RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3450f786d4 R13: 00000000004c8a15 R14: 00000000004df940 R15: 0000000000000003 ======================================================== kobject: 'loop5' (000000002bd82985): kobject_uevent_env WARNING: possible irq lock inversion dependency detected 4.19.69 #43 Not tainted -------------------------------------------------------- blkid/8371 just changed the state of lock: 00000000c56ceb48 ( kobject: 'loop5' (000000002bd82985): fill_kobj_path: path = '/devices/virtual/block/loop5' &(&ctx->ctx_lock)->rlock){..-.}, at: spin_lock_irq include/linux/spinlock.h:354 [inline] &(&ctx->ctx_lock)->rlock){..-.}, at: free_ioctx_users+0x2d/0x490 fs/aio.c:614 but this lock took another, SOFTIRQ-unsafe lock in the past: (&fiq->waitq){+.+.} and interrupts could create inverse lock ordering between them. other info that might help us debug this: Possible interrupt unsafe locking scenario: CPU0 CPU1 ---- ---- lock(&fiq->waitq); local_irq_disable(); lock(&(&ctx->ctx_lock)->rlock); lock(&fiq->waitq); lock(&(&ctx->ctx_lock)->rlock); *** DEADLOCK *** 3 locks held by blkid/8371: #0: 000000005222a1ac (rcu_read_lock){....}, at: avc_has_perm_noaudit+0xbf/0x570 security/selinux/avc.c:1161 #1: 00000000b4eaa202 (rcu_callback){....}, at: __rcu_reclaim kernel/rcu/rcu.h:226 [inline] #1: 00000000b4eaa202 (rcu_callback){....}, at: rcu_do_batch kernel/rcu/tree.c:2584 [inline] #1: 00000000b4eaa202 (rcu_callback){....}, at: invoke_rcu_callbacks kernel/rcu/tree.c:2897 [inline] #1: 00000000b4eaa202 (rcu_callback){....}, at: __rcu_process_callbacks kernel/rcu/tree.c:2864 [inline] #1: 00000000b4eaa202 (rcu_callback){....}, at: rcu_process_callbacks+0xc79/0x1a30 kernel/rcu/tree.c:2881 #2: 00000000e2949359 (rcu_read_lock_sched){....}, at: percpu_ref_call_confirm_rcu lib/percpu-refcount.c:119 [inline] #2: 00000000e2949359 (rcu_read_lock_sched){....}, at: percpu_ref_switch_to_atomic_rcu+0x1ca/0x540 lib/percpu-refcount.c:158 the shortest dependencies between 2nd lock and 1st lock: -> (&fiq->waitq){+.+.} ops: 21 { HARDIRQ-ON-W at: lock_acquire+0x16f/0x3f0 kernel/locking/lockdep.c:3900 __raw_spin_lock include/linux/spinlock_api_smp.h:142 [inline] _raw_spin_lock+0x2f/0x40 kernel/locking/spinlock.c:144 spin_lock include/linux/spinlock.h:329 [inline] flush_bg_queue+0x1f3/0x3d0 fs/fuse/dev.c:368 fuse_request_send_background_locked+0x26d/0x4e0 fs/fuse/dev.c:609 fuse_request_send_background+0x12b/0x180 fs/fuse/dev.c:617 fuse_send_init fs/fuse/inode.c:973 [inline] fuse_fill_super+0x13b7/0x1720 fs/fuse/inode.c:1188 mount_nodev+0x66/0x110 fs/super.c:1204 fuse_mount+0x2d/0x40 fs/fuse/inode.c:1213 mount_fs+0xa8/0x31f fs/super.c:1261 vfs_kern_mount.part.0+0x6f/0x410 fs/namespace.c:961 vfs_kern_mount fs/namespace.c:951 [inline] do_new_mount fs/namespace.c:2469 [inline] do_mount+0x53e/0x2bc0 fs/namespace.c:2799 ksys_mount+0xdb/0x150 fs/namespace.c:3015 __do_sys_mount fs/namespace.c:3029 [inline] __se_sys_mount fs/namespace.c:3026 [inline] __x64_sys_mount+0xbe/0x150 fs/namespace.c:3026 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe SOFTIRQ-ON-W at: lock_acquire+0x16f/0x3f0 kernel/locking/lockdep.c:3900 __raw_spin_lock include/linux/spinlock_api_smp.h:142 [inline] _raw_spin_lock+0x2f/0x40 kernel/locking/spinlock.c:144 spin_lock include/linux/spinlock.h:329 [inline] flush_bg_queue+0x1f3/0x3d0 fs/fuse/dev.c:368 fuse_request_send_background_locked+0x26d/0x4e0 fs/fuse/dev.c:609 fuse_request_send_background+0x12b/0x180 fs/fuse/dev.c:617 fuse_send_init fs/fuse/inode.c:973 [inline] fuse_fill_super+0x13b7/0x1720 fs/fuse/inode.c:1188 mount_nodev+0x66/0x110 fs/super.c:1204 fuse_mount+0x2d/0x40 fs/fuse/inode.c:1213 mount_fs+0xa8/0x31f fs/super.c:1261 vfs_kern_mount.part.0+0x6f/0x410 fs/namespace.c:961 vfs_kern_mount fs/namespace.c:951 [inline] do_new_mount fs/namespace.c:2469 [inline] do_mount+0x53e/0x2bc0 fs/namespace.c:2799 ksys_mount+0xdb/0x150 fs/namespace.c:3015 __do_sys_mount fs/namespace.c:3029 [inline] __se_sys_mount fs/namespace.c:3026 [inline] __x64_sys_mount+0xbe/0x150 fs/namespace.c:3026 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe INITIAL USE at: lock_acquire+0x16f/0x3f0 kernel/locking/lockdep.c:3900 __raw_spin_lock include/linux/spinlock_api_smp.h:142 [inline] _raw_spin_lock+0x2f/0x40 kernel/locking/spinlock.c:144 spin_lock include/linux/spinlock.h:329 [inline] flush_bg_queue+0x1f3/0x3d0 fs/fuse/dev.c:368 fuse_request_send_background_locked+0x26d/0x4e0 fs/fuse/dev.c:609 fuse_request_send_background+0x12b/0x180 fs/fuse/dev.c:617 fuse_send_init fs/fuse/inode.c:973 [inline] fuse_fill_super+0x13b7/0x1720 fs/fuse/inode.c:1188 mount_nodev+0x66/0x110 fs/super.c:1204 fuse_mount+0x2d/0x40 fs/fuse/inode.c:1213 mount_fs+0xa8/0x31f fs/super.c:1261 vfs_kern_mount.part.0+0x6f/0x410 fs/namespace.c:961 vfs_kern_mount fs/namespace.c:951 [inline] do_new_mount fs/namespace.c:2469 [inline] do_mount+0x53e/0x2bc0 fs/namespace.c:2799 ksys_mount+0xdb/0x150 fs/namespace.c:3015 __do_sys_mount fs/namespace.c:3029 [inline] __se_sys_mount fs/namespace.c:3026 [inline] __x64_sys_mount+0xbe/0x150 fs/namespace.c:3026 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe } ... key at: [] __key.42211+0x0/0x40 ... acquired at: __raw_spin_lock include/linux/spinlock_api_smp.h:142 [inline] _raw_spin_lock+0x2f/0x40 kernel/locking/spinlock.c:144 spin_lock include/linux/spinlock.h:329 [inline] aio_poll fs/aio.c:1741 [inline] __io_submit_one fs/aio.c:1849 [inline] io_submit_one+0xef2/0x2eb0 fs/aio.c:1885 __do_sys_io_submit fs/aio.c:1929 [inline] __se_sys_io_submit fs/aio.c:1900 [inline] __x64_sys_io_submit+0x1aa/0x520 fs/aio.c:1900 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe -> (&(&ctx->ctx_lock)->rlock){..-.} ops: 3 { IN-SOFTIRQ-W at: lock_acquire+0x16f/0x3f0 kernel/locking/lockdep.c:3900 __raw_spin_lock_irq include/linux/spinlock_api_smp.h:128 [inline] _raw_spin_lock_irq+0x60/0x80 kernel/locking/spinlock.c:160 spin_lock_irq include/linux/spinlock.h:354 [inline] free_ioctx_users+0x2d/0x490 fs/aio.c:614 percpu_ref_put_many include/linux/percpu-refcount.h:284 [inline] percpu_ref_put include/linux/percpu-refcount.h:300 [inline] percpu_ref_call_confirm_rcu lib/percpu-refcount.c:123 [inline] percpu_ref_switch_to_atomic_rcu+0x407/0x540 lib/percpu-refcount.c:158 __rcu_reclaim kernel/rcu/rcu.h:236 [inline] rcu_do_batch kernel/rcu/tree.c:2584 [inline] invoke_rcu_callbacks kernel/rcu/tree.c:2897 [inline] __rcu_process_callbacks kernel/rcu/tree.c:2864 [inline] rcu_process_callbacks+0xba0/0x1a30 kernel/rcu/tree.c:2881 __do_softirq+0x25c/0x921 kernel/softirq.c:292 invoke_softirq kernel/softirq.c:372 [inline] irq_exit+0x180/0x1d0 kernel/softirq.c:412 exiting_irq arch/x86/include/asm/apic.h:536 [inline] smp_apic_timer_interrupt+0x13b/0x550 arch/x86/kernel/apic/apic.c:1094 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:893 __write_once_size include/linux/compiler.h:220 [inline] write_comp_data+0x68/0x70 kernel/kcov.c:144 avc_search_node security/selinux/avc.c:604 [inline] avc_lookup security/selinux/avc.c:634 [inline] avc_has_perm_noaudit+0x1f6/0x570 security/selinux/avc.c:1165 selinux_inode_permission+0x431/0x6b0 security/selinux/hooks.c:3223 security_inode_permission+0xb5/0x100 security/security.c:708 inode_permission+0x122/0x560 fs/namei.c:459 may_lookup fs/namei.c:1702 [inline] link_path_walk.part.0+0x9d6/0x1330 fs/namei.c:2084 link_path_walk fs/namei.c:2072 [inline] path_openat+0x1f9/0x45e0 fs/namei.c:3533 do_filp_open+0x1a1/0x280 fs/namei.c:3564 do_sys_open+0x3fe/0x550 fs/open.c:1088 __do_sys_open fs/open.c:1106 [inline] __se_sys_open fs/open.c:1101 [inline] __x64_sys_open+0x7e/0xc0 fs/open.c:1101 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe INITIAL USE at: lock_acquire+0x16f/0x3f0 kernel/locking/lockdep.c:3900 __raw_spin_lock_irq include/linux/spinlock_api_smp.h:128 [inline] _raw_spin_lock_irq+0x60/0x80 kernel/locking/spinlock.c:160 spin_lock_irq include/linux/spinlock.h:354 [inline] aio_poll fs/aio.c:1739 [inline] __io_submit_one fs/aio.c:1849 [inline] io_submit_one+0xead/0x2eb0 fs/aio.c:1885 kobject: 'nr0' (00000000ca1fbce5): kobject_add_internal: parent: 'net', set: 'devices' __do_sys_io_submit fs/aio.c:1929 [inline] __se_sys_io_submit fs/aio.c:1900 [inline] __x64_sys_io_submit+0x1aa/0x520 fs/aio.c:1900 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe kobject: 'nr0' (00000000ca1fbce5): kobject_uevent_env } ... key at: [] __key.50211+0x0/0x40 ... acquired at: mark_lock_irq kernel/locking/lockdep.c:2755 [inline] mark_lock+0x420/0x1370 kernel/locking/lockdep.c:3127 mark_irqflags kernel/locking/lockdep.c:3005 [inline] __lock_acquire+0xc62/0x49c0 kernel/locking/lockdep.c:3368 lock_acquire+0x16f/0x3f0 kernel/locking/lockdep.c:3900 __raw_spin_lock_irq include/linux/spinlock_api_smp.h:128 [inline] _raw_spin_lock_irq+0x60/0x80 kernel/locking/spinlock.c:160 spin_lock_irq include/linux/spinlock.h:354 [inline] free_ioctx_users+0x2d/0x490 fs/aio.c:614 percpu_ref_put_many include/linux/percpu-refcount.h:284 [inline] percpu_ref_put include/linux/percpu-refcount.h:300 [inline] percpu_ref_call_confirm_rcu lib/percpu-refcount.c:123 [inline] percpu_ref_switch_to_atomic_rcu+0x407/0x540 lib/percpu-refcount.c:158 kobject: 'nr0' (00000000ca1fbce5): fill_kobj_path: path = '/devices/virtual/net/nr0' __rcu_reclaim kernel/rcu/rcu.h:236 [inline] rcu_do_batch kernel/rcu/tree.c:2584 [inline] invoke_rcu_callbacks kernel/rcu/tree.c:2897 [inline] __rcu_process_callbacks kernel/rcu/tree.c:2864 [inline] rcu_process_callbacks+0xba0/0x1a30 kernel/rcu/tree.c:2881 __do_softirq+0x25c/0x921 kernel/softirq.c:292 invoke_softirq kernel/softirq.c:372 [inline] irq_exit+0x180/0x1d0 kernel/softirq.c:412 exiting_irq arch/x86/include/asm/apic.h:536 [inline] smp_apic_timer_interrupt+0x13b/0x550 arch/x86/kernel/apic/apic.c:1094 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:893 __write_once_size include/linux/compiler.h:220 [inline] write_comp_data+0x68/0x70 kernel/kcov.c:144 avc_search_node security/selinux/avc.c:604 [inline] avc_lookup security/selinux/avc.c:634 [inline] avc_has_perm_noaudit+0x1f6/0x570 security/selinux/avc.c:1165 selinux_inode_permission+0x431/0x6b0 security/selinux/hooks.c:3223 security_inode_permission+0xb5/0x100 security/security.c:708 inode_permission+0x122/0x560 fs/namei.c:459 may_lookup fs/namei.c:1702 [inline] link_path_walk.part.0+0x9d6/0x1330 fs/namei.c:2084 kobject: 'queues' (00000000947d9132): kobject_add_internal: parent: 'nr0', set: '' link_path_walk fs/namei.c:2072 [inline] path_openat+0x1f9/0x45e0 fs/namei.c:3533 do_filp_open+0x1a1/0x280 fs/namei.c:3564 do_sys_open+0x3fe/0x550 fs/open.c:1088 kobject: 'queues' (00000000947d9132): kobject_uevent_env __do_sys_open fs/open.c:1106 [inline] __se_sys_open fs/open.c:1101 [inline] __x64_sys_open+0x7e/0xc0 fs/open.c:1101 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe kobject: 'queues' (00000000947d9132): kobject_uevent_env: filter function caused the event to drop! stack backtrace: CPU: 1 PID: 8371 Comm: blkid Not tainted 4.19.69 #43 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x172/0x1f0 lib/dump_stack.c:113 print_irq_inversion_bug.part.0+0x2c0/0x2cd kernel/locking/lockdep.c:2621 print_irq_inversion_bug kernel/locking/lockdep.c:2624 [inline] check_usage_forwards.cold+0x20/0x29 kernel/locking/lockdep.c:2646 mark_lock_irq kernel/locking/lockdep.c:2755 [inline] mark_lock+0x420/0x1370 kernel/locking/lockdep.c:3127 kobject: 'rx-0' (000000001377fd31): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'rx-0' (000000001377fd31): kobject_uevent_env mark_irqflags kernel/locking/lockdep.c:3005 [inline] __lock_acquire+0xc62/0x49c0 kernel/locking/lockdep.c:3368 kobject: 'rx-0' (000000001377fd31): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' kobject: 'tx-0' (0000000064f1cafd): kobject_add_internal: parent: 'queues', set: 'queues' lock_acquire+0x16f/0x3f0 kernel/locking/lockdep.c:3900 __raw_spin_lock_irq include/linux/spinlock_api_smp.h:128 [inline] _raw_spin_lock_irq+0x60/0x80 kernel/locking/spinlock.c:160 spin_lock_irq include/linux/spinlock.h:354 [inline] free_ioctx_users+0x2d/0x490 fs/aio.c:614 kobject: 'tx-0' (0000000064f1cafd): kobject_uevent_env percpu_ref_put_many include/linux/percpu-refcount.h:284 [inline] percpu_ref_put include/linux/percpu-refcount.h:300 [inline] percpu_ref_call_confirm_rcu lib/percpu-refcount.c:123 [inline] percpu_ref_switch_to_atomic_rcu+0x407/0x540 lib/percpu-refcount.c:158 __rcu_reclaim kernel/rcu/rcu.h:236 [inline] rcu_do_batch kernel/rcu/tree.c:2584 [inline] invoke_rcu_callbacks kernel/rcu/tree.c:2897 [inline] __rcu_process_callbacks kernel/rcu/tree.c:2864 [inline] rcu_process_callbacks+0xba0/0x1a30 kernel/rcu/tree.c:2881 __do_softirq+0x25c/0x921 kernel/softirq.c:292 kobject: 'tx-0' (0000000064f1cafd): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' invoke_softirq kernel/softirq.c:372 [inline] irq_exit+0x180/0x1d0 kernel/softirq.c:412 exiting_irq arch/x86/include/asm/apic.h:536 [inline] smp_apic_timer_interrupt+0x13b/0x550 arch/x86/kernel/apic/apic.c:1094 kobject: 'loop4' (000000007085cc49): kobject_uevent_env apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:893 RIP: 0010:write_comp_data+0x68/0x70 kernel/kcov.c:146 Code: 00 00 4e 8d 14 dd 28 00 00 00 4d 39 d0 72 1b 49 83 c1 01 4a 89 7c 10 e0 4a 89 74 10 e8 4a 89 54 10 f0 4a 89 4c d8 20 4c 89 08 0f 1f 80 00 00 00 00 55 40 0f b6 d6 40 0f b6 f7 31 ff 48 89 e5 RSP: 0018:ffff88809f987788 EFLAGS: 00000293 ORIG_RAX: ffffffffffffff13 RAX: 0000000000000000 RBX: ffff888099b9bd28 RCX: ffffffff82e0a916 RDX: ffff888099b9bd28 RSI: 0000000000000000 RDI: 0000000000000007 RBP: ffff88809f987790 R08: ffff88806529c400 R09: ffffed1015d24733 kobject: 'loop4' (000000007085cc49): fill_kobj_path: path = '/devices/virtual/block/loop4' R10: ffffed1015d24732 R11: ffff8880ae923993 R12: 0000000000000027 R13: 0000000000000008 R14: 000000000000000b R15: dffffc0000000000 avc_search_node security/selinux/avc.c:604 [inline] avc_lookup security/selinux/avc.c:634 [inline] avc_has_perm_noaudit+0x1f6/0x570 security/selinux/avc.c:1165 selinux_inode_permission+0x431/0x6b0 security/selinux/hooks.c:3223 security_inode_permission+0xb5/0x100 security/security.c:708 inode_permission+0x122/0x560 fs/namei.c:459 may_lookup fs/namei.c:1702 [inline] link_path_walk.part.0+0x9d6/0x1330 fs/namei.c:2084 link_path_walk fs/namei.c:2072 [inline] path_openat+0x1f9/0x45e0 fs/namei.c:3533 do_filp_open+0x1a1/0x280 fs/namei.c:3564 do_sys_open+0x3fe/0x550 fs/open.c:1088 __do_sys_open fs/open.c:1106 [inline] __se_sys_open fs/open.c:1101 [inline] __x64_sys_open+0x7e/0xc0 fs/open.c:1101 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7fc5efde7120 Code: 48 8b 15 1b 4d 2b 00 f7 d8 64 89 02 83 c8 ff c3 90 90 90 90 90 90 90 90 90 90 83 3d d5 a4 2b 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 5e 8c 01 00 48 89 04 24 RSP: 002b:00007ffcaad12cd8 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 RAX: ffffffffffffffda RBX: 00007ffcaad13d20 RCX: 00007fc5efde7120 RDX: 00007ffcaad12cf2 RSI: 0000000000000000 RDI: 00007ffcaad12ce0 RBP: 0000000000000703 R08: 0000000000000000 R09: 0000000000000001 R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffcaad14d98 R13: 0000000000000000 R14: 00007fc5f02c8820 R15: 00007fc5f00be2a2 FAULT_INJECTION: forcing a failure. name fail_page_alloc, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 8388 Comm: syz-executor.2 Not tainted 4.19.69 #43 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x172/0x1f0 lib/dump_stack.c:113 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0x1b