loop0: p253 start 1854537728 is beyond EOD, truncated loop0: p254 start 1854537728 is beyond EOD, truncated loop0: p255 start 1854537728 is beyond EOD, truncated FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 INFO: trying to register non-static key. the code is fine but needs lockdep annotation. turning off the locking correctness validator. CPU: 0 PID: 10391 Comm: syz-executor.1 Not tainted 4.14.137 #33 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x138/0x19c lib/dump_stack.c:53 register_lock_class+0x2fd/0x1730 kernel/locking/lockdep.c:768 __lock_acquire+0x147/0x4620 kernel/locking/lockdep.c:3374 lock_acquire+0x16f/0x430 kernel/locking/lockdep.c:3991 flush_work+0xae/0x730 kernel/workqueue.c:2881 __cancel_work_timer+0x2f0/0x480 kernel/workqueue.c:2956 cancel_work_sync+0x18/0x20 kernel/workqueue.c:2992 smc_close_active+0x68e/0xba0 net/smc/smc_close.c:206 smc_release+0x45a/0x630 net/smc/af_smc.c:131 __sock_release+0xce/0x2b0 net/socket.c:602 sock_close+0x1b/0x30 net/socket.c:1139 __fput+0x275/0x7a0 fs/file_table.c:210 ____fput+0x16/0x20 fs/file_table.c:244 task_work_run+0x114/0x190 kernel/task_work.c:113 tracehook_notify_resume include/linux/tracehook.h:191 [inline] exit_to_usermode_loop+0x1da/0x220 arch/x86/entry/common.c:164 prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline] syscall_return_slowpath arch/x86/entry/common.c:270 [inline] do_syscall_64+0x4bc/0x640 arch/x86/entry/common.c:297 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x459829 RSP: 002b:00007f4fe987cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 RAX: 0000000000000000 RBX: 0000000000000001 RCX: 0000000000459829 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4fe987d6d4 R13: 00000000004f8e32 R14: 00000000004d19d0 R15: 00000000ffffffff CPU: 1 PID: 10389 Comm: syz-executor.3 Not tainted 4.14.137 #33 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x138/0x19c lib/dump_stack.c:53 kobject: 'loop5' (ffff8880a4a9c9a0): kobject_uevent_env fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10f/0x159 lib/fault-inject.c:149 should_failslab+0xdb/0x130 mm/failslab.c:32 kobject: 'loop5' (ffff8880a4a9c9a0): fill_kobj_path: path = '/devices/virtual/block/loop5' slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] __do_kmalloc mm/slab.c:3718 [inline] __kmalloc+0x71/0x7a0 mm/slab.c:3729 kmalloc_array include/linux/slab.h:607 [inline] kcalloc include/linux/slab.h:618 [inline] selinux_get_mnt_opts security/selinux/hooks.c:627 [inline] selinux_sb_show_options+0x19a/0xd50 security/selinux/hooks.c:1274 security_sb_show_options+0x75/0xb0 security/security.c:384 show_sb_opts+0xb4/0xe0 fs/proc_namespace.c:61 show_mountinfo+0x4ed/0x860 fs/proc_namespace.c:183 m_show+0x61/0x80 fs/namespace.c:1365 seq_read+0xb46/0x1280 fs/seq_file.c:272 do_loop_readv_writev fs/read_write.c:695 [inline] do_loop_readv_writev fs/read_write.c:682 [inline] do_iter_read+0x3e2/0x5b0 fs/read_write.c:919 vfs_readv+0xd3/0x130 fs/read_write.c:981 do_preadv+0x15d/0x200 fs/read_write.c:1065 SYSC_preadv fs/read_write.c:1115 [inline] SyS_preadv+0x31/0x40 fs/read_write.c:1110 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x459829 RSP: 002b:00007f23ad647c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 RAX: ffffffffffffffda RBX: 00007f23ad647c90 RCX: 0000000000459829 RDX: 0000000000000001 RSI: 0000000020000000 RDI: 0000000000000003 RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f23ad6486d4 R13: 00000000004c6b38 R14: 00000000004dbc48 R15: 0000000000000004 kobject: 'loop1' (ffff8880a495d6e0): kobject_uevent_env kobject: 'loop1' (ffff8880a495d6e0): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop0' (ffff8880a48d8de0): kobject_uevent_env kobject: 'loop0' (ffff8880a48d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' loop_reread_partitions: partition scan of loop0 () failed (rc=-16) kobject: 'loop4' (ffff8880a4a560a0): kobject_uevent_env print_req_error: I/O error, dev loop0, sector 0 print_req_error: I/O error, dev loop0, sector 0 Buffer I/O error on dev loop0p1, logical block 0, async page read print_req_error: I/O error, dev loop0, sector 0 Buffer I/O error on dev loop0p1, logical block 0, async page read print_req_error: I/O error, dev loop0, sector 0 Buffer I/O error on dev loop0p1, logical block 0, async page read print_req_error: I/O error, dev loop0, sector 0 Buffer I/O error on dev loop0p1, logical block 0, async page read print_req_error: I/O error, dev loop0, sector 0 Buffer I/O error on dev loop0p1, logical block 0, async page read print_req_error: I/O error, dev loop0, sector 0 Buffer I/O error on dev loop0p1, logical block 0, async page read print_req_error: I/O error, dev loop0, sector 0 Buffer I/O error on dev loop0p1, logical block 0, async page read audit: type=1400 audit(1565187971.415:57): avc: denied { map } for pid=10407 comm="syz-executor.1" path=2F6D656D66643A2F6465762F75696E707574202864656C6574656429 dev="tmpfs" ino=39259 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 print_req_error: I/O error, dev loop0, sector 0 Buffer I/O error on dev loop0p1, logical block 0, async page read print_req_error: I/O error, dev loop0, sector 0 Buffer I/O error on dev loop0p1, logical block 0, async page read Buffer I/O error on dev loop0p1, logical block 0, async page read FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 kobject: 'loop4' (ffff8880a4a560a0): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop5' (ffff8880a4a9c9a0): kobject_uevent_env kobject: 'loop5' (ffff8880a4a9c9a0): fill_kobj_path: path = '/devices/virtual/block/loop5' CPU: 1 PID: 10429 Comm: syz-executor.3 Not tainted 4.14.137 #33 kobject: 'loop1' (ffff8880a495d6e0): kobject_uevent_env Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x138/0x19c lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10f/0x159 lib/fault-inject.c:149 should_failslab+0xdb/0x130 mm/failslab.c:32 kobject: 'loop1' (ffff8880a495d6e0): fill_kobj_path: path = '/devices/virtual/block/loop1' slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] __do_kmalloc mm/slab.c:3718 [inline] __kmalloc+0x71/0x7a0 mm/slab.c:3729 kmalloc_array include/linux/slab.h:607 [inline] kcalloc include/linux/slab.h:618 [inline] selinux_get_mnt_opts security/selinux/hooks.c:633 [inline] selinux_sb_show_options+0x1d2/0xd50 security/selinux/hooks.c:1274 security_sb_show_options+0x75/0xb0 security/security.c:384 show_sb_opts+0xb4/0xe0 fs/proc_namespace.c:61 show_mountinfo+0x4ed/0x860 fs/proc_namespace.c:183 m_show+0x61/0x80 fs/namespace.c:1365 seq_read+0xb46/0x1280 fs/seq_file.c:272 do_loop_readv_writev fs/read_write.c:695 [inline] do_loop_readv_writev fs/read_write.c:682 [inline] do_iter_read+0x3e2/0x5b0 fs/read_write.c:919 vfs_readv+0xd3/0x130 fs/read_write.c:981 do_preadv+0x15d/0x200 fs/read_write.c:1065 SYSC_preadv fs/read_write.c:1115 [inline] SyS_preadv+0x31/0x40 fs/read_write.c:1110 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 kobject: 'loop2' (ffff8880a4997760): kobject_uevent_env entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x459829 kobject: 'loop2' (ffff8880a4997760): fill_kobj_path: path = '/devices/virtual/block/loop2' RSP: 002b:00007f23ad647c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 RAX: ffffffffffffffda RBX: 00007f23ad647c90 RCX: 0000000000459829 RDX: 0000000000000001 RSI: 0000000020000000 RDI: 0000000000000003 RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 kobject: 