====================================================== kobject: 'loop3' (00000000df0b1c70): kobject_uevent_env WARNING: possible circular locking dependency detected 4.19.37 #5 Not tainted ------------------------------------------------------ kobject: 'loop3' (00000000df0b1c70): fill_kobj_path: path = '/devices/virtual/block/loop3' syz-executor.5/9653 is trying to acquire lock: 0000000096c0acad (&acct->lock#2){+.+.}, at: acct_pin_kill+0x27/0x100 kernel/acct.c:173 but task is already holding lock: 000000004324429e (sb_writers#4){.+.+}, at: sb_start_write include/linux/fs.h:1569 [inline] 000000004324429e (sb_writers#4){.+.+}, at: mnt_want_write+0x3f/0xc0 fs/namespace.c:360 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #2 (sb_writers#4){.+.+}: percpu_down_read_preempt_disable include/linux/percpu-rwsem.h:36 [inline] percpu_down_read include/linux/percpu-rwsem.h:59 [inline] __sb_start_write+0x20b/0x360 fs/super.c:1387 sb_start_write include/linux/fs.h:1569 [inline] mnt_want_write+0x3f/0xc0 fs/namespace.c:360 ovl_want_write+0x76/0xa0 fs/overlayfs/util.c:24 ovl_link+0x7c/0x2d5 fs/overlayfs/dir.c:674 vfs_link+0x7a4/0xb60 fs/namei.c:4240 do_linkat+0x550/0x770 fs/namei.c:4308 __do_sys_link fs/namei.c:4337 [inline] __se_sys_link fs/namei.c:4335 [inline] __x64_sys_link+0x61/0x80 fs/namei.c:4335 do_syscall_64+0x103/0x610 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe -> #1 (&ovl_i_mutex_key[depth]){+.+.}: down_write+0x38/0x90 kernel/locking/rwsem.c:70 inode_lock include/linux/fs.h:738 [inline] ovl_write_iter+0x148/0xc20 fs/overlayfs/file.c:231 call_write_iter include/linux/fs.h:1811 [inline] new_sync_write fs/read_write.c:474 [inline] __vfs_write+0x58e/0x820 fs/read_write.c:487 __kernel_write+0x110/0x390 fs/read_write.c:506 do_acct_process+0xd37/0x1150 kernel/acct.c:520 acct_pin_kill+0x2f/0x100 kernel/acct.c:174 pin_kill+0x18f/0x860 fs/fs_pin.c:50 acct_on+0x574/0x790 kernel/acct.c:254 __do_sys_acct kernel/acct.c:286 [inline] __se_sys_acct kernel/acct.c:273 [inline] __x64_sys_acct+0xae/0x200 kernel/acct.c:273 do_syscall_64+0x103/0x610 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe -> #0 (&acct->lock#2){+.+.}: lock_acquire+0x16f/0x3f0 kernel/locking/lockdep.c:3900 __mutex_lock_common kernel/locking/mutex.c:925 [inline] __mutex_lock+0xf7/0x1300 kernel/locking/mutex.c:1072 mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:1087 acct_pin_kill+0x27/0x100 kernel/acct.c:173 pin_kill+0x18f/0x860 fs/fs_pin.c:50 acct_on+0x574/0x790 kernel/acct.c:254 __do_sys_acct kernel/acct.c:286 [inline] __se_sys_acct kernel/acct.c:273 [inline] __x64_sys_acct+0xae/0x200 kernel/acct.c:273 do_syscall_64+0x103/0x610 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe other info that might help us debug this: Chain exists of: &acct->lock#2 --> &ovl_i_mutex_key[depth] --> sb_writers#4 Possible unsafe locking scenario: CPU0 CPU1 ---- ---- lock(sb_writers#4); lock(&ovl_i_mutex_key[depth]); lock(sb_writers#4); lock(&acct->lock#2); *** DEADLOCK *** 2 locks held by syz-executor.5/9653: #0: 00000000974e721f (acct_on_mutex){+.+.}, at: __do_sys_acct kernel/acct.c:285 [inline] #0: 00000000974e721f (acct_on_mutex){+.+.}, at: __se_sys_acct kernel/acct.c:273 [inline] #0: 00000000974e721f (acct_on_mutex){+.+.}, at: __x64_sys_acct+0xa6/0x200 kernel/acct.c:273 #1: 000000004324429e (sb_writers#4){.+.+}, at: sb_start_write include/linux/fs.h:1569 [inline] #1: 000000004324429e (sb_writers#4){.+.+}, at: mnt_want_write+0x3f/0xc0 fs/namespace.c:360 stack backtrace: CPU: 0 PID: 9653 Comm: syz-executor.5 Not tainted 4.19.37 #5 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x172/0x1f0 lib/dump_stack.c:113 print_circular_bug.isra.0.cold+0x1cc/0x28f kernel/locking/lockdep.c:1221 check_prev_add kernel/locking/lockdep.c:1861 [inline] check_prevs_add kernel/locking/lockdep.c:1974 [inline] validate_chain kernel/locking/lockdep.c:2415 [inline] __lock_acquire+0x2e6d/0x48f0 kernel/locking/lockdep.c:3411 lock_acquire+0x16f/0x3f0 kernel/locking/lockdep.c:3900 __mutex_lock_common kernel/locking/mutex.c:925 [inline] __mutex_lock+0xf7/0x1300 kernel/locking/mutex.c:1072 mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:1087 acct_pin_kill+0x27/0x100 kernel/acct.c:173 pin_kill+0x18f/0x860 fs/fs_pin.c:50 acct_on+0x574/0x790 kernel/acct.c:254 __do_sys_acct kernel/acct.c:286 [inline] __se_sys_acct kernel/acct.c:273 [inline] __x64_sys_acct+0xae/0x200 kernel/acct.c:273 do_syscall_64+0x103/0x610 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x458da9 Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f6eb197ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a3 RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 0000000000458da9 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eb197f6d4 R13: 00000000004becd2 R14: 00000000004cfa50 R15: 00000000ffffffff overlayfs: unrecognized mount option "uppe(dir=./file1" or missing value kobject: 'loop0' (000000004b07ca1b): kobject_uevent_env kobject: 'kvm' (000000009e00f675): kobject_uevent_env kobject: 'loop0' (000000004b07ca1b): fill_kobj_path: path = '/devices/virtual/block/loop0' overlayfs: unrecognized mount option "uppe(dir=./file1" or missing value kobject: 'loop3' (00000000df0b1c70): kobject_uevent_env kobject: 'loop3' (00000000df0b1c70): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'kvm' (000000009e00f675): fill_kobj_path: path = '/devices/virtual/misc/kvm' SELinux: policydb string SELinux does not match my string SE Linux SELinux: failed to load policy kobject: 'kvm' (000000009e00f675): kobject_uevent_env kobject: 'kvm' (000000009e00f675): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop2' (0000000031af1eae): kobject_uevent_env Process accounting resumed kobject: 'loop2' (0000000031af1eae): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop0' (000000004b07ca1b): kobject_uevent_env kobject: 'loop0' (000000004b07ca1b): fill_kobj_path: path = '/devices/virtual/block/loop0' SELinux: policydb string SE%Linux does not match my string SE Linux overlayfs: unrecognized mount option "uppe)dir=./file1" or missing value kobject: 'loop3' (00000000df0b1c70): kobject_uevent_env kobject: 'loop3' (00000000df0b1c70): fill_kobj_path: path = '/devices/virtual/block/loop3' Process accounting resumed SELinux: failed to load policy kobject: 'loop4' (00000000eed1e58f): kobject_uevent_env kobject: 'loop4' (00000000eed1e58f): fill_kobj_path: path = '/devices/virtual/block/loop4' overlayfs: unrecognized mount option "uppe)dir=./file1" or missing value kobject: 'loop5' (00000000ca2ec132): kobject_uevent_env kobject: 'kvm' (000000009e00f675): kobject_uevent_env kobject: 'loop5' (00000000ca2ec132): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'kvm' (000000009e00f675): fill_kobj_path: path = '/devices/virtual/misc/kvm' Process accounting resumed SELinux: policydb string SE.Linux does not match my string SE Linux kobject: 'loop0' (000000004b07ca1b): kobject_uevent_env SELinux: failed to load policy overlayfs: unrecognized mount option "uppe*dir=./file1" or missing value kobject: 'loop0' (000000004b07ca1b): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop2' (0000000031af1eae): kobject_uevent_env kobject: 'loop2' (0000000031af1eae): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'kvm' (000000009e00f675): kobject_uevent_env kobject: 'loop3' (00000000df0b1c70): kobject_uevent_env kobject: 'loop3' (00000000df0b1c70): fill_kobj_path: path = '/devices/virtual/block/loop3' overlayfs: unrecognized mount option "uppe*dir=./file1" or missing value kobject: 'loop5' (00000000ca2ec132): kobject_uevent_env kobject: 'kvm' (000000009e00f675): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop5' (00000000ca2ec132): fill_kobj_path: path = '/devices/virtual/block/loop5' SELinux: policydb string SE`Linux does not match my string SE Linux kobject: 'loop3' (00000000df0b1c70): kobject_uevent_env kobject: 'loop3' (00000000df0b1c70): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'kvm' (000000009e00f675): kobject_uevent_env SELinux: failed to load policy overlayfs: unrecognized mount option "uppe+dir=./file1" or missing value kobject: 'loop4' (00000000eed1e58f): kobject_uevent_env kobject: 'kvm' (000000009e00f675): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop4' (00000000eed1e58f): fill_kobj_path: path = '/devices/virtual/block/loop4' overlayfs: unrecognized mount option "uppe+dir=./file1" or missing value kobject: 'loop2' (0000000031af1eae): kobject_uevent_env kobject: 'kvm' (000000009e00f675): kobject_uevent_env kobject: 'loop2' (0000000031af1eae): fill_kobj_path: path = '/devices/virtual/block/loop2' SELinux: policydb string SE inux does not match my string SE Linux kobject: 'loop3' (00000000df0b1c70): kobject_uevent_env kobject: 'kvm' (000000009e00f675): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop3' (00000000df0b1c70): fill_kobj_path: path = '/devices/virtual/block/loop3' SELinux: failed to load policy kobject: 'loop5' (00000000ca2ec132): kobject_uevent_env kobject: 'loop5' (00000000ca2ec132): fill_kobj_path: path = '/devices/virtual/block/loop5' overlayfs: unrecognized mount option "uppe" or missing value kobject: 