netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. INFO: trying to register non-static key. the code is fine but needs lockdep annotation. turning off the locking correctness validator. CPU: 0 PID: 9289 Comm: syz-executor.2 Not tainted 4.14.137 #33 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x138/0x19c lib/dump_stack.c:53 register_lock_class+0x2fd/0x1730 kernel/locking/lockdep.c:768 __lock_acquire+0x147/0x4620 kernel/locking/lockdep.c:3374 lock_acquire+0x16f/0x430 kernel/locking/lockdep.c:3991 flush_work+0xae/0x730 kernel/workqueue.c:2881 __cancel_work_timer+0x2f0/0x480 kernel/workqueue.c:2956 cancel_work_sync+0x18/0x20 kernel/workqueue.c:2992 smc_close_active+0x68e/0xba0 net/smc/smc_close.c:206 smc_release+0x45a/0x630 net/smc/af_smc.c:131 __sock_release+0xce/0x2b0 net/socket.c:602 sock_close+0x1b/0x30 net/socket.c:1139 __fput+0x275/0x7a0 fs/file_table.c:210 ____fput+0x16/0x20 fs/file_table.c:244 task_work_run+0x114/0x190 kernel/task_work.c:113 tracehook_notify_resume include/linux/tracehook.h:191 [inline] exit_to_usermode_loop+0x1da/0x220 arch/x86/entry/common.c:164 prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline] syscall_return_slowpath arch/x86/entry/common.c:270 [inline] do_syscall_64+0x4bc/0x640 arch/x86/entry/common.c:297 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x413511 RSP: 002b:00007fff7429daf0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 RAX: 0000000000000000 RBX: 0000000000000004 RCX: 0000000000413511 RDX: 0000001b2fe20000 RSI: 0000000000000000 RDI: 0000000000000003 RBP: 0000000000000001 R08: 0000000010745ce5 R09: 0000000010745ce9 R10: 00007fff7429dbd0 R11: 0000000000000293 R12: 000000000075bf20 R13: 000000000003ad80 R14: 0000000000760678 R15: ffffffffffffffff kobject: 'loop0' (ffff88805b740ce0): kobject_uevent_env kobject: 'loop0' (ffff88805b740ce0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop4' (ffff8880a4b172a0): kobject_uevent_env kobject: 'loop4' (ffff8880a4b172a0): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop5' (ffff8880a4b4c1e0): kobject_uevent_env kobject: 'loop5' (ffff8880a4b4c1e0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop2' (ffff8880a4a600a0): kobject_uevent_env kobject: 'loop2' (ffff8880a4a600a0): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop0' (ffff88805b740ce0): kobject_uevent_env kobject: 'loop0' (ffff88805b740ce0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop3' (ffff8880a4a9a9a0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a9a9a0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop5' (ffff8880a4b4c1e0): kobject_uevent_env kobject: 'loop5' (ffff8880a4b4c1e0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop0' (ffff88805b740ce0): kobject_uevent_env kobject: 'loop0' (ffff88805b740ce0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop4' (ffff8880a4b172a0): kobject_uevent_env kobject: 'loop4' (ffff8880a4b172a0): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop2' (ffff8880a4a600a0): kobject_uevent_env kobject: 'loop2' (ffff8880a4a600a0): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop0' (ffff88805b740ce0): kobject_uevent_env kobject: 'loop0' (ffff88805b740ce0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop4' (ffff8880a4b172a0): kobject_uevent_env kobject: 'loop4' (ffff8880a4b172a0): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop3' (ffff8880a4a9a9a0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a9a9a0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'integrity' (ffff88805b7411d0): kobject_uevent_env kobject: 'loop2' (ffff8880a4a600a0): kobject_uevent_env kobject: 'integrity' (ffff88805b7411d0): kobject_uevent_env: filter function caused the event to drop! kobject: 'loop2' (ffff8880a4a600a0): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'integrity' (ffff88805b7411d0): kobject_cleanup, parent (null) kobject: 'integrity' (ffff88805b7411d0): does not have a release() function, it is broken and must be fixed. kobject: 'integrity': free name kobject: '7:0' (ffff88805b49f3d0): kobject_uevent_env kobject: '7:0' (ffff88805b49f3d0): fill_kobj_path: path = '/devices/virtual/bdi/7:0' kobject: '7:0' (ffff88805b49f3d0): kobject_cleanup, parent (null) kobject: '7:0' (ffff88805b49f3d0): calling ktype release kobject: '7:0': free name kobject: 'mq' (ffff8880a19149d8): kobject_uevent_env kobject: 'mq' (ffff8880a19149d8): kobject_uevent_env: filter function caused the event to drop! kobject: 'iosched' (ffff88808ad76050): kobject_uevent_env kobject: 'iosched' (ffff88808ad76050): kobject_uevent_env: filter function caused the event to drop! kobject: 'queue' (ffff8880a1914998): kobject_uevent_env kobject: 'queue' (ffff8880a1914998): kobject_uevent_env: filter function caused the event to drop! kobject: 'holders' (ffff88807fbc2280): kobject_cleanup, parent ffff88805b740ce0 kobject: 'holders' (ffff88807fbc2280): auto cleanup kobject_del kobject: 'holders' (ffff88807fbc2280): calling ktype release kobject: (ffff88807fbc2280): dynamic_kobj_release kobject: 'holders': free name kobject: 'slaves' (ffff88807fbc2d80): kobject_cleanup, parent ffff88805b740ce0 kobject: 'slaves' (ffff88807fbc2d80): auto cleanup kobject_del kobject: 'slaves' (ffff88807fbc2d80): calling ktype release kobject: (ffff88807fbc2d80): dynamic_kobj_release kobject: 'slaves': free name kobject: 'loop0' (ffff88805b740ce0): kobject_uevent_env kobject: 'loop0' (ffff88805b740ce0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop5' (ffff8880a4b4c1e0): kobject_uevent_env kobject: 'loop5' (ffff8880a4b4c1e0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop0' (ffff88805b740ce0): kobject_cleanup, parent (null) kobject: 'loop0' (ffff88805b740ce0): calling ktype release kobject: 'queue' (ffff8880a1914998): kobject_cleanup, parent (null) kobject: 'loop5' (ffff8880a4b4c1e0): kobject_uevent_env kobject: 'queue' (ffff8880a1914998): calling ktype release kobject: 'queue': free name kobject: 'iosched' (ffff88808ad76050): kobject_cleanup, parent (null) kobject: 'iosched' (ffff88808ad76050): calling ktype release kobject: 'loop5' (ffff8880a4b4c1e0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop0': free name kobject: 'loop4' (ffff8880a4b172a0): kobject_uevent_env kobject: 'iosched': free name TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. kobject: '0' (ffff8880a6195d28): kobject_cleanup, parent (null) kobject: '0' (ffff8880a6195d28): calling ktype release kobject: 'loop4' (ffff8880a4b172a0): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop2' (ffff8880a4a600a0): kobject_uevent_env kobject: '0': free name kobject: 'cpu0' (ffffe8ffffc7fa58): kobject_cleanup, parent (null) kobject: 'loop2' (ffff8880a4a600a0): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'cpu0' (ffffe8ffffc7fa58): calling ktype release kobject: 'cpu0': free name kobject: '7:0' (ffff88808301c490): kobject_add_internal: parent: 'bdi', set: 'devices' kobject: 'cpu1' (ffffe8ffffd7fa58): kobject_cleanup, parent (null) kobject: '7:0' (ffff88808301c490): kobject_uevent_env kobject: 'cpu1' (ffffe8ffffd7fa58): calling ktype release kobject: '7:0' (ffff88808301c490): fill_kobj_path: path = '/devices/virtual/bdi/7:0' kobject: 'cpu1': free name kobject: 'mq' (ffff8880a19149d8): kobject_cleanup, parent (null) kobject: 'loop0' (ffff88809b4d8de0): kobject_add_internal: parent: 'block', set: 'devices' kobject: 'mq' (ffff8880a19149d8): calling ktype release kobject: 'loop0' (ffff88809b4d8de0): kobject_uevent_env kobject: 'mq': free name kobject: 'loop0' (ffff88809b4d8de0): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'holders' (ffff88808a575400): kobject_add_internal: parent: 'loop0', set: '' kobject: 'slaves' (ffff88808a575300): kobject_add_internal: parent: 'loop0', set: '' kobject: 'loop0' (ffff88809b4d8de0): kobject_uevent_env kobject: 'loop0' (ffff88809b4d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'queue' (ffff8880a1e07488): kobject_add_internal: parent: 'loop0', set: '' kobject: 'mq' (ffff8880a1e074c8): kobject_add_internal: parent: 'loop0', set: '' kobject: 'mq' (ffff8880a1e074c8): kobject_uevent_env kobject: 'mq' (ffff8880a1e074c8): kobject_uevent_env: filter function caused the event to drop! protocol 88fb is buggy, dev hsr_slave_0 protocol 88fb is buggy, dev hsr_slave_1 device team0 entered promiscuous mode kobject: '0' (ffff8880845f4228): kobject_add_internal: parent: 'mq', set: '' device team_slave_0 entered promiscuous mode kobject: 'cpu0' (ffffe8ffffc2d198): kobject_add_internal: parent: '0', set: '' kobject: 'cpu1' (ffffe8ffffd2d198): kobject_add_internal: parent: '0', set: '' device team_slave_1 entered promiscuous mode kobject: 'queue' (ffff8880a1e07488): kobject_uevent_env device syz_tun entered promiscuous mode kobject: 'queue' (ffff8880a1e07488): kobject_uevent_env: filter function caused the event to drop! device syz_tun left promiscuous mode kobject: 'iosched' (ffff8880a07f96d0): kobject_add_internal: parent: 'queue', set: '' device team0 left promiscuous mode kobject: 'iosched' (ffff8880a07f96d0): kobject_uevent_env device team_slave_0 left promiscuous mode kobject: 'iosched' (ffff8880a07f96d0): kobject_uevent_env: filter function caused the event to drop! device team_slave_1 left promiscuous mode kobject: 'integrity' (ffff88809b4d92d0): kobject_add_internal: parent: 'loop0', set: '' TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. kobject: 'integrity' (ffff88809b4d92d0): kobject_uevent_env kobject: 'integrity' (ffff88809b4d92d0): kobject_uevent_env: filter function caused the event to drop! kobject: 'loop3' (ffff8880a4a9a9a0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a9a9a0): fill_kobj_path: path = '/devices/virtual/block/loop3' device team0 entered promiscuous mode device team_slave_0 entered promiscuous mode device team_slave_1 entered promiscuous mode device team0 left promiscuous mode device team_slave_0 left promiscuous mode raw_sendmsg: syz-executor.3 forgot to set AF_INET. Fix it! kobject: 'loop2' (ffff8880a4a600a0): kobject_uevent_env device team_slave_1 left promiscuous mode kobject: 'loop2' (ffff8880a4a600a0): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop4' (ffff8880a4b172a0): kobject_uevent_env kobject: 'loop4' (ffff8880a4b172a0): fill_kobj_path: path = '/devices/virtual/block/loop4' device team0 entered promiscuous mode kobject: 'loop5' (ffff8880a4b4c1e0): kobject_uevent_env device team_slave_0 entered promiscuous mode device team_slave_1 entered promiscuous mode kobject: 'loop5' (ffff8880a4b4c1e0): fill_kobj_path: path = '/devices/virtual/block/loop5' device syz_tun entered promiscuous mode device syz_tun left promiscuous mode device team0 left promiscuous mode device team_slave_0 left promiscuous mode device team_slave_1 left promiscuous mode kobject: 'loop3' (ffff8880a4a9a9a0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a9a9a0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop0' (ffff88809b4d8de0): kobject_uevent_env kobject: 'loop0' (ffff88809b4d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop2' (ffff8880a4a600a0): kobject_uevent_env kobject: 'loop2' (ffff8880a4a600a0): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop3' (ffff8880a4a9a9a0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a9a9a0): fill_kobj_path: path = '/devices/virtual/block/loop3' device team0 entered promiscuous mode device team_slave_0 entered promiscuous mode device team_slave_1 entered promiscuous mode kobject: 'loop2' (ffff8880a4a600a0): kobject_uevent_env device syz_tun entered promiscuous mode kobject: 'loop2' (ffff8880a4a600a0): fill_kobj_path: path = '/devices/virtual/block/loop2' device syz_tun left promiscuous mode device team0 left promiscuous mode device team_slave_0 left promiscuous mode device team_slave_1 left promiscuous mode kobject: 'loop0' (ffff88809b4d8de0): kobject_uevent_env kobject: 'loop0' (ffff88809b4d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop4' (ffff8880a4b172a0): kobject_uevent_env kobject: 'loop4' (ffff8880a4b172a0): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop3' (ffff8880a4a9a9a0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a9a9a0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop2' (ffff8880a4a600a0): kobject_uevent_env kobject: 'loop2' (ffff8880a4a600a0): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop5' (ffff8880a4b4c1e0): kobject_uevent_env TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. kobject: 'loop5' (ffff8880a4b4c1e0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop4' (ffff8880a4b172a0): kobject_uevent_env kobject: 