protocol 88fb is buggy, dev hsr_slave_0 protocol 88fb is buggy, dev hsr_slave_1 ------------[ cut here ]------------ kernel BUG at fs/buffer.c:605! invalid opcode: 0000 [#1] PREEMPT SMP KASAN FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 Modules linked in: CPU: 1 PID: 5242 Comm: syz-executor.3 Not tainted 4.14.114 #4 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 task: ffff88805b05e480 task.stack: ffff888061088000 CPU: 0 PID: 5260 Comm: syz-executor.4 Not tainted 4.14.114 #4 RIP: 0010:mark_buffer_dirty_inode fs/buffer.c:605 [inline] RIP: 0010:mark_buffer_dirty_inode+0x2ea/0x3e0 fs/buffer.c:596 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RSP: 0018:ffff88806108f678 EFLAGS: 00010216 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x138/0x19c lib/dump_stack.c:53 RAX: 0000000000040000 RBX: ffff88805e2992a0 RCX: ffffc90007c4c000 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10f/0x159 lib/fault-inject.c:149 RDX: 00000000000308fa RSI: ffffffff8199673a RDI: ffff88805e3949b8 should_failslab+0xdb/0x130 mm/failslab.c:32 RBP: ffff88806108f6b0 R08: ffff88805b05e480 R09: 0000000000000004 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc_trace+0x2ec/0x790 mm/slab.c:3616 R10: 0000000000000000 R11: ffff88805b05e480 R12: ffff88805e394858 kmalloc include/linux/slab.h:488 [inline] perf_event_mmap_event kernel/events/core.c:7010 [inline] perf_event_mmap+0x413/0xbb0 kernel/events/core.c:7204 R13: 0000000000000000 R14: ffff8880a77c44a0 R15: 0000000000000aee FS: 00007effc455e700(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00000000004e65e0 CR3: 00000000a90c3000 CR4: 00000000001426e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 mmap_region+0x29b/0x1030 mm/mmap.c:1754 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 do_mmap+0x5b8/0xcd0 mm/mmap.c:1501 Call Trace: do_mmap_pgoff include/linux/mm.h:2165 [inline] vm_mmap_pgoff+0x17a/0x1d0 mm/util.c:333 fat16_ent_put+0xc5/0x100 fs/fat/fatent.c:181 fat_free_clusters+0x36f/0x810 fs/fat/fatent.c:593 SYSC_mmap_pgoff mm/mmap.c:1551 [inline] SyS_mmap_pgoff+0x3ca/0x520 mm/mmap.c:1509 fat_free fs/fat/file.c:346 [inline] fat_truncate_blocks+0x693/0xae0 fs/fat/file.c:364 SYSC_mmap arch/x86/kernel/sys_x86_64.c:100 [inline] SyS_mmap+0x16/0x20 arch/x86/kernel/sys_x86_64.c:91 do_syscall_64+0x1eb/0x630 arch/x86/entry/common.c:289 entry_SYSCALL_64_after_hwframe+0x42/0xb7 fat_setattr+0x6c1/0xae0 fs/fat/file.c:508 RIP: 0033:0x458da9 RSP: 002b:00007f4878713c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 RAX: ffffffffffffffda RBX: 00007f4878713c90 RCX: 0000000000458da9 notify_change+0x8d4/0xd10 fs/attr.c:313 RDX: 0000000000000000 RSI: 0000000000002000 RDI: 0000000020ffe000 do_truncate+0x124/0x1c0 fs/open.c:63 RBP: 000000000073bf00 R08: 0000000000000003 R09: 0000000000000000 R10: 0440000000202011 R11: 0000000000000246 R12: 00007f48787146d4 handle_truncate fs/namei.c:3009 [inline] do_last fs/namei.c:3434 [inline] path_openat+0x2788/0x3f70 fs/namei.c:3566 R13: 00000000004c4ced R14: 00000000004d8900 R15: 0000000000000005 kobject: 'loop5' (ffff8880a4b032e0): kobject_uevent_env do_filp_open+0x18e/0x250 fs/namei.c:3600 do_sys_open+0x2c5/0x430 fs/open.c:1065 SYSC_open fs/open.c:1083 [inline] SyS_open fs/open.c:1078 [inline] SYSC_creat fs/open.c:1123 [inline] SyS_creat+0x27/0x30 fs/open.c:1121 kobject: 'loop5' (ffff8880a4b032e0): fill_kobj_path: path = '/devices/virtual/block/loop5' do_syscall_64+0x1eb/0x630 arch/x86/entry/common.c:289 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x458da9 RSP: 002b:00007effc455dc78 EFLAGS: 00000246 kobject: 'loop4' (ffff8880a4a889e0): kobject_uevent_env ORIG_RAX: 0000000000000055 kobject: 'loop4' (ffff8880a4a889e0): fill_kobj_path: path = '/devices/virtual/block/loop4' RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 0000000000458da9 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000080 RBP: 000000000073c040 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007effc455e6d4 R13: 00000000004bf304 R14: 00000000004d0488 R15: 00000000ffffffff Code: fa 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 80 3c 02 00 75 4d 4c 89 63 58 4c 89 ef e8 10 a8 81 04 e9 13 fe ff ff e8 76 81 c3 ff <0f> 0b 4c 89 ff e8 dc 26 ed ff e9 f8 fd ff ff e8 d2 26 ed ff e9 RIP: mark_buffer_dirty_inode fs/buffer.c:605 [inline] RSP: ffff88806108f678 RIP: mark_buffer_dirty_inode+0x2ea/0x3e0 fs/buffer.c:596 RSP: ffff88806108f678 ---[ end trace 68da6acde5c2e573 ]---