RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe5f16476d4 R13: 00000000004be9e6 R14: 00000000004cee38 R15: 0000000000000004 ================================ WARNING: inconsistent lock state 4.20.0-rc5+ #366 Not tainted -------------------------------- inconsistent {SOFTIRQ-ON-W} -> {IN-SOFTIRQ-W} usage. udevd/6035 [HC0[0]:SC1[1]:HE1:SE0] takes: 000000008012baed (fs_reclaim){+.?.}, at: fs_reclaim_acquire.part.97+0x0/0x30 mm/internal.h:79 {SOFTIRQ-ON-W} state was registered at: lock_acquire+0x1ed/0x520 kernel/locking/lockdep.c:3844 __fs_reclaim_acquire mm/page_alloc.c:3730 [inline] fs_reclaim_acquire.part.97+0x24/0x30 mm/page_alloc.c:3741 fs_reclaim_acquire+0x14/0x20 mm/page_alloc.c:3742 slab_pre_alloc_hook mm/slab.h:418 [inline] slab_alloc_node mm/slab.c:3299 [inline] kmem_cache_alloc_node_trace+0x3c/0x740 mm/slab.c:3661 kmalloc_node include/linux/slab.h:584 [inline] kzalloc_node include/linux/slab.h:752 [inline] alloc_worker+0xc5/0x300 kernel/workqueue.c:1704 init_rescuer.part.24+0x1f/0x190 kernel/workqueue.c:4028 init_rescuer kernel/workqueue.c:4025 [inline] workqueue_init+0x491/0x744 kernel/workqueue.c:5794 kernel_init_freeable+0x3bb/0x6bf init/main.c:1139 kernel_init+0x11/0x1ae init/main.c:1071 ret_from_fork+0x3a/0x50 arch/x86/entry/entry_64.S:352 irq event stamp: 1825182 hardirqs last enabled at (1825182): [] console_unlock+0xcfb/0x1190 kernel/printk/printk.c:2443 hardirqs last disabled at (1825181): [] console_unlock+0x2d9/0x1190 kernel/printk/printk.c:2353 softirqs last enabled at (1822994): [] __do_softirq+0x7df/0xb7e kernel/softirq.c:319 softirqs last disabled at (1825143): [] invoke_softirq kernel/softirq.c:373 [inline] softirqs last disabled at (1825143): [] irq_exit+0x17f/0x1c0 kernel/softirq.c:413 other info that might help us debug this: Possible unsafe locking scenario: CPU0 ---- lock(fs_reclaim); lock(fs_reclaim); *** DEADLOCK *** 4 locks held by udevd/6035: #0: 00000000f67ac0ff (&dup_mmap_sem){.+.+}, at: dup_mmap kernel/fork.c:471 [inline] #0: 00000000f67ac0ff (&dup_mmap_sem){.+.+}, at: dup_mm kernel/fork.c:1318 [inline] #0: 00000000f67ac0ff (&dup_mmap_sem){.+.+}, at: copy_mm kernel/fork.c:1373 [inline] #0: 00000000f67ac0ff (&dup_mmap_sem){.+.+}, at: copy_process+0x365e/0x87a0 kernel/fork.c:1917 #1: 000000004a2b7443 (&mm->mmap_sem){++++}, at: dup_mmap kernel/fork.c:472 [inline] #1: 000000004a2b7443 (&mm->mmap_sem){++++}, at: dup_mm kernel/fork.c:1318 [inline] #1: 000000004a2b7443 (&mm->mmap_sem){++++}, at: copy_mm kernel/fork.c:1373 [inline] #1: 000000004a2b7443 (&mm->mmap_sem){++++}, at: copy_process+0x367a/0x87a0 kernel/fork.c:1917 #2: 00000000fbce70cc (&mm->mmap_sem/1){+.+.}, at: dup_mmap kernel/fork.c:481 [inline] #2: 00000000fbce70cc (&mm->mmap_sem/1){+.+.}, at: dup_mm kernel/fork.c:1318 [inline] #2: 00000000fbce70cc (&mm->mmap_sem/1){+.+.}, at: copy_mm kernel/fork.c:1373 [inline] #2: 00000000fbce70cc (&mm->mmap_sem/1){+.+.}, at: copy_process+0x36d2/0x87a0 kernel/fork.c:1917 #3: 000000009c05be85 (rcu_callback){....}, at: __rcu_reclaim kernel/rcu/rcu.h:228 [inline] #3: 000000009c05be85 (rcu_callback){....}, at: rcu_do_batch kernel/rcu/tree.c:2437 [inline] #3: 000000009c05be85 (rcu_callback){....}, at: invoke_rcu_callbacks kernel/rcu/tree.c:2716 [inline] #3: 000000009c05be85 (rcu_callback){....}, at: rcu_process_callbacks+0x1103/0x1ac0 kernel/rcu/tree.c:2697 stack backtrace: CPU: 1 PID: 6035 Comm: udevd Not tainted 4.20.0-rc5+ #366 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x244/0x39d lib/dump_stack.c:113 print_usage_bug.cold.59+0x320/0x41a kernel/locking/lockdep.c:2472 valid_state kernel/locking/lockdep.c:2485 [inline] mark_lock_irq kernel/locking/lockdep.c:2679 [inline] mark_lock+0x1276/0x1cd0 kernel/locking/lockdep.c:3059 mark_irqflags kernel/locking/lockdep.c:2937 [inline] __lock_acquire+0x155f/0x4c20 kernel/locking/lockdep.c:3298 lock_acquire+0x1ed/0x520 kernel/locking/lockdep.c:3844 __fs_reclaim_acquire mm/page_alloc.c:3730 [inline] fs_reclaim_acquire.part.97+0x24/0x30 mm/page_alloc.c:3741 fs_reclaim_acquire+0x14/0x20 mm/page_alloc.c:3742 slab_pre_alloc_hook mm/slab.h:418 [inline] slab_alloc mm/slab.c:3378 [inline] kmem_cache_alloc_trace+0x2d/0x750 mm/slab.c:3618 kmalloc include/linux/slab.h:546 [inline] kzalloc include/linux/slab.h:741 [inline] kobject_uevent_env+0x2f3/0x101e lib/kobject_uevent.c:514 kobject_uevent+0x1f/0x24 lib/kobject_uevent.c:636 kobject_cleanup lib/kobject.c:649 [inline] kobject_release lib/kobject.c:691 [inline] kref_put include/linux/kref.h:70 [inline] kobject_put.cold.9+0x170/0x2e4 lib/kobject.c:708 put_device+0x20/0x30 drivers/base/core.c:2024 delete_partition_rcu_cb+0x147/0x1b0 block/partition-generic.c:259 __rcu_reclaim kernel/rcu/rcu.h:240 [inline] rcu_do_batch kernel/rcu/tree.c:2437 [inline] invoke_rcu_callbacks kernel/rcu/tree.c:2716 [inline] rcu_process_callbacks+0x100a/0x1ac0 kernel/rcu/tree.c:2697 __do_softirq+0x308/0xb7e kernel/softirq.c:292 