RDX: 00000000200006c0 RSI: 0000000000001269 RDI: 0000000000000006 RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007eff50f7e6d4 R13: 00000000004be93a R14: 00000000004ce5f0 R15: 0000000000000007 BUG: sleeping function called from invalid context at mm/slab.h:421 in_atomic(): 1, irqs_disabled(): 0, pid: 16, name: ksoftirqd/1 INFO: lockdep is turned off. Preemption disabled at: [] __do_softirq+0x189/0xb03 kernel/softirq.c:269 CPU: 1 PID: 16 Comm: ksoftirqd/1 Not tainted 4.19.0-rc6-next-20181005+ #88 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1d3/0x2c4 lib/dump_stack.c:113 ___might_sleep.cold.89+0x1ba/0x1f3 kernel/sched/core.c:6149 __might_sleep+0x95/0x190 kernel/sched/core.c:6102 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3378 [inline] kmem_cache_alloc_trace+0x2cd/0x750 mm/slab.c:3618 kmalloc include/linux/slab.h:546 [inline] kzalloc include/linux/slab.h:741 [inline] kobject_uevent_env+0x2f3/0x101e lib/kobject_uevent.c:514 kobject_uevent+0x1f/0x24 lib/kobject_uevent.c:636 kobject_cleanup lib/kobject.c:649 [inline] kobject_release lib/kobject.c:691 [inline] kref_put include/linux/kref.h:70 [inline] kobject_put.cold.9+0x170/0x2e4 lib/kobject.c:708 put_device+0x20/0x30 drivers/base/core.c:2024 delete_partition_rcu_cb+0x147/0x1b0 block/partition-generic.c:259 __rcu_reclaim kernel/rcu/rcu.h:240 [inline] rcu_do_batch kernel/rcu/tree.c:2437 [inline] invoke_rcu_callbacks kernel/rcu/tree.c:2716 [inline] rcu_process_callbacks+0xff9/0x1ad0 kernel/rcu/tree.c:2697 __do_softirq+0x30b/0xb03 kernel/softirq.c:292 run_ksoftirqd+0x94/0x100 kernel/softirq.c:654 smpboot_thread_fn+0x68b/0xa00 kernel/smpboot.c:164 kthread+0x35a/0x440 kernel/kthread.c:246 ret_from_fork+0x3a/0x50 arch/x86/entry/entry_64.S:352 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 8407 Comm: syz-executor3 Tainted: G W 4.19.0-rc6-next-20181005+ #88 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1d3/0x2c4 lib/dump_stack.c:113 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold.4+0xa/0x17 lib/fault-inject.c:149 __should_failslab+0x124/0x180 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1578 slab_pre_alloc_hook mm/slab.h:423 [inline] slab_alloc mm/slab.c:3378 [inline] __do_kmalloc mm/slab.c:3720 [inline] __kmalloc+0x2e0/0x770 mm/slab.c:3731 kmalloc include/linux/slab.h:551 [inline] kzalloc include/linux/slab.h:741 [inline] kobject_get_path+0xc2/0x1b0 lib/kobject.c:171 kobject_uevent_env+0x314/0x101e lib/kobject_uevent.c:519 kobject_uevent+0x1f/0x24 lib/kobject_uevent.c:636 device_del+0x6c9/0xb70 drivers/base/core.c:2091 delete_partition+0x233/0x2c0 block/partition-generic.c:288 blkpg_ioctl+0x3c5/0xc10 block/ioctl.c:93 blkdev_ioctl+0x1864/0x2010 block/ioctl.c:573 block_ioctl+0xee/0x130 fs/block_dev.c:1883 vfs_ioctl fs/ioctl.c:46 [inline] file_ioctl fs/ioctl.c:501 [inline] do_vfs_ioctl+0x1de/0x1720 fs/ioctl.c:685 ksys_ioctl+0xa9/0xd0 fs/ioctl.c:702 __do_sys_ioctl fs/ioctl.c:709 [inline] __se_sys_ioctl fs/ioctl.c:707 [inline] __x64_sys_ioctl+0x73/0xb0 fs/ioctl.c:707 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457579 Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007eff50f7dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007eff50f7dc90 RCX: 0000000000457579 RDX: 00000000200006c0 RSI: 0000000000001269 RDI: 0000000000000006 RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007eff50f7e6d4 R13: 00000000004be93a R14: 00000000004ce5f0 R15: 0000000000000007 loop4: p1 p2 p3 p4 < > BUG: sleeping function called from invalid context at mm/slab.h:421 in_atomic(): 1, irqs_disabled(): 0, pid: 8430, name: syz-executor5 INFO: lockdep is turned off. Preemption disabled at: [] __do_softirq+0x189/0xb03 kernel/softirq.c:269 CPU: 1 PID: 8430 Comm: syz-executor5 Tainted: G W 4.19.0-rc6-next-20181005+ #88 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1d3/0x2c4 lib/dump_stack.c:113 ___might_sleep.cold.89+0x1ba/0x1f3 kernel/sched/core.c:6149 __might_sleep+0x95/0x190 kernel/sched/core.c:6102 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3378 [inline] kmem_cache_alloc_trace+0x2cd/0x750 mm/slab.c:3618 kmalloc include/linux/slab.h:546 [inline] kzalloc include/linux/slab.h:741 [inline] kobject_uevent_env+0x2f3/0x101e lib/kobject_uevent.c:514 kobject_uevent+0x1f/0x24 lib/kobject_uevent.c:636 