RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f49559116d4 R13: 00000000004be93a R14: 00000000004ce5f0 R15: 0000000000000004 BUG: sleeping function called from invalid context at mm/slab.h:421 in_atomic(): 1, irqs_disabled(): 0, pid: 25505, name: syz-executor3 INFO: lockdep is turned off. Preemption disabled at: [] __do_softirq+0x189/0xb03 kernel/softirq.c:269 CPU: 1 PID: 25505 Comm: syz-executor3 Not tainted 4.19.0-rc6-next-20181002+ #85 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1d3/0x2c4 lib/dump_stack.c:113 ___might_sleep.cold.89+0x1ba/0x1f3 kernel/sched/core.c:6149 __might_sleep+0x95/0x190 kernel/sched/core.c:6102 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3378 [inline] kmem_cache_alloc_trace+0x2cd/0x750 mm/slab.c:3618 kmalloc include/linux/slab.h:546 [inline] kzalloc include/linux/slab.h:741 [inline] kobject_uevent_env+0x2f3/0x101e lib/kobject_uevent.c:514 kobject_uevent+0x1f/0x24 lib/kobject_uevent.c:636 kobject_cleanup lib/kobject.c:649 [inline] kobject_release lib/kobject.c:691 [inline] kref_put include/linux/kref.h:70 [inline] kobject_put.cold.9+0x170/0x2e4 lib/kobject.c:708 put_device+0x20/0x30 drivers/base/core.c:2024 delete_partition_rcu_cb+0x147/0x1b0 block/partition-generic.c:259 __rcu_reclaim kernel/rcu/rcu.h:240 [inline] rcu_do_batch kernel/rcu/tree.c:2437 [inline] invoke_rcu_callbacks kernel/rcu/tree.c:2716 [inline] rcu_process_callbacks+0xff9/0x1ad0 kernel/rcu/tree.c:2697 __do_softirq+0x30b/0xb03 kernel/softirq.c:292 invoke_softirq kernel/softirq.c:373 [inline] irq_exit+0x17f/0x1c0 kernel/softirq.c:413 exiting_irq arch/x86/include/asm/apic.h:536 [inline] smp_apic_timer_interrupt+0x1cb/0x750 arch/x86/kernel/apic/apic.c:1061 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:804 RIP: 0010:__pipe_lock fs/pipe.c:83 [inline] RIP: 0010:pipe_read+0xf5/0x940 fs/pipe.c:260 Code: 85 c8 00 00 00 48 89 c2 48 89 45 b8 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 0f b6 04 02 84 c0 74 08 3c 03 0f 8e 12 07 00 00 <41> 8b 85 c8 00 00 00 48 c7 45 c0 00 00 00 00 49 bf 00 00 00 00 00 RSP: 0018:ffff8801859c7ad8 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 RAX: 0000000000000000 RBX: 0000000000000038 RCX: 0000000000000000 RDX: 1ffff1003a6e1fa9 RSI: 0000000000000008 RDI: ffffed0030b38f48 RBP: ffff8801859c7b68 R08: ffffed003a6e1f91 R09: ffffed003a6e1f90 R10: ffff8801859c7ac8 R11: ffff8801d370fc87 R12: ffff8801859c7cc8 R13: ffff8801d370fc80 R14: ffff8801859c7c68 R15: ffff8801859c7d90 call_read_iter include/linux/fs.h:1838 [inline] new_sync_read fs/read_write.c:406 [inline] __vfs_read+0x6ac/0x9b0 fs/read_write.c:418 vfs_read+0x17f/0x3c0 fs/read_write.c:452 ksys_read+0x101/0x260 fs/read_write.c:578 __do_sys_read fs/read_write.c:588 [inline] __se_sys_read fs/read_write.c:586 [inline] __x64_sys_read+0x73/0xb0 fs/read_write.c:586 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x410fd0 Code: 01 f0 ff ff 0f 83 c0 19 00 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 83 3d dd 4f 63 00 00 75 14 b8 00 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 94 19 00 00 c3 48 83 ec 08 e8 6a fc ff ff RSP: 002b:00007ffd8ad08b08 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000410fd0 RDX: 0000000000000038 RSI: 0000000000728020 RDI: 00000000000000f9 RBP: 0000000000000003 R08: 0000000000006000 R09: 0000000000004000 R10: 00007ffd8ad084a0 R11: 0000000000000246 R12: 0000000000000003 R13: 00000000000d8645 R14: 0000000000000473 R15: 0000000000000003 CPU: 0 PID: 25543 Comm: syz-executor4 Tainted: G W 4.19.0-rc6-next-20181002+ #85 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1d3/0x2c4 lib/dump_stack.c:113 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold.4+0xa/0x17 lib/fault-inject.c:149 __should_failslab+0x124/0x180 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1578 slab_pre_alloc_hook mm/slab.h:423 [inline] slab_alloc_node mm/slab.c:3299 [inline] kmem_cache_alloc_node_trace+0x270/0x740 mm/slab.c:3661 __do_kmalloc_node mm/slab.c:3681 [inline] __kmalloc_node_track_caller+0x33/0x70 mm/slab.c:3696 __kmalloc_reserve.isra.39+0x41/0xe0 net/core/skbuff.c:137 __alloc_skb+0x150/0x770 net/core/skbuff.c:205 alloc_skb include/linux/skbuff.h:997 [inline] __ip6_append_data.isra.47+0x2738/0x3530 net/ipv6/ip6_output.c:1425 ip6_append_data+0x1bc/0x2d0 net/ipv6/ip6_output.c:1587 rawv6_sendmsg+0x15a8/0x4630 net/ipv6/raw.c:926 inet_sendmsg+0x19c/0x690 net/ipv4/af_inet.c:798 sock_sendmsg_nosec net/socket.c:622 [inline] sock_sendmsg+0xd5/0x120 net/socket.c:632 sock_write_iter+0x35e/0x5c0 net/socket.c:901 call_write_iter include/linux/fs.h:1844 [inline] new_sync_write fs/read_write.c:474 [inline] __vfs_write+0x6b8/0x9f0 fs/read_write.c:487 vfs_write+0x1fc/0x560 fs/read_write.c:549 ksys_write+0x101/0x260 fs/read_write.c:598 __do_sys_write fs/read_write.c:610 [inline] __se_sys_write fs/read_write.c:607 [inline] __x64_sys_write+0x73/0xb0 fs/read_write.c:607 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457579 Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007fd500034c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 00007fd500034c90 RCX: 0000000000457579 RDX: 0000000000000000 RSI: 00000000200003c0 RDI: 0000000000000005 RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5000356d4 R13: 00000000004c5560 R14: 00000000004d8e80 R15: 0000000000000006 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 25570 Comm: syz-executor1 Tainted: G W 4.19.0-rc6-next-20181002+ #85 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1d3/0x2c4 lib/dump_stack.c:113 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold.4+0xa/0x17 lib/fault-inject.c:149 __should_failslab+0x124/0x180 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1578 slab_pre_alloc_hook mm/slab.h:423 [inline] slab_alloc mm/slab.c:3378 [inline] __do_kmalloc mm/slab.c:3716 [inline] __kmalloc+0x2d4/0x760 mm/slab.c:3727 kmalloc include/linux/slab.h:551 [inline] kzalloc include/linux/slab.h:741 [inline] kobject_get_path+0xc2/0x1b0 lib/kobject.c:171 kobject_uevent_env+0x314/0x101e lib/kobject_uevent.c:519 kobject_uevent+0x1f/0x24 lib/kobject_uevent.c:636 device_del+0x6c9/0xb70 drivers/base/core.c:2091 delete_partition+0x233/0x2c0 block/partition-generic.c:288 blkpg_ioctl+0x3c5/0xc10 block/ioctl.c:93 blkdev_ioctl+0x1864/0x2010 block/ioctl.c:573 block_ioctl+0xee/0x130 fs/block_dev.c:1883 vfs_ioctl fs/ioctl.c:46 [inline] file_ioctl fs/ioctl.c:501 [inline] do_vfs_ioctl+0x1de/0x1720 fs/ioctl.c:685 ksys_ioctl+0xa9/0xd0 fs/ioctl.c:702 __do_sys_ioctl fs/ioctl.c:709 [inline] __se_sys_ioctl fs/ioctl.c:707 [inline] __x64_sys_ioctl+0x73/0xb0 fs/ioctl.c:707 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457579 Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f4955910c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007f4955910c90 RCX: 0000000000457579 RDX: 00000000200006c0 RSI: 0000000000001269 RDI: 0000000000000003 RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f49559116d4 R13: 00000000004be93a R14: 00000000004ce5f0 R15: 0000000000000004 BUG: sleeping function called from invalid context at mm/slab.h:421 in_atomic(): 1, irqs_disabled(): 0, pid: 25583, name: syz-executor4 INFO: lockdep is turned off. Preemption disabled at: [] spin_lock include/linux/spinlock.h:329 [inline] [] zap_pte_range mm/memory.c:1052 [inline] [] zap_pmd_range mm/memory.c:1193 [inline] [] zap_pud_range mm/memory.c:1222 [inline] [] zap_p4d_range mm/memory.c:1243 [inline] [] unmap_page_range+0x98f/0x2510 mm/memory.c:1264 CPU: 0 PID: 25583 Comm: syz-executor4 Tainted: G W 4.19.0-rc6-next-20181002+ #85 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1d3/0x2c4 lib/dump_stack.c:113 ___might_sleep.cold.89+0x1ba/0x1f3 kernel/sched/core.c:6149 __might_sleep+0x95/0x190 kernel/sched/core.c:6102 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3378 [inline] kmem_cache_alloc_trace+0x2cd/0x750 mm/slab.c:3618 kmalloc include/linux/slab.h:546 [inline] kzalloc include/linux/slab.h:741 [inline] kobject_uevent_env+0x2f3/0x101e lib/kobject_uevent.c:514 kobject_uevent+0x1f/0x24 lib/kobject_uevent.c:636 kobject_cleanup lib/kobject.c:649 [inline] kobject_release lib/kobject.c:691 [inline] kref_put include/linux/kref.h:70 [inline] kobject_put.cold.9+0x170/0x2e4 lib/kobject.c:708 put_device+0x20/0x30 drivers/base/core.c:2024 delete_partition_rcu_cb+0x147/0x1b0 block/partition-generic.c:259 __rcu_reclaim kernel/rcu/rcu.h:240 [inline] rcu_do_batch kernel/rcu/tree.c:2437 [inline] invoke_rcu_callbacks kernel/rcu/tree.c:2716 [inline] rcu_process_callbacks+0xff9/0x1ad0 kernel/rcu/tree.c:2697 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 __do_softirq+0x30b/0xb03 kernel/softirq.c:292 invoke_softirq kernel/softirq.c:373 [inline] irq_exit+0x17f/0x1c0 kernel/softirq.c:413 exiting_irq arch/x86/include/asm/apic.h:536 [inline] smp_apic_timer_interrupt+0x1cb/0x750 arch/x86/kernel/apic/apic.c:1061 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:804 RIP: 0010:page_remove_rmap+0x84/0x1a30 mm/rmap.c:1298 Code: c8 fc ff ff a0 6f b6 81 c7 00 f1 f1 f1 f1 c7 40 04 00 f2 f2 f2 c7 40 08 f2 f2 f2 f2 c7 40 0c 00 f2 f2 f2 c7 40 10 f2 f2 f2 f2 40 14 00 f2 f2 f2 c7 40 18 f2 f2 f2 f2 c7 40 1c 00 f2 f2 f2 c7 RSP: 0018:ffff88018bdde8c8 EFLAGS: 00000286 ORIG_RAX: ffffffffffffff13 RAX: ffffed00317bbd1e RBX: ffffea0007148ac0 RCX: ffffffff81b0f881 RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffea0007148ac0 RBP: ffff88018bddec38 R08: ffff8801d18562c0 R09: fffff94000e29a8e R10: fffff94000e29a8e R11: ffffea000714d473 R12: 0000000000000000 R13: ffff88018bddec10 