invoke_softirq kernel/softirq.c:373 [inline] irq_exit+0x17f/0x1c0 kernel/softirq.c:413 exiting_irq arch/x86/include/asm/apic.h:536 [inline] smp_apic_timer_interrupt+0x1cb/0x760 arch/x86/kernel/apic/apic.c:1061 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:804 RIP: 0010:arch_local_irq_restore arch/x86/include/asm/paravirt.h:761 [inline] RIP: 0010:slab_alloc mm/slab.c:3385 [inline] RIP: 0010:kmem_cache_alloc+0x297/0x730 mm/slab.c:3552 Code: 7e 0f 85 cf fe ff ff e8 16 e1 3d ff e9 c5 fe ff ff e8 8d 27 c3 ff 48 83 3d d5 64 8f 07 00 0f 84 41 03 00 00 48 8b 7d d0 57 9d <0f> 1f 44 00 00 e9 54 fe ff ff 31 d2 be a5 01 00 00 48 c7 c7 b2 c3 RSP: 0018:ffff8881c3146dc0 EFLAGS: 00000286 ORIG_RAX: ffffffffffffff13 RAX: 0000000000000000 RBX: 00000000006000c0 RCX: 1ffff110398bcda6 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000286 RBP: ffff8881c3146e28 R08: ffff8881cc5e6d30 R09: 0000000000000006 R10: 0000000000000000 R11: ffff8881cc5e6440 R12: ffff8881baf62460 R13: ffff8881da97a7c0 R14: ffff8881da97a7c0 R15: 00000000006000c0 vm_area_dup+0x7a/0x230 kernel/fork.c:339 dup_mmap kernel/fork.c:525 [inline] dup_mm kernel/fork.c:1318 [inline] copy_mm kernel/fork.c:1373 [inline] copy_process+0x4168/0x87a0 kernel/fork.c:1917 _do_fork+0x1cb/0x11d0 kernel/fork.c:2216 __do_sys_clone kernel/fork.c:2323 [inline] __se_sys_clone kernel/fork.c:2317 [inline] __x64_sys_clone+0xbf/0x150 kernel/fork.c:2317 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7fdfc1fdcf46 Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 14 25 10 00 00 00 31 d2 49 81 c2 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 31 01 00 00 85 c0 41 89 c4 0f 85 3b 01 00 RSP: 002b:00007ffc59f6aa40 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 RAX: ffffffffffffffda RBX: 00007ffc59f6aa40 RCX: 00007fdfc1fdcf46 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 RBP: 00007ffc59f6aaa0 R08: 0000000000001793 R09: 0000000000001793 R10: 00007fdfc28f9a70 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffc59f6aa60 R14: 0000000000000005 R15: 0000000000000005 BUG: sleeping function called from invalid context at mm/slab.h:421 in_atomic(): 1, irqs_disabled(): 0, pid: 6035, name: udevd INFO: lockdep is turned off. Preemption disabled at: [] __do_softirq+0x189/0xb7e kernel/softirq.c:269 CPU: 1 PID: 6035 Comm: udevd Not tainted 4.20.0-rc5+ #366 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x244/0x39d lib/dump_stack.c:113 ___might_sleep.cold.86+0x221/0x254 kernel/sched/core.c:6148 __might_sleep+0x95/0x190 kernel/sched/core.c:6101 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3378 [inline] kmem_cache_alloc_trace+0x2cd/0x750 mm/slab.c:3618 kmalloc include/linux/slab.h:546 [inline] kzalloc include/linux/slab.h:741 [inline] kobject_uevent_env+0x2f3/0x101e lib/kobject_uevent.c:514 kobject_uevent+0x1f/0x24 lib/kobject_uevent.c:636 kobject_cleanup lib/kobject.c:649 [inline] kobject_release lib/kobject.c:691 [inline] kref_put include/linux/kref.h:70 [inline] kobject_put.cold.9+0x170/0x2e4 lib/kobject.c:708 put_device+0x20/0x30 drivers/base/core.c:2024 delete_partition_rcu_cb+0x147/0x1b0 block/partition-generic.c:259 __rcu_reclaim kernel/rcu/rcu.h:240 [inline] rcu_do_batch kernel/rcu/tree.c:2437 [inline] invoke_rcu_callbacks kernel/rcu/tree.c:2716 [inline] rcu_process_callbacks+0x100a/0x1ac0 kernel/rcu/tree.c:2697 __do_softirq+0x308/0xb7e kernel/softirq.c:292 invoke_softirq kernel/softirq.c:373 [inline] irq_exit+0x17f/0x1c0 kernel/softirq.c:413 exiting_irq arch/x86/include/asm/apic.h:536 [inline] smp_apic_timer_interrupt+0x1cb/0x760 arch/x86/kernel/apic/apic.c:1061 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:804 kobject: 'loop0' (000000002852f1e7): kobject_uevent_env RIP: 0010:arch_local_irq_restore arch/x86/include/asm/paravirt.h:761 [inline] RIP: 0010:slab_alloc mm/slab.c:3385 [inline] RIP: 0010:kmem_cache_alloc+0x297/0x730 mm/slab.c:3552 Code: 7e 0f 85 cf fe ff ff e8 16 e1 3d ff e9 c5 fe ff ff e8 8d 27 c3 ff 48 83 3d d5 64 8f 07 00 0f 84 41 03 00 00 48 8b 7d d0 57 9d <0f> 1f 44 00 00 e9 54 fe ff ff 31 d2 be a5 01 00 00 48 c7 c7 b2 c3 kobject: 'loop0' (000000002852f1e7): fill_kobj_path: path = '/devices/virtual/block/loop0' RSP: 0018:ffff8881c3146dc0 EFLAGS: 00000286 ORIG_RAX: ffffffffffffff13 RAX: 0000000000000000 RBX: 00000000006000c0 RCX: 1ffff110398bcda6 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000286 RBP: ffff8881c3146e28 R08: ffff8881cc5e6d30 R09: 0000000000000006 R10: 0000000000000000 R11: ffff8881cc5e6440 R12: ffff8881baf62460 R13: ffff8881da97a7c0 R14: ffff8881da97a7c0 R15: 00000000006000c0 vm_area_dup+0x7a/0x230 kernel/fork.c:339 dup_mmap kernel/fork.c:525 [inline] dup_mm kernel/fork.c:1318 [inline] copy_mm kernel/fork.c:1373 [inline] copy_process+0x4168/0x87a0 kernel/fork.c:1917 _do_fork+0x1cb/0x11d0 kernel/fork.c:2216 __do_sys_clone kernel/fork.c:2323 [inline] __se_sys_clone kernel/fork.c:2317 [inline] __x64_sys_clone+0xbf/0x150 