RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc782c906d4 R13: 00000000004c89cd R14: 00000000004e5b98 R15: 000000000000000d 0*2048kB ====================================================== WARNING: possible circular locking dependency detected 4.14.158-syzkaller #0 Not tainted ------------------------------------------------------ syz-executor.1/29347 is trying to acquire lock: (console_owner){-.-.}, at: [] console_trylock_spinning kernel/printk/printk.c:1658 [inline] (console_owner){-.-.}, at: [] vprintk_emit kernel/printk/printk.c:1922 [inline] (console_owner){-.-.}, at: [] vprintk_emit+0x2f1/0x600 kernel/printk/printk.c:1888 but task is already holding lock: (&(&port->lock)->rlock){-.-.}, at: [] pty_write+0xe0/0x1d0 drivers/tty/pty.c:120 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #2 (&(&port->lock)->rlock){-.-.}: lock_acquire+0x16f/0x430 kernel/locking/lockdep.c:3994 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline] _raw_spin_lock_irqsave+0x95/0xcd kernel/locking/spinlock.c:160 tty_port_tty_get+0x22/0x90 drivers/tty/tty_port.c:287 tty_port_default_wakeup+0x16/0x40 drivers/tty/tty_port.c:46 tty_port_tty_wakeup+0x57/0x70 drivers/tty/tty_port.c:389 uart_write_wakeup+0x46/0x70 drivers/tty/serial/serial_core.c:116 serial8250_tx_chars+0x40d/0xa10 drivers/tty/serial/8250/8250_port.c:1810 serial8250_handle_irq.part.0+0x206/0x250 drivers/tty/serial/8250/8250_port.c:1883 serial8250_handle_irq drivers/tty/serial/8250/8250_port.c:1869 [inline] serial8250_default_handle_irq+0xa1/0x120 drivers/tty/serial/8250/8250_port.c:1899 serial8250_interrupt+0xe9/0x1a0 drivers/tty/serial/8250/8250_core.c:129 __handle_irq_event_percpu+0x125/0x7f0 kernel/irq/handle.c:147 handle_irq_event_percpu+0x65/0x130 kernel/irq/handle.c:187 handle_irq_event+0xa7/0x134 kernel/irq/handle.c:204 handle_edge_irq+0x22b/0x840 kernel/irq/chip.c:770 generic_handle_irq_desc include/linux/irqdesc.h:159 [inline] handle_irq+0x39/0x50 arch/x86/kernel/irq_64.c:87 do_IRQ+0x99/0x1d0 arch/x86/kernel/irq.c:230 ret_from_intr+0x0/0x1e arch_local_irq_restore arch/x86/include/asm/paravirt.h:779 [inline] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] _raw_spin_unlock_irqrestore+0x95/0xe0 kernel/locking/spinlock.c:192 spin_unlock_irqrestore include/linux/spinlock.h:372 [inline] uart_write+0x29a/0x4f0 drivers/tty/serial/serial_core.c:625 process_output_block drivers/tty/n_tty.c:595 [inline] n_tty_write+0x38b/0xee0 drivers/tty/n_tty.c:2333 do_tty_write drivers/tty/tty_io.c:959 [inline] tty_write+0x3f6/0x700 drivers/tty/tty_io.c:1043 redirected_tty_write+0xa3/0xb0 drivers/tty/tty_io.c:1064 __vfs_write+0x105/0x6b0 fs/read_write.c:480 vfs_write+0x198/0x500 fs/read_write.c:544 SYSC_write fs/read_write.c:590 [inline] SyS_write+0xfd/0x230 fs/read_write.c:582 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 -> #1 (&port_lock_key){-.-.}: lock_acquire+0x16f/0x430 kernel/locking/lockdep.c:3994 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline] _raw_spin_lock_irqsave+0x95/0xcd kernel/locking/spinlock.c:160 serial8250_console_write+0x709/0x930 drivers/tty/serial/8250/8250_port.c:3232 univ8250_console_write+0x5f/0x70 drivers/tty/serial/8250/8250_core.c:597 call_console_drivers kernel/printk/printk.c:1725 [inline] console_unlock+0x9ba/0xed0 kernel/printk/printk.c:2397 vprintk_emit kernel/printk/printk.c:1923 [inline] vprintk_emit+0x1f9/0x600 kernel/printk/printk.c:1888 vprintk_default+0x28/0x30 kernel/printk/printk.c:1963 vprintk_func+0x5d/0x159 kernel/printk/printk_safe.c:401 printk+0x9e/0xbc kernel/printk/printk.c:1996 register_console+0x614/0x9e0 kernel/printk/printk.c:2716 univ8250_console_init+0x33/0x3f drivers/tty/serial/8250/8250_core.c:692 console_init+0x4d/0x5d kernel/printk/printk.c:2797 start_kernel+0x43c/0x6fd init/main.c:634 x86_64_start_reservations+0x29/0x2b arch/x86/kernel/head64.c:399 x86_64_start_kernel+0x77/0x7b arch/x86/kernel/head64.c:380 secondary_startup_64+0xa5/0xb0 arch/x86/kernel/head_64.S:240 -> #0 (console_owner){-.-.}: check_prev_add kernel/locking/lockdep.c:1901 [inline] check_prevs_add kernel/locking/lockdep.c:2018 [inline] validate_chain kernel/locking/lockdep.c:2460 [inline] __lock_acquire+0x2cb3/0x4620 kernel/locking/lockdep.c:3487 lock_acquire+0x16f/0x430 kernel/locking/lockdep.c:3994 console_trylock_spinning kernel/printk/printk.c:1679 [inline] vprintk_emit kernel/printk/printk.c:1922 [inline] vprintk_emit+0x32e/0x600 kernel/printk/printk.c:1888 vprintk_default+0x28/0x30 kernel/printk/printk.c:1963 vprintk_func+0x5d/0x159 kernel/printk/printk_safe.c:401 printk+0x9e/0xbc kernel/printk/printk.c:1996 fail_dump lib/fault-inject.c:44 [inline] should_fail.cold+0xe4/0x159 lib/fault-inject.c:149 should_failslab+0xdb/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] __do_kmalloc mm/slab.c:3718 [inline] __kmalloc+0x71/0x7a0 mm/slab.c:3729 kmalloc include/linux/slab.h:493 [inline] tty_buffer_alloc drivers/tty/tty_buffer.c:169 [inline] __tty_buffer_request_room+0x1a4/0x500 drivers/tty/tty_buffer.c:267 tty_insert_flip_string_fixed_flag+0x8a/0x1c0 drivers/tty/tty_buffer.c:312 tty_insert_flip_string include/linux/tty_flip.h:37 [inline] pty_write+0x113/0x1d0 drivers/tty/pty.c:122 n_tty_write+0x953/0xee0 drivers/tty/n_tty.c:2356 do_tty_write drivers/tty/tty_io.c:959 [inline] tty_write+0x3f6/0x700 drivers/tty/tty_io.c:1043 do_loop_readv_writev fs/read_write.c:698 [inline] do_loop_readv_writev fs/read_write.c:682 [inline] do_iter_write fs/read_write.c:956 [inline] do_iter_write+0x3d3/0x540 fs/read_write.c:935 vfs_writev+0x170/0x2a0 fs/read_write.c:999 do_writev+0x10a/0x2d0 fs/read_write.c:1034 SYSC_writev fs/read_write.c:1107 [inline] SyS_writev+0x28/0x30 fs/read_write.c:1104 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 other info that might help us debug this: Chain exists of: console_owner --> &port_lock_key --> &(&port->lock)->rlock Possible unsafe locking scenario: CPU0 CPU1 ---- ---- lock(&(&port->lock)->rlock); lock(&port_lock_key); lock(&(&port->lock)->rlock); lock(console_owner); *** DEADLOCK *** 5 locks held by syz-executor.1/29347: #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:376 #1: (&tty->atomic_write_lock){+.+.}, at: [] tty_write_lock+0x20/0x60 drivers/tty/tty_io.c:885 #2: (&tty->termios_rwsem){++++}, at: [] n_tty_write+0x179/0xee0 drivers/tty/n_tty.c:2316 #3: (&ldata->output_lock){+.+.}, at: [] n_tty_write+0x914/0xee0 drivers/tty/n_tty.c:2355 #4: (&(&port->lock)->rlock){-.-.}, at: [] pty_write+0xe0/0x1d0 drivers/tty/pty.c:120 stack backtrace: CPU: 0 PID: 29347 Comm: syz-executor.1 Not tainted 4.14.158-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x142/0x197 lib/dump_stack.c:58 print_circular_bug.isra.0.cold+0x1cc/0x28f kernel/locking/lockdep.c:1258 check_prev_add kernel/locking/lockdep.c:1901 [inline] check_prevs_add kernel/locking/lockdep.c:2018 [inline] validate_chain kernel/locking/lockdep.c:2460 [inline] __lock_acquire+0x2cb3/0x4620 kernel/locking/lockdep.c:3487 lock_acquire+0x16f/0x430 kernel/locking/lockdep.c:3994 console_trylock_spinning kernel/printk/printk.c:1679 [inline] vprintk_emit kernel/printk/printk.c:1922 [inline] vprintk_emit+0x32e/0x600 kernel/printk/printk.c:1888 vprintk_default+0x28/0x30 kernel/printk/printk.c:1963 vprintk_func+0x5d/0x159 kernel/printk/printk_safe.c:401 printk+0x9e/0xbc kernel/printk/printk.c:1996 fail_dump lib/fault-inject.c:44 [inline] should_fail.cold+0xe4/0x159 lib/fault-inject.c:149 should_failslab+0xdb/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] __do_kmalloc mm/slab.c:3718 [inline] __kmalloc+0x71/0x7a0 mm/slab.c:3729 kmalloc include/linux/slab.h:493 [inline] tty_buffer_alloc drivers/tty/tty_buffer.c:169 [inline] __tty_buffer_request_room+0x1a4/0x500 drivers/tty/tty_buffer.c:267 tty_insert_flip_string_fixed_flag+0x8a/0x1c0 drivers/tty/tty_buffer.c:312 tty_insert_flip_string include/linux/tty_flip.h:37 [inline] pty_write+0x113/0x1d0 drivers/tty/pty.c:122 n_tty_write+0x953/0xee0 drivers/tty/n_tty.c:2356 do_tty_write drivers/tty/tty_io.c:959 [inline] tty_write+0x3f6/0x700 