====================================================== kobject: 'kvm' (ffff888219faee10): kobject_uevent_env WARNING: possible circular locking dependency detected 4.14.152 #0 Not tainted ------------------------------------------------------ syz-executor.1/12459 is trying to acquire lock: (&event->child_mutex){+.+.}, at: [] perf_read_group kernel/events/core.c:4536 [inline] (&event->child_mutex){+.+.}, at: [] __perf_read kernel/events/core.c:4618 [inline] (&event->child_mutex){+.+.}, at: [] perf_read+0x2c0/0x820 kernel/events/core.c:4633 but task is already holding lock: (&cpuctx_mutex){+.+.}, at: [] perf_event_ctx_lock_nested+0x150/0x2c0 kernel/events/core.c:1235 kobject: 'kvm' (ffff888219faee10): fill_kobj_path: path = '/devices/virtual/misc/kvm' which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #5 (&cpuctx_mutex){+.+.}: lock_acquire+0x16f/0x430 kernel/locking/lockdep.c:3994 __mutex_lock_common kernel/locking/mutex.c:756 [inline] __mutex_lock+0xe8/0x1470 kernel/locking/mutex.c:893 mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:908 perf_event_init_cpu+0xc2/0x170 kernel/events/core.c:11223 perf_event_init+0x2d8/0x31a kernel/events/core.c:11270 start_kernel+0x3b6/0x6fd init/main.c:621 x86_64_start_reservations+0x29/0x2b arch/x86/kernel/head64.c:399 x86_64_start_kernel+0x77/0x7b arch/x86/kernel/head64.c:380 secondary_startup_64+0xa5/0xb0 arch/x86/kernel/head_64.S:240 -> #4 (pmus_lock){+.+.}: lock_acquire+0x16f/0x430 kernel/locking/lockdep.c:3994 kobject: 'kvm' (ffff888219faee10): kobject_uevent_env __mutex_lock_common kernel/locking/mutex.c:756 [inline] __mutex_lock+0xe8/0x1470 kernel/locking/mutex.c:893 mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:908 perf_event_init_cpu+0x2f/0x170 kernel/events/core.c:11217 cpuhp_invoke_callback+0x1ea/0x1ab0 kernel/cpu.c:184 cpuhp_up_callbacks kernel/cpu.c:572 [inline] _cpu_up+0x228/0x530 kernel/cpu.c:1134 kobject: 'kvm' (ffff888219faee10): fill_kobj_path: path = '/devices/virtual/misc/kvm' do_cpu_up+0x121/0x150 kernel/cpu.c:1169 cpu_up+0x1b/0x20 kernel/cpu.c:1177 smp_init+0x157/0x170 kernel/smp.c:578 kernel_init_freeable+0x30b/0x532 init/main.c:1067 kernel_init+0x12/0x162 init/main.c:999 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:404 -> #3 (cpu_hotplug_lock.rw_sem){++++}: lock_acquire+0x16f/0x430 kernel/locking/lockdep.c:3994 percpu_down_read_preempt_disable include/linux/percpu-rwsem.h:36 [inline] percpu_down_read include/linux/percpu-rwsem.h:59 [inline] cpus_read_lock+0x3d/0xc0 kernel/cpu.c:295 static_key_slow_inc+0x13/0x30 kernel/jump_label.c:123 tracepoint_add_func kernel/tracepoint.c:223 [inline] tracepoint_probe_register_prio+0x4d6/0x6d0 kernel/tracepoint.c:283 tracepoint_probe_register+0x2b/0x40 kernel/tracepoint.c:304 trace_event_reg+0x277/0x330 kernel/trace/trace_events.c:305 perf_trace_event_reg kernel/trace/trace_event_perf.c:122 [inline] perf_trace_event_init kernel/trace/trace_event_perf.c:197 [inline] perf_trace_init+0x449/0xaa0 kernel/trace/trace_event_perf.c:221 perf_tp_event_init+0x7d/0xf0 kernel/events/core.c:8106 perf_try_init_event+0x164/0x200 kernel/events/core.c:9342 perf_init_event kernel/events/core.c:9380 [inline] perf_event_alloc.part.0+0xd90/0x25b0 kernel/events/core.c:9640 perf_event_alloc kernel/events/core.c:9993 [inline] SYSC_perf_event_open+0xad1/0x2690 kernel/events/core.c:10097 SyS_perf_event_open+0x34/0x40 kernel/events/core.c:9983 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 -> #2 (tracepoints_mutex){+.+.