kobject_cleanup lib/kobject.c:649 [inline] kobject_release lib/kobject.c:691 [inline] kref_put include/linux/kref.h:70 [inline] kobject_put.cold.9+0x170/0x2e4 lib/kobject.c:708 put_device+0x20/0x30 drivers/base/core.c:2024 delete_partition_rcu_cb+0x147/0x1b0 block/partition-generic.c:259 __rcu_reclaim kernel/rcu/rcu.h:240 [inline] rcu_do_batch kernel/rcu/tree.c:2437 [inline] invoke_rcu_callbacks kernel/rcu/tree.c:2716 [inline] rcu_process_callbacks+0xff9/0x1ad0 kernel/rcu/tree.c:2697 __do_softirq+0x30b/0xb03 kernel/softirq.c:292 invoke_softirq kernel/softirq.c:373 [inline] irq_exit+0x17f/0x1c0 kernel/softirq.c:413 exiting_irq arch/x86/include/asm/apic.h:536 [inline] smp_apic_timer_interrupt+0x1cb/0x750 arch/x86/kernel/apic/apic.c:1061 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:804 RIP: 0010:should_fail+0x1/0xd01 lib/fault-inject.c:109 Code: e8 84 27 33 ff e8 bf a2 db fd 48 89 d8 5b 41 5c 41 5d 5d c3 e8 80 bb 1f fe eb cc 0f 1f 40 00 66 2e 0f 1f 84 00 00 00 00 00 55 <48> 89 e5 41 57 41 56 49 be 00 00 00 00 00 fc ff df 41 55 4c 8d 6d RSP: 0018:ffff88018329eda8 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 RAX: 0000000000000007 RBX: ffff8801da8001c0 RCX: ffffffff81c1afdc RDX: 0000000000000000 RSI: 0000000000000020 RDI: ffffffff89438ac0 RBP: ffff88018329edd0 R08: ffff8801c7c384c0 R09: 0000000000000000 R10: ffffe8ffffd815c0 R11: ffffe8ffffd815e3 R12: 0000000000000000 R13: 0000000000000000 R14: ffff8801da8001c0 R15: 00000000006080c0 should_failslab+0x9/0x14 mm/slab_common.c:1578 slab_pre_alloc_hook mm/slab.h:423 [inline] slab_alloc mm/slab.c:3378 [inline] kmem_cache_alloc_trace+0x2d7/0x750 mm/slab.c:3618 kmalloc include/linux/slab.h:546 [inline] kzalloc include/linux/slab.h:741 [inline] aa_alloc_task_ctx security/apparmor/include/task.h:47 [inline] apparmor_task_alloc+0x49/0x290 security/apparmor/lsm.c:103 security_task_alloc+0x54/0xb0 security/security.c:1029 copy_process+0x2669/0x8780 kernel/fork.c:1899 _do_fork+0x1cb/0x11c0 kernel/fork.c:2216 __do_sys_clone kernel/fork.c:2323 [inline] __se_sys_clone kernel/fork.c:2317 [inline] __x64_sys_clone+0xbf/0x150 kernel/fork.c:2317 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x459f49 Code: ff 48 85 f6 0f 84 47 8a fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c 1e 8a fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 RSP: 002b:00007ffd2d7e2688 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 RAX: ffffffffffffffda RBX: 00007f70f30ed700 RCX: 0000000000459f49 RDX: 00007f70f30ed9d0 RSI: 00007f70f30ecdb0 RDI: 00000000003d0f00 RBP: 00007ffd2d7e2890 R08: 00007f70f30ed700 R09: 00007f70f30ed700 R10: 00007f70f30ed9d0 R11: 0000000000000202 R12: 0000000000000000 R13: 00007ffd2d7e273f R14: 00007f70f30ed9c0 R15: 0000000000000000 BUG: sleeping function called from invalid context at mm/slab.c:3066 in_atomic(): 1, irqs_disabled(): 0, pid: 8430, name: syz-executor5 INFO: lockdep is turned off. Preemption disabled at: [] __do_softirq+0x189/0xb03 kernel/softirq.c:269 CPU: 1 PID: 8430 Comm: syz-executor5 Tainted: G W 4.19.0-rc6-next-20181005+ #88 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1d3/0x2c4 lib/dump_stack.c:113 ___might_sleep.cold.89+0x1ba/0x1f3 kernel/sched/core.c:6149 __might_sleep+0x95/0x190 kernel/sched/core.c:6102 cache_alloc_debugcheck_before mm/slab.c:3066 [inline] slab_alloc mm/slab.c:3382 [inline] kmem_cache_alloc_trace+0x307/0x750 mm/slab.c:3618 kmalloc include/linux/slab.h:546 [inline] kzalloc include/linux/slab.h:741 [inline] kobject_uevent_env+0x2f3/0x101e lib/kobject_uevent.c:514 kobject_uevent+0x1f/0x24 lib/kobject_uevent.c:636 kobject_cleanup lib/kobject.c:649 [inline] kobject_release lib/kobject.c:691 [inline] kref_put include/linux/kref.h:70 [inline] kobject_put.cold.9+0x170/0x2e4 lib/kobject.c:708 put_device+0x20/0x30 drivers/base/core.c:2024 delete_partition_rcu_cb+0x147/0x1b0 block/partition-generic.c:259 __rcu_reclaim kernel/rcu/rcu.h:240 [inline] rcu_do_batch kernel/rcu/tree.c:2437 [inline] invoke_rcu_callbacks kernel/rcu/tree.c:2716 [inline] rcu_process_callbacks+0xff9/0x1ad0 kernel/rcu/tree.c:2697 __do_softirq+0x30b/0xb03 kernel/softirq.c:292 invoke_softirq kernel/softirq.c:373 [inline] irq_exit+0x17f/0x1c0 kernel/softirq.c:413 exiting_irq arch/x86/include/asm/apic.h:536 [inline] smp_apic_timer_interrupt+0x1cb/0x750 arch/x86/kernel/apic/apic.c:1061 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:804 RIP: 0010:should_fail+0x1/0xd01 lib/fault-inject.c:109 Code: e8 84 27 33 ff e8 bf a2 db fd 48 89 d8 5b 41 5c 41 5d 5d c3 e8 80 bb 1f fe eb cc 0f 1f 40 00 66 2e 0f 1f 84 00 00 00 00 00 55 <48> 89 e5 41 57 41 56 49 be 00 00 00 00 00 fc ff df 41 55 4c 8d 6d RSP: 0018:ffff88018329eda8 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 RAX: 0000000000000007 RBX: ffff8801da8001c0 RCX: ffffffff81c1afdc RDX: 0000000000000000 RSI: 0000000000000020 RDI: ffffffff89438ac0 RBP: ffff88018329edd0 R08: ffff8801c7c384c0 R09: 0000000000000000 R10: ffffe8ffffd815c0 R11: ffffe8ffffd815e3 R12: 0000000000000000 R13: 0000000000000000 R14: ffff8801da8001c0 R15: 00000000006080c0 should_failslab+0x9/0x14 mm/slab_common.c:1578 slab_pre_alloc_hook mm/slab.h:423 [inline] slab_alloc mm/slab.c:3378 [inline] kmem_cache_alloc_trace+0x2d7/0x750 mm/slab.c:3618 kmalloc include/linux/slab.h:546 [inline] kzalloc include/linux/slab.h:741 [inline] aa_alloc_task_ctx security/apparmor/include/task.h:47 [inline] apparmor_task_alloc+0x49/0x290 security/apparmor/lsm.c:103 security_task_alloc+0x54/0xb0 security/security.c:1029 copy_process+0x2669/0x8780 kernel/fork.c:1899 _do_fork+0x1cb/0x11c0 kernel/fork.c:2216 __do_sys_clone kernel/fork.c:2323 [inline] __se_sys_clone kernel/fork.c:2317 [inline] __x64_sys_clone+0xbf/0x150 kernel/fork.c:2317 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x459f49 Code: ff 48 85 f6 0f 84 47 8a fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c 1e 8a fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 RSP: 002b:00007ffd2d7e2688 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 RAX: ffffffffffffffda RBX: 00007f70f30ed700 RCX: 0000000000459f49 RDX: 00007f70f30ed9d0 RSI: 00007f70f30ecdb0 RDI: 00000000003d0f00 RBP: 00007ffd2d7e2890 R08: 00007f70f30ed700 R09: 00007f70f30ed700 R10: 00007f70f30ed9d0 R11: 0000000000000202 R12: 0000000000000000 R13: 00007ffd2d7e273f R14: 00007f70f30ed9c0 R15: 0000000000000000 BUG: sleeping function called from invalid context at mm/slab.h:421 in_atomic(): 1, irqs_disabled(): 0, pid: 8430, name: syz-executor5 INFO: lockdep is turned off. Preemption disabled at: [] __do_softirq+0x189/0xb03 kernel/softirq.c:269 CPU: 1 PID: 8430 Comm: syz-executor5 Tainted: G W 4.19.0-rc6-next-20181005+ #88 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1d3/0x2c4 lib/dump_stack.c:113 ___might_sleep.cold.89+0x1ba/0x1f3 kernel/sched/core.c:6149 __might_sleep+0x95/0x190 kernel/sched/core.c:6102 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3378 [inline] __do_kmalloc mm/slab.c:3720 [inline] __kmalloc+0x2d6/0x770 mm/slab.c:3731 kmalloc include/linux/slab.h:551 [inline] kzalloc include/linux/slab.h:741 [inline] kobject_get_path+0xc2/0x1b0 lib/kobject.c:171 kobject_uevent_env+0x314/0x101e lib/kobject_uevent.c:519 kobject_uevent+0x1f/0x24 lib/kobject_uevent.c:636 kobject_cleanup lib/kobject.c:649 [inline] kobject_release lib/kobject.c:691 [inline] kref_put include/linux/kref.h:70 [inline] kobject_put.cold.9+0x170/0x2e4 lib/kobject.c:708 put_device+0x20/0x30 drivers/base/core.c:2024 delete_partition_rcu_cb+0x147/0x1b0 block/partition-generic.c:259 __rcu_reclaim kernel/rcu/rcu.h:240 [inline] rcu_do_batch kernel/rcu/tree.c:2437 [inline] invoke_rcu_callbacks kernel/rcu/tree.c:2716 [inline] rcu_process_callbacks+0xff9/0x1ad0 kernel/rcu/tree.c:2697 __do_softirq+0x30b/0xb03 kernel/softirq.c:292 invoke_softirq kernel/softirq.c:373 [inline] irq_exit+0x17f/0x1c0 kernel/softirq.c:413 exiting_irq arch/x86/include/asm/apic.h:536 [inline] smp_apic_timer_interrupt+0x1cb/0x750 arch/x86/kernel/apic/apic.c:1061 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:804 RIP: 0010:should_fail+0x1/0xd01 lib/fault-inject.c:109 Code: e8 84 27 33 ff e8 bf a2 db fd 48 89 d8 5b 41 5c 41 5d 5d c3 e8 80 bb 1f fe eb cc 0f 1f 40 00 66 2e 0f 1f 84 00 00 00 00 00 55 <48> 89 e5 41 57 41 56 49 be 00 00 00 00 00 fc ff df 41 55 4c 8d 6d RSP: 0018:ffff88018329eda8 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 RAX: 0000000000000007 RBX: ffff8801da8001c0 RCX: ffffffff81c1afdc RDX: 0000000000000000 RSI: 0000000000000020 RDI: ffffffff89438ac0 RBP: ffff88018329edd0 R08: ffff8801c7c384c0 R09: 0000000000000000 R10: ffffe8ffffd815c0 R11: ffffe8ffffd815e3 R12: 0000000000000000 R13: 0000000000000000 R14: ffff8801da8001c0 R15: 00000000006080c0 should_failslab+0x9/0x14 mm/slab_common.c:1578 slab_pre_alloc_hook mm/slab.h:423 [inline] slab_alloc mm/slab.c:3378 [inline] kmem_cache_alloc_trace+0x2d7/0x750 mm/slab.c:3618 kmalloc include/linux/slab.h:546 [inline] kzalloc include/linux/slab.h:741 [inline] aa_alloc_task_ctx security/apparmor/include/task.h:47 [inline] apparmor_task_alloc+0x49/0x290 security/apparmor/lsm.c:103 security_task_alloc+0x54/0xb0 security/security.c:1029 copy_process+0x2669/0x8780 kernel/fork.c:1899 _do_fork+0x1cb/0x11c0 kernel/fork.c:2216 __do_sys_clone kernel/fork.c:2323 [inline] __se_sys_clone kernel/fork.c:2317 [inline] __x64_sys_clone+0xbf/0x150 kernel/fork.c:2317 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x459f49 Code: ff 48 85 f6 0f 84 47 8a fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c 1e 8a fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 RSP: 002b:00007ffd2d7e2688 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 RAX: ffffffffffffffda RBX: 00007f70f30ed700 RCX: 0000000000459f49 RDX: 00007f70f30ed9d0 RSI: 00007f70f30ecdb0 RDI: 00000000003d0f00 RBP: 00007ffd2d7e2890 R08: 00007f70f30ed700 R09: 00007f70f30ed700 R10: 00007f70f30ed9d0 R11: 0000000000000202 R12: 0000000000000000 R13: 00007ffd2d7e273f R14: 00007f70f30ed9c0 R15: 0000000000000000 BUG: sleeping function called from invalid context at mm/slab.c:3066 in_atomic(): 1, irqs_disabled(): 0, pid: 8430, name: syz-executor5 INFO: lockdep is turned off. Preemption disabled at: [] __do_softirq+0x189/0xb03 kernel/softirq.c:269 CPU: 1 PID: 8430 Comm: syz-executor5 Tainted: G W 4.19.0-rc6-next-20181005+ #88 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1d3/0x2c4 lib/dump_stack.c:113 ___might_sleep.cold.89+0x1ba/0x1f3 kernel/sched/core.c:6149 __might_sleep+0x95/0x190 kernel/sched/core.c:6102 cache_alloc_debugcheck_before mm/slab.c:3066 [inline] slab_alloc mm/slab.c:3382 [inline] __do_kmalloc mm/slab.c:3720 [inline] __kmalloc+0x310/0x770 mm/slab.c:3731 kmalloc include/linux/slab.h:551 [inline] kzalloc include/linux/slab.h:741 [inline] kobject_get_path+0xc2/0x1b0 lib/kobject.c:171 kobject_uevent_env+0x314/0x101e lib/kobject_uevent.c:519 kobject_uevent+0x1f/0x24 lib/kobject_uevent.c:636 kobject_cleanup lib/kobject.c:649 [inline] kobject_release lib/kobject.c:691 [inline] kref_put include/linux/kref.h:70 [inline] kobject_put.cold.9+0x170/0x2e4 lib/kobject.c:708 put_device+0x20/0x30 drivers/base/core.c:2024 delete_partition_rcu_cb+0x147/0x1b0 block/partition-generic.c:259 __rcu_reclaim kernel/rcu/rcu.h:240 [inline] rcu_do_batch kernel/rcu/tree.c:2437 [inline] invoke_rcu_callbacks kernel/rcu/tree.c:2716 [inline] rcu_process_callbacks+0xff9/0x1ad0 kernel/rcu/tree.c:2697 __do_softirq+0x30b/0xb03 kernel/softirq.c:292 invoke_softirq kernel/softirq.c:373 [inline] irq_exit+0x17f/0x1c0 kernel/softirq.c:413 exiting_irq arch/x86/include/asm/apic.h:536 [inline] smp_apic_timer_interrupt+0x1cb/0x750 arch/x86/kernel/apic/apic.c:1061 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:804 RIP: 0010:should_fail+0x1/0xd01 lib/fault-inject.c:109 Code: e8 84 27 33 ff e8 bf a2 db fd 48 89 d8 5b 41 5c 41 5d 5d c3 e8 80 bb 1f fe eb cc 0f 1f 40 00 66 2e 0f 1f 84 00 00 00 00 00 55 <48> 89 e5 41 57 41 56 49 be 00 00 00 00 00 fc ff df 41 55 4c 8d 6d RSP: 0018:ffff88018329eda8 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 RAX: 0000000000000007 RBX: ffff8801da8001c0 RCX: ffffffff81c1afdc RDX: 0000000000000000 RSI: 0000000000000020 RDI: ffffffff89438ac0 RBP: ffff88018329edd0 R08: ffff8801c7c384c0 R09: 0000000000000000 R10: ffffe8ffffd815c0 R11: ffffe8ffffd815e3 R12: 0000000000000000 R13: 0000000000000000 R14: ffff8801da8001c0 R15: 00000000006080c0 should_failslab+0x9/0x14 mm/slab_common.c:1578 slab_pre_alloc_hook mm/slab.h:423 [inline] slab_alloc mm/slab.c:3378 [inline] kmem_cache_alloc_trace+0x2d7/0x750 mm/slab.c:3618 kmalloc include/linux/slab.h:546 [inline] kzalloc include/linux/slab.h:741 [inline] aa_alloc_task_ctx security/apparmor/include/task.h:47 [inline] apparmor_task_alloc+0x49/0x290 security/apparmor/lsm.c:103 security_task_alloc+0x54/0xb0 security/security.c:1029 