'loop4' (ffff8880a4b172a0): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop0' (ffff88809b4d8de0): kobject_uevent_env kobject: 'loop0' (ffff88809b4d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' device team0 entered promiscuous mode device team_slave_0 entered promiscuous mode device team_slave_1 entered promiscuous mode device syz_tun entered promiscuous mode kobject: 'loop0' (ffff88809b4d8de0): kobject_uevent_env device syz_tun left promiscuous mode kobject: 'loop0' (ffff88809b4d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' device team0 left promiscuous mode device team_slave_0 left promiscuous mode device team_slave_1 left promiscuous mode kobject: 'loop3' (ffff8880a4a9a9a0): kobject_uevent_env TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. kobject: 'loop3' (ffff8880a4a9a9a0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop2' (ffff8880a4a600a0): kobject_uevent_env kobject: 'loop2' (ffff8880a4a600a0): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop4' (ffff8880a4b172a0): kobject_uevent_env kobject: 'loop4' (ffff8880a4b172a0): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop2' (ffff8880a4a600a0): kobject_uevent_env kobject: 'loop2' (ffff8880a4a600a0): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop4' (ffff8880a4b172a0): kobject_uevent_env kobject: 'loop4' (ffff8880a4b172a0): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop5' (ffff8880a4b4c1e0): kobject_uevent_env kobject: 'loop5' (ffff8880a4b4c1e0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop0' (ffff88809b4d8de0): kobject_uevent_env kobject: 'loop0' (ffff88809b4d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' device team0 entered promiscuous mode device team_slave_0 entered promiscuous mode kobject: 'loop4' (ffff8880a4b172a0): kobject_uevent_env kobject: 'loop4' (ffff8880a4b172a0): fill_kobj_path: path = '/devices/virtual/block/loop4' TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. device team_slave_1 entered promiscuous mode kobject: 'loop0' (ffff88809b4d8de0): kobject_uevent_env kobject: 'loop0' (ffff88809b4d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop2' (ffff8880a4a600a0): kobject_uevent_env device team0 left promiscuous mode kobject: 'loop2' (ffff8880a4a600a0): fill_kobj_path: path = '/devices/virtual/block/loop2' device team_slave_0 left promiscuous mode device team_slave_1 left promiscuous mode kobject: 'loop3' (ffff8880a4a9a9a0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a9a9a0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop2' (ffff8880a4a600a0): kobject_uevent_env kobject: 'loop2' (ffff8880a4a600a0): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop4' (ffff8880a4b172a0): kobject_uevent_env kobject: 'loop4' (ffff8880a4b172a0): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop3' (ffff8880a4a9a9a0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a9a9a0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop5' (ffff8880a4b4c1e0): kobject_uevent_env kobject: 'loop5' (ffff8880a4b4c1e0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop0' (ffff88809b4d8de0): kobject_uevent_env kobject: 'loop0' (ffff88809b4d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' device team0 entered promiscuous mode TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. device team_slave_0 entered promiscuous mode kobject: 'loop4' (ffff8880a4b172a0): kobject_uevent_env kobject: 'loop4' (ffff8880a4b172a0): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop3' (ffff8880a4a9a9a0): kobject_uevent_env device team_slave_1 entered promiscuous mode kobject: 'loop3' (ffff8880a4a9a9a0): fill_kobj_path: path = '/devices/virtual/block/loop3' device team0 left promiscuous mode device team_slave_0 left promiscuous mode kobject: 'loop0' (ffff88809b4d8de0): kobject_uevent_env device team_slave_1 left promiscuous mode kobject: 'loop0' (ffff88809b4d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. kobject: 'loop2' (ffff8880a4a600a0): kobject_uevent_env kobject: 'loop2' (ffff8880a4a600a0): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop0' (ffff88809b4d8de0): kobject_uevent_env device team0 entered promiscuous mode kobject: 'loop0' (ffff88809b4d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' device team_slave_0 entered promiscuous mode device team_slave_1 entered promiscuous mode kobject: 'loop4' (ffff8880a4b172a0): kobject_uevent_env kobject: 'loop4' (ffff8880a4b172a0): fill_kobj_path: path = '/devices/virtual/block/loop4' device team0 left promiscuous mode device team_slave_0 left promiscuous mode kobject: 'loop2' (ffff8880a4a600a0): kobject_uevent_env device team_slave_1 left promiscuous mode kobject: 'loop2' (ffff8880a4a600a0): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop5' (ffff8880a4b4c1e0): kobject_uevent_env kobject: 'loop5' (ffff8880a4b4c1e0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop4' (ffff8880a4b172a0): kobject_uevent_env kobject: 'loop4' (ffff8880a4b172a0): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop3' (ffff8880a4a9a9a0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a9a9a0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop4' (ffff8880a4b172a0): kobject_uevent_env kobject: 'loop4' (ffff8880a4b172a0): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop2' (ffff8880a4a600a0): kobject_uevent_env kobject: 'loop2' (ffff8880a4a600a0): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop3' (ffff8880a4a9a9a0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a9a9a0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop0' (ffff88809b4d8de0): kobject_uevent_env kobject: 'loop0' (ffff88809b4d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop3' (ffff8880a4a9a9a0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a9a9a0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop4' (ffff8880a4b172a0): kobject_uevent_env kobject: 'loop4' (ffff8880a4b172a0): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop5' (ffff8880a4b4c1e0): kobject_uevent_env kobject: 'loop5' (ffff8880a4b4c1e0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop0' (ffff88809b4d8de0): kobject_uevent_env kobject: 'loop0' (ffff88809b4d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop3' (ffff8880a4a9a9a0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a9a9a0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop4' (ffff8880a4b172a0): kobject_uevent_env