}: lock_acquire+0x16f/0x430 kernel/locking/lockdep.c:3994 __mutex_lock_common kernel/locking/mutex.c:756 [inline] __mutex_lock+0xe8/0x1470 kernel/locking/mutex.c:893 mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:908 tracepoint_probe_register_prio+0x36/0x6d0 kernel/tracepoint.c:279 tracepoint_probe_register+0x2b/0x40 kernel/tracepoint.c:304 trace_event_reg+0x277/0x330 kernel/trace/trace_events.c:305 perf_trace_event_reg kernel/trace/trace_event_perf.c:122 [inline] perf_trace_event_init kernel/trace/trace_event_perf.c:197 [inline] perf_trace_init+0x449/0xaa0 kernel/trace/trace_event_perf.c:221 perf_tp_event_init+0x7d/0xf0 kernel/events/core.c:8106 perf_try_init_event+0x164/0x200 kernel/events/core.c:9342 perf_init_event kernel/events/core.c:9380 [inline] perf_event_alloc.part.0+0xd90/0x25b0 kernel/events/core.c:9640 perf_event_alloc kernel/events/core.c:9993 [inline] SYSC_perf_event_open+0xad1/0x2690 kernel/events/core.c:10097 SyS_perf_event_open+0x34/0x40 kernel/events/core.c:9983 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 -> #1 (event_mutex){+.+.}: lock_acquire+0x16f/0x430 kernel/locking/lockdep.c:3994 __mutex_lock_common kernel/locking/mutex.c:756 [inline] __mutex_lock+0xe8/0x1470 kernel/locking/mutex.c:893 mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:908 perf_trace_destroy+0x28/0x100 kernel/trace/trace_event_perf.c:234 tp_perf_event_destroy+0x16/0x20 kernel/events/core.c:8090 _free_event+0x330/0xe70 kernel/events/core.c:4238 free_event+0x38/0x50 kernel/events/core.c:4265 perf_event_release_kernel+0x364/0x880 kernel/events/core.c:4409 perf_release+0x37/0x50 kernel/events/core.c:4435 __fput+0x275/0x7a0 fs/file_table.c:210 ____fput+0x16/0x20 fs/file_table.c:244 task_work_run+0x114/0x190 kernel/task_work.c:113 tracehook_notify_resume include/linux/tracehook.h:191 [inline] exit_to_usermode_loop+0x1da/0x220 arch/x86/entry/common.c:164 prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline] syscall_return_slowpath arch/x86/entry/common.c:270 [inline] do_syscall_64+0x4bc/0x640 arch/x86/entry/common.c:297 entry_SYSCALL_64_after_hwframe+0x42/0xb7 -> #0 (&event->child_mutex){+.+.}: check_prev_add kernel/locking/lockdep.c:1901 [inline] check_prevs_add kernel/locking/lockdep.c:2018 [inline] validate_chain kernel/locking/lockdep.c:2460 [inline] __lock_acquire+0x2cb3/0x4620 kernel/locking/lockdep.c:3487 lock_acquire+0x16f/0x430 kernel/locking/lockdep.c:3994 __mutex_lock_common kernel/locking/mutex.c:756 [inline] __mutex_lock+0xe8/0x1470 kernel/locking/mutex.c:893 mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:908 perf_read_group kernel/events/core.c:4536 [inline] __perf_read kernel/events/core.c:4618 [inline] perf_read+0x2c0/0x820 kernel/events/core.c:4633 __vfs_read+0x105/0x6a0 fs/read_write.c:411 vfs_read+0x137/0x350 fs/read_write.c:447 SYSC_read fs/read_write.c:574 [inline] SyS_read+0xfd/0x230 fs/read_write.c:567 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 other info that might help us debug this: Chain exists of: &event->child_mutex --> pmus_lock --> &cpuctx_mutex Possible unsafe locking scenario: CPU0 CPU1 ---- ---- lock(&cpuctx_mutex); lock(pmus_lock); lock(&cpuctx_mutex); lock(&event->child_mutex); *** DEADLOCK *** 1 lock held by syz-executor.1/12459: #0: (&cpuctx_mutex){+.+.}, at: [] perf_event_ctx_lock_nested+0x150/0x2c0 kernel/events/core.c:1235 stack backtrace: CPU: 1 PID: 12459 Comm: syz-executor.1 Not tainted 4.14.152 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x138/0x197 lib/dump_stack.c:53 print_circular_bug.isra.0.cold+0x1cc/0x28f kernel/locking/lockdep.c:1258 check_prev_add kernel/locking/lockdep.c:1901 [inline] check_prevs_add kernel/locking/lockdep.c:2018 [inline] validate_chain kernel/locking/lockdep.c:2460 [inline] __lock_acquire+0x2cb3/0x4620 kernel/locking/lockdep.c:3487 lock_acquire+0x16f/0x430 kernel/locking/lockdep.c:3994 __mutex_lock_common kernel/locking/mutex.c:756 [inline] __mutex_lock+0xe8/0x1470 kernel/locking/mutex.c:893 mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:908 perf_read_group kernel/events/core.c:4536 [inline] __perf_read kernel/events/core.c:4618 [inline] perf_read+0x2c0/0x820 kernel/events/core.c:4633 __vfs_read+0x105/0x6a0 fs/read_write.c:411 vfs_read+0x137/0x350 fs/read_write.c:447 SYSC_read fs/read_write.c:574 [inline] SyS_read+0xfd/0x230 fs/read_write.c:567 