1a0 fs/ext4/inode.c:1034 ext4_append+0x143/0x350 fs/ext4/namei.c:65 ext4_init_new_dir fs/ext4/namei.c:2638 [inline] ext4_mkdir+0x4c9/0xbd0 fs/ext4/namei.c:2685 vfs_mkdir+0x463/0x6e0 fs/namei.c:3849 SYSC_mkdirat fs/namei.c:3872 [inline] SyS_mkdirat+0x1fd/0x270 fs/namei.c:3856 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x45d567 RSP: 002b:00007fecb7186a78 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 RAX: ffffffffffffffda RBX: 00007fecb7186b10 RCX: 000000000045d567 RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 RBP: 00007fecb7186ad0 R08: 00000000200001f0 R09: 0000000000000000 R10: 000000000008b000 R11: 0000000000000213 R12: 0000000020000000 R13: 0000000020000100 R14: 00000000200001c0 R15: 0000000020000200 print_req_error: I/O error, dev loop3, sector 0 ISO 9660 Extensions: Microsoft Joliet Level 3 ISO 9660 Extensions: Microsoft Joliet Level 3 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 28343 Comm: syz-executor.1 Not tainted 4.14.212-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x154 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc_trace+0x29a/0x3d0 mm/slab.c:3616 kmalloc include/linux/slab.h:488 [inline] copy_mount_options+0x59/0x2f0 fs/namespace.c:2758 SYSC_mount fs/namespace.c:3090 [inline] SyS_mount+0x84/0x120 fs/namespace.c:3072 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x460b9a RSP: 002b:00007ff27b16ba78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007ff27b16bb10 RCX: 0000000000460b9a RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff27b16bad0 RBP: 00007ff27b16bad0 R08: 00007ff27b16bb10 R09: 0000000020000000 R10: 0000000000000001 R11: 0000000000000202 R12: 0000000020000000 R13: 0000000020000100 R14: 0000000020000200 R15: 00000000200000c0 ISO 9660 Extensions: Microsoft Joliet Level 3 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 28360 Comm: syz-executor.4 Not tainted 4.14.212-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x154 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 ISO 9660 Extensions: Microsoft Joliet Level 3 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc+0x40/0x3c0 mm/slab.c:3550 ext4_es_alloc_extent fs/ext4/extents_status.c:334 [inline] __es_insert_extent+0x338/0x1360 fs/ext4/extents_status.c:673 ext4_es_insert_extent+0x1b9/0x530 fs/ext4/extents_status.c:727 ext4_map_blocks+0x887/0x1730 fs/ext4/inode.c:719 ext4_getblk+0x98/0x3f0 fs/ext4/inode.c:984 ext4_bread+0x6c/0x1a0 fs/ext4/inode.c:1034 ext4_append+0x143/0x350 fs/ext4/namei.c:65 ext4_init_new_dir fs/ext4/namei.c:2638 [inline] ext4_mkdir+0x4c9/0xbd0 fs/ext4/namei.c:2685 vfs_mkdir+0x463/0x6e0 fs/namei.c:3849 SYSC_mkdirat fs/namei.c:3872 [inline] SyS_mkdirat+0x1fd/0x270 fs/namei.c:3856 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x45d567 RSP: 002b:00007fecb7186a78 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 RAX: ffffffffffffffda RBX: 00007fecb7186b10 RCX: 000000000045d567 RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 RBP: 00007fecb7186ad0 R08: 00000000200001f0 R09: 0000000000000000 R10: 000000000008b000 R11: 0000000000000213 R12: 0000000020000000 R13: 0000000020000100 R14: 00000000200001c0 R15: 0000000020000200 isofs_fill_super: root inode is not a directory. Corrupted media? ISO 9660 Extensions: Microsoft Joliet Level 3 ISO 9660 Extensions: Microsoft Joliet Level 3 ISO 9660 Extensions: Microsoft Joliet Level 3 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 28381 Comm: syz-executor.1 Not tainted 4.14.212-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ISO 9660 Extensions: Microsoft Joliet Level 3 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x154 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc_trace+0x29a/0x3d0 mm/slab.c:3616 kmalloc include/linux/slab.h:488 [inline] copy_mount_options+0x59/0x2f0 fs/namespace.c:2758 SYSC_mount fs/namespace.c:3090 [inline] SyS_mount+0x84/0x120 fs/namespace.c:3072 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x460b9a RSP: 002b:00007ff27b16ba78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007ff27b16bb10 RCX: 0000000000460b9a RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff27b16bad0 RBP: 