kobject: 'loop4' (ffff8880a4b172a0): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop5' (ffff8880a4b4c1e0): kobject_uevent_env kobject: 'loop5' (ffff8880a4b4c1e0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop3' (ffff8880a4a9a9a0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a9a9a0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop4' (ffff8880a4b172a0): kobject_uevent_env kobject: 'loop4' (ffff8880a4b172a0): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop0' (ffff88809b4d8de0): kobject_uevent_env kobject: 'loop0' (ffff88809b4d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop3' (ffff8880a4a9a9a0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a9a9a0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop5' (ffff8880a4b4c1e0): kobject_uevent_env kobject: 'loop5' (ffff8880a4b4c1e0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop4' (ffff8880a4b172a0): kobject_uevent_env kobject: 'loop4' (ffff8880a4b172a0): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop2' (ffff8880a4a600a0): kobject_uevent_env kobject: 'loop2' (ffff8880a4a600a0): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop5' (ffff8880a4b4c1e0): kobject_uevent_env kobject: 'loop5' (ffff8880a4b4c1e0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop4' (ffff8880a4b172a0): kobject_uevent_env kobject: 'loop4' (ffff8880a4b172a0): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop2' (ffff8880a4a600a0): kobject_uevent_env kobject: 'loop2' (ffff8880a4a600a0): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop3' (ffff8880a4a9a9a0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a9a9a0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop5' (ffff8880a4b4c1e0): kobject_uevent_env kobject: 'loop5' (ffff8880a4b4c1e0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop4' (ffff8880a4b172a0): kobject_uevent_env kobject: 'loop4' (ffff8880a4b172a0): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop2' (ffff8880a4a600a0): kobject_uevent_env kobject: 'loop2' (ffff8880a4a600a0): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop5' (ffff8880a4b4c1e0): kobject_uevent_env kobject: 'loop5' (ffff8880a4b4c1e0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop3' (ffff8880a4a9a9a0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a9a9a0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop4' (ffff8880a4b172a0): kobject_uevent_env kobject: 'loop4' (ffff8880a4b172a0): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop2' (ffff8880a4a600a0): kobject_uevent_env kobject: 'loop2' (ffff8880a4a600a0): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop5' (ffff8880a4b4c1e0): kobject_uevent_env kobject: 'loop5' (ffff8880a4b4c1e0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop3' (ffff8880a4a9a9a0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a9a9a0): fill_kobj_path: path = '/devices/virtual/block/loop3' TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. kobject: 'loop4' (ffff8880a4b172a0): kobject_uevent_env kobject: 'loop4' (ffff8880a4b172a0): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop2' (ffff8880a4a600a0): kobject_uevent_env kobject: 'loop2' (ffff8880a4a600a0): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop5' (ffff8880a4b4c1e0): kobject_uevent_env kobject: 'loop5' (ffff8880a4b4c1e0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop2' (ffff8880a4a600a0): kobject_uevent_env kobject: 'loop2' (ffff8880a4a600a0): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop4' (ffff8880a4b172a0): kobject_uevent_env kobject: 'loop4' (ffff8880a4b172a0): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop3' (ffff8880a4a9a9a0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a9a9a0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop5' (ffff8880a4b4c1e0): kobject_uevent_env kobject: 'loop5' (ffff8880a4b4c1e0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop2' (ffff8880a4a600a0): kobject_uevent_env kobject: 'loop2' (ffff8880a4a600a0): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop4' (ffff8880a4b172a0): kobject_uevent_env kobject: 'loop4' (ffff8880a4b172a0): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop0' (ffff88809b4d8de0): kobject_uevent_env kobject: 'loop0' (ffff88809b4d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop3' (ffff8880a4a9a9a0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a9a9a0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop2' (ffff8880a4a600a0): kobject_uevent_env kobject: 'loop2' (ffff8880a4a600a0): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop5' (ffff8880a4b4c1e0): kobject_uevent_env kobject: 'loop5' (ffff8880a4b4c1e0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop0' (ffff88809b4d8de0): kobject_uevent_env kobject: 'loop0' (ffff88809b4d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop3' (ffff8880a4a9a9a0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a9a9a0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop2' (ffff8880a4a600a0): kobject_uevent_env kobject: 'loop2' (ffff8880a4a600a0): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop5' (ffff8880a4b4c1e0): kobject_uevent_env kobject: 'loop5' (ffff8880a4b4c1e0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop0' (ffff88809b4d8de0): kobject_uevent_env kobject: 'loop0' (ffff88809b4d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop3' (ffff8880a4a9a9a0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a9a9a0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop2' (ffff8880a4a600a0): kobject_uevent_env kobject: 'loop2' (ffff8880a4a600a0): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop5' (ffff8880a4b4c1e0): kobject_uevent_env kobject: 'loop5' (ffff8880a4b4c1e0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop3' (ffff8880a4a9a9a0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a9a9a0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop0' (ffff88809b4d8de0): kobject_uevent_env kobject: 'loop0' (ffff88809b4d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop2' (ffff8880a4a600a0): kobject_uevent_env kobject: 'loop2' (ffff8880a4a600a0): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop0' (ffff88809b4d8de0): kobject_uevent_env kobject: 