R14: ffffea0007148ac8 R15: dffffc0000000000 zap_pte_range mm/memory.c:1091 [inline] zap_pmd_range mm/memory.c:1193 [inline] zap_pud_range mm/memory.c:1222 [inline] zap_p4d_range mm/memory.c:1243 [inline] unmap_page_range+0xf53/0x2510 mm/memory.c:1264 unmap_single_vma+0x19b/0x310 mm/memory.c:1309 unmap_vmas+0x125/0x200 mm/memory.c:1339 exit_mmap+0x2be/0x590 mm/mmap.c:3121 __mmput kernel/fork.c:1045 [inline] mmput+0x247/0x610 kernel/fork.c:1066 exit_mm kernel/exit.c:545 [inline] do_exit+0xe6f/0x2610 kernel/exit.c:854 do_group_exit+0x177/0x440 kernel/exit.c:970 get_signal+0x8a8/0x1970 kernel/signal.c:2517 do_signal+0x9c/0x21e0 arch/x86/kernel/signal.c:816 exit_to_usermode_loop+0x2e5/0x380 arch/x86/entry/common.c:162 prepare_exit_to_usermode arch/x86/entry/common.c:197 [inline] syscall_return_slowpath arch/x86/entry/common.c:268 [inline] do_syscall_64+0x6be/0x820 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457579 Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007fd500034cf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: fffffffffffffe00 RBX: 000000000072bf08 RCX: 0000000000457579 RDX: 0000000000000000 RSI: 0000000000000080 RDI: 000000000072bf08 RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000072bf0c R13: 00007ffebcf916af R14: 00007fd5000359c0 R15: 0000000000000000 BUG: sleeping function called from invalid context at mm/slab.c:3066 CPU: 1 PID: 25587 Comm: syz-executor1 Tainted: G W 4.19.0-rc6-next-20181002+ #85 in_atomic(): 1, irqs_disabled(): 0, pid: 25583, name: syz-executor4 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1d3/0x2c4 lib/dump_stack.c:113 INFO: lockdep is turned off. fail_dump lib/fault-inject.c:51 [inline] should_fail.cold.4+0xa/0x17 lib/fault-inject.c:149 Preemption disabled at: [] spin_lock include/linux/spinlock.h:329 [inline] [] zap_pte_range mm/memory.c:1052 [inline] [] zap_pmd_range mm/memory.c:1193 [inline] [] zap_pud_range mm/memory.c:1222 [inline] [] zap_p4d_range mm/memory.c:1243 [inline] [] unmap_page_range+0x98f/0x2510 mm/memory.c:1264 __should_failslab+0x124/0x180 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1578 slab_pre_alloc_hook mm/slab.h:423 [inline] slab_alloc_node mm/slab.c:3299 [inline] kmem_cache_alloc_node+0x26e/0x730 mm/slab.c:3642 __alloc_skb+0x114/0x770 net/core/skbuff.c:193 alloc_skb include/linux/skbuff.h:997 [inline] alloc_uevent_skb+0x84/0x1da lib/kobject_uevent.c:288 uevent_net_broadcast_untagged lib/kobject_uevent.c:324 [inline] kobject_uevent_net_broadcast lib/kobject_uevent.c:406 [inline] kobject_uevent_env+0xa52/0x101e lib/kobject_uevent.c:587 kobject_uevent+0x1f/0x24 lib/kobject_uevent.c:636 device_del+0x6c9/0xb70 drivers/base/core.c:2091 delete_partition+0x233/0x2c0 block/partition-generic.c:288 blkpg_ioctl+0x3c5/0xc10 block/ioctl.c:93 blkdev_ioctl+0x1864/0x2010 block/ioctl.c:573 block_ioctl+0xee/0x130 fs/block_dev.c:1883 vfs_ioctl fs/ioctl.c:46 [inline] file_ioctl fs/ioctl.c:501 [inline] do_vfs_ioctl+0x1de/0x1720 fs/ioctl.c:685 ksys_ioctl+0xa9/0xd0 fs/ioctl.c:702 __do_sys_ioctl fs/ioctl.c:709 [inline] __se_sys_ioctl fs/ioctl.c:707 [inline] __x64_sys_ioctl+0x73/0xb0 fs/ioctl.c:707 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457579 Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f4955910c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007f4955910c90 RCX: 0000000000457579 RDX: 00000000200006c0 RSI: 0000000000001269 RDI: 0000000000000003 RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f49559116d4 R13: 00000000004be93a R14: 00000000004ce5f0 R15: 0000000000000004 CPU: 0 PID: 25583 Comm: syz-executor4 Tainted: G W 4.19.0-rc6-next-20181002+ #85 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1d3/0x2c4 lib/dump_stack.c:113 ___might_sleep.cold.89+0x1ba/0x1f3 kernel/sched/core.c:6149 __might_sleep+0x95/0x190 kernel/sched/core.c:6102 cache_alloc_debugcheck_before mm/slab.c:3066 [inline] slab_alloc mm/slab.c:3382 [inline] kmem_cache_alloc_trace+0x307/0x750 mm/slab.c:3618 kmalloc include/linux/slab.h:546 [inline] kzalloc include/linux/slab.h:741 [inline] kobject_uevent_env+0x2f3/0x101e lib/kobject_uevent.c:514 kobject_uevent+0x1f/0x24 lib/kobject_uevent.c:636 kobject_cleanup lib/kobject.c:649 [inline] kobject_release lib/kobject.c:691 [inline] kref_put include/linux/kref.h:70 [inline] kobject_put.cold.9+0x170/0x2e4 lib/kobject.c:708 put_device+0x20/0x30 drivers/base/core.c:2024 delete_partition_rcu_cb+0x147/0x1b0 block/partition-generic.c:259 __rcu_reclaim kernel/rcu/rcu.h:240 [inline] rcu_do_batch kernel/rcu/tree.c:2437 [inline] invoke_rcu_callbacks kernel/rcu/tree.c:2716 [inline] rcu_process_callbacks+0xff9/0x1ad0 kernel/rcu/tree.c:2697 __do_softirq+0x30b/0xb03 kernel/softirq.c:292 invoke_softirq kernel/softirq.c:373 [inline] irq_exit+0x17f/0x1c0 