================================================ WARNING: lock held when returning to user space! 4.20.0+ #10 Not tainted ------------------------------------------------ syz-executor5/25210 is leaving the kernel with locks still held! 1 lock held by syz-executor5/25210: #0: 0000000088a99264 (crtc_ww_class_acquire){+.+.}, at: set_property_atomic+0xb4/0x330 drivers/gpu/drm/drm_mode_object.c:462 kobject: 'loop2' (000000000f4da70d): kobject_uevent_env kobject: 'loop2' (000000000f4da70d): fill_kobj_path: path = '/devices/virtual/block/loop2' FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 kobject: 'loop0' (000000002ab55c6f): kobject_uevent_env kobject: 'kvm' (0000000008208536): kobject_uevent_env kobject: 'loop0' (000000002ab55c6f): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'kvm' (0000000008208536): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop3' (00000000109288c7): kobject_uevent_env kobject: 'kvm' (0000000008208536): kobject_uevent_env kobject: 'loop3' (00000000109288c7): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'kvm' (0000000008208536): fill_kobj_path: path = '/devices/virtual/misc/kvm' CPU: 1 PID: 25229 Comm: syz-executor1 Not tainted 4.20.0+ #10 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1db/0x2d0 lib/dump_stack.c:113 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0x15 lib/fault-inject.c:149 __should_failslab+0x121/0x190 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1603 slab_pre_alloc_hook mm/slab.h:423 [inline] slab_alloc mm/slab.c:3365 [inline] __do_kmalloc mm/slab.c:3707 [inline] __kmalloc+0x2dc/0x740 mm/slab.c:3718 kmalloc_array include/linux/slab.h:668 [inline] rw_copy_check_uvector+0x28c/0x330 fs/read_write.c:778 import_iovec+0xc1/0x2a0 lib/iov_iter.c:1624 vfs_readv+0xf5/0x1c0 fs/read_write.c:981 do_preadv+0x1c4/0x280 fs/read_write.c:1067 __do_sys_preadv fs/read_write.c:1117 [inline] __se_sys_preadv fs/read_write.c:1112 [inline] __x64_sys_preadv+0x9a/0xf0 fs/read_write.c:1112 do_syscall_64+0x1a3/0x800 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457ec9 Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f16b6287c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 RAX: ffffffffffffffda RBX: 00007f16b6287c90 RCX: 0000000000457ec9 RDX: 0000000000000391 RSI: 0000000020000140 RDI: 0000000000000007 RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f16b62886d4 R13: 00000000004c4861 R14: 00000000004d7d20 R15: 0000000000000008 kobject: 'loop0' (000000002ab55c6f): kobject_uevent_env kobject: 'loop0' (000000002ab55c6f): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'kvm' (0000000008208536): kobject_uevent_env FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 kobject: 'loop5' (000000004afab90d): kobject_uevent_env kobject: 'loop5' (000000004afab90d): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'kvm' (0000000008208536): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop2' (000000000f4da70d): kobject_uevent_env CPU: 1 PID: 25246 Comm: syz-executor5 Not tainted 4.20.0+ #10 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1db/0x2d0 lib/dump_stack.c:113 FAULT_INJECTION: forcing a failure. name fail_page_alloc, interval 1, probability 0, space 0, times 1 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0x15 lib/fault-inject.c:149 __should_failslab+0x121/0x190 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1603 slab_pre_alloc_hook mm/slab.h:423 [inline] slab_alloc mm/slab.c:3365 [inline] __do_kmalloc mm/slab.c:3707 [inline] __kmalloc+0x2dc/0x740 mm/slab.c:3718 kmalloc_array include/linux/slab.h:668 [inline] kcalloc include/linux/slab.h:679 [inline] drm_atomic_state_init+0x176/0x3c0 drivers/gpu/drm/drm_atomic.c:86 drm_atomic_state_alloc drivers/gpu/drm/drm_atomic.c:123 [inline] drm_atomic_state_alloc+0xcf/0x120 drivers/gpu/drm/drm_atomic.c:113 set_property_atomic+0xbc/0x330 drivers/gpu/drm/drm_mode_object.c:464 drm_mode_obj_set_property_ioctl+0x43f/0x780 drivers/gpu/drm/drm_mode_object.c:522 drm_connector_property_set_ioctl+0x1b5/0x2c0 drivers/gpu/drm/drm_connector.c:1841 drm_ioctl_kernel+0x278/0x340 drivers/gpu/drm/drm_ioctl.c:758 drm_ioctl+0x592/0xb50 drivers/gpu/drm/drm_ioctl.c:858 vfs_ioctl fs/ioctl.c:46 [inline] file_ioctl fs/ioctl.c:509 [inline] do_vfs_ioctl+0x107b/0x17d0 fs/ioctl.c:696 ksys_ioctl+0xab/0xd0 fs/ioctl.c:713 __do_sys_ioctl fs/ioctl.c:720 [inline] __se_sys_ioctl fs/ioctl.c:718 [inline] __x64_sys_ioctl+0x73/0xb0 fs/ioctl.c:718 do_syscall_64+0x1a3/0x800 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457ec9 Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f4f63cebc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007f4f63cebc90 RCX: 0000000000457ec9 RDX: 0000000020000000 RSI: 000000004010aeab RDI: 0000000000000005 RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4f63cec6d4 R13: 00000000004c0c01 R14: 00000000004d2668 R15: 0000000000000006 CPU: 0 PID: 25256 Comm: syz-executor1 Not tainted 4.20.0+ #10 kobject: 'loop2' (000000000f4da70d): fill_kobj_path: path = '/devices/virtual/block/loop2' Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1db/0x2d0 lib/dump_stack.c:113 kobject: 'loop1' (000000005dc4dc4d): kobject_uevent_env fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0x15 lib/fault-inject.c:149 kobject: 'loop1' (000000005dc4dc4d): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop2' (000000000f4da70d): kobject_uevent_env __should_fail_alloc_page mm/page_alloc.c:3146 [inline] should_fail_alloc_page+0x50/0x60 mm/page_alloc.c:3193 prepare_alloc_pages mm/page_alloc.c:4470 [inline] __alloc_pages_nodemask+0x323/0xdc0 mm/page_alloc.c:4517 kobject: 'loop2' (000000000f4da70d): fill_kobj_path: path = '/devices/virtual/block/loop2' __alloc_pages include/linux/gfp.h:473 [inline] __alloc_pages_node include/linux/gfp.h:486 [inline] kmem_getpages mm/slab.c:1396 [inline] cache_grow_begin+0x9c/0x8c0 mm/slab.c:2664 cache_alloc_refill mm/slab.c:3031 [inline] ____cache_alloc mm/slab.c:3114 [inline] ____cache_alloc mm/slab.c:3097 [inline] __do_cache_alloc mm/slab.c:3336 [inline] slab_alloc mm/slab.c:3371 [inline] __do_kmalloc mm/slab.c:3707 [inline] __kmalloc+0x67f/0x740 mm/slab.c:3718 kmalloc_array include/linux/slab.h:668 [inline] rw_copy_check_uvector+0x28c/0x330 fs/read_write.c:778 import_iovec+0xc1/0x2a0 lib/iov_iter.c:1624 vfs_readv+0xf5/0x1c0 fs/read_write.c:981 do_preadv+0x1c4/0x280 fs/read_write.c:1067 __do_sys_preadv fs/read_write.c:1117 [inline] __se_sys_preadv fs/read_write.c:1112 [inline] __x64_sys_preadv+0x9a/0xf0 fs/read_write.c:1112 do_syscall_64+0x1a3/0x800 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457ec9 Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f16b6287c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 RAX: ffffffffffffffda RBX: 00007f16b6287c90 RCX: 0000000000457ec9 RDX: 0000000000000391 RSI: 0000000020000140 RDI: 0000000000000007 RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f16b62886d4 R13: 00000000004c4861 R14: 00000000004d7d20 R15: 0000000000000008 kobject: 