kasan: CONFIG_KASAN_INLINE enabled Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1d3/0x2c4 lib/dump_stack.c:113 kasan: GPF could be caused by NULL-ptr deref or user memory access fail_dump lib/fault-inject.c:51 [inline] should_fail.cold.4+0xa/0x17 lib/fault-inject.c:149 general protection fault: 0000 [#1] PREEMPT SMP KASAN CPU: 1 PID: 9746 Comm: syz-executor2 Not tainted 4.19.0-rc5-next-20180924+ #78 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:p9_client_prepare_req.part.6+0x47c/0x940 net/9p/client.c:712 Code: ff 0f 87 fc fc ff ff e8 52 16 eb f9 0f be 85 a4 fe ff ff 4c 89 f2 48 c1 ea 03 89 85 a4 fe ff ff 48 b8 00 00 00 00 00 fc ff df <0f> b6 14 02 4c 89 f0 83 e0 07 83 c0 01 38 d0 7c 08 84 d2 0f 85 2b RSP: 0018:ffff88018c6571e0 EFLAGS: 00010203 RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc9000386b000 should_fail_alloc_page mm/page_alloc.c:3064 [inline] prepare_alloc_pages mm/page_alloc.c:4327 [inline] __alloc_pages_nodemask+0x34b/0xdd0 mm/page_alloc.c:4365 RDX: 000000000000000b RSI: ffffffff8792436e RDI: 0000000000000282 RBP: ffff88018c657358 R08: ffff8801b869a500 R09: ffffed003b5a5b57 R10: ffffed003b5a5b57 R11: ffff8801dad2dabb R12: ffff8801d175c7c0 R13: 0000000000002000 R14: 000000000000005e R15: 0000000000002000 FS: 00007fc9340c1700(0000) GS:ffff8801dad00000(0000) knlGS:0000000000000000 __alloc_pages include/linux/gfp.h:473 [inline] __alloc_pages_node include/linux/gfp.h:486 [inline] kmem_getpages mm/slab.c:1409 [inline] cache_grow_begin+0x91/0x8c0 mm/slab.c:2677 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00000000004cf7f8 CR3: 00000001b970f000 CR4: 00000000001406e0 Call Trace: cache_alloc_refill mm/slab.c:3044 [inline] ____cache_alloc mm/slab.c:3127 [inline] __do_cache_alloc mm/slab.c:3349 [inline] slab_alloc mm/slab.c:3384 [inline] kmem_cache_alloc+0x665/0x730 mm/slab.c:3552 getname_flags+0xd0/0x590 fs/namei.c:140 user_path_at_empty+0x2d/0x50 fs/namei.c:2608 user_path include/linux/namei.h:62 [inline] do_mount+0x180/0x1d90 fs/namespace.c:2912 p9_client_prepare_req net/9p/client.c:744 [inline] p9_client_rpc+0x231/0x1320 net/9p/client.c:744 ksys_mount+0x12d/0x140 fs/namespace.c:3190 __do_sys_mount fs/namespace.c:3204 [inline] __se_sys_mount fs/namespace.c:3201 [inline] __x64_sys_mount+0xbe/0x150 fs/namespace.c:3201 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 p9_client_version net/9p/client.c:961 [inline] p9_client_create+0x9b7/0x1769 net/9p/client.c:1046 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457579 Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f2de9163c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007f2de9163c90 RCX: 0000000000457579 RDX: 0000000020000340 RSI: 00000000200000c0 RDI: 0000000000000000 RBP: 000000000072c040 R08: 00000000200001c0 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2de91646d4 v9fs_session_init+0x217/0x1bb0 fs/9p/v9fs.c:421 R13: 00000000004c281d R14: 00000000004d3b60 R15: 0000000000000003 kobject: 'queues' (0000000093f2fa1f): kobject_uevent_env kobject: 'queues' (0000000093f2fa1f): kobject_uevent_env: filter function caused the event to drop! kobject: 'rx-0' (0000000059da3c93): kobject_add_internal: parent: 'queues', set: 'queues' v9fs_mount+0x7c/0x8f0 fs/9p/vfs_super.c:135 kobject: 'rx-0' (0000000059da3c93): kobject_uevent_env legacy_get_tree+0x131/0x460 fs/fs_context.c:718 vfs_get_tree+0x1cb/0x5c0 fs/super.c:1795 kobject: 'rx-0' (0000000059da3c93): fill_kobj_path: path = '/devices/virtual/net/vet/queues/rx-0' do_new_mount fs/namespace.c:2648 [inline] do_mount+0x70c/0x1d90 fs/namespace.c:2974 kobject: 