kernel/softirq.c:413 exiting_irq arch/x86/include/asm/apic.h:536 [inline] smp_apic_timer_interrupt+0x1cb/0x750 arch/x86/kernel/apic/apic.c:1061 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:804 RIP: 0010:page_remove_rmap+0x84/0x1a30 mm/rmap.c:1298 Code: c8 fc ff ff a0 6f b6 81 c7 00 f1 f1 f1 f1 c7 40 04 00 f2 f2 f2 c7 40 08 f2 f2 f2 f2 c7 40 0c 00 f2 f2 f2 c7 40 10 f2 f2 f2 f2 40 14 00 f2 f2 f2 c7 40 18 f2 f2 f2 f2 c7 40 1c 00 f2 f2 f2 c7 RSP: 0018:ffff88018bdde8c8 EFLAGS: 00000286 ORIG_RAX: ffffffffffffff13 RAX: ffffed00317bbd1e RBX: ffffea0007148ac0 RCX: ffffffff81b0f881 RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffea0007148ac0 RBP: ffff88018bddec38 R08: ffff8801d18562c0 R09: fffff94000e29a8e R10: fffff94000e29a8e R11: ffffea000714d473 R12: 0000000000000000 R13: ffff88018bddec10 R14: ffffea0007148ac8 R15: dffffc0000000000 zap_pte_range mm/memory.c:1091 [inline] zap_pmd_range mm/memory.c:1193 [inline] zap_pud_range mm/memory.c:1222 [inline] zap_p4d_range mm/memory.c:1243 [inline] unmap_page_range+0xf53/0x2510 mm/memory.c:1264 unmap_single_vma+0x19b/0x310 mm/memory.c:1309 unmap_vmas+0x125/0x200 mm/memory.c:1339 exit_mmap+0x2be/0x590 mm/mmap.c:3121 __mmput kernel/fork.c:1045 [inline] mmput+0x247/0x610 kernel/fork.c:1066 exit_mm kernel/exit.c:545 [inline] do_exit+0xe6f/0x2610 kernel/exit.c:854 do_group_exit+0x177/0x440 kernel/exit.c:970 get_signal+0x8a8/0x1970 kernel/signal.c:2517 do_signal+0x9c/0x21e0 arch/x86/kernel/signal.c:816 exit_to_usermode_loop+0x2e5/0x380 arch/x86/entry/common.c:162 prepare_exit_to_usermode arch/x86/entry/common.c:197 [inline] syscall_return_slowpath arch/x86/entry/common.c:268 [inline] do_syscall_64+0x6be/0x820 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457579 Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007fd500034cf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: fffffffffffffe00 RBX: 000000000072bf08 RCX: 0000000000457579 RDX: 0000000000000000 RSI: 0000000000000080 RDI: 000000000072bf08 RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000072bf0c R13: 00007ffebcf916af R14: 00007fd5000359c0 R15: 0000000000000000 BUG: sleeping function called from invalid context at mm/slab.h:421 in_atomic(): 1, irqs_disabled(): 0, pid: 25583, name: syz-executor4 INFO: lockdep is turned off. Preemption disabled at: [] spin_lock include/linux/spinlock.h:329 [inline] [] zap_pte_range mm/memory.c:1052 [inline] [] zap_pmd_range mm/memory.c:1193 [inline] [] zap_pud_range mm/memory.c:1222 [inline] [] zap_p4d_range mm/memory.c:1243 [inline] [] unmap_page_range+0x98f/0x2510 mm/memory.c:1264 CPU: 0 PID: 25583 Comm: syz-executor4 Tainted: G W 4.19.0-rc6-next-20181002+ #85 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1d3/0x2c4 lib/dump_stack.c:113 ___might_sleep.cold.89+0x1ba/0x1f3 kernel/sched/core.c:6149 __might_sleep+0x95/0x190 kernel/sched/core.c:6102 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3378 [inline] __do_kmalloc mm/slab.c:3716 [inline] __kmalloc+0x2ca/0x760 mm/slab.c:3727 kmalloc include/linux/slab.h:551 [inline] kzalloc include/linux/slab.h:741 [inline] kobject_get_path+0xc2/0x1b0 lib/kobject.c:171 kobject_uevent_env+0x314/0x101e lib/kobject_uevent.c:519 kobject_uevent+0x1f/0x24 lib/kobject_uevent.c:636 kobject_cleanup lib/kobject.c:649 [inline] kobject_release lib/kobject.c:691 [inline] kref_put include/linux/kref.h:70 [inline] kobject_put.cold.9+0x170/0x2e4 lib/kobject.c:708 put_device+0x20/0x30 drivers/base/core.c:2024 delete_partition_rcu_cb+0x147/0x1b0 block/partition-generic.c:259 __rcu_reclaim kernel/rcu/rcu.h:240 [inline] rcu_do_batch kernel/rcu/tree.c:2437 [inline] invoke_rcu_callbacks kernel/rcu/tree.c:2716 [inline] rcu_process_callbacks+0xff9/0x1ad0 kernel/rcu/tree.c:2697 __do_softirq+0x30b/0xb03 kernel/softirq.c:292 invoke_softirq kernel/softirq.c:373 [inline] irq_exit+0x17f/0x1c0 kernel/softirq.c:413 exiting_irq arch/x86/include/asm/apic.h:536 [inline] smp_apic_timer_interrupt+0x1cb/0x750 arch/x86/kernel/apic/apic.c:1061 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:804 RIP: 0010:page_remove_rmap+0x84/0x1a30 mm/rmap.c:1298 Code: c8 fc ff ff a0 6f b6 81 c7 00 f1 f1 f1 f1 c7 40 04 00 f2 f2 f2 c7 40 08 f2 f2 f2 f2 c7 40 0c 00 f2 f2 f2 c7 40 10 f2 f2 f2 f2 40 14 00 f2 f2 f2 c7 40 18 f2 f2 f2 f2 c7 40 1c 00 f2 f2 f2 c7 RSP: 0018:ffff88018bdde8c8 EFLAGS: 00000286 ORIG_RAX: ffffffffffffff13 RAX: ffffed00317bbd1e RBX: ffffea0007148ac0 RCX: ffffffff81b0f881 RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffea0007148ac0 RBP: ffff88018bddec38 R08: ffff8801d18562c0 R09: fffff94000e29a8e R10: fffff94000e29a8e R11: ffffea000714d473 R12: 0000000000000000 R13: ffff88018bddec10 R14: ffffea0007148ac8 R15: dffffc0000000000 zap_pte_range mm/memory.c:1091 [inline] zap_pmd_range