lib/fault-inject.c:149 should_fail_alloc_page mm/page_alloc.c:3078 [inline] prepare_alloc_pages mm/page_alloc.c:4336 [inline] __alloc_pages_nodemask+0x1ee/0x750 mm/page_alloc.c:4383 __alloc_pages include/linux/gfp.h:473 [inline] __alloc_pages_node include/linux/gfp.h:486 [inline] kmem_getpages mm/slab.c:1412 [inline] cache_grow_begin+0x91/0x8c0 mm/slab.c:2682 cache_alloc_refill mm/slab.c:3049 [inline] ____cache_alloc mm/slab.c:3132 [inline] ____cache_alloc mm/slab.c:3115 [inline] __do_cache_alloc mm/slab.c:3354 [inline] slab_alloc mm/slab.c:3389 [inline] kmem_cache_alloc+0x63b/0x700 mm/slab.c:3557 getname_flags fs/namei.c:140 [inline] getname_flags+0xd6/0x5b0 fs/namei.c:129 getname+0x1a/0x20 fs/namei.c:211 do_sys_open+0x2c9/0x550 fs/open.c:1082 __do_sys_open fs/open.c:1106 [inline] __se_sys_open fs/open.c:1101 [inline] __x64_sys_open+0x7e/0xc0 fs/open.c:1101 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x413761 Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 RSP: 002b:00007f3450f77a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413761 RDX: 00007f3450f77b0a RSI: 0000000000000002 RDI: 00007f3450f77b00 RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 R13: 00000000004c8a15 R14: 00000000004df940 R15: 0000000000000003 kobject: 'loop1' (000000000f5cea77): kobject_uevent_env kobject: 'loop1' (000000000f5cea77): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop2' (00000000efca7cf1): kobject_uevent_env kobject: 'loop2' (00000000efca7cf1): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop2' (00000000efca7cf1): kobject_uevent_env kobject: 'loop2' (00000000efca7cf1): fill_kobj_path: path = '/devices/virtual/block/loop2' hfs: session requires an argument hfs: unable to parse mount options kobject: 'rx-0' (000000001377fd31): kobject_cleanup, parent 00000000947d9132 kobject: 'rx-0' (000000001377fd31): auto cleanup 'remove' event kobject: 'rx-0' (000000001377fd31): kobject_uevent_env kobject: 'rx-0' (000000001377fd31): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' kobject: 'rx-0' (000000001377fd31): auto cleanup kobject_del kobject: 'rx-0' (000000001377fd31): calling ktype release kobject: 'rx-0': free name kobject: 'tx-0' (0000000064f1cafd): kobject_cleanup, parent 00000000947d9132 kobject: 'tx-0' (0000000064f1cafd): auto cleanup 'remove' event kobject: 'tx-0' (0000000064f1cafd): kobject_uevent_env kobject: 'tx-0' (0000000064f1cafd): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' kobject: 'tx-0' (0000000064f1cafd): auto cleanup kobject_del kobject: 'tx-0' (0000000064f1cafd): calling ktype release kobject: 'tx-0': free name kobject: 'queues' (00000000947d9132): kobject_cleanup, parent (null) kobject: 'queues' (00000000947d9132): calling ktype release kobject: 'queues' (00000000947d9132): kset_release kobject: 'queues': free name kobject: 'nr0' (00000000ca1fbce5): kobject_uevent_env kobject: 'nr0' (00000000ca1fbce5): fill_kobj_path: path = '/devices/virtual/net/nr0' kobject: 'loop2' (00000000efca7cf1): kobject_uevent_env kobject: 'loop2' (00000000efca7cf1): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop0' (000000002acb91e0): kobject_uevent_env kobject: 'loop0' (000000002acb91e0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'nr0' (00000000ca1fbce5): kobject_cleanup, parent (null) FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 kobject: 'nr0' (00000000ca1fbce5): calling ktype release kobject: 'nr0': free name CPU: 1 PID: 8398 Comm: syz-executor.2 Not tainted 4.19.69 #43 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x172/0x1f0 lib/dump_stack.c:113 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0x1b lib/fault-inject.c:149 __should_failslab+0x121/0x190 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1557 slab_pre_alloc_hook mm/slab.h:424 [inline] slab_alloc mm/slab.c:3383 [inline] kmem_cache_alloc+0x2ae/0x700 mm/slab.c:3557 kmem_cache_zalloc include/linux/slab.h:699 [inline] __alloc_file+0x27/0x330 fs/file_table.c:100 alloc_empty_file+0x72/0x170 fs/file_table.c:150 path_openat+0xef/0x45e0 fs/namei.c:3523 kobject: 'loop5' (000000002bd82985): kobject_uevent_env do_filp_open+0x1a1/0x280 fs/namei.c:3564 kobject: 'loop5' (000000002bd82985): fill_kobj_path: path = '/devices/virtual/block/loop5' do_sys_open+0x3fe/0x550 fs/open.c:1088 kobject: 'nr0' (00000000af1079b5): kobject_add_internal: parent: 'net', set: 'devices' __do_sys_open fs/open.c:1106 [inline] __se_sys_open fs/open.c:1101 [inline] __x64_sys_open+0x7e/0xc0 fs/open.c:1101 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x413761 Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 kobject: 'nr0' (00000000af1079b5): kobject_uevent_env RSP: 002b:00007f3450f77a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413761 RDX: 00007f3450f77b0a RSI: 0000000000000002 RDI: 00007f3450f77b00 RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 R13: 00000000004c8a15 R14: 00000000004df940 R15: 0000000000000003 kobject: 'loop1' (000000000f5cea77): kobject_uevent_env kobject: 'loop1' (000000000f5cea77): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'nr0' (00000000af1079b5): fill_kobj_path: path = '/devices/virtual/net/nr0' kobject: 'queues' (00000000bec9c0d7): kobject_add_internal: parent: 'nr0', set: '' kobject: 'queues' (00000000bec9c0d7): kobject_uevent_env kobject: 'queues' (00000000bec9c0d7): kobject_uevent_env: filter function caused the event to drop! kobject: 'rx-0' (0000000095d20a12): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'rx-0' (0000000095d20a12): kobject_uevent_env kobject: 'rx-0' (0000000095d20a12): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' kobject: 'tx-0' (00000000e6a4ae36): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'tx-0' (00000000e6a4ae36): kobject_uevent_env kobject: 'tx-0' (00000000e6a4ae36): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' kobject: 'loop2' (00000000efca7cf1): kobject_uevent_env kobject: 'rx-0' (0000000095d20a12): kobject_cleanup, parent 00000000bec9c0d7 kobject: 'rx-0' (0000000095d20a12): auto cleanup 'remove' event kobject: 'rx-0' (0000000095d20a12): kobject_uevent_env kobject: 'rx-0' (0000000095d20a12): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' kobject: 'rx-0' (0000000095d20a12): auto cleanup kobject_del kobject: 'rx-0' (0000000095d20a12): calling ktype release kobject: 'rx-0': free name kobject: 'tx-0' (00000000e6a4ae36): kobject_cleanup, parent 00000000bec9c0d7 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 kobject: 'tx-0' (00000000e6a4ae36): auto cleanup 'remove' event kobject: 'tx-0' (00000000e6a4ae36): kobject_uevent_env kobject: 'tx-0' (00000000e6a4ae36): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' kobject: 'tx-0' (00000000e6a4ae36): auto cleanup kobject_del kobject: 'tx-0' (00000000e6a4ae36): calling ktype release kobject: 'loop2' (00000000efca7cf1): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'tx-0': free name kobject: 'queues' (00000000bec9c0d7): kobject_cleanup, parent (null) kobject: 'queues' (00000000bec9c0d7): calling ktype release kobject: 'queues' (00000000bec9c0d7): kset_release kobject: 'queues': free name kobject: 'nr0' (00000000af1079b5): kobject_uevent_env kobject: 'nr0' (00000000af1079b5): fill_kobj_path: path = '/devices/virtual/net/nr0' CPU: 1 PID: 8411 Comm: syz-executor.2 Not tainted 4.19.69 #43 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x172/0x1f0 lib/dump_stack.c:113 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0x1b lib/fault-inject.c:149 kobject: 'loop4' (000000007085cc49): kobject_uevent_env kobject: 'loop4' (000000007085cc49): fill_kobj_path: path = '/devices/virtual/block/loop4' __should_failslab+0x121/0x190 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1557 slab_pre_alloc_hook