================================ WARNING: inconsistent lock state kobject: 'loop2' (000000000d2bbf46): kobject_uevent_env 4.20.0+ #169 Not tainted -------------------------------- inconsistent {SOFTIRQ-ON-W} -> {IN-SOFTIRQ-W} usage. syz-executor1/8320 [HC0[0]:SC1[1]:HE1:SE0] takes: 00000000c81d620f (fs_reclaim){+.?.}, at: fs_reclaim_acquire.part.96+0x0/0x30 mm/internal.h:79 {SOFTIRQ-ON-W} state was registered at: kobject: 'loop2' (000000000d2bbf46): fill_kobj_path: path = '/devices/virtual/block/loop2' lock_acquire+0x1ed/0x520 kernel/locking/lockdep.c:3844 __fs_reclaim_acquire mm/page_alloc.c:3730 [inline] fs_reclaim_acquire.part.96+0x24/0x30 mm/page_alloc.c:3741 fs_reclaim_acquire+0x14/0x20 mm/page_alloc.c:3742 slab_pre_alloc_hook mm/slab.h:418 [inline] slab_alloc_node mm/slab.c:3299 [inline] kmem_cache_alloc_node_trace+0x3c/0x740 mm/slab.c:3661 kmalloc_node include/linux/slab.h:584 [inline] kzalloc_node include/linux/slab.h:752 [inline] alloc_worker+0xc5/0x300 kernel/workqueue.c:1704 kobject: 'kvm' (000000005ea08e82): kobject_uevent_env init_rescuer.part.25+0x1f/0x190 kernel/workqueue.c:4028 init_rescuer kernel/workqueue.c:4025 [inline] workqueue_init+0x491/0x744 kernel/workqueue.c:5794 kernel_init_freeable+0x2b0/0x5b4 init/main.c:1139 kobject: 'kvm' (000000005ea08e82): fill_kobj_path: path = '/devices/virtual/misc/kvm' kernel_init+0x11/0x1ae init/main.c:1071 kobject: 'loop3' (00000000914c79b2): kobject_uevent_env ret_from_fork+0x3a/0x50 arch/x86/entry/entry_64.S:352 irq event stamp: 5458238 kobject: 'loop3' (00000000914c79b2): fill_kobj_path: path = '/devices/virtual/block/loop3' hardirqs last enabled at (5458238): [] console_unlock+0x947/0x1180 kernel/printk/printk.c:2443 hardirqs last disabled at (5458237): [] console_unlock+0x2d9/0x1180 kernel/printk/printk.c:2353 softirqs last enabled at (5457870): [] spin_unlock_bh include/linux/spinlock.h:374 [inline] softirqs last enabled at (5457870): [] release_sock+0x1ec/0x2c0 net/core/sock.c:2800 softirqs last disabled at (5458199): [] invoke_softirq kernel/softirq.c:373 [inline] softirqs last disabled at (5458199): [] irq_exit+0x17f/0x1c0 kernel/softirq.c:413 other info that might help us debug this: Possible unsafe locking scenario: kobject: 'loop4' (00000000bb372aad): kobject_uevent_env CPU0 ---- lock(fs_reclaim); lock(fs_reclaim); *** DEADLOCK *** 6 locks held by syz-executor1/8320: #0: 00000000823c0883 (&dup_mmap_sem){.+.+}, at: dup_mmap kernel/fork.c:476 [inline] #0: 00000000823c0883 (&dup_mmap_sem){.+.+}, at: dup_mm kernel/fork.c:1323 [inline] #0: 00000000823c0883 (&dup_mmap_sem){.+.+}, at: copy_mm kernel/fork.c:1378 [inline] #0: 00000000823c0883 (&dup_mmap_sem){.+.+}, at: copy_process+0x365e/0x8790 kernel/fork.c:1922 #1: 00000000299d4407 (&mm->mmap_sem){++++}, at: dup_mmap kernel/fork.c:477 [inline] #1: 00000000299d4407 (&mm->mmap_sem){++++}, at: dup_mm kernel/fork.c:1323 [inline] #1: 00000000299d4407 (&mm->mmap_sem){++++}, at: copy_mm kernel/fork.c:1378 [inline] #1: 00000000299d4407 (&mm->mmap_sem){++++}, at: copy_process+0x367a/0x8790 kernel/fork.c:1922 #2: 00000000e667f4e4 (&mm->mmap_sem/1){+.+.}, at: dup_mmap kernel/fork.c:486 [inline] #2: 00000000e667f4e4 (&mm->mmap_sem/1){+.+.}, at: dup_mm kernel/fork.c:1323 [inline] #2: 00000000e667f4e4 (&mm->mmap_sem/1){+.+.}, at: copy_mm kernel/fork.c:1378 [inline] #2: 00000000e667f4e4 (&mm->mmap_sem/1){+.+.}, at: copy_process+0x36d2/0x8790 kernel/fork.c:1922 kobject: 'loop4' (00000000bb372aad): fill_kobj_path: path = '/devices/virtual/block/loop4' #3: 00000000a0ca1e6c (&(ptlock_ptr(page))->rlock#2){+.+.}, at: spin_lock include/linux/spinlock.h:329 [inline] #3: 00000000a0ca1e6c (&(ptlock_ptr(page))->rlock#2){+.+.}, at: copy_pte_range mm/memory.c:830 [inline] #3: 00000000a0ca1e6c (&(ptlock_ptr(page))->rlock#2){+.+.}, at: copy_pmd_range mm/memory.c:906 [inline] #3: 00000000a0ca1e6c (&(ptlock_ptr(page))->rlock#2){+.