mm/memory.c:1193 [inline] zap_pud_range mm/memory.c:1222 [inline] zap_p4d_range mm/memory.c:1243 [inline] unmap_page_range+0xf53/0x2510 mm/memory.c:1264 unmap_single_vma+0x19b/0x310 mm/memory.c:1309 unmap_vmas+0x125/0x200 mm/memory.c:1339 exit_mmap+0x2be/0x590 mm/mmap.c:3121 __mmput kernel/fork.c:1045 [inline] mmput+0x247/0x610 kernel/fork.c:1066 exit_mm kernel/exit.c:545 [inline] do_exit+0xe6f/0x2610 kernel/exit.c:854 do_group_exit+0x177/0x440 kernel/exit.c:970 get_signal+0x8a8/0x1970 kernel/signal.c:2517 do_signal+0x9c/0x21e0 arch/x86/kernel/signal.c:816 exit_to_usermode_loop+0x2e5/0x380 arch/x86/entry/common.c:162 prepare_exit_to_usermode arch/x86/entry/common.c:197 [inline] syscall_return_slowpath arch/x86/entry/common.c:268 [inline] do_syscall_64+0x6be/0x820 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457579 Code: Bad RIP value. RSP: 002b:00007fd500034cf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: fffffffffffffe00 RBX: 000000000072bf08 RCX: 0000000000457579 RDX: 0000000000000000 RSI: 0000000000000080 RDI: 000000000072bf08 RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000072bf0c R13: 00007ffebcf916af R14: 00007fd5000359c0 R15: 0000000000000000 BUG: sleeping function called from invalid context at mm/slab.c:3066 in_atomic(): 1, irqs_disabled(): 0, pid: 25583, name: syz-executor4 INFO: lockdep is turned off. Preemption disabled at: [] spin_lock include/linux/spinlock.h:329 [inline] [] zap_pte_range mm/memory.c:1052 [inline] [] zap_pmd_range mm/memory.c:1193 [inline] [] zap_pud_range mm/memory.c:1222 [inline] [] zap_p4d_range mm/memory.c:1243 [inline] [] unmap_page_range+0x98f/0x2510 mm/memory.c:1264 CPU: 0 PID: 25583 Comm: syz-executor4 Tainted: G W 4.19.0-rc6-next-20181002+ #85 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1d3/0x2c4 lib/dump_stack.c:113 ___might_sleep.cold.89+0x1ba/0x1f3 kernel/sched/core.c:6149 __might_sleep+0x95/0x190 kernel/sched/core.c:6102 cache_alloc_debugcheck_before mm/slab.c:3066 [inline] slab_alloc mm/slab.c:3382 [inline] __do_kmalloc mm/slab.c:3716 [inline] __kmalloc+0x304/0x760 mm/slab.c:3727 kmalloc include/linux/slab.h:551 [inline] kzalloc include/linux/slab.h:741 [inline] kobject_get_path+0xc2/0x1b0 lib/kobject.c:171 kobject_uevent_env+0x314/0x101e lib/kobject_uevent.c:519 kobject_uevent+0x1f/0x24 lib/kobject_uevent.c:636 kobject_cleanup lib/kobject.c:649 [inline] kobject_release lib/kobject.c:691 [inline] kref_put include/linux/kref.h:70 [inline] kobject_put.cold.9+0x170/0x2e4 lib/kobject.c:708 put_device+0x20/0x30 drivers/base/core.c:2024 delete_partition_rcu_cb+0x147/0x1b0 block/partition-generic.c:259 __rcu_reclaim kernel/rcu/rcu.h:240 [inline] rcu_do_batch kernel/rcu/tree.c:2437 [inline] invoke_rcu_callbacks kernel/rcu/tree.c:2716 [inline] rcu_process_callbacks+0xff9/0x1ad0 kernel/rcu/tree.c:2697 __do_softirq+0x30b/0xb03 kernel/softirq.c:292 invoke_softirq kernel/softirq.c:373 [inline] irq_exit+0x17f/0x1c0 kernel/softirq.c:413 exiting_irq arch/x86/include/asm/apic.h:536 [inline] smp_apic_timer_interrupt+0x1cb/0x750 arch/x86/kernel/apic/apic.c:1061 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:804 RIP: 0010:page_remove_rmap+0x84/0x1a30 mm/rmap.c:1298 Code: c8 fc ff ff a0 6f b6 81 c7 00 f1 f1 f1 f1 c7 40 04 00 f2 f2 f2 c7 40 08 f2 f2 f2 f2 c7 40 0c 00 f2 f2 f2 c7 40 10 f2 f2 f2 f2 40 14 00 f2 f2 f2 c7 40 18 f2 f2 f2 f2 c7 40 1c 00 f2 f2 f2 c7 RSP: 0018:ffff88018bdde8c8 EFLAGS: 00000286 ORIG_RAX: ffffffffffffff13 RAX: ffffed00317bbd1e RBX: ffffea0007148ac0 RCX: ffffffff81b0f881 RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffea0007148ac0 RBP: ffff88018bddec38 R08: ffff8801d18562c0 R09: fffff94000e29a8e R10: fffff94000e29a8e R11: ffffea000714d473 R12: 0000000000000000 R13: ffff88018bddec10 R14: ffffea0007148ac8 R15: dffffc0000000000 zap_pte_range mm/memory.c:1091 [inline] zap_pmd_range mm/memory.c:1193 [inline] zap_pud_range mm/memory.c:1222 [inline] zap_p4d_range mm/memory.c:1243 [inline] unmap_page_range+0xf53/0x2510 mm/memory.c:1264 unmap_single_vma+0x19b/0x310 mm/memory.c:1309 unmap_vmas+0x125/0x200 mm/memory.c:1339 exit_mmap+0x2be/0x590 mm/mmap.c:3121 __mmput kernel/fork.c:1045 [inline] mmput+0x247/0x610 kernel/fork.c:1066 exit_mm kernel/exit.c:545 [inline] do_exit+0xe6f/0x2610 kernel/exit.c:854 do_group_exit+0x177/0x440 kernel/exit.c:970 get_signal+0x8a8/0x1970 kernel/signal.c:2517 do_signal+0x9c/0x21e0 arch/x86/kernel/signal.c:816 exit_to_usermode_loop+0x2e5/0x380 arch/x86/entry/common.c:162 prepare_exit_to_usermode arch/x86/entry/common.c:197 [inline] syscall_return_slowpath arch/x86/entry/common.c:268 [inline] do_syscall_64+0x6be/0x820 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457579 Code: Bad RIP value. RSP: 