'loop0' (000000004b07ca1b): kobject_uevent_env kobject: 'loop0' (000000004b07ca1b): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop3' (00000000df0b1c70): kobject_uevent_env kobject: 'loop3' (00000000df0b1c70): fill_kobj_path: path = '/devices/virtual/block/loop3' overlayfs: unrecognized mount option "uppe" or missing value SELinux: policydb string SE inux does not match my string SE Linux kobject: 'loop0' (000000004b07ca1b): kobject_uevent_env SELinux: failed to load policy kobject: 'loop0' (000000004b07ca1b): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'kvm' (000000009e00f675): kobject_uevent_env kobject: 'loop4' (00000000eed1e58f): kobject_uevent_env kobject: 'loop4' (00000000eed1e58f): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop3' (00000000df0b1c70): kobject_uevent_env kobject: 'kvm' (000000009e00f675): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop3' (00000000df0b1c70): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop0' (000000004b07ca1b): kobject_uevent_env kobject: 'loop0' (000000004b07ca1b): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop2' (0000000031af1eae): kobject_uevent_env SELinux: policydb string SE %inux does not match my string SE Linux kobject: 'kvm' (000000009e00f675): kobject_uevent_env overlayfs: unrecognized mount option "uppe-dir=./file1" or missing value kobject: 'loop2' (0000000031af1eae): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop3' (00000000df0b1c70): kobject_uevent_env kobject: 'kvm' (000000009e00f675): fill_kobj_path: path = '/devices/virtual/misc/kvm' overlayfs: unrecognized mount option "uppe-dir=./file1" or missing value kobject: 'loop3' (00000000df0b1c70): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop5' (00000000ca2ec132): kobject_uevent_env kobject: 'loop5' (00000000ca2ec132): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'kvm' (000000009e00f675): kobject_uevent_env kobject: 'kvm' (000000009e00f675): fill_kobj_path: path = '/devices/virtual/misc/kvm' SELinux: policydb string SE L nux does not match my string SE Linux kobject: 'kvm' (000000009e00f675): kobject_uevent_env kobject: 'loop5' (00000000ca2ec132): kobject_uevent_env kobject: 'loop5' (00000000ca2ec132): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'kvm' (000000009e00f675): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop4' (00000000eed1e58f): kobject_uevent_env kobject: 'loop4' (00000000eed1e58f): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop0' (000000004b07ca1b): kobject_uevent_env kobject: 'loop0' (000000004b07ca1b): fill_kobj_path: path = '/devices/virtual/block/loop0' overlayfs: unrecognized mount option "uppe.dir=./file1" or missing value SELinux: policydb string SE L%nux does not match my string SE Linux kobject: 'loop5' (00000000ca2ec132): kobject_uevent_env kobject: 'loop5' (00000000ca2ec132): fill_kobj_path: path = '/devices/virtual/block/loop5' overlayfs: unrecognized mount option "uppe.dir=./file1" or missing value kobject: 'kvm' (000000009e00f675): kobject_uevent_env kobject: 'loop2' (0000000031af1eae): kobject_uevent_env kobject: 'kvm' (000000009e00f675): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop2' (0000000031af1eae): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop0' (000000004b07ca1b): kobject_uevent_env SELinux: policydb string SE Li ux does not match my string SE Linux kobject: 'kvm' (000000009e00f675): kobject_uevent_env kobject: 'kvm' (000000009e00f675): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop0' (000000004b07ca1b): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop3' (00000000df0b1c70): kobject_uevent_env kobject: 'kvm' (000000009e00f675): kobject_uevent_env kobject: 'loop3' (00000000df0b1c70): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'kvm' (000000009e00f675): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop4' (00000000eed1e58f): kobject_uevent_env kobject: 'loop4' (00000000eed1e58f): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'kvm' (000000009e00f675): kobject_uevent_env SELinux: policydb string SE Li%ux does not match my string SE Linux kobject: 'loop0' (000000004b07ca1b): kobject_uevent_env kobject: 'loop0' (000000004b07ca1b): fill_kobj_path: path = '/devices/virtual/block/loop0' overlayfs: unrecognized mount option "uppe/dir=./file1" or missing value kobject: 'kvm' (000000009e00f675): fill_kobj_path: path = '/devices/virtual/misc/kvm' overlayfs: unrecognized mount option "uppe/dir=./file1" or missing value kobject: 'loop3' (00000000df0b1c70): kobject_uevent_env kobject: 