+.}, at: copy_pud_range mm/memory.c:940 [inline] #3: 00000000a0ca1e6c (&(ptlock_ptr(page))->rlock#2){+.+.}, at: copy_p4d_range mm/memory.c:962 [inline] #3: 00000000a0ca1e6c (&(ptlock_ptr(page))->rlock#2){+.+.}, at: copy_page_range+0xa48/0x26b0 mm/memory.c:1024 #4: 0000000068890673 (&(ptlock_ptr(page))->rlock#2/1){+.+.}, at: copy_pte_range mm/memory.c:835 [inline] #4: 0000000068890673 (&(ptlock_ptr(page))->rlock#2/1){+.+.}, at: copy_pmd_range mm/memory.c:906 [inline] #4: 0000000068890673 (&(ptlock_ptr(page))->rlock#2/1){+.+.}, at: copy_pud_range mm/memory.c:940 [inline] #4: 0000000068890673 (&(ptlock_ptr(page))->rlock#2/1){+.+.}, at: copy_p4d_range mm/memory.c:962 [inline] #4: 0000000068890673 (&(ptlock_ptr(page))->rlock#2/1){+.+.}, at: copy_page_range+0xad8/0x26b0 mm/memory.c:1024 #5: 0000000067d084fc (rcu_callback){....}, at: __rcu_reclaim kernel/rcu/rcu.h:228 [inline] #5: 0000000067d084fc (rcu_callback){....}, at: rcu_do_batch kernel/rcu/tree.c:2437 [inline] #5: 0000000067d084fc (rcu_callback){....}, at: invoke_rcu_callbacks kernel/rcu/tree.c:2716 [inline] #5: 0000000067d084fc (rcu_callback){....}, at: rcu_process_callbacks+0x1103/0x1ac0 kernel/rcu/tree.c:2697 kobject: 'kvm' (000000005ea08e82): kobject_uevent_env stack backtrace: kobject: 'kvm' (000000005ea08e82): fill_kobj_path: path = '/devices/virtual/misc/kvm' CPU: 1 PID: 8320 Comm: syz-executor1 Not tainted 4.20.0+ #169 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1d3/0x2c6 lib/dump_stack.c:113 print_usage_bug.cold.59+0x320/0x41a kernel/locking/lockdep.c:2472 valid_state kernel/locking/lockdep.c:2485 [inline] mark_lock_irq kernel/locking/lockdep.c:2679 [inline] mark_lock+0x1114/0x1cc0 kernel/locking/lockdep.c:3059 mark_irqflags kernel/locking/lockdep.c:2937 [inline] __lock_acquire+0x15b0/0x4c20 kernel/locking/lockdep.c:3298 lock_acquire+0x1ed/0x520 kernel/locking/lockdep.c:3844 __fs_reclaim_acquire mm/page_alloc.c:3730 [inline] fs_reclaim_acquire.part.96+0x24/0x30 mm/page_alloc.c:3741 fs_reclaim_acquire+0x14/0x20 mm/page_alloc.c:3742 slab_pre_alloc_hook mm/slab.h:418 [inline] slab_alloc mm/slab.c:3378 [inline] kmem_cache_alloc_trace+0x2d/0x750 mm/slab.c:3618 kmalloc include/linux/slab.h:546 [inline] kzalloc include/linux/slab.h:741 [inline] kobject_uevent_env+0x2f3/0x101e lib/kobject_uevent.c:514 kobject_uevent+0x1f/0x24 lib/kobject_uevent.c:636 kobject_cleanup lib/kobject.c:649 [inline] kobject_release lib/kobject.c:691 [inline] kref_put include/linux/kref.h:70 [inline] kobject_put.cold.9+0x170/0x2e4 lib/kobject.c:708 put_device+0x20/0x30 drivers/base/core.c:2048 delete_partition_rcu_cb+0x147/0x1b0 block/partition-generic.c:259 __rcu_reclaim kernel/rcu/rcu.h:240 [inline] rcu_do_batch kernel/rcu/tree.c:2437 [inline] invoke_rcu_callbacks kernel/rcu/tree.c:2716 [inline] rcu_process_callbacks+0x100a/0x1ac0 kernel/rcu/tree.c:2697 __do_softirq+0x30c/0xb2e kernel/softirq.c:292 invoke_softirq kernel/softirq.c:373 [inline] irq_exit+0x17f/0x1c0 kernel/softirq.c:413 exiting_irq arch/x86/include/asm/apic.h:536 [inline] smp_apic_timer_interrupt+0x1cb/0x760 arch/x86/kernel/apic/apic.c:1061 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:807 RIP: 0010:__sanitizer_cov_trace_const_cmp8+0x18/0x20 kernel/kcov.c:197 Code: 8b 4d 08 e8 6a fe ff ff 5d c3 0f 1f 84 00 00 00 00 00 55 48 89 f2 48 89 fe bf 07 00 00 00 48 89 e5 48 8b 4d 08 e8 48 fe ff ff <5d> c3 66 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 53 48 RSP: 0018:ffff8881a840e8e0 EFLAGS: 00000293 ORIG_RAX: ffffffffffffff13 RAX: 0000000000000000 RBX: 80000001c349b007 RCX: ffffffff81b0e4ce RDX: 0000000000000001 RSI: 0000000000000000 RDI: 0000000000000007 RBP: ffff8881a840e8e0 R08: ffff8881ad040600 R09: ffffed1036926c63 R10: ffffed1036926c63 R11: ffff8881b493631b R12: 1ffff11035081d20 R13: ffff8881a840e960 R14: 0000000000000001 R15: ffff8881ab0e3210 __pte_needs_invert