002b:00007fd500034cf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: fffffffffffffe00 RBX: 000000000072bf08 RCX: 0000000000457579 RDX: 0000000000000000 RSI: 0000000000000080 RDI: 000000000072bf08 RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000072bf0c R13: 00007ffebcf916af R14: 00007fd5000359c0 R15: 0000000000000000 BUG: sleeping function called from invalid context at kernel/locking/mutex.c:908 EXT4-fs warning: 10 callbacks suppressed EXT4-fs warning (device sda1): ext4_group_add:1637: No reserved GDT blocks, can't resize in_atomic(): 1, irqs_disabled(): 0, pid: 25583, name: syz-executor4 INFO: lockdep is turned off. Preemption disabled at: [] spin_lock include/linux/spinlock.h:329 [inline] [] zap_pte_range mm/memory.c:1052 [inline] [] zap_pmd_range mm/memory.c:1193 [inline] [] zap_pud_range mm/memory.c:1222 [inline] [] zap_p4d_range mm/memory.c:1243 [inline] [] unmap_page_range+0x98f/0x2510 mm/memory.c:1264 CPU: 0 PID: 25583 Comm: syz-executor4 Tainted: G W 4.19.0-rc6-next-20181002+ #85 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1d3/0x2c4 lib/dump_stack.c:113 ___might_sleep.cold.89+0x1ba/0x1f3 kernel/sched/core.c:6149 __might_sleep+0x95/0x190 kernel/sched/core.c:6102 __mutex_lock_common kernel/locking/mutex.c:908 [inline] __mutex_lock+0x138/0x1700 kernel/locking/mutex.c:1072 mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:1087 kobject_uevent_env+0x7d7/0x101e lib/kobject_uevent.c:580 kobject_uevent+0x1f/0x24 lib/kobject_uevent.c:636 kobject_cleanup lib/kobject.c:649 [inline] kobject_release lib/kobject.c:691 [inline] kref_put include/linux/kref.h:70 [inline] kobject_put.cold.9+0x170/0x2e4 lib/kobject.c:708 put_device+0x20/0x30 drivers/base/core.c:2024 delete_partition_rcu_cb+0x147/0x1b0 block/partition-generic.c:259 __rcu_reclaim kernel/rcu/rcu.h:240 [inline] rcu_do_batch kernel/rcu/tree.c:2437 [inline] invoke_rcu_callbacks kernel/rcu/tree.c:2716 [inline] rcu_process_callbacks+0xff9/0x1ad0 kernel/rcu/tree.c:2697 __do_softirq+0x30b/0xb03 kernel/softirq.c:292 invoke_softirq kernel/softirq.c:373 [inline] irq_exit+0x17f/0x1c0 kernel/softirq.c:413 exiting_irq arch/x86/include/asm/apic.h:536 [inline] smp_apic_timer_interrupt+0x1cb/0x750 arch/x86/kernel/apic/apic.c:1061 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:804 RIP: 0010:page_remove_rmap+0x84/0x1a30 mm/rmap.c:1298 Code: c8 fc ff ff a0 6f b6 81 c7 00 f1 f1 f1 f1 c7 40 04 00 f2 f2 f2 c7 40 08 f2 f2 f2 f2 c7 40 0c 00 f2 f2 f2 c7 40 10 f2 f2 f2 f2 40 14 00 f2 f2 f2 c7 40 18 f2 f2 f2 f2 c7 40 1c 00 f2 f2 f2 c7 RSP: 0018:ffff88018bdde8c8 EFLAGS: 00000286 ORIG_RAX: ffffffffffffff13 RAX: ffffed00317bbd1e RBX: ffffea0007148ac0 RCX: ffffffff81b0f881 RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffea0007148ac0 RBP: ffff88018bddec38 R08: ffff8801d18562c0 R09: fffff94000e29a8e R10: fffff94000e29a8e R11: ffffea000714d473 R12: 0000000000000000 R13: ffff88018bddec10 R14: ffffea0007148ac8 R15: dffffc0000000000 zap_pte_range mm/memory.c:1091 [inline] zap_pmd_range mm/memory.c:1193 [inline] zap_pud_range mm/memory.c:1222 [inline] zap_p4d_range mm/memory.c:1243 [inline] unmap_page_range+0xf53/0x2510 mm/memory.c:1264 unmap_single_vma+0x19b/0x310 mm/memory.c:1309 unmap_vmas+0x125/0x200 mm/memory.c:1339 exit_mmap+0x2be/0x590 mm/mmap.c:3121 __mmput kernel/fork.c:1045 [inline] mmput+0x247/0x610 kernel/fork.c:1066 exit_mm kernel/exit.c:545 [inline] do_exit+0xe6f/0x2610 kernel/exit.c:854 do_group_exit+0x177/0x440 kernel/exit.c:970 get_signal+0x8a8/0x1970 kernel/signal.c:2517 do_signal+0x9c/0x21e0 arch/x86/kernel/signal.c:816 exit_to_usermode_loop+0x2e5/0x380 arch/x86/entry/common.c:162 prepare_exit_to_usermode arch/x86/entry/common.c:197 [inline] syscall_return_slowpath arch/x86/entry/common.c:268 [inline] do_syscall_64+0x6be/0x820 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457579 Code: Bad RIP value. RSP: 002b:00007fd500034cf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: fffffffffffffe00 RBX: 000000000072bf08 RCX: 0000000000457579 RDX: 0000000000000000 RSI: 0000000000000080 RDI: 000000000072bf08 RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000072bf0c R13: 00007ffebcf916af R14: 00007fd5000359c0 R15: 0000000000000000 BUG: sleeping function called from invalid context at mm/slab.h:421 in_atomic(): 1, irqs_disabled(): 0, pid: 25583, name: syz-executor4 INFO: lockdep is turned off. Preemption disabled at: [] spin_lock include/linux/spinlock.h:329 [inline] [] zap_pte_range mm/memory.c:1052 [inline] [] zap_pmd_range mm/memory.c:1193 [inline] [] zap_pud_range mm/memory.c:1222 [inline] [] zap_p4d_range mm/memory.c:1243 [inline] [] unmap_page_range+0x98f/0x2510 mm/memory.c:1264 CPU: 0 PID: 25583 Comm: syz-executor4 Tainted: G W 4.19.0-rc6-next-20181002+ #85 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1d3/0x2c4 