bridge0: received packet on syz_tun with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) 8021q: adding VLAN 0 to HW filter on device team0 netlink: 'syz-executor4': attribute type 17 has an invalid length. ====================================================== WARNING: possible circular locking dependency detected 4.19.0-rc5+ #243 Not tainted ------------------------------------------------------ syz-executor4/25025 is trying to acquire lock: 00000000a1be75a4 ((wq_completion)bond_dev->name){+.+.}, at: flush_workqueue+0x2db/0x1e10 kernel/workqueue.c:2652 but task is already holding lock: 00000000e167ad30 (rtnl_mutex){+.+.}, at: rtnl_lock net/core/rtnetlink.c:77 [inline] 00000000e167ad30 (rtnl_mutex){+.+.}, at: rtnetlink_rcv_msg+0x40e/0xc20 net/core/rtnetlink.c:4727 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #2 (rtnl_mutex){+.+.}: __mutex_lock_common kernel/locking/mutex.c:925 [inline] __mutex_lock+0x166/0x1700 kernel/locking/mutex.c:1072 mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:1087 rtnl_lock+0x17/0x20 net/core/rtnetlink.c:77 bond_netdev_notify drivers/net/bonding/bond_main.c:1303 [inline] bond_netdev_notify_work+0x44/0xd0 drivers/net/bonding/bond_main.c:1313 process_one_work+0xc90/0x1b90 kernel/workqueue.c:2153 worker_thread+0x17f/0x1390 kernel/workqueue.c:2296 kthread+0x35a/0x420 kernel/kthread.c:246 ret_from_fork+0x3a/0x50 arch/x86/entry/entry_64.S:413 -> #1 ((work_completion)(&(&nnw->work)->work)){+.+.}: process_one_work+0xc0a/0x1b90 kernel/workqueue.c:2129 worker_thread+0x17f/0x1390 kernel/workqueue.c:2296 kthread+0x35a/0x420 kernel/kthread.c:246 ret_from_fork+0x3a/0x50 arch/x86/entry/entry_64.S:413 -> #0 ((wq_completion)bond_dev->name){+.+.}: lock_acquire+0x1ed/0x520 kernel/locking/lockdep.c:3900 flush_workqueue+0x30a/0x1e10 kernel/workqueue.c:2655 drain_workqueue+0x2a9/0x640 kernel/workqueue.c:2820 destroy_workqueue+0xc6/0x9c0 kernel/workqueue.c:4155 __alloc_workqueue_key+0xed8/0x1170 kernel/workqueue.c:4138 bond_init+0x265/0x940 drivers/net/bonding/bond_main.c:4727 register_netdevice+0x332/0x10f0 net/core/dev.c:8410 bond_newlink+0x49/0xa0 drivers/net/bonding/bond_netlink.c:453 rtnl_newlink+0xec6/0x1d40 net/core/rtnetlink.c:3118 rtnetlink_rcv_msg+0x46a/0xc20 net/core/rtnetlink.c:4730 netlink_rcv_skb+0x172/0x440 net/netlink/af_netlink.c:2447 rtnetlink_rcv+0x1c/0x20 net/core/rtnetlink.c:4748 netlink_unicast_kernel net/netlink/af_netlink.c:1310 [inline] netlink_unicast+0x5a5/0x760 net/netlink/af_netlink.c:1336 netlink_sendmsg+0xa18/0xfc0 net/netlink/af_netlink.c:1901 sock_sendmsg_nosec net/socket.c:621 [inline] sock_sendmsg+0xd5/0x120 net/socket.c:631 ___sys_sendmsg+0x7fd/0x930 net/socket.c:2116 __sys_sendmsg+0x11d/0x280 net/socket.c:2154 __do_sys_sendmsg net/socket.c:2163 [inline] __se_sys_sendmsg net/socket.c:2161 [inline] __x64_sys_sendmsg+0x78/0xb0 net/socket.c:2161 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe other info that might help us debug this: Chain exists of: (wq_completion)bond_dev->name --> (work_completion)(&(&nnw->work)->work) --> rtnl_mutex Possible unsafe locking scenario: CPU0 CPU1 ---- ---- lock(rtnl_mutex); lock((work_completion)(&(&nnw->work)->work)); lock(rtnl_mutex); lock((wq_completion)bond_dev->name); *** DEADLOCK *** 1 lock held by syz-executor4/25025: #0: 00000000e167ad30 (rtnl_mutex){+.+.}, at: rtnl_lock net/core/rtnetlink.c:77 [inline] #0: 00000000e167ad30 (rtnl_mutex){+.+.}, at: rtnetlink_rcv_msg+0x40e/0xc20 net/core/rtnetlink.c:4727 stack backtrace: CPU: 1 PID: 25025 Comm: syz-executor4 Not tainted 4.19.0-rc5+ #243 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1c4/0x2b4 lib/dump_stack.c:113 print_circular_bug.isra.33.cold.54+0x1bd/0x27d kernel/locking/lockdep.c:1221 check_prev_add kernel/locking/lockdep.c:1861 [inline] check_prevs_add kernel/locking/lockdep.c:1974 [inline] validate_chain kernel/locking/lockdep.c:2415 [inline] __lock_acquire+0x33e4/0x4ec0 kernel/locking/lockdep.c:3411 lock_acquire+0x1ed/0x520 kernel/locking/lockdep.c:3900 flush_workqueue+0x30a/0x1e10 kernel/workqueue.c:2655 drain_workqueue+0x2a9/0x640 kernel/workqueue.c:2820 destroy_workqueue+0xc6/0x9c0 kernel/workqueue.c:4155 __alloc_workqueue_key+0xed8/0x1170 kernel/workqueue.c:4138 bond_init+0x265/0x940 drivers/net/bonding/bond_main.c:4727 register_netdevice+0x332/0x10f0 net/core/dev.c:8410 bond_newlink+0x49/0xa0 drivers/net/bonding/bond_netlink.c:453 rtnl_newlink+0xec6/0x1d40 net/core/rtnetlink.c:3118 rtnetlink_rcv_msg+0x46a/0xc20 net/core/rtnetlink.c:4730 netlink_rcv_skb+0x172/0x440 