'loop3' (ffff8880a4a1d7e0): kobject_uevent_env R10: 0000000000000000 R11: 0000000000000246 R12: 00007f23ad6486d4 R13: 00000000004c6b38 R14: 00000000004dbc48 R15: 0000000000000004 base_sock_release(ffff888087c93a80) sk=ffff88805c7c09c0 kobject: 'loop3' (ffff8880a4a1d7e0): fill_kobj_path: path = '/devices/virtual/block/loop3' base_sock_release(ffff88809a1051c0) sk=ffff88805b1bc8c0 kobject: 'loop2' (ffff8880a4997760): kobject_uevent_env TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. kobject: 'loop2' (ffff8880a4997760): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop4' (ffff8880a4a560a0): kobject_uevent_env kobject: 'loop4' (ffff8880a4a560a0): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop5' (ffff8880a4a9c9a0): kobject_uevent_env kobject: 'loop5' (ffff8880a4a9c9a0): fill_kobj_path: path = '/devices/virtual/block/loop5' FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 kobject: 'loop5' (ffff8880a4a9c9a0): kobject_uevent_env CPU: 1 PID: 10458 Comm: syz-executor.3 Not tainted 4.14.137 #33 kobject: 'loop5' (ffff8880a4a9c9a0): fill_kobj_path: path = '/devices/virtual/block/loop5' Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x138/0x19c lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10f/0x159 lib/fault-inject.c:149 kobject: 'loop5' (ffff8880a4a9c9a0): kobject_uevent_env should_failslab+0xdb/0x130 mm/failslab.c:32 kobject: 'loop5' (ffff8880a4a9c9a0): fill_kobj_path: path = '/devices/virtual/block/loop5' slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc_trace+0x2e9/0x790 mm/slab.c:3616 kmalloc include/linux/slab.h:488 [inline] cgroup_show_path+0xca/0x540 kernel/cgroup/cgroup.c:1670 kernfs_sop_show_path+0x130/0x1b0 fs/kernfs/mount.c:52 show_mountinfo+0x22a/0x860 fs/proc_namespace.c:142 kobject: 'loop1' (ffff8880a495d6e0): kobject_uevent_env kobject: 'loop1' (ffff8880a495d6e0): fill_kobj_path: path = '/devices/virtual/block/loop1' m_show+0x61/0x80 fs/namespace.c:1365 seq_read+0xb46/0x1280 fs/seq_file.c:272 kobject: 'loop5' (ffff8880a4a9c9a0): kobject_uevent_env kobject: 'loop5' (ffff8880a4a9c9a0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop1' (ffff8880a495d6e0): kobject_uevent_env do_loop_readv_writev fs/read_write.c:695 [inline] do_loop_readv_writev fs/read_write.c:682 [inline] do_iter_read+0x3e2/0x5b0 fs/read_write.c:919 vfs_readv+0xd3/0x130 fs/read_write.c:981 kobject: 'loop1' (ffff8880a495d6e0): fill_kobj_path: path = '/devices/virtual/block/loop1' do_preadv+0x15d/0x200 fs/read_write.c:1065 kobject: 'loop5' (ffff8880a4a9c9a0): kobject_uevent_env SYSC_preadv fs/read_write.c:1115 [inline] SyS_preadv+0x31/0x40 fs/read_write.c:1110 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 kobject: 'loop5' (ffff8880a4a9c9a0): fill_kobj_path: path = '/devices/virtual/block/loop5' RIP: 0033:0x459829 RSP: 002b:00007f23ad647c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 RAX: ffffffffffffffda RBX: 00007f23ad647c90 RCX: 0000000000459829 RDX: 0000000000000001 RSI: 0000000020000000 RDI: 0000000000000003 RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 kobject: 'loop1' (ffff8880a495d6e0): kobject_uevent_env R10: 0000000000000000 R11: 0000000000000246 R12: 00007f23ad6486d4 R13: 00000000004c6b38 R14: 00000000004dbc48 R15: 0000000000000004 kobject: 'loop1' (ffff8880a495d6e0): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop3' (ffff8880a4a1d7e0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a1d7e0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop4' (ffff8880a4a560a0): kobject_uevent_env kobject: 'loop4' (ffff8880a4a560a0): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop3' (ffff8880a4a1d7e0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a1d7e0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop2' (ffff8880a4997760): kobject_uevent_env kobject: 'loop2' (ffff8880a4997760): fill_kobj_path: path = '/devices/virtual/block/loop2' FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 kobject: 'loop1' (ffff8880a495d6e0): kobject_uevent_env EXT4-fs warning (device sda1): ext4_group_extend:1770: can't read last block, resize aborted kobject: 'loop1' (ffff8880a495d6e0): fill_kobj_path: path = '/devices/virtual/block/loop1' CPU: 0 PID: 10492 Comm: syz-executor.3 Not tainted 4.14.137 #33 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x138/0x19c lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10f/0x159 lib/fault-inject.c:149 kobject: 'loop0' (ffff8880a48d8de0): kobject_uevent_env should_failslab+0xdb/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc_trace+0x2e9/0x790 mm/slab.c:3616 kobject: 'loop0' (ffff8880a48d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' kmalloc include/linux/slab.h:488 [inline] cgroup_show_path+0xca/0x540 kernel/cgroup/cgroup.c:1670 kernfs_sop_show_path+0x130/0x1b0 fs/kernfs/mount.c:52 kobject: 'loop5' (ffff8880a4a9c9a0): kobject_uevent_env show_mountinfo+0x22a/0x860 fs/proc_namespace.c:142 m_show+0x61/0x80 fs/namespace.c:1365 kobject: 'loop5' (ffff8880a4a9c9a0): fill_kobj_path: path = '/devices/virtual/block/loop5' seq_read+0xb46/0x1280 fs/seq_file.c:272 kobject: 'loop4' (ffff8880a4a560a0): kobject_uevent_env kobject: 'loop4' (ffff8880a4a560a0): fill_kobj_path: path = '/devices/virtual/block/loop4' do_loop_readv_writev fs/read_write.c:695 [inline] do_loop_readv_writev fs/read_write.c:682 [inline] do_iter_read+0x3e2/0x5b0 fs/read_write.c:919 vfs_readv+0xd3/0x130 fs/read_write.c:981 kobject: 'loop2' (ffff8880a4997760): kobject_uevent_env kobject: 'loop2' (ffff8880a4997760): fill_kobj_path: path = '/devices/virtual/block/loop2' do_preadv+0x15d/0x200 fs/read_write.c:1065 kobject: 'loop2' (ffff8880a4997760): kobject_uevent_env netlink: 176 bytes leftover after parsing attributes in process `syz-executor.1'. SYSC_preadv fs/read_write.c:1115 [inline] SyS_preadv+0x31/0x40 fs/read_write.c:1110 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 PF_BRIDGE: RTM_NEWNEIGH with invalid ifindex entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x459829 RSP: 002b:00007f23ad647c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 kobject: 'loop2' (ffff8880a4997760): fill_kobj_path: path = '/devices/virtual/block/loop2' RAX: ffffffffffffffda RBX: 00007f23ad647c90 RCX: 0000000000459829 RDX: 0000000000000001 RSI: 0000000020000000 RDI: 0000000000000003 RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f23ad6486d4 netlink: 176 bytes leftover after parsing attributes in process `syz-executor.1'. R13: 00000000004c6b38 R14: 00000000004dbc48 R15: 0000000000000004 kobject: 'loop0' (ffff8880a48d8de0): kobject_uevent_env PF_BRIDGE: RTM_NEWNEIGH with invalid ifindex kobject: 'loop0' (ffff8880a48d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop4' (ffff8880a4a560a0): kobject_uevent_env kobject: 'loop4' (ffff8880a4a560a0): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop5' (ffff8880a4a9c9a0): kobject_uevent_env kobject: 'loop5' (ffff8880a4a9c9a0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop1' (ffff8880a495d6e0): kobject_uevent_env kobject: 'loop1' (ffff8880a495d6e0): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop3' (ffff8880a4a1d7e0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a1d7e0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop2' (ffff8880a4997760): kobject_uevent_env kobject: 'loop2' (ffff8880a4997760): fill_kobj_path: path = '/devices/virtual/block/loop2' audit: type=1400 audit(1565187973.035:58): avc: denied { setattr } for pid=10589 