'loop3' (00000000df0b1c70): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop2' (0000000031af1eae): kobject_uevent_env kobject: 'loop2' (0000000031af1eae): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop3' (00000000df0b1c70): kobject_uevent_env kobject: 'loop3' (00000000df0b1c70): fill_kobj_path: path = '/devices/virtual/block/loop3' SELinux: policydb string SE Lin x does not match my string SE Linux kobject: 'loop0' (000000004b07ca1b): kobject_uevent_env kobject: 'loop0' (000000004b07ca1b): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop5' (00000000ca2ec132): kobject_uevent_env kobject: 'loop5' (00000000ca2ec132): fill_kobj_path: path = '/devices/virtual/block/loop5' overlayfs: unrecognized mount option "uppe0dir=./file1" or missing value kobject: 'loop3' (00000000df0b1c70): kobject_uevent_env kobject: 'kvm' (000000009e00f675): kobject_uevent_env kobject: 'loop3' (00000000df0b1c70): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'kvm' (000000009e00f675): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop0' (000000004b07ca1b): kobject_uevent_env overlayfs: unrecognized mount option "uppe0dir=./file1" or missing value kobject: 'loop0' (000000004b07ca1b): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop4' (00000000eed1e58f): kobject_uevent_env kobject: 'kvm' (000000009e00f675): kobject_uevent_env kobject: 'loop4' (00000000eed1e58f): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop3' (00000000df0b1c70): kobject_uevent_env kobject: 'loop3' (00000000df0b1c70): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'kvm' (000000009e00f675): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop4' (00000000eed1e58f): kobject_uevent_env kobject: 'loop4' (00000000eed1e58f): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop3' (00000000df0b1c70): kobject_uevent_env kobject: 'kvm' (000000009e00f675): kobject_uevent_env kobject: 'loop3' (00000000df0b1c70): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'kvm' (000000009e00f675): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop0' (000000004b07ca1b): kobject_uevent_env kobject: 'loop0' (000000004b07ca1b): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop3' (00000000df0b1c70): kobject_uevent_env kobject: 'loop3' (00000000df0b1c70): fill_kobj_path: path = '/devices/virtual/block/loop3' SELinux: policydb string SELinux does not match my string SE Linux overlayfs: unrecognized mount option "uppe1dir=./file1" or missing value kobject: 'loop2' (0000000031af1eae): kobject_uevent_env SELinux: policydb string SE Lin%x does not match my string SE Linux kobject: 'loop2' (0000000031af1eae): fill_kobj_path: path = '/devices/virtual/block/loop2' overlayfs: unrecognized mount option "uppe1dir=./file1" or missing value kobject: 'loop5' (00000000ca2ec132): kobject_uevent_env kobject: 'kvm' (000000009e00f675): kobject_uevent_env kobject: 'loop5' (00000000ca2ec132): fill_kobj_path: path = '/devices/virtual/block/loop5' SELinux: policydb string SELinux does not match my string SE Linux kobject: 'loop3' (00000000df0b1c70): kobject_uevent_env kobject: 'kvm' (000000009e00f675): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop3' (00000000df0b1c70): fill_kobj_path: path = '/devices/virtual/block/loop3' SELinux: policydb string SE LinXx does not match my string SE Linux kobject: 'loop5' (00000000ca2ec132): kobject_uevent_env overlayfs: unrecognized mount option "uppe2dir=./file1" or missing value kobject: 'loop5' (00000000ca2ec132): fill_kobj_path: path = '/devices/virtual/block/loop5' SELinux: policydb string SE Lin%x does not match my string SE Linux SELinux: policydb string SELinux does not match my string SE Linux kobject: 'kvm' (000000009e00f675): kobject_uevent_env overlayfs: unrecognized mount option "uppe2dir=./file1" or missing value kobject: 'loop0' (000000004b07ca1b): kobject_uevent_env kobject: 'loop0' (000000004b07ca1b): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'kvm' (000000009e00f675): fill_kobj_path: path = '/devices/virtual/misc/kvm' SELinux: policydb string SE Lincx does not match my string SE Linux kobject: 'loop2' (0000000031af1eae): kobject_uevent_env kobject: 'loop2' (0000000031af1eae): fill_kobj_path: path = '/devices/virtual/block/loop2' SELinux: policydb string SE Lin%x does not match my string SE Linux kobject: 'loop4' (00000000eed1e58f): kobject_uevent_env kobject: 'kvm' (000000009e00f675): kobject_uevent_env kobject: 'loop4' (00000000eed1e58f): fill_kobj_path: path = '/devices/virtual/block/loop4' SELinux: policydb string SE Lindx does not match my string SE Linux kobject: 'kvm' (000000009e00f675): fill_kobj_path: path = '/devices/virtual/misc/kvm' overlayfs: unrecognized mount option "uppe3dir=./file1" or missing value kobject: 'loop3' (00000000df0b1c70): kobject_uevent_env kobject: 'loop3' (00000000df0b1c70): fill_kobj_path: path = '/devices/virtual/block/loop3' SELinux: policydb string SE Lin%x does not match my string SE Linux kobject: 'loop5' (00000000ca2ec132): kobject_uevent_env kobject: 'loop5' (00000000ca2ec132): fill_kobj_path: path = '/devices/virtual/block/loop5' SELinux: policydb string SE Linix does not match my string SE Linux kobject: 'loop3' (00000000df0b1c70): kobject_uevent_env kobject: 'loop3' (00000000df0b1c70): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'kvm' (000000009e00f675): kobject_uevent_env overlayfs: unrecognized mount option "uppe4dir=./file1" or missing value kobject: 'loop2' (0000000031af1eae): kobject_uevent_env overlayfs: unrecognized mount option "uppe4dir=./file1" or missing value kobject: 'loop2' (0000000031af1eae): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'kvm' (000000009e00f675): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop5' (00000000ca2ec132): kobject_uevent_env kobject: 'kvm' (000000009e00f675): kobject_uevent_env kobject: 'loop5' (00000000ca2ec132): fill_kobj_path: path = '/devices/virtual/block/loop5' SELinux: policydb string SE Linlx does not match my string SE Linux kobject: 'kvm' (000000009e00f675): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop3' (00000000df0b1c70): kobject_uevent_env kobject: 'loop3' (00000000df0b1c70): fill_kobj_path: path = '/devices/virtual/block/loop3' overlayfs: unrecognized mount option "uppe5dir=./file1" or missing value kobject: 'loop2' (0000000031af1eae): kobject_uevent_env kobject: 'kvm' (000000009e00f675): kobject_uevent_env kobject: 'loop2' (0000000031af1eae): fill_kobj_path: path = '/devices/virtual/block/loop2' overlayfs: unrecognized mount option "uppe5dir=./file1" or missing value kobject: 'loop4' (00000000eed1e58f): kobject_uevent_env kobject: 'loop4' (00000000eed1e58f): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'kvm' (000000009e00f675): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop0' (000000004b07ca1b): kobject_uevent_env kobject: 'loop0' (000000004b07ca1b): fill_kobj_path: path = '/devices/virtual/block/loop0' SELinux: policydb string SE Linox does not match my string SE Linux kobject: 'loop5' (00000000ca2ec132): kobject_uevent_env kobject: 'loop5' (00000000ca2ec132): fill_kobj_path: path = '/devices/virtual/block/loop5' overlayfs: unrecognized mount option "uppe6dir=./file1" or missing value kobject: 'loop0' (000000004b07ca1b): kobject_uevent_env kobject: 'loop0' (000000004b07ca1b): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'kvm' (000000009e00f675): kobject_uevent_env overlayfs: unrecognized mount option "uppe6dir=./file1" or missing value kobject: 'loop5' (00000000ca2ec132): kobject_uevent_env kobject: 'loop5' (00000000ca2ec132): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'kvm' (000000009e00f675): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop2' (0000000031af1eae): kobject_uevent_env kobject: 'loop2' (0000000031af1eae): fill_kobj_path: path = '/devices/virtual/block/loop2' SELinux: policydb string SE Linpx does not match my string SE Linux kobject: 'loop5' (00000000ca2ec132): kobject_uevent_env sel_write_load: 19 callbacks suppressed SELinux: failed to load policy kobject: 'loop5' (00000000ca2ec132): fill_kobj_path: path = '/devices/virtual/block/loop5' overlayfs: unrecognized mount option "uppe7dir=./file1" or missing value kobject: 'loop4' (00000000eed1e58f): kobject_uevent_env overlayfs: unrecognized mount option "uppe7dir=./file1" or missing value kobject: 'loop4' (00000000eed1e58f): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop3' (00000000df0b1c70): kobject_uevent_env kobject: 'loop3' (00000000df0b1c70): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop5' (00000000ca2ec132): kobject_uevent_env SELinux: policydb string SE Linsx does not match my string SE Linux kobject: 'loop5' (00000000ca2ec132): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop3' (00000000df0b1c70): kobject_uevent_env overlayfs: unrecognized mount option "uppe8dir=./file1" or missing value SELinux: failed to load policy kobject: 'loop3' (00000000df0b1c70): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'kvm' (000000009e00f675): kobject_uevent_env kobject: 'loop2' (0000000031af1eae): kobject_uevent_env syz-executor.3: vmalloc: allocation failure: 0 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) kobject: 