net/netlink/af_netlink.c:2447 rtnetlink_rcv+0x1c/0x20 net/core/rtnetlink.c:4748 netlink_unicast_kernel net/netlink/af_netlink.c:1310 [inline] netlink_unicast+0x5a5/0x760 net/netlink/af_netlink.c:1336 netlink_sendmsg+0xa18/0xfc0 net/netlink/af_netlink.c:1901 sock_sendmsg_nosec net/socket.c:621 [inline] sock_sendmsg+0xd5/0x120 net/socket.c:631 ___sys_sendmsg+0x7fd/0x930 net/socket.c:2116 __sys_sendmsg+0x11d/0x280 net/socket.c:2154 __do_sys_sendmsg net/socket.c:2163 [inline] __se_sys_sendmsg net/socket.c:2161 [inline] __x64_sys_sendmsg+0x78/0xb0 net/socket.c:2161 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457579 Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f2cd6deac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457579 RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2cd6deb6d4 R13: 00000000004c38b9 R14: 00000000004d5700 R15: 00000000ffffffff netlink: 'syz-executor4': attribute type 17 has an invalid length. kobject: 'loop4' (000000000f0490b7): kobject_uevent_env kobject: 'loop4' (000000000f0490b7): fill_kobj_path: path = '/devices/virtual/block/loop4' netlink: 'syz-executor1': attribute type 1 has an invalid length. kobject: 'loop5' (00000000b66695c8): kobject_uevent_env bridge0: received packet on syz_tun with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) kobject: 'loop5' (00000000b66695c8): fill_kobj_path: path = '/devices/virtual/block/loop5' netlink: 'syz-executor1': attribute type 1 has an invalid length. bridge0: received packet on syz_tun with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) kobject: 'loop0' (000000003be81697): kobject_uevent_env kobject: 'loop0' (000000003be81697): fill_kobj_path: path = '/devices/virtual/block/loop0' netlink: 'syz-executor0': attribute type 1 has an invalid length. netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. bridge0: received packet on syz_tun with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) kobject: 'loop1' (0000000085f792d9): kobject_uevent_env kobject: 'loop1' (0000000085f792d9): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop2' (0000000022ed967d): kobject_uevent_env kobject: 'loop2' (0000000022ed967d): fill_kobj_path: path = '/devices/virtual/block/loop2' netlink: 'syz-executor0': attribute type 1 has an invalid length. kobject: 'loop3' (000000001d81e739): kobject_uevent_env bridge0: received packet on syz_tun with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. kobject: 'loop3' (000000001d81e739): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop0' (000000003be81697): kobject_uevent_env kobject: 'loop0' (000000003be81697): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop3' (000000001d81e739): kobject_uevent_env kobject: 'loop3' (000000001d81e739): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop2' (0000000022ed967d): kobject_uevent_env kobject: 'loop2' (0000000022ed967d): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop3' (000000001d81e739): kobject_uevent_env kobject: 'loop3' (000000001d81e739): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop1' (0000000085f792d9): kobject_uevent_env kobject: 'loop1' (0000000085f792d9): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop0' (000000003be81697): kobject_uevent_env kobject: 'loop0' (000000003be81697): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop5' (00000000b66695c8): kobject_uevent_env kobject: 'loop5' (00000000b66695c8): fill_kobj_path: path = '/devices/virtual/block/loop5' can: request_module (can-proto-0) failed. can: request_module (can-proto-0) failed. kobject: 'loop5' (00000000b66695c8): kobject_uevent_env kobject: 'loop5' (00000000b66695c8): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop2' (0000000022ed967d): kobject_uevent_env kobject: 'loop2' (0000000022ed967d): fill_kobj_path: path = '/devices/virtual/block/loop2' EXT4-fs error (device sda1): mb_free_blocks:1457: group 10, block 335200:freeing already freed block (bit 7520); block bitmap corrupt. EXT4-fs error (device sda1): ext4_mb_generate_buddy:747: group 10, block bitmap and bg descriptor inconsistent: 676 vs 687 free clusters kobject: 'loop4' (000000000f0490b7): kobject_uevent_env kobject: 'loop4' (000000000f0490b7): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop3' (000000001d81e739): kobject_uevent_env kobject: 'loop3' (000000001d81e739): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop2' (0000000022ed967d): kobject_uevent_env kobject: 'loop2' (0000000022ed967d): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop4' (000000000f0490b7): kobject_uevent_env