00007ff27b16bad0 R08: 00007ff27b16bb10 R09: 0000000020000000 isofs_fill_super: root inode is not a directory. Corrupted media? R10: 0000000000000001 R11: 0000000000000202 R12: 0000000020000000 R13: 0000000020000100 R14: 0000000020000200 R15: 00000000200000c0 ISO 9660 Extensions: Microsoft Joliet Level 3 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 28400 Comm: syz-executor.4 Not tainted 4.14.212-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x154 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc+0x40/0x3c0 mm/slab.c:3550 mempool_alloc+0x10e/0x2d0 mm/mempool.c:330 bio_alloc_bioset+0x41b/0x830 block/bio.c:486 bio_alloc include/linux/bio.h:422 [inline] submit_bh_wbc+0xf5/0x6f0 fs/buffer.c:3121 submit_bh fs/buffer.c:3153 [inline] __sync_dirty_buffer+0xef/0x290 fs/buffer.c:3248 __ext4_handle_dirty_metadata+0x169/0x480 fs/ext4/ext4_jbd2.c:300 ext4_getblk+0x281/0x3f0 fs/ext4/inode.c:1018 ext4_bread+0x6c/0x1a0 fs/ext4/inode.c:1034 ext4_append+0x143/0x350 fs/ext4/namei.c:65 ext4_init_new_dir fs/ext4/namei.c:2638 [inline] ext4_mkdir+0x4c9/0xbd0 fs/ext4/namei.c:2685 vfs_mkdir+0x463/0x6e0 fs/namei.c:3849 SYSC_mkdirat fs/namei.c:3872 [inline] SyS_mkdirat+0x1fd/0x270 fs/namei.c:3856 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x45d567 RSP: 002b:00007fecb7186a78 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 RAX: ffffffffffffffda RBX: 00007fecb7186b10 RCX: 000000000045d567 RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 RBP: 00007fecb7186ad0 R08: 00000000200001f0 R09: 0000000000000000 R10: 000000000008b000 R11: 0000000000000213 R12: 0000000020000000 R13: 0000000020000100 R14: 00000000200001c0 R15: 0000000020000200 ISO 9660 Extensions: Microsoft Joliet Level 3 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 ISO 9660 Extensions: Microsoft Joliet Level 3 isofs_fill_super: root inode is not a directory. Corrupted media? CPU: 1 PID: 28423 Comm: syz-executor.1 Not tainted 4.14.212-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x154 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc+0x28e/0x3c0 mm/slab.c:3550 getname_flags+0xc8/0x550 fs/namei.c:138 user_path_at_empty+0x2a/0x50 fs/namei.c:2631 user_path include/linux/namei.h:62 [inline] do_mount+0x118/0x2a00 fs/namespace.c:2819 SYSC_mount fs/namespace.c:3095 [inline] SyS_mount+0xa8/0x120 fs/namespace.c:3072 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x460b9a RSP: 002b:00007ff27b16ba78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007ff27b16bb10 RCX: 0000000000460b9a RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff27b16bad0 RBP: 00007ff27b16bad0 R08: 00007ff27b16bb10 R09: 0000000020000000 R10: 0000000000000001 R11: 0000000000000202 R12: 0000000020000000 R13: 0000000020000100 R14: 0000000020000200 R15: 00000000200000c0 CPU: 0 PID: 28448 Comm: syz-executor.4 Not tainted 4.14.212-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x154 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc_node mm/slab.c:3297 [inline] kmem_cache_alloc_node+0x54/0x410 mm/slab.c:3640 create_task_io_context+0x2a/0x3c0 block/blk-ioc.c:278 create_io_context block/blk.h:323 [inline] generic_make_request_checks+0x1350/0x19f0 block/blk-core.c:2127 generic_make_request+0x67/0x850 block/blk-core.c:2185 submit_bio+0x234/0x390 block/blk-core.c:2303 submit_bh_wbc+0x526/0x6f0 fs/buffer.c:3147 submit_bh fs/buffer.c:3153 [inline] __sync_dirty_buffer+0xef/0x290 fs/buffer.c:3248 __ext4_handle_dirty_metadata+0x169/0x480 fs/ext4/ext4_jbd2.c:300 ext4_getblk+0x281/0x3f0 fs/ext4/inode.c:1018 ext4_bread+0x6c/0x1a0 fs/ext4/inode.c:1034 ext4_append+0x143/0x350 fs/ext4/namei.c:65 ext4_init_new_dir fs/ext4/namei.c:2638 [inline] ext4_mkdir+0x4c9/0xbd0 fs/ext4/namei.c:2685 vfs_mkdir+0x463/0x6e0 fs/namei.c:3849 SYSC_mkdirat fs/namei.c:3872 [inline] SyS_mkdirat+0x1fd/0x270 fs/namei.c:3856 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x45d567 RSP: 002b:00007fecb7186a78 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 RAX: ffffffffffffffda RBX: 00007fecb7186b10 RCX: 000000000045d567 RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 RBP: 00007fecb7186ad0 R08: 00000000200001f0 R09: 