RBP: 000000000072bf00 R08: 0000000020000380 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000009 R13: 00000000004d3e20 R14: 00000000004c29b6 R15: 0000000000000013 kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] PREEMPT SMP KASAN CPU: 1 PID: 22272 Comm: syz-executor5 Not tainted 4.19.0-rc4-next-20180921+ #77 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:p9_client_prepare_req.part.6+0x47c/0x940 net/9p/client.c:712 kobject: 'loop0' (00000000e5800371): kobject_uevent_env Code: ff 0f 87 fc fc ff ff e8 92 32 eb f9 0f be 85 a4 fe ff ff 4c 89 f2 48 c1 ea 03 89 85 a4 fe ff ff 48 b8 00 00 00 00 00 fc ff df <0f> b6 14 02 4c 89 f0 83 e0 07 83 c0 01 38 d0 7c 08 84 d2 0f 85 2b kobject: 'loop0' (00000000e5800371): fill_kobj_path: path = '/devices/virtual/block/loop0' RSP: 0018:ffff8801c049f1e0 EFLAGS: 00010203 RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc90003260000 RDX: 000000000000000b RSI: ffffffff87921e9e RDI: 0000000000000282 RBP: ffff8801c049f358 R08: ffff8801c377e080 R09: ffffed003b585b57 R10: ffffed003b585b57 R11: ffff8801dac2dabb R12: ffff8801b7e69d40 R13: 0000000000002000 R14: 000000000000005e R15: 0000000000002000 kobject: 'loop4' (000000000ac742f8): kobject_uevent_env FS: 00007faaba0bb700(0000) GS:ffff8801dad00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000000072c000 CR3: 00000001be7f3000 CR4: 00000000001406e0 kobject: 'loop4' (000000000ac742f8): fill_kobj_path: path = '/devices/virtual/block/loop4' Call Trace: kobject: 'loop2' (0000000026be6b7e): kobject_uevent_env kobject: 'loop2' (0000000026be6b7e): fill_kobj_path: path = '/devices/virtual/block/loop2' p9_client_prepare_req net/9p/client.c:744 [inline] p9_client_rpc+0x231/0x1320 net/9p/client.c:744 kobject: 'loop4' (000000000ac742f8): kobject_uevent_env kobject: 'loop4' (000000000ac742f8): fill_kobj_path: path = '/devices/virtual/block/loop4' p9_client_version net/9p/client.c:961 [inline] p9_client_create+0x9b7/0x1769 net/9p/client.c:1046 v9fs_session_init+0x217/0x1bb0 fs/9p/v9fs.c:421 v9fs_mount+0x7c/0x8f0 fs/9p/vfs_super.c:135 legacy_get_tree+0x131/0x460 fs/fs_context.c:718 vfs_get_tree+0x1cb/0x5c0 fs/super.c:1795 do_new_mount fs/namespace.c:2648 [inline] do_mount+0x70c/0x1d90 fs/namespace.c:2974 ksys_mount+0x12d/0x140 fs/namespace.c:3190 __do_sys_mount fs/namespace.c:3204 [inline] __se_sys_mount fs/namespace.c:3201 [inline] __x64_sys_mount+0xbe/0x150 fs/namespace.c:3201 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457679 Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007faaba0bac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007faaba0bb6d4 RCX: 0000000000457679 RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 0000000000000000 RBP: 000000000072bf00 R08: 0000000020000380 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000009 R13: 00000000004d3e20 R14: 00000000004c29b6 R15: 0000000000000013 Modules linked in: kobject: 'loop1' (00000000b8f7fe0c): kobject_uevent_env kobject: 'loop1' (00000000b8f7fe0c): fill_kobj_path: path = '/devices/virtual/block/loop1' ---[ end trace 4efcaf4b5b4b2a4a ]--- RIP: 0010:p9_client_prepare_req.part.6+0x47c/0x940 net/9p/client.c:712 Code: ff 0f 87 fc fc ff ff e8 92 32 eb f9 0f be 85 a4 fe ff ff 4c 89 f2 48 c1 ea 03 89 85 a4 fe ff ff 48 b8 00 00 00 00 00 fc ff df <0f> b6 14 02 4c 89 f0 83 e0 07 83 c0 01 38 d0 7c 08 84 d2 0f 85 2b RSP: 0018:ffff8801c049f1e0 EFLAGS: 00010203 RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc90003260000 RDX: 000000000000000b RSI: ffffffff87921e9e RDI: 0000000000000282 RBP: ffff8801c049f358 R08: ffff8801c377e080 R09: ffffed003b585b57 R10: ffffed003b585b57 R11: ffff8801dac2dabb R12: ffff8801b7e69d40 kobject: 'loop0' (00000000e5800371): kobject_uevent_env R13: 0000000000002000 R14: 000000000000005e R15: 0000000000002000 FS: 00007faaba0bb700(0000) GS:ffff8801dad00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 kobject: 'loop0' (00000000e5800371): fill_kobj_path: path = '/devices/virtual/block/loop0' CR2: 00007fcc786a9000 CR3: 00000001be7f3000 CR4: 00000000001406e0