kobject: 'loop4' (000000000f0490b7): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop1' (0000000085f792d9): kobject_uevent_env kobject: 'loop1' (0000000085f792d9): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop5' (00000000b66695c8): kobject_uevent_env FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 25193 Comm: syz-executor1 Not tainted 4.19.0-rc5+ #243 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1c4/0x2b4 lib/dump_stack.c:113 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold.4+0xa/0x17 lib/fault-inject.c:149 __should_failslab+0x124/0x180 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1557 slab_pre_alloc_hook mm/slab.h:423 [inline] slab_alloc mm/slab.c:3378 [inline] kmem_cache_alloc+0x47/0x730 mm/slab.c:3552 netlink: 'syz-executor4': attribute type 1 has an invalid length. __build_skb+0xab/0x430 net/core/skbuff.c:281 netlink: 4 bytes leftover after parsing attributes in process `syz-executor4'. __napi_alloc_skb+0x1d6/0x310 net/core/skbuff.c:482 napi_alloc_skb include/linux/skbuff.h:2696 [inline] napi_get_frags+0x67/0x140 net/core/dev.c:5624 tun_napi_alloc_frags drivers/net/tun.c:1469 [inline] tun_get_user+0x1e6c/0x42a0 drivers/net/tun.c:1827 tun_chr_write_iter+0xb9/0x160 drivers/net/tun.c:2001 call_write_iter include/linux/fs.h:1808 [inline] do_iter_readv_writev+0x8b0/0xa80 fs/read_write.c:680 do_iter_write+0x185/0x5f0 fs/read_write.c:959 vfs_writev+0x1f1/0x360 fs/read_write.c:1004 do_writev+0x11a/0x310 fs/read_write.c:1039 __do_sys_writev fs/read_write.c:1112 [inline] __se_sys_writev fs/read_write.c:1109 [inline] __x64_sys_writev+0x75/0xb0 fs/read_write.c:1109 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457431 Code: 75 14 b8 14 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 54 b5 fb ff c3 48 83 ec 08 e8 1a 2d 00 00 48 89 04 24 b8 14 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 63 2d 00 00 48 89 d0 48 83 c4 08 48 3d 01 RSP: 002b:00007f77846c2ba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 RAX: ffffffffffffffda RBX: 0000000000000036 RCX: 0000000000457431 RDX: 0000000000000001 RSI: 00007f77846c2bf0 RDI: 00000000000000f0 RBP: 0000000020000000 R08: 00000000000000f0 R09: 0000000000000000 R10: 0000000000000064 R11: 0000000000000293 R12: 00007f77846c36d4 R13: 00000000004c48a4 R14: 00000000004d7b90 R15: 0000000000000003 kobject: 'loop5' (00000000b66695c8): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop1' (0000000085f792d9): kobject_uevent_env kobject: 'loop1' (0000000085f792d9): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop3' (000000001d81e739): kobject_uevent_env kobject: 'loop3' (000000001d81e739): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop0' (000000003be81697): kobject_uevent_env kobject: 'loop0' (000000003be81697): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop1' (0000000085f792d9): kobject_uevent_env kobject: 'loop1' (0000000085f792d9): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop4' (000000000f0490b7): kobject_uevent_env kobject: 'loop4' (000000000f0490b7): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop3' (000000001d81e739): kobject_uevent_env kobject: 'loop3' (000000001d81e739): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop0' (000000003be81697): kobject_uevent_env kobject: 'loop0' (000000003be81697): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop4' (000000000f0490b7): kobject_uevent_env kobject: 'loop4' (000000000f0490b7): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop3' (000000001d81e739): kobject_uevent_env kobject: 'loop3' (000000001d81e739): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop0' (000000003be81697): kobject_uevent_env kobject: 'loop0' (000000003be81697): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop5' (00000000b66695c8): kobject_uevent_env kobject: 'loop5' (00000000b66695c8): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop1' (0000000085f792d9): kobject_uevent_env kobject: 'loop1' (0000000085f792d9): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop2' (0000000022ed967d): kobject_uevent_env kobject: 'loop2' (0000000022ed967d): fill_kobj_path: path = '/devices/virtual/block/loop2' FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 25234 Comm: syz-executor1 Not tainted 4.19.0-rc5+ #243 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 kobject: 'loop5' (00000000b66695c8): kobject_uevent_env Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1c4/0x2b4 lib/dump_stack.c:113 kobject: 