drivers/tty/tty_io.c:1043 do_loop_readv_writev fs/read_write.c:698 [inline] do_loop_readv_writev fs/read_write.c:682 [inline] do_iter_write fs/read_write.c:956 [inline] do_iter_write+0x3d3/0x540 fs/read_write.c:935 vfs_writev+0x170/0x2a0 fs/read_write.c:999 do_writev+0x10a/0x2d0 fs/read_write.c:1034 SYSC_writev fs/read_write.c:1107 [inline] SyS_writev+0x28/0x30 fs/read_write.c:1104 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x45a679 RSP: 002b:00007fc782c8fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 RAX: ffffffffffffffda RBX: 00007fc782c8fc90 RCX: 000000000045a679 RDX: 1000000000000252 RSI: 00000000200023c0 RDI: 000000000000000c RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc782c906d4 R13: 00000000004c89cd R14: 00000000004e5b98 R15: 000000000000000d 0*4096kB = 0kB Node 1 Normal: 52*4kB (UE) 365*8kB (UME) 290*16kB (UE) 58*32kB (UME) 19*64kB (UME) 9*128kB (U) 5*256kB (UM) 1*512kB (U) 2*1024kB (UM) 5*2048kB (UME) 917*4096kB (M) = 3782104kB kobject: 'loop1' (ffff8880a4040be0): kobject_uevent_env Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB kobject: 'loop1' (ffff8880a4040be0): fill_kobj_path: path = '/devices/virtual/block/loop1' Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB 28424 total pagecache pages 0 pages in swap cache Swap cache stats: add 0, delete 0, find 0/0 Free swap = 0kB Total swap = 0kB 1965979 pages RAM 0 pages HighMem/MovableOnly 335856 pages reserved 0 pages cma reserved syz-executor.5: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) syz-executor.5 cpuset=syz5 mems_allowed=0-1 kobject: 'loop2' (ffff8880a407d4e0): kobject_uevent_env CPU: 1 PID: 29342 Comm: syz-executor.5 Not tainted 4.14.158-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 kobject: 'loop2' (ffff8880a407d4e0): fill_kobj_path: path = '/devices/virtual/block/loop2' Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x142/0x197 lib/dump_stack.c:58 warn_alloc.cold+0x96/0x1af mm/page_alloc.c:3248 __vmalloc_node_range mm/vmalloc.c:1786 [inline] __vmalloc_node_range+0x3c3/0x6a0 mm/vmalloc.c:1746 kobject: 'loop0' (ffff888060996320): kobject_uevent_env __vmalloc_node mm/vmalloc.c:1815 [inline] __vmalloc_node_flags mm/vmalloc.c:1829 [inline] vmalloc+0x46/0x50 mm/vmalloc.c:1851 sel_write_load+0x1a0/0x1050 security/selinux/selinuxfs.c:495 kobject: 'loop0' (ffff888060996320): fill_kobj_path: path = '/devices/virtual/block/loop0' __vfs_write+0x105/0x6b0 fs/read_write.c:480 kobject: 'loop2' (ffff8880a407d4e0): kobject_uevent_env kobject: 'loop2' (ffff8880a407d4e0): fill_kobj_path: path = '/devices/virtual/block/loop2' vfs_write+0x198/0x500 fs/read_write.c:544 SYSC_write fs/read_write.c:590 [inline] SyS_write+0xfd/0x230 fs/read_write.c:582 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 kobject: 'loop2' (ffff8880a407d4e0): kobject_uevent_env RIP: 0033:0x45a679 RSP: 002b:00007f9c27545c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a679 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 kobject: 'loop2' (ffff8880a407d4e0): fill_kobj_path: path = '/devices/virtual/block/loop2' R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9c275466d4 R13: 00000000004cbc09 R14: 00000000004e58e0 R15: 00000000ffffffff Mem-Info: kobject: 'loop0' (ffff888060996320): kobject_uevent_env active_anon:242651 inactive_anon:189 isolated_anon:0 active_file:8706 inactive_file:19502 isolated_file:0 unevictable:0 dirty:429 writeback:0 unstable:0 slab_reclaimable:14289 slab_unreclaimable:112706 mapped:59574 shmem:242 pagetables:3312 bounce:0 free:1132416 free_pcp:233 free_cma:0 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 Node 0 active_anon:970604kB inactive_anon:756kB active_file:34684kB inactive_file:78008kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:238296kB dirty:1716kB writeback:0kB shmem:968kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 397312kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no CPU: 0 PID: 29377 Comm: syz-executor.4 Not tainted 4.14.158-syzkaller #0 Node 1 active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x142/0x197 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10f/0x159 lib/fault-inject.c:149 should_failslab+0xdb/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc_node mm/slab.c:3297 [inline] kmem_cache_alloc_node_trace+0x280/0x770 mm/slab.c:3659 __do_kmalloc_node mm/slab.c:3681 [inline] __kmalloc_node_track_caller+0x3d/0x80 mm/slab.c:3696 __kmalloc_reserve.isra.0+0x40/0xe0 net/core/skbuff.c:137 __alloc_skb+0xcf/0x500 net/core/skbuff.c:205 alloc_skb include/linux/skbuff.h:980 [inline] netlink_alloc_large_skb net/netlink/af_netlink.c:1158 [inline] netlink_sendmsg+0x874/0xc60 net/netlink/af_netlink.c:1852 sock_sendmsg_nosec net/socket.c:646 [inline] sock_sendmsg+0xce/0x110 net/socket.c:656 ___sys_sendmsg+0x70a/0x840 net/socket.c:2062 Node 0 __sys_sendmsg+0xb9/0x140 net/socket.c:2096 SYSC_sendmsg net/socket.c:2107 [inline] SyS_sendmsg+0x2d/0x50 net/socket.c:2103 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 DMA free:15908kB min:216kB low:268kB high:320kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x45a679 RSP: 002b:00007f21600d2c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 00007f21600d2c90 RCX: 000000000045a679 RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f21600d36d4 R13: 00000000004c9704 R14: 00000000004e1440 R15: 0000000000000004 kobject: 'loop0' (ffff888060996320): fill_kobj_path: path = '/devices/virtual/block/loop0' lowmem_reserve[]: kobject: 'loop3' (ffff8880a40b7560): kobject_uevent_env 0 kobject: 'loop3' (ffff8880a40b7560): fill_kobj_path: path = '/devices/virtual/block/loop3' 2569 kobject: 'loop4' (ffff8880a410f5e0): kobject_uevent_env 2569 kobject: 'loop4' (ffff8880a410f5e0): fill_kobj_path: path = '/devices/virtual/block/loop4' 2569 2569 Node 0 DMA32 free:739084kB min:36380kB low:45472kB high:54564kB active_anon:964252kB inactive_anon:756kB active_file:34684kB inactive_file:77948kB unevictable:0kB writepending:1656kB present:3129332kB managed:2634392kB mlocked:0kB kernel_stack:9856kB pagetables:12980kB bounce:0kB free_pcp:1196kB local_pcp:616kB free_cma:0kB lowmem_reserve[]: 0 0 0 0 0 Node 0 Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB lowmem_reserve[]: 0 0 0 0 0 Node 1 Normal free:3782104kB min:53508kB low:66884kB high:80260kB active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB writepending:0kB present:3932160kB managed:3870192kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB lowmem_reserve[]: 0 0 0 0 0 Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB Node 0 DMA32: 557*4kB (UME) 346*8kB (UME) 486*16kB (UME) 1093*32kB (UME) 528*64kB (UME) 53*128kB (UME) 5*256kB (UME) 3*512kB (UE) 1*1024kB (E) 76*2048kB (UM) 120*4096kB (M) = 739332kB Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB Node 1 Normal: 52*4kB (UE) 365*8kB (UME) 290*16kB (UE) 58*32kB (UME) 19*64kB (UME) 9*128kB (U) 5*256kB (UM) 1*512kB (U) 2*1024kB (UM) 5*2048kB (UME) 917*4096kB (M) = 3782104kB Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB 28435 total pagecache pages 0 pages in swap cache Swap cache stats: add 0, delete 0, find 0/0 Free swap = 0kB Total swap = 0kB 1965979 pages RAM 0 pages HighMem/MovableOnly 335856 pages reserved 0 pages cma reserved syz-executor.5: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) syz-executor.5 cpuset=syz5 mems_allowed=0-1 CPU: 0 PID: 29352 Comm: syz-executor.5 Not tainted 4.14.158-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x142/0x197 lib/dump_stack.c:58 warn_alloc.cold+0x96/0x1af mm/page_alloc.c:3248 __vmalloc_node_range mm/vmalloc.c:1786 [inline] __vmalloc_node_range+0x3c3/0x6a0 mm/vmalloc.c:1746 __vmalloc_node mm/vmalloc.c:1815 [inline] __vmalloc_node_flags mm/vmalloc.c:1829 [inline] vmalloc+0x46/0x50 mm/vmalloc.c:1851 sel_write_load+0x1a0/0x1050 security/selinux/selinuxfs.c:495 __vfs_write+0x105/0x6b0 fs/read_write.c:480 vfs_write+0x198/0x500 fs/read_write.c:544 SYSC_write fs/read_write.c:590 [inline] SyS_write+0xfd/0x230 fs/read_write.c:582 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x45a679 