FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 input: syz1 as /devices/virtual/input/input460 WARNING: CPU: 1 PID: 27881 at mm/slab_common.c:1031 kmalloc_slab+0x56/0x70 mm/slab_common.c:1031 kobject: 'event4' (00000000d8030cd5): kobject_add_internal: parent: 'input460', set: 'devices' Kernel panic - not syncing: panic_on_warn set ... CPU: 1 PID: 27881 Comm: syz-executor2 Not tainted 4.19.0-rc7+ #278 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: kobject: 'event4' (00000000d8030cd5): kobject_uevent_env __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1c4/0x2b4 lib/dump_stack.c:113 panic+0x238/0x4e7 kernel/panic.c:184 kobject: 'loop3' (00000000989f98ed): kobject_uevent_env kobject: 'loop3' (00000000989f98ed): fill_kobj_path: path = '/devices/virtual/block/loop3' __warn.cold.8+0x163/0x1ba kernel/panic.c:536 report_bug+0x254/0x2d0 lib/bug.c:186 kobject: 'event4' (00000000d8030cd5): fill_kobj_path: path = '/devices/virtual/input/input460/event4' fixup_bug arch/x86/kernel/traps.c:178 [inline] do_error_trap+0x1fc/0x4d0 arch/x86/kernel/traps.c:296 kobject: 'event4' (00000000d8030cd5): kobject_uevent_env kobject: 'loop0' (000000005ef60f07): kobject_uevent_env do_invalid_op+0x1b/0x20 arch/x86/kernel/traps.c:316 invalid_op+0x14/0x20 arch/x86/entry/entry_64.S:993 RIP: 0010:kmalloc_slab+0x56/0x70 mm/slab_common.c:1031 kobject: 'loop0' (000000005ef60f07): fill_kobj_path: path = '/devices/virtual/block/loop0' Code: c5 60 ab 00 89 5d c3 48 85 ff b8 10 00 00 00 74 f4 83 ef 01 c1 ef 03 0f b6 87 80 aa 00 89 eb d8 31 c0 81 e6 00 02 00 00 75 db <0f> 0b 5d c3 48 8b 04 c5 a0 aa 00 89 5d c3 66 90 66 2e 0f 1f 84 00 RSP: 0018:ffff88017d877978 EFLAGS: 00010246 kobject: 'input462' (00000000d6d5e76d): kobject_add_internal: parent: 'input', set: 'devices' RAX: 0000000000000000 RBX: 0000000080000000 RCX: ffffc90005e94000 RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000002000000020 RBP: ffff88017d877978 R08: ffff880185062440 R09: ffffed0039bba249 R10: ffff88017d877a48 R11: ffff8801cddd124f R12: 0000000000000000 kobject: 'loop3' (00000000989f98ed): kobject_uevent_env R13: 0000000000000000 R14: ffff88018fd81340 R15: 00000000006080c0 __do_kmalloc mm/slab.c:3713 [inline] __kmalloc+0x25/0x760 mm/slab.c:3727 kobject: 'loop3' (00000000989f98ed): fill_kobj_path: path = '/devices/virtual/block/loop3' kmalloc include/linux/slab.h:518 [inline] kzalloc include/linux/slab.h:707 [inline] input_mt_init_slots+0xe5/0x4a0 drivers/input/input-mt.c:52 uinput_create_device drivers/input/misc/uinput.c:335 [inline] uinput_ioctl_handler.isra.10+0x2049/0x2540 drivers/input/misc/uinput.c:876 kobject: 'event4' (00000000d8030cd5): fill_kobj_path: path = '/devices/virtual/input/input460/event4' uinput_ioctl+0x4c/0x60 drivers/input/misc/uinput.c:1047 kobject: 'input462' (00000000d6d5e76d): kobject_uevent_env vfs_ioctl fs/ioctl.c:46 [inline] file_ioctl fs/ioctl.c:501 [inline] do_vfs_ioctl+0x1de/0x1720 fs/ioctl.c:685 kobject: '(null)' (0000000092fa70c5): kobject_cleanup, parent 00000000d8030cd5 ksys_ioctl+0xa9/0xd0 fs/ioctl.c:702 __do_sys_ioctl fs/ioctl.c:709 [inline] __se_sys_ioctl fs/ioctl.c:707 [inline] __x64_sys_ioctl+0x73/0xb0 fs/ioctl.c:707 kobject: '(null)' (0000000092fa70c5): calling ktype release do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 kobject: 'input462' (00000000d6d5e76d): fill_kobj_path: path = '/devices/virtual/input/input462' kobject: 'input462' (00000000d6d5e76d): fill_kobj_path: path = '/devices/virtual/input/input462' entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457519 input: syz1 as /devices/virtual/input/input462 Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f36803d0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 0000000000457519 RDX: 0000000000000000 RSI: 0000000000005501 RDI: 0000000000000006 RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f36803d16d4 R13: 00000000004c1223 R14: 00000000004d1e18 R15: 00000000ffffffff CPU: 0 PID: 27876 Comm: syz-executor5 Not tainted 4.19.0-rc7+ #278 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1c4/0x2b4 lib/dump_stack.c:113 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold.4+0xa/0x17 lib/fault-inject.c:149 __should_failslab+0x124/0x180 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1557 slab_pre_alloc_hook mm/slab.h:423 [inline] slab_alloc mm/slab.c:3378 [inline] __do_kmalloc mm/slab.c:3716 [inline] __kmalloc+0x2d4/0x760 mm/slab.c:3727 kmalloc include/linux/slab.h:518 [inline] sock_kmalloc+0x15a/0x1f0 net/core/sock.c:1983 af_alg_alloc_areq+0x83/0x280 crypto/af_alg.c:1097 _aead_recvmsg crypto/algif_aead.c:157 [inline] aead_recvmsg+0x49d/0x1ba0 crypto/algif_aead.c:334 sock_recvmsg_nosec net/socket.c:794 [inline] sock_recvmsg+0xd0/0x110 net/socket.c:801 sock_read_iter+0x39b/0x570 net/socket.c:878 call_read_iter include/linux/fs.h:1802 [inline] do_iter_readv_writev+0x77c/0xa80 fs/read_write.c:678 do_iter_read+0x26e/0x650 fs/read_write.c:922 vfs_readv+0x175/0x1c0 fs/read_write.c:986 do_readv+0x11a/0x310 fs/read_write.c:1019 __do_sys_readv fs/read_write.c:1106 [inline] __se_sys_readv fs/read_write.c:1103 [inline] __x64_sys_readv+0x75/0xb0 fs/read_write.c:1103 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457519 Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007feafc1b7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 RAX: ffffffffffffffda RBX: 00007feafc1b7c90 RCX: 0000000000457519 RDX: 0000000000000001 RSI: 00000000200007c0 RDI: 0000000000000004 RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007feafc1b86d4 R13: 00000000004c3057 R14: 00000000004d4cb0 R15: 0000000000000005 Kernel Offset: disabled Rebooting in 86400 seconds..