mm/slab.h:424 [inline] slab_alloc mm/slab.c:3383 [inline] kmem_cache_alloc+0x2ae/0x700 mm/slab.c:3557 kmem_cache_zalloc include/linux/slab.h:699 [inline] file_alloc_security security/selinux/hooks.c:390 [inline] selinux_file_alloc_security+0xb4/0x190 security/selinux/hooks.c:3597 security_file_alloc+0x63/0xa0 security/security.c:884 __alloc_file+0xcf/0x330 fs/file_table.c:105 alloc_empty_file+0x72/0x170 fs/file_table.c:150 path_openat+0xef/0x45e0 fs/namei.c:3523 do_filp_open+0x1a1/0x280 fs/namei.c:3564 do_sys_open+0x3fe/0x550 fs/open.c:1088 __do_sys_open fs/open.c:1106 [inline] __se_sys_open fs/open.c:1101 [inline] __x64_sys_open+0x7e/0xc0 fs/open.c:1101 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x413761 Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 RSP: 002b:00007f3450f77a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413761 RDX: 00007f3450f77b0a RSI: 0000000000000002 RDI: 00007f3450f77b00 RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 R13: 00000000004c8a15 R14: 00000000004df940 R15: 0000000000000003 kobject: 'nr0' (00000000af1079b5): kobject_cleanup, parent (null) kobject: 'nr0' (00000000af1079b5): calling ktype release kobject: 'nr0': free name kobject: 'loop2' (00000000efca7cf1): kobject_uevent_env kobject: 'loop2' (00000000efca7cf1): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'nr0' (0000000041be2318): kobject_add_internal: parent: 'net', set: 'devices' FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 kobject: 'nr0' (0000000041be2318): kobject_uevent_env kobject: 'nr0' (0000000041be2318): fill_kobj_path: path = '/devices/virtual/net/nr0' CPU: 1 PID: 8419 Comm: syz-executor.2 Not tainted 4.19.69 #43 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x172/0x1f0 lib/dump_stack.c:113 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0x1b lib/fault-inject.c:149 __should_failslab+0x121/0x190 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1557 slab_pre_alloc_hook mm/slab.h:424 [inline] slab_alloc mm/slab.c:3383 [inline] kmem_cache_alloc_trace+0x2cc/0x760 mm/slab.c:3623 kmalloc include/linux/slab.h:515 [inline] __kthread_create_on_node+0xf2/0x460 kernel/kthread.c:291 kthread_create_on_node+0xbb/0xf0 kernel/kthread.c:379 loop_prepare_queue drivers/block/loop.c:896 [inline] loop_set_fd drivers/block/loop.c:946 [inline] lo_ioctl+0xaf2/0x20e0 drivers/block/loop.c:1543 __blkdev_driver_ioctl block/ioctl.c:303 [inline] blkdev_ioctl+0xc38/0x1ab6 block/ioctl.c:601 block_ioctl+0xee/0x130 fs/block_dev.c:1891 vfs_ioctl fs/ioctl.c:46 [inline] file_ioctl fs/ioctl.c:501 [inline] do_vfs_ioctl+0xd5f/0x1380 fs/ioctl.c:688 ksys_ioctl+0xab/0xd0 fs/ioctl.c:705 __do_sys_ioctl fs/ioctl.c:712 [inline] __se_sys_ioctl fs/ioctl.c:710 [inline] __x64_sys_ioctl+0x73/0xb0 fs/ioctl.c:710 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x4596e7 Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f3450f77a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004596e7 RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 R13: 00000000004c8a15 R14: 00000000004df940 R15: 0000000000000003 kobject: 'queues' (00000000fe7dde3d): kobject_add_internal: parent: 'nr0', set: '' kobject: 'queues' (00000000fe7dde3d): kobject_uevent_env kobject: 'queues' (00000000fe7dde3d): kobject_uevent_env: filter function caused the event to drop! kobject: 'rx-0' (00000000d59e0917): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'rx-0' (00000000d59e0917): kobject_uevent_env kobject: 'rx-0' (00000000d59e0917): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' kobject: 'tx-0' (000000003e053685): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'tx-0' (000000003e053685): kobject_uevent_env kobject: 'tx-0' (000000003e053685): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' kobject: 'rx-0' (00000000d59e0917): kobject_cleanup, parent 00000000fe7dde3d kobject: 'loop1' (000000000f5cea77): kobject_uevent_env kobject: 'loop1' (000000000f5cea77): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'rx-0' (00000000d59e0917): auto cleanup 'remove' event kobject: 'rx-0' (00000000d59e0917): kobject_uevent_env kobject: 'loop4' (000000007085cc49): kobject_uevent_env kobject: 'rx-0' (00000000d59e0917): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' kobject: 'loop4' (000000007085cc49): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop2' (00000000efca7cf1): kobject_uevent_env kobject: 'rx-0' (00000000d59e0917): auto cleanup kobject_del kobject: 'loop2' (00000000efca7cf1): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'rx-0' (00000000d59e0917): calling ktype release kobject: 'rx-0': free name kobject: 'tx-0' (000000003e053685): kobject_cleanup, parent 00000000fe7dde3d FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 kobject: 'tx-0' (000000003e053685): auto cleanup 'remove' event kobject: 'tx-0' (000000003e053685): kobject_uevent_env kobject: 'tx-0' (000000003e053685): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' CPU: 1 PID: 8434 Comm: syz-executor.2 Not tainted 4.19.69 #43 kobject: 'tx-0' (000000003e053685): auto cleanup kobject_del Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x172/0x1f0 lib/dump_stack.c:113 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0x1b lib/fault-inject.c:149 kobject: 'tx-0' (000000003e053685): calling ktype release __should_failslab+0x121/0x190 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1557 kobject: 'tx-0': free name slab_pre_alloc_hook mm/slab.h:424 [inline] slab_alloc mm/slab.c:3383 [inline] kmem_cache_alloc_trace+0x2cc/0x760 mm/slab.c:3623 kobject: 'queues' (00000000fe7dde3d): kobject_cleanup, parent (null) kmalloc include/linux/slab.h:515 [inline] __kthread_create_on_node+0xf2/0x460 kernel/kthread.c:291 kobject: 'queues' (00000000fe7dde3d): calling ktype release kobject: 'queues' (00000000fe7dde3d): kset_release kobject: 'queues': free name kthread_create_on_node+0xbb/0xf0 kernel/kthread.c:379 kobject: 'nr0' (0000000041be2318): kobject_uevent_env loop_prepare_queue drivers/block/loop.c:896 [inline] loop_set_fd drivers/block/loop.c:946 [inline] lo_ioctl+0xaf2/0x20e0 drivers/block/loop.c:1543 __blkdev_driver_ioctl block/ioctl.c:303 [inline] blkdev_ioctl+0xc38/0x1ab6 block/ioctl.c:601 kobject: 'nr0' (0000000041be2318): fill_kobj_path: path = '/devices/virtual/net/nr0' block_ioctl+0xee/0x130 fs/block_dev.c:1891 vfs_ioctl fs/ioctl.c:46 [inline] file_ioctl fs/ioctl.c:501 [inline] do_vfs_ioctl+0xd5f/0x1380 fs/ioctl.c:688 ksys_ioctl+0xab/0xd0 fs/ioctl.c:705 __do_sys_ioctl fs/ioctl.c:712 [inline] __se_sys_ioctl fs/ioctl.c:710 [inline] __x64_sys_ioctl+0x73/0xb0 fs/ioctl.c:710 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x4596e7 Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f3450f77a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004596e7 RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 R13: 00000000004c8a15 R14: 00000000004df940 R15: 0000000000000003 kobject: 'loop3' (00000000b91e91a5): kobject_uevent_env kobject: 'loop3' (00000000b91e91a5): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'nr0' (0000000041be2318): kobject_cleanup, parent (null) kobject: 'loop0' (000000002acb91e0): kobject_uevent_env kobject: 'nr0' (0000000041be2318): calling ktype release kobject: 'loop0' (000000002acb91e0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'nr0': free name FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 kobject: 'loop2' (00000000efca7cf1): kobject_uevent_env CPU: 1 PID: 8441 Comm: syz-executor.2 Not tainted 4.19.69 #43 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x172/0x1f0 lib/dump_stack.c:113 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0x1b lib/fault-inject.c:149 __should_failslab+0x121/0x190 mm/failslab.c:32 kobject: 'loop2' (00000000efca7cf1): fill_kobj_path: path = '/devices/virtual/block/loop2' should_failslab+0x9/0x14 mm/slab_common.c:1557 slab_pre_alloc_hook mm/slab.h:424 [inline] slab_alloc mm/slab.c:3383 [inline] kmem_cache_alloc+0x2ae/0x700 mm/slab.c:3557 kmem_cache_zalloc include/linux/slab.h:699 [inline] __kernfs_new_node+0xef/0x680 fs/kernfs/dir.c:634 kernfs_new_node+0x99/0x130 fs/kernfs/dir.c:694 kernfs_create_dir_ns+0x52/0x160 fs/kernfs/dir.c:1020 internal_create_group+0x1cb/0xc30 fs/sysfs/group.c:135 sysfs_create_group+0x20/0x30 fs/sysfs/group.c:173 loop_sysfs_init drivers/block/loop.c:840 [inline] loop_set_fd drivers/block/loop.c:970 [inline] lo_ioctl+0xf8f/0x20e0 drivers/block/loop.c:1543 __blkdev_driver_ioctl block/ioctl.c:303 [inline] blkdev_ioctl+0xc38/0x1ab6 block/ioctl.c:601 block_ioctl+0xee/0x130 fs/block_dev.c:1891 vfs_ioctl fs/ioctl.c:46 [inline] file_ioctl fs/ioctl.c:501 [inline] do_vfs_ioctl+0xd5f/0x1380 fs/ioctl.c:688 ksys_ioctl+0xab/0xd0 fs/ioctl.c:705 __do_sys_ioctl fs/ioctl.c:712 [inline] __se_sys_ioctl fs/ioctl.c:710 [inline] __x64_sys_ioctl+0x73/0xb0 fs/ioctl.c:710 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x4596e7 Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f3450f77a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004596e7 RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 R13: 00000000004c8a15 R14: 00000000004df940 R15: 0000000000000003 kobject: 'loop2' (00000000efca7cf1): kobject_uevent_env kobject: 'loop2' (00000000efca7cf1): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop5' (000000002bd82985): kobject_uevent_env kobject: 'nr0' (000000003feb6783): kobject_add_internal: parent: 'net', set: 'devices' hfs: session requires an argument kobject: 'loop5' (000000002bd82985): fill_kobj_path: path = '/devices/virtual/block/loop5' hfs: unable to parse mount options kobject: 'nr0' (000000003feb6783): kobject_uevent_env kobject: 'loop1' (000000000f5cea77): kobject_uevent_env kobject: 'nr0' (000000003feb6783): fill_kobj_path: path = '/devices/virtual/net/nr0' kobject: 'loop1' (000000000f5cea77): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop4' (000000007085cc49): kobject_uevent_env kobject: 'queues' (00000000e35ac261): kobject_add_internal: parent: 'nr0', set: '' kobject: 'loop2' (00000000efca7cf1): kobject_uevent_env kobject: 'loop4' (000000007085cc49): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop2' (00000000efca7cf1): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'queues' (00000000e35ac261): kobject_uevent_env kobject: 'loop2' (00000000efca7cf1): kobject_uevent_env kobject: 'queues' (00000000e35ac261): kobject_uevent_env: filter function caused the event to drop! kobject: 'loop2' (00000000efca7cf1): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'rx-0' (00000000da4c64cf): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'loop2' (00000000efca7cf1): kobject_uevent_env FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 kobject: 'loop2' (00000000efca7cf1): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'rx-0' (00000000da4c64cf): kobject_uevent_env kobject: 'rx-0' (00000000da4c64cf): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' CPU: 1 PID: 8462 Comm: syz-executor.2 Not tainted 4.19.69 #43 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x172/0x1f0 lib/dump_stack.c:113 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0x1b lib/fault-inject.c:149 __should_failslab+0x121/0x190 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1557 kobject: 'tx-0' (000000004a99aaef): kobject_add_internal: parent: 'queues', set: 'queues' slab_pre_alloc_hook mm/slab.h:424 [inline] slab_alloc mm/slab.c:3383 [inline] kmem_cache_alloc+0x2ae/0x700 mm/slab.c:3557 kmem_cache_zalloc include/linux/slab.h:699 [inline] __kernfs_new_node+0xef/0x680 fs/kernfs/dir.c:634 kobject: 'tx-0' (000000004a99aaef): kobject_uevent_env kobject: 'tx-0' (000000004a99aaef): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' kernfs_new_node+0x99/0x130 fs/kernfs/dir.c:694 __kernfs_create_file+0x51/0x33b fs/kernfs/file.c:992 sysfs_add_file_mode_ns+0x222/0x560 fs/sysfs/file.c:306 create_files fs/sysfs/group.c:63 [inline] internal_create_group+0x383/0xc30 fs/sysfs/group.c:147 sysfs_create_group+0x20/0x30 fs/sysfs/group.c:173 loop_sysfs_init drivers/block/loop.c:840 [inline] loop_set_fd drivers/block/loop.c:970 [inline] lo_ioctl+0xf8f/0x20e0 drivers/block/loop.c:1543 __blkdev_driver_ioctl block/ioctl.c:303 [inline] blkdev_ioctl+0xc38/0x1ab6 block/ioctl.c:601 block_ioctl+0xee/0x130 fs/block_dev.c:1891 vfs_ioctl fs/ioctl.c:46 [inline] file_ioctl fs/ioctl.c:501 [inline] do_vfs_ioctl+0xd5f/0x1380 fs/ioctl.c:688 ksys_ioctl+0xab/0xd0 fs/ioctl.c:705 __do_sys_ioctl fs/ioctl.c:712 [inline] __se_sys_ioctl fs/ioctl.c:710 [inline] __x64_sys_ioctl+0x73/0xb0 fs/ioctl.c:710 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x4596e7 Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f3450f77a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004596e7 RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 R13: 00000000004c8a15 R14: 00000000004df940 R15: 0000000000000003 kobject: 'rx-0' (00000000da4c64cf): kobject_cleanup, parent 00000000e35ac261 kobject: 'loop2' (00000000efca7cf1): kobject_uevent_env kobject: 'loop2' (00000000efca7cf1): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'rx-0' (00000000da4c64cf): auto cleanup 'remove' event hfs: session requires an argument kobject: 'rx-0' (00000000da4c64cf): kobject_uevent_env kobject: 'loop0' (000000002acb91e0): kobject_uevent_env kobject: 'rx-0' (00000000da4c64cf): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' kobject: 'rx-0' (00000000da4c64cf): auto cleanup kobject_del hfs: unable to parse mount options kobject: 'rx-0' (00000000da4c64cf): calling ktype release kobject: 'loop0' (000000002acb91e0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'rx-0': free name kobject: 'tx-0' (000000004a99aaef): kobject_cleanup, parent 00000000e35ac261 kobject: 'tx-0' (000000004a99aaef): auto cleanup 'remove' event kobject: 'loop3' (00000000b91e91a5): kobject_uevent_env kobject: 'loop2' (00000000efca7cf1): kobject_uevent_env kobject: 'loop2' (00000000efca7cf1): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'tx-0' (000000004a99aaef): kobject_uevent_env kobject: 'loop3' (00000000b91e91a5): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'tx-0' (000000004a99aaef): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' kobject: 'tx-0' (000000004a99aaef): auto cleanup kobject_del kobject: 'tx-0' (000000004a99aaef): calling ktype release kobject: 'loop4' (000000007085cc49): kobject_uevent_env kobject: 'tx-0': free name kobject: 'queues' (00000000e35ac261): kobject_cleanup, parent (null) kobject: 'loop4' (000000007085cc49): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'queues' (00000000e35ac261): calling ktype release FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 8481 Comm: syz-executor.2 Not tainted 4.19.69 #43 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: kobject: 'queues' (00000000e35ac261): kset_release __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x172/0x1f0 lib/dump_stack.c:113 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0x1b lib/fault-inject.c:149 __should_failslab+0x121/0x190 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1557 slab_pre_alloc_hook mm/slab.h:424 [inline] slab_alloc mm/slab.c:3383 [inline] kmem_cache_alloc+0x2ae/0x700 mm/slab.c:3557 kmem_cache_zalloc include/linux/slab.h:699 [inline] __kernfs_new_node+0xef/0x680 fs/kernfs/dir.c:634 kobject: 'queues': free name kernfs_new_node+0x99/0x130 fs/kernfs/dir.c:694 kobject: 'loop1' (000000000f5cea77): kobject_uevent_env __kernfs_create_file+0x51/0x33b fs/kernfs/file.c:992 sysfs_add_file_mode_ns+0x222/0x560 fs/sysfs/file.c:306 create_files