arch/x86/include/asm/pgtable-invert.h:18 [inline] protnone_mask arch/x86/include/asm/pgtable-invert.h:24 [inline] pte_pfn arch/x86/include/asm/pgtable.h:197 [inline] _vm_normal_page+0x1ae/0x3c0 mm/memory.c:575 copy_one_pte mm/memory.c:791 [inline] copy_pte_range mm/memory.c:855 [inline] copy_pmd_range mm/memory.c:906 [inline] copy_pud_range mm/memory.c:940 [inline] copy_p4d_range mm/memory.c:962 [inline] copy_page_range+0xdf8/0x26b0 mm/memory.c:1024 dup_mmap kernel/fork.c:590 [inline] dup_mm kernel/fork.c:1323 [inline] copy_mm kernel/fork.c:1378 [inline] copy_process+0x45e9/0x8790 kernel/fork.c:1922 _do_fork+0x1cb/0x11d0 kernel/fork.c:2221 __do_sys_clone kernel/fork.c:2328 [inline] __se_sys_clone kernel/fork.c:2322 [inline] __x64_sys_clone+0xbf/0x150 kernel/fork.c:2322 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x455d0a Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 RSP: 002b:00007fff520d57c0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 RAX: ffffffffffffffda RBX: 00007fff520d57c0 RCX: 0000000000455d0a RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 RBP: 00007fff520d5800 R08: 0000000000000001 R09: 000000000289f940 R10: 000000000289fc10 R11: 0000000000000246 R12: 0000000000000001 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000001 BUG: sleeping function called from invalid context at mm/slab.h:421 in_atomic(): 1, irqs_disabled(): 0, pid: 8320, name: syz-executor1 INFO: lockdep is turned off. Preemption disabled at: [] spin_lock include/linux/spinlock.h:329 [inline] [] copy_pte_range mm/memory.c:830 [inline] [] copy_pmd_range mm/memory.c:906 [inline] [] copy_pud_range mm/memory.c:940 [inline] [] copy_p4d_range mm/memory.c:962 [inline] [] copy_page_range+0xa48/0x26b0 mm/memory.c:1024 kobject: 'kvm' (000000005ea08e82): kobject_uevent_env CPU: 1 PID: 8320 Comm: syz-executor1 Not tainted 4.20.0+ #169 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: kobject: 'kvm' (000000005ea08e82): fill_kobj_path: path = '/devices/virtual/misc/kvm' __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1d3/0x2c6 lib/dump_stack.c:113 kobject: 'loop0' (000000004f523fb1): kobject_uevent_env kobject: 'loop0' (000000004f523fb1): fill_kobj_path: path = '/devices/virtual/block/loop0' ___might_sleep.cold.85+0x1ba/0x1f3 kernel/sched/core.c:6148 __might_sleep+0x95/0x190 kernel/sched/core.c:6101 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3378 [inline] kmem_cache_alloc_trace+0x2cd/0x750 mm/slab.c:3618 kobject: 'kvm' (000000005ea08e82): kobject_uevent_env kmalloc include/linux/slab.h:546 [inline] kzalloc include/linux/slab.h:741 [inline] kobject_uevent_env+0x2f3/0x101e lib/kobject_uevent.c:514 kobject_uevent+0x1f/0x24 lib/kobject_uevent.c:636 kobject_cleanup lib/kobject.c:649 [inline] kobject_release lib/kobject.c:691 [inline] kref_put include/linux/kref.h:70 [inline] kobject_put.cold.9+0x170/0x2e4 lib/kobject.c:708 kobject: 'kvm' (000000005ea08e82): fill_kobj_path: path = '/devices/virtual/misc/kvm' put_device+0x20/0x30 drivers/base/core.c:2048 delete_partition_rcu_cb+0x147/0x1b0 block/partition-generic.c:259 __rcu_reclaim kernel/rcu/rcu.h:240 [inline] rcu_do_batch kernel/rcu/tree.c:2437 [inline] invoke_rcu_callbacks kernel/rcu/tree.c:2716 [inline] rcu_process_callbacks+0x100a/0x1ac0 kernel/rcu/tree.c:2697 kobject: 'kvm' (000000005ea08e82): kobject_uevent_env kobject: 'loop2' (000000000d2bbf46): kobject_uevent_env kobject: 'loop2' (000000000d2bbf46): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'kvm' (000000005ea08e82): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop0' (000000004f523fb1): kobject_uevent_env kobject: 'loop0' (000000004f523fb1): fill_kobj_path: path = '/devices/virtual/block/loop0' __do_softirq+0x30c/0xb2e kernel/softirq.c:292 invoke_softirq kernel/softirq.c:373 [inline] irq_exit+0x17f/0x1c0 kernel/softirq.c:413 exiting_irq arch/x86/include/asm/apic.h:536 [inline] smp_apic_timer_interrupt+0x1cb/0x760 arch/x86/kernel/apic/apic.c:1061 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:807 RIP: 0010:__sanitizer_cov_trace_const_cmp8+0x18/0x20 kernel/kcov.c:197 Code: 8b 4d 08 e8 6a fe ff ff 5d c3 0f 1f 84 00 00 00 00 00 55 48 89 f2 48 89 fe bf 07 00 00 00 48 89 e5 48 8b 4d 08 e8 48 fe ff ff <5d> c3 66 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 53 48 RSP: 0018:ffff8881a840e8e0 EFLAGS: 00000293 ORIG_RAX: ffffffffffffff13 RAX: 0000000000000000 RBX: 80000001c349b007 RCX: ffffffff81b0e4ce RDX: 0000000000000001 RSI: 0000000000000000 RDI: 0000000000000007 RBP: ffff8881a840e8e0 R08: ffff8881ad040600 R09: ffffed1036926c63 R10: ffffed1036926c63 R11: ffff8881b493631b R12: 1ffff11035081d20 R13: ffff8881a840e960 R14: 0000000000000001 R15: ffff8881ab0e3210 __pte_needs_invert arch/x86/include/asm/pgtable-invert.h:18 [inline] protnone_mask arch/x86/include/asm/pgtable-invert.h:24 [inline] pte_pfn arch/x86/include/asm/pgtable.h:197 [inline] _vm_normal_page+0x1ae/0x3c0 mm/memory.c:575 copy_one_pte mm/memory.c:791 [inline] copy_pte_range mm/memory.c:855 [inline] copy_pmd_range mm/memory.c:906 [inline] copy_pud_range mm/memory.c:940 [inline] copy_p4d_range mm/memory.c:962 [inline] copy_page_range+0xdf8/0x26b0 mm/memory.c:1024 dup_mmap kernel/fork.c:590 [inline] dup_mm kernel/fork.c:1323 [inline] copy_mm kernel/fork.c:1378 [inline] copy_process+0x45e9/0x8790 kernel/fork.c:1922 _do_fork+0x1cb/0x11d0 kernel/fork.c:2221 __do_sys_clone kernel/fork.c:2328 [inline] __se_sys_clone kernel/fork.c:2322 [inline] __x64_sys_clone+0xbf/0x150 kernel/fork.c:2322 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x455d0a Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 RSP: 002b:00007fff520d57c0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 RAX: ffffffffffffffda RBX: 00007fff520d57c0 RCX: 0000000000455d0a RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 RBP: 00007fff520d5800 R08: 0000000000000001 R09: 000000000289f940 R10: 000000000289fc10 R11: 0000000000000246 R12: 0000000000000001 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000001 BUG: sleeping function called from invalid context at mm/slab.c:3066 in_atomic(): 1, irqs_disabled(): 0, pid: 8320, name: syz-executor1 kobject: 'holders' (000000000d9a952f): kobject_cleanup, parent 00000000a979b909 INFO: lockdep is turned off. Preemption disabled at: [] spin_lock include/linux/spinlock.h:329 [inline] [] copy_pte_range mm/memory.c:830 [inline] [] copy_pmd_range mm/memory.c:906 [inline] [] copy_pud_range mm/memory.c:940 [inline] [] copy_p4d_range mm/memory.c:962 [inline] [] copy_page_range+0xa48/0x26b0 mm/memory.c:1024 CPU: 1 PID: 8320 Comm: syz-executor1 Tainted: G W 4.20.0+ #169 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 kobject: 'holders' (000000000d9a952f): auto cleanup kobject_del Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1d3/0x2c6 lib/dump_stack.c:113 kobject: 'kvm' (000000005ea08e82): kobject_uevent_env ___might_sleep.cold.85+0x1ba/0x1f3 kernel/sched/core.c:6148 kobject: 'kvm' (000000005ea08e82): fill_kobj_path: path = '/devices/virtual/misc/kvm' __might_sleep+0x95/0x190 kernel/sched/core.c:6101 kobject: 'holders' (000000000d9a952f): calling ktype release cache_alloc_debugcheck_before mm/slab.c:3066 [inline] slab_alloc mm/slab.c:3382 [inline] kmem_cache_alloc_trace+0x307/0x750 mm/slab.c:3618 kmalloc include/linux/slab.h:546 [inline] kzalloc include/linux/slab.h:741 [inline] kobject_uevent_env+0x2f3/0x101e lib/kobject_uevent.c:514 kobject: (000000000d9a952f): dynamic_kobj_release kobject_uevent+0x1f/0x24 lib/kobject_uevent.c:636 kobject_cleanup lib/kobject.c:649 [inline] kobject_release lib/kobject.c:691 [inline] kref_put include/linux/kref.h:70 [inline] kobject_put.cold.9+0x170/0x2e4 lib/kobject.c:708 put_device+0x20/0x30 drivers/base/core.c:2048 delete_partition_rcu_cb+0x147/0x1b0 