kernel/fork.c:2317 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7fdfc1fdcf46 Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 14 25 10 00 00 00 31 d2 49 81 c2 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 31 01 00 00 85 c0 41 89 c4 0f 85 3b 01 00 RSP: 002b:00007ffc59f6aa40 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 RAX: ffffffffffffffda RBX: 00007ffc59f6aa40 RCX: 00007fdfc1fdcf46 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 RBP: 00007ffc59f6aaa0 R08: 0000000000001793 R09: 0000000000001793 R10: 00007fdfc28f9a70 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffc59f6aa60 R14: 0000000000000005 R15: 0000000000000005 kobject: 'loop0p247' (00000000f1fedaf5): fill_kobj_path: path = '/loop0p247' kobject: 'loop0p247' (00000000f1fedaf5): calling ktype release kobject: 'loop0p247': free name IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready kobject: 'loop5' (00000000d30a3234): kobject_uevent_env kobject: 'loop5' (00000000d30a3234): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop1' (00000000c1d146a0): kobject_uevent_env kobject: 'loop1' (00000000c1d146a0): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'holders' (000000003bad10d2): kobject_cleanup, parent 000000006a773f8b kobject: 'holders' (000000003bad10d2): auto cleanup kobject_del kobject: 'loop4' (000000003b43f4ef): kobject_uevent_env kobject: 'loop4' (000000003b43f4ef): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'holders' (000000003bad10d2): calling ktype release kobject: (000000003bad10d2): dynamic_kobj_release kobject: 'loop3' (0000000054d6d4a0): kobject_uevent_env kobject: 'holders': free name kobject: 'loop3' (0000000054d6d4a0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop0p236' (000000006a773f8b): kobject_uevent_env FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 12151 Comm: syz-executor2 Tainted: G W 4.20.0-rc5+ #366 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x244/0x39d lib/dump_stack.c:113 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold.4+0xa/0x17 lib/fault-inject.c:149 __should_failslab+0x124/0x180 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1578 slab_pre_alloc_hook mm/slab.h:423 [inline] slab_alloc mm/slab.c:3378 [inline] __do_kmalloc mm/slab.c:3720 [inline] __kmalloc+0x2e0/0x760 mm/slab.c:3731 kmalloc include/linux/slab.h:551 [inline] kzalloc include/linux/slab.h:741 [inline] kobject_get_path+0xc2/0x1b0 lib/kobject.c:171 kobject_uevent_env+0x314/0x101e lib/kobject_uevent.c:519 kobject_uevent+0x1f/0x24 lib/kobject_uevent.c:636 device_del+0x6c9/0xb70 drivers/base/core.c:2091 delete_partition+0x233/0x2c0 block/partition-generic.c:288 blkpg_ioctl+0x3c5/0xc10 block/ioctl.c:93 blkdev_ioctl+0x6b7/0x21b0 block/ioctl.c:577 block_ioctl+0xee/0x130 fs/block_dev.c:1883 vfs_ioctl fs/ioctl.c:46 [inline] file_ioctl fs/ioctl.c:509 [inline] do_vfs_ioctl+0x1de/0x1790 fs/ioctl.c:696 ksys_ioctl+0xa9/0xd0 fs/ioctl.c:713 __do_sys_ioctl fs/ioctl.c:720 [inline] __se_sys_ioctl fs/ioctl.c:718 [inline] __x64_sys_ioctl+0x73/0xb0 fs/ioctl.c:718 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457569 Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007fe5f1646c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007fe5f1646c90 RCX: 0000000000457569 RDX: 00000000200006c0 RSI: 0000000000001269 RDI: 0000000000000003 RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe5f16476d4 R13: 00000000004be9e6 R14: 00000000004cee38 R15: 0000000000000004 IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready kobject: 'loop3' (0000000054d6d4a0): kobject_uevent_env kobject: 'loop3' (0000000054d6d4a0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop0' (000000002852f1e7): kobject_uevent_env kobject: 'loop0' (000000002852f1e7): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop0p236' (000000006a773f8b): kobject_cleanup, parent (null) kobject: 'loop0p236' (000000006a773f8b): auto cleanup 'remove' event kobject: 'loop0p236' (000000006a773f8b): kobject_uevent_env BUG: sleeping function called from invalid context at mm/slab.h:421 in_atomic(): 1, irqs_disabled(): 0, pid: 6101, name: syz-executor2 INFO: lockdep is turned off. Preemption disabled at: [] spin_lock include/linux/spinlock.h:329 [inline] [] copy_pte_range mm/memory.c:830 [inline] [] copy_pmd_range mm/memory.c:906 [inline] [] copy_pud_range mm/memory.c:940 [inline] [] copy_p4d_range mm/memory.c:962 [inline] [] copy_page_range+0xefe/0x2ee0 mm/memory.c:1024 CPU: 0 PID: 6101 Comm: syz-executor2 Tainted: G W 4.20.0-rc5+ #366 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x244/0x39d lib/dump_stack.c:113 ___might_sleep.cold.86+0x221/0x254 kernel/sched/core.c:6148 __might_sleep+0x95/0x190 kernel/sched/core.c:6101 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3378 [inline] kmem_cache_alloc_trace+0x2cd/0x750 mm/slab.c:3618 kmalloc include/linux/slab.h:546 [inline] kzalloc include/linux/slab.h:741 [inline] kobject_uevent_env+0x2f3/0x101e lib/kobject_uevent.c:514 kobject_uevent+0x1f/0x24 lib/kobject_uevent.c:636 kobject_cleanup lib/kobject.c:649 [inline] kobject_release lib/kobject.c:691 [inline] kref_put include/linux/kref.h:70 [inline] kobject_put.cold.9+0x170/0x2e4 lib/kobject.c:708 put_device+0x20/0x30 drivers/base/core.c:2024 delete_partition_rcu_cb+0x147/0x1b0 block/partition-generic.c:259 __rcu_reclaim kernel/rcu/rcu.h:240 [inline] rcu_do_batch kernel/rcu/tree.c:2437 [inline] invoke_rcu_callbacks kernel/rcu/tree.c:2716 [inline] rcu_process_callbacks+0x100a/0x1ac0 kernel/rcu/tree.c:2697 __do_softirq+0x308/0xb7e kernel/softirq.c:292 invoke_softirq kernel/softirq.c:373 [inline] irq_exit+0x17f/0x1c0 kernel/softirq.c:413 exiting_irq arch/x86/include/asm/apic.h:536 [inline] smp_apic_timer_interrupt+0x1cb/0x760 arch/x86/kernel/apic/apic.c:1061 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:804 RIP: 0010:__read_once_size include/linux/compiler.h:182 [inline] RIP: 0010:check_kcov_mode kernel/kcov.c:69 [inline] RIP: 0010:write_comp_data+0x22/0x70 kernel/kcov.c:122 Code: 90 90 90 90 90 90 90 90 55 48 89 e5 65 4c 8b 04 25 40 ee 01 00 65 8b 05 6c 52 82 7e a9 00 01 1f 00 75 51 41 8b 80 d8 12 00 00 <83> f8 03 75 45 49 8b 80 e0 12 00 00 45 8b 80 dc 12 00 00 4c 8b 08 RSP: 0018:ffff8881cbf8e810 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 RAX: 0000000000000000 RBX: 80000001c1f56007 RCX: ffffffff81b2298d RDX: 80000001c1f56007 RSI: 0000000000000000 RDI: 0000000000000007 RBP: ffff8881cbf8e810 R08: ffff8881cbf86500 R09: ffffed1037ef8821 R10: ffffed1037ef8821 R11: ffff8881bf7c410b R12: 1ffff110397f1d08 R13: ffff8881cbf8e8a0 R14: 0000000000000008 R15: ffff8881cb0ad988 __sanitizer_cov_trace_const_cmp8+0x18/0x20 kernel/kcov.c:195 __pte_needs_invert arch/x86/include/asm/pgtable-invert.h:18 [inline] protnone_mask arch/x86/include/asm/pgtable-invert.h:24 [inline] pte_pfn arch/x86/include/asm/pgtable.h:197 [inline] _vm_normal_page+0xdd/0x3c0 mm/memory.c:575 copy_one_pte mm/memory.c:791 [inline] copy_pte_range mm/memory.c:855 [inline] copy_pmd_range mm/memory.c:906 [inline] copy_pud_range mm/memory.c:940 [inline] copy_p4d_range mm/memory.c:962 [inline] copy_page_range+0x13de/0x2ee0 mm/memory.c:1024 dup_mmap kernel/fork.c:585 [inline] dup_mm kernel/fork.c:1318 [inline] copy_mm kernel/fork.c:1373 [inline] copy_process+0x45e9/0x87a0 kernel/fork.c:1917 _do_fork+0x1cb/0x11d0 kernel/fork.c:2216 __do_sys_clone kernel/fork.c:2323 [inline] __se_sys_clone kernel/fork.c:2317 [inline] __x64_sys_clone+0xbf/0x150 kernel/fork.c:2317 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x455b1a Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 RSP: 002b:00007ffc14228150 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 RAX: ffffffffffffffda RBX: 00007ffc14228150 RCX: 0000000000455b1a RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 RBP: 00007ffc14228190 R08: 0000000000000001 R09: 00000000016be940 R10: 00000000016bec10 R11: 0000000000000246 R12: 0000000000000001 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000002 BUG: sleeping function called from invalid context at mm/slab.c:3066 in_atomic(): 1, irqs_disabled(): 0, pid: 6101, name: syz-executor2 INFO: lockdep is turned off. Preemption disabled at: [] spin_lock include/linux/spinlock.h:329 [inline] [] copy_pte_range mm/memory.c:830 [inline] [] copy_pmd_range mm/memory.c:906 [inline] [] copy_pud_range mm/memory.c:940 [inline] [] copy_p4d_range mm/memory.c:962 [inline] [] copy_page_range+0xefe/0x2ee0 mm/memory.c:1024 kobject: 'loop4' (000000003b43f4ef): kobject_uevent_env CPU: 0 PID: 6101 Comm: syz-executor2 Tainted: G W 4.20.0-rc5+ #366 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: kobject: 'loop4' (000000003b43f4ef): fill_kobj_path: path = '/devices/virtual/block/loop4' __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x244/0x39d lib/dump_stack.c:113 kobject: 'loop5' (00000000d30a3234): kobject_uevent_env ___might_sleep.cold.86+0x221/0x254 kernel/sched/core.c:6148 kobject: 'loop5' (00000000d30a3234): fill_kobj_path: path = '/devices/virtual/block/loop5' __might_sleep+0x95/0x190 kernel/sched/core.c:6101 cache_alloc_debugcheck_before mm/slab.c:3066 [inline] slab_alloc mm/slab.c:3382 [inline] kmem_cache_alloc_trace+0x307/0x750 mm/slab.c:3618 kmalloc include/linux/slab.h:546 [inline] kzalloc include/linux/slab.h:741 [inline] kobject_uevent_env+0x2f3/0x101e lib/kobject_uevent.c:514 kobject: 'loop2' (00000000294fbee5): kobject_uevent_env kobject_uevent+0x1f/0x24 lib/kobject_uevent.c:636 kobject_cleanup lib/kobject.c:649 [inline] kobject_release lib/kobject.c:691 [inline] kref_put include/linux/kref.h:70 [inline] kobject_put.cold.9+0x170/0x2e4 lib/kobject.c:708 put_device+0x20/0x30 drivers/base/core.c:2024 kobject: 'loop2' (00000000294fbee5): fill_kobj_path: path = '/devices/virtual/block/loop2' delete_partition_rcu_cb+0x147/0x1b0 block/partition-generic.c:259 __rcu_reclaim