0000000000000000 R10: 000000000008b000 R11: 0000000000000213 R12: 0000000020000000 R13: 0000000020000100 R14: 00000000200001c0 R15: 0000000020000200 ISO 9660 Extensions: Microsoft Joliet Level 3 print_req_error: I/O error, dev loop3, sector 4 Buffer I/O error on dev loop3, logical block 1, async page read ISO 9660 Extensions: Microsoft Joliet Level 3 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 28481 Comm: syz-executor.4 Not tainted 4.14.212-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x154 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc_node mm/slab.c:3297 [inline] kmem_cache_alloc_node+0x54/0x410 mm/slab.c:3640 create_task_io_context+0x2a/0x3c0 block/blk-ioc.c:278 create_io_context block/blk.h:323 [inline] generic_make_request_checks+0x1350/0x19f0 block/blk-core.c:2127 generic_make_request+0x67/0x850 block/blk-core.c:2185 submit_bio+0x234/0x390 block/blk-core.c:2303 submit_bh_wbc+0x526/0x6f0 fs/buffer.c:3147 submit_bh fs/buffer.c:3153 [inline] __sync_dirty_buffer+0xef/0x290 fs/buffer.c:3248 __ext4_handle_dirty_metadata+0x169/0x480 fs/ext4/ext4_jbd2.c:300 ext4_getblk+0x281/0x3f0 fs/ext4/inode.c:1018 ext4_bread+0x6c/0x1a0 fs/ext4/inode.c:1034 ext4_append+0x143/0x350 fs/ext4/namei.c:65 ext4_init_new_dir fs/ext4/namei.c:2638 [inline] ext4_mkdir+0x4c9/0xbd0 fs/ext4/namei.c:2685 vfs_mkdir+0x463/0x6e0 fs/namei.c:3849 SYSC_mkdirat fs/namei.c:3872 [inline] SyS_mkdirat+0x1fd/0x270 fs/namei.c:3856 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x45d567 ISO 9660 Extensions: Microsoft Joliet Level 3 RSP: 002b:00007fecb7186a78 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 RAX: ffffffffffffffda RBX: 00007fecb7186b10 RCX: 000000000045d567 RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 RBP: 00007fecb7186ad0 R08: 00000000200001f0 R09: 0000000000000000 R10: 000000000008b000 R11: 0000000000000213 R12: 0000000020000000 R13: 0000000020000100 R14: 00000000200001c0 R15: 0000000020000200 ISO 9660 Extensions: Microsoft Joliet Level 3 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 isofs_fill_super: root inode is not a directory. Corrupted media? CPU: 1 PID: 28483 Comm: syz-executor.1 Not tainted 4.14.212-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x154 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc+0x28e/0x3c0 mm/slab.c:3550 kmem_cache_zalloc include/linux/slab.h:651 [inline] alloc_vfsmnt+0x23/0x7f0 fs/namespace.c:205 vfs_kern_mount.part.0+0x27/0x470 fs/namespace.c:1039 vfs_kern_mount fs/namespace.c:1036 [inline] do_new_mount fs/namespace.c:2549 [inline] do_mount+0xe53/0x2a00 fs/namespace.c:2879 SYSC_mount fs/namespace.c:3095 [inline] SyS_mount+0xa8/0x120 fs/namespace.c:3072 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x460b9a RSP: 002b:00007ff27b16ba78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007ff27b16bb10 RCX: 0000000000460b9a RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff27b16bad0 RBP: 00007ff27b16bad0 R08: 00007ff27b16bb10 R09: 0000000020000000 R10: 0000000000000001 R11: 0000000000000202 R12: 0000000020000000 R13: 0000000020000100 R14: 0000000020000200 R15: 00000000200000c0 ISO 9660 Extensions: Microsoft Joliet Level 3 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 28536 Comm: syz-executor.1 Not tainted 4.14.212-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x154 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] __do_kmalloc mm/slab.c:3718 [inline] __kmalloc_track_caller+0x2bc/0x400 mm/slab.c:3735 kstrdup+0x36/0x70 mm/util.c:56 kstrdup_const+0x35/0x60 mm/util.c:77 alloc_vfsmnt+0xe0/0x7f0 fs/namespace.c:214 vfs_kern_mount.part.0+0x27/0x470 fs/namespace.c:1039 vfs_kern_mount fs/namespace.c:1036 [inline] do_new_mount fs/namespace.c:2549 [inline] do_mount+0xe53/0x2a00 fs/namespace.c:2879 SYSC_mount fs/namespace.c:3095 [inline] SyS_mount+0xa8/0x120 fs/namespace.c:3072 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x460b9a RSP: 002b:00007ff27b16ba78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007ff27b16bb10 RCX: 0000000000460b9a RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff27b16bad0 RBP: 00007ff27b16bad0 R08: 00007ff27b16bb10 R09: 0000000020000000 