fs/sysfs/group.c:63 [inline] internal_create_group+0x383/0xc30 fs/sysfs/group.c:147 kobject: 'nr0' (000000003feb6783): kobject_uevent_env sysfs_create_group+0x20/0x30 fs/sysfs/group.c:173 kobject: 'nr0' (000000003feb6783): fill_kobj_path: path = '/devices/virtual/net/nr0' loop_sysfs_init drivers/block/loop.c:840 [inline] loop_set_fd drivers/block/loop.c:970 [inline] lo_ioctl+0xf8f/0x20e0 drivers/block/loop.c:1543 __blkdev_driver_ioctl block/ioctl.c:303 [inline] blkdev_ioctl+0xc38/0x1ab6 block/ioctl.c:601 block_ioctl+0xee/0x130 fs/block_dev.c:1891 kobject: 'loop1' (000000000f5cea77): fill_kobj_path: path = '/devices/virtual/block/loop1' vfs_ioctl fs/ioctl.c:46 [inline] file_ioctl fs/ioctl.c:501 [inline] do_vfs_ioctl+0xd5f/0x1380 fs/ioctl.c:688 ksys_ioctl+0xab/0xd0 fs/ioctl.c:705 __do_sys_ioctl fs/ioctl.c:712 [inline] __se_sys_ioctl fs/ioctl.c:710 [inline] __x64_sys_ioctl+0x73/0xb0 fs/ioctl.c:710 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x4596e7 Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f3450f77a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004596e7 RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 R13: 00000000004c8a15 R14: 00000000004df940 R15: 0000000000000003 kobject: 'loop2' (00000000efca7cf1): kobject_uevent_env kobject: 'loop2' (00000000efca7cf1): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'nr0' (000000003feb6783): kobject_cleanup, parent (null) hfs: session requires an argument hfs: unable to parse mount options kobject: 'nr0' (000000003feb6783): calling ktype release kobject: 'nr0': free name kobject: 'nr0' (0000000072577eaf): kobject_add_internal: parent: 'net', set: 'devices' kobject: 'nr0' (0000000072577eaf): kobject_uevent_env kobject: 'nr0' (0000000072577eaf): fill_kobj_path: path = '/devices/virtual/net/nr0' kobject: 'loop2' (00000000efca7cf1): kobject_uevent_env kobject: 'queues' (00000000d7a0425c): kobject_add_internal: parent: 'nr0', set: '' kobject: 'loop2' (00000000efca7cf1): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'queues' (00000000d7a0425c): kobject_uevent_env kobject: 'queues' (00000000d7a0425c): kobject_uevent_env: filter function caused the event to drop! kobject: 'loop2' (00000000efca7cf1): kobject_uevent_env kobject: 'rx-0' (000000001feb54ab): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'loop2' (00000000efca7cf1): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'rx-0' (000000001feb54ab): kobject_uevent_env kobject: 'loop3' (00000000b91e91a5): kobject_uevent_env FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 kobject: 'rx-0' (000000001feb54ab): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' kobject: 'loop3' (00000000b91e91a5): fill_kobj_path: path = '/devices/virtual/block/loop3' CPU: 1 PID: 8496 Comm: syz-executor.2 Not tainted 4.19.69 #43 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x172/0x1f0 lib/dump_stack.c:113 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0x1b lib/fault-inject.c:149 __should_failslab+0x121/0x190 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1557 slab_pre_alloc_hook mm/slab.h:424 [inline] slab_alloc mm/slab.c:3383 [inline] kmem_cache_alloc+0x2ae/0x700 mm/slab.c:3557 kmem_cache_zalloc include/linux/slab.h:699 [inline] __kernfs_new_node+0xef/0x680 fs/kernfs/dir.c:634 kernfs_new_node+0x99/0x130 fs/kernfs/dir.c:694 __kernfs_create_file+0x51/0x33b fs/kernfs/file.c:992 sysfs_add_file_mode_ns+0x222/0x560 fs/sysfs/file.c:306 create_files fs/sysfs/group.c:63 [inline] internal_create_group+0x383/0xc30 fs/sysfs/group.c:147 sysfs_create_group+0x20/0x30 fs/sysfs/group.c:173 loop_sysfs_init drivers/block/loop.c:840 [inline] loop_set_fd drivers/block/loop.c:970 [inline] lo_ioctl+0xf8f/0x20e0 drivers/block/loop.c:1543 __blkdev_driver_ioctl block/ioctl.c:303 [inline] blkdev_ioctl+0xc38/0x1ab6 block/ioctl.c:601 block_ioctl+0xee/0x130 fs/block_dev.c:1891 vfs_ioctl fs/ioctl.c:46 [inline] file_ioctl fs/ioctl.c:501 [inline] do_vfs_ioctl+0xd5f/0x1380 fs/ioctl.c:688 ksys_ioctl+0xab/0xd0 fs/ioctl.c:705 __do_sys_ioctl fs/ioctl.c:712 [inline] __se_sys_ioctl fs/ioctl.c:710 [inline] __x64_sys_ioctl+0x73/0xb0 fs/ioctl.c:710 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x4596e7 Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f3450f77a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004596e7 RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 R13: 00000000004c8a15 R14: 00000000004df940 R15: 0000000000000003 kobject: 'tx-0' (0000000081dfa64f): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'tx-0' (0000000081dfa64f): kobject_uevent_env kobject: 'tx-0' (0000000081dfa64f): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' kobject: 'loop2' (00000000efca7cf1): kobject_uevent_env kobject: 'rx-0' (000000001feb54ab): kobject_cleanup, parent 00000000d7a0425c kobject: 'rx-0' (000000001feb54ab): auto cleanup 'remove' event kobject: 'rx-0' (000000001feb54ab): kobject_uevent_env kobject: 'rx-0' (000000001feb54ab): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' kobject: 'rx-0' (000000001feb54ab): auto cleanup kobject_del kobject: 'loop2' (00000000efca7cf1): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop1' (000000000f5cea77): kobject_uevent_env kobject: 'loop1' (000000000f5cea77): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'rx-0' (000000001feb54ab): calling ktype release hfs: session requires an argument kobject: 'rx-0': free name kobject: 'tx-0' (0000000081dfa64f): kobject_cleanup, parent 00000000d7a0425c hfs: unable to parse mount options kobject: 'tx-0' (0000000081dfa64f): auto cleanup 'remove' event kobject: 'tx-0' (0000000081dfa64f): kobject_uevent_env kobject: 'tx-0' (0000000081dfa64f): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' kobject: 'tx-0' (0000000081dfa64f): auto cleanup kobject_del kobject: 'loop2' (00000000efca7cf1): kobject_uevent_env kobject: 'tx-0' (0000000081dfa64f): calling ktype release kobject: 'loop2' (00000000efca7cf1): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'tx-0': free name kobject: 'queues' (00000000d7a0425c): kobject_cleanup, parent (null) kobject: 'queues' (00000000d7a0425c): calling ktype release kobject: 'queues' (00000000d7a0425c): kset_release kobject: 'loop2' (00000000efca7cf1): kobject_uevent_env kobject: 'queues': free name kobject: 'loop2' (00000000efca7cf1): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'nr0' (0000000072577eaf): kobject_uevent_env kobject: 'nr0' (0000000072577eaf): fill_kobj_path: path = '/devices/virtual/net/nr0' kobject: 'nr0' (0000000072577eaf): kobject_cleanup, parent (null) kobject: 'nr0' (0000000072577eaf): calling ktype release kobject: 'nr0': free name kobject: 'loop3' (00000000b91e91a5): kobject_uevent_env kobject: 'loop3' (00000000b91e91a5): fill_kobj_path: path = '/devices/virtual/block/loop3' FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 8516 Comm: syz-executor.2 Not tainted 4.19.69 #43 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x172/0x1f0 lib/dump_stack.c:113 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0x1b lib/fault-inject.c:149 __should_failslab+0x121/0x190 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1557 slab_pre_alloc_hook mm/slab.h:424 [inline] slab_alloc mm/slab.c:3383 [inline] kmem_cache_alloc+0x2ae/0x700 mm/slab.c:3557 kmem_cache_zalloc include/linux/slab.h:699 [inline] __kernfs_new_node+0xef/0x680 fs/kernfs/dir.c:634 kernfs_new_node+0x99/0x130 fs/kernfs/dir.c:694 __kernfs_create_file+0x51/0x33b fs/kernfs/file.c:992 sysfs_add_file_mode_ns+0x222/0x560 fs/sysfs/file.c:306 create_files fs/sysfs/group.c:63 [inline] internal_create_group+0x383/0xc30 fs/sysfs/group.c:147 sysfs_create_group+0x20/0x30 fs/sysfs/group.c:173 loop_sysfs_init drivers/block/loop.c:840 [inline] loop_set_fd drivers/block/loop.c:970 [inline] lo_ioctl+0xf8f/0x20e0 drivers/block/loop.c:1543 __blkdev_driver_ioctl block/ioctl.c:303 [inline] blkdev_ioctl+0xc38/0x1ab6 block/ioctl.c:601 block_ioctl+0xee/0x130 fs/block_dev.c:1891 vfs_ioctl fs/ioctl.c:46 [inline] file_ioctl fs/ioctl.c:501 [inline] do_vfs_ioctl+0xd5f/0x1380 fs/ioctl.c:688 ksys_ioctl+0xab/0xd0 fs/ioctl.c:705 __do_sys_ioctl fs/ioctl.c:712 [inline] __se_sys_ioctl fs/ioctl.c:710 [inline] __x64_sys_ioctl+0x73/0xb0 fs/ioctl.c:710 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x4596e7 Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f3450f77a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004596e7 RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 R13: 00000000004c8a15 R14: 00000000004df940 R15: 0000000000000003 kobject: 'loop2' (00000000efca7cf1): kobject_uevent_env kobject: 'loop2' (00000000efca7cf1): fill_kobj_path: path = '/devices/virtual/block/loop2' hfs: session requires an argument hfs: unable to parse mount options kobject: 'loop5' (000000002bd82985): kobject_uevent_env kobject: 'nr0' (00000000a2dc32a4): kobject_add_internal: parent: 'net', set: 'devices' kobject: 'loop5' (000000002bd82985): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'nr0' (00000000a2dc32a4): kobject_uevent_env kobject: 'loop2' (00000000efca7cf1): kobject_uevent_env kobject: 'loop2' (00000000efca7cf1): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'nr0' (00000000a2dc32a4): fill_kobj_path: path = '/devices/virtual/net/nr0' kobject: 'queues' (00000000744a9663): kobject_add_internal: parent: 'nr0', set: '' kobject: 'loop0' (000000002acb91e0): kobject_uevent_env kobject: 'loop0' (000000002acb91e0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'queues' (00000000744a9663): kobject_uevent_env kobject: 'loop4' (000000007085cc49): kobject_uevent_env kobject: 'queues' (00000000744a9663): kobject_uevent_env: filter function caused the event to drop! kobject: 'loop4' (000000007085cc49): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop1' (000000000f5cea77): kobject_uevent_env kobject: 'rx-0' (00000000b9c870f8): kobject_add_internal: parent: 'queues', set: 'queues' FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 kobject: 'loop1' (000000000f5cea77): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'rx-0' (00000000b9c870f8): kobject_uevent_env CPU: 1 PID: 8537 Comm: syz-executor.2 Not tainted 4.19.69 #43 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x172/0x1f0 lib/dump_stack.c:113 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0x1b lib/fault-inject.c:149 __should_failslab+0x121/0x190 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1557 slab_pre_alloc_hook mm/slab.h:424 [inline] slab_alloc mm/slab.c:3383 [inline] kmem_cache_alloc+0x2ae/0x700 mm/slab.c:3557 kmem_cache_zalloc include/linux/slab.h:699 [inline] __kernfs_new_node+0xef/0x680 fs/kernfs/dir.c:634 kernfs_new_node+0x99/0x130 fs/kernfs/dir.c:694 __kernfs_create_file+0x51/0x33b fs/kernfs/file.c:992 sysfs_add_file_mode_ns+0x222/0x560 fs/sysfs/file.c:306 create_files fs/sysfs/group.c:63 [inline] internal_create_group+0x383/0xc30 fs/sysfs/group.c:147 sysfs_create_group+0x20/0x30 fs/sysfs/group.c:173 loop_sysfs_init drivers/block/loop.c:840 [inline] loop_set_fd drivers/block/loop.c:970 [inline] lo_ioctl+0xf8f/0x20e0 drivers/block/loop.c:1543 __blkdev_driver_ioctl block/ioctl.c:303 [inline] blkdev_ioctl+0xc38/0x1ab6 block/ioctl.c:601 block_ioctl+0xee/0x130 fs/block_dev.c:1891 vfs_ioctl fs/ioctl.c:46 [inline] file_ioctl fs/ioctl.c:501 [inline] do_vfs_ioctl+0xd5f/0x1380 fs/ioctl.c:688 ksys_ioctl+0xab/0xd0 fs/ioctl.c:705 __do_sys_ioctl fs/ioctl.c:712 [inline] __se_sys_ioctl fs/ioctl.c:710 [inline] __x64_sys_ioctl+0x73/0xb0 fs/ioctl.c:710 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x4596e7 Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f3450f77a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004596e7 RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 R13: 00000000004c8a15 R14: 00000000004df940 R15: 0000000000000003 kobject: 'rx-0' (00000000b9c870f8): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' kobject: 'tx-0' (00000000553e6e68): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'tx-0' (00000000553e6e68): kobject_uevent_env kobject: 'tx-0' (00000000553e6e68): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' kobject: 'loop2' (00000000efca7cf1): kobject_uevent_env kobject: 'loop2' (00000000efca7cf1): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'rx-0' (00000000b9c870f8): kobject_cleanup, parent 00000000744a9663 kobject: 'rx-0' (00000000b9c870f8): auto cleanup 'remove' event kobject: 'loop3' (00000000b91e91a5): kobject_uevent_env hfs: session requires an argument kobject: 'loop3' (00000000b91e91a5): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'rx-0' (00000000b9c870f8): kobject_uevent_env hfs: unable to parse mount options kobject: 'rx-0' (00000000b9c870f8): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' kobject: 'rx-0' (00000000b9c870f8): auto cleanup kobject_del kobject: 'rx-0' (00000000b9c870f8): calling ktype release kobject: 'rx-0': free name kobject: 'tx-0' (00000000553e6e68): kobject_cleanup, parent 00000000744a9663 kobject: 'loop2' (00000000efca7cf1): kobject_uevent_env kobject: 'loop2' (00000000efca7cf1): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'tx-0' (00000000553e6e68): auto cleanup 'remove' event kobject: 'tx-0' (00000000553e6e68): kobject_uevent_env kobject: 'tx-0' (00000000553e6e68): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' kobject: 'loop2' (00000000efca7cf1): kobject_uevent_env kobject: 'loop2' (00000000efca7cf1): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'tx-0' (00000000553e6e68): auto cleanup kobject_del kobject: 'loop2' (00000000efca7cf1): kobject_uevent_env kobject: 'tx-0' (00000000553e6e68): calling ktype release FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 kobject: 'tx-0': free name kobject: 'queues' (00000000744a9663): kobject_cleanup, parent (null) CPU: 1 PID: 8557 Comm: syz-executor.2 Not tainted 4.19.69 #43 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x172/0x1f0 lib/dump_stack.c:113 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0x1b lib/fault-inject.c:149 __should_failslab+0x121/0x190 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1557 slab_pre_alloc_hook mm/slab.h:424 [inline] slab_alloc mm/slab.c:3383 [inline] kmem_cache_alloc_trace+0x2cc/0x760 mm/slab.c:3623 kmalloc include/linux/slab.h:515 [inline] kzalloc include/linux/slab.h:709 [inline] kobject_uevent_env+0x387/0x101d lib/kobject_uevent.c:521 kobject_uevent+0x20/0x26 lib/kobject_uevent.c:639 loop_set_fd drivers/block/loop.c:972 [inline] lo_ioctl+0x100b/0x20e0 drivers/block/loop.c:1543 __blkdev_driver_ioctl block/ioctl.c:303 [inline] blkdev_ioctl+0xc38/0x1ab6 block/ioctl.c:601 block_ioctl+0xee/0x130 fs/block_dev.c:1891 vfs_ioctl fs/ioctl.c:46 [inline] file_ioctl fs/ioctl.c:501 [inline] do_vfs_ioctl+0xd5f/0x1380 fs/ioctl.c:688 ksys_ioctl+0xab/0xd0 fs/ioctl.c:705 __do_sys_ioctl fs/ioctl.c:712 [inline] __se_sys_ioctl fs/ioctl.c:710 [inline] __x64_sys_ioctl+0x73/0xb0 fs/ioctl.c:710 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x4596e7 Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f3450f77a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004596e7 RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 R13: 00000000004c8a15 R14: 00000000004df940 R15: 0000000000000003 kobject: 'queues' (00000000744a9663): calling ktype release kobject: 'queues' (00000000744a9663): kset_release kobject: 'queues': free name kobject: 'nr0' (00000000a2dc32a4): kobject_uevent_env kobject: 'nr0' (00000000a2dc32a4): fill_kobj_path: path = '/devices/virtual/net/nr0' kobject: 'loop1' (000000000f5cea77): kobject_uevent_env