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 kobject: 'kvm' (ffff888219faee10): kobject_uevent_env entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x45a219 RSP: 002b:00007f2eb898fc78 EFLAGS: 00000246 kobject: 'kvm' (ffff888219faee10): fill_kobj_path: path = '/devices/virtual/misc/kvm' ORIG_RAX: 0000000000000000 RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a219 RDX: 0000000000000128 RSI: 0000000020000300 RDI: 0000000000000003 RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2eb89906d4 R13: 00000000004c6a0c R14: 00000000004ddbd0 R15: 00000000ffffffff kobject: 'loop3' (ffff8880a4a3ef60): kobject_uevent_env kobject: 'loop3' (ffff8880a4a3ef60): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop5' (ffff8880a4b009e0): kobject_uevent_env kobject: 'loop5' (ffff8880a4b009e0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop4' (ffff8880a4a96960): kobject_uevent_env kauditd_printk_skb: 261 callbacks suppressed audit: type=1400 audit(1573481244.861:68138): avc: denied { map } for pid=12482 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 kobject: 'loop4' (ffff8880a4a96960): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'kvm' (ffff888219faee10): kobject_uevent_env kobject: 'kvm' (ffff888219faee10): fill_kobj_path: path = '/devices/virtual/misc/kvm' audit: type=1400 audit(1573481244.901:68139): avc: denied { map } for pid=12482 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 kobject: 'kvm' (ffff888219faee10): kobject_uevent_env kobject: 'kvm' (ffff888219faee10): fill_kobj_path: path = '/devices/virtual/misc/kvm' audit: type=1400 audit(1573481244.911:68140): avc: denied { map } for pid=12482 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 kobject: 'kvm' (ffff888219faee10): kobject_uevent_env kobject: 'kvm' (ffff888219faee10): fill_kobj_path: path = '/devices/virtual/misc/kvm' audit: type=1400 audit(1573481244.921:68141): avc: denied { map } for pid=12482 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 audit: type=1400 audit(1573481244.921:68142): avc: denied { map } for pid=12482 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 kobject: 'kvm' (ffff888219faee10): kobject_uevent_env kobject: 'kvm' (ffff888219faee10): fill_kobj_path: path = '/devices/virtual/misc/kvm' audit: type=1400 audit(1573481244.931:68143): avc: denied { map } for pid=12482 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 audit: type=1400 audit(1573481244.931:68144): avc: denied { map } for pid=12482 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 audit: type=1400 audit(1573481245.051:68145): avc: denied { map } for pid=12494 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 kobject: 'loop3' (ffff8880a4a3ef60): kobject_uevent_env audit: type=1400 audit(1573481245.051:68146): avc: denied { map } for pid=12494 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 audit: type=1400 audit(1573481245.071:68147): avc: denied { map } for pid=12494 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 kobject: 'loop3' (ffff8880a4a3ef60): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop5' (ffff8880a4b009e0): kobject_uevent_env kobject: 'loop5' (ffff8880a4b009e0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'kvm' (ffff888219faee10): kobject_uevent_env protocol 88fb is buggy, dev hsr_slave_0 kobject: 'loop3' (ffff8880a4a3ef60): kobject_uevent_env protocol 88fb is buggy, dev hsr_slave_1 kobject: 'loop3' (ffff8880a4a3ef60): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop4' (ffff8880a4a96960): kobject_uevent_env kobject: 'loop4' (ffff8880a4a96960): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop5' (ffff8880a4b009e0): kobject_uevent_env kobject: 'loop5' (ffff8880a4b009e0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'kvm' (ffff888219faee10): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop0' (ffff88807e2b0ca0): kobject_uevent_env kobject: 'loop0' (ffff88807e2b0ca0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop3' (ffff8880a4a3ef60): kobject_uevent_env