R10: 0000000000000001 R11: 0000000000000202 R12: 0000000020000000 R13: 0000000020000100 R14: 0000000020000200 R15: 00000000200000c0 ISO 9660 Extensions: Microsoft Joliet Level 3 isofs_fill_super: root inode is not a directory. Corrupted media? ISO 9660 Extensions: Microsoft Joliet Level 3 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 28570 Comm: syz-executor.1 Not tainted 4.14.212-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x154 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] __do_kmalloc mm/slab.c:3718 [inline] __kmalloc_track_caller+0x2bc/0x400 mm/slab.c:3735 kstrdup+0x36/0x70 mm/util.c:56 kstrdup_const+0x35/0x60 mm/util.c:77 alloc_vfsmnt+0xe0/0x7f0 fs/namespace.c:214 vfs_kern_mount.part.0+0x27/0x470 fs/namespace.c:1039 vfs_kern_mount fs/namespace.c:1036 [inline] do_new_mount fs/namespace.c:2549 [inline] do_mount+0xe53/0x2a00 fs/namespace.c:2879 SYSC_mount fs/namespace.c:3095 [inline] SyS_mount+0xa8/0x120 fs/namespace.c:3072 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x460b9a RSP: 002b:00007ff27b16ba78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007ff27b16bb10 RCX: 0000000000460b9a RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff27b16bad0 RBP: 00007ff27b16bad0 R08: 00007ff27b16bb10 R09: 0000000020000000 R10: 0000000000000001 R11: 0000000000000202 R12: 0000000020000000 R13: 0000000020000100 R14: 0000000020000200 R15: 00000000200000c0 CPU: 1 PID: 28559 Comm: syz-executor.4 Not tainted 4.14.212-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x154 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc+0x40/0x3c0 mm/slab.c:3550 mempool_alloc+0x10e/0x2d0 mm/mempool.c:330 bio_alloc_bioset+0x41b/0x830 block/bio.c:486 bio_alloc include/linux/bio.h:422 [inline] submit_bh_wbc+0xf5/0x6f0 fs/buffer.c:3121 submit_bh fs/buffer.c:3153 [inline] __sync_dirty_buffer+0xef/0x290 fs/buffer.c:3248 __ext4_handle_dirty_metadata+0x169/0x480 fs/ext4/ext4_jbd2.c:300 ext4_handle_dirty_dirent_node fs/ext4/namei.c:401 [inline] add_dirent_to_buf+0x3a6/0x6b0 fs/ext4/namei.c:1929 ext4_add_entry+0x48a/0xa40 fs/ext4/namei.c:2132 ext4_mkdir+0x5cf/0xbd0 fs/ext4/namei.c:2690 vfs_mkdir+0x463/0x6e0 fs/namei.c:3849 SYSC_mkdirat fs/namei.c:3872 [inline] SyS_mkdirat+0x1fd/0x270 fs/namei.c:3856 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x45d567 RSP: 002b:00007fecb7186a78 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 RAX: ffffffffffffffda RBX: 00007fecb7186b10 RCX: 000000000045d567 RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 RBP: 00007fecb7186ad0 R08: 00000000200001f0 R09: 0000000000000000 R10: 000000000008b000 R11: 0000000000000213 R12: 0000000020000000 R13: 0000000020000100 R14: 00000000200001c0 R15: 0000000020000200 ISO 9660 Extensions: Microsoft Joliet Level 3 ISO 9660 Extensions: Microsoft Joliet Level 3 isofs_fill_super: root inode is not a directory. Corrupted media? FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 ISO 9660 Extensions: Microsoft Joliet Level 3 CPU: 0 PID: 28609 Comm: syz-executor.1 Not tainted 4.14.212-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x154 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc+0x28e/0x3c0 mm/slab.c:3550 getname_kernel+0x4e/0x340 fs/namei.c:218 kern_path+0x1b/0x40 fs/namei.c:2466 lookup_bdev fs/block_dev.c:2103 [inline] lookup_bdev+0xc6/0x1c0 fs/block_dev.c:2093 blkdev_get_by_path+0x1b/0xa0 fs/block_dev.c:1688 mount_bdev+0x4c/0x360 fs/super.c:1092 mount_fs+0x92/0x2a0 fs/super.c:1237 vfs_kern_mount.part.0+0x5b/0x470 fs/namespace.c:1046 vfs_kern_mount fs/namespace.c:1036 [inline] do_new_mount fs/namespace.c:2549 [inline] do_mount+0xe53/0x2a00 fs/namespace.c:2879 ISO 9660 Extensions: Microsoft Joliet Level 3 SYSC_mount fs/namespace.c:3095 [inline] SyS_mount+0xa8/0x120 fs/namespace.c:3072 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x460b9a RSP: 002b:00007ff27b16ba78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007ff27b16bb10 RCX: 0000000000460b9a RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff27b16bad0 RBP: 00007ff27b16bad0 R08: 00007ff27b16bb10 R09: 0000000020000000 R10: 0000000000000001 R11: 0000000000000202 R12: 0000000020000000 