'loop5' (00000000b66695c8): fill_kobj_path: path = '/devices/virtual/block/loop5' fail_dump lib/fault-inject.c:51 [inline] should_fail.cold.4+0xa/0x17 lib/fault-inject.c:149 kobject: 'loop4' (000000000f0490b7): kobject_uevent_env kobject: 'loop4' (000000000f0490b7): fill_kobj_path: path = '/devices/virtual/block/loop4' __should_failslab+0x124/0x180 mm/failslab.c:32 netlink: 20 bytes leftover after parsing attributes in process `syz-executor4'. should_failslab+0x9/0x14 mm/slab_common.c:1557 slab_pre_alloc_hook mm/slab.h:423 [inline] slab_alloc mm/slab.c:3378 [inline] kmem_cache_alloc+0x47/0x730 mm/slab.c:3552 __nf_conntrack_alloc+0x1aa/0x7c0 net/netfilter/nf_conntrack_core.c:1281 netlink: 20 bytes leftover after parsing attributes in process `syz-executor4'. kobject: 'loop0' (000000003be81697): kobject_uevent_env init_conntrack+0xfc6/0x1380 net/netfilter/nf_conntrack_core.c:1361 kobject: 'loop0' (000000003be81697): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop4' (000000000f0490b7): kobject_uevent_env resolve_normal_ct net/netfilter/nf_conntrack_core.c:1465 [inline] nf_conntrack_in+0xb49/0x1130 net/netfilter/nf_conntrack_core.c:1543 kobject: 'loop4' (000000000f0490b7): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop3' (000000001d81e739): kobject_uevent_env ipv4_conntrack_in+0x61/0x90 net/netfilter/nf_conntrack_proto.c:458 nf_hook_entry_hookfn include/linux/netfilter.h:119 [inline] nf_hook_slow+0xc2/0x1c0 net/netfilter/core.c:511 nf_hook include/linux/netfilter.h:242 [inline] NF_HOOK include/linux/netfilter.h:285 [inline] ip_rcv+0x392/0x610 net/ipv4/ip_input.c:524 kobject: 'loop3' (000000001d81e739): fill_kobj_path: path = '/devices/virtual/block/loop3' __netif_receive_skb_one_core+0x14d/0x200 net/core/dev.c:4894 kobject: 'loop3' (000000001d81e739): kobject_uevent_env __netif_receive_skb+0x2c/0x1e0 net/core/dev.c:5004 netif_receive_skb_internal+0x12c/0x620 net/core/dev.c:5107 kobject: 'loop3' (000000001d81e739): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop4' (000000000f0490b7): kobject_uevent_env napi_frags_finish net/core/dev.c:5643 [inline] napi_gro_frags+0x75a/0xc90 net/core/dev.c:5716 IPVS: set_ctl: invalid protocol: 47 224.0.0.1:20002 tun_get_user+0x31d5/0x42a0 drivers/net/tun.c:1956 kobject: 'loop4' (000000000f0490b7): fill_kobj_path: path = '/devices/virtual/block/loop4' kernel msg: ebtables bug: please report to author: Unknown flag for bitmask net_ratelimit: 23 callbacks suppressed bridge0: received packet on syz_tun with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) tun_chr_write_iter+0xb9/0x160 drivers/net/tun.c:2001 call_write_iter include/linux/fs.h:1808 [inline] do_iter_readv_writev+0x8b0/0xa80 fs/read_write.c:680 bridge0: received packet on syz_tun with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) do_iter_write+0x185/0x5f0 fs/read_write.c:959 vfs_writev+0x1f1/0x360 fs/read_write.c:1004 kobject: 'loop3' (000000001d81e739): kobject_uevent_env do_writev+0x11a/0x310 fs/read_write.c:1039 kobject: 'loop3' (000000001d81e739): fill_kobj_path: path = '/devices/virtual/block/loop3' __do_sys_writev fs/read_write.c:1112 [inline] __se_sys_writev fs/read_write.c:1109 [inline] __x64_sys_writev+0x75/0xb0 fs/read_write.c:1109 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 bridge0: received packet on syz_tun with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457431 bridge0: received packet on syz_tun with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) Code: 75 14 b8 14 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 54 b5 fb ff c3 48 83 ec 08 e8 1a 2d 00 00 48 89 04 24 b8 14 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 63 2d 00 00 48 89 d0 48 83 c4 08 48 3d 01 RSP: 002b:00007f77846c2ba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 RAX: ffffffffffffffda RBX: 0000000000000036 RCX: 0000000000457431 RDX: 0000000000000001 RSI: 00007f77846c2bf0 RDI: 00000000000000f0 RBP: 0000000020000000 R08: 00000000000000f0 R09: 0000000000000000 R10: 0000000000000064 R11: 0000000000000293 R12: 00007f77846c36d4 R13: 00000000004c48a4 R14: 00000000004d7b90 R15: 0000000000000003 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 kobject: 'loop1' (0000000085f792d9): kobject_uevent_env CPU: 1 PID: 25278 Comm: syz-executor1 Not tainted 4.19.0-rc5+ #243 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 kobject: 'loop1' (0000000085f792d9): fill_kobj_path: path = '/devices/virtual/block/loop1' Call Trace: kobject: 'loop3' (000000001d81e739): kobject_uevent_env __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1c4/0x2b4 