RSP: 002b:00007f9c27524c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a679 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9c275256d4 R13: 00000000004cbc09 R14: 00000000004e58e0 R15: 00000000ffffffff kobject: 'loop5' (ffff8880a4162520): kobject_uevent_env syz-executor.5: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) kobject: 'loop5' (ffff8880a4162520): fill_kobj_path: path = '/devices/virtual/block/loop5' FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 syz-executor.5 cpuset=syz5 mems_allowed=0-1 kobject: 'loop1' (ffff8880a4040be0): kobject_uevent_env CPU: 1 PID: 29387 Comm: syz-executor.5 Not tainted 4.14.158-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 kobject: 'loop1' (ffff8880a4040be0): fill_kobj_path: path = '/devices/virtual/block/loop1' Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x142/0x197 lib/dump_stack.c:58 warn_alloc.cold+0x96/0x1af mm/page_alloc.c:3248 kobject: 'loop3' (ffff8880a40b7560): kobject_uevent_env __vmalloc_node_range mm/vmalloc.c:1786 [inline] __vmalloc_node_range+0x3c3/0x6a0 mm/vmalloc.c:1746 kobject: 'loop3' (ffff8880a40b7560): fill_kobj_path: path = '/devices/virtual/block/loop3' __vmalloc_node mm/vmalloc.c:1815 [inline] __vmalloc_node_flags mm/vmalloc.c:1829 [inline] vmalloc+0x46/0x50 mm/vmalloc.c:1851 sel_write_load+0x1a0/0x1050 security/selinux/selinuxfs.c:495 kobject: 'loop3' (ffff8880a40b7560): kobject_uevent_env __vfs_write+0x105/0x6b0 fs/read_write.c:480 kobject: 'loop3' (ffff8880a40b7560): fill_kobj_path: path = '/devices/virtual/block/loop3' vfs_write+0x198/0x500 fs/read_write.c:544 kobject: 'loop0' (ffff888060996320): kobject_uevent_env SYSC_write fs/read_write.c:590 [inline] SyS_write+0xfd/0x230 fs/read_write.c:582 kobject: 'loop0' (ffff888060996320): fill_kobj_path: path = '/devices/virtual/block/loop0' do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x45a679 RSP: 002b:00007f9c27566c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a679 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9c275676d4 R13: 00000000004cbc09 R14: 00000000004e58e0 R15: 00000000ffffffff CPU: 0 PID: 29393 Comm: syz-executor.4 Not tainted 4.14.158-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 warn_alloc_show_mem: 1 callbacks suppressed Mem-Info: Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x142/0x197 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10f/0x159 lib/fault-inject.c:149 should_failslab+0xdb/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc+0x47/0x780 mm/slab.c:3550 skb_clone+0x129/0x320 net/core/skbuff.c:1282 __netlink_deliver_tap_skb net/netlink/af_netlink.c:266 [inline] __netlink_deliver_tap net/netlink/af_netlink.c:291 [inline] netlink_deliver_tap+0x681/0x8f0 net/netlink/af_netlink.c:302 netlink_deliver_tap_kernel net/netlink/af_netlink.c:311 [inline] netlink_unicast_kernel net/netlink/af_netlink.c:1285 [inline] netlink_unicast+0x49d/0x650 net/netlink/af_netlink.c:1312 active_anon:242148 inactive_anon:189 isolated_anon:0 active_file:8706 inactive_file:19487 isolated_file:0 unevictable:0 dirty:416 writeback:0 unstable:0 slab_reclaimable:14295 slab_unreclaimable:112934 mapped:59592 shmem:242 pagetables:3319 bounce:0 free:1132576 free_pcp:208 free_cma:0 netlink_sendmsg+0x7c4/0xc60 net/netlink/af_netlink.c:1877 Node 0 active_anon:968592kB inactive_anon:756kB active_file:34684kB inactive_file:77948kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:238368kB dirty:1664kB writeback:0kB shmem:968kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 393216kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no sock_sendmsg_nosec net/socket.c:646 [inline] sock_sendmsg+0xce/0x110 net/socket.c:656 ___sys_sendmsg+0x70a/0x840 net/socket.c:2062 Node 1 active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no Node 0 DMA free:15908kB min:216kB low:268kB high:320kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB __sys_sendmsg+0xb9/0x140 net/socket.c:2096 SYSC_sendmsg net/socket.c:2107 [inline] SyS_sendmsg+0x2d/0x50 net/socket.c:2103 lowmem_reserve[]: do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x45a679 RSP: 002b:00007f21600d2c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 00007f21600d2c90 RCX: 000000000045a679 RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f21600d36d4 R13: 00000000004c9704 R14: 00000000004e1440 R15: 0000000000000004 kobject: 'loop0' (ffff888060996320): kobject_uevent_env 0 netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. kobject: 'loop0' (ffff888060996320): fill_kobj_path: path = '/devices/virtual/block/loop0' 2569 kobject: 'loop3' (ffff8880a40b7560): kobject_uevent_env 2569 kobject: 'loop3' (ffff8880a40b7560): fill_kobj_path: path = '/devices/virtual/block/loop3' 2569 kobject: 'loop4' (ffff8880a410f5e0): kobject_uevent_env 2569 kobject: 'loop4' (ffff8880a410f5e0): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop2' (ffff8880a407d4e0): kobject_uevent_env Node 0 kobject: 'loop2' (ffff8880a407d4e0): fill_kobj_path: path = '/devices/virtual/block/loop2' DMA32 free:739168kB min:36380kB low:45472kB high:54564kB active_anon:964308kB inactive_anon:756kB active_file:34684kB inactive_file:77948kB unevictable:0kB writepending:1664kB present:3129332kB managed:2634392kB mlocked:0kB kernel_stack:9920kB pagetables:13128kB bounce:0kB free_pcp:1384kB local_pcp:736kB free_cma:0kB kobject: 'loop3' (ffff8880a40b7560): kobject_uevent_env lowmem_reserve[]: kobject: 'loop3' (ffff8880a40b7560): fill_kobj_path: path = '/devices/virtual/block/loop3' 0 0 0 0 0 Node 0 Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB lowmem_reserve[]: 0 0 0 0 0 Node 1 Normal free:3782104kB min:53508kB low:66884kB high:80260kB active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB writepending:0kB present:3932160kB managed:3870192kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB lowmem_reserve[]: 0 0 0 0 0 Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB kobject: 'loop1' (ffff8880a4040be0): kobject_uevent_env Node 0 DMA32: 598*4kB (UME) 348*8kB (UME) 470*16kB (UME) 1100*32kB (UME) 528*64kB (UME) 53*128kB (UME) 5*256kB (UME) 3*512kB (UE) 1*1024kB (E) 77*2048kB (UM) 120*4096kB (M) = 741528kB kobject: 'loop1' (ffff8880a4040be0): fill_kobj_path: path = '/devices/virtual/block/loop1' Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB Node 1 Normal: 52*4kB (UE) 365*8kB (UME) 290*16kB (UE) 58*32kB (UME) 19*64kB (UME) 9*128kB (U) 5*256kB (UM) 1*512kB (U) 2*1024kB (UM) 5*2048kB (UME) 917*4096kB (M) = 3782104kB Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB 28428 total pagecache pages 0 pages in swap cache Swap cache stats: add 0, delete 0, find 0/0 Free swap = 0kB Total swap = 0kB 1965979 pages RAM 0 pages HighMem/MovableOnly 335856 pages reserved 0 pages cma reserved syz-executor.5: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) syz-executor.5 cpuset=syz5 mems_allowed=0-1 CPU: 0 PID: 29399 Comm: syz-executor.5 Not tainted 4.14.158-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x142/0x197 lib/dump_stack.c:58 warn_alloc.cold+0x96/0x1af mm/page_alloc.c:3248 __vmalloc_node_range mm/vmalloc.c:1786 [inline] __vmalloc_node_range+0x3c3/0x6a0 mm/vmalloc.c:1746 __vmalloc_node mm/vmalloc.c:1815 [inline] __vmalloc_node_flags mm/vmalloc.c:1829 [inline] vmalloc+0x46/0x50 mm/vmalloc.c:1851 sel_write_load+0x1a0/0x1050 security/selinux/selinuxfs.c:495 __vfs_write+0x105/0x6b0 fs/read_write.c:480 vfs_write+0x198/0x500 fs/read_write.c:544 SYSC_write fs/read_write.c:590 [inline] SyS_write+0xfd/0x230 fs/read_write.c:582 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x45a679 RSP: 002b:00007f9c27545c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a679 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9c275466d4 R13: 00000000004cbc09 R14: 00000000004e58e0 R15: 00000000ffffffff kobject: 'loop5' (ffff8880a4162520): kobject_uevent_env kobject: 'loop5' (ffff8880a4162520): fill_kobj_path: path = '/devices/virtual/block/loop5' syz-executor.2: netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 