'kvm' (0000000008208536): kobject_uevent_env kobject: 'loop3' (00000000109288c7): kobject_uevent_env kobject: 'loop3' (00000000109288c7): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'kvm' (0000000008208536): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop2' (000000000f4da70d): kobject_uevent_env kobject: 'loop2' (000000000f4da70d): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop0' (000000002ab55c6f): kobject_uevent_env kobject: 'loop0' (000000002ab55c6f): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop1' (000000005dc4dc4d): kobject_uevent_env kobject: 'loop1' (000000005dc4dc4d): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop4' (000000003e4cec83): kobject_uevent_env kobject: 'kvm' (0000000008208536): kobject_uevent_env kobject: 'loop4' (000000003e4cec83): fill_kobj_path: path = '/devices/virtual/block/loop4' FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 kobject: 'loop2' (000000000f4da70d): kobject_uevent_env FAULT_INJECTION: forcing a failure. name fail_page_alloc, interval 1, probability 0, space 0, times 0 kobject: 'kvm' (0000000008208536): fill_kobj_path: path = '/devices/virtual/misc/kvm' CPU: 0 PID: 25285 Comm: syz-executor1 Not tainted 4.20.0+ #10 kobject: 'loop2' (000000000f4da70d): fill_kobj_path: path = '/devices/virtual/block/loop2' Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1db/0x2d0 lib/dump_stack.c:113 kobject: 'loop3' (00000000109288c7): kobject_uevent_env fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0x15 lib/fault-inject.c:149 kobject: 'loop3' (00000000109288c7): fill_kobj_path: path = '/devices/virtual/block/loop3' __should_fail_alloc_page mm/page_alloc.c:3146 [inline] should_fail_alloc_page+0x50/0x60 mm/page_alloc.c:3193 prepare_alloc_pages mm/page_alloc.c:4470 [inline] __alloc_pages_nodemask+0x323/0xdc0 mm/page_alloc.c:4517 alloc_pages_current+0x107/0x210 mm/mempolicy.c:2106 alloc_pages include/linux/gfp.h:509 [inline] __get_free_pages+0xc/0x40 mm/page_alloc.c:4573 mem_rw.isra.0+0xe7/0x640 fs/proc/base.c:809 mem_read+0x52/0x70 fs/proc/base.c:855 do_loop_readv_writev fs/read_write.c:700 [inline] do_loop_readv_writev fs/read_write.c:687 [inline] do_iter_read+0x4a9/0x660 fs/read_write.c:921 vfs_readv+0x175/0x1c0 fs/read_write.c:983 do_preadv+0x1c4/0x280 fs/read_write.c:1067 __do_sys_preadv fs/read_write.c:1117 [inline] __se_sys_preadv fs/read_write.c:1112 [inline] __x64_sys_preadv+0x9a/0xf0 fs/read_write.c:1112 do_syscall_64+0x1a3/0x800 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457ec9 Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f16b6287c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 RAX: ffffffffffffffda RBX: 00007f16b6287c90 RCX: 0000000000457ec9 RDX: 0000000000000391 RSI: 0000000020000140 RDI: 0000000000000007 RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f16b62886d4 R13: 00000000004c4861 R14: 00000000004d7d20 R15: 0000000000000008 CPU: 1 PID: 25272 Comm: syz-executor5 Not tainted 4.20.0+ #10 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 kobject: 'kvm' (0000000008208536): kobject_uevent_env Call Trace: kobject: 'kvm' (0000000008208536): fill_kobj_path: path = '/devices/virtual/misc/kvm' __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1db/0x2d0 lib/dump_stack.c:113 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0x15 lib/fault-inject.c:149 __should_failslab+0x121/0x190 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1603 slab_pre_alloc_hook mm/slab.h:423 [inline] slab_alloc mm/slab.c:3365 [inline] __do_kmalloc mm/slab.c:3707 [inline] __kmalloc+0x2dc/0x740 mm/slab.c:3718 kmalloc_array include/linux/slab.h:668 [inline] kcalloc include/linux/slab.h:679 [inline] drm_atomic_state_init+0x212/0x3c0 drivers/gpu/drm/drm_atomic.c:90 drm_atomic_state_alloc drivers/gpu/drm/drm_atomic.c:123 [inline] drm_atomic_state_alloc+0xcf/0x120 drivers/gpu/drm/drm_atomic.c:113 set_property_atomic+0xbc/0x330 drivers/gpu/drm/drm_mode_object.c:464 drm_mode_obj_set_property_ioctl+0x43f/0x780 drivers/gpu/drm/drm_mode_object.c:522 drm_connector_property_set_ioctl+0x1b5/0x2c0 drivers/gpu/drm/drm_connector.c:1841 drm_ioctl_kernel+0x278/0x340 drivers/gpu/drm/drm_ioctl.c:758 drm_ioctl+0x592/0xb50 drivers/gpu/drm/drm_ioctl.c:858 vfs_ioctl fs/ioctl.c:46 [inline] file_ioctl fs/ioctl.c:509 [inline] do_vfs_ioctl+0x107b/0x17d0 fs/ioctl.c:696 ksys_ioctl+0xab/0xd0 fs/ioctl.c:713 __do_sys_ioctl fs/ioctl.c:720 [inline] __se_sys_ioctl fs/ioctl.c:718 [inline] __x64_sys_ioctl+0x73/0xb0 fs/ioctl.c:718 do_syscall_64+0x1a3/0x800 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457ec9 Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f4f63cebc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007f4f63cebc90 RCX: 0000000000457ec9 RDX: 0000000020000000 RSI: 000000004010aeab RDI: 0000000000000005 RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4f63cec6d4 R13: 00000000004c0c01 R14: 00000000004d2668 R15: 0000000000000006 kobject: 'loop2' (000000000f4da70d): kobject_uevent_env kobject: 'loop2' (000000000f4da70d): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop1' (000000005dc4dc4d): kobject_uevent_env kobject: 'loop1' (000000005dc4dc4d): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'kvm' (0000000008208536): kobject_uevent_env kobject: 'loop0' (000000002ab55c6f): kobject_uevent_env kobject: 'kvm' (0000000008208536): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop0' (000000002ab55c6f): fill_kobj_path: path = '/devices/virtual/block/loop0' FAULT_INJECTION: forcing a failure. name fail_page_alloc, interval 1, probability 0, space 0, times 0 kobject: 'kvm' (0000000008208536): kobject_uevent_env kobject: 'loop3' (00000000109288c7): kobject_uevent_env kobject: 'loop3' (00000000109288c7): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'kvm' (0000000008208536): fill_kobj_path: path = '/devices/virtual/misc/kvm' CPU: 0 PID: 25312 Comm: syz-executor1 Not tainted 4.20.0+ #10 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1db/0x2d0 lib/dump_stack.c:113 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0x15 lib/fault-inject.c:149 __should_fail_alloc_page mm/page_alloc.c:3146 [inline] should_fail_alloc_page+0x50/0x60 mm/page_alloc.c:3193 prepare_alloc_pages mm/page_alloc.c:4470 [inline] __alloc_pages_nodemask+0x323/0xdc0 mm/page_alloc.c:4517 alloc_pages_current+0x107/0x210 mm/mempolicy.c:2106 alloc_pages include/linux/gfp.h:509 [inline] __get_free_pages+0xc/0x40 mm/page_alloc.c:4573 mem_rw.isra.0+0xe7/0x640 fs/proc/base.c:809 mem_read+0x52/0x70 fs/proc/base.c:855 do_loop_readv_writev fs/read_write.c:700 [inline] do_loop_readv_writev fs/read_write.c:687 [inline] do_iter_read+0x4a9/0x660 fs/read_write.c:921 vfs_readv+0x175/0x1c0 fs/read_write.c:983 do_preadv+0x1c4/0x280 fs/read_write.c:1067 __do_sys_preadv fs/read_write.c:1117 [inline] __se_sys_preadv fs/read_write.c:1112 [inline] __x64_sys_preadv+0x9a/0xf0 fs/read_write.c:1112 do_syscall_64+0x1a3/0x800 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457ec9 Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f16b6287c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 RAX: ffffffffffffffda RBX: 00007f16b6287c90 RCX: 0000000000457ec9 RDX: 0000000000000391 RSI: 0000000020000140 RDI: 0000000000000007 RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f16b62886d4 R13: 00000000004c4861 R14: 00000000004d7d20 R15: 0000000000000008 kobject: 'loop2' (000000000f4da70d): kobject_uevent_env kobject: 'loop2' (000000000f4da70d): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop5' (000000004afab90d): kobject_uevent_env kobject: 'loop5' (000000004afab90d): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop3' (00000000109288c7): kobject_uevent_env kobject: 'loop3' (00000000109288c7): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop0' (000000002ab55c6f): kobject_uevent_env kobject: 'loop0' (000000002ab55c6f): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop1' (000000005dc4dc4d): kobject_uevent_env kobject: 'loop1' (000000005dc4dc4d): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop4' (000000003e4cec83): kobject_uevent_env kobject: 'loop4' (000000003e4cec83): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'kvm' (0000000008208536): kobject_uevent_env kobject: 'loop2' (000000000f4da70d): kobject_uevent_env kobject: 'loop2' (000000000f4da70d): fill_kobj_path: path = '/devices/virtual/block/loop2' FAULT_INJECTION: forcing a failure. name fail_page_alloc, interval 1, probability 0, space 0, times 0 kobject: 'kvm' (0000000008208536): fill_kobj_path: path = '/devices/virtual/misc/kvm' CPU: 1 PID: 25337 Comm: syz-executor1 Not tainted 4.20.0+ #10 kobject: 'kvm' (0000000008208536): kobject_uevent_env Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 kobject: 'kvm' (0000000008208536): fill_kobj_path: path = '/devices/virtual/misc/kvm' Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1db/0x2d0 lib/dump_stack.c:113 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0x15 lib/fault-inject.c:149 __should_fail_alloc_page mm/page_alloc.c:3146 [inline] should_fail_alloc_page+0x50/0x60 mm/page_alloc.c:3193 prepare_alloc_pages mm/page_alloc.c:4470 [inline] __alloc_pages_nodemask+0x323/0xdc0 mm/page_alloc.c:4517 alloc_pages_current+0x107/0x210 mm/mempolicy.c:2106 alloc_pages include/linux/gfp.h:509 [inline] __get_free_pages+0xc/0x40 mm/page_alloc.c:4573 mem_rw.isra.0+0xe7/0x640 fs/proc/base.c:809 mem_read+0x52/0x70 fs/proc/base.c:855 do_loop_readv_writev fs/read_write.c:700 [inline] do_loop_readv_writev fs/read_write.c:687 [inline] do_iter_read+0x4a9/0x660 fs/read_write.c:921 vfs_readv+0x175/0x1c0 fs/read_write.c:983 do_preadv+0x1c4/0x280 fs/read_write.c:1067 __do_sys_preadv fs/read_write.c:1117 [inline] __se_sys_preadv fs/read_write.c:1112 [inline] __x64_sys_preadv+0x9a/0xf0 fs/read_write.c:1112 do_syscall_64+0x1a3/0x800 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457ec9 Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f16b6287c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 RAX: ffffffffffffffda RBX: 00007f16b6287c90 RCX: 0000000000457ec9 RDX: 0000000000000391 RSI: 0000000020000140 RDI: 0000000000000007 RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f16b62886d4 R13: 00000000004c4861 R14: 00000000004d7d20 R15: 0000000000000008 kobject: 'loop5' (000000004afab90d): kobject_uevent_env kobject: 'loop5' (000000004afab90d): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop3' (00000000109288c7): kobject_uevent_env kobject: 