R13: 0000000020000100 R14: 0000000020000200 R15: 00000000200000c0 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 isofs_fill_super: root inode is not a directory. Corrupted media? CPU: 0 PID: 28637 Comm: syz-executor.4 Not tainted 4.14.212-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x154 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc_trace+0x29a/0x3d0 mm/slab.c:3616 kmalloc include/linux/slab.h:488 [inline] copy_mount_options+0x59/0x2f0 fs/namespace.c:2758 SYSC_mount fs/namespace.c:3090 [inline] SyS_mount+0x84/0x120 fs/namespace.c:3072 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x460b9a RSP: 002b:00007fecb7186a78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007fecb7186b10 RCX: 0000000000460b9a RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fecb7186ad0 RBP: 00007fecb7186ad0 R08: 00007fecb7186b10 R09: 0000000020000000 R10: 0000000000000001 R11: 0000000000000202 R12: 0000000020000000 R13: 0000000020000100 R14: 00000000200001c0 R15: 0000000020000200 print_req_error: I/O error, dev loop4, sector 0 ISO 9660 Extensions: Microsoft Joliet Level 3 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 28666 Comm: syz-executor.1 Not tainted 4.14.212-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x154 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc_trace+0x29a/0x3d0 mm/slab.c:3616 kmalloc include/linux/slab.h:488 [inline] kzalloc include/linux/slab.h:661 [inline] alloc_super fs/super.c:197 [inline] sget_userns+0x102/0xc10 fs/super.c:516 sget+0xd1/0x110 fs/super.c:572 mount_bdev+0xcd/0x360 fs/super.c:1107 mount_fs+0x92/0x2a0 fs/super.c:1237 vfs_kern_mount.part.0+0x5b/0x470 fs/namespace.c:1046 vfs_kern_mount fs/namespace.c:1036 [inline] do_new_mount fs/namespace.c:2549 [inline] do_mount+0xe53/0x2a00 fs/namespace.c:2879 SYSC_mount fs/namespace.c:3095 [inline] SyS_mount+0xa8/0x120 fs/namespace.c:3072 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x460b9a RSP: 002b:00007ff27b16ba78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007ff27b16bb10 RCX: 0000000000460b9a RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff27b16bad0 RBP: 00007ff27b16bad0 R08: 00007ff27b16bb10 R09: 0000000020000000 R10: 0000000000000001 R11: 0000000000000202 R12: 0000000020000000 R13: 0000000020000100 R14: 0000000020000200 R15: 00000000200000c0 CPU: 1 PID: 28677 Comm: syz-executor.4 Not tainted 4.14.212-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: ISO 9660 Extensions: Microsoft Joliet Level 3 __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x154 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc_trace+0x29a/0x3d0 mm/slab.c:3616 kmalloc include/linux/slab.h:488 [inline] copy_mount_options+0x59/0x2f0 fs/namespace.c:2758 SYSC_mount fs/namespace.c:3090 [inline] SyS_mount+0x84/0x120 fs/namespace.c:3072 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x460b9a RSP: 002b:00007fecb7186a78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007fecb7186b10 RCX: 0000000000460b9a RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fecb7186ad0 RBP: 00007fecb7186ad0 R08: 00007fecb7186b10 R09: 0000000020000000 R10: 0000000000000001 R11: 0000000000000202 R12: 0000000020000000 R13: 0000000020000100 R14: 00000000200001c0 R15: 0000000020000200 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 28713 Comm: syz-executor.1 Not tainted 4.14.212-syzkaller #0 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x154 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] __do_kmalloc mm/slab.c:3718 [inline] __kmalloc+0x2c1/0x400 mm/slab.c:3729 kmalloc include/linux/slab.h:493 [inline] kzalloc include/linux/slab.h:661 [inline] __list_lru_init+0x67/0x710 mm/list_lru.c:539 alloc_super fs/super.c:231 [inline] sget_userns+0x504/0xc10 fs/super.c:516 sget+0xd1/0x110 fs/super.c:572 mount_bdev+0xcd/0x360 fs/super.c:1107 mount_fs+0x92/0x2a0 fs/super.c:1237 vfs_kern_mount.part.0+0x5b/0x470 fs/namespace.c:1046 vfs_kern_mount fs/namespace.c:1036 [inline] do_new_mount fs/namespace.c:2549 [inline] do_mount+0xe53/0x2a00 fs/namespace.c:2879 SYSC_mount fs/namespace.c:3095 [inline] SyS_mount+0xa8/0x120 fs/namespace.c:3072 