lib/dump_stack.c:113 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold.4+0xa/0x17 lib/fault-inject.c:149 kobject: 'loop3' (000000001d81e739): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop5' (00000000b66695c8): kobject_uevent_env kobject: 'loop5' (00000000b66695c8): fill_kobj_path: path = '/devices/virtual/block/loop5' bridge0: received packet on syz_tun with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) bridge0: received packet on syz_tun with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) __should_failslab+0x124/0x180 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1557 slab_pre_alloc_hook mm/slab.h:423 [inline] slab_alloc mm/slab.c:3378 [inline] __do_kmalloc mm/slab.c:3716 [inline] __kmalloc_track_caller+0x5f/0x750 mm/slab.c:3733 __do_krealloc mm/slab_common.c:1468 [inline] __krealloc+0x6f/0xb0 mm/slab_common.c:1490 nf_ct_ext_add+0x369/0x7b0 net/netfilter/nf_conntrack_extend.c:76 nf_ct_labels_ext_add include/net/netfilter/nf_conntrack_labels.h:34 [inline] init_conntrack+0x5e1/0x1380 net/netfilter/nf_conntrack_core.c:1385 resolve_normal_ct net/netfilter/nf_conntrack_core.c:1465 [inline] nf_conntrack_in+0xb49/0x1130 net/netfilter/nf_conntrack_core.c:1543 ipv4_conntrack_in+0x61/0x90 net/netfilter/nf_conntrack_proto.c:458 nf_hook_entry_hookfn include/linux/netfilter.h:119 [inline] nf_hook_slow+0xc2/0x1c0 net/netfilter/core.c:511 nf_hook include/linux/netfilter.h:242 [inline] NF_HOOK include/linux/netfilter.h:285 [inline] ip_rcv+0x392/0x610 net/ipv4/ip_input.c:524 __netif_receive_skb_one_core+0x14d/0x200 net/core/dev.c:4894 __netif_receive_skb+0x2c/0x1e0 net/core/dev.c:5004 netif_receive_skb_internal+0x12c/0x620 net/core/dev.c:5107 napi_frags_finish net/core/dev.c:5643 [inline] napi_gro_frags+0x75a/0xc90 net/core/dev.c:5716 tun_get_user+0x31d5/0x42a0 drivers/net/tun.c:1956 tun_chr_write_iter+0xb9/0x160 drivers/net/tun.c:2001 call_write_iter include/linux/fs.h:1808 [inline] do_iter_readv_writev+0x8b0/0xa80 fs/read_write.c:680 do_iter_write+0x185/0x5f0 fs/read_write.c:959 vfs_writev+0x1f1/0x360 fs/read_write.c:1004 do_writev+0x11a/0x310 fs/read_write.c:1039 __do_sys_writev fs/read_write.c:1112 [inline] __se_sys_writev fs/read_write.c:1109 [inline] __x64_sys_writev+0x75/0xb0 fs/read_write.c:1109 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457431 Code: 75 14 b8 14 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 54 b5 fb ff c3 48 83 ec 08 e8 1a 2d 00 00 48 89 04 24 b8 14 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 63 2d 00 00 48 89 d0 48 83 c4 08 48 3d 01 RSP: 002b:00007f77846c2ba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 RAX: ffffffffffffffda RBX: 0000000000000036 RCX: 0000000000457431 RDX: 0000000000000001 RSI: 00007f77846c2bf0 RDI: 00000000000000f0 RBP: 0000000020000000 R08: 00000000000000f0 R09: 0000000000000000 R10: 0000000000000064 R11: 0000000000000293 R12: 00007f77846c36d4 R13: 00000000004c48a4 R14: 00000000004d7b90 R15: 0000000000000003 IPVS: set_ctl: invalid protocol: 47 224.0.0.1:20002 kernel msg: ebtables bug: please report to author: entries_size too small kobject: 'loop0' (000000003be81697): kobject_uevent_env bridge0: received packet on syz_tun with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) kobject: 'loop0' (000000003be81697): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop4' (000000000f0490b7): kobject_uevent_env bridge0: received packet on syz_tun with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) kobject: 'loop4' (000000000f0490b7): fill_kobj_path: path = '/devices/virtual/block/loop4' FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 25310 Comm: syz-executor1 Not tainted 4.19.0-rc5+ #243 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1c4/0x2b4 lib/dump_stack.c:113 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold.4+0xa/0x17 lib/fault-inject.c:149 __should_failslab+0x124/0x180 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1557 slab_pre_alloc_hook mm/slab.h:423 [inline] slab_alloc mm/slab.c:3378 [inline] kmem_cache_alloc+0x47/0x730 mm/slab.c:3552 bridge0: received packet on syz_tun with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) dst_alloc+0xbb/0x1d0 net/core/dst.c:105 rt_dst_alloc+0x105/0x540 net/ipv4/route.c:1571 netlink: 20 bytes leftover after parsing attributes in process `syz-executor4'. ip_route_input_slow+0x1d14/0x3ea0 net/ipv4/route.c:2047 bridge0: received packet on syz_tun with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) kobject: 