comm="syz-executor.3" name="mountinfo" dev="proc" ino=39564 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=file permissive=1 kobject: 'loop4' (ffff8880a4a560a0): kobject_uevent_env kobject: 'loop4' (ffff8880a4a560a0): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop1' (ffff8880a495d6e0): kobject_uevent_env kobject: 'loop1' (ffff8880a495d6e0): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop5' (ffff8880a4a9c9a0): kobject_uevent_env kobject: 'loop5' (ffff8880a4a9c9a0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop1' (ffff8880a495d6e0): kobject_uevent_env kobject: 'loop1' (ffff8880a495d6e0): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop2' (ffff8880a4997760): kobject_uevent_env kobject: 'loop2' (ffff8880a4997760): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop3' (ffff8880a4a1d7e0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a1d7e0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop5' (ffff8880a4a9c9a0): kobject_uevent_env kobject: 'loop5' (ffff8880a4a9c9a0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop1' (ffff8880a495d6e0): kobject_uevent_env kobject: 'loop1' (ffff8880a495d6e0): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop4' (ffff8880a4a560a0): kobject_uevent_env kobject: 'loop4' (ffff8880a4a560a0): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop5' (ffff8880a4a9c9a0): kobject_uevent_env kobject: 'loop5' (ffff8880a4a9c9a0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop1' (ffff8880a495d6e0): kobject_uevent_env kobject: 'loop1' (ffff8880a495d6e0): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop2' (ffff8880a4997760): kobject_uevent_env kobject: 'loop2' (ffff8880a4997760): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop1' (ffff8880a495d6e0): kobject_uevent_env kobject: 'loop1' (ffff8880a495d6e0): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop4' (ffff8880a4a560a0): kobject_uevent_env kobject: 'loop4' (ffff8880a4a560a0): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop5' (ffff8880a4a9c9a0): kobject_uevent_env kobject: 'loop5' (ffff8880a4a9c9a0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop1' (ffff8880a495d6e0): kobject_uevent_env kobject: 'loop1' (ffff8880a495d6e0): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop2' (ffff8880a4997760): kobject_uevent_env kobject: 'loop2' (ffff8880a4997760): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop0' (ffff8880a48d8de0): kobject_uevent_env kobject: 'loop0' (ffff8880a48d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop1' (ffff8880a495d6e0): kobject_uevent_env kobject: 'loop1' (ffff8880a495d6e0): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop5' (ffff8880a4a9c9a0): kobject_uevent_env kobject: 'loop5' (ffff8880a4a9c9a0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop1' (ffff8880a495d6e0): kobject_uevent_env kobject: 'loop1' (ffff8880a495d6e0): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop3' (ffff8880a4a1d7e0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a1d7e0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop2' (ffff8880a4997760): kobject_uevent_env kobject: 'loop2' (ffff8880a4997760): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop0' (ffff8880a48d8de0): kobject_uevent_env kobject: 'loop0' (ffff8880a48d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop3' (ffff8880a4a1d7e0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a1d7e0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop2' (ffff8880a4997760): kobject_uevent_env hfs: uid requires an argument kobject: 'loop2' (ffff8880a4997760): fill_kobj_path: path = '/devices/virtual/block/loop2' hfs: unable to parse mount options kobject: 'loop1' (ffff8880a495d6e0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a1d7e0): kobject_uevent_env kobject: 'loop1' (ffff8880a495d6e0): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop3' (ffff8880a4a1d7e0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop5' (ffff8880a4a9c9a0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a1d7e0): kobject_uevent_env kobject: 'loop5' (ffff8880a4a9c9a0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop3' (ffff8880a4a1d7e0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop1' (ffff8880a495d6e0): kobject_uevent_env hfs: uid requires an argument kobject: 'loop1' (ffff8880a495d6e0): fill_kobj_path: path = '/devices/virtual/block/loop1' hfs: unable to parse mount options kobject: 'loop2' (ffff8880a4997760): kobject_uevent_env kobject: 'loop2' (ffff8880a4997760): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop0' (ffff8880a48d8de0): kobject_uevent_env kobject: 'loop0' (ffff8880a48d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop3' (ffff8880a4a1d7e0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a1d7e0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop1' (ffff8880a495d6e0): kobject_uevent_env kobject: 'loop1' (ffff8880a495d6e0): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop2' (ffff8880a4997760): kobject_uevent_env kobject: 'loop2' (ffff8880a4997760): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop5' (ffff8880a4a9c9a0): kobject_uevent_env kobject: 'loop5' (ffff8880a4a9c9a0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop2' (ffff8880a4997760): kobject_uevent_env kobject: 'loop2' (ffff8880a4997760): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop3' (ffff8880a4a1d7e0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a1d7e0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop0' (ffff8880a48d8de0): kobject_uevent_env kobject: 'loop0' (ffff8880a48d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop2' (ffff8880a4997760): kobject_uevent_env kobject: 'loop2' (ffff8880a4997760): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop0' (ffff8880a48d8de0): kobject_uevent_env kobject: 'loop0' (ffff8880a48d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop2' (ffff8880a4997760): kobject_uevent_env kobject: 'loop2' (ffff8880a4997760): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop5' (ffff8880a4a9c9a0): kobject_uevent_env kobject: 'loop5' (ffff8880a4a9c9a0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop3' (ffff8880a4a1d7e0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a1d7e0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop2' (ffff8880a4997760): kobject_uevent_env kobject: 'loop2' (ffff8880a4997760): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop1' (ffff8880a495d6e0): kobject_uevent_env kobject: 'loop1' (ffff8880a495d6e0): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop0' (ffff8880a48d8de0): kobject_uevent_env kobject: 'loop0' (ffff8880a48d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop2' (ffff8880a4997760): kobject_uevent_env kobject: 'loop2' (ffff8880a4997760): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop2' (ffff8880a4997760): kobject_uevent_env kobject: 'loop2' (ffff8880a4997760): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop5' (ffff8880a4a9c9a0): kobject_uevent_env kobject: 'loop5' (ffff8880a4a9c9a0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop0' (ffff8880a48d8de0): kobject_uevent_env kobject: 'loop0' (ffff8880a48d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop2' (ffff8880a4997760): kobject_uevent_env kobject: 'loop2' (ffff8880a4997760): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop1' (ffff8880a495d6e0): kobject_uevent_env kobject: 