block/partition-generic.c:259 kobject: 'kvm' (000000005ea08e82): kobject_uevent_env __rcu_reclaim kernel/rcu/rcu.h:240 [inline] rcu_do_batch kernel/rcu/tree.c:2437 [inline] invoke_rcu_callbacks kernel/rcu/tree.c:2716 [inline] rcu_process_callbacks+0x100a/0x1ac0 kernel/rcu/tree.c:2697 kobject: 'holders': free name kobject: 'kvm' (000000005ea08e82): fill_kobj_path: path = '/devices/virtual/misc/kvm' __do_softirq+0x30c/0xb2e kernel/softirq.c:292 invoke_softirq kernel/softirq.c:373 [inline] irq_exit+0x17f/0x1c0 kernel/softirq.c:413 exiting_irq arch/x86/include/asm/apic.h:536 [inline] smp_apic_timer_interrupt+0x1cb/0x760 arch/x86/kernel/apic/apic.c:1061 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:807 RIP: 0010:__sanitizer_cov_trace_const_cmp8+0x18/0x20 kernel/kcov.c:197 Code: 8b 4d 08 e8 6a fe ff ff 5d c3 0f 1f 84 00 00 00 00 00 55 48 89 f2 48 89 fe bf 07 00 00 00 48 89 e5 48 8b 4d 08 e8 48 fe ff ff <5d> c3 66 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 53 48 RSP: 0018:ffff8881a840e8e0 EFLAGS: 00000293 ORIG_RAX: ffffffffffffff13 RAX: 0000000000000000 RBX: 80000001c349b007 RCX: ffffffff81b0e4ce RDX: 0000000000000001 RSI: 0000000000000000 RDI: 0000000000000007 RBP: ffff8881a840e8e0 R08: ffff8881ad040600 R09: ffffed1036926c63 R10: ffffed1036926c63 R11: ffff8881b493631b R12: 1ffff11035081d20 R13: ffff8881a840e960 R14: 0000000000000001 R15: ffff8881ab0e3210 __pte_needs_invert arch/x86/include/asm/pgtable-invert.h:18 [inline] protnone_mask arch/x86/include/asm/pgtable-invert.h:24 [inline] pte_pfn arch/x86/include/asm/pgtable.h:197 [inline] _vm_normal_page+0x1ae/0x3c0 mm/memory.c:575 copy_one_pte mm/memory.c:791 [inline] copy_pte_range mm/memory.c:855 [inline] copy_pmd_range mm/memory.c:906 [inline] copy_pud_range mm/memory.c:940 [inline] copy_p4d_range mm/memory.c:962 [inline] copy_page_range+0xdf8/0x26b0 mm/memory.c:1024 dup_mmap kernel/fork.c:590 [inline] dup_mm kernel/fork.c:1323 [inline] copy_mm kernel/fork.c:1378 [inline] copy_process+0x45e9/0x8790 kernel/fork.c:1922 _do_fork+0x1cb/0x11d0 kernel/fork.c:2221 __do_sys_clone kernel/fork.c:2328 [inline] __se_sys_clone kernel/fork.c:2322 [inline] __x64_sys_clone+0xbf/0x150 kernel/fork.c:2322 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x455d0a Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 RSP: 002b:00007fff520d57c0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 RAX: ffffffffffffffda RBX: 00007fff520d57c0 RCX: 0000000000455d0a RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 RBP: 00007fff520d5800 R08: 0000000000000001 R09: 000000000289f940 R10: 000000000289fc10 R11: 0000000000000246 R12: 0000000000000001 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000001 BUG: sleeping function called from invalid context at mm/slab.h:421 in_atomic(): 1, irqs_disabled(): 0, pid: 8320, name: syz-executor1 INFO: lockdep is turned off. Preemption disabled at: [] spin_lock include/linux/spinlock.h:329 [inline] [] copy_pte_range mm/memory.c:830 [inline] [] copy_pmd_range mm/memory.c:906 [inline] [] copy_pud_range mm/memory.c:940 [inline] [] copy_p4d_range mm/memory.c:962 [inline] [] copy_page_range+0xa48/0x26b0 mm/memory.c:1024 CPU: 1 PID: 8320 Comm: syz-executor1 Tainted: G W 4.20.0+ #169 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1d3/0x2c6 lib/dump_stack.c:113 ___might_sleep.cold.85+0x1ba/0x1f3 kernel/sched/core.c:6148 __might_sleep+0x95/0x190 kernel/sched/core.c:6101 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3378 [inline] __do_kmalloc mm/slab.c:3720 [inline] __kmalloc+0x2d6/0x770 mm/slab.c:3731 kmalloc include/linux/slab.h:551 [inline] kzalloc include/linux/slab.h:741 [inline] kobject_get_path+0xc2/0x1b0 lib/kobject.c:171 kobject_uevent_env+0x314/0x101e lib/kobject_uevent.c:519 kobject_uevent+0x1f/0x24 lib/kobject_uevent.c:636 kobject_cleanup lib/kobject.c:649 [inline] kobject_release