kobject: 'loop3' (ffff8880a4a3ef60): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop3' (ffff8880a4a3ef60): kobject_uevent_env kobject: 'loop3' (ffff8880a4a3ef60): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop0' (ffff88807e2b0ca0): kobject_uevent_env kobject: 'loop0' (ffff88807e2b0ca0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop3' (ffff8880a4a3ef60): kobject_uevent_env kobject: 'loop3' (ffff8880a4a3ef60): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'hwsim10' (ffff8880a111ea10): kobject_add_internal: parent: 'mac80211_hwsim', set: 'devices' kobject: 'hwsim10' (ffff8880a111ea10): kobject_uevent_env kobject: 'hwsim10' (ffff8880a111ea10): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim10' kobject: 'hwsim10' (ffff8880a111ea10): kobject_uevent_env kobject: 'hwsim10' (ffff8880a111ea10): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim10' kobject: 'ieee80211' (ffff8880aa9c5280): kobject_add_internal: parent: 'hwsim10', set: '(null)' kobject: 'þ€' (ffff88805edfaa70): kobject_add_internal: parent: 'ieee80211', set: 'devices' kobject: 'þ€' (ffff88805edfaa70): kobject_uevent_env kobject: 'þ€' (ffff88805edfaa70): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim10/ieee80211/þ€' kobject: 'loop4' (ffff8880a4a96960): kobject_uevent_env kobject: 'rfkill13' (ffff88805e4244e8): kobject_add_internal: parent: 'þ€', set: 'devices' kobject: 'loop4' (ffff8880a4a96960): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'rfkill13' (ffff88805e4244e8): kobject_uevent_env kobject: 'rfkill13' (ffff88805e4244e8): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim10/ieee80211/þ€/rfkill13' kobject: 'kvm' (ffff888219faee10): kobject_uevent_env kobject: 'kvm' (ffff888219faee10): fill_kobj_path: path = '/devices/virtual/misc/kvm' ieee80211 þ€: Selected rate control algorithm 'minstrel_ht' kobject: 'net' (ffff88805ab65500): kobject_add_internal: parent: 'hwsim10', set: '(null)' kobject: 'wlan0' (ffff88809891dd70): kobject_add_internal: parent: 'net', set: 'devices' kobject: 'wlan0' (ffff88809891dd70): kobject_uevent_env kobject: 'wlan0' (ffff88809891dd70): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim10/net/wlan0' kobject: 'queues' (ffff88805eee6748): kobject_add_internal: parent: 'wlan0', set: '' kobject: 'loop5' (ffff8880a4b009e0): kobject_uevent_env kobject: 'queues' (ffff88805eee6748): kobject_uevent_env kobject: 'queues' (ffff88805eee6748): kobject_uevent_env: filter function caused the event to drop! kobject: 'rx-0' (ffff8880a914c9d0): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'loop5' (ffff8880a4b009e0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'rx-0' (ffff8880a914c9d0): kobject_uevent_env kobject: 'rx-0' (ffff8880a914c9d0): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim10/net/wlan0/queues/rx-0' kobject: 'tx-0' (ffff888082201498): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'tx-0' (ffff888082201498): kobject_uevent_env kobject: 'tx-0' (ffff888082201498): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim10/net/wlan0/queues/tx-0' kobject: 'tx-1' (ffff888082201618): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'tx-1' (ffff888082201618): kobject_uevent_env kobject: 'tx-1' (ffff888082201618): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim10/net/wlan0/queues/tx-1' kobject: 'tx-2' (ffff888082201798): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'tx-2' (ffff888082201798): kobject_uevent_env kobject: 'tx-2' (ffff888082201798): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim10/net/wlan0/queues/tx-2' kobject: 'tx-3' (ffff888082201918): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'tx-3' (ffff888082201918): kobject_uevent_env kobject: 'tx-3' (ffff888082201918): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim10/net/wlan0/queues/tx-3' kobject: 'batman_adv' (ffff88808202f580): kobject_add_internal: parent: 