'tx-0' (000000003084b076): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'tx-0' (000000003084b076): kobject_uevent_env ksys_mount+0x12d/0x140 fs/namespace.c:3190 __do_sys_mount fs/namespace.c:3204 [inline] __se_sys_mount fs/namespace.c:3201 [inline] __x64_sys_mount+0xbe/0x150 fs/namespace.c:3201 kobject: 'tx-0' (000000003084b076): fill_kobj_path: path = '/devices/virtual/net/vet/queues/tx-0' do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready kobject: 'loop1' (00000000c2e73131): kobject_uevent_env kobject: 'loop1' (00000000c2e73131): fill_kobj_path: path = '/devices/virtual/block/loop1' entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457579 IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007fc9340c0c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007fc9340c0c90 RCX: 0000000000457579 RDX: 0000000020000340 RSI: 00000000200000c0 RDI: 0000000000000000 RBP: 000000000072bf00 R08: 00000000200001c0 R09: 0000000000000000 kobject: 'tx-1' (000000008025f529): kobject_add_internal: parent: 'queues', set: 'queues' R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc9340c16d4 R13: 00000000004c281d R14: 00000000004d3b60 R15: 0000000000000005 Modules linked in: ---[ end trace f5d5de71a3a8efed ]--- kobject: 'loop0' (000000007dfd2447): kobject_uevent_env RIP: 0010:p9_client_prepare_req.part.6+0x47c/0x940 net/9p/client.c:712 kobject: 'loop0' (000000007dfd2447): fill_kobj_path: path = '/devices/virtual/block/loop0' Code: ff 0f 87 fc fc ff ff e8 52 16 eb f9 0f be 85 a4 fe ff ff 4c 89 f2 48 c1 ea 03 89 85 a4 fe ff ff 48 b8 00 00 00 00 00 fc ff df <0f> b6 14 02 4c 89 f0 83 e0 07 83 c0 01 38 d0 7c 08 84 d2 0f 85 2b kobject: 'tx-1' (000000008025f529): kobject_uevent_env RSP: 0018:ffff88018c6571e0 EFLAGS: 00010203 kobject: 'tx-1' (000000008025f529): fill_kobj_path: path = '/devices/virtual/net/vet/queues/tx-1' kobject: 'rx-1' (000000008857b171): kobject_add_internal: parent: 'queues', set: 'queues' RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc9000386b000 kobject: 'rx-1' (000000008857b171): kobject_uevent_env RDX: 000000000000000b RSI: ffffffff8792436e RDI: 0000000000000282 9pnet: Insufficient options for proto=fd RBP: ffff88018c657358 R08: ffff8801b869a500 R09: ffffed003b5a5b57 bpfilter: read fail -512 R10: ffffed003b5a5b57 R11: ffff8801dad2dabb R12: ffff8801d175c7c0 9pnet: Insufficient options for proto=fd R13: 0000000000002000 R14: 000000000000005e R15: 0000000000002000 kobject: 'loop1' (00000000c2e73131): kobject_uevent_env kobject: 'tx-1' (000000008025f529): kobject_cleanup, parent 00000000dea32c89 kobject: 'loop1' (00000000c2e73131): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'tx-1' (000000008025f529): auto cleanup 'remove' event kobject: 'loop3' (00000000d37914d4): kobject_uevent_env kobject: 'tx-1' (000000008025f529): kobject_uevent_env kobject: 'tx-1' (000000008025f529): fill_kobj_path: path = '/devices/virtual/net/vet/queues/tx-1' FS: 00007fc9340c1700(0000) GS:ffff8801dac00000(0000) knlGS:0000000000000000 kobject: 'loop3' (00000000d37914d4): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'tx-1' (000000008025f529): auto cleanup kobject_del CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 kobject: 'tx-1' (000000008025f529): calling ktype release CR2: 00007ffdc7054f88 CR3: 00000001b970f000 CR4: 00000000001406f0 kobject: 'tx-1': free name DR0: 0000000020000000 DR1: 0000000020000000 DR2: 0000000000000000 kobject: 'rx-1' (000000008857b171): kobject_cleanup, parent 00000000dea32c89 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 kobject: 'rx-1' (000000008857b171): auto cleanup 'remove' event