'loop1' (ffff8880a495d6e0): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop3' (ffff8880a4a1d7e0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a1d7e0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop0' (ffff8880a48d8de0): kobject_uevent_env kobject: 'loop0' (ffff8880a48d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop2' (ffff8880a4997760): kobject_uevent_env kobject: 'loop2' (ffff8880a4997760): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop5' (ffff8880a4a9c9a0): kobject_uevent_env kobject: 'loop5' (ffff8880a4a9c9a0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop2' (ffff8880a4997760): kobject_uevent_env kobject: 'loop2' (ffff8880a4997760): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop0' (ffff8880a48d8de0): kobject_uevent_env kobject: 'loop0' (ffff8880a48d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop1' (ffff8880a495d6e0): kobject_uevent_env kobject: 'loop1' (ffff8880a495d6e0): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop2' (ffff8880a4997760): kobject_uevent_env kobject: 'loop2' (ffff8880a4997760): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop3' (ffff8880a4a1d7e0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a1d7e0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop2' (ffff8880a4997760): kobject_uevent_env kobject: 'loop2' (ffff8880a4997760): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop0' (ffff8880a48d8de0): kobject_uevent_env kobject: 'loop0' (ffff8880a48d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' audit: type=1400 audit(1565187974.605:59): avc: denied { associate } for pid=10774 comm="syz-executor.5" name="dsp1" dev="devtmpfs" ino=15839 scontext=system_u:object_r:anacron_exec_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=filesystem permissive=1 kobject: 'loop5' (ffff8880a4a9c9a0): kobject_uevent_env kobject: 'loop5' (ffff8880a4a9c9a0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop2' (ffff8880a4997760): kobject_uevent_env kobject: 'loop2' (ffff8880a4997760): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop0' (ffff8880a48d8de0): kobject_uevent_env kobject: 'loop0' (ffff8880a48d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop5' (ffff8880a4a9c9a0): kobject_uevent_env kobject: 'loop5' (ffff8880a4a9c9a0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop1' (ffff8880a495d6e0): kobject_uevent_env kobject: 'loop1' (ffff8880a495d6e0): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop2' (ffff8880a4997760): kobject_uevent_env kobject: 'loop2' (ffff8880a4997760): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop0' (ffff8880a48d8de0): kobject_uevent_env kobject: 'loop0' (ffff8880a48d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop3' (ffff8880a4a1d7e0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a1d7e0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop1' (ffff8880a495d6e0): kobject_uevent_env kobject: 'loop1' (ffff8880a495d6e0): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop4' (ffff8880a4a560a0): kobject_uevent_env kobject: 'loop4' (ffff8880a4a560a0): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop0' (ffff8880a48d8de0): kobject_uevent_env kobject: 'loop0' (ffff8880a48d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop1' (ffff8880a495d6e0): kobject_uevent_env kobject: 'loop1' (ffff8880a495d6e0): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop0' (ffff8880a48d8de0): kobject_uevent_env kobject: 'loop0' (ffff8880a48d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop4' (ffff8880a4a560a0): kobject_uevent_env kobject: 'loop4' (ffff8880a4a560a0): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop2' (ffff8880a4997760): kobject_uevent_env kobject: 'loop2' (ffff8880a4997760): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop1' (ffff8880a495d6e0): kobject_uevent_env kobject: 'loop5' (ffff8880a4a9c9a0): kobject_uevent_env kobject: 'loop5' (ffff8880a4a9c9a0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop1' (ffff8880a495d6e0): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop2' (ffff8880a4997760): kobject_uevent_env kobject: 'loop2' (ffff8880a4997760): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop3' (ffff8880a4a1d7e0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a1d7e0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop4' (ffff8880a4a560a0): kobject_uevent_env kobject: 'loop4' (ffff8880a4a560a0): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop5' (ffff8880a4a9c9a0): kobject_uevent_env kobject: 'loop5' (ffff8880a4a9c9a0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop0' (ffff8880a48d8de0): kobject_uevent_env kobject: 'loop0' (ffff8880a48d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop1' (ffff8880a495d6e0): kobject_uevent_env kobject: 'loop1' (ffff8880a495d6e0): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop4' (ffff8880a4a560a0): kobject_uevent_env kobject: 'loop4' (ffff8880a4a560a0): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop0' (ffff8880a48d8de0): kobject_uevent_env kobject: 'loop0' (ffff8880a48d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop1' (ffff8880a495d6e0): kobject_uevent_env kobject: 'loop1' (ffff8880a495d6e0): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop3' (ffff8880a4a1d7e0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a1d7e0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop0' (ffff8880a48d8de0): kobject_uevent_env kobject: 'loop0' (ffff8880a48d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop1' (ffff8880a495d6e0): kobject_uevent_env kobject: 'loop1' (ffff8880a495d6e0): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop4' (ffff8880a4a560a0): kobject_uevent_env kobject: 'loop4' (ffff8880a4a560a0): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop3' (ffff8880a4a1d7e0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a1d7e0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop3' (ffff8880a4a1d7e0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a1d7e0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop2' (ffff8880a4997760): kobject_uevent_env kobject: 'loop2' (ffff8880a4997760): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop1' (ffff8880a495d6e0): kobject_uevent_env kobject: 'loop1' (ffff8880a495d6e0): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop0' (ffff8880a48d8de0): kobject_uevent_env kobject: 'loop0' (ffff8880a48d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop2' (ffff8880a4997760): kobject_uevent_env kobject: 'loop2' (ffff8880a4997760): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop1' (ffff8880a495d6e0): kobject_uevent_env kobject: 'loop1' (ffff8880a495d6e0): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop0' (ffff8880a48d8de0): kobject_uevent_env kobject: 'loop0' (ffff8880a48d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop2' (ffff8880a4997760): kobject_uevent_env kobject: 'loop2' (ffff8880a4997760): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop1' (ffff8880a495d6e0): kobject_uevent_env kobject: 'loop1' (ffff8880a495d6e0): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop0' (ffff8880a48d8de0): kobject_uevent_env kobject: 'loop0' (ffff8880a48d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop1' (ffff8880a495d6e0): kobject_uevent_env kobject: 'loop1' (ffff8880a495d6e0): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop4' (ffff8880a4a560a0): kobject_uevent_env kobject: 'loop4' (ffff8880a4a560a0): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop2' (ffff8880a4997760): kobject_uevent_env