lib/kobject.c:691 [inline] kref_put include/linux/kref.h:70 [inline] kobject_put.cold.9+0x170/0x2e4 lib/kobject.c:708 put_device+0x20/0x30 drivers/base/core.c:2048 delete_partition_rcu_cb+0x147/0x1b0 block/partition-generic.c:259 __rcu_reclaim kernel/rcu/rcu.h:240 [inline] rcu_do_batch kernel/rcu/tree.c:2437 [inline] invoke_rcu_callbacks kernel/rcu/tree.c:2716 [inline] rcu_process_callbacks+0x100a/0x1ac0 kernel/rcu/tree.c:2697 __do_softirq+0x30c/0xb2e kernel/softirq.c:292 invoke_softirq kernel/softirq.c:373 [inline] irq_exit+0x17f/0x1c0 kernel/softirq.c:413 exiting_irq arch/x86/include/asm/apic.h:536 [inline] smp_apic_timer_interrupt+0x1cb/0x760 arch/x86/kernel/apic/apic.c:1061 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:807 RIP: 0010:__sanitizer_cov_trace_const_cmp8+0x18/0x20 kernel/kcov.c:197 Code: 8b 4d 08 e8 6a fe ff ff 5d c3 0f 1f 84 00 00 00 00 00 55 48 89 f2 48 89 fe bf 07 00 00 00 48 89 e5 48 8b 4d 08 e8 48 fe ff ff <5d> c3 66 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 53 48 RSP: 0018:ffff8881a840e8e0 EFLAGS: 00000293 ORIG_RAX: ffffffffffffff13 RAX: 0000000000000000 RBX: 80000001c349b007 RCX: ffffffff81b0e4ce RDX: 0000000000000001 RSI: 0000000000000000 RDI: 0000000000000007 RBP: ffff8881a840e8e0 R08: ffff8881ad040600 R09: ffffed1036926c63 R10: ffffed1036926c63 R11: ffff8881b493631b R12: 1ffff11035081d20 R13: ffff8881a840e960 R14: 0000000000000001 R15: ffff8881ab0e3210 __pte_needs_invert arch/x86/include/asm/pgtable-invert.h:18 [inline] protnone_mask arch/x86/include/asm/pgtable-invert.h:24 [inline] pte_pfn arch/x86/include/asm/pgtable.h:197 [inline] _vm_normal_page+0x1ae/0x3c0 mm/memory.c:575 copy_one_pte mm/memory.c:791 [inline] copy_pte_range mm/memory.c:855 [inline] copy_pmd_range mm/memory.c:906 [inline] copy_pud_range mm/memory.c:940 [inline] copy_p4d_range mm/memory.c:962 [inline] copy_page_range+0xdf8/0x26b0 mm/memory.c:1024 dup_mmap kernel/fork.c:590 [inline] dup_mm kernel/fork.c:1323 [inline] copy_mm kernel/fork.c:1378 [inline] copy_process+0x45e9/0x8790 kernel/fork.c:1922 _do_fork+0x1cb/0x11d0 kernel/fork.c:2221 __do_sys_clone kernel/fork.c:2328 [inline] __se_sys_clone kernel/fork.c:2322 [inline] __x64_sys_clone+0xbf/0x150 kernel/fork.c:2322 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x455d0a Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 RSP: 002b:00007fff520d57c0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 RAX: ffffffffffffffda RBX: 00007fff520d57c0 RCX: 0000000000455d0a RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 RBP: 00007fff520d5800 R08: 0000000000000001 R09: 000000000289f940 R10: 000000000289fc10 R11: 0000000000000246 R12: 0000000000000001 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000001 kobject: 'loop0p238' (000000003291ea1a): fill_kobj_path: path = '/loop0p238' kobject: 'loop0p238' (000000003291ea1a): calling ktype release kobject: 'loop0p238': free name kobject: 'loop0p246' (00000000a979b909): kobject_uevent_env kobject: 'loop5' (000000001d1c6e43): kobject_uevent_env kobject: 'loop0p246' (00000000a979b909): fill_kobj_path: path = '/devices/virtual/block/loop0/loop0p246' kobject: 'loop5' (000000001d1c6e43): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop0' (000000004f523fb1): kobject_uevent_env kobject: 'kvm' (000000005ea08e82): kobject_uevent_env kobject: 'loop0p246' (00000000a979b909): kobject_cleanup, parent (null) kobject: 'loop0p246' (00000000a979b909): calling ktype release kobject: 'loop0' (000000004f523fb1): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop0p246': free name kobject: 'kvm' (000000005ea08e82): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop1' (00000000dbe6a001): kobject_uevent_env kobject: 'loop1' (00000000dbe6a001): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'kvm' (000000005ea08e82): kobject_uevent_env kobject: 'loop3' (00000000914c79b2): kobject_uevent_env