'loop0' (ffff88809b4d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop5' (ffff8880a4b4c1e0): kobject_uevent_env kobject: 'loop5' (ffff8880a4b4c1e0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop3' (ffff8880a4a9a9a0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a9a9a0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop2' (ffff8880a4a600a0): kobject_uevent_env kobject: 'loop2' (ffff8880a4a600a0): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop0' (ffff88809b4d8de0): kobject_uevent_env kobject: 'loop0' (ffff88809b4d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop5' (ffff8880a4b4c1e0): kobject_uevent_env kobject: 'loop5' (ffff8880a4b4c1e0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop3' (ffff8880a4a9a9a0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a9a9a0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop0' (ffff88809b4d8de0): kobject_uevent_env kobject: 'loop0' (ffff88809b4d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop2' (ffff8880a4a600a0): kobject_uevent_env kobject: 'loop2' (ffff8880a4a600a0): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop5' (ffff8880a4b4c1e0): kobject_uevent_env kobject: 'loop5' (ffff8880a4b4c1e0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop3' (ffff8880a4a9a9a0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a9a9a0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop0' (ffff88809b4d8de0): kobject_uevent_env kobject: 'loop0' (ffff88809b4d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop5' (ffff8880a4b4c1e0): kobject_uevent_env kobject: 'loop5' (ffff8880a4b4c1e0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop2' (ffff8880a4a600a0): kobject_uevent_env kobject: 'loop2' (ffff8880a4a600a0): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop3' (ffff8880a4a9a9a0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a9a9a0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop0' (ffff88809b4d8de0): kobject_uevent_env kobject: 'loop0' (ffff88809b4d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop2' (ffff8880a4a600a0): kobject_uevent_env kobject: 'loop2' (ffff8880a4a600a0): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop3' (ffff8880a4a9a9a0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a9a9a0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop5' (ffff8880a4b4c1e0): kobject_uevent_env kobject: 'loop5' (ffff8880a4b4c1e0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop0' (ffff88809b4d8de0): kobject_uevent_env kobject: 'loop0' (ffff88809b4d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop4' (ffff8880a4b172a0): kobject_uevent_env kobject: 'loop4' (ffff8880a4b172a0): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop3' (ffff8880a4a9a9a0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a9a9a0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop5' (ffff8880a4b4c1e0): kobject_uevent_env kobject: 'loop5' (ffff8880a4b4c1e0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop0' (ffff88809b4d8de0): kobject_uevent_env kobject: 'loop0' (ffff88809b4d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop4' (ffff8880a4b172a0): kobject_uevent_env device team0 entered promiscuous mode kobject: 'loop4' (ffff8880a4b172a0): fill_kobj_path: path = '/devices/virtual/block/loop4' device team_slave_0 entered promiscuous mode kobject: 'loop3' (ffff8880a4a9a9a0): kobject_uevent_env device team_slave_1 entered promiscuous mode kobject: 'loop3' (ffff8880a4a9a9a0): fill_kobj_path: path = '/devices/virtual/block/loop3' FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 1 kobject: 'loop4' (ffff8880a4b172a0): kobject_uevent_env CPU: 0 PID: 9938 Comm: syz-executor.0 Not tainted 4.14.137 #33 kobject: 'loop4' (ffff8880a4b172a0): fill_kobj_path: path = '/devices/virtual/block/loop4' Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x138/0x19c lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10f/0x159 lib/fault-inject.c:149 should_failslab+0xdb/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc_trace+0x2e9/0x790 mm/slab.c:3616 kmalloc include/linux/slab.h:488 [inline] packet_mc_add net/packet/af_packet.c:3572 [inline] packet_setsockopt+0x158d/0x2830 net/packet/af_packet.c:3681 kobject: 'loop5' (ffff8880a4b4c1e0): kobject_uevent_env SYSC_setsockopt net/socket.c:1865 [inline] SyS_setsockopt+0x13c/0x210 net/socket.c:1844 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 kobject: 'loop5' (ffff8880a4b4c1e0): fill_kobj_path: path = '/devices/virtual/block/loop5' entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x459829 RSP: 002b:00007f835b941c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 RAX: ffffffffffffffda RBX: 00007f835b941c90 RCX: 0000000000459829 RDX: 0000000000000001 RSI: 0000000000000107 RDI: 0000000000000003 RBP: 000000000075bf20 R08: 0000000000000010 R09: 0000000000000000 R10: 00000000200000c0 R11: 0000000000000246 R12: 00007f835b9426d4 R13: 00000000004c818e R14: 00000000004dea50 R15: 0000000000000004 kobject: 'loop0' (ffff88809b4d8de0): kobject_uevent_env device team0 left promiscuous mode kobject: 'loop0' (ffff88809b4d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' device team_slave_0 left promiscuous mode kobject: 'loop3' (ffff8880a4a9a9a0): kobject_uevent_env device team_slave_1 left promiscuous mode kobject: 'loop3' (ffff8880a4a9a9a0): fill_kobj_path: path = '/devices/virtual/block/loop3' TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. kobject: 'loop4' (ffff8880a4b172a0): kobject_uevent_env device team0 entered promiscuous mode kobject: 'loop4' (ffff8880a4b172a0): fill_kobj_path: path = '/devices/virtual/block/loop4' device team_slave_0 entered promiscuous mode kobject: 'loop0' (ffff88809b4d8de0): kobject_uevent_env FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 kobject: 'loop0' (ffff88809b4d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' CPU: 0 PID: 9944 Comm: syz-executor.0 Not tainted 4.14.137 #33 kobject: 'loop3' (ffff8880a4a9a9a0): kobject_uevent_env Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x138/0x19c lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10f/0x159 lib/fault-inject.c:149 should_failslab+0xdb/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc_node mm/slab.c:3297 [inline] kmem_cache_alloc_node+0x56/0x780 mm/slab.c:3640 kobject: 'loop3' (ffff8880a4a9a9a0): fill_kobj_path: path = '/devices/virtual/block/loop3' __alloc_skb+0x9c/0x500 net/core/skbuff.c:193 kobject: 'loop4' (ffff8880a4b172a0): kobject_uevent_env alloc_skb include/linux/skbuff.h:980 [inline] nlmsg_new include/net/netlink.h:511 [inline] rtmsg_ifinfo_build_skb+0x72/0x140 net/core/rtnetlink.c:2878 rtmsg_ifinfo_event.part.0+0x35/0xc0 net/core/rtnetlink.c:2912 rtmsg_ifinfo_event net/core/rtnetlink.c:2921 [inline] rtmsg_ifinfo+0x6f/0x90 net/core/rtnetlink.c:2920 __dev_notify_flags+0x1c9/0x240 net/core/dev.c:6830 kobject: 'loop4' (ffff8880a4b172a0): fill_kobj_path: path = '/devices/virtual/block/loop4' __dev_set_promiscuity+0x155/0x190 net/core/dev.c:6607 dev_set_promiscuity+0x53/0xc0 net/core/dev.c:6627 team_change_rx_flags+0x133/0x2d0 drivers/net/team/team.c:1758 dev_change_rx_flags net/core/dev.c:6560 [inline] __dev_set_promiscuity.cold+0x2ce/0x360 net/core/dev.c:6604 kobject: 'loop5' (ffff8880a4b4c1e0): kobject_uevent_env dev_set_promiscuity+0x53/0xc0 net/core/dev.c:6627 packet_dev_mc+0x67/0x250 net/packet/af_packet.c:3521 packet_mc_add net/packet/af_packet.c:3597 [inline] packet_setsockopt+0x18af/0x2830 net/packet/af_packet.c:3681 kobject: 'loop5' (ffff8880a4b4c1e0): fill_kobj_path: path = '/devices/virtual/block/loop5' SYSC_setsockopt net/socket.c:1865 [inline] SyS_setsockopt+0x13c/0x210 net/socket.c:1844 kobject: 'loop0' (ffff88809b4d8de0): kobject_uevent_env do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x459829 kobject: 'loop0' (ffff88809b4d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' RSP: 002b:00007f835b941c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 RAX: ffffffffffffffda RBX: 00007f835b941c90 RCX: 0000000000459829 RDX: 0000000000000001 RSI: 0000000000000107 RDI: 0000000000000003 RBP: 000000000075bf20 R08: 0000000000000010 R09: 0000000000000000 R10: 00000000200000c0 R11: 0000000000000246 R12: 00007f835b9426d4 R13: 00000000004c818e R14: 00000000004dea50 R15: 0000000000000004 protocol 88fb is buggy, dev hsr_slave_0 kobject: 'loop3' (ffff8880a4a9a9a0): kobject_uevent_env protocol 88fb is buggy, dev hsr_slave_1 kobject: 'loop3' (ffff8880a4a9a9a0): fill_kobj_path: path = '/devices/virtual/block/loop3' device team_slave_1 entered promiscuous mode kobject: 'loop4' (ffff8880a4b172a0): kobject_uevent_env device team0 left promiscuous mode kobject: 'loop4' (ffff8880a4b172a0): fill_kobj_path: path = '/devices/virtual/block/loop4' device team_slave_0 left promiscuous mode kobject: 'loop0' (ffff88809b4d8de0): kobject_uevent_env device team_slave_1 left promiscuous mode kobject: 'loop0' (ffff88809b4d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 kobject: 'loop5' (ffff8880a4b4c1e0): kobject_uevent_env CPU: 0 PID: 9954 Comm: syz-executor.3 Not tainted 4.14.137 #33 kobject: 'loop5' (ffff8880a4b4c1e0): fill_kobj_path: path = '/devices/virtual/block/loop5' Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x138/0x19c lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10f/0x159 lib/fault-inject.c:149 kobject: 'loop3' (ffff8880a4a9a9a0): kobject_uevent_env should_failslab+0xdb/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] __do_kmalloc mm/slab.c:3718 [inline] __kmalloc+0x2f0/0x7a0 mm/slab.c:3729 kmalloc include/linux/slab.h:493 [inline] sctp_getsockopt_local_addrs net/sctp/socket.c:5535 [inline] sctp_getsockopt net/sctp/socket.c:6906 [inline] sctp_getsockopt+0x159b/0x4d6b net/sctp/socket.c:6841 sock_common_getsockopt+0x94/0xd0 net/core/sock.c:2922 kobject: 'loop3' (ffff8880a4a9a9a0): fill_kobj_path: path = '/devices/virtual/block/loop3' SYSC_getsockopt net/socket.c:1896 [inline] SyS_getsockopt+0x126/0x1e0 net/socket.c:1878 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 kobject: 'loop0' (ffff88809b4d8de0): kobject_uevent_env entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x459829 RSP: 002b:00007fdfcb4e3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 RAX: ffffffffffffffda RBX: 00007fdfcb4e3c90 RCX: 0000000000459829 RDX: 000000000000006d RSI: 0000000000000084 RDI: 0000000000000003 RBP: 000000000075bf20 R08: 00000000200010c0 R09: 0000000000000000 R10: 0000000020000080 R11: 0000000000000246 R12: 00007fdfcb4e46d4 R13: 00000000004c07af R14: 00000000004d2ca8 R15: 0000000000000004 TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. kobject: 'loop0' (ffff88809b4d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. kobject: 'loop4' (ffff8880a4b172a0): kobject_uevent_env kobject: 'loop4' (ffff8880a4b172a0): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop3' (ffff8880a4a9a9a0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a9a9a0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop5' (ffff8880a4b4c1e0): kobject_uevent_env kobject: 'loop5' (ffff8880a4b4c1e0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop0' (ffff88809b4d8de0): kobject_uevent_env kobject: 'loop0' (ffff88809b4d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop3' (ffff8880a4a9a9a0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a9a9a0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop4' (ffff8880a4b172a0): kobject_uevent_env FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 kobject: 'loop4' (ffff8880a4b172a0): fill_kobj_path: path = '/devices/virtual/block/loop4' protocol 88fb is buggy, dev hsr_slave_0 protocol 88fb is buggy, dev hsr_slave_1 device team0 entered promiscuous mode kobject: 'loop5' (ffff8880a4b4c1e0): kobject_uevent_env device team_slave_0 entered promiscuous mode kobject: 'loop5' (ffff8880a4b4c1e0): fill_kobj_path: path = '/devices/virtual/block/loop5' FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 kobject: 'loop3' (ffff8880a4a9a9a0): kobject_uevent_env CPU: 0 PID: 9964 Comm: syz-executor.4 Not tainted 4.14.137 #33 kobject: 'loop3' (ffff8880a4a9a9a0): fill_kobj_path: path = '/devices/virtual/block/loop3' Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x138/0x19c lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10f/0x159 lib/fault-inject.c:149 should_failslab+0xdb/0x130 mm/failslab.c:32 kobject: 'loop4' (ffff8880a4b172a0): kobject_uevent_env slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] __do_kmalloc mm/slab.c:3718 [inline] __kmalloc+0x2f0/0x7a0 mm/slab.c:3729 kmalloc include/linux/slab.h:493 [inline] nfc_llcp_send_ui_frame+0xb7/0x3f0 net/nfc/llcp_commands.c:754 