kernel/rcu/rcu.h:240 [inline] rcu_do_batch kernel/rcu/tree.c:2437 [inline] invoke_rcu_callbacks kernel/rcu/tree.c:2716 [inline] rcu_process_callbacks+0x100a/0x1ac0 kernel/rcu/tree.c:2697 __do_softirq+0x308/0xb7e kernel/softirq.c:292 invoke_softirq kernel/softirq.c:373 [inline] irq_exit+0x17f/0x1c0 kernel/softirq.c:413 exiting_irq arch/x86/include/asm/apic.h:536 [inline] smp_apic_timer_interrupt+0x1cb/0x760 arch/x86/kernel/apic/apic.c:1061 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:804 RIP: 0010:__read_once_size include/linux/compiler.h:182 [inline] RIP: 0010:check_kcov_mode kernel/kcov.c:69 [inline] RIP: 0010:write_comp_data+0x22/0x70 kernel/kcov.c:122 Code: 90 90 90 90 90 90 90 90 55 48 89 e5 65 4c 8b 04 25 40 ee 01 00 65 8b 05 6c 52 82 7e a9 00 01 1f 00 75 51 41 8b 80 d8 12 00 00 <83> f8 03 75 45 49 8b 80 e0 12 00 00 45 8b 80 dc 12 00 00 4c 8b 08 RSP: 0018:ffff8881cbf8e810 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 RAX: 0000000000000000 RBX: 80000001c1f56007 RCX: ffffffff81b2298d RDX: 80000001c1f56007 RSI: 0000000000000000 RDI: 0000000000000007 RBP: ffff8881cbf8e810 R08: ffff8881cbf86500 R09: ffffed1037ef8821 R10: ffffed1037ef8821 R11: ffff8881bf7c410b R12: 1ffff110397f1d08 R13: ffff8881cbf8e8a0 R14: 0000000000000008 R15: ffff8881cb0ad988 __sanitizer_cov_trace_const_cmp8+0x18/0x20 kernel/kcov.c:195 __pte_needs_invert arch/x86/include/asm/pgtable-invert.h:18 [inline] protnone_mask arch/x86/include/asm/pgtable-invert.h:24 [inline] pte_pfn arch/x86/include/asm/pgtable.h:197 [inline] _vm_normal_page+0xdd/0x3c0 mm/memory.c:575 copy_one_pte mm/memory.c:791 [inline] copy_pte_range mm/memory.c:855 [inline] copy_pmd_range mm/memory.c:906 [inline] copy_pud_range mm/memory.c:940 [inline] copy_p4d_range mm/memory.c:962 [inline] copy_page_range+0x13de/0x2ee0 mm/memory.c:1024 dup_mmap kernel/fork.c:585 [inline] dup_mm kernel/fork.c:1318 [inline] copy_mm kernel/fork.c:1373 [inline] copy_process+0x45e9/0x87a0 kernel/fork.c:1917 _do_fork+0x1cb/0x11d0 kernel/fork.c:2216 __do_sys_clone kernel/fork.c:2323 [inline] __se_sys_clone kernel/fork.c:2317 [inline] __x64_sys_clone+0xbf/0x150 kernel/fork.c:2317 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x455b1a Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 RSP: 002b:00007ffc14228150 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 RAX: ffffffffffffffda RBX: 00007ffc14228150 RCX: 0000000000455b1a RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 RBP: 00007ffc14228190 R08: 0000000000000001 R09: 00000000016be940 R10: 00000000016bec10 R11: 0000000000000246 R12: 0000000000000001 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000002 BUG: sleeping function called from invalid context at mm/slab.h:421 kobject: 'loop1' (00000000c1d146a0): kobject_uevent_env in_atomic(): 1, irqs_disabled(): 0, pid: 6101, name: syz-executor2 INFO: lockdep is turned off. Preemption disabled at: [] spin_lock include/linux/spinlock.h:329 [inline] [] copy_pte_range mm/memory.c:830 [inline] [] copy_pmd_range mm/memory.c:906 [inline] [] copy_pud_range mm/memory.c:940 [inline] [] copy_p4d_range mm/memory.c:962 [inline] [] copy_page_range+0xefe/0x2ee0 mm/memory.c:1024 CPU: 0 PID: 6101 Comm: syz-executor2 Tainted: G W 4.20.0-rc5+ #366 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x244/0x39d lib/dump_stack.c:113 ___might_sleep.cold.86+0x221/0x254 kernel/sched/core.c:6148 __might_sleep+0x95/0x190 kernel/sched/core.c:6101 kobject: 'loop1' (00000000c1d146a0): fill_kobj_path: path = '/devices/virtual/block/loop1' slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3378 [inline] __do_kmalloc mm/slab.c:3720 [inline] __kmalloc+0x2d6/0x760 mm/slab.c:3731 kobject: 'loop3' (0000000054d6d4a0): kobject_uevent_env kobject: 'loop3' (0000000054d6d4a0): fill_kobj_path: path = '/devices/virtual/block/loop3' kmalloc include/linux/slab.h:551 [inline] kzalloc include/linux/slab.h:741 [inline] kobject_get_path+0xc2/0x1b0 lib/kobject.c:171 kobject_uevent_env+0x314/0x101e lib/kobject_uevent.c:519 kobject: 'loop3' (0000000054d6d4a0): kobject_uevent_env kobject_uevent+0x1f/0x24 lib/kobject_uevent.c:636 kobject: 'loop3' (0000000054d6d4a0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject_cleanup lib/kobject.c:649 [inline] kobject_release lib/kobject.c:691 [inline] kref_put include/linux/kref.h:70 [inline] kobject_put.cold.9+0x170/0x2e4 lib/kobject.c:708 put_device+0x20/0x30 drivers/base/core.c:2024 kobject: 'loop3' (0000000054d6d4a0): kobject_uevent_env delete_partition_rcu_cb+0x147/0x1b0 block/partition-generic.c:259 kobject: 'loop3' (0000000054d6d4a0): fill_kobj_path: path = '/devices/virtual/block/loop3' __rcu_reclaim kernel/rcu/rcu.h:240 [inline] rcu_do_batch kernel/rcu/tree.c:2437 [inline] invoke_rcu_callbacks kernel/rcu/tree.c:2716 [inline] rcu_process_callbacks+0x100a/0x1ac0 kernel/rcu/tree.c:2697 __do_softirq+0x308/0xb7e kernel/softirq.c:292 invoke_softirq kernel/softirq.c:373 [inline] irq_exit+0x17f/0x1c0 kernel/softirq.c:413 exiting_irq arch/x86/include/asm/apic.h:536 [inline] smp_apic_timer_interrupt+0x1cb/0x760 arch/x86/kernel/apic/apic.c:1061 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:804 RIP: 0010:__read_once_size include/linux/compiler.h:182 [inline] RIP: 0010:check_kcov_mode kernel/kcov.c:69 [inline] RIP: 0010:write_comp_data+0x22/0x70 kernel/kcov.c:122 Code: 90 90 90 90 90 90 90 90 55 48 89 e5 65 4c 8b 04 25 40 ee 01 00 65 8b 05 6c 52 82 7e a9 00 01 1f 00 75 51 41 8b 80 d8 12 00 00 <83> f8 03 75 45 49 8b 80 e0 12 00 00 45 8b 80 dc 12 00 00 4c 8b 08 RSP: 0018:ffff8881cbf8e810 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 RAX: 0000000000000000 RBX: 80000001c1f56007 RCX: ffffffff81b2298d RDX: 80000001c1f56007 RSI: 0000000000000000 RDI: 0000000000000007 RBP: ffff8881cbf8e810 R08: ffff8881cbf86500 R09: ffffed1037ef8821 R10: ffffed1037ef8821 R11: ffff8881bf7c410b R12: 1ffff110397f1d08 R13: ffff8881cbf8e8a0 R14: 0000000000000008 R15: ffff8881cb0ad988 __sanitizer_cov_trace_const_cmp8+0x18/0x20 kernel/kcov.c:195 __pte_needs_invert arch/x86/include/asm/pgtable-invert.h:18 [inline] protnone_mask arch/x86/include/asm/pgtable-invert.h:24 [inline] pte_pfn arch/x86/include/asm/pgtable.h:197 [inline] _vm_normal_page+0xdd/0x3c0 mm/memory.c:575 copy_one_pte mm/memory.c:791 [inline] copy_pte_range mm/memory.c:855 [inline] copy_pmd_range mm/memory.c:906 [inline] copy_pud_range mm/memory.c:940 [inline] copy_p4d_range mm/memory.c:962 [inline] copy_page_range+0x13de/0x2ee0 mm/memory.c:1024 dup_mmap kernel/fork.c:585 [inline] dup_mm kernel/fork.c:1318 [inline] copy_mm kernel/fork.c:1373 [inline] copy_process+0x45e9/0x87a0 kernel/fork.c:1917 _do_fork+0x1cb/0x11d0 kernel/fork.c:2216 __do_sys_clone kernel/fork.c:2323 [inline] __se_sys_clone kernel/fork.c:2317 [inline] __x64_sys_clone+0xbf/0x150 kernel/fork.c:2317 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x455b1a Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 RSP: 002b:00007ffc14228150 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 RAX: ffffffffffffffda RBX: 00007ffc14228150 RCX: 0000000000455b1a RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 RBP: 00007ffc14228190 R08: 0000000000000001 R09: 00000000016be940 R10: 00000000016bec10 R11: 0000000000000246 R12: 0000000000000001 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000002 BUG: sleeping function called from invalid context at mm/slab.c:3066 in_atomic(): 1, irqs_disabled(): 0, pid: 6101, name: syz-executor2 INFO: lockdep is turned off. Preemption disabled at: [] spin_lock include/linux/spinlock.h:329 [inline] [] copy_pte_range mm/memory.c:830 [inline] [] copy_pmd_range mm/memory.c:906 [inline] [] copy_pud_range mm/memory.c:940 [inline] [] copy_p4d_range mm/memory.c:962 [inline] [] copy_page_range+0xefe/0x2ee0 mm/memory.c:1024 CPU: 0 PID: 6101 Comm: syz-executor2 Tainted: G W 4.20.0-rc5+ #366 kobject: 'loop5' (00000000d30a3234): kobject_uevent_env Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x244/0x39d lib/dump_stack.c:113 kobject: 'loop5' (00000000d30a3234): fill_kobj_path: path = '/devices/virtual/block/loop5' ___might_sleep.cold.86+0x221/0x254 kernel/sched/core.c:6148 __might_sleep+0x95/0x190 kernel/sched/core.c:6101 kobject: 'loop0' (000000002852f1e7): kobject_uevent_env cache_alloc_debugcheck_before mm/slab.c:3066 [inline] slab_alloc mm/slab.c:3382 [inline] __do_kmalloc mm/slab.c:3720 [inline] __kmalloc+0x310/0x760 mm/slab.c:3731 kmalloc include/linux/slab.h:551 [inline] kzalloc include/linux/slab.h:741 [inline] kobject_get_path+0xc2/0x1b0 lib/kobject.c:171 kobject_uevent_env+0x314/0x101e lib/kobject_uevent.c:519 kobject: 'loop0' (000000002852f1e7): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject_uevent+0x1f/0x24 lib/kobject_uevent.c:636 kobject_cleanup lib/kobject.c:649 [inline] kobject_release lib/kobject.c:691 [inline] kref_put include/linux/kref.h:70 [inline] kobject_put.cold.9+0x170/0x2e4 lib/kobject.c:708 put_device+0x20/0x30 drivers/base/core.c:2024 delete_partition_rcu_cb+0x147/0x1b0 block/partition-generic.c:259 __rcu_reclaim kernel/rcu/rcu.h:240 [inline] rcu_do_batch kernel/rcu/tree.c:2437 [inline] invoke_rcu_callbacks kernel/rcu/tree.c:2716 [inline] rcu_process_callbacks+0x100a/0x1ac0 kernel/rcu/tree.c:2697 kobject: 'loop4' (000000003b43f4ef): kobject_uevent_env kobject: 'loop4' (000000003b43f4ef): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop3' (0000000054d6d4a0): kobject_uevent_env kobject: 'loop3' (0000000054d6d4a0): fill_kobj_path: path = '/devices/virtual/block/loop3' __do_softirq+0x308/0xb7e kernel/softirq.c:292 kobject: 'loop0' (000000002852f1e7): kobject_uevent_env kobject: 'loop0' (000000002852f1e7): fill_kobj_path: path = '/devices/virtual/block/loop0' invoke_softirq kernel/softirq.c:373 [inline] irq_exit+0x17f/0x1c0 kernel/softirq.c:413 exiting_irq arch/x86/include/asm/apic.h:536 [inline] smp_apic_timer_interrupt+0x1cb/0x760 arch/x86/kernel/apic/apic.c:1061 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:804 RIP: 0010:__read_once_size include/linux/compiler.h:182 [inline] RIP: 0010:check_kcov_mode kernel/kcov.c:69 [inline] RIP: 0010:write_comp_data+0x22/0x70 kernel/kcov.c:122 Code: 90 90 90 90 90 90 90 90 55 48 89 e5 65 4c 8b 04 25 40 ee 01 00 65 8b 05 6c 52 82 7e a9 00 01 1f 00 75 51 41 8b 80 d8 12 00 00 <83> f8 03 75 45 49 8b 80 e0 12 00 00 45 8b 80 dc 12 00 00 4c 8b 08 RSP: 0018:ffff8881cbf8e810 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 RAX: 0000000000000000 RBX: 80000001c1f56007 RCX: ffffffff81b2298d RDX: 80000001c1f56007 RSI: 0000000000000000 RDI: 0000000000000007 RBP: ffff8881cbf8e810 R08: ffff8881cbf86500 R09: ffffed1037ef8821 R10: ffffed1037ef8821 R11: ffff8881bf7c410b R12: 1ffff110397f1d08 R13: ffff8881cbf8e8a0 R14: 0000000000000008 R15: ffff8881cb0ad988 __sanitizer_cov_trace_const_cmp8+0x18/0x20 kernel/kcov.c:195 __pte_needs_invert arch/x86/include/asm/pgtable-invert.h:18 [inline] protnone_mask arch/x86/include/asm/pgtable-invert.h:24 [inline] pte_pfn arch/x86/include/asm/pgtable.h:197 [inline] _vm_normal_page+0xdd/0x3c0 mm/memory.c:575 copy_one_pte mm/memory.c:791 [inline] copy_pte_range mm/memory.c:855 [inline] copy_pmd_range mm/memory.c:906 [inline] copy_pud_range mm/memory.c:940 [inline] copy_p4d_range mm/memory.c:962 [inline] copy_page_range+0x13de/0x2ee0 mm/memory.c:1024 dup_mmap kernel/fork.c:585 [inline] dup_mm kernel/fork.c:1318 [inline] copy_mm kernel/fork.c:1373 [inline] copy_process+0x45e9/0x87a0 kernel/fork.c:1917 _do_fork+0x1cb/0x11d0 kernel/fork.c:2216 __do_sys_clone kernel/fork.c:2323 [inline] __se_sys_clone kernel/fork.c:2317 [inline] __x64_sys_clone+0xbf/0x150 kernel/fork.c:2317 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x455b1a Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 RSP: 002b:00007ffc14228150 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 RAX: ffffffffffffffda RBX: 00007ffc14228150 RCX: 0000000000455b1a RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 RBP: 00007ffc14228190 R08: 0000000000000001 R09: 00000000016be940 R10: 00000000016bec10 R11: 0000000000000246 R12: 0000000000000001 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000002 kobject: 'loop0p236' (000000006a773f8b): fill_kobj_path: path = '/loop0p236' BUG: sleeping function called from invalid context at kernel/locking/mutex.c:908 in_atomic(): 1, irqs_disabled(): 0, pid: 6101, name: syz-executor2 INFO: lockdep is turned off. Preemption disabled at: [] spin_lock include/linux/spinlock.h:329 [inline] [] copy_pte_range mm/memory.c:830 [inline] [] copy_pmd_range mm/memory.c:906 [inline] [] copy_pud_range mm/memory.c:940 [inline] [] copy_p4d_range mm/memory.c:962 [inline] [] copy_page_range+0xefe/0x2ee0 mm/memory.c:1024 CPU: 0 PID: 6101 Comm: syz-executor2 Tainted: G W 4.20.0-rc5+ #366 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x244/0x39d lib/dump_stack.c:113 ___might_sleep.cold.86+0x221/0x254 kernel/sched/core.c:6148 __might_sleep+0x95/0x190 kernel/sched/core.c:6101 __mutex_lock_common kernel/locking/mutex.c:908 [inline] __mutex_lock+0x138/0x16f0 kernel/locking/mutex.c:1072 mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:1087 kobject_uevent_env+0x7d7/0x101e lib/kobject_uevent.c:580 kobject_uevent+0x1f/0x24 lib/kobject_uevent.c:636 kobject_cleanup lib/kobject.c:649 [inline] kobject_release lib/kobject.c:691 [inline] kref_put include/linux/kref.h:70 [inline] kobject_put.cold.9+0x170/0x2e4 lib/kobject.c:708 put_device+0x20/0x30 drivers/base/core.c:2024 delete_partition_rcu_cb+0x147/0x1b0 block/partition-generic.c:259 __rcu_reclaim kernel/rcu/rcu.h:240 [inline] rcu_do_batch kernel/rcu/tree.c:2437 [inline] invoke_rcu_callbacks kernel/rcu/tree.c:2716 [inline] rcu_process_callbacks+0x100a/0x1ac0 kernel/rcu/tree.c:2697 __do_softirq+0x308/0xb7e kernel/softirq.c:292 invoke_softirq kernel/softirq.c:373 [inline] irq_exit+0x17f/0x1c0 kernel/softirq.c:413 exiting_irq arch/x86/include/asm/apic.h:536 [inline] smp_apic_timer_interrupt+0x1cb/0x760 arch/x86/kernel/apic/apic.c:1061 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:804 RIP: 0010:__read_once_size include/linux/compiler.h:182 [inline] RIP: 0010:check_kcov_mode kernel/kcov.c:69 [inline] RIP: 0010:write_comp_data+0x22/0x70 kernel/kcov.c:122 Code: 90 90 90 90 90 90 90 90 55 48 89 e5 65 4c 8b 04 25 40 ee 01 00 65 8b 05 6c 52 82 7e a9 00 01 1f 00 75 51 41 8b 80 d8 12 00 00 <83> f8 03 75 45 49 8b 80 e0 12 00 00 45 8b 80 dc 12 00 00 4c 8b 08 RSP: 0018:ffff8881cbf8e810 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 RAX: 0000000000000000 RBX: 80000001c1f56007 RCX: ffffffff81b2298d RDX: 80000001c1f56007 RSI: 0000000000000000 RDI: 0000000000000007 RBP: ffff8881cbf8e810 R08: ffff8881cbf86500 R09: ffffed1037ef8821 R10: ffffed1037ef8821 R11: ffff8881bf7c410b R12: 1ffff110397f1d08 R13: ffff8881cbf8e8a0 R14: 