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x460b9a RSP: 002b:00007ff27b16ba78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007ff27b16bb10 RCX: 0000000000460b9a RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff27b16bad0 RBP: 00007ff27b16bad0 R08: 00007ff27b16bb10 R09: 0000000020000000 R10: 0000000000000001 R11: 0000000000000202 R12: 0000000020000000 R13: 0000000020000100 R14: 0000000020000200 R15: 00000000200000c0 CPU: 1 PID: 28716 Comm: syz-executor.4 Not tainted 4.14.212-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x154 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc_trace+0x29a/0x3d0 mm/slab.c:3616 kmalloc include/linux/slab.h:488 [inline] copy_mount_options+0x59/0x2f0 fs/namespace.c:2758 SYSC_mount fs/namespace.c:3090 [inline] SyS_mount+0x84/0x120 fs/namespace.c:3072 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 isofs_fill_super: root inode is not a directory. Corrupted media? entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x460b9a RSP: 002b:00007fecb7186a78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007fecb7186b10 RCX: 0000000000460b9a RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fecb7186ad0 RBP: 00007fecb7186ad0 R08: 00007fecb7186b10 R09: 0000000020000000 R10: 0000000000000001 R11: 0000000000000202 R12: 0000000020000000 R13: 0000000020000100 R14: 00000000200001c0 R15: 0000000020000200 FAULT_INJECTION: forcing a failure. name fail_page_alloc, interval 1, probability 0, space 0, times 0 print_req_error: I/O error, dev loop3, sector 0 CPU: 0 PID: 28752 Comm: syz-executor.4 Not tainted 4.14.212-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 print_req_error: I/O error, dev loop3, sector 0 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x154 lib/fault-inject.c:149 Buffer I/O error on dev loop3, logical block 0, async page read should_fail_alloc_page mm/page_alloc.c:2898 [inline] prepare_alloc_pages mm/page_alloc.c:4131 [inline] __alloc_pages_nodemask+0x22c/0x2720 mm/page_alloc.c:4179 print_req_error: I/O error, dev loop3, sector 0 Buffer I/O error on dev loop3, logical block 0, async page read print_req_error: I/O error, dev loop3, sector 0 Buffer I/O error on dev loop3, logical block 0, async page read __alloc_pages include/linux/gfp.h:484 [inline] __alloc_pages_node include/linux/gfp.h:497 [inline] kmem_getpages mm/slab.c:1419 [inline] cache_grow_begin+0x8f/0x420 mm/slab.c:2676 cache_alloc_refill+0x273/0x350 mm/slab.c:3043 print_req_error: I/O error, dev loop3, sector 0 ____cache_alloc mm/slab.c:3125 [inline] __do_cache_alloc mm/slab.c:3347 [inline] slab_alloc mm/slab.c:3382 [inline] kmem_cache_alloc+0x333/0x3c0 mm/slab.c:3550 getname_flags+0xc8/0x550 fs/namei.c:138 user_path_at_empty+0x2a/0x50 fs/namei.c:2631 user_path include/linux/namei.h:62 [inline] do_mount+0x118/0x2a00 fs/namespace.c:2819 Buffer I/O error on dev loop3, logical block 0, async page read print_req_error: I/O error, dev loop3, sector 0 Buffer I/O error on dev loop3, logical block 0, async page read SYSC_mount fs/namespace.c:3095 [inline] SyS_mount+0xa8/0x120 fs/namespace.c:3072 print_req_error: I/O error, dev loop3, sector 0 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb Buffer I/O error on dev loop3, logical block 0, async page read RIP: 0033:0x460b9a RSP: 002b:00007fecb7186a78 EFLAGS: 00000202 print_req_error: I/O error, dev loop3, sector 24 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007fecb7186b10 RCX: 0000000000460b9a RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fecb7186ad0 RBP: 00007fecb7186ad0 R08: 00007fecb7186b10 R09: 0000000020000000 Buffer I/O error on dev loop3, logical block 3, async page read R10: 0000000000000001 R11: 0000000000000202 R12: 0000000020000000 R13: 0000000020000100 R14: 00000000200001c0 R15: 0000000020000200 ISO 9660 Extensions: Microsoft Joliet Level 3 Bluetooth: hci0 command 0x0c1a tx timeout ISOFS: Unable to identify CD-ROM format. ISO 9660 Extensions: Microsoft Joliet Level 3 isofs_fill_super: root inode is not a directory. Corrupted media? FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 28754 Comm: syz-executor.1 Not tainted 