kobject: 'loop2' (ffff8880a4997760): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop0' (ffff8880a48d8de0): kobject_uevent_env kobject: 'loop0' (ffff8880a48d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop1' (ffff8880a495d6e0): kobject_uevent_env kobject: 'loop1' (ffff8880a495d6e0): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop4' (ffff8880a4a560a0): kobject_uevent_env kobject: 'loop4' (ffff8880a4a560a0): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop3' (ffff8880a4a1d7e0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a1d7e0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop0' (ffff8880a48d8de0): kobject_uevent_env kobject: 'loop0' (ffff8880a48d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop2' (ffff8880a4997760): kobject_uevent_env kobject: 'loop2' (ffff8880a4997760): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop1' (ffff8880a495d6e0): kobject_uevent_env kobject: 'loop1' (ffff8880a495d6e0): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop0' (ffff8880a48d8de0): kobject_uevent_env kobject: 'loop0' (ffff8880a48d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop1' (ffff8880a495d6e0): kobject_uevent_env kobject: 'loop1' (ffff8880a495d6e0): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop5' (ffff8880a4a9c9a0): kobject_uevent_env kobject: 'loop2' (ffff8880a4997760): kobject_uevent_env kobject: 'loop2' (ffff8880a4997760): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop5' (ffff8880a4a9c9a0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop4' (ffff8880a4a560a0): kobject_uevent_env kobject: 'loop4' (ffff8880a4a560a0): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop3' (ffff8880a4a1d7e0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a1d7e0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop2' (ffff8880a4997760): kobject_uevent_env kobject: 'loop2' (ffff8880a4997760): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop0' (ffff8880a48d8de0): kobject_uevent_env kobject: 'loop0' (ffff8880a48d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop4' (ffff8880a4a560a0): kobject_uevent_env kobject: 'loop4' (ffff8880a4a560a0): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop5' (ffff8880a4a9c9a0): kobject_uevent_env kobject: 'loop5' (ffff8880a4a9c9a0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop0' (ffff8880a48d8de0): kobject_uevent_env kobject: 'loop0' (ffff8880a48d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop2' (ffff8880a4997760): kobject_uevent_env kobject: 'loop2' (ffff8880a4997760): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop4' (ffff8880a4a560a0): kobject_uevent_env kobject: 'loop4' (ffff8880a4a560a0): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop5' (ffff8880a4a9c9a0): kobject_uevent_env kobject: 'loop5' (ffff8880a4a9c9a0): fill_kobj_path: path = '/devices/virtual/block/loop5' FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 kobject: 'loop0' (ffff8880a48d8de0): kobject_uevent_env FAULT_INJECTION: forcing a failure. name fail_page_alloc, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 10957 Comm: syz-executor.2 Not tainted 4.14.137 #33 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 kobject: 'loop0' (ffff8880a48d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x138/0x19c lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10f/0x159 lib/fault-inject.c:149 should_failslab+0xdb/0x130 mm/failslab.c:32 kobject: 'loop2' (ffff8880a4997760): kobject_uevent_env slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc+0x2d7/0x780 mm/slab.c:3550 kobject: 'loop2' (ffff8880a4997760): fill_kobj_path: path = '/devices/virtual/block/loop2' getname_flags fs/namei.c:138 [inline] getname_flags+0xcb/0x580 fs/namei.c:128 getname+0x1a/0x20 fs/namei.c:209 do_sys_open+0x1e7/0x430 fs/open.c:1078 SYSC_open fs/open.c:1102 [inline] SyS_open+0x2d/0x40 fs/open.c:1097 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 kobject: 'loop4' (ffff8880a4a560a0): kobject_uevent_env entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x413711 RSP: 002b:00007fea18f947a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000413711 kobject: 'loop4' (ffff8880a4a560a0): fill_kobj_path: path = '/devices/virtual/block/loop4' RDX: 0000000000000000 RSI: 0000000000044002 RDI: 00007fea18f94850 RBP: 000000000075bf20 R08: 000000000000000f R09: 0000000000000000 R10: 0000000000000064 R11: 0000000000000293 R12: 00007fea18f956d4 R13: 00000000004c8bb5 R14: 00000000004dfa40 R15: 0000000000000003 CPU: 0 PID: 10955 Comm: syz-executor.0 Not tainted 4.14.137 #33 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x138/0x19c lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10f/0x159 lib/fault-inject.c:149 should_fail_alloc_page mm/page_alloc.c:2891 [inline] prepare_alloc_pages mm/page_alloc.c:4124 [inline] __alloc_pages_nodemask+0x1d6/0x7a0 mm/page_alloc.c:4172 FAULT_INJECTION: forcing a failure. name fail_page_alloc, interval 1, probability 0, space 0, times 0 __alloc_pages include/linux/gfp.h:461 [inline] __alloc_pages_node include/linux/gfp.h:474 [inline] alloc_pages_vma+0x322/0x4c0 mm/mempolicy.c:2070 do_huge_pmd_anonymous_page+0x38f/0x1470 mm/huge_memory.c:723 create_huge_pmd mm/memory.c:3881 [inline] __handle_mm_fault+0x22bf/0x3470 mm/memory.c:4084 handle_mm_fault+0x293/0x7c0 mm/memory.c:4150 __do_page_fault+0x4c1/0xb80 arch/x86/mm/fault.c:1423 do_page_fault+0x71/0x511 arch/x86/mm/fault.c:1498 page_fault+0x25/0x50 arch/x86/entry/entry_64.S:1122 RIP: 0010:__put_user_4+0x1c/0x30 arch/x86/lib/putuser.S:70 RSP: 0018:ffff88809926fc98 EFLAGS: 00010283 RAX: 0000000000000005 RBX: 00007fffffffeffd RCX: 0000000020a07fff RDX: 0000000000000000 RSI: ffffffff817bdb58 RDI: ffff88808e3d2e9c RBP: ffff88809926fd50 R08: ffff88805aef41c0 R09: 0000000000000000 R10: 0000000000000000 R11: ffff88805aef41c0 R12: 1ffff1101324df95 R13: ffff88808e3d2e80 R14: 0000000020a07fff R15: 000000008004510b odev_ioctl+0x56/0x90 sound/core/seq/oss/seq_oss.c:187 vfs_ioctl fs/ioctl.c:46 [inline] file_ioctl fs/ioctl.c:500 [inline] do_vfs_ioctl+0x7ae/0x1060 fs/ioctl.c:684 SYSC_ioctl fs/ioctl.c:701 [inline] SyS_ioctl+0x8f/0xc0 fs/ioctl.c:692 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x459829 RSP: 002b:00007ff81ceadc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007ff81ceadc90 RCX: 0000000000459829 RDX: 0000000020a07fff RSI: 000000008004510b RDI: 0000000000000004 RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff81ceae6d4 R13: 00000000004c25b3 R14: 00000000004d5a80 R15: 0000000000000005 CPU: 1 PID: 10974 Comm: syz-executor.2 Not tainted 4.14.137 #33 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x138/0x19c lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10f/0x159 lib/fault-inject.c:149 kobject: 'loop3' (ffff8880a4a1d7e0): kobject_uevent_env should_fail_alloc_page mm/page_alloc.c:2891 [inline] prepare_alloc_pages mm/page_alloc.c:4124 [inline] __alloc_pages_nodemask+0x1d6/0x7a0 mm/page_alloc.c:4172 __alloc_pages include/linux/gfp.h:461 [inline] __alloc_pages_node include/linux/gfp.h:474 [inline] kmem_getpages mm/slab.c:1419 [inline] cache_grow_begin+0x80/0x400 mm/slab.c:2676 cache_alloc_refill mm/slab.c:3043 [inline] ____cache_alloc mm/slab.c:3125 [inline] ____cache_alloc mm/slab.c:3108 [inline] __do_cache_alloc mm/slab.c:3347 [inline] slab_alloc mm/slab.c:3382 [inline] kmem_cache_alloc+0x6a6/0x780 mm/slab.c:3550 kobject: 