'wlan0', set: '' ieee80211 þ€: hwaddr 02:00:00:00:0a:00 registered kobject: 'loop0' (ffff88807e2b0ca0): kobject_uevent_env kobject: 'loop0' (ffff88807e2b0ca0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'kvm' (ffff888219faee10): kobject_uevent_env kobject: 'kvm' (ffff888219faee10): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop3' (ffff8880a4a3ef60): kobject_uevent_env kobject: 'loop3' (ffff8880a4a3ef60): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop4' (ffff8880a4a96960): kobject_uevent_env kobject: 'loop4' (ffff8880a4a96960): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop2' (ffff8880571c6d60): kobject_uevent_env kobject: 'loop2' (ffff8880571c6d60): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop0' (ffff88807e2b0ca0): kobject_uevent_env kobject: 'loop0' (ffff88807e2b0ca0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop5' (ffff8880a4b009e0): kobject_uevent_env kobject: 'loop5' (ffff8880a4b009e0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop3' (ffff8880a4a3ef60): kobject_uevent_env kobject: 'loop3' (ffff8880a4a3ef60): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop3' (ffff8880a4a3ef60): kobject_uevent_env kobject: 'loop3' (ffff8880a4a3ef60): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop0' (ffff88807e2b0ca0): kobject_uevent_env kobject: 'loop0' (ffff88807e2b0ca0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop3' (ffff8880a4a3ef60): kobject_uevent_env kobject: 'loop3' (ffff8880a4a3ef60): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop4' (ffff8880a4a96960): kobject_uevent_env kobject: 'loop4' (ffff8880a4a96960): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop0' (ffff88807e2b0ca0): kobject_uevent_env kobject: 'loop0' (ffff88807e2b0ca0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop0' (ffff88807e2b0ca0): kobject_uevent_env kobject: 'loop0' (ffff88807e2b0ca0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop5' (ffff8880a4b009e0): kobject_uevent_env kobject: 'loop5' (ffff8880a4b009e0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop2' (ffff8880571c6d60): kobject_uevent_env kobject: 'loop2' (ffff8880571c6d60): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop4' (ffff8880a4a96960): kobject_uevent_env kauditd_printk_skb: 352 callbacks suppressed audit: type=1400 audit(1573481251.301:68500): avc: denied { map } for pid=12635 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 kobject: 'loop4' (ffff8880a4a96960): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop3' (ffff8880a4a3ef60): kobject_uevent_env audit: type=1400 audit(1573481251.311:68501): avc: denied { map } for pid=12636 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 kobject: 'loop3' (ffff8880a4a3ef60): fill_kobj_path: path = '/devices/virtual/block/loop3' audit: type=1400 audit(1573481251.311:68502): avc: denied { map } for pid=12636 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 kobject: 'loop0' (ffff88807e2b0ca0): kobject_uevent_env audit: type=1400 audit(1573481251.331:68503): avc: denied { map } for pid=12636 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 kobject: 'loop0' (ffff88807e2b0ca0): fill_kobj_path: path = '/devices/virtual/block/loop0' audit: type=1400 audit(1573481251.331:68504): avc: denied { map } for pid=12635 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 kobject: 'loop0' (ffff88807e2b0ca0): kobject_uevent_env kobject: 'loop0' (ffff88807e2b0ca0): fill_kobj_path: path = '/devices/virtual/block/loop0' audit: type=1400 audit(1573481251.331:68505): avc: denied { map } for pid=12635 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 kobject: 'loop0' (ffff88807e2b0ca0): kobject_uevent_env kobject: 'loop0' (ffff88807e2b0ca0): fill_kobj_path: path = '/devices/virtual/block/loop0' audit: type=1400 audit(1573481251.341:68507): avc: denied { map } for pid=12636 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 audit: type=1400 audit(1573481251.341:68508): avc: denied { map } for pid=12636 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 kobject: 'loop4' (ffff8880a4a96960): kobject_uevent_env kobject: 'loop4' (ffff8880a4a96960): fill_kobj_path: path = '/devices/virtual/block/loop4' audit: type=1400 audit(1573481251.331:68506): avc: denied { map } for pid=12635 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 kobject: 'loop5' (ffff8880a4b009e0): kobject_uevent_env kobject: 'loop5' (ffff8880a4b009e0): fill_kobj_path: path = '/devices/virtual/block/loop5' audit: type=1400 audit(1573481251.351:68509): avc: denied { map } for pid=12639 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 kobject: 'loop2' (ffff8880571c6d60): kobject_uevent_env kobject: 'loop2' (ffff8880571c6d60): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop3' (ffff8880a4a3ef60): kobject_uevent_env kobject: 'loop3' (ffff8880a4a3ef60): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop5' (ffff8880a4b009e0): kobject_uevent_env kobject: 'loop5' (ffff8880a4b009e0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop4' (ffff8880a4a96960): kobject_uevent_env kobject: 'loop4' (ffff8880a4a96960): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop3' (ffff8880a4a3ef60): kobject_uevent_env kobject: 'loop3' (ffff8880a4a3ef60): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop5' (ffff8880a4b009e0): kobject_uevent_env kobject: 'loop5' (ffff8880a4b009e0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop3' (ffff8880a4a3ef60): kobject_uevent_env kobject: 'loop3' (ffff8880a4a3ef60): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop4' (ffff8880a4a96960): kobject_uevent_env kobject: 'loop4' (ffff8880a4a96960): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop5' (ffff8880a4b009e0): kobject_uevent_env kobject: 'loop5' (ffff8880a4b009e0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop4' (ffff8880a4a96960): kobject_uevent_env kobject: 'loop4' (ffff8880a4a96960): fill_kobj_path: path = '/devices/virtual/block/loop4' FAULT_INJECTION: forcing a failure. name fail_page_alloc, interval 1, probability 0, space 0, times 0 kobject: 'loop3' (ffff8880a4a3ef60): kobject_uevent_env CPU: 1 PID: 12700 Comm: syz-executor.3 Not tainted 4.14.152 #0 kobject: 'loop3' (ffff8880a4a3ef60): fill_kobj_path: path = '/devices/virtual/block/loop3' Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x138/0x197 lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10f/0x159 lib/fault-inject.c:149 should_fail_alloc_page mm/page_alloc.c:2891 [inline] prepare_alloc_pages mm/page_alloc.c:4124 [inline] __alloc_pages_nodemask+0x1d6/0x7a0 mm/page_alloc.c:4172 alloc_pages_current+0xec/0x1e0 mm/mempolicy.c:2113 alloc_pages include/linux/gfp.h:497 [inline] skb_page_frag_refill+0x1d3/0x3e0 net/core/sock.c:2201 tun_build_skb drivers/net/tun.c:1285 [inline] tun_get_user+0x1a26/0x3a30 drivers/net/tun.c:1457 kobject: 'loop5' (ffff8880a4b009e0): kobject_uevent_env tun_chr_write_iter+0xdd/0x18d drivers/net/tun.c:1597 kobject: 'loop5' (ffff8880a4b009e0): fill_kobj_path: path = '/devices/virtual/block/loop5' call_write_iter include/linux/fs.h:1777 [inline] do_iter_readv_writev+0x418/0x670 fs/read_write.c:675 do_iter_write fs/read_write.c:954 [inline] do_iter_write+0x154/0x540 fs/read_write.c:935 vfs_writev+0x170/0x2a0 fs/read_write.c:999 do_writev+0x10a/0x2d0 fs/read_write.c:1034 SYSC_writev fs/read_write.c:1107 [inline] SyS_writev+0x28/0x30 fs/read_write.c:1104 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x45a0d1 RSP: 002b:00007f2c98090ba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 RAX: ffffffffffffffda RBX: 0000000000000066 RCX: 000000000045a0d1 RDX: 0000000000000001 RSI: 00007f2c98090c00 RDI: 00000000000000f0 RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000064 R11: 0000000000000293 R12: 00007f2c980916d4 R13: 00000000004c9885 R14: 00000000004e14a0 R15: 0000000000000003 kobject: 'loop0' (ffff88807e2b0ca0): kobject_uevent_env