4.14.212-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x154 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] __do_kmalloc mm/slab.c:3718 [inline] __kmalloc+0x2c1/0x400 mm/slab.c:3729 kmalloc include/linux/slab.h:493 [inline] kzalloc include/linux/slab.h:661 [inline] __list_lru_init+0x67/0x710 mm/list_lru.c:539 alloc_super fs/super.c:231 [inline] sget_userns+0x504/0xc10 fs/super.c:516 sget+0xd1/0x110 fs/super.c:572 mount_bdev+0xcd/0x360 fs/super.c:1107 mount_fs+0x92/0x2a0 fs/super.c:1237 vfs_kern_mount.part.0+0x5b/0x470 fs/namespace.c:1046 vfs_kern_mount fs/namespace.c:1036 [inline] do_new_mount fs/namespace.c:2549 [inline] do_mount+0xe53/0x2a00 fs/namespace.c:2879 SYSC_mount fs/namespace.c:3095 [inline] SyS_mount+0xa8/0x120 fs/namespace.c:3072 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x460b9a RSP: 002b:00007ff27b16ba78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007ff27b16bb10 RCX: 0000000000460b9a RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff27b16bad0 RBP: 00007ff27b16bad0 R08: 00007ff27b16bb10 R09: 0000000020000000 R10: 0000000000000001 R11: 0000000000000202 R12: 0000000020000000 R13: 0000000020000100 R14: 0000000020000200 R15: 00000000200000c0 FAULT_INJECTION: forcing a failure. name fail_page_alloc, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 28779 Comm: syz-executor.4 Not tainted 4.14.212-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x154 lib/fault-inject.c:149 should_fail_alloc_page mm/page_alloc.c:2898 [inline] prepare_alloc_pages mm/page_alloc.c:4131 [inline] __alloc_pages_nodemask+0x22c/0x2720 mm/page_alloc.c:4179 ISOFS: Unable to identify CD-ROM format. __alloc_pages include/linux/gfp.h:484 [inline] __alloc_pages_node include/linux/gfp.h:497 [inline] kmem_getpages mm/slab.c:1419 [inline] cache_grow_begin+0x8f/0x420 mm/slab.c:2676 cache_alloc_refill+0x273/0x350 mm/slab.c:3043 ____cache_alloc mm/slab.c:3125 [inline] __do_cache_alloc mm/slab.c:3347 [inline] slab_alloc mm/slab.c:3382 [inline] kmem_cache_alloc+0x333/0x3c0 mm/slab.c:3550 getname_flags+0xc8/0x550 fs/namei.c:138 user_path_at_empty+0x2a/0x50 fs/namei.c:2631 user_path include/linux/namei.h:62 [inline] do_mount+0x118/0x2a00 fs/namespace.c:2819 SYSC_mount fs/namespace.c:3095 [inline] SyS_mount+0xa8/0x120 fs/namespace.c:3072 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x460b9a RSP: 002b:00007fecb7186a78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007fecb7186b10 RCX: 0000000000460b9a RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fecb7186ad0 RBP: 00007fecb7186ad0 R08: 00007fecb7186b10 R09: 0000000020000000 R10: 0000000000000001 R11: 0000000000000202 R12: 0000000020000000 R13: 0000000020000100 R14: 00000000200001c0 R15: 0000000020000200 ISO 9660 Extensions: Microsoft Joliet Level 3 ISO 9660 Extensions: Microsoft Joliet Level 3 isofs_fill_super: root inode is not a directory. Corrupted media? ISO 9660 Extensions: Microsoft Joliet Level 3 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 28830 Comm: syz-executor.4 Not tainted 4.14.212-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x154 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] __do_kmalloc mm/slab.c:3718 [inline] __kmalloc_track_caller+0x2bc/0x400 mm/slab.c:3735 kstrdup+0x36/0x70 mm/util.c:56 kstrdup_const+0x35/0x60 mm/util.c:77 alloc_vfsmnt+0xe0/0x7f0 fs/namespace.c:214 vfs_kern_mount.part.0+0x27/0x470 fs/namespace.c:1039 vfs_kern_mount fs/namespace.c:1036 [inline] do_new_mount fs/namespace.c:2549 [inline] do_mount+0xe53/0x2a00 fs/namespace.c:2879 SYSC_mount fs/namespace.c:3095 [inline] SyS_mount+0xa8/0x120 fs/namespace.c:3072 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x460b9a RSP: 002b:00007fecb7186a78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007fecb7186b10 RCX: 0000000000460b9a RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fecb7186ad0 RBP: 00007fecb7186ad0 R08: 00007fecb7186b10 R09: 0000000020000000 R10: 0000000000000001 R11: 0000000000000202 R12: 0000000020000000 R13: 0000000020000100 R14: 00000000200001c0 R15: 0000000020000200 print_req_error: I/O error, dev loop4, sector 0 ISO 9660 Extensions: Microsoft Joliet Level 3 isofs_fill_super: root inode is not a directory. Corrupted media? FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 28855 Comm: syz-executor.4 Not tainted 4.14.212-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x154 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] __do_kmalloc mm/slab.c:3718 [inline] __kmalloc_track_caller+0x2bc/0x400 mm/slab.c:3735 kstrdup+0x36/0x70 mm/util.c:56 kstrdup_const+0x35/0x60 mm/util.c:77 alloc_vfsmnt+0xe0/0x7f0 fs/namespace.c:214 vfs_kern_mount.part.0+0x27/0x470 fs/namespace.c:1039 vfs_kern_mount fs/namespace.c:1036 [inline] do_new_mount fs/namespace.c:2549 [inline] do_mount+0xe53/0x2a00 fs/namespace.c:2879 SYSC_mount fs/namespace.c:3095 [inline] SyS_mount+0xa8/0x120 fs/namespace.c:3072 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x460b9a RSP: 002b:00007fecb7186a78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007fecb7186b10 RCX: 0000000000460b9a RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fecb7186ad0 RBP: 00007fecb7186ad0 R08: 00007fecb7186b10 R09: 0000000020000000 R10: 0000000000000001 R11: 0000000000000202 R12: 0000000020000000 R13: 0000000020000100 R14: 00000000200001c0 R15: 0000000020000200 ISO 9660 Extensions: Microsoft Joliet Level 3 Buffer I/O error on dev loop3, logical block 1, async page read ISO 9660 Extensions: Microsoft Joliet Level 3 isofs_fill_super: root inode is not a directory. Corrupted media? FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 ISO 9660 Extensions: Microsoft Joliet Level 3 CPU: 1 PID: 28896 Comm: syz-executor.4 Not tainted 4.14.212-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x154 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc+0x28e/0x3c0 mm/slab.c:3550 getname_kernel+0x4e/0x340 fs/namei.c:218 kern_path+0x1b/0x40 fs/namei.c:2466 lookup_bdev fs/block_dev.c:2103 [inline] lookup_bdev+0xc6/0x1c0 fs/block_dev.c:2093 blkdev_get_by_path+0x1b/0xa0 fs/block_dev.c:1688 mount_bdev+0x4c/0x360 fs/super.c:1092 mount_fs+0x92/0x2a0 fs/super.c:1237 vfs_kern_mount.part.0+0x5b/0x470 fs/namespace.c:1046 vfs_kern_mount fs/namespace.c:1036 [inline] do_new_mount fs/namespace.c:2549 [inline] do_mount+0xe53/0x2a00 fs/namespace.c:2879 SYSC_mount fs/namespace.c:3095 [inline] SyS_mount+0xa8/0x120 fs/namespace.c:3072 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x460b9a RSP: 002b:00007fecb7186a78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007fecb7186b10 RCX: 0000000000460b9a RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fecb7186ad0 RBP: 00007fecb7186ad0 R08: 00007fecb7186b10 R09: 0000000020000000 R10: 0000000000000001 R11: 0000000000000202 R12: 0000000020000000 R13: 0000000020000100 R14: 00000000200001c0 R15: 0000000020000200 ISO 9660 Extensions: Microsoft Joliet Level 3 isofs_fill_super: root inode is not a directory. Corrupted media? FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 28944 Comm: syz-executor.4 Not tainted 4.14.212-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x154 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc+0x28e/0x3c0 mm/slab.c:3550 getname_kernel+0x4e/0x340 fs/namei.c:218 kern_path+0x1b/0x40 fs/namei.c:2466 lookup_bdev fs/block_dev.c:2103 [inline] lookup_bdev+0xc6/0x1c0 fs/block_dev.c:2093 blkdev_get_by_path+0x1b/0xa0 fs/block_dev.c:1688 mount_bdev+0x4c/0x360 fs/super.c:1092 mount_fs+0x92/0x2a0 fs/super.c:1237 vfs_kern_mount.part.0+0x5b/0x470 fs/namespace.c:1046 vfs_kern_mount fs/namespace.c:1036 [inline] do_new_mount fs/namespace.c:2549 [inline] do_mount+0xe53/0x2a00 fs/namespace.c:2879 SYSC_mount fs/namespace.c:3095 [inline] SyS_mount+0xa8/0x120 fs/namespace.c:3072 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x460b9a RSP: 002b:00007fecb7186a78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007fecb7186b10 RCX: 0000000000460b9a RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fecb7186ad0 RBP: 00007fecb7186ad0 R08: 00007fecb7186b10 R09: 0000000020000000 R10: 0000000000000001 R11: 0000000000000202 R12: 0000000020000000 R13: 0000000020000100 R14: 00000000200001c0 R15: 0000000020000200 ISO 9660 Extensions: Microsoft Joliet Level 3 isofs_fill_super: root inode is not a directory. Corrupted media?