'loop3' (ffff8880a4a1d7e0): fill_kobj_path: path = '/devices/virtual/block/loop3' getname_flags fs/namei.c:138 [inline] getname_flags+0xcb/0x580 fs/namei.c:128 getname+0x1a/0x20 fs/namei.c:209 do_sys_open+0x1e7/0x430 fs/open.c:1078 kobject: 'loop0' (ffff8880a48d8de0): kobject_uevent_env SYSC_open fs/open.c:1102 [inline] SyS_open+0x2d/0x40 fs/open.c:1097 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 kobject: 'loop0' (ffff8880a48d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x413711 RSP: 002b:00007fea18f947a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000413711 kobject: 'loop2' (ffff8880a4997760): kobject_uevent_env RDX: 0000000000000000 RSI: 0000000000044002 RDI: 00007fea18f94850 RBP: 000000000075bf20 R08: 000000000000000f R09: 0000000000000000 R10: 0000000000000064 R11: 0000000000000293 R12: 00007fea18f956d4 R13: 00000000004c8bb5 R14: 00000000004dfa40 R15: 0000000000000003 kobject: 'loop2' (ffff8880a4997760): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop0' (ffff8880a48d8de0): kobject_uevent_env kobject: 'loop0' (ffff8880a48d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop4' (ffff8880a4a560a0): kobject_uevent_env kobject: 'loop4' (ffff8880a4a560a0): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop2' (ffff8880a4997760): kobject_uevent_env kobject: 'loop2' (ffff8880a4997760): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop5' (ffff8880a4a9c9a0): kobject_uevent_env kobject: 'loop5' (ffff8880a4a9c9a0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop2' (ffff8880a4997760): kobject_uevent_env kobject: 'loop2' (ffff8880a4997760): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop5' (ffff8880a4a9c9a0): kobject_uevent_env kobject: 'loop0' (ffff8880a48d8de0): kobject_uevent_env kobject: 'loop5' (ffff8880a4a9c9a0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop0' (ffff8880a48d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop5' (ffff8880a4a9c9a0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a1d7e0): kobject_uevent_env kobject: 'loop5' (ffff8880a4a9c9a0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop3' (ffff8880a4a1d7e0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop5' (ffff8880a4a9c9a0): kobject_uevent_env kobject: 'loop5' (ffff8880a4a9c9a0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop4' (ffff8880a4a560a0): kobject_uevent_env kobject: 'loop4' (ffff8880a4a560a0): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop2' (ffff8880a4997760): kobject_uevent_env kobject: 'loop2' (ffff8880a4997760): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop0' (ffff8880a48d8de0): kobject_uevent_env kobject: 'loop0' (ffff8880a48d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop4' (ffff8880a4a560a0): kobject_uevent_env kobject: 'loop4' (ffff8880a4a560a0): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop2' (ffff8880a4997760): kobject_uevent_env kobject: 'loop2' (ffff8880a4997760): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop3' (ffff8880a4a1d7e0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a1d7e0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop0' (ffff8880a48d8de0): kobject_uevent_env kobject: 'loop0' (ffff8880a48d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop2' (ffff8880a4997760): kobject_uevent_env kobject: 'loop2' (ffff8880a4997760): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop2' (ffff8880a4997760): kobject_uevent_env kobject: 'loop2' (ffff8880a4997760): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop0' (ffff8880a48d8de0): kobject_uevent_env kobject: 'loop0' (ffff8880a48d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop4' (ffff8880a4a560a0): kobject_uevent_env kobject: 'loop4' (ffff8880a4a560a0): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop5' (ffff8880a4a9c9a0): kobject_uevent_env kobject: 'loop5' (ffff8880a4a9c9a0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop3' (ffff8880a4a1d7e0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a1d7e0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop5' (ffff8880a4a9c9a0): kobject_uevent_env kobject: 'loop5' (ffff8880a4a9c9a0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop1' (ffff8880a495d6e0): kobject_uevent_env kobject: 'loop1' (ffff8880a495d6e0): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop4' (ffff8880a4a560a0): kobject_uevent_env FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 FAULT_INJECTION: forcing a failure. name fail_page_alloc, interval 1, probability 0, space 0, times 0 kobject: 'loop4' (ffff8880a4a560a0): fill_kobj_path: path = '/devices/virtual/block/loop4' CPU: 0 PID: 10990 Comm: syz-executor.0 Not tainted 4.14.137 #33 kobject: 'loop1' (ffff8880a495d6e0): kobject_uevent_env Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x138/0x19c lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10f/0x159 lib/fault-inject.c:149 kobject: 'loop1' (ffff8880a495d6e0): fill_kobj_path: path = '/devices/virtual/block/loop1' should_fail_alloc_page mm/page_alloc.c:2891 [inline] prepare_alloc_pages mm/page_alloc.c:4124 [inline] __alloc_pages_nodemask+0x1d6/0x7a0 mm/page_alloc.c:4172 alloc_pages_current+0xec/0x1e0 mm/mempolicy.c:2113 kobject: 'loop2' (ffff8880a4997760): kobject_uevent_env alloc_pages include/linux/gfp.h:497 [inline] pte_alloc_one+0x1a/0x100 arch/x86/mm/pgtable.c:30 __do_huge_pmd_anonymous_page mm/huge_memory.c:565 [inline] do_huge_pmd_anonymous_page+0x582/0x1470 mm/huge_memory.c:729 create_huge_pmd mm/memory.c:3881 [inline] __handle_mm_fault+0x22bf/0x3470 mm/memory.c:4084 kobject: 'loop2' (ffff8880a4997760): fill_kobj_path: path = '/devices/virtual/block/loop2' handle_mm_fault+0x293/0x7c0 mm/memory.c:4150 __do_page_fault+0x4c1/0xb80 arch/x86/mm/fault.c:1423 kobject: 'loop4' (ffff8880a4a560a0): kobject_uevent_env do_page_fault+0x71/0x511 arch/x86/mm/fault.c:1498 page_fault+0x25/0x50 arch/x86/entry/entry_64.S:1122 RIP: 0010:__put_user_4+0x1c/0x30 arch/x86/lib/putuser.S:70 kobject: 'loop4' (ffff8880a4a560a0): fill_kobj_path: path = '/devices/virtual/block/loop4' RSP: 0018:ffff888057eafc98 EFLAGS: 00010283 RAX: 0000000000000005 RBX: 00007fffffffeffd RCX: 0000000020a07fff RDX: 0000000000000000 RSI: ffffffff817bdb58 RDI: ffff88809600eedc kobject: 'loop1' (ffff8880a495d6e0): kobject_uevent_env RBP: ffff888057eafd50 R08: ffff888091f80280 R09: 0000000000000000 R10: 0000000000000000 R11: ffff888091f80280 R12: 1ffff1100afd5f95 R13: ffff88809600eec0 R14: 0000000020a07fff R15: 000000008004510b kobject: 'loop1' (ffff8880a495d6e0): fill_kobj_path: path = '/devices/virtual/block/loop1' odev_ioctl+0x56/0x90 sound/core/seq/oss/seq_oss.c:187 kobject: 'loop2' (ffff8880a4997760): kobject_uevent_env vfs_ioctl fs/ioctl.c:46 [inline] file_ioctl fs/ioctl.c:500 [inline] do_vfs_ioctl+0x7ae/0x1060 fs/ioctl.c:684 kobject: 'loop2' (ffff8880a4997760): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop0' (ffff8880a48d8de0): kobject_uevent_env SYSC_ioctl fs/ioctl.c:701 [inline] SyS_ioctl+0x8f/0xc0 fs/ioctl.c:692 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 kobject: 'loop0' (ffff8880a48d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' entry_SYSCALL_64_after_hwframe+0x42/0xb7 kobject: 'loop5' (ffff8880a4a9c9a0): kobject_uevent_env RIP: 0033:0x459829 kobject: 'loop5' (ffff8880a4a9c9a0): fill_kobj_path: path = '/devices/virtual/block/loop5' RSP: 002b:00007ff81ceadc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007ff81ceadc90 RCX: 0000000000459829 