WARNING: CPU: 0 PID: 9029 at mm/mempolicy.c:1745 policy_node mm/mempolicy.c:1745 [inline] WARNING: CPU: 0 PID: 9029 at mm/mempolicy.c:1745 alloc_pages_vma+0x1bd/0x4a0 mm/mempolicy.c:2043 Kernel panic - not syncing: panic_on_warn set ... kobject: 'loop3' (000000004e29fd36): kobject_uevent_env CPU: 0 PID: 9029 Comm: syz-executor1 Not tainted 4.20.0-rc5+ #144 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 kobject: 'loop3' (000000004e29fd36): fill_kobj_path: path = '/devices/virtual/block/loop3' Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x244/0x39d lib/dump_stack.c:113 kobject: 'loop3' (000000004e29fd36): kobject_uevent_env panic+0x2ad/0x55c kernel/panic.c:188 kobject: 'loop3' (000000004e29fd36): fill_kobj_path: path = '/devices/virtual/block/loop3' __warn.cold.8+0x20/0x45 kernel/panic.c:540 report_bug+0x254/0x2d0 lib/bug.c:186 fixup_bug arch/x86/kernel/traps.c:178 [inline] do_error_trap+0x11b/0x200 arch/x86/kernel/traps.c:271 do_invalid_op+0x36/0x40 arch/x86/kernel/traps.c:290 invalid_op+0x14/0x20 arch/x86/entry/entry_64.S:969 RIP: 0010:policy_node mm/mempolicy.c:1745 [inline] RIP: 0010:alloc_pages_vma+0x1bd/0x4a0 mm/mempolicy.c:2043 Code: 5f 5d c3 e8 35 2f bf ff 45 89 ec 31 ff 41 81 e4 00 00 04 00 44 89 e6 e8 31 30 bf ff 45 85 e4 0f 84 50 ff ff ff e8 13 2f bf ff <0f> 0b e9 44 ff ff ff e8 07 2f bf ff e8 22 5e ff ff 48 89 c3 e9 6b RSP: 0018:ffff8881874cead8 EFLAGS: 00010216 RAX: 0000000000040000 RBX: ffff8881da96f280 RCX: ffffc90007e6a000 RDX: 0000000000000275 RSI: ffffffff81c06cad RDI: 0000000000000005 RBP: ffff8881874ceb18 R08: ffff8881be8b22c0 R09: ffffed103b5c5b5f R10: 0000000000000002 R11: ffff8881dae2dafb R12: 0000000000040000 R13: 00000000000742ca R14: ffff8881da96f288 R15: 0000000000000002 do_huge_pmd_wp_page+0x1373/0x5fc0 mm/huge_memory.c:1299 kobject: 'loop4' (00000000ab642205): kobject_uevent_env kobject: 'loop4' (00000000ab642205): fill_kobj_path: path = '/devices/virtual/block/loop4' audit: type=1400 audit(1544099853.204:75): avc: denied { map } for pid=9036 comm="syz-executor4" path="/dev/bus/usb/004/001" dev="devtmpfs" ino=15274 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:usb_device_t:s0 tclass=chr_file permissive=1 kobject: 'loop4' (00000000ab642205): kobject_uevent_env kobject: 'loop3' (000000004e29fd36): kobject_uevent_env kobject: 'loop4' (00000000ab642205): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop3' (000000004e29fd36): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop4' (00000000ab642205): kobject_uevent_env kobject: 'loop4' (00000000ab642205): fill_kobj_path: path = '/devices/virtual/block/loop4' wp_huge_pmd mm/memory.c:3666 [inline] __handle_mm_fault+0x2ddc/0x5be0 mm/memory.c:3879 kobject: 'loop4' (00000000ab642205): kobject_uevent_env kobject: 'loop4' (00000000ab642205): fill_kobj_path: path = '/devices/virtual/block/loop4' handle_mm_fault+0x54f/0xc70 mm/memory.c:3926 do_user_addr_fault arch/x86/mm/fault.c:1423 [inline] __do_page_fault+0x5e8/0xe60 arch/x86/mm/fault.c:1489 do_page_fault+0xf2/0x7e0 arch/x86/mm/fault.c:1520 kobject: 'loop4' (00000000ab642205): kobject_uevent_env page_fault+0x1e/0x30 arch/x86/entry/entry_64.S:1139 RIP: 0010:copy_user_enhanced_fast_string+0xe/0x20 arch/x86/lib/copy_user_64.S:180 Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 1f 00 c3 0f 1f 80 00 00 00 00 0f 1f 00 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 1f 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 83 kobject: 'loop4' (00000000ab642205): fill_kobj_path: path = '/devices/virtual/block/loop4' RSP: 0018:ffff8881874cfca0 EFLAGS: 00010202 RAX: 0000000000000000 RBX: 0000000000209e20 RCX: 0000000000009fa0 RDX: 0000000000209e20 RSI: ffff88817d1ffe80 RDI: 0000000020200000 RBP: ffff8881874cfcd8 R08: ffffed102fa413c4 R09: ffffed102fa413c4 R10: ffffed102fa413c3 R11: ffff88817d209e1f R12: 0000000020209fa0 R13: 0000000020000180 R14: ffff88817d000000 R15: 00007ffffffff000 copy_to_user include/linux/uaccess.h:155 [inline] map_lookup_elem+0x66b/0xc50 kernel/bpf/syscall.c:751 __do_sys_bpf kernel/bpf/syscall.c:2492 [inline] __se_sys_bpf kernel/bpf/syscall.c:2466 [inline] __x64_sys_bpf+0x318/0x520 kernel/bpf/syscall.c:2466 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457569 Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007eff23969c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 RDX: 0000000000000018 RSI: 0000000020000100 RDI: 0000000000000001 RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 kobject: 'loop0' (00000000ed8bdc73): kobject_uevent_env R10: 0000000000000000 R11: 0000000000000246 R12: 00007eff2396a6d4 R13: 00000000004bd9d2 R14: 00000000004ccae0 R15: 00000000ffffffff Kernel Offset: disabled Rebooting in 86400 seconds..