kobject: 'loop4' (ffff8880a4b172a0): fill_kobj_path: path = '/devices/virtual/block/loop4' llcp_sock_sendmsg+0x22b/0x2f0 net/nfc/llcp_sock.c:790 kobject: 'loop0' (ffff88809b4d8de0): kobject_uevent_env sock_sendmsg_nosec net/socket.c:646 [inline] sock_sendmsg+0xce/0x110 net/socket.c:656 ___sys_sendmsg+0x70a/0x840 net/socket.c:2062 kobject: 'loop0' (ffff88809b4d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' __sys_sendmsg+0xb9/0x140 net/socket.c:2096 kobject: 'loop5' (ffff8880a4b4c1e0): kobject_uevent_env SYSC_sendmsg net/socket.c:2107 [inline] SyS_sendmsg+0x2d/0x50 net/socket.c:2103 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 kobject: 'loop5' (ffff8880a4b4c1e0): fill_kobj_path: path = '/devices/virtual/block/loop5' RIP: 0033:0x459829 RSP: 002b:00007f73fce60c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 00007f73fce60c90 RCX: 0000000000459829 RDX: 0000000000000000 RSI: 0000000020001380 RDI: 0000000000000004 RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f73fce616d4 R13: 00000000004c76f8 R14: 00000000004dce48 R15: 0000000000000003 CPU: 0 PID: 9967 Comm: syz-executor.0 Not tainted 4.14.137 #33 kobject: 'loop3' (ffff8880a4a9a9a0): kobject_uevent_env Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x138/0x19c lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10f/0x159 lib/fault-inject.c:149 should_failslab+0xdb/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc_node mm/slab.c:3297 [inline] kmem_cache_alloc_node_trace+0x5a/0x770 mm/slab.c:3659 kobject: 'loop3' (ffff8880a4a9a9a0): fill_kobj_path: path = '/devices/virtual/block/loop3' __do_kmalloc_node mm/slab.c:3681 [inline] __kmalloc_node_track_caller+0x3d/0x80 mm/slab.c:3696 __kmalloc_reserve.isra.0+0x40/0xe0 net/core/skbuff.c:137 __alloc_skb+0xcf/0x500 net/core/skbuff.c:205 kobject: 'loop0' (ffff88809b4d8de0): kobject_uevent_env alloc_skb include/linux/skbuff.h:980 [inline] nlmsg_new include/net/netlink.h:511 [inline] rtmsg_ifinfo_build_skb+0x72/0x140 net/core/rtnetlink.c:2878 rtmsg_ifinfo_event.part.0+0x35/0xc0 net/core/rtnetlink.c:2912 rtmsg_ifinfo_event net/core/rtnetlink.c:2921 [inline] rtmsg_ifinfo+0x6f/0x90 net/core/rtnetlink.c:2920 __dev_notify_flags+0x1c9/0x240 net/core/dev.c:6830 kobject: 'loop0' (ffff88809b4d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' __dev_set_promiscuity+0x155/0x190 net/core/dev.c:6607 dev_set_promiscuity+0x53/0xc0 net/core/dev.c:6627 team_change_rx_flags+0x133/0x2d0 drivers/net/team/team.c:1758 dev_change_rx_flags net/core/dev.c:6560 [inline] __dev_set_promiscuity.cold+0x2ce/0x360 net/core/dev.c:6604 dev_set_promiscuity+0x53/0xc0 net/core/dev.c:6627 kobject: 'loop4' (ffff8880a4b172a0): kobject_uevent_env packet_dev_mc+0x67/0x250 net/packet/af_packet.c:3521 packet_mc_add net/packet/af_packet.c:3597 [inline] packet_setsockopt+0x18af/0x2830 net/packet/af_packet.c:3681 SYSC_setsockopt net/socket.c:1865 [inline] SyS_setsockopt+0x13c/0x210 net/socket.c:1844 kobject: 'loop4' (ffff8880a4b172a0): fill_kobj_path: path = '/devices/virtual/block/loop4' do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 kobject: 'loop5' (ffff8880a4b4c1e0): kobject_uevent_env RIP: 0033:0x459829 RSP: 002b:00007f835b941c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 RAX: ffffffffffffffda RBX: 00007f835b941c90 RCX: 0000000000459829 RDX: 0000000000000001 RSI: 0000000000000107 RDI: 0000000000000003 RBP: 000000000075bf20 R08: 0000000000000010 R09: 0000000000000000 R10: 00000000200000c0 R11: 0000000000000246 R12: 00007f835b9426d4 R13: 00000000004c818e R14: 00000000004dea50 R15: 0000000000000004 TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. kobject: 'loop5' (ffff8880a4b4c1e0): fill_kobj_path: path = '/devices/virtual/block/loop5' device team_slave_1 entered promiscuous mode kobject: 'loop3' (ffff8880a4a9a9a0): kobject_uevent_env device team0 left promiscuous mode kobject: 'loop3' (ffff8880a4a9a9a0): fill_kobj_path: path = '/devices/virtual/block/loop3' device team_slave_0 left promiscuous mode kobject: 'loop2' (ffff8880a4a600a0): kobject_uevent_env device team_slave_1 left promiscuous mode kobject: 'loop2' (ffff8880a4a600a0): fill_kobj_path: path = '/devices/virtual/block/loop2' TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. kobject: 'loop0' (ffff88809b4d8de0): kobject_uevent_env FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 kobject: 'loop0' (ffff88809b4d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' CPU: 0 PID: 9987 Comm: syz-executor.4 Not tainted 4.14.137 #33 kobject: 'loop4' (ffff8880a4b172a0): kobject_uevent_env Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x138/0x19c lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10f/0x159 lib/fault-inject.c:149 kobject: 'loop4' (ffff8880a4b172a0): fill_kobj_path: path = '/devices/virtual/block/loop4' should_failslab+0xdb/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc_node mm/slab.c:3297 [inline] kmem_cache_alloc_node+0x287/0x780 mm/slab.c:3640 __alloc_skb+0x9c/0x500 net/core/skbuff.c:193 kobject: 'loop2' (ffff8880a4a600a0): kobject_uevent_env alloc_skb include/linux/skbuff.h:980 [inline] alloc_skb_with_frags+0x86/0x4b0 net/core/skbuff.c:5209 sock_alloc_send_pskb+0x5db/0x740 net/core/sock.c:2073 kobject: 'loop2' (ffff8880a4a600a0): fill_kobj_path: path = '/devices/virtual/block/loop2' sock_alloc_send_skb+0x32/0x40 net/core/sock.c:2090 nfc_alloc_send_skb+0xa9/0x1b0 net/nfc/core.c:731 kobject: 'loop0' (ffff88809b4d8de0): kobject_uevent_env nfc_llcp_send_ui_frame+0x234/0x3f0 net/nfc/llcp_commands.c:775 llcp_sock_sendmsg+0x22b/0x2f0 net/nfc/llcp_sock.c:790 sock_sendmsg_nosec net/socket.c:646 [inline] sock_sendmsg+0xce/0x110 net/socket.c:656 ___sys_sendmsg+0x70a/0x840 net/socket.c:2062 kobject: 'loop0' (ffff88809b4d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop2' (ffff8880a4a600a0): kobject_uevent_env __sys_sendmsg+0xb9/0x140 net/socket.c:2096 kobject: 'loop2' (ffff8880a4a600a0): fill_kobj_path: path = '/devices/virtual/block/loop2' SYSC_sendmsg net/socket.c:2107 [inline] SyS_sendmsg+0x2d/0x50 net/socket.c:2103 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 kobject: 'loop4' (ffff8880a4b172a0): kobject_uevent_env entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x459829 RSP: 002b:00007f73fce60c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 