syz-executor.2 cpuset= CPU: 1 PID: 29449 Comm: syz-executor.4 Not tainted 4.14.158-syzkaller #0 kobject: 'loop0' (ffff888060996320): kobject_uevent_env Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x142/0x197 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10f/0x159 lib/fault-inject.c:149 should_failslab+0xdb/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc_node mm/slab.c:3297 [inline] kmem_cache_alloc_node+0x287/0x780 mm/slab.c:3640 __alloc_skb+0x9c/0x500 net/core/skbuff.c:193 alloc_skb include/linux/skbuff.h:980 [inline] nlmsg_new include/net/netlink.h:511 [inline] netlink_ack+0x21c/0x9a0 net/netlink/af_netlink.c:2359 syz2 kobject: 'loop0' (ffff888060996320): fill_kobj_path: path = '/devices/virtual/block/loop0' netlink_rcv_skb+0x2fc/0x3c0 net/netlink/af_netlink.c:2438 mems_allowed=0-1 rtnetlink_rcv+0x1d/0x30 net/core/rtnetlink.c:4318 netlink_unicast_kernel net/netlink/af_netlink.c:1286 [inline] netlink_unicast+0x44d/0x650 net/netlink/af_netlink.c:1312 netlink_sendmsg+0x7c4/0xc60 net/netlink/af_netlink.c:1877 sock_sendmsg_nosec net/socket.c:646 [inline] sock_sendmsg+0xce/0x110 net/socket.c:656 ___sys_sendmsg+0x70a/0x840 net/socket.c:2062 __sys_sendmsg+0xb9/0x140 net/socket.c:2096 SYSC_sendmsg net/socket.c:2107 [inline] SyS_sendmsg+0x2d/0x50 net/socket.c:2103 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x45a679 RSP: 002b:00007f21600d2c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 00007f21600d2c90 RCX: 000000000045a679 RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f21600d36d4 R13: 00000000004c9704 R14: 00000000004e1440 R15: 0000000000000004 CPU: 0 PID: 29446 Comm: syz-executor.2 Not tainted 4.14.158-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x142/0x197 lib/dump_stack.c:58 warn_alloc.cold+0x96/0x1af mm/page_alloc.c:3248 __vmalloc_node_range mm/vmalloc.c:1786 [inline] __vmalloc_node_range+0x3c3/0x6a0 mm/vmalloc.c:1746 __vmalloc_node mm/vmalloc.c:1815 [inline] __vmalloc_node_flags mm/vmalloc.c:1829 [inline] vmalloc+0x46/0x50 mm/vmalloc.c:1851 sel_write_load+0x1a0/0x1050 security/selinux/selinuxfs.c:495 __vfs_write+0x105/0x6b0 fs/read_write.c:480 kobject: 'loop3' (ffff8880a40b7560): kobject_uevent_env kobject: 'loop3' (ffff8880a40b7560): fill_kobj_path: path = '/devices/virtual/block/loop3' vfs_write+0x198/0x500 fs/read_write.c:544 SYSC_write fs/read_write.c:590 [inline] SyS_write+0xfd/0x230 fs/read_write.c:582 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x45a679 RSP: 002b:00007fce74c32c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a679 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007fce74c336d4 kobject: 'loop3' (ffff8880a40b7560): kobject_uevent_env R13: 00000000004cbc09 R14: 00000000004e58e0 R15: 00000000ffffffff kobject: 'loop3' (ffff8880a40b7560): fill_kobj_path: path = '/devices/virtual/block/loop3' warn_alloc_show_mem: 1 callbacks suppressed Mem-Info: kobject: 'loop0' (ffff888060996320): kobject_uevent_env active_anon:242666 inactive_anon:191 isolated_anon:0 active_file:8706 inactive_file:19489 isolated_file:0 unevictable:0 dirty:421 writeback:0 unstable:0 slab_reclaimable:14317 slab_unreclaimable:112796 mapped:59577 shmem:242 pagetables:3361 bounce:0 free:1132421 free_pcp:281 free_cma:0 kobject: 'loop0' (ffff888060996320): fill_kobj_path: path = '/devices/virtual/block/loop0' Node 0 active_anon:968680kB inactive_anon:764kB active_file:34684kB inactive_file:77956kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:238308kB dirty:1684kB writeback:0kB shmem:968kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 393216kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. Node 1 active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no kobject: 'loop4' (ffff8880a410f5e0): kobject_uevent_env FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 Node 0 DMA free:15908kB min:216kB low:268kB high:320kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB CPU: 1 PID: 29474 Comm: syz-executor.4 Not tainted 4.14.158-syzkaller #0 lowmem_reserve[]: Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x142/0x197 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10f/0x159 lib/fault-inject.c:149 should_failslab+0xdb/0x130 mm/failslab.c:32 0 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc_node mm/slab.c:3297 [inline] kmem_cache_alloc_node_trace+0x280/0x770 mm/slab.c:3659 __do_kmalloc_node mm/slab.c:3681 [inline] __kmalloc_node_track_caller+0x3d/0x80 mm/slab.c:3696 __kmalloc_reserve.isra.0+0x40/0xe0 net/core/skbuff.c:137 __alloc_skb+0xcf/0x500 net/core/skbuff.c:205 2569 alloc_skb include/linux/skbuff.h:980 [inline] nlmsg_new include/net/netlink.h:511 [inline] netlink_ack+0x21c/0x9a0 net/netlink/af_netlink.c:2359 2569 netlink_rcv_skb+0x2fc/0x3c0 net/netlink/af_netlink.c:2438 2569 rtnetlink_rcv+0x1d/0x30 net/core/rtnetlink.c:4318 netlink_unicast_kernel net/netlink/af_netlink.c:1286 [inline] netlink_unicast+0x44d/0x650 net/netlink/af_netlink.c:1312 2569 netlink_sendmsg+0x7c4/0xc60 net/netlink/af_netlink.c:1877 sock_sendmsg_nosec net/socket.c:646 [inline] sock_sendmsg+0xce/0x110 net/socket.c:656 Node 0 ___sys_sendmsg+0x70a/0x840 net/socket.c:2062 DMA32 free:727164kB min:36380kB low:45472kB high:54564kB active_anon:974824kB inactive_anon:764kB active_file:34684kB inactive_file:77956kB unevictable:0kB writepending:1684kB present:3129332kB managed:2634392kB mlocked:0kB kernel_stack:10336kB pagetables:13444kB bounce:0kB free_pcp:1476kB local_pcp:768kB free_cma:0kB lowmem_reserve[]: __sys_sendmsg+0xb9/0x140 net/socket.c:2096 0 SYSC_sendmsg net/socket.c:2107 [inline] SyS_sendmsg+0x2d/0x50 net/socket.c:2103 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 0 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x45a679 RSP: 002b:00007f21600d2c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 0 RAX: ffffffffffffffda RBX: 00007f21600d2c90 RCX: 000000000045a679 RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f21600d36d4 R13: 00000000004c9704 R14: 00000000004e1440 R15: 0000000000000004 kobject: 'loop4' (ffff8880a410f5e0): fill_kobj_path: path = '/devices/virtual/block/loop4' 0 kobject: 'loop3' (ffff8880a40b7560): kobject_uevent_env 0 kobject: 'loop3' (ffff8880a40b7560): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop0' (ffff888060996320): kobject_uevent_env Node 0 kobject: 'loop0' (ffff888060996320): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop4' (ffff8880a410f5e0): kobject_uevent_env Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB kobject: 'loop4' (ffff8880a410f5e0): fill_kobj_path: path = '/devices/virtual/block/loop4' lowmem_reserve[]: kobject: 'loop1' (ffff8880a4040be0): kobject_uevent_env 0 kobject: 'loop1' (ffff8880a4040be0): fill_kobj_path: path = '/devices/virtual/block/loop1' 0 0 0 0 Node 1 Normal free:3782104kB min:53508kB low:66884kB high:80260kB active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB writepending:0kB present:3932160kB managed:3870192kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB lowmem_reserve[]: 0 0 0 0 0 Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB Node 0 DMA32: 608*4kB (UME) 285*8kB (UME) 428*16kB (UME) 1094*32kB (UE) 528*64kB (UME) 53*128kB (UME) 5*256kB (UME) 3*512kB (UE) 1*1024kB (E) 74*2048kB (UM) 120*4096kB (M) = 734056kB Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB Node 1 Normal: 52*4kB (UE) 365*8kB (UME) 290*16kB (UE) 58*32kB (UME) 19*64kB (UME) 9*128kB (U) 5*256kB (UM) 1*512kB (U) 2*1024kB (UM) 5*2048kB (UME) 917*4096kB (M) = 3782104kB Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB 28445 total pagecache pages 0 pages in swap cache Swap cache stats: add 0, delete 0, find 0/0 Free swap = 0kB Total swap = 0kB 1965979 pages RAM 0 pages HighMem/MovableOnly 335856 pages reserved 0 pages cma reserved syz-executor.5: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) syz-executor.5 cpuset=syz5 mems_allowed=0-1 CPU: 0 PID: 29457 Comm: syz-executor.5 Not tainted 4.14.158-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x142/0x197 lib/dump_stack.c:58 warn_alloc.cold+0x96/0x1af