'loop3' (00000000109288c7): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop5' (000000004afab90d): kobject_uevent_env kobject: 'loop5' (000000004afab90d): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'kvm' (0000000008208536): kobject_uevent_env kobject: 'loop0' (000000002ab55c6f): kobject_uevent_env kobject: 'loop0' (000000002ab55c6f): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'kvm' (0000000008208536): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop2' (000000000f4da70d): kobject_uevent_env kobject: 'loop2' (000000000f4da70d): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'kvm' (0000000008208536): kobject_uevent_env kobject: 'kvm' (0000000008208536): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop1' (000000005dc4dc4d): kobject_uevent_env kobject: 'loop1' (000000005dc4dc4d): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop0' (000000002ab55c6f): kobject_uevent_env kobject: 'loop0' (000000002ab55c6f): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop4' (000000003e4cec83): kobject_uevent_env kobject: 'loop4' (000000003e4cec83): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'kvm' (0000000008208536): kobject_uevent_env kobject: 'kvm' (0000000008208536): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop2' (000000000f4da70d): kobject_uevent_env FAULT_INJECTION: forcing a failure. name fail_page_alloc, interval 1, probability 0, space 0, times 0 kobject: 'loop2' (000000000f4da70d): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop4' (000000003e4cec83): kobject_uevent_env kobject: 'kvm' (0000000008208536): kobject_uevent_env kobject: 'loop4' (000000003e4cec83): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'kvm' (0000000008208536): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop3' (00000000109288c7): kobject_uevent_env kobject: 'loop3' (00000000109288c7): fill_kobj_path: path = '/devices/virtual/block/loop3' CPU: 0 PID: 25381 Comm: syz-executor1 Not tainted 4.20.0+ #10 kobject: 'loop5' (000000004afab90d): kobject_uevent_env Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1db/0x2d0 lib/dump_stack.c:113 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0x15 lib/fault-inject.c:149 __should_fail_alloc_page mm/page_alloc.c:3146 [inline] should_fail_alloc_page+0x50/0x60 mm/page_alloc.c:3193 prepare_alloc_pages mm/page_alloc.c:4470 [inline] __alloc_pages_nodemask+0x323/0xdc0 mm/page_alloc.c:4517 alloc_pages_current+0x107/0x210 mm/mempolicy.c:2106 alloc_pages include/linux/gfp.h:509 [inline] __get_free_pages+0xc/0x40 mm/page_alloc.c:4573 mem_rw.isra.0+0xe7/0x640 fs/proc/base.c:809 mem_read+0x52/0x70 fs/proc/base.c:855 do_loop_readv_writev fs/read_write.c:700 [inline] do_loop_readv_writev fs/read_write.c:687 [inline] do_iter_read+0x4a9/0x660 fs/read_write.c:921 vfs_readv+0x175/0x1c0 fs/read_write.c:983 do_preadv+0x1c4/0x280 fs/read_write.c:1067 __do_sys_preadv fs/read_write.c:1117 [inline] __se_sys_preadv fs/read_write.c:1112 [inline] __x64_sys_preadv+0x9a/0xf0 fs/read_write.c:1112 do_syscall_64+0x1a3/0x800 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457ec9 Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f16b6287c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 RAX: ffffffffffffffda RBX: 00007f16b6287c90 RCX: 0000000000457ec9 RDX: 0000000000000391 RSI: 0000000020000140 RDI: 0000000000000007 RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f16b62886d4 R13: 00000000004c4861 R14: 00000000004d7d20 R15: 0000000000000008 kobject: 