'loop1' (0000000085f792d9): kobject_uevent_env kobject: 'loop1' (0000000085f792d9): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop2' (0000000022ed967d): kobject_uevent_env kobject: 'loop2' (0000000022ed967d): fill_kobj_path: path = '/devices/virtual/block/loop2' ip_route_input_rcu+0x10a/0xd80 net/ipv4/route.c:2176 kobject: 'loop5' (00000000b66695c8): kobject_uevent_env ip_route_input_noref+0x11d/0x260 net/ipv4/route.c:2122 ip_rcv_finish_core.isra.16+0x5b5/0x1f40 net/ipv4/ip_input.c:341 kobject: 'loop5' (00000000b66695c8): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop3' (000000001d81e739): kobject_uevent_env ip_rcv_finish+0xc6/0x300 net/ipv4/ip_input.c:413 NF_HOOK include/linux/netfilter.h:287 [inline] ip_rcv+0xed/0x610 net/ipv4/ip_input.c:524 kobject: 'loop3' (000000001d81e739): fill_kobj_path: path = '/devices/virtual/block/loop3' __netif_receive_skb_one_core+0x14d/0x200 net/core/dev.c:4894 __netif_receive_skb+0x2c/0x1e0 net/core/dev.c:5004 netif_receive_skb_internal+0x12c/0x620 net/core/dev.c:5107 kobject: 'loop2' (0000000022ed967d): kobject_uevent_env kobject: 'loop2' (0000000022ed967d): fill_kobj_path: path = '/devices/virtual/block/loop2' napi_frags_finish net/core/dev.c:5643 [inline] napi_gro_frags+0x75a/0xc90 net/core/dev.c:5716 kobject: 'loop3' (000000001d81e739): kobject_uevent_env tun_get_user+0x31d5/0x42a0 drivers/net/tun.c:1956 kobject: 'loop3' (000000001d81e739): fill_kobj_path: path = '/devices/virtual/block/loop3' tun_chr_write_iter+0xb9/0x160 drivers/net/tun.c:2001 call_write_iter include/linux/fs.h:1808 [inline] do_iter_readv_writev+0x8b0/0xa80 fs/read_write.c:680 do_iter_write+0x185/0x5f0 fs/read_write.c:959 vfs_writev+0x1f1/0x360 fs/read_write.c:1004 do_writev+0x11a/0x310 fs/read_write.c:1039 __do_sys_writev fs/read_write.c:1112 [inline] __se_sys_writev fs/read_write.c:1109 [inline] __x64_sys_writev+0x75/0xb0 fs/read_write.c:1109 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457431 Code: 75 14 b8 14 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 54 b5 fb ff c3 48 83 ec 08 e8 1a 2d 00 00 48 89 04 24 b8 14 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 63 2d 00 00 48 89 d0 48 83 c4 08 48 3d 01 RSP: 002b:00007f77846c2ba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 RAX: ffffffffffffffda RBX: 0000000000000036 RCX: 0000000000457431 RDX: 0000000000000001 RSI: 00007f77846c2bf0 RDI: 00000000000000f0 RBP: 0000000020000000 R08: 00000000000000f0 R09: 0000000000000000 R10: 0000000000000064 R11: 0000000000000293 R12: 00007f77846c36d4 R13: 00000000004c48a4 R14: 00000000004d7b90 R15: 0000000000000003 bridge0: port 2(bridge_slave_1) entered disabled state bridge0: port 1(bridge_slave_0) entered disabled state kobject: 'loop1' (0000000085f792d9): kobject_uevent_env kobject: 'loop1' (0000000085f792d9): fill_kobj_path: path = '/devices/virtual/block/loop1' bridge0: port 2(bridge_slave_1) entered blocking state bridge0: port 2(bridge_slave_1) entered forwarding state bridge0: port 1(bridge_slave_0) entered blocking state bridge0: port 1(bridge_slave_0) entered forwarding state device bridge0 entered promiscuous mode bridge0: port 2(bridge_slave_1) entered disabled state kobject: 'loop0' (000000003be81697): kobject_uevent_env bridge0: port 1(bridge_slave_0) entered disabled state device bridge0 left promiscuous mode kobject: 'loop0' (000000003be81697): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop5' (00000000b66695c8): kobject_uevent_env kobject: 'loop5' (00000000b66695c8): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop3' (000000001d81e739): kobject_uevent_env kobject: 'loop3' (000000001d81e739): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop1' (0000000085f792d9): kobject_uevent_env kobject: 'loop1' (0000000085f792d9): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop0' (000000003be81697): kobject_uevent_env kobject: 'loop0' (000000003be81697): fill_kobj_path: path = '/devices/virtual/block/loop0' netlink: 16 bytes leftover after parsing attributes in process `syz-executor5'. kobject: 'loop3' (000000001d81e739): kobject_uevent_env kobject: 'loop3' (000000001d81e739): fill_kobj_path: path = '/devices/virtual/block/loop3' netlink: 16 bytes leftover after parsing attributes in process `syz-executor5'. kobject: 'loop1' (0000000085f792d9): kobject_uevent_env kobject: 'loop1' (0000000085f792d9): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop0' (000000003be81697): kobject_uevent_env kobject: 'loop0' (000000003be81697): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop4' (000000000f0490b7): kobject_uevent_env