mm/page_alloc.c:3248 __vmalloc_node_range mm/vmalloc.c:1786 [inline] __vmalloc_node_range+0x3c3/0x6a0 mm/vmalloc.c:1746 __vmalloc_node mm/vmalloc.c:1815 [inline] __vmalloc_node_flags mm/vmalloc.c:1829 [inline] vmalloc+0x46/0x50 mm/vmalloc.c:1851 sel_write_load+0x1a0/0x1050 security/selinux/selinuxfs.c:495 __vfs_write+0x105/0x6b0 fs/read_write.c:480 vfs_write+0x198/0x500 fs/read_write.c:544 SYSC_write fs/read_write.c:590 [inline] SyS_write+0xfd/0x230 fs/read_write.c:582 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x45a679 RSP: 002b:00007f9c27545c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a679 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9c275466d4 R13: 00000000004cbc09 R14: 00000000004e58e0 R15: 00000000ffffffff syz-executor.5: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) syz-executor.5 cpuset=syz5 mems_allowed=0-1 CPU: 0 PID: 29450 Comm: syz-executor.5 Not tainted 4.14.158-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x142/0x197 lib/dump_stack.c:58 warn_alloc.cold+0x96/0x1af mm/page_alloc.c:3248 __vmalloc_node_range mm/vmalloc.c:1786 [inline] __vmalloc_node_range+0x3c3/0x6a0 mm/vmalloc.c:1746 __vmalloc_node mm/vmalloc.c:1815 [inline] __vmalloc_node_flags mm/vmalloc.c:1829 [inline] vmalloc+0x46/0x50 mm/vmalloc.c:1851 sel_write_load+0x1a0/0x1050 security/selinux/selinuxfs.c:495 __vfs_write+0x105/0x6b0 fs/read_write.c:480 vfs_write+0x198/0x500 fs/read_write.c:544 SYSC_write fs/read_write.c:590 [inline] SyS_write+0xfd/0x230 fs/read_write.c:582 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x45a679 RSP: 002b:00007f9c27566c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a679 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9c275676d4 R13: 00000000004cbc09 R14: 00000000004e58e0 R15: 00000000ffffffff warn_alloc_show_mem: 1 callbacks suppressed Mem-Info: active_anon:242121 inactive_anon:189 isolated_anon:0 active_file:8706 inactive_file:19498 isolated_file:0 unevictable:0 dirty:435 writeback:0 unstable:0 slab_reclaimable:14327 slab_unreclaimable:112743 mapped:59570 shmem:242 pagetables:3286 bounce:0 free:1133224 free_pcp:317 free_cma:0 Node 0 active_anon:968504kB inactive_anon:756kB active_file:34684kB inactive_file:77992kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:238280kB dirty:1740kB writeback:0kB shmem:968kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 397312kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no Node 1 active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no Node 0 DMA free:15908kB min:216kB low:268kB high:320kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB lowmem_reserve[]: 0 2569 2569 2569 2569 Node 0 DMA32 free:734924kB min:36380kB low:45472kB high:54564kB active_anon:968504kB inactive_anon:756kB active_file:34684kB inactive_file:77992kB unevictable:0kB writepending:1760kB present:3129332kB managed:2634392kB mlocked:0kB kernel_stack:9760kB pagetables:13092kB bounce:0kB free_pcp:1256kB local_pcp:628kB free_cma:0kB lowmem_reserve[]: 0 0 0 0 0 Node 0 Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB lowmem_reserve[]: 0 0 0 0 0 Node 1 Normal free:3782104kB min:53508kB low:66884kB high:80260kB active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB writepending:0kB present:3932160kB managed:3870192kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB lowmem_reserve[]: 0 0 0 0 0 Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB Node 0 DMA32: 669*4kB (UME) 297*8kB (UME) 429*16kB (UME) 1100*32kB (UME) 529*64kB (UME) 53*128kB (UME) 4*256kB (UME) 4*512kB (UE) 1*1024kB (E) 74*2048kB (UM) 120*4096kB (M) = 734924kB Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB Node 1 Normal: 52*4kB (UE) 365*8kB (UME) 290*16kB (UE) 58*32kB (UME) 19*64kB (UME) 9*128kB (U) 5*256kB (UM) 1*512kB (U) 2*1024kB (UM) 5*2048kB (UME) 917*4096kB (M) = 3782104kB Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB 28454 total pagecache pages 0 pages in swap cache Swap cache stats: add 0, delete 0, find 0/0 Free swap = 0kB Total swap = 0kB 1965979 pages RAM 0 pages HighMem/MovableOnly 335856 pages reserved 0 pages cma reserved syz-executor.2: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) kobject: 'loop5' (ffff8880a4162520): kobject_uevent_env netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. syz-executor.2 cpuset= kobject: 'loop5' (ffff8880a4162520): fill_kobj_path: path = '/devices/virtual/block/loop5' FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 syz2 CPU: 0 PID: 29497 Comm: syz-executor.4 Not tainted 4.14.158-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 mems_allowed=0-1 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x142/0x197 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10f/0x159 lib/fault-inject.c:149 should_failslab+0xdb/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc+0x47/0x780 mm/slab.c:3550 skb_clone+0x129/0x320 net/core/skbuff.c:1282 __netlink_deliver_tap_skb net/netlink/af_netlink.c:266 [inline] __netlink_deliver_tap net/netlink/af_netlink.c:291 [inline] netlink_deliver_tap+0x681/0x8f0 net/netlink/af_netlink.c:302 __netlink_sendskb+0x49/0xa0 net/netlink/af_netlink.c:1230 netlink_sendskb net/netlink/af_netlink.c:1239 [inline] netlink_unicast+0x524/0x650 net/netlink/af_netlink.c:1327 netlink_ack+0x51d/0x9a0 net/netlink/af_netlink.c:2402 netlink_rcv_skb+0x2fc/0x3c0 net/netlink/af_netlink.c:2438 rtnetlink_rcv+0x1d/0x30 net/core/rtnetlink.c:4318 netlink_unicast_kernel net/netlink/af_netlink.c:1286 [inline] netlink_unicast+0x44d/0x650 net/netlink/af_netlink.c:1312 netlink_sendmsg+0x7c4/0xc60 net/netlink/af_netlink.c:1877 sock_sendmsg_nosec net/socket.c:646 [inline] sock_sendmsg+0xce/0x110 net/socket.c:656 ___sys_sendmsg+0x70a/0x840 net/socket.c:2062 __sys_sendmsg+0xb9/0x140 net/socket.c:2096 SYSC_sendmsg net/socket.c:2107 [inline] SyS_sendmsg+0x2d/0x50 net/socket.c:2103 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x45a679 RSP: 002b:00007f21600d2c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 00007f21600d2c90 RCX: 000000000045a679 RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f21600d36d4 R13: 00000000004c9704 R14: 00000000004e1440 R15: 0000000000000004 kobject: 'loop3' (ffff8880a40b7560): kobject_uevent_env CPU: 1 PID: 29482 Comm: syz-executor.2 Not tainted 4.14.158-syzkaller #0 kobject: 'loop3' (ffff8880a40b7560): fill_kobj_path: path = '/devices/virtual/block/loop3' Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x142/0x197 lib/dump_stack.c:58 warn_alloc.cold+0x96/0x1af mm/page_alloc.c:3248 kobject: 'loop4' (ffff8880a410f5e0): kobject_uevent_env kobject: 'loop4' (ffff8880a410f5e0): fill_kobj_path: path = '/devices/virtual/block/loop4' __vmalloc_node_range mm/vmalloc.c:1786 [inline] __vmalloc_node_range+0x3c3/0x6a0 mm/vmalloc.c:1746 __vmalloc_node mm/vmalloc.c:1815 [inline] __vmalloc_node_flags mm/vmalloc.c:1829 [inline] vmalloc+0x46/0x50 mm/vmalloc.c:1851 sel_write_load+0x1a0/0x1050 security/selinux/selinuxfs.c:495 __vfs_write+0x105/0x6b0 fs/read_write.c:480 vfs_write+0x198/0x500 fs/read_write.c:544 SYSC_write fs/read_write.c:590 [inline] SyS_write+0xfd/0x230 fs/read_write.c:582 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x45a679 RSP: 002b:00007fce74bcfc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a679 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 RBP: 000000000075c118 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007fce74bd06d4 R13: 00000000004cbc09 R14: 00000000004e58e0 R15: 00000000ffffffff SELinux: policydb magic number 0x464c457f does not match expected magic number 0xf97cff8c SELinux: failed to load policy syz-executor.5: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) kobject: 'loop2' (ffff8880a407d4e0): kobject_uevent_env syz-executor.5 cpuset=syz5 mems_allowed=0-1 kobject: 'loop2' (ffff8880a407d4e0): fill_kobj_path: path = '/devices/virtual/block/loop2' CPU: 0 PID: 29501 Comm: syz-executor.5 Not tainted 4.14.158-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x142/0x197 lib/dump_stack.c:58 warn_alloc.cold+0x96/0x1af