copy_process+0x2669/0x8780 kernel/fork.c:1899 _do_fork+0x1cb/0x11c0 kernel/fork.c:2216 __do_sys_clone kernel/fork.c:2323 [inline] __se_sys_clone kernel/fork.c:2317 [inline] __x64_sys_clone+0xbf/0x150 kernel/fork.c:2317 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x459f49 Code: ff 48 85 f6 0f 84 47 8a fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c 1e 8a fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 RSP: 002b:00007ffd2d7e2688 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 RAX: ffffffffffffffda RBX: 00007f70f30ed700 RCX: 0000000000459f49 RDX: 00007f70f30ed9d0 RSI: 00007f70f30ecdb0 RDI: 00000000003d0f00 RBP: 00007ffd2d7e2890 R08: 00007f70f30ed700 R09: 00007f70f30ed700 R10: 00007f70f30ed9d0 R11: 0000000000000202 R12: 0000000000000000 R13: 00007ffd2d7e273f R14: 00007f70f30ed9c0 R15: 0000000000000000 BUG: sleeping function called from invalid context at kernel/locking/mutex.c:908 in_atomic(): 1, irqs_disabled(): 0, pid: 8430, name: syz-executor5 INFO: lockdep is turned off. Preemption disabled at: [] __do_softirq+0x189/0xb03 kernel/softirq.c:269 CPU: 1 PID: 8430 Comm: syz-executor5 Tainted: G W 4.19.0-rc6-next-20181005+ #88 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1d3/0x2c4 lib/dump_stack.c:113 ___might_sleep.cold.89+0x1ba/0x1f3 kernel/sched/core.c:6149 __might_sleep+0x95/0x190 kernel/sched/core.c:6102 __mutex_lock_common kernel/locking/mutex.c:908 [inline] __mutex_lock+0x138/0x1700 kernel/locking/mutex.c:1072 mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:1087 kobject_uevent_env+0x7d7/0x101e lib/kobject_uevent.c:580 kobject_uevent+0x1f/0x24 lib/kobject_uevent.c:636 kobject_cleanup lib/kobject.c:649 [inline] kobject_release lib/kobject.c:691 [inline] kref_put include/linux/kref.h:70 [inline] kobject_put.cold.9+0x170/0x2e4 lib/kobject.c:708 put_device+0x20/0x30 drivers/base/core.c:2024 delete_partition_rcu_cb+0x147/0x1b0 block/partition-generic.c:259 __rcu_reclaim kernel/rcu/rcu.h:240 [inline] rcu_do_batch kernel/rcu/tree.c:2437 [inline] invoke_rcu_callbacks kernel/rcu/tree.c:2716 [inline] rcu_process_callbacks+0xff9/0x1ad0 kernel/rcu/tree.c:2697 __do_softirq+0x30b/0xb03 kernel/softirq.c:292 invoke_softirq kernel/softirq.c:373 [inline] irq_exit+0x17f/0x1c0 kernel/softirq.c:413 exiting_irq arch/x86/include/asm/apic.h:536 [inline] smp_apic_timer_interrupt+0x1cb/0x750 arch/x86/kernel/apic/apic.c:1061 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:804 RIP: 0010:should_fail+0x1/0xd01 lib/fault-inject.c:109 Code: e8 84 27 33 ff e8 bf a2 db fd 48 89 d8 5b 41 5c 41 5d 5d c3 e8 80 bb 1f fe eb cc 0f 1f 40 00 66 2e 0f 1f 84 00 00 00 00 00 55 <48> 89 e5 41 57 41 56 49 be 00 00 00 00 00 fc ff df 41 55 4c 8d 6d RSP: 0018:ffff88018329eda8 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 RAX: 0000000000000007 RBX: ffff8801da8001c0 RCX: ffffffff81c1afdc RDX: 0000000000000000 RSI: 0000000000000020 RDI: ffffffff89438ac0 RBP: ffff88018329edd0 R08: ffff8801c7c384c0 R09: 0000000000000000 R10: ffffe8ffffd815c0 R11: ffffe8ffffd815e3 R12: 0000000000000000 R13: 0000000000000000 R14: ffff8801da8001c0 R15: 00000000006080c0 should_failslab+0x9/0x14 mm/slab_common.c:1578 slab_pre_alloc_hook mm/slab.h:423 [inline] slab_alloc mm/slab.c:3378 [inline] kmem_cache_alloc_trace+0x2d7/0x750 mm/slab.c:3618 kmalloc include/linux/slab.h:546 [inline] kzalloc include/linux/slab.h:741 [inline] aa_alloc_task_ctx security/apparmor/include/task.h:47 [inline] apparmor_task_alloc+0x49/0x290 security/apparmor/lsm.c:103 security_task_alloc+0x54/0xb0 security/security.c:1029 copy_process+0x2669/0x8780 kernel/fork.c:1899 _do_fork+0x1cb/0x11c0 kernel/fork.c:2216 __do_sys_clone kernel/fork.c:2323 [inline] __se_sys_clone kernel/fork.c:2317 [inline] __x64_sys_clone+0xbf/0x150 kernel/fork.c:2317 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x459f49 Code: ff 48 85 f6 0f 84 47 8a fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c 1e 8a fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 RSP: 002b:00007ffd2d7e2688 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 RAX: ffffffffffffffda RBX: 00007f70f30ed700 RCX: 0000000000459f49 RDX: 00007f70f30ed9d0 RSI: 00007f70f30ecdb0 RDI: 00000000003d0f00 RBP: 00007ffd2d7e2890 R08: 00007f70f30ed700 R09: 00007f70f30ed700 R10: 