kobject: 'loop4' (000000000f0490b7): fill_kobj_path: path = '/devices/virtual/block/loop4' audit: type=1800 audit(1538668103.101:50): pid=25413 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor4" name="cgroup.events" dev="sda1" ino=16535 res=0 kobject: 'loop2' (0000000022ed967d): kobject_uevent_env kobject: 'loop2' (0000000022ed967d): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop1' (0000000085f792d9): kobject_uevent_env kobject: 'loop1' (0000000085f792d9): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop0' (000000003be81697): kobject_uevent_env kobject: 'loop0' (000000003be81697): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop5' (00000000b66695c8): kobject_uevent_env kobject: 'loop5' (00000000b66695c8): fill_kobj_path: path = '/devices/virtual/block/loop5' netlink: 20 bytes leftover after parsing attributes in process `syz-executor0'. kobject: 'loop2' (0000000022ed967d): kobject_uevent_env kobject: 'loop2' (0000000022ed967d): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop3' (000000001d81e739): kobject_uevent_env kobject: 'loop3' (000000001d81e739): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop5' (00000000b66695c8): kobject_uevent_env kobject: 'loop5' (00000000b66695c8): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop4' (000000000f0490b7): kobject_uevent_env kobject: 'loop4' (000000000f0490b7): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop3' (000000001d81e739): kobject_uevent_env netlink: 20 bytes leftover after parsing attributes in process `syz-executor0'. kobject: 'loop3' (000000001d81e739): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop4' (000000000f0490b7): kobject_uevent_env kobject: 'loop4' (000000000f0490b7): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop0' (000000003be81697): kobject_uevent_env kobject: 'loop0' (000000003be81697): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop3' (000000001d81e739): kobject_uevent_env kobject: 'loop3' (000000001d81e739): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop2' (0000000022ed967d): kobject_uevent_env kobject: 'loop2' (0000000022ed967d): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop5' (00000000b66695c8): kobject_uevent_env kobject: 'loop5' (00000000b66695c8): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop1' (0000000085f792d9): kobject_uevent_env kobject: 'loop1' (0000000085f792d9): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop5' (00000000b66695c8): kobject_uevent_env kobject: 'loop5' (00000000b66695c8): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop3' (000000001d81e739): kobject_uevent_env kobject: 'loop3' (000000001d81e739): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop1' (0000000085f792d9): kobject_uevent_env kobject: 'loop1' (0000000085f792d9): fill_kobj_path: path = '/devices/virtual/block/loop1' device lo entered promiscuous mode kobject: 'loop2' (0000000022ed967d): kobject_uevent_env device lo left promiscuous mode kobject: 'loop2' (0000000022ed967d): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop1' (0000000085f792d9): kobject_uevent_env kobject: 'loop1' (0000000085f792d9): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop5' (00000000b66695c8): kobject_uevent_env kobject: 'loop5' (00000000b66695c8): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop3' (000000001d81e739): kobject_uevent_env kobject: 'loop3' (000000001d81e739): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop2' (0000000022ed967d): kobject_uevent_env kobject: 'loop2' (0000000022ed967d): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop5' (00000000b66695c8): kobject_uevent_env kobject: 'loop5' (00000000b66695c8): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop1' (0000000085f792d9): kobject_uevent_env kobject: 'loop1' (0000000085f792d9): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop4' (000000000f0490b7): kobject_uevent_env kobject: 'loop4' (000000000f0490b7): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop1' (0000000085f792d9): kobject_uevent_env kobject: 'loop1' (0000000085f792d9): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop4' (000000000f0490b7): kobject_uevent_env kobject: 'loop4' (000000000f0490b7): fill_kobj_path: path = '/devices/virtual/block/loop4' device lo entered promiscuous mode kobject: 'loop2' (0000000022ed967d): kobject_uevent_env kobject: 'loop2' (0000000022ed967d): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop1' (0000000085f792d9): kobject_uevent_env