mm/page_alloc.c:3248 __vmalloc_node_range mm/vmalloc.c:1786 [inline] __vmalloc_node_range+0x3c3/0x6a0 mm/vmalloc.c:1746 __vmalloc_node mm/vmalloc.c:1815 [inline] __vmalloc_node_flags mm/vmalloc.c:1829 [inline] vmalloc+0x46/0x50 mm/vmalloc.c:1851 kobject: 'loop0' (ffff888060996320): kobject_uevent_env sel_write_load+0x1a0/0x1050 security/selinux/selinuxfs.c:495 __vfs_write+0x105/0x6b0 fs/read_write.c:480 kobject: 'loop0' (ffff888060996320): fill_kobj_path: path = '/devices/virtual/block/loop0' vfs_write+0x198/0x500 fs/read_write.c:544 SYSC_write fs/read_write.c:590 [inline] SyS_write+0xfd/0x230 fs/read_write.c:582 netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x45a679 RSP: 002b:00007f9c27566c78 EFLAGS: 00000246 kobject: 'loop0' (ffff888060996320): kobject_uevent_env ORIG_RAX: 0000000000000001 kobject: 'loop0' (ffff888060996320): fill_kobj_path: path = '/devices/virtual/block/loop0' RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a679 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9c275676d4 R13: 00000000004cbc09 R14: 00000000004e58e0 R15: 00000000ffffffff warn_alloc_show_mem: 1 callbacks suppressed Mem-Info: kobject: 'loop4' (ffff8880a410f5e0): kobject_uevent_env active_anon:243710 inactive_anon:189 isolated_anon:0 active_file:8706 inactive_file:19539 isolated_file:0 unevictable:0 dirty:475 writeback:0 unstable:0 slab_reclaimable:14329 slab_unreclaimable:112402 mapped:59570 shmem:242 pagetables:3339 bounce:0 free:1131684 free_pcp:160 free_cma:0 netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. Node 0 active_anon:977008kB inactive_anon:756kB active_file:34684kB inactive_file:78156kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:238380kB dirty:1900kB writeback:0kB shmem:968kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 403456kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. Node 1 active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no kobject: 'loop4' (ffff8880a410f5e0): fill_kobj_path: path = '/devices/virtual/block/loop4' Node 0 kobject: 'loop3' (ffff8880a40b7560): kobject_uevent_env DMA free:15908kB min:216kB low:268kB high:320kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB kobject: 'loop3' (ffff8880a40b7560): fill_kobj_path: path = '/devices/virtual/block/loop3' lowmem_reserve[]: 0 2569 2569 2569 2569 Node 0 DMA32 free:728916kB min:36380kB low:45472kB high:54564kB active_anon:974884kB inactive_anon:752kB active_file:34684kB inactive_file:78216kB unevictable:0kB writepending:1960kB present:3129332kB managed:2634392kB mlocked:0kB kernel_stack:10016kB pagetables:13260kB bounce:0kB free_pcp:1060kB local_pcp:692kB free_cma:0kB lowmem_reserve[]: 0 0 0 0 0 Node 0 Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB lowmem_reserve[]: 0 0 0 0 0 Node 1 Normal free:3782104kB min:53508kB low:66884kB high:80260kB active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB writepending:0kB present:3932160kB managed:3870192kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB lowmem_reserve[]: 0 0 0 0 0 Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB Node 0 DMA32: 492*4kB (UM) 322*8kB (UME) 513*16kB (UME) 1095*32kB (UME) 524*64kB (UME) 53*128kB (UME) 4*256kB (UME) 4*512kB (UE) 1*1024kB (E) 71*2048kB (UM) 120*4096kB (M) = 729136kB Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB Node 1 Normal: 52*4kB (UE) 365*8kB (UME) 290*16kB (UE) 58*32kB (UME) 19*64kB (UME) 9*128kB (U) 5*256kB (UM) 1*512kB (U) 2*1024kB (UM) 5*2048kB (UME) 917*4096kB (M) = 3782104kB Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB 28503 total pagecache pages 0 pages in swap cache Swap cache stats: add 0, delete 0, find 0/0 Free swap = 0kB Total swap = 0kB 1965979 pages RAM 0 pages HighMem/MovableOnly 335856 pages reserved 0 pages cma reserved syz-executor.2: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) kobject: 'loop5' (ffff8880a4162520): kobject_uevent_env netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. syz-executor.2 cpuset=syz2 mems_allowed=0-1 netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. kobject: 'loop5' (ffff8880a4162520): fill_kobj_path: path = '/devices/virtual/block/loop5' CPU: 1 PID: 29515 Comm: syz-executor.2 Not tainted 4.14.158-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x142/0x197 lib/dump_stack.c:58 warn_alloc.cold+0x96/0x1af mm/page_alloc.c:3248 __vmalloc_node_range mm/vmalloc.c:1786 [inline] __vmalloc_node_range+0x3c3/0x6a0 mm/vmalloc.c:1746 __vmalloc_node mm/vmalloc.c:1815 [inline] __vmalloc_node_flags mm/vmalloc.c:1829 [inline] vmalloc+0x46/0x50 mm/vmalloc.c:1851 sel_write_load+0x1a0/0x1050 security/selinux/selinuxfs.c:495 kobject: 'loop4' (ffff8880a410f5e0): kobject_uevent_env __vfs_write+0x105/0x6b0 fs/read_write.c:480 kobject: 'loop4' (ffff8880a410f5e0): fill_kobj_path: path = '/devices/virtual/block/loop4' vfs_write+0x198/0x500 fs/read_write.c:544 SYSC_write fs/read_write.c:590 [inline] SyS_write+0xfd/0x230 fs/read_write.c:582 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 kobject: 'loop5' (ffff8880a4162520): kobject_uevent_env entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x45a679 kobject: 'loop5' (ffff8880a4162520): fill_kobj_path: path = '/devices/virtual/block/loop5' RSP: 002b:00007fce74c32c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a679 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007fce74c336d4 R13: 00000000004cbc09 R14: 00000000004e58e0 R15: 00000000ffffffff kobject: 'loop0' (ffff888060996320): kobject_uevent_env syz-executor.2: kobject: 'loop0' (ffff888060996320): fill_kobj_path: path = '/devices/virtual/block/loop0' vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) syz-executor.2 cpuset=syz2 mems_allowed=0-1 CPU: 0 PID: 29515 Comm: syz-executor.2 Not tainted 4.14.158-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x142/0x197 lib/dump_stack.c:58 warn_alloc.cold+0x96/0x1af mm/page_alloc.c:3248 __vmalloc_node_range mm/vmalloc.c:1786 [inline] __vmalloc_node_range+0x3c3/0x6a0 mm/vmalloc.c:1746 __vmalloc_node mm/vmalloc.c:1815 [inline] __vmalloc_node_flags mm/vmalloc.c:1829 [inline] vmalloc+0x46/0x50 mm/vmalloc.c:1851 sel_write_load+0x1a0/0x1050 security/selinux/selinuxfs.c:495 kobject: 'loop3' (ffff8880a40b7560): kobject_uevent_env kobject: 'loop3' (ffff8880a40b7560): fill_kobj_path: path = '/devices/virtual/block/loop3' __vfs_write+0x105/0x6b0 fs/read_write.c:480 vfs_write+0x198/0x500 fs/read_write.c:544 SYSC_write fs/read_write.c:590 [inline] SyS_write+0xfd/0x230 fs/read_write.c:582 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x45a679 RSP: 002b:00007fce74c32c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a679 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007fce74c336d4 R13: 00000000004cbc09 R14: 00000000004e58e0 R15: 00000000ffffffff warn_alloc_show_mem: 1 callbacks suppressed Mem-Info: kobject: 'loop1' (ffff8880a4040be0): kobject_uevent_env kobject: 'loop1' (ffff8880a4040be0): fill_kobj_path: path = '/devices/virtual/block/loop1' active_anon:241579 inactive_anon:189 isolated_anon:0 active_file:8706 inactive_file:19539 isolated_file:0 unevictable:0 dirty:477 writeback:0 unstable:0 slab_reclaimable:14338 slab_unreclaimable:112696 mapped:59566 shmem:242 pagetables:3247 bounce:0 free:1133746 free_pcp:329 free_cma:0 Node 0 active_anon:966316kB inactive_anon:756kB active_file:34684kB inactive_file:78112kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:238264kB dirty:1864kB writeback:0kB shmem:968kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 395264kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no Node 1 active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no Node 0 DMA free:15908kB min:216kB low:268kB high:320kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB lowmem_reserve[]: 0 2569 2569 2569 2569 Node 0 DMA32 free:737568kB min:36380kB low:45472kB high:54564kB active_anon:966316kB inactive_anon:756kB active_file:34684kB inactive_file:78112kB unevictable:0kB writepending:1864kB present:3129332kB managed:2634392kB mlocked:0kB kernel_stack:9696kB