kobject: 'loop3' (00000000914c79b2): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop4' (00000000bb372aad): kobject_uevent_env kobject: 'loop4' (00000000bb372aad): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'kvm' (000000005ea08e82): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'kvm' (000000005ea08e82): kobject_uevent_env kobject: 'kvm' (000000005ea08e82): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'kvm' (000000005ea08e82): kobject_uevent_env kobject: 'kvm' (000000005ea08e82): kobject_uevent_env kobject: 'kvm' (000000005ea08e82): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop2' (000000000d2bbf46): kobject_uevent_env kobject: 'loop2' (000000000d2bbf46): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop0' (000000004f523fb1): kobject_uevent_env kobject: 'loop0' (000000004f523fb1): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'kvm' (000000005ea08e82): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'kvm' (000000005ea08e82): kobject_uevent_env kobject: 'kvm' (000000005ea08e82): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop5' (000000001d1c6e43): kobject_uevent_env kobject: 'loop5' (000000001d1c6e43): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'kvm' (000000005ea08e82): kobject_uevent_env kobject: 'kvm' (000000005ea08e82): kobject_uevent_env kobject: 'loop3' (00000000914c79b2): kobject_uevent_env kobject: 'kvm' (000000005ea08e82): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop3' (00000000914c79b2): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'kvm' (000000005ea08e82): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'kvm' (000000005ea08e82): kobject_uevent_env kobject: 'loop3' (00000000914c79b2): kobject_uevent_env kobject: 'kvm' (000000005ea08e82): kobject_uevent_env kobject: 'loop3' (00000000914c79b2): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'kvm' (000000005ea08e82): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop4' (00000000bb372aad): kobject_uevent_env kobject: 'kvm' (000000005ea08e82): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop4' (00000000bb372aad): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'kvm' (000000005ea08e82): kobject_uevent_env kobject: 'kvm' (000000005ea08e82): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop4' (00000000bb372aad): kobject_uevent_env kobject: 'loop3' (00000000914c79b2): kobject_uevent_env kobject: 'kvm' (000000005ea08e82): kobject_uevent_env kobject: 'loop3' (00000000914c79b2): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'kvm' (000000005ea08e82): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop4' (00000000bb372aad): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop2' (000000000d2bbf46): kobject_uevent_env kobject: 'loop3' (00000000914c79b2): kobject_uevent_env kobject: 'loop2' (000000000d2bbf46): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'kvm' (000000005ea08e82): kobject_uevent_env kobject: 'loop3' (00000000914c79b2): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'kvm' (000000005ea08e82): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop0' (000000004f523fb1): kobject_uevent_env kobject: 'kvm' (000000005ea08e82): kobject_uevent_env kobject: 'loop0' (000000004f523fb1): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'kvm' (000000005ea08e82): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'kvm' (000000005ea08e82): kobject_uevent_env kobject: 'loop5' (000000001d1c6e43): kobject_uevent_env kobject: 'loop5' (000000001d1c6e43): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop3' (00000000914c79b2): kobject_uevent_env kobject: 'kvm' (000000005ea08e82): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop3' (00000000914c79b2): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop4' (00000000bb372aad): kobject_uevent_env kobject: 'kvm' (000000005ea08e82): kobject_uevent_env kobject: 