'loop5' (000000004afab90d): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop2' (000000000f4da70d): kobject_uevent_env kobject: 'loop2' (000000000f4da70d): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop2' (000000000f4da70d): kobject_uevent_env kobject: 'loop2' (000000000f4da70d): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop3' (00000000109288c7): kobject_uevent_env kobject: 'loop3' (00000000109288c7): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop5' (000000004afab90d): kobject_uevent_env kobject: 'loop5' (000000004afab90d): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop1' (000000005dc4dc4d): kobject_uevent_env kobject: 'loop1' (000000005dc4dc4d): fill_kobj_path: path = '/devices/virtual/block/loop1' FAULT_INJECTION: forcing a failure. name fail_page_alloc, interval 1, probability 0, space 0, times 0 kobject: 'loop2' (000000000f4da70d): kobject_uevent_env kobject: 'loop2' (000000000f4da70d): fill_kobj_path: path = '/devices/virtual/block/loop2' CPU: 1 PID: 25425 Comm: syz-executor1 Not tainted 4.20.0+ #10 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 kobject: 'loop5' (000000004afab90d): kobject_uevent_env Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1db/0x2d0 lib/dump_stack.c:113 kobject: 'loop5' (000000004afab90d): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop0' (000000002ab55c6f): kobject_uevent_env fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0x15 lib/fault-inject.c:149 kobject: 'loop0' (000000002ab55c6f): fill_kobj_path: path = '/devices/virtual/block/loop0' __should_fail_alloc_page mm/page_alloc.c:3146 [inline] should_fail_alloc_page+0x50/0x60 mm/page_alloc.c:3193 prepare_alloc_pages mm/page_alloc.c:4470 [inline] __alloc_pages_nodemask+0x323/0xdc0 mm/page_alloc.c:4517 kobject: 'loop2' (000000000f4da70d): kobject_uevent_env kobject: 'loop2' (000000000f4da70d): fill_kobj_path: path = '/devices/virtual/block/loop2' alloc_pages_current+0x107/0x210 mm/mempolicy.c:2106 alloc_pages include/linux/gfp.h:509 [inline] __get_free_pages+0xc/0x40 mm/page_alloc.c:4573 mem_rw.isra.0+0xe7/0x640 fs/proc/base.c:809 mem_read+0x52/0x70 fs/proc/base.c:855 do_loop_readv_writev fs/read_write.c:700 [inline] do_loop_readv_writev fs/read_write.c:687 [inline] do_iter_read+0x4a9/0x660 fs/read_write.c:921 vfs_readv+0x175/0x1c0 fs/read_write.c:983 do_preadv+0x1c4/0x280 fs/read_write.c:1067 __do_sys_preadv fs/read_write.c:1117 [inline] __se_sys_preadv fs/read_write.c:1112 [inline] __x64_sys_preadv+0x9a/0xf0 fs/read_write.c:1112 do_syscall_64+0x1a3/0x800 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457ec9 Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f16b6287c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 RAX: ffffffffffffffda RBX: 00007f16b6287c90 RCX: 0000000000457ec9 RDX: 0000000000000391 RSI: 0000000020000140 RDI: 0000000000000007 RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f16b62886d4 R13: 00000000004c4861 R14: 00000000004d7d20 R15: 0000000000000008 kobject: 'kvm' (0000000008208536): kobject_uevent_env kobject: 'kvm' (0000000008208536): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'kvm' (0000000008208536): kobject_uevent_env kobject: 'kvm' (0000000008208536): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop1' (000000005dc4dc4d): kobject_uevent_env kobject: 'loop1' (000000005dc4dc4d): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop0' (000000002ab55c6f): kobject_uevent_env kobject: 'loop0' (000000002ab55c6f): fill_kobj_path: path = '/devices/virtual/block/loop0'