pagetables:12988kB bounce:0kB free_pcp:1356kB local_pcp:684kB free_cma:0kB lowmem_reserve[]: 0 0 0 0 0 Node 0 Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB lowmem_reserve[]: 0 0 0 0 0 Node 1 Normal free:3782104kB min:53508kB low:66884kB high:80260kB active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB writepending:0kB present:3932160kB managed:3870192kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB lowmem_reserve[]: 0 0 0 0 0 Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB Node 0 DMA32: 770*4kB (UME) 278*8kB (UME) 460*16kB (UME) 1106*32kB (UME) 524*64kB (UME) 53*128kB (UME) 4*256kB (UME) 4*512kB (UE) 1*1024kB (E) 75*2048kB (UM) 120*4096kB (M) = 737592kB Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB Node 1 Normal: 52*4kB (UE) 365*8kB (UME) 290*16kB (UE) 58*32kB (UME) 19*64kB (UME) 9*128kB (U) 5*256kB (UM) 1*512kB (U) 2*1024kB (UM) 5*2048kB (UME) 917*4096kB (M) = 3782104kB Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB 28480 total pagecache pages 0 pages in swap cache Swap cache stats: add 0, delete 0, find 0/0 Free swap = 0kB Total swap = 0kB 1965979 pages RAM 0 pages HighMem/MovableOnly 335856 pages reserved 0 pages cma reserved kobject: 'loop2' (ffff8880a407d4e0): kobject_uevent_env syz-executor.5: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) kobject: 'loop2' (ffff8880a407d4e0): fill_kobj_path: path = '/devices/virtual/block/loop2' syz-executor.5 cpuset=syz5 mems_allowed=0-1 CPU: 0 PID: 29568 Comm: syz-executor.5 Not tainted 4.14.158-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x142/0x197 lib/dump_stack.c:58 warn_alloc.cold+0x96/0x1af mm/page_alloc.c:3248 __vmalloc_node_range mm/vmalloc.c:1786 [inline] __vmalloc_node_range+0x3c3/0x6a0 mm/vmalloc.c:1746 __vmalloc_node mm/vmalloc.c:1815 [inline] __vmalloc_node_flags mm/vmalloc.c:1829 [inline] vmalloc+0x46/0x50 mm/vmalloc.c:1851 sel_write_load+0x1a0/0x1050 security/selinux/selinuxfs.c:495 __vfs_write+0x105/0x6b0 fs/read_write.c:480 vfs_write+0x198/0x500 fs/read_write.c:544 SYSC_write fs/read_write.c:590 [inline] SyS_write+0xfd/0x230 fs/read_write.c:582 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x45a679 RSP: 002b:00007f9c27566c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a679 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9c275676d4 R13: 00000000004cbc09 R14: 00000000004e58e0 R15: 00000000ffffffff kobject: 'loop0' (ffff888060996320): kobject_uevent_env netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. kobject: 'loop0' (ffff888060996320): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop4' (ffff8880a410f5e0): kobject_uevent_env kobject: 'loop4' (ffff8880a410f5e0): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop3' (ffff8880a40b7560): kobject_uevent_env kobject: 'sit27' (ffff88809ff43170): kobject_add_internal: parent: 'net', set: 'devices' kobject: 'loop3' (ffff8880a40b7560): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'sit27' (ffff88809ff43170): kobject_uevent_env kobject: 'loop3' (ffff8880a40b7560): kobject_uevent_env kobject: 'sit27' (ffff88809ff43170): fill_kobj_path: path = '/devices/virtual/net/sit27' kobject: 'loop3' (ffff8880a40b7560): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'queues' (ffff8880a0a68d48): kobject_add_internal: parent: 'sit27', set: '' kobject: 'loop2' (ffff8880a407d4e0): kobject_uevent_env kobject: 'queues' (ffff8880a0a68d48): kobject_uevent_env kobject: 'loop2' (ffff8880a407d4e0): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'queues' (ffff8880a0a68d48): kobject_uevent_env: filter function caused the event to drop! kobject: 'loop0' (ffff888060996320): kobject_uevent_env kobject: 'loop0' (ffff888060996320): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'rx-0' (ffff88809a0873d0): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'rx-0' (ffff88809a0873d0): kobject_uevent_env kobject: 'rx-0' (ffff88809a0873d0): fill_kobj_path: path = '/devices/virtual/net/sit27/queues/rx-0' kobject: 'tx-0' (ffff8880971a4a98): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'tx-0' (ffff8880971a4a98): kobject_uevent_env kobject: 'tx-0' (ffff8880971a4a98): fill_kobj_path: path = '/devices/virtual/net/sit27/queues/tx-0' syz-executor.5: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) syz-executor.5 cpuset=syz5 mems_allowed=0-1 CPU: 0 PID: 29568 Comm: syz-executor.5 Not tainted 4.14.158-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 kobject: 'loop4' (ffff8880a410f5e0): kobject_uevent_env Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x142/0x197 lib/dump_stack.c:58 warn_alloc.cold+0x96/0x1af mm/page_alloc.c:3248 kobject: 'loop4' (ffff8880a410f5e0): fill_kobj_path: path = '/devices/virtual/block/loop4' __vmalloc_node_range mm/vmalloc.c:1786 [inline] __vmalloc_node_range+0x3c3/0x6a0 mm/vmalloc.c:1746 __vmalloc_node mm/vmalloc.c:1815 [inline] __vmalloc_node_flags mm/vmalloc.c:1829 [inline] vmalloc+0x46/0x50 mm/vmalloc.c:1851 sel_write_load+0x1a0/0x1050 security/selinux/selinuxfs.c:495 __vfs_write+0x105/0x6b0 fs/read_write.c:480 vfs_write+0x198/0x500 fs/read_write.c:544 SYSC_write fs/read_write.c:590 [inline] SyS_write+0xfd/0x230 fs/read_write.c:582 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x45a679 RSP: 002b:00007f9c27566c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a679 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9c275676d4 R13: 00000000004cbc09 R14: 00000000004e58e0 R15: 00000000ffffffff warn_alloc_show_mem: 1 callbacks suppressed Mem-Info: active_anon:242120 inactive_anon:189 isolated_anon:0 active_file:8706 inactive_file:19561 isolated_file:0 unevictable:0 dirty:510 writeback:0 unstable:0 slab_reclaimable:14379 slab_unreclaimable:112646 mapped:59567 shmem:242 pagetables:3272 bounce:0 free:1133151 free_pcp:308 free_cma:0 Node 0 active_anon:968480kB inactive_anon:756kB active_file:34684kB inactive_file:78244kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:238268kB dirty:2040kB writeback:0kB shmem:968kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 397312kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no Node 1 active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no Node 0 DMA free:15908kB min:216kB low:268kB high:320kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB lowmem_reserve[]: 0 2569 2569 2569 2569 Node 0 DMA32 free:734768kB min:36380kB low:45472kB high:54564kB active_anon:968480kB inactive_anon:756kB active_file:34684kB inactive_file:78244kB unevictable:0kB writepending:2044kB present:3129332kB managed:2634392kB mlocked:0kB kernel_stack:9888kB pagetables:13088kB bounce:0kB free_pcp:1284kB local_pcp:636kB free_cma:0kB lowmem_reserve[]: 0 0 0 0 0 Node 0 Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB lowmem_reserve[]: 0 0 0 0 0 Node 1 Normal free:3782104kB min:53508kB low:66884kB high:80260kB active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB writepending:0kB present:3932160kB managed:3870192kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB lowmem_reserve[]: 0 0 0 0 0 Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB Node 0 DMA32: 863*4kB (UME) 245*8kB (UME) 422*16kB (UME) 1105*32kB (UME) 524*64kB (UME) 53*128kB (UME) 4*256kB (UME) 4*512kB (UE) 1*1024kB (E) 75*2048kB (UM) 120*4096kB (M) = 737060kB Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB kobject: 'loop1' (ffff8880a4040be0): kobject_uevent_env Node 1 kobject: 'loop1' (ffff8880a4040be0): fill_kobj_path: path = '/devices/virtual/block/loop1' Normal: 52*4kB (UE) 365*8kB (UME) 290*16kB (UE) 58*32kB (UME) 19*64kB (UME) 9*128kB (U) 5*256kB (UM) 1*512kB (U) 2*1024kB (UM) 5*2048kB (UME) 917*4096kB (M) = 3782104kB Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB 28503 total pagecache pages 0 pages in swap cache Swap cache stats: add 0, delete 0, find 0/0 Free swap = 0kB Total swap = 0kB 1965979 pages RAM 0 pages HighMem/MovableOnly 335856 pages reserved 0 pages cma reserved kobject: 'loop5' (ffff8880a4162520): kobject_uevent_env kobject: 'loop5' (ffff8880a4162520): fill_kobj_path: path = '/devices/virtual/block/loop5' syz-executor.2: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) kobject: 'loop0' (ffff888060996320): kobject_uevent_env syz-executor.2 cpuset=syz2 mems_allowed=0-1 CPU: 0 PID: 29617 Comm: syz-executor.2 Not tainted 4.14.158-syzkaller #0 kobject: 'loop0' (ffff888060996320): fill_kobj_path: path = '/devices/virtual/block/loop0' Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x142/0x197 lib/dump_stack.c:58 warn_alloc.cold+0x96/0x1af mm/page_alloc.c:3248 __vmalloc_node_range mm/vmalloc.c:1786 [inline] __vmalloc_node_range+0x3c3/0x6a0 mm/vmalloc.c:1746 __vmalloc_node mm/vmalloc.c:1815 [inline] __vmalloc_node_flags mm/vmalloc.c:1829 [inline] vmalloc+0x46/0x50 mm/vmalloc.c:1851 sel_write_load+0x1a0/0x1050 security/selinux/selinuxfs.c:495 kobject: 'loop4' (ffff8880a410f5e0): kobject_uevent_env __vfs_write+0x105/0x6b0 fs/read_write.c:480 vfs_write+0x198/0x500 fs/read_write.c:544 SYSC_write fs/read_write.c:590 [inline] SyS_write+0xfd/0x230 fs/read_write.c:582 kobject: 'loop4' (ffff8880a410f5e0): fill_kobj_path: path = '/devices/virtual/block/loop4' do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 kobject: 'loop4' (ffff8880a410f5e0): kobject_uevent_env entry_SYSCALL_64_after_hwframe+0x42/0xb7 kobject: 'loop4' (ffff8880a410f5e0): fill_kobj_path: path = '/devices/virtual/block/loop4' RIP: 0033:0x45a679 netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. RSP: 002b:00007fce74c32c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a679 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007fce74c336d4 R13: 00000000004cbc09 R14: 00000000004e58e0 R15: 00000000ffffffff syz-executor.5: kobject: 'loop0' (ffff888060996320): kobject_uevent_env vmalloc: allocation failure: 0 bytes kobject: 'loop0' (ffff888060996320): fill_kobj_path: path = '/devices/virtual/block/loop0' , mode:0x14000c0(GFP_KERNEL), nodemask= netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. (null) kobject: 'loop2' (ffff8880a407d4e0): kobject_uevent_env syz-executor.5 cpuset=syz5 mems_allowed=0-1 kobject: 'loop2' (ffff8880a407d4e0): fill_kobj_path: path = '/devices/virtual/block/loop2' CPU: 0 PID: 29623 Comm: syz-executor.5 Not tainted 4.14.158-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 kobject: 'sit3' (ffff8880958b4d70): kobject_add_internal: parent: 'net', set: 'devices' Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x142/0x197 lib/dump_stack.c:58 warn_alloc.cold+0x96/0x1af mm/page_alloc.c:3248 kobject: 'sit3' (ffff8880958b4d70): kobject_uevent_env kobject: 'sit3' (ffff8880958b4d70): fill_kobj_path: path = '/devices/virtual/net/sit3' __vmalloc_node_range mm/vmalloc.c:1786 [inline] __vmalloc_node_range+0x3c3/0x6a0 mm/vmalloc.c:1746 __vmalloc_node mm/vmalloc.c:1815 [inline] __vmalloc_node_flags mm/vmalloc.c:1829 [inline] vmalloc+0x46/0x50 mm/vmalloc.c:1851 sel_write_load+0x1a0/0x1050 security/selinux/selinuxfs.c:495 kobject: 'queues' (ffff8880867a2148): kobject_add_internal: parent: 'sit3', set: '' __vfs_write+0x105/0x6b0 fs/read_write.c:480 kobject: 'queues' (ffff8880867a2148): kobject_uevent_env vfs_write+0x198/0x500 fs/read_write.c:544 SYSC_write fs/read_write.c:590 [inline] SyS_write+0xfd/0x230 fs/read_write.c:582 kobject: 'queues' (ffff8880867a2148): kobject_uevent_env: filter function caused the event to drop! do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x45a679 kobject: 'rx-0' (ffff8880779b5010): kobject_add_internal: parent: 'queues', set: 'queues' RSP: 002b:00007f9c27566c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a679 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 kobject: 'rx-0' (ffff8880779b5010): kobject_uevent_env R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9c275676d4 R13: 00000000004cbc09 R14: 00000000004e58e0 R15: 00000000ffffffff kobject: 'loop3' (ffff8880a40b7560): kobject_uevent_env kobject: 'rx-0' (ffff8880779b5010): fill_kobj_path: path = '/devices/virtual/net/sit3/queues/rx-0' kobject: 'loop3' (ffff8880a40b7560): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'tx-0' (ffff8880a0a7d818): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'loop0' (ffff888060996320): kobject_uevent_env kobject: 'tx-0' (ffff8880a0a7d818): kobject_uevent_env kobject: 'loop0' (ffff888060996320): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'tx-0' (ffff8880a0a7d818): fill_kobj_path: path = '/devices/virtual/net/sit3/queues/tx-0' kobject: 'loop4' (ffff8880a410f5e0): kobject_uevent_env syz-executor.5: kobject: 'loop4' (ffff8880a410f5e0): fill_kobj_path: path = '/devices/virtual/block/loop4' vmalloc: allocation failure: 0 bytes kobject: 'loop4' (ffff8880a410f5e0): kobject_uevent_env , mode:0x14000c0(GFP_KERNEL), nodemask= kobject: 'loop4' (ffff8880a410f5e0): fill_kobj_path: path = '/devices/virtual/block/loop4' (null) kobject: 'loop0' (ffff888060996320): kobject_uevent_env syz-executor.5 cpuset= kobject: 'loop0' (ffff888060996320): fill_kobj_path: path = '/devices/virtual/block/loop0' syz5 mems_allowed=0-1 CPU: 1 PID: 29623 Comm: syz-executor.5 Not tainted 4.14.158-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x142/0x197 lib/dump_stack.c:58 warn_alloc.cold+0x96/0x1af mm/page_alloc.c:3248 __vmalloc_node_range mm/vmalloc.c:1786 [inline] __vmalloc_node_range+0x3c3/0x6a0 mm/vmalloc.c:1746 __vmalloc_node mm/vmalloc.c:1815 [inline] __vmalloc_node_flags mm/vmalloc.c:1829 [inline] vmalloc+0x46/0x50 mm/vmalloc.c:1851 sel_write_load+0x1a0/0x1050 security/selinux/selinuxfs.c:495 __vfs_write+0x105/0x6b0 fs/read_write.c:480 vfs_write+0x198/0x500 fs/read_write.c:544 SYSC_write fs/read_write.c:590 [inline] SyS_write+0xfd/0x230 fs/read_write.c:582 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x45a679 RSP: 002b:00007f9c27566c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a679 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9c275676d4 R13: 00000000004cbc09 R14: 00000000004e58e0 R15: 00000000ffffffff warn_alloc_show_mem: 2 callbacks suppressed Mem-Info: active_anon:242677 inactive_anon:189 isolated_anon:0 active_file:8706 inactive_file:19582 isolated_file:0 unevictable:0 dirty:537 writeback:0 unstable:0 slab_reclaimable:14381 slab_unreclaimable:112744 mapped:59599 shmem:242 pagetables:3302 bounce:0 free:1131625 free_pcp:241 free_cma:0 Node 0 active_anon:970708kB inactive_anon:756kB active_file:34684kB inactive_file:78328kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:238396kB dirty:2148kB writeback:0kB shmem:968kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 405504kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no kobject: 'vcs24' (ffff888051601750): kobject_add_internal: parent: 'vc', set: 'devices' Node 1 active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no Node 0 DMA free:15908kB min:216kB low:268kB high:320kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB lowmem_reserve[]: 0 2569 2569 2569 2569 Node 0 DMA32 free:728488kB min:36380kB low:45472kB high:54564kB active_anon:970708kB inactive_anon:756kB active_file:34684kB inactive_file:78328kB unevictable:0kB writepending:2148kB present:3129332kB managed:2634392kB mlocked:0kB kernel_stack:9984kB pagetables:13208kB bounce:0kB free_pcp:964kB local_pcp:680kB free_cma:0kB lowmem_reserve[]: 0 0 0 0 0 Node 0 Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB lowmem_reserve[]: 0 0 0 0 0 Node 1 Normal free:3782104kB min:53508kB low:66884kB high:80260kB active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB writepending:0kB present:3932160kB managed:3870192kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB lowmem_reserve[]: 0 0 0 0 0 Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB Node 0 DMA32: 620*4kB (UME) 301*8kB (UME) 386*16kB (UME) 1001*32kB (UE) 520*64kB (UME) 55*128kB (UME) 4*256kB (UME) 4*512kB (UE) 1*1024kB (E) 73*2048kB (UM) 120*4096kB (M) = 728536kB Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB Node 1 Normal: 52*4kB (UE) 365*8kB (UME) 290*16kB (UE) 58*32kB (UME) kobject: 'vcs24' (ffff888051601750): kobject_uevent_env 19*64kB (UME) 9*128kB (U) 5*256kB (UM) 1*512kB (U) 2*1024kB (UM)