'loop4' (00000000bb372aad): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop2' (000000000d2bbf46): kobject_uevent_env kobject: 'kvm' (000000005ea08e82): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop2' (000000000d2bbf46): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'kvm' (000000005ea08e82): kobject_uevent_env kobject: 'kvm' (000000005ea08e82): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop0' (000000004f523fb1): kobject_uevent_env kobject: 'loop0' (000000004f523fb1): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'kvm' (000000005ea08e82): kobject_uevent_env kobject: 'kvm' (000000005ea08e82): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop5' (000000001d1c6e43): kobject_uevent_env kobject: 'loop5' (000000001d1c6e43): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop1' (00000000dbe6a001): kobject_uevent_env kobject: 'kvm' (000000005ea08e82): kobject_uevent_env kobject: 'loop1' (00000000dbe6a001): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'kvm' (000000005ea08e82): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'kvm' (000000005ea08e82): kobject_uevent_env kobject: 'kvm' (000000005ea08e82): kobject_uevent_env kobject: 'kvm' (000000005ea08e82): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'kvm' (000000005ea08e82): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop4' (00000000bb372aad): kobject_uevent_env kobject: 'loop4' (00000000bb372aad): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'kvm' (000000005ea08e82): kobject_uevent_env kobject: 'loop3' (00000000914c79b2): kobject_uevent_env kobject: 'kvm' (000000005ea08e82): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop3' (00000000914c79b2): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop0' (000000004f523fb1): kobject_uevent_env kobject: 'kvm' (000000005ea08e82): kobject_uevent_env kobject: 'loop0' (000000004f523fb1): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'kvm' (000000005ea08e82): kobject_uevent_env kobject: 'kvm' (000000005ea08e82): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop2' (000000000d2bbf46): kobject_uevent_env kobject: 'loop2' (000000000d2bbf46): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'kvm' (000000005ea08e82): kobject_uevent_env kobject: 'loop4' (00000000bb372aad): kobject_uevent_env kobject: 'kvm' (000000005ea08e82): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'kvm' (000000005ea08e82): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop4' (00000000bb372aad): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'kvm' (000000005ea08e82): kobject_uevent_env kobject: 'loop5' (000000001d1c6e43): kobject_uevent_env kobject: 'loop5' (000000001d1c6e43): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'kvm' (000000005ea08e82): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'kvm' (000000005ea08e82): kobject_uevent_env kobject: 'loop4' (00000000bb372aad): kobject_uevent_env kobject: 'kvm' (000000005ea08e82): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop4' (00000000bb372aad): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'kvm' (000000005ea08e82): kobject_uevent_env kobject: 'loop2' (000000000d2bbf46): kobject_uevent_env kobject: 'kvm' (000000005ea08e82): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop2' (000000000d2bbf46): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop0' (000000004f523fb1): kobject_uevent_env kobject: 'kvm' (000000005ea08e82): kobject_uevent_env kobject: 'loop0' (000000004f523fb1): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'kvm' (000000005ea08e82): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'kvm' (000000005ea08e82): kobject_uevent_env kobject: 'kvm' (000000005ea08e82): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop5' (000000001d1c6e43): kobject_uevent_env kobject: 'loop5' (000000001d1c6e43): fill_kobj_path: path = '/devices/virtual/block/loop5'