00007f70f30ed9d0 R11: 0000000000000202 R12: 0000000000000000 R13: 00007ffd2d7e273f R14: 00007f70f30ed9c0 R15: 0000000000000000 BUG: sleeping function called from invalid context at mm/slab.h:421 in_atomic(): 1, irqs_disabled(): 0, pid: 8430, name: syz-executor5 INFO: lockdep is turned off. Preemption disabled at: [] __do_softirq+0x189/0xb03 kernel/softirq.c:269 CPU: 1 PID: 8430 Comm: syz-executor5 Tainted: G W 4.19.0-rc6-next-20181005+ #88 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1d3/0x2c4 lib/dump_stack.c:113 ___might_sleep.cold.89+0x1ba/0x1f3 kernel/sched/core.c:6149 __might_sleep+0x95/0x190 kernel/sched/core.c:6102 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc_node mm/slab.c:3299 [inline] kmem_cache_alloc_node+0x264/0x730 mm/slab.c:3642 __alloc_skb+0x114/0x770 net/core/skbuff.c:193 alloc_skb include/linux/skbuff.h:997 [inline] alloc_uevent_skb+0x84/0x1da lib/kobject_uevent.c:288 uevent_net_broadcast_untagged lib/kobject_uevent.c:324 [inline] kobject_uevent_net_broadcast lib/kobject_uevent.c:406 [inline] kobject_uevent_env+0xa52/0x101e lib/kobject_uevent.c:587 kobject_uevent+0x1f/0x24 lib/kobject_uevent.c:636 kobject_cleanup lib/kobject.c:649 [inline] kobject_release lib/kobject.c:691 [inline] kref_put include/linux/kref.h:70 [inline] kobject_put.cold.9+0x170/0x2e4 lib/kobject.c:708 put_device+0x20/0x30 drivers/base/core.c:2024 delete_partition_rcu_cb+0x147/0x1b0 block/partition-generic.c:259 __rcu_reclaim kernel/rcu/rcu.h:240 [inline] rcu_do_batch kernel/rcu/tree.c:2437 [inline] invoke_rcu_callbacks kernel/rcu/tree.c:2716 [inline] rcu_process_callbacks+0xff9/0x1ad0 kernel/rcu/tree.c:2697 __do_softirq+0x30b/0xb03 kernel/softirq.c:292 invoke_softirq kernel/softirq.c:373 [inline] irq_exit+0x17f/0x1c0 kernel/softirq.c:413 exiting_irq arch/x86/include/asm/apic.h:536 [inline] smp_apic_timer_interrupt+0x1cb/0x750 arch/x86/kernel/apic/apic.c:1061 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:804 RIP: 0010:should_fail+0x1/0xd01 lib/fault-inject.c:109 Code: e8 84 27 33 ff e8 bf a2 db fd 48 89 d8 5b 41 5c 41 5d 5d c3 e8 80 bb 1f fe eb cc 0f 1f 40 00 66 2e 0f 1f 84 00 00 00 00 00 55 <48> 89 e5 41 57 41 56 49 be 00 00 00 00 00 fc ff df 41 55 4c 8d 6d RSP: 0018:ffff88018329eda8 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 RAX: 0000000000000007 RBX: ffff8801da8001c0 RCX: ffffffff81c1afdc RDX: 0000000000000000 RSI: 0000000000000020 RDI: ffffffff89438ac0 RBP: ffff88018329edd0 R08: ffff8801c7c384c0 R09: 0000000000000000 R10: ffffe8ffffd815c0 R11: ffffe8ffffd815e3 R12: 0000000000000000 R13: 0000000000000000 R14: ffff8801da8001c0 R15: 00000000006080c0 should_failslab+0x9/0x14 mm/slab_common.c:1578 slab_pre_alloc_hook mm/slab.h:423 [inline] slab_alloc mm/slab.c:3378 [inline] kmem_cache_alloc_trace+0x2d7/0x750 mm/slab.c:3618 kmalloc include/linux/slab.h:546 [inline] kzalloc include/linux/slab.h:741 [inline] aa_alloc_task_ctx security/apparmor/include/task.h:47 [inline] apparmor_task_alloc+0x49/0x290 security/apparmor/lsm.c:103 security_task_alloc+0x54/0xb0 security/security.c:1029 copy_process+0x2669/0x8780 kernel/fork.c:1899 _do_fork+0x1cb/0x11c0 kernel/fork.c:2216 __do_sys_clone kernel/fork.c:2323 [inline] __se_sys_clone kernel/fork.c:2317 [inline] __x64_sys_clone+0xbf/0x150 kernel/fork.c:2317 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x459f49 Code: ff 48 85 f6 0f 84 47 8a fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c 1e 8a fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 RSP: 002b:00007ffd2d7e2688 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 RAX: ffffffffffffffda RBX: 00007f70f30ed700 RCX: 0000000000459f49 RDX: 00007f70f30ed9d0 RSI: 00007f70f30ecdb0 RDI: 00000000003d0f00 RBP: 00007ffd2d7e2890 R08: 00007f70f30ed700 R09: 00007f70f30ed700 R10: 00007f70f30ed9d0 R11: 0000000000000202 R12: 0000000000000000 R13: 00007ffd2d7e273f R14: 00007f70f30ed9c0 R15: 0000000000000000 BUG: sleeping function called from invalid context at mm/slab.c:3066 in_atomic(): 1, irqs_disabled(): 0, pid: 8430, name: syz-executor5 INFO: lockdep is turned off. Preemption disabled at: [] __do_softirq+0x189/0xb03 kernel/softirq.c:269 CPU: 1 PID: 8430 Comm: syz-executor5 Tainted: G W 4.19.0-rc6-next-20181005+ #88 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1d3/0x2c4 