RDX: 0000000020a07fff RSI: 000000008004510b RDI: 0000000000000004 RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff81ceae6d4 R13: 00000000004c25b3 R14: 00000000004d5a80 R15: 0000000000000005 CPU: 0 PID: 10988 Comm: syz-executor.2 Not tainted 4.14.137 #33 kobject: 'loop1' (ffff8880a495d6e0): kobject_uevent_env Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 kobject: 'loop1' (ffff8880a495d6e0): fill_kobj_path: path = '/devices/virtual/block/loop1' Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x138/0x19c lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10f/0x159 lib/fault-inject.c:149 kobject: 'loop3' (ffff8880a4a1d7e0): kobject_uevent_env should_failslab+0xdb/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc+0x2d7/0x780 mm/slab.c:3550 kobject: 'loop3' (ffff8880a4a1d7e0): fill_kobj_path: path = '/devices/virtual/block/loop3' kmem_cache_zalloc include/linux/slab.h:651 [inline] get_empty_filp+0x8c/0x3f0 fs/file_table.c:123 path_openat+0x8f/0x3f70 fs/namei.c:3542 do_filp_open+0x18e/0x250 fs/namei.c:3600 do_sys_open+0x2c5/0x430 fs/open.c:1084 SYSC_open fs/open.c:1102 [inline] SyS_open+0x2d/0x40 fs/open.c:1097 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x413711 RSP: 002b:00007fea18f947a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000413711 RDX: 0000000000000000 RSI: 0000000000044002 RDI: 00007fea18f94850 RBP: 000000000075bf20 R08: 000000000000000f R09: 0000000000000000 R10: 0000000000000064 R11: 0000000000000293 R12: 00007fea18f956d4 R13: 00000000004c8bb5 R14: 00000000004dfa40 R15: 0000000000000003 kobject: 'loop5' (ffff8880a4a9c9a0): kobject_uevent_env kobject: 'loop5' (ffff8880a4a9c9a0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop0' (ffff8880a48d8de0): kobject_uevent_env kobject: 'loop0' (ffff8880a48d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' print_req_error: 12 callbacks suppressed print_req_error: I/O error, dev loop0, sector 0 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 11075 Comm: syz-executor.2 Not tainted 4.14.137 #33 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x138/0x19c lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10f/0x159 lib/fault-inject.c:149 should_failslab+0xdb/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc+0x2d7/0x780 mm/slab.c:3550 kmem_cache_zalloc include/linux/slab.h:651 [inline] file_alloc_security security/selinux/hooks.c:368 [inline] selinux_file_alloc_security+0xb4/0x190 security/selinux/hooks.c:3475 security_file_alloc+0x6d/0xa0 security/security.c:874 get_empty_filp+0x162/0x3f0 fs/file_table.c:129 path_openat+0x8f/0x3f70 fs/namei.c:3542 do_filp_open+0x18e/0x250 fs/namei.c:3600 do_sys_open+0x2c5/0x430 fs/open.c:1084 SYSC_open fs/open.c:1102 [inline] SyS_open+0x2d/0x40 fs/open.c:1097 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x413711 RSP: 002b:00007fea18f947a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000413711 RDX: 0000000000000000 RSI: 0000000000044002 RDI: 00007fea18f94850 RBP: 000000000075bf20 R08: 000000000000000f R09: 0000000000000000 R10: 0000000000000064 R11: 0000000000000293 R12: 00007fea18f956d4 R13: 00000000004c8bb5 R14: 00000000004dfa40 R15: 0000000000000003 CPU: 1 PID: 11065 Comm: syz-executor.0 Not tainted 4.14.137 #33 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x138/0x19c lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10f/0x159 lib/fault-inject.c:149 should_failslab+0xdb/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc+0x2d7/0x780 mm/slab.c:3550 ptlock_alloc+0x20/0x70 mm/memory.c:4741 ptlock_init include/linux/mm.h:1757 [inline] pgtable_page_ctor include/linux/mm.h:1791 [inline] pte_alloc_one+0x60/0x100 arch/x86/mm/pgtable.c:33 __do_huge_pmd_anonymous_page mm/huge_memory.c:565 [inline] do_huge_pmd_anonymous_page+0x582/0x1470 mm/huge_memory.c:729 create_huge_pmd mm/memory.c:3881 [inline] __handle_mm_fault+0x22bf/0x3470 mm/memory.c:4084 handle_mm_fault+0x293/0x7c0 mm/memory.c:4150 __do_page_fault+0x4c1/0xb80 arch/x86/mm/fault.c:1423 do_page_fault+0x71/0x511 arch/x86/mm/fault.c:1498 page_fault+0x25/0x50 arch/x86/entry/entry_64.S:1122 RIP: 0010:__put_user_4+0x1c/0x30 arch/x86/lib/putuser.S:70 RSP: 0018:ffff888055627c98 EFLAGS: 00010283 RAX: 0000000000000005 RBX: 00007fffffffeffd RCX: 0000000020a07fff RDX: 0000000000000000 RSI: ffffffff817bdb58 RDI: ffff888060c04a5c RBP: ffff888055627d50 R08: ffff888057ee0340 R09: 0000000000000000 R10: 0000000000000000 R11: ffff888057ee0340 R12: 1ffff1100aac4f95 R13: ffff888060c04a40 R14: 0000000020a07fff R15: 000000008004510b odev_ioctl+0x56/0x90 sound/core/seq/oss/seq_oss.c:187 vfs_ioctl fs/ioctl.c:46 [inline] file_ioctl fs/ioctl.c:500 [inline] do_vfs_ioctl+0x7ae/0x1060 fs/ioctl.c:684 SYSC_ioctl fs/ioctl.c:701 [inline] SyS_ioctl+0x8f/0xc0 fs/ioctl.c:692 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x459829 RSP: 002b:00007ff81ceadc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007ff81ceadc90 RCX: 0000000000459829 RDX: 0000000020a07fff RSI: 000000008004510b RDI: 0000000000000004 RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff81ceae6d4 R13: 00000000004c25b3 R14: 00000000004d5a80 R15: 0000000000000005 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 11119 Comm: syz-executor.2 Not tainted 4.14.137 #33 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x138/0x19c lib/dump_stack.c:53 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10f/0x159 lib/fault-inject.c:149 should_failslab+0xdb/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc_trace+0x2e9/0x790 mm/slab.c:3616 kmalloc include/linux/slab.h:488 [inline] kzalloc include/linux/slab.h:661 [inline] snd_pcm_oss_open_file sound/core/oss/pcm_oss.c:2403 [inline] snd_pcm_oss_open.part.0+0x4f6/0x1120 sound/core/oss/pcm_oss.c:2506 snd_pcm_oss_open+0x37/0x50 sound/core/oss/pcm_oss.c:2470 soundcore_open+0x3f3/0x5a0 sound/sound_core.c:639 chrdev_open+0x207/0x590 fs/char_dev.c:423 do_dentry_open+0x73b/0xeb0 fs/open.c:777 vfs_open+0x105/0x220 fs/open.c:891 do_last fs/namei.c:3425 [inline] path_openat+0x8bd/0x3f70 fs/namei.c:3566 do_filp_open+0x18e/0x250 fs/namei.c:3600 do_sys_open+0x2c5/0x430 fs/open.c:1084 SYSC_open fs/open.c:1102 [inline] SyS_open+0x2d/0x40 fs/open.c:1097 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x413711 RSP: 002b:00007fea18f947a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000413711 RDX: 0000000000000000 RSI: 0000000000044002 RDI: 00007fea18f94850 RBP: 000000000075bf20 R08: 000000000000000f R09: 0000000000000000 R10: 0000000000000064 R11: 0000000000000293 R12: 00007fea18f956d4 R13: 00000000004c8bb5 R14: 00000000004dfa40 R15: 0000000000000003 CPU: 0 PID: 11123 Comm: syz-executor.5 Not tainted 4.14.137 #33 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x138/0x19c lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10f/0x159 lib/fault-inject.c:149 should_failslab+0xdb/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc_node mm/slab.c:3297 [inline] kmem_cache_alloc_node+0x287/0x780 mm/slab.c:3640 __alloc_skb+0x9c/0x500 net/core/skbuff.c:193 alloc_skb include/linux/skbuff.h:980 [inline] alloc_skb_with_frags+0x86/0x4b0 net/core/skbuff.c:5209 sock_alloc_send_pskb+0x5db/0x740 net/core/sock.c:2073 tun_alloc_skb drivers/net/tun.c:1184 [inline] tun_get_user+0x65d/0x39f0 drivers/net/tun.c:1470 tun_chr_write_iter+0xdd/0x190 drivers/net/tun.c:1594 call_write_iter include/linux/fs.h:1777 [inline] do_iter_readv_writev+0x418/0x670 fs/read_write.c:675 