'loop2' (0000000031af1eae): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'kvm' (000000009e00f675): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop5' (00000000ca2ec132): kobject_uevent_env overlayfs: unrecognized mount option "uppe8dir=./file1" or missing value syz-executor.3 cpuset=syz3 mems_allowed=0-1 CPU: 0 PID: 9981 Comm: syz-executor.3 Not tainted 4.19.37 #5 kobject: 'loop5' (00000000ca2ec132): fill_kobj_path: path = '/devices/virtual/block/loop5' Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x172/0x1f0 lib/dump_stack.c:113 warn_alloc.cold+0x7b/0x173 mm/page_alloc.c:3447 kobject: 'loop3' (00000000df0b1c70): kobject_uevent_env __vmalloc_node_range mm/vmalloc.c:1766 [inline] __vmalloc_node_range+0x484/0x790 mm/vmalloc.c:1732 kobject: 'loop3' (00000000df0b1c70): fill_kobj_path: path = '/devices/virtual/block/loop3' __vmalloc_node mm/vmalloc.c:1795 [inline] __vmalloc_node_flags mm/vmalloc.c:1809 [inline] vmalloc+0x6b/0x90 mm/vmalloc.c:1831 kobject: 'loop5' (00000000ca2ec132): kobject_uevent_env sel_write_load+0x1de/0x470 security/selinux/selinuxfs.c:557 __vfs_write+0x116/0x820 fs/read_write.c:485 kobject: 'loop5' (00000000ca2ec132): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop2' (0000000031af1eae): kobject_uevent_env kobject: 'loop2' (0000000031af1eae): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop4' (00000000eed1e58f): kobject_uevent_env vfs_write+0x20c/0x560 fs/read_write.c:549 ksys_write+0xea/0x1f0 fs/read_write.c:598 kobject: 'loop4' (00000000eed1e58f): fill_kobj_path: path = '/devices/virtual/block/loop4' __do_sys_write fs/read_write.c:610 [inline] __se_sys_write fs/read_write.c:607 [inline] __x64_sys_write+0x73/0xb0 fs/read_write.c:607 do_syscall_64+0x103/0x610 arch/x86/entry/common.c:290 kobject: 'loop3' (00000000df0b1c70): kobject_uevent_env entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x458da9 Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 kobject: 'loop3' (00000000df0b1c70): fill_kobj_path: path = '/devices/virtual/block/loop3' RSP: 002b:00007fa562dddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458da9 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 kobject: 'loop5' (00000000ca2ec132): kobject_uevent_env RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 kobject: 'loop5' (00000000ca2ec132): fill_kobj_path: path = '/devices/virtual/block/loop5' R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa562dde6d4 R13: 00000000004c88f7 R14: 00000000004df0c8 R15: 00000000ffffffff overlayfs: unrecognized mount option "uppe9dir=./file1" or missing value kobject: 'loop2' (0000000031af1eae): kobject_uevent_env kobject: 'kvm' (000000009e00f675): kobject_uevent_env kobject: 'loop2' (0000000031af1eae): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'kvm' (000000009e00f675): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop3' (00000000df0b1c70): kobject_uevent_env Mem-Info: overlayfs: unrecognized mount option "uppe9dir=./file1" or missing value active_anon:161572 inactive_anon:203 isolated_anon:0 active_file:8923 inactive_file:41367 isolated_file:0 unevictable:0 dirty:149 writeback:0 unstable:0 slab_reclaimable:16021 slab_unreclaimable:111655 mapped:59000 shmem:252 pagetables:2960 bounce:0 free:1055986 free_pcp:516 free_cma:0 kobject: 'loop3' (00000000df0b1c70): fill_kobj_path: path = '/devices/virtual/block/loop3' Node 0 active_anon:644192kB inactive_anon:812kB active_file:35552kB inactive_file:165468kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:236000kB dirty:596kB writeback:0kB shmem:1008kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 528384kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no kobject: 'loop5' (00000000ca2ec132): kobject_uevent_env Node 1 active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no kobject: 'loop5' (00000000ca2ec132): fill_kobj_path: path = '/devices/virtual/block/loop5' Node 0 DMA free:15908kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB kobject: 'loop0' (000000004b07ca1b): kobject_uevent_env lowmem_reserve[]: 0 2555 2557 2557 kobject: 'loop0' (000000004b07ca1b): fill_kobj_path: path = '/devices/virtual/block/loop0' Node 0 kobject: 'loop5' (00000000ca2ec132): kobject_uevent_env DMA32 free:427956kB min:36248kB low:45308kB high:54368kB active_anon:644176kB inactive_anon:808kB active_file:35552kB inactive_file:165468kB unevictable:0kB writepending:600kB present:3129332kB managed:2619972kB mlocked:0kB kernel_stack:10144kB pagetables:11704kB bounce:0kB free_pcp:2028kB local_pcp:756kB free_cma:0kB kobject: 'loop5' (00000000ca2ec132): fill_kobj_path: path = '/devices/virtual/block/loop5' lowmem_reserve[]: 0 0 2 2 kobject: 'loop0' (000000004b07ca1b): kobject_uevent_env Node 0 kobject: 'loop0' (000000004b07ca1b): fill_kobj_path: path = '/devices/virtual/block/loop0' Normal free:12kB min:32kB low:40kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:2428kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB kobject: 'loop5' (00000000ca2ec132): kobject_uevent_env lowmem_reserve[]: kobject: 'loop5' (00000000ca2ec132): fill_kobj_path: path = '/devices/virtual/block/loop5' 0 kobject: 'loop2' (0000000031af1eae): kobject_uevent_env 0 kobject: 'loop2' (0000000031af1eae): fill_kobj_path: path = '/devices/virtual/block/loop2' 0 kobject: 'loop4' (00000000eed1e58f): kobject_uevent_env 0 kobject: 'loop4' (00000000eed1e58f): fill_kobj_path: path = '/devices/virtual/block/loop4' Node 1 Normal free:3783424kB min:53608kB low:67008kB high:80408kB active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB writepending:0kB present:3932160kB managed:3870184kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB kobject: 'loop2' (0000000031af1eae): kobject_uevent_env lowmem_reserve[]: 0 0 0 0 kobject: 'loop2' (0000000031af1eae): fill_kobj_path: path = '/devices/virtual/block/loop2' Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB Node 0 DMA32: 2004*4kB (U) 107*8kB (UM) 367*16kB (UME) 312*32kB (UME) 225*64kB (UM) 146*128kB (UM) 188*256kB (UM) 115*512kB (UME) 45*1024kB (UM) 8*2048kB (UME) 49*4096kB (UM) = 427992kB Node 0 Normal: 1*4kB (U) 1*8kB (U) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 12kB Node 1 Normal: 52*4kB (U) 212*8kB (U) 263*16kB (UE) 61*32kB (UME) 16*64kB (UME) 9*128kB (U) 7*256kB (UM) 4*512kB (UME) 3*1024kB (UM) 1*2048kB (E) 919*4096kB (M) = 3783424kB Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB 50551 total pagecache pages 0 pages in swap cache Swap cache stats: add 0, delete 0, find 0/0 Free swap = 0kB Total swap = 0kB 1965979 pages RAM 0 pages HighMem/MovableOnly 338856 pages reserved 0 pages cma reserved SELinux: policydb string SE Linxx does not match my string SE Linux SELinux: failed to load policy syz-executor.5: vmalloc: allocation failure: 0 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) kobject: 'kvm' (000000009e00f675): kobject_uevent_env syz-executor.5 cpuset= kobject: 'kvm' (000000009e00f675): fill_kobj_path: path = '/devices/virtual/misc/kvm' overlayfs: unrecognized mount option "uppe:dir=./file1" or missing value syz5 mems_allowed=0-1 overlayfs: unrecognized mount option "uppe:dir=./file1" or missing value CPU: 1 PID: 9998 Comm: syz-executor.5 Not tainted 4.19.37 #5 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x172/0x1f0 lib/dump_stack.c:113 warn_alloc.cold+0x7b/0x173 mm/page_alloc.c:3447 kobject: 'kvm' (000000009e00f675): kobject_uevent_env kobject: 'kvm' (000000009e00f675): fill_kobj_path: path = '/devices/virtual/misc/kvm' __vmalloc_node_range mm/vmalloc.c:1766 [inline] __vmalloc_node_range+0x484/0x790 mm/vmalloc.c:1732 __vmalloc_node mm/vmalloc.c:1795 [inline] __vmalloc_node_flags mm/vmalloc.c:1809 [inline] vmalloc+0x6b/0x90 mm/vmalloc.c:1831 sel_write_load+0x1de/0x470 security/selinux/selinuxfs.c:557 __vfs_write+0x116/0x820 fs/read_write.c:485 kobject: 'kvm' (000000009e00f675): kobject_uevent_env kobject: 'kvm' (000000009e00f675): fill_kobj_path: path = '/devices/virtual/misc/kvm' vfs_write+0x20c/0x560 fs/read_write.c:549 ksys_write+0xea/0x1f0 fs/read_write.c:598 kobject: 'kvm' (000000009e00f675): kobject_uevent_env kobject: 'kvm' (000000009e00f675): fill_kobj_path: path = '/devices/virtual/misc/kvm' __do_sys_write fs/read_write.c:610 [inline] __se_sys_write fs/read_write.c:607 [inline] __x64_sys_write+0x73/0xb0 fs/read_write.c:607 do_syscall_64+0x103/0x610 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x458da9 Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f6eb197ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458da9 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eb197f6d4 R13: 00000000004c88f7 R14: 00000000004df0c8 R15: 00000000ffffffff kobject: 'loop4' (00000000eed1e58f): kobject_uevent_env kobject: 'loop4' (00000000eed1e58f): fill_kobj_path: path = '/devices/virtual/block/loop4' Mem-Info: active_anon:161117 inactive_anon:199 isolated_anon:0 active_file:8923 inactive_file:41389 isolated_file:0 unevictable:0 dirty:182 writeback:0 unstable:0 slab_reclaimable:16009 slab_unreclaimable:111929 mapped:59007 shmem:253 pagetables:2932 bounce:0 free:1056201 free_pcp:523 free_cma:0 overlayfs: unrecognized mount option "uppe;dir=./file1" or missing value Node 0 active_anon:644468kB