hfs: session requires an argument kobject: 'loop1' (000000000f5cea77): fill_kobj_path: path = '/devices/virtual/block/loop1' hfs: unable to parse mount options kobject: 'nr0' (00000000a2dc32a4): kobject_cleanup, parent (null) kobject: 'nr0' (00000000a2dc32a4): calling ktype release kobject: 'nr0': free name kobject: 'nr0' (0000000014898743): kobject_add_internal: parent: 'net', set: 'devices' kobject: 'loop2' (00000000efca7cf1): kobject_uevent_env kobject: 'loop2' (00000000efca7cf1): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'nr0' (0000000014898743): kobject_uevent_env kobject: 'nr0' (0000000014898743): fill_kobj_path: path = '/devices/virtual/net/nr0' kobject: 'queues' (000000008fef055f): kobject_add_internal: parent: 'nr0', set: '' kobject: 'loop2' (00000000efca7cf1): kobject_uevent_env kobject: 'loop2' (00000000efca7cf1): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'queues' (000000008fef055f): kobject_uevent_env kobject: 'loop2' (00000000efca7cf1): kobject_uevent_env kobject: 'queues' (000000008fef055f): kobject_uevent_env: filter function caused the event to drop! FAULT_INJECTION: forcing a failure. name fail_page_alloc, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 8566 Comm: syz-executor.2 Not tainted 4.19.69 #43 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x172/0x1f0 lib/dump_stack.c:113 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0x1b lib/fault-inject.c:149 kobject: 'rx-0' (000000006de53f40): kobject_add_internal: parent: 'queues', set: 'queues' should_fail_alloc_page mm/page_alloc.c:3078 [inline] prepare_alloc_pages mm/page_alloc.c:4336 [inline] __alloc_pages_nodemask+0x1ee/0x750 mm/page_alloc.c:4383 kobject: 'rx-0' (000000006de53f40): kobject_uevent_env __alloc_pages include/linux/gfp.h:473 [inline] __alloc_pages_node include/linux/gfp.h:486 [inline] kmem_getpages mm/slab.c:1412 [inline] cache_grow_begin+0x91/0x8c0 mm/slab.c:2682 kobject: 'rx-0' (000000006de53f40): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' cache_alloc_refill mm/slab.c:3049 [inline] ____cache_alloc mm/slab.c:3132 [inline] ____cache_alloc mm/slab.c:3115 [inline] __do_cache_alloc mm/slab.c:3354 [inline] slab_alloc mm/slab.c:3389 [inline] kmem_cache_alloc_trace+0x685/0x760 mm/slab.c:3623 kmalloc include/linux/slab.h:515 [inline] kzalloc include/linux/slab.h:709 [inline] kobject_uevent_env+0x387/0x101d lib/kobject_uevent.c:521 kobject: 'tx-0' (00000000625a54a5): kobject_add_internal: parent: 'queues', set: 'queues' kobject_uevent+0x20/0x26 lib/kobject_uevent.c:639 loop_set_fd drivers/block/loop.c:972 [inline] lo_ioctl+0x100b/0x20e0 drivers/block/loop.c:1543 __blkdev_driver_ioctl block/ioctl.c:303 [inline] blkdev_ioctl+0xc38/0x1ab6 block/ioctl.c:601 kobject: 'tx-0' (00000000625a54a5): kobject_uevent_env kobject: 'tx-0' (00000000625a54a5): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' block_ioctl+0xee/0x130 fs/block_dev.c:1891 vfs_ioctl fs/ioctl.c:46 [inline] file_ioctl fs/ioctl.c:501 [inline] do_vfs_ioctl+0xd5f/0x1380 fs/ioctl.c:688 ksys_ioctl+0xab/0xd0 fs/ioctl.c:705 __do_sys_ioctl fs/ioctl.c:712 [inline] __se_sys_ioctl fs/ioctl.c:710 [inline] __x64_sys_ioctl+0x73/0xb0 fs/ioctl.c:710 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x4596e7 Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f3450f77a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004596e7 RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 R13: 00000000004c8a15 R14: 00000000004df940 R15: 0000000000000003 kobject: 'rx-0' (000000006de53f40): kobject_cleanup, parent 000000008fef055f kobject: 'loop2' (00000000efca7cf1): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'rx-0' (000000006de53f40): auto cleanup 'remove' event kobject: 'loop0' (000000002acb91e0): kobject_uevent_env kobject: 'rx-0' (000000006de53f40): kobject_uevent_env hfs: session requires an argument kobject: 'loop0' (000000002acb91e0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'rx-0' (000000006de53f40): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' hfs: unable to parse mount options kobject: 'loop3' (00000000b91e91a5): kobject_uevent_env kobject: 'loop3' (00000000b91e91a5): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'rx-0' (000000006de53f40): auto cleanup kobject_del kobject: 'rx-0' (000000006de53f40): calling ktype release kobject: 'loop2' (00000000efca7cf1): kobject_uevent_env kobject: 'loop2' (00000000efca7cf1): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'rx-0': free name kobject: 'loop4' (000000007085cc49): kobject_uevent_env kobject: 'tx-0' (00000000625a54a5): kobject_cleanup, parent 000000008fef055f kobject: 'loop4' (000000007085cc49): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'tx-0' (00000000625a54a5): auto cleanup 'remove' event kobject: 'loop2' (00000000efca7cf1): kobject_uevent_env kobject: 'loop2' (00000000efca7cf1): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'tx-0' (00000000625a54a5): kobject_uevent_env kobject: 'tx-0' (00000000625a54a5): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' kobject: 'tx-0' (00000000625a54a5): auto cleanup kobject_del kobject: 'loop1' (000000000f5cea77): kobject_uevent_env kobject: 'tx-0' (00000000625a54a5): calling ktype release kobject: 'loop1' (000000000f5cea77): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'tx-0': free name kobject: 'queues' (000000008fef055f): kobject_cleanup, parent (null) kobject: 'queues' (000000008fef055f): calling ktype release kobject: 'queues' (000000008fef055f): kset_release kobject: 'queues': free name kobject: 'nr0' (0000000014898743): kobject_uevent_env kobject: 'nr0' (0000000014898743): fill_kobj_path: path = '/devices/virtual/net/nr0' kobject: 'nr0' (0000000014898743): kobject_cleanup, parent (null) kobject: 'nr0' (0000000014898743): calling ktype release kobject: 'nr0': free name FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 8585 Comm: syz-executor.2 Not tainted 4.19.69 #43 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x172/0x1f0 lib/dump_stack.c:113 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0x1b lib/fault-inject.c:149 __should_failslab+0x121/0x190 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1557 slab_pre_alloc_hook mm/slab.h:424 [inline] slab_alloc mm/slab.c:3383 [inline] kmem_cache_alloc+0x2ae/0x700 mm/slab.c:3557 kmem_cache_zalloc include/linux/slab.h:699 [inline] __kernfs_new_node+0xef/0x680 fs/kernfs/dir.c:634 kernfs_new_node+0x99/0x130 fs/kernfs/dir.c:694 __kernfs_create_file+0x51/0x33b fs/kernfs/file.c:992 sysfs_add_file_mode_ns+0x222/0x560 fs/sysfs/file.c:306 create_files fs/sysfs/group.c:63 [inline] internal_create_group+0x383/0xc30 fs/sysfs/group.c:147 sysfs_create_group+0x20/0x30 fs/sysfs/group.c:173 loop_sysfs_init drivers/block/loop.c:840 [inline] loop_set_fd drivers/block/loop.c:970 [inline] lo_ioctl+0xf8f/0x20e0 drivers/block/loop.c:1543 __blkdev_driver_ioctl block/ioctl.c:303 [inline] blkdev_ioctl+0xc38/0x1ab6 block/ioctl.c:601 block_ioctl+0xee/0x130 fs/block_dev.c:1891 vfs_ioctl fs/ioctl.c:46 [inline] file_ioctl fs/ioctl.c:501 [inline] do_vfs_ioctl+0xd5f/0x1380 fs/ioctl.c:688 ksys_ioctl+0xab/0xd0 fs/ioctl.c:705 __do_sys_ioctl fs/ioctl.c:712 [inline] __se_sys_ioctl fs/ioctl.c:710 [inline] __x64_sys_ioctl+0x73/0xb0 fs/ioctl.c:710 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x4596e7 Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f3450f77a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004596e7 RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 R13: 00000000004c8a15 R14: 00000000004df940 R15: 0000000000000003 kobject: 'loop2' (00000000efca7cf1): kobject_uevent_env kobject: 'loop2' (00000000efca7cf1): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop5' (000000002bd82985): kobject_uevent_env