do_iter_write fs/read_write.c:954 [inline] do_iter_write+0x154/0x540 fs/read_write.c:935 vfs_writev+0x170/0x2a0 fs/read_write.c:999 do_writev+0x10a/0x2d0 fs/read_write.c:1034 SYSC_writev fs/read_write.c:1107 [inline] SyS_writev+0x28/0x30 fs/read_write.c:1104 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x4596e1 RSP: 002b:00007f9dda0acba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 RAX: ffffffffffffffda RBX: 0000000000300b00 RCX: 00000000004596e1 RDX: 0000000000000001 RSI: 00007f9dda0acc00 RDI: 00000000000000f0 RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000064 R11: 0000000000000293 R12: 00007f9dda0ad6d4 R13: 00000000004c8775 R14: 00000000004df4e8 R15: 0000000000000003 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 11141 Comm: syz-executor.2 Not tainted 4.14.137 #33 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x138/0x19c lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10f/0x159 lib/fault-inject.c:149 should_failslab+0xdb/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc_trace+0x2e9/0x790 mm/slab.c:3616 kmalloc include/linux/slab.h:488 [inline] kzalloc include/linux/slab.h:661 [inline] snd_pcm_oss_open_file sound/core/oss/pcm_oss.c:2403 [inline] snd_pcm_oss_open.part.0+0x4f6/0x1120 sound/core/oss/pcm_oss.c:2506 snd_pcm_oss_open+0x37/0x50 sound/core/oss/pcm_oss.c:2470 soundcore_open+0x3f3/0x5a0 sound/sound_core.c:639 chrdev_open+0x207/0x590 fs/char_dev.c:423 do_dentry_open+0x73b/0xeb0 fs/open.c:777 vfs_open+0x105/0x220 fs/open.c:891 do_last fs/namei.c:3425 [inline] path_openat+0x8bd/0x3f70 fs/namei.c:3566 do_filp_open+0x18e/0x250 fs/namei.c:3600 do_sys_open+0x2c5/0x430 fs/open.c:1084 SYSC_open fs/open.c:1102 [inline] SyS_open+0x2d/0x40 fs/open.c:1097 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x413711 RSP: 002b:00007fea18f947a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000413711 RDX: 0000000000000000 RSI: 0000000000044002 RDI: 00007fea18f94850 RBP: 000000000075bf20 R08: 000000000000000f R09: 0000000000000000 R10: 0000000000000064 R11: 0000000000000293 R12: 00007fea18f956d4 R13: 00000000004c8bb5 R14: 00000000004dfa40 R15: 0000000000000003 kobject: 'loop1' (ffff8880a495d6e0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a1d7e0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a1d7e0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop1' (ffff8880a495d6e0): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop0' (ffff8880a48d8de0): kobject_uevent_env FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 kobject: 'loop0' (ffff8880a48d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' ntfs: (device loop3): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. CPU: 0 PID: 11168 Comm: syz-executor.5 Not tainted 4.14.137 #33 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x138/0x19c lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10f/0x159 lib/fault-inject.c:149 should_failslab+0xdb/0x130 mm/failslab.c:32 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc_node mm/slab.c:3297 [inline] kmem_cache_alloc_node_trace+0x280/0x770 mm/slab.c:3659 __do_kmalloc_node mm/slab.c:3681 [inline] __kmalloc_node_track_caller+0x3d/0x80 mm/slab.c:3696 __kmalloc_reserve.isra.0+0x40/0xe0 net/core/skbuff.c:137 __alloc_skb+0xcf/0x500 net/core/skbuff.c:205 alloc_skb include/linux/skbuff.h:980 [inline] alloc_skb_with_frags+0x86/0x4b0 net/core/skbuff.c:5209 sock_alloc_send_pskb+0x5db/0x740 net/core/sock.c:2073 tun_alloc_skb drivers/net/tun.c:1184 [inline] tun_get_user+0x65d/0x39f0 drivers/net/tun.c:1470 tun_chr_write_iter+0xdd/0x190 drivers/net/tun.c:1594 call_write_iter include/linux/fs.h:1777 [inline] do_iter_readv_writev+0x418/0x670 fs/read_write.c:675 do_iter_write fs/read_write.c:954 [inline] do_iter_write+0x154/0x540 fs/read_write.c:935 vfs_writev+0x170/0x2a0 fs/read_write.c:999 do_writev+0x10a/0x2d0 fs/read_write.c:1034 SYSC_writev fs/read_write.c:1107 [inline] SyS_writev+0x28/0x30 fs/read_write.c:1104 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x4596e1 RSP: 002b:00007f9dda0acba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 RAX: ffffffffffffffda RBX: 0000000000300b00 RCX: 00000000004596e1 RDX: 0000000000000001 RSI: 00007f9dda0acc00 RDI: 00000000000000f0 RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000064 R11: 0000000000000293 R12: 00007f9dda0ad6d4 R13: 00000000004c8775 R14: 00000000004df4e8 R15: 0000000000000003 CPU: 1 PID: 11176 Comm: syz-executor.2 Not tainted 4.14.137 #33 ntfs: (device loop3): parse_options(): Unrecognized mount option obj_role. Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x138/0x19c lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10f/0x159 lib/fault-inject.c:149 should_failslab+0xdb/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc_trace+0x2e9/0x790 mm/slab.c:3616 kobject: 'loop0' (ffff8880a48d8de0): kobject_uevent_env kmalloc include/linux/slab.h:488 [inline] kzalloc include/linux/slab.h:661 [inline] snd_pcm_attach_substream+0x376/0xaa0 sound/core/pcm.c:1005 snd_pcm_open_substream+0x71/0x290 sound/core/pcm_native.c:2391 kobject: 'loop0' (ffff8880a48d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' snd_pcm_oss_open_file sound/core/oss/pcm_oss.c:2424 [inline] snd_pcm_oss_open.part.0+0x611/0x1120 sound/core/oss/pcm_oss.c:2506 snd_pcm_oss_open+0x37/0x50 sound/core/oss/pcm_oss.c:2470 soundcore_open+0x3f3/0x5a0 sound/sound_core.c:639 chrdev_open+0x207/0x590 fs/char_dev.c:423 do_dentry_open+0x73b/0xeb0 fs/open.c:777 vfs_open+0x105/0x220 fs/open.c:891 do_last fs/namei.c:3425 [inline] path_openat+0x8bd/0x3f70 fs/namei.c:3566 do_filp_open+0x18e/0x250 fs/namei.c:3600 do_sys_open+0x2c5/0x430 fs/open.c:1084 SYSC_open fs/open.c:1102 [inline] SyS_open+0x2d/0x40 fs/open.c:1097 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x413711 RSP: 002b:00007fea18f947a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000413711 RDX: 0000000000000000 RSI: 0000000000044002 RDI: 00007fea18f94850 RBP: 000000000075bf20 R08: 000000000000000f R09: 0000000000000000 R10: 0000000000000064 R11: 0000000000000293 R12: 00007fea18f956d4 R13: 00000000004c8bb5 R14: 00000000004dfa40 R15: 0000000000000003 kobject: 'loop3' (ffff8880a4a1d7e0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a1d7e0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop5' (ffff8880a4a9c9a0): kobject_uevent_env kobject: 'loop5' (ffff8880a4a9c9a0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop3' (ffff8880a4a1d7e0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a1d7e0): fill_kobj_path: path = '/devices/virtual/block/loop3' FAULT_INJECTION: forcing a failure. name fail_page_alloc, interval 1, probability 0, space 0, times 0 FAULT_INJECTION: forcing a failure. name fail_page_alloc, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 11233 Comm: syz-executor.5 Not tainted 4.14.137 #33 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x138/0x19c lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10f/0x159 lib/fault-inject.c:149 should_fail_alloc_page mm/page_alloc.c:2891 [inline] prepare_alloc_pages mm/page_alloc.c:4124 [inline] __alloc_pages_nodemask+0x1d6/0x7a0 mm/page_alloc.c:4172 alloc_pages_current+0xec/0x1e0 mm/mempolicy.c:2113 alloc_pages include/linux/gfp.h:497 [inline] pte_alloc_one+0x1a/0x100 arch/x86/mm/pgtable.c:30 do_huge_pmd_anonymous_page+0x8e4/0x1470 mm/huge_memory.c:690 create_huge_pmd mm/memory.c:3881 [inline] __handle_mm_fault+0x22bf/0x3470 mm/memory.c:4084