kobject: 'loop1' (0000000085f792d9): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop1' (0000000085f792d9): kobject_uevent_env kobject: 'loop1' (0000000085f792d9): fill_kobj_path: path = '/devices/virtual/block/loop1' device lo left promiscuous mode kobject: 'loop4' (000000000f0490b7): kobject_uevent_env kobject: 'loop4' (000000000f0490b7): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop1' (0000000085f792d9): kobject_uevent_env kobject: 'loop1' (0000000085f792d9): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop4' (000000000f0490b7): kobject_uevent_env kobject: 'loop4' (000000000f0490b7): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop0' (000000003be81697): kobject_uevent_env kobject: 'loop0' (000000003be81697): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop3' (000000001d81e739): kobject_uevent_env kobject: 'loop3' (000000001d81e739): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop5' (00000000b66695c8): kobject_uevent_env kobject: 'loop5' (00000000b66695c8): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop3' (000000001d81e739): kobject_uevent_env kobject: 'loop3' (000000001d81e739): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop1' (0000000085f792d9): kobject_uevent_env kobject: 'loop1' (0000000085f792d9): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop5' (00000000b66695c8): kobject_uevent_env kobject: 'loop5' (00000000b66695c8): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop5' (00000000b66695c8): kobject_uevent_env kobject: 'loop5' (00000000b66695c8): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop3' (000000001d81e739): kobject_uevent_env kobject: 'loop3' (000000001d81e739): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop0' (000000003be81697): kobject_uevent_env kobject: 'loop0' (000000003be81697): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop1' (0000000085f792d9): kobject_uevent_env kobject: 'loop1' (0000000085f792d9): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop0' (000000003be81697): kobject_uevent_env kobject: 'loop0' (000000003be81697): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop4' (000000000f0490b7): kobject_uevent_env kobject: 'loop4' (000000000f0490b7): fill_kobj_path: path = '/devices/virtual/block/loop4' net_ratelimit: 34 callbacks suppressed bridge0: received packet on syz_tun with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) kobject: 'loop2' (0000000022ed967d): kobject_uevent_env kobject: 'loop2' (0000000022ed967d): fill_kobj_path: path = '/devices/virtual/block/loop2' bridge0: received packet on syz_tun with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) kobject: 'loop1' (0000000085f792d9): kobject_uevent_env kobject: 'loop1' (0000000085f792d9): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop2' (0000000022ed967d): kobject_uevent_env kobject: 'loop2' (0000000022ed967d): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop4' (000000000f0490b7): kobject_uevent_env bridge0: received packet on syz_tun with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) kobject: 'loop4' (000000000f0490b7): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop5' (00000000b66695c8): kobject_uevent_env bridge0: received packet on syz_tun with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) kobject: 'loop5' (00000000b66695c8): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop3' (000000001d81e739): kobject_uevent_env kobject: 'loop3' (000000001d81e739): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop4' (000000000f0490b7): kobject_uevent_env kobject: 'loop4' (000000000f0490b7): fill_kobj_path: path = '/devices/virtual/block/loop4' bridge0: received packet on syz_tun with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) kobject: 'loop1' (0000000085f792d9): kobject_uevent_env kobject: 'loop1' (0000000085f792d9): fill_kobj_path: path = '/devices/virtual/block/loop1' bridge0: received packet on syz_tun with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) kobject: 'loop4' (000000000f0490b7): kobject_uevent_env kobject: 'loop4' (000000000f0490b7): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop1' (0000000085f792d9): kobject_uevent_env bridge0: received packet on syz_tun with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) kobject: 'loop1' (0000000085f792d9): fill_kobj_path: path = '/devices/virtual/block/loop1' bridge0: received packet on syz_tun with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) kobject: 'loop3' (000000001d81e739): kobject_uevent_env