lib/dump_stack.c:113 ___might_sleep.cold.89+0x1ba/0x1f3 kernel/sched/core.c:6149 __might_sleep+0x95/0x190 kernel/sched/core.c:6102 cache_alloc_debugcheck_before mm/slab.c:3066 [inline] slab_alloc_node mm/slab.c:3303 [inline] kmem_cache_alloc_node+0x29e/0x730 mm/slab.c:3642 __alloc_skb+0x114/0x770 net/core/skbuff.c:193 alloc_skb include/linux/skbuff.h:997 [inline] alloc_uevent_skb+0x84/0x1da lib/kobject_uevent.c:288 uevent_net_broadcast_untagged lib/kobject_uevent.c:324 [inline] kobject_uevent_net_broadcast lib/kobject_uevent.c:406 [inline] kobject_uevent_env+0xa52/0x101e lib/kobject_uevent.c:587 kobject_uevent+0x1f/0x24 lib/kobject_uevent.c:636 kobject_cleanup lib/kobject.c:649 [inline] kobject_release lib/kobject.c:691 [inline] kref_put include/linux/kref.h:70 [inline] kobject_put.cold.9+0x170/0x2e4 lib/kobject.c:708 put_device+0x20/0x30 drivers/base/core.c:2024 delete_partition_rcu_cb+0x147/0x1b0 block/partition-generic.c:259 __rcu_reclaim kernel/rcu/rcu.h:240 [inline] rcu_do_batch kernel/rcu/tree.c:2437 [inline] invoke_rcu_callbacks kernel/rcu/tree.c:2716 [inline] rcu_process_callbacks+0xff9/0x1ad0 kernel/rcu/tree.c:2697 __do_softirq+0x30b/0xb03 kernel/softirq.c:292 invoke_softirq kernel/softirq.c:373 [inline] irq_exit+0x17f/0x1c0 kernel/softirq.c:413 exiting_irq arch/x86/include/asm/apic.h:536 [inline] smp_apic_timer_interrupt+0x1cb/0x750 arch/x86/kernel/apic/apic.c:1061 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:804 RIP: 0010:should_fail+0x1/0xd01 lib/fault-inject.c:109 Code: e8 84 27 33 ff e8 bf a2 db fd 48 89 d8 5b 41 5c 41 5d 5d c3 e8 80 bb 1f fe eb cc 0f 1f 40 00 66 2e 0f 1f 84 00 00 00 00 00 55 <48> 89 e5 41 57 41 56 49 be 00 00 00 00 00 fc ff df 41 55 4c 8d 6d RSP: 0018:ffff88018329eda8 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 RAX: 0000000000000007 RBX: ffff8801da8001c0 RCX: ffffffff81c1afdc RDX: 0000000000000000 RSI: 0000000000000020 RDI: ffffffff89438ac0 RBP: ffff88018329edd0 R08: ffff8801c7c384c0 R09: 0000000000000000 R10: ffffe8ffffd815c0 R11: ffffe8ffffd815e3 R12: 0000000000000000 R13: 0000000000000000 R14: ffff8801da8001c0 R15: 00000000006080c0 should_failslab+0x9/0x14 mm/slab_common.c:1578 slab_pre_alloc_hook mm/slab.h:423 [inline] slab_alloc mm/slab.c:3378 [inline] kmem_cache_alloc_trace+0x2d7/0x750 mm/slab.c:3618 kmalloc include/linux/slab.h:546 [inline] kzalloc include/linux/slab.h:741 [inline] aa_alloc_task_ctx security/apparmor/include/task.h:47 [inline] apparmor_task_alloc+0x49/0x290 security/apparmor/lsm.c:103 security_task_alloc+0x54/0xb0 security/security.c:1029 copy_process+0x2669/0x8780 kernel/fork.c:1899 _do_fork+0x1cb/0x11c0 kernel/fork.c:2216 __do_sys_clone kernel/fork.c:2323 [inline] __se_sys_clone kernel/fork.c:2317 [inline] __x64_sys_clone+0xbf/0x150 kernel/fork.c:2317 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x459f49 Code: ff 48 85 f6 0f 84 47 8a fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c 1e 8a fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 RSP: 002b:00007ffd2d7e2688 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 RAX: ffffffffffffffda RBX: 00007f70f30ed700 RCX: 0000000000459f49 RDX: 00007f70f30ed9d0 RSI: 00007f70f30ecdb0 RDI: 00000000003d0f00 RBP: 00007ffd2d7e2890 R08: 00007f70f30ed700 R09: 00007f70f30ed700 R10: 00007f70f30ed9d0 R11: 0000000000000202 R12: 0000000000000000 R13: 00007ffd2d7e273f R14: 00007f70f30ed9c0 R15: 0000000000000000 BUG: sleeping function called from invalid context at mm/slab.h:421 in_atomic(): 1, irqs_disabled(): 0, pid: 8430, name: syz-executor5 INFO: lockdep is turned off. Preemption disabled at: [] __do_softirq+0x189/0xb03 kernel/softirq.c:269 CPU: 1 PID: 8430 Comm: syz-executor5 Tainted: G W 4.19.0-rc6-next-20181005+ #88 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1d3/0x2c4 lib/dump_stack.c:113 ___might_sleep.cold.89+0x1ba/0x1f3 kernel/sched/core.c:6149 __might_sleep+0x95/0x190 kernel/sched/core.c:6102 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc_node mm/slab.c:3299 [inline] kmem_cache_alloc_node_trace+0x266/0x740 mm/slab.c:3661 __do_kmalloc_node mm/slab.c:3683 [inline] __kmalloc_node_track_caller+0x3c/0x70 mm/slab.c:3698 __kmalloc_reserve.isra.39+0x41/0xe0 net/core/skbuff.c:137 __alloc_skb+0x150/0x770 net/core/skbuff.c:205 alloc_skb