general protection fault: 0000 [#1] PREEMPT SMP KASAN CPU: 0 PID: 9226 Comm: syz-executor2 Not tainted 4.19.0-rc5-next-20180924+ #78 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:p9_client_prepare_req.part.6+0x47c/0x940 net/9p/client.c:712 kobject: 'loop0' (0000000067f6211a): kobject_uevent_env Code: ff 0f 87 fc fc ff ff e8 52 16 eb f9 0f be 85 a4 fe ff ff 4c 89 f2 48 c1 ea 03 89 85 a4 fe ff ff 48 b8 00 00 00 00 00 fc ff df <0f> b6 14 02 4c 89 f0 83 e0 07 83 c0 01 38 d0 7c 08 84 d2 0f 85 2b RSP: 0018:ffff88018c51f1e0 EFLAGS: 00010203 RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc90003469000 kobject: 'loop0' (0000000067f6211a): fill_kobj_path: path = '/devices/virtual/block/loop0' RDX: 000000000000000b RSI: ffffffff8792436e RDI: 0000000000000282 RBP: ffff88018c51f358 R08: ffff88018da3c400 R09: ffffed003b585b57 R10: ffffed003b585b57 R11: ffff8801dac2dabb R12: ffff8801c44aed40 R13: 0000000000002000 R14: 000000000000005e R15: 0000000000002000 FS: 00007f3770a1d700(0000) GS:ffff8801dac00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000706158 CR3: 00000001cbf85000 CR4: 00000000001406f0 Call Trace: kobject: 'loop0' (0000000067f6211a): kobject_uevent_env kobject: 'loop0' (0000000067f6211a): fill_kobj_path: path = '/devices/virtual/block/loop0' p9_client_prepare_req net/9p/client.c:744 [inline] p9_client_rpc+0x231/0x1320 net/9p/client.c:744 kobject: 'loop4' (000000000e10e4d9): kobject_uevent_env kobject: 'loop4' (000000000e10e4d9): fill_kobj_path: path = '/devices/virtual/block/loop4' p9_client_version net/9p/client.c:961 [inline] p9_client_create+0x9b7/0x1769 net/9p/client.c:1046 kobject: 'loop0' (0000000067f6211a): kobject_uevent_env kobject: 'loop0' (0000000067f6211a): fill_kobj_path: path = '/devices/virtual/block/loop0' v9fs_session_init+0x217/0x1bb0 fs/9p/v9fs.c:421 device lo entered promiscuous mode kobject: 'loop5' (00000000269d2eb5): kobject_uevent_env kobject: 'loop5' (00000000269d2eb5): fill_kobj_path: path = '/devices/virtual/block/loop5' v9fs_mount+0x7c/0x8f0 fs/9p/vfs_super.c:135 device lo left promiscuous mode legacy_get_tree+0x131/0x460 fs/fs_context.c:718 vfs_get_tree+0x1cb/0x5c0 fs/super.c:1795 do_new_mount fs/namespace.c:2648 [inline] do_mount+0x70c/0x1d90 fs/namespace.c:2974 ksys_mount+0x12d/0x140 fs/namespace.c:3190 __do_sys_mount fs/namespace.c:3204 [inline] __se_sys_mount fs/namespace.c:3201 [inline] __x64_sys_mount+0xbe/0x150 fs/namespace.c:3201 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457579 Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f3770a1cc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007f3770a1cc90 RCX: 0000000000457579 RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 0000000000000000 RBP: 000000000072bf00 R08: 0000000020000380 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3770a1d6d4 R13: 00000000004c281d R14: 00000000004d3b60 R15: 0000000000000009 Modules linked in: ---[ end trace e920c212a087ab9e ]--- RIP: 0010:p9_client_prepare_req.part.6+0x47c/0x940 net/9p/client.c:712 Code: ff 0f 87 fc fc ff ff e8 52 16 eb f9 0f be 85 a4 fe ff ff 4c 89 f2 48 c1 ea 03 89 85 a4 fe ff ff 48 b8 00 00 00 00 00 fc ff df <0f> b6 14 02 4c 89 f0 83 e0 07 83 c0 01 38 d0 7c 08 84 d2 0f 85 2b kobject: 'loop1' (000000007ee008e0): kobject_uevent_env kobject: 'loop1' (000000007ee008e0): fill_kobj_path: path = '/devices/virtual/block/loop1' RSP: 0018:ffff88018c51f1e0 EFLAGS: 00010203 RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc90003469000 kobject: 'loop4' (000000000e10e4d9): kobject_uevent_env kobject: 'loop4' (000000000e10e4d9): fill_kobj_path: path = '/devices/virtual/block/loop4' RDX: 000000000000000b RSI: ffffffff8792436e RDI: 0000000000000282 kobject: 'loop5' (00000000269d2eb5): kobject_uevent_env RBP: ffff88018c51f358 R08: ffff88018da3c400 R09: ffffed003b585b57 kobject: 'loop5' (00000000269d2eb5): fill_kobj_path: path = '/devices/virtual/block/loop5' R10: ffffed003b585b57 R11: ffff8801dac2dabb R12: ffff8801c44aed40 kobject: 'loop0' (0000000067f6211a): kobject_uevent_env R13: 0000000000002000 R14: 000000000000005e R15: 0000000000002000 kobject: 'loop0' (0000000067f6211a): fill_kobj_path: path = '/devices/virtual/block/loop0' FS: 00007f3770a1d700(0000) GS:ffff8801dac00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000625208 CR3: 00000001cbf85000 CR4: 00000000001406f0