inactive_anon:796kB active_file:35552kB inactive_file:165556kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:236028kB dirty:728kB writeback:0kB shmem:1012kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 526336kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no overlayfs: unrecognized mount option "uppe;dir=./file1" or missing value Node 1 active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no Node 0 DMA free:15908kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB lowmem_reserve[]: 0 2555 2557 2557 Node 0 DMA32 free:427124kB min:36248kB low:45308kB high:54368kB active_anon:642316kB inactive_anon:796kB active_file:35552kB inactive_file:165556kB unevictable:0kB writepending:728kB present:3129332kB managed:2619972kB mlocked:0kB kernel_stack:10144kB pagetables:11728kB bounce:0kB free_pcp:2232kB local_pcp:1072kB free_cma:0kB kobject: 'loop2' (0000000031af1eae): kobject_uevent_env lowmem_reserve[]: 0 0 2 2 Node 0 Normal free:12kB min:32kB low:40kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:2428kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB kobject: 'loop2' (0000000031af1eae): fill_kobj_path: path = '/devices/virtual/block/loop2' lowmem_reserve[]: 0 0 0 0 Node 1 Normal free:3783424kB min:53608kB low:67008kB high:80408kB active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB writepending:0kB present:3932160kB managed:3870184kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB lowmem_reserve[]: 0 0 0 0 Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB Node 0 DMA32: 2047*4kB (UM) 131*8kB (UME) 9*16kB (UE) 311*32kB (UME) 227*64kB (UME) 158*128kB (UM) 186*256kB (UM) 115*512kB (UME) 46*1024kB (UM) 9*2048kB (UME) 49*4096kB (UM) = 426820kB Node 0 Normal: 1*4kB (U) 1*8kB (U) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 12kB Node 1 Normal: 52*4kB (U) 212*8kB (U) 263*16kB (UE) 61*32kB (UME) 16*64kB (UME) 9*128kB (U) 7*256kB (UM) 4*512kB (UME) 3*1024kB (UM) 1*2048kB (E) 919*4096kB (M) = 3783424kB Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB 50564 total pagecache pages 0 pages in swap cache Swap cache stats: add 0, delete 0, find 0/0 Free swap = 0kB Total swap = 0kB 1965979 pages RAM 0 pages HighMem/MovableOnly 338856 pages reserved 0 pages cma reserved syz-executor.3: vmalloc: allocation failure: 0 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) syz-executor.3 cpuset=syz3 mems_allowed=0-1 kobject: 'loop5' (00000000ca2ec132): kobject_uevent_env CPU: 1 PID: 10055 Comm: syz-executor.3 Not tainted 4.19.37 #5 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x172/0x1f0 lib/dump_stack.c:113 warn_alloc.cold+0x7b/0x173 mm/page_alloc.c:3447 __vmalloc_node_range mm/vmalloc.c:1766 [inline] __vmalloc_node_range+0x484/0x790 mm/vmalloc.c:1732 __vmalloc_node mm/vmalloc.c:1795 [inline] __vmalloc_node_flags mm/vmalloc.c:1809 [inline] vmalloc+0x6b/0x90 mm/vmalloc.c:1831 sel_write_load+0x1de/0x470 security/selinux/selinuxfs.c:557 __vfs_write+0x116/0x820 fs/read_write.c:485 kobject: 'loop5' (00000000ca2ec132): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'kvm' (000000009e00f675): kobject_uevent_env kobject: 'kvm' (000000009e00f675): fill_kobj_path: path = '/devices/virtual/misc/kvm' vfs_write+0x20c/0x560 fs/read_write.c:549 ksys_write+0xea/0x1f0 fs/read_write.c:598 kobject: 'kvm' (000000009e00f675): kobject_uevent_env __do_sys_write fs/read_write.c:610 [inline] __se_sys_write fs/read_write.c:607 [inline] __x64_sys_write+0x73/0xb0 fs/read_write.c:607 do_syscall_64+0x103/0x610 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x458da9 kobject: 'kvm' (000000009e00f675): fill_kobj_path: path = '/devices/virtual/misc/kvm' Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007fa562dddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458da9 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 kobject: 'kvm' (000000009e00f675): kobject_uevent_env RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa562dde6d4 R13: 00000000004c88f7 R14: 00000000004df0c8 R15: 00000000ffffffff syz-executor.5: vmalloc: allocation failure: 0 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) kobject: 'loop3' (00000000df0b1c70): kobject_uevent_env syz-executor.5 cpuset= kobject: 'loop3' (00000000df0b1c70): fill_kobj_path: path = '/devices/virtual/block/loop3' syz5 kobject: 'kvm' (000000009e00f675): fill_kobj_path: path = '/devices/virtual/misc/kvm' mems_allowed=0-1 kobject: 'kvm' (000000009e00f675): kobject_uevent_env kobject: 'kvm' (000000009e00f675): fill_kobj_path: path = '/devices/virtual/misc/kvm' overlayfs: unrecognized mount option "uppe