include/linux/skbuff.h:997 [inline] alloc_uevent_skb+0x84/0x1da lib/kobject_uevent.c:288 uevent_net_broadcast_untagged lib/kobject_uevent.c:324 [inline] kobject_uevent_net_broadcast lib/kobject_uevent.c:406 [inline] kobject_uevent_env+0xa52/0x101e lib/kobject_uevent.c:587 kobject_uevent+0x1f/0x24 lib/kobject_uevent.c:636 kobject_cleanup lib/kobject.c:649 [inline] kobject_release lib/kobject.c:691 [inline] kref_put include/linux/kref.h:70 [inline] kobject_put.cold.9+0x170/0x2e4 lib/kobject.c:708 put_device+0x20/0x30 drivers/base/core.c:2024 delete_partition_rcu_cb+0x147/0x1b0 block/partition-generic.c:259 __rcu_reclaim kernel/rcu/rcu.h:240 [inline] rcu_do_batch kernel/rcu/tree.c:2437 [inline] invoke_rcu_callbacks kernel/rcu/tree.c:2716 [inline] rcu_process_callbacks+0xff9/0x1ad0 kernel/rcu/tree.c:2697 __do_softirq+0x30b/0xb03 kernel/softirq.c:292 invoke_softirq kernel/softirq.c:373 [inline] irq_exit+0x17f/0x1c0 kernel/softirq.c:413 exiting_irq arch/x86/include/asm/apic.h:536 [inline] smp_apic_timer_interrupt+0x1cb/0x750 arch/x86/kernel/apic/apic.c:1061 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:804 RIP: 0010:should_fail+0x1/0xd01 lib/fault-inject.c:109 Code: e8 84 27 33 ff e8 bf a2 db fd 48 89 d8 5b 41 5c 41 5d 5d c3 e8 80 bb 1f fe eb cc 0f 1f 40 00 66 2e 0f 1f 84 00 00 00 00 00 55 <48> 89 e5 41 57 41 56 49 be 00 00 00 00 00 fc ff df 41 55 4c 8d 6d RSP: 0018:ffff88018329eda8 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 RAX: 0000000000000007 RBX: ffff8801da8001c0 RCX: ffffffff81c1afdc RDX: 0000000000000000 RSI: 0000000000000020 RDI: ffffffff89438ac0 RBP: ffff88018329edd0 R08: ffff8801c7c384c0 R09: 0000000000000000 R10: ffffe8ffffd815c0 R11: ffffe8ffffd815e3 R12: 0000000000000000 R13: 0000000000000000 R14: ffff8801da8001c0 R15: 00000000006080c0 should_failslab+0x9/0x14 mm/slab_common.c:1578 slab_pre_alloc_hook mm/slab.h:423 [inline] slab_alloc mm/slab.c:3378 [inline] kmem_cache_alloc_trace+0x2d7/0x750 mm/slab.c:3618 kmalloc include/linux/slab.h:546 [inline] kzalloc include/linux/slab.h:741 [inline] aa_alloc_task_ctx security/apparmor/include/task.h:47 [inline] apparmor_task_alloc+0x49/0x290 security/apparmor/lsm.c:103 security_task_alloc+0x54/0xb0 security/security.c:1029 copy_process+0x2669/0x8780 kernel/fork.c:1899 _do_fork+0x1cb/0x11c0 kernel/fork.c:2216 __do_sys_clone kernel/fork.c:2323 [inline] __se_sys_clone kernel/fork.c:2317 [inline] __x64_sys_clone+0xbf/0x150 kernel/fork.c:2317 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x459f49 Code: ff 48 85 f6 0f 84 47 8a fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c 1e 8a fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 RSP: 002b:00007ffd2d7e2688 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 RAX: ffffffffffffffda RBX: 00007f70f30ed700 RCX: 0000000000459f49 RDX: 00007f70f30ed9d0 RSI: 00007f70f30ecdb0 RDI: 00000000003d0f00 RBP: 00007ffd2d7e2890 R08: 00007f70f30ed700 R09: 00007f70f30ed700 R10: 00007f70f30ed9d0 R11: 0000000000000202 R12: 0000000000000000 R13: 00007ffd2d7e273f R14: 00007f70f30ed9c0 R15: 0000000000000000 BUG: sleeping function called from invalid context at mm/slab.c:3066 in_atomic(): 1, irqs_disabled(): 0, pid: 8430, name: syz-executor5 INFO: lockdep is turned off. Preemption disabled at: [] __do_softirq+0x189/0xb03 kernel/softirq.c:269 CPU: 1 PID: 8430 Comm: syz-executor5 Tainted: G W 4.19.0-rc6-next-20181005+ #88 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1d3/0x2c4 lib/dump_stack.c:113 ___might_sleep.cold.89+0x1ba/0x1f3 kernel/sched/core.c:6149 __might_sleep+0x95/0x190 kernel/sched/core.c:6102 cache_alloc_debugcheck_before mm/slab.c:3066 [inline] slab_alloc_node mm/slab.c:3303 [inline] kmem_cache_alloc_node_trace+0x2a0/0x740 mm/slab.c:3661 __do_kmalloc_node mm/slab.c:3683 [inline] __kmalloc_node_track_caller+0x3c/0x70 mm/slab.c:3698 __kmalloc_reserve.isra.39+0x41/0xe0 net/core/skbuff.c:137 __alloc_skb+0x150/0x770 net/core/skbuff.c:205 alloc_skb include/linux/skbuff.h:997 [inline] alloc_uevent_skb+0x84/0x1da lib/kobject_uevent.c:288 uevent_net_broadcast_untagged lib/kobject_uevent.c:324 [inline] kobject_uevent_net_broadcast lib/kobject_uevent.c:406 [inline] kobject_uevent_env+0xa52/0x101e lib/kobject_uevent.c:587 kobject_uevent+0x1f/0x24 lib/kobject_uevent.c:636