lib/dump_stack.c:113 ___might_sleep.cold.89+0x1ba/0x1f3 kernel/sched/core.c:6149 __might_sleep+0x95/0x190 kernel/sched/core.c:6102 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc_node mm/slab.c:3299 [inline] kmem_cache_alloc_node+0x264/0x730 mm/slab.c:3642 __alloc_skb+0x114/0x770 net/core/skbuff.c:193 alloc_skb include/linux/skbuff.h:997 [inline] alloc_uevent_skb+0x84/0x1da lib/kobject_uevent.c:288 uevent_net_broadcast_untagged lib/kobject_uevent.c:324 [inline] kobject_uevent_net_broadcast lib/kobject_uevent.c:406 [inline] kobject_uevent_env+0xa52/0x101e lib/kobject_uevent.c:587 kobject_uevent+0x1f/0x24 lib/kobject_uevent.c:636 kobject_cleanup lib/kobject.c:649 [inline] kobject_release lib/kobject.c:691 [inline] kref_put include/linux/kref.h:70 [inline] kobject_put.cold.9+0x170/0x2e4 lib/kobject.c:708 put_device+0x20/0x30 drivers/base/core.c:2024 delete_partition_rcu_cb+0x147/0x1b0 block/partition-generic.c:259 __rcu_reclaim kernel/rcu/rcu.h:240 [inline] rcu_do_batch kernel/rcu/tree.c:2437 [inline] invoke_rcu_callbacks kernel/rcu/tree.c:2716 [inline] rcu_process_callbacks+0xff9/0x1ad0 kernel/rcu/tree.c:2697 __do_softirq+0x30b/0xb03 kernel/softirq.c:292 invoke_softirq kernel/softirq.c:373 [inline] irq_exit+0x17f/0x1c0 kernel/softirq.c:413 exiting_irq arch/x86/include/asm/apic.h:536 [inline] smp_apic_timer_interrupt+0x1cb/0x750 arch/x86/kernel/apic/apic.c:1061 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:804 RIP: 0010:page_remove_rmap+0x84/0x1a30 mm/rmap.c:1298 Code: c8 fc ff ff a0 6f b6 81 c7 00 f1 f1 f1 f1 c7 40 04 00 f2 f2 f2 c7 40 08 f2 f2 f2 f2 c7 40 0c 00 f2 f2 f2 c7 40 10 f2 f2 f2 f2 40 14 00 f2 f2 f2 c7 40 18 f2 f2 f2 f2 c7 40 1c 00 f2 f2 f2 c7 RSP: 0018:ffff88018bdde8c8 EFLAGS: 00000286 ORIG_RAX: ffffffffffffff13 RAX: ffffed00317bbd1e RBX: ffffea0007148ac0 RCX: ffffffff81b0f881 RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffea0007148ac0 RBP: ffff88018bddec38 R08: ffff8801d18562c0 R09: fffff94000e29a8e R10: fffff94000e29a8e R11: ffffea000714d473 R12: 0000000000000000 R13: ffff88018bddec10 R14: ffffea0007148ac8 R15: dffffc0000000000 zap_pte_range mm/memory.c:1091 [inline] zap_pmd_range mm/memory.c:1193 [inline] zap_pud_range mm/memory.c:1222 [inline] zap_p4d_range mm/memory.c:1243 [inline] unmap_page_range+0xf53/0x2510 mm/memory.c:1264 unmap_single_vma+0x19b/0x310 mm/memory.c:1309 unmap_vmas+0x125/0x200 mm/memory.c:1339 exit_mmap+0x2be/0x590 mm/mmap.c:3121 __mmput kernel/fork.c:1045 [inline] mmput+0x247/0x610 kernel/fork.c:1066 exit_mm kernel/exit.c:545 [inline] do_exit+0xe6f/0x2610 kernel/exit.c:854 do_group_exit+0x177/0x440 kernel/exit.c:970 get_signal+0x8a8/0x1970 kernel/signal.c:2517 do_signal+0x9c/0x21e0 arch/x86/kernel/signal.c:816 exit_to_usermode_loop+0x2e5/0x380 arch/x86/entry/common.c:162 prepare_exit_to_usermode arch/x86/entry/common.c:197 [inline] syscall_return_slowpath arch/x86/entry/common.c:268 [inline] do_syscall_64+0x6be/0x820 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457579 Code: Bad RIP value. RSP: 002b:00007fd500034cf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: fffffffffffffe00 RBX: 000000000072bf08 RCX: 0000000000457579 RDX: 0000000000000000 RSI: 0000000000000080 RDI: 000000000072bf08 RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000072bf0c R13: 00007ffebcf916af R14: 00007fd5000359c0 R15: 0000000000000000 BUG: sleeping function called from invalid context at mm/slab.c:3066 in_atomic(): 1, irqs_disabled(): 0, pid: 25583, name: syz-executor4 INFO: lockdep is turned off. Preemption disabled at: [] spin_lock include/linux/spinlock.h:329 [inline] [] zap_pte_range mm/memory.c:1052 [inline] [] zap_pmd_range mm/memory.c:1193 [inline] [] zap_pud_range mm/memory.c:1222 [inline] [] zap_p4d_range mm/memory.c:1243 [inline] [] unmap_page_range+0x98f/0x2510 mm/memory.c:1264 CPU: 0 PID: 25583 Comm: syz-executor4 Tainted: G W 4.19.0-rc6-next-20181002+ #85 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1d3/0x2c4 lib/dump_stack.c:113 ___might_sleep.cold.89+0x1ba/0x1f3 kernel/sched/core.c:6149 __might_sleep+0x95/0x190 kernel/sched/core.c:6102 cache_alloc_debugcheck_before mm/slab.c:3066 [inline] slab_alloc_node mm/slab.c:3303 [inline] kmem_cache_alloc_node+0x29e/0x730 mm/slab.c:3642 __alloc_skb+0x114/0x770 net/core/skbuff.c:193 alloc_skb include/linux/skbuff.h:997 [inline] alloc_uevent_skb+0x84/0x1da lib/kobject_uevent.c:288 uevent_net_broadcast_untagged lib/kobject_uevent.c:324 [inline] kobject_uevent_net_broadcast lib/kobject_uevent.c:406 [inline] kobject_uevent_env+0xa52/0x101e lib/kobject_uevent.c:587 kobject_uevent+0x1f/0x24 lib/kobject_uevent.c:636 kobject_cleanup lib/kobject.c:649 [inline] kobject_release lib/kobject.c:691 [inline] kref_put include/linux/kref.h:70 [inline] kobject_put.cold.9+0x170/0x2e4 lib/kobject.c:708 put_device+0x20/0x30 drivers/base/core.c:2024 delete_partition_rcu_cb+0x147/0x1b0 block/partition-generic.c:259 __rcu_reclaim kernel/rcu/rcu.h:240 [inline] rcu_do_batch kernel/rcu/tree.c:2437 [inline] invoke_rcu_callbacks kernel/rcu/tree.c:2716 [inline] rcu_process_callbacks+0xff9/0x1ad0 kernel/rcu/tree.c:2697 __do_softirq+0x30b/0xb03 kernel/softirq.c:292 invoke_softirq kernel/softirq.c:373 [inline] irq_exit+0x17f/0x1c0 kernel/softirq.c:413 exiting_irq arch/x86/include/asm/apic.h:536 [inline] smp_apic_timer_interrupt+0x1cb/0x750 arch/x86/kernel/apic/apic.c:1061 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:804 RIP: 0010:page_remove_rmap+0x84/0x1a30 mm/rmap.c:1298 Code: c8 fc ff ff a0 6f b6 81 c7 00 f1 f1 f1 f1 c7 40 04 00 f2 f2 f2 c7 40 08 f2 f2 f2 f2 c7 40 0c 00 f2 f2 f2 c7 40 10 f2 f2 f2 f2 40 14 00 f2 f2 f2 c7 40 18 f2 f2 f2 f2 c7 40 1c 00 f2 f2 f2 c7 RSP: 0018:ffff88018bdde8c8 EFLAGS: 00000286 ORIG_RAX: ffffffffffffff13 RAX: ffffed00317bbd1e RBX: ffffea0007148ac0 RCX: ffffffff81b0f881 RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffea0007148ac0 RBP: ffff88018bddec38 R08: ffff8801d18562c0 R09: fffff94000e29a8e R10: fffff94000e29a8e R11: ffffea000714d473 R12: 0000000000000000 R13: ffff88018bddec10 R14: ffffea0007148ac8 R15: dffffc0000000000 zap_pte_range mm/memory.c:1091 [inline] zap_pmd_range mm/memory.c:1193 [inline] zap_pud_range mm/memory.c:1222 [inline] zap_p4d_range mm/memory.c:1243 [inline] unmap_page_range+0xf53/0x2510 mm/memory.c:1264 unmap_single_vma+0x19b/0x310 mm/memory.c:1309 unmap_vmas+0x125/0x200 mm/memory.c:1339 exit_mmap+0x2be/0x590 mm/mmap.c:3121 __mmput kernel/fork.c:1045 [inline] mmput+0x247/0x610 kernel/fork.c:1066 exit_mm kernel/exit.c:545 [inline] do_exit+0xe6f/0x2610 kernel/exit.c:854 do_group_exit+0x177/0x440 kernel/exit.c:970 get_signal+0x8a8/0x1970 kernel/signal.c:2517 do_signal+0x9c/0x21e0 arch/x86/kernel/signal.c:816 exit_to_usermode_loop+0x2e5/0x380 arch/x86/entry/common.c:162 prepare_exit_to_usermode arch/x86/entry/common.c:197 [inline] syscall_return_slowpath arch/x86/entry/common.c:268 [inline] do_syscall_64+0x6be/0x820 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457579 Code: Bad RIP value. RSP: 002b:00007fd500034cf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: fffffffffffffe00 RBX: 000000000072bf08 RCX: 0000000000457579 RDX: 0000000000000000 RSI: 0000000000000080 RDI: 000000000072bf08 RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000072bf0c R13: 00007ffebcf916af R14: 00007fd5000359c0 R15: 0000000000000000 BUG: sleeping function called from invalid context at mm/slab.h:421 in_atomic(): 1, irqs_disabled(): 0, pid: 25583, name: syz-executor4 INFO: lockdep is turned off. Preemption disabled at: [] spin_lock include/linux/spinlock.h:329 [inline] [] zap_pte_range mm/memory.c:1052 [inline] [] zap_pmd_range mm/memory.c:1193 [inline] [] zap_pud_range mm/memory.c:1222 [inline] [] zap_p4d_range mm/memory.c:1243 [inline] [] unmap_page_range+0x98f/0x2510 mm/memory.c:1264 CPU: 0 PID: 25583 Comm: syz-executor4 Tainted: G W 4.19.0-rc6-next-20181002+ #85 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1d3/0x2c4 lib/dump_stack.c:113 ___might_sleep.cold.89+0x1ba/0x1f3 kernel/sched/core.c:6149 __might_sleep+0x95/0x190 kernel/sched/core.c:6102 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc_node mm/slab.c:3299 [inline] kmem_cache_alloc_node_trace+0x266/0x740 mm/slab.c:3661 __do_kmalloc_node mm/slab.c:3681 [inline] __kmalloc_node_track_caller+0x33/0x70 mm/slab.c:3696 __kmalloc_reserve.isra.39+0x41/0xe0 net/core/skbuff.c:137 __alloc_skb+0x150/0x770 net/core/skbuff.c:205 alloc_skb include/linux/skbuff.h:997 [inline] alloc_uevent_skb+0x84/0x1da lib/kobject_uevent.c:288 uevent_net_broadcast_untagged lib/kobject_uevent.c:324 [inline] kobject_uevent_net_broadcast lib/kobject_uevent.c:406 [inline] kobject_uevent_env+0xa52/0x101e lib/kobject_uevent.c:587 kobject_uevent+0x1f/0x24 lib/kobject_uevent.c:636 kobject_cleanup lib/kobject.c:649 [inline] kobject_release lib/kobject.c:691 [inline] kref_put include/linux/kref.h:70 [inline] kobject_put.cold.9+0x170/0x2e4 lib/kobject.c:708 put_device+0x20/0x30 drivers/base/core.c:2024 delete_partition_rcu_cb+0x147/0x1b0 block/partition-generic.c:259 __rcu_reclaim kernel/rcu/rcu.h:240 [inline] rcu_do_batch kernel/rcu/tree.c:2437 [inline] invoke_rcu_callbacks kernel/rcu/tree.c:2716 [inline] rcu_process_callbacks+0xff9/0x1ad0 kernel/rcu/tree.c:2697 __do_softirq+0x30b/0xb03 kernel/softirq.c:292 invoke_softirq kernel/softirq.c:373 [inline] irq_exit+0x17f/0x1c0 kernel/softirq.c:413 exiting_irq arch/x86/include/asm/apic.h:536 [inline] smp_apic_timer_interrupt+0x1cb/0x750 arch/x86/kernel/apic/apic.c:1061