0000000000000008 R15: ffff8881cb0ad988 __sanitizer_cov_trace_const_cmp8+0x18/0x20 kernel/kcov.c:195 __pte_needs_invert arch/x86/include/asm/pgtable-invert.h:18 [inline] protnone_mask arch/x86/include/asm/pgtable-invert.h:24 [inline] pte_pfn arch/x86/include/asm/pgtable.h:197 [inline] _vm_normal_page+0xdd/0x3c0 mm/memory.c:575 copy_one_pte mm/memory.c:791 [inline] copy_pte_range mm/memory.c:855 [inline] copy_pmd_range mm/memory.c:906 [inline] copy_pud_range mm/memory.c:940 [inline] copy_p4d_range mm/memory.c:962 [inline] copy_page_range+0x13de/0x2ee0 mm/memory.c:1024 dup_mmap kernel/fork.c:585 [inline] dup_mm kernel/fork.c:1318 [inline] copy_mm kernel/fork.c:1373 [inline] copy_process+0x45e9/0x87a0 kernel/fork.c:1917 _do_fork+0x1cb/0x11d0 kernel/fork.c:2216 __do_sys_clone kernel/fork.c:2323 [inline] __se_sys_clone kernel/fork.c:2317 [inline] __x64_sys_clone+0xbf/0x150 kernel/fork.c:2317 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x455b1a Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 RSP: 002b:00007ffc14228150 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 RAX: ffffffffffffffda RBX: 00007ffc14228150 RCX: 0000000000455b1a RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 RBP: 00007ffc14228190 R08: 0000000000000001 R09: 00000000016be940 R10: 00000000016bec10 R11: 0000000000000246 R12: 0000000000000001 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000002 BUG: sleeping function called from invalid context at mm/slab.h:421 in_atomic(): 1, irqs_disabled(): 0, pid: 6101, name: syz-executor2 INFO: lockdep is turned off. Preemption disabled at: [] spin_lock include/linux/spinlock.h:329 [inline] [] copy_pte_range mm/memory.c:830 [inline] [] copy_pmd_range mm/memory.c:906 [inline] [] copy_pud_range mm/memory.c:940 [inline] [] copy_p4d_range mm/memory.c:962 [inline] [] copy_page_range+0xefe/0x2ee0 mm/memory.c:1024 CPU: 0 PID: 6101 Comm: syz-executor2 Tainted: G W 4.20.0-rc5+ #366 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x244/0x39d lib/dump_stack.c:113 ___might_sleep.cold.86+0x221/0x254 kernel/sched/core.c:6148 __might_sleep+0x95/0x190 kernel/sched/core.c:6101 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc_node mm/slab.c:3299 [inline] kmem_cache_alloc_node+0x264/0x730 mm/slab.c:3642 __alloc_skb+0x119/0x770 net/core/skbuff.c:193 alloc_skb include/linux/skbuff.h:997 [inline] alloc_uevent_skb+0x84/0x1da lib/kobject_uevent.c:288 uevent_net_broadcast_untagged lib/kobject_uevent.c:324 [inline] kobject_uevent_net_broadcast lib/kobject_uevent.c:406 [inline] kobject_uevent_env+0xa52/0x101e lib/kobject_uevent.c:587 kobject_uevent+0x1f/0x24 lib/kobject_uevent.c:636 kobject_cleanup lib/kobject.c:649 [inline] kobject_release lib/kobject.c:691 [inline] kref_put include/linux/kref.h:70 [inline] kobject_put.cold.9+0x170/0x2e4 lib/kobject.c:708 put_device+0x20/0x30 drivers/base/core.c:2024 delete_partition_rcu_cb+0x147/0x1b0 block/partition-generic.c:259 __rcu_reclaim kernel/rcu/rcu.h:240 [inline] rcu_do_batch kernel/rcu/tree.c:2437 [inline] invoke_rcu_callbacks kernel/rcu/tree.c:2716 [inline] rcu_process_callbacks+0x100a/0x1ac0 kernel/rcu/tree.c:2697 __do_softirq+0x308/0xb7e kernel/softirq.c:292 invoke_softirq kernel/softirq.c:373 [inline] irq_exit+0x17f/0x1c0 kernel/softirq.c:413 exiting_irq arch/x86/include/asm/apic.h:536 [inline] smp_apic_timer_interrupt+0x1cb/0x760 arch/x86/kernel/apic/apic.c:1061 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:804 RIP: 0010:__read_once_size include/linux/compiler.h:182 [inline] RIP: 0010:check_kcov_mode kernel/kcov.c:69 [inline] RIP: 0010:write_comp_data+0x22/0x70 kernel/kcov.c:122 Code: 90 90 90 90 90 90 90 90 55 48 89 e5 65 4c 8b 04 25 40 ee 01 00 65 8b 05 6c 52 82 7e a9 00 01 1f 00 75 51 41 8b 80 d8 12 00 00 <83> f8 03 75 45 49 8b 80 e0 12 00 00 45 8b 80 dc 12 00 00 4c 8b 08 RSP: 0018:ffff8881cbf8e810 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 RAX: 0000000000000000 RBX: 80000001c1f56007 RCX: ffffffff81b2298d RDX: 80000001c1f56007 RSI: 0000000000000000 RDI: 0000000000000007 RBP: ffff8881cbf8e810 R08: ffff8881cbf86500 R09: ffffed1037ef8821 R10: ffffed1037ef8821 R11: ffff8881bf7c410b R12: 1ffff110397f1d08 R13: ffff8881cbf8e8a0 R14: 0000000000000008 R15: ffff8881cb0ad988 __sanitizer_cov_trace_const_cmp8+0x18/0x20 kernel/kcov.c:195 __pte_needs_invert arch/x86/include/asm/pgtable-invert.h:18 [inline] protnone_mask arch/x86/include/asm/pgtable-invert.h:24 [inline] pte_pfn arch/x86/include/asm/pgtable.h:197 [inline] _vm_normal_page+0xdd/0x3c0 mm/memory.c:575 copy_one_pte mm/memory.c:791 [inline] copy_pte_range mm/memory.c:855 [inline] copy_pmd_range mm/memory.c:906 [inline] copy_pud_range mm/memory.c:940 [inline] copy_p4d_range mm/memory.c:962 [inline] copy_page_range+0x13de/0x2ee0 mm/memory.c:1024 dup_mmap kernel/fork.c:585 [inline] dup_mm kernel/fork.c:1318 [inline] copy_mm kernel/fork.c:1373 [inline] copy_process+0x45e9/0x87a0 kernel/fork.c:1917