00007f73fce60c90 RCX: 0000000000459829 RDX: 0000000000000000 RSI: 0000000020001380 RDI: 0000000000000004 RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f73fce616d4 R13: 00000000004c76f8 R14: 00000000004dce48 R15: 0000000000000003 llcp: nfc_llcp_send_ui_frame: Could not allocate PDU (error=-105) kobject: 'loop4' (ffff8880a4b172a0): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop3' (ffff8880a4a9a9a0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a9a9a0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop2' (ffff8880a4a600a0): kobject_uevent_env kobject: 'loop2' (ffff8880a4a600a0): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop4' (ffff8880a4b172a0): kobject_uevent_env kobject: 'loop4' (ffff8880a4b172a0): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop2' (ffff8880a4a600a0): kobject_uevent_env kobject: 'loop2' (ffff8880a4a600a0): fill_kobj_path: path = '/devices/virtual/block/loop2' device team0 entered promiscuous mode kobject: 'loop3' (ffff8880a4a9a9a0): kobject_uevent_env FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 device team_slave_0 entered promiscuous mode kobject: 'loop3' (ffff8880a4a9a9a0): fill_kobj_path: path = '/devices/virtual/block/loop3' TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. kobject: 'loop4' (ffff8880a4b172a0): kobject_uevent_env FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 9993 Comm: syz-executor.0 Not tainted 4.14.137 #33 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x138/0x19c lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10f/0x159 lib/fault-inject.c:149 should_failslab+0xdb/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc_node mm/slab.c:3297 [inline] kmem_cache_alloc_node_trace+0x5a/0x770 mm/slab.c:3659 __do_kmalloc_node mm/slab.c:3681 [inline] __kmalloc_node_track_caller+0x3d/0x80 mm/slab.c:3696 __kmalloc_reserve.isra.0+0x40/0xe0 net/core/skbuff.c:137 pskb_expand_head+0x116/0xc10 net/core/skbuff.c:1462 netlink_trim+0x1c1/0x230 net/netlink/af_netlink.c:1268 netlink_broadcast_filtered+0x5c/0x9f0 net/netlink/af_netlink.c:1465 netlink_broadcast net/netlink/af_netlink.c:1510 [inline] nlmsg_multicast include/net/netlink.h:591 [inline] nlmsg_notify+0x7c/0x190 net/netlink/af_netlink.c:2475 rtnl_notify net/core/rtnetlink.c:653 [inline] rtmsg_ifinfo_send net/core/rtnetlink.c:2900 [inline] rtmsg_ifinfo_event.part.0+0xa1/0xc0 net/core/rtnetlink.c:2914 rtmsg_ifinfo_event net/core/rtnetlink.c:2921 [inline] rtmsg_ifinfo+0x6f/0x90 net/core/rtnetlink.c:2920 __dev_notify_flags+0x1c9/0x240 net/core/dev.c:6830 __dev_set_promiscuity+0x155/0x190 net/core/dev.c:6607 dev_set_promiscuity+0x53/0xc0 net/core/dev.c:6627 team_change_rx_flags+0x133/0x2d0 drivers/net/team/team.c:1758 dev_change_rx_flags net/core/dev.c:6560 [inline] __dev_set_promiscuity.cold+0x2ce/0x360 net/core/dev.c:6604 dev_set_promiscuity+0x53/0xc0 net/core/dev.c:6627 packet_dev_mc+0x67/0x250 net/packet/af_packet.c:3521 packet_mc_add net/packet/af_packet.c:3597 [inline] packet_setsockopt+0x18af/0x2830 net/packet/af_packet.c:3681 SYSC_setsockopt net/socket.c:1865 [inline] SyS_setsockopt+0x13c/0x210 net/socket.c:1844 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 protocol 88fb is buggy, dev hsr_slave_0 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x459829 RSP: 002b:00007f835b941c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 protocol 88fb is buggy, dev hsr_slave_1 RAX: ffffffffffffffda RBX: 00007f835b941c90 RCX: 0000000000459829 RDX: 0000000000000001 RSI: 0000000000000107 RDI: 0000000000000003 RBP: 000000000075bf20 R08: 0000000000000010 R09: 0000000000000000 R10: 00000000200000c0 R11: 0000000000000246 R12: 00007f835b9426d4 R13: 00000000004c818e R14: 00000000004dea50 R15: 0000000000000004 kobject: 'loop4' (ffff8880a4b172a0): fill_kobj_path: path = '/devices/virtual/block/loop4' CPU: 0 PID: 9995 Comm: syz-executor.4 Not tainted 4.14.137 #33 kobject: 'loop0' (ffff88809b4d8de0): kobject_uevent_env Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x138/0x19c lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10f/0x159 lib/fault-inject.c:149 should_failslab+0xdb/0x130 mm/failslab.c:32 kobject: 'loop0' (ffff88809b4d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc_node mm/slab.c:3297 [inline] kmem_cache_alloc_node_trace+0x280/0x770 mm/slab.c:3659 __do_kmalloc_node mm/slab.c:3681 [inline] __kmalloc_node_track_caller+0x3d/0x80 mm/slab.c:3696 __kmalloc_reserve.isra.0+0x40/0xe0 net/core/skbuff.c:137 __alloc_skb+0xcf/0x500 net/core/skbuff.c:205 kobject: 'loop2' (ffff8880a4a600a0): kobject_uevent_env alloc_skb include/linux/skbuff.h:980 [inline] alloc_skb_with_frags+0x86/0x4b0 net/core/skbuff.c:5209 kobject: 'loop2' (ffff8880a4a600a0): fill_kobj_path: path = '/devices/virtual/block/loop2' sock_alloc_send_pskb+0x5db/0x740 net/core/sock.c:2073 sock_alloc_send_skb+0x32/0x40 net/core/sock.c:2090 kobject: 'loop2' (ffff8880a4a600a0): kobject_uevent_env nfc_alloc_send_skb+0xa9/0x1b0 net/nfc/core.c:731 nfc_llcp_send_ui_frame+0x234/0x3f0 net/nfc/llcp_commands.c:775 kobject: 'loop2' (ffff8880a4a600a0): fill_kobj_path: path = '/devices/virtual/block/loop2' llcp_sock_sendmsg+0x22b/0x2f0 net/nfc/llcp_sock.c:790 kobject: 'loop3' (ffff8880a4a9a9a0): kobject_uevent_env sock_sendmsg_nosec net/socket.c:646 [inline] sock_sendmsg+0xce/0x110 net/socket.c:656 ___sys_sendmsg+0x70a/0x840 net/socket.c:2062 kobject: 'loop3' (ffff8880a4a9a9a0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop2' (ffff8880a4a600a0): kobject_uevent_env __sys_sendmsg+0xb9/0x140 net/socket.c:2096 kobject: 'loop2' (ffff8880a4a600a0): fill_kobj_path: path = '/devices/virtual/block/loop2' SYSC_sendmsg net/socket.c:2107 [inline] SyS_sendmsg+0x2d/0x50 net/socket.c:2103 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 kobject: 'loop3' (ffff8880a4a9a9a0): kobject_uevent_env entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x459829 RSP: 002b:00007f73fce60c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 00007f73fce60c90 RCX: 0000000000459829 kobject: 'loop3' (ffff8880a4a9a9a0): fill_kobj_path: path = '/devices/virtual/block/loop3' RDX: 0000000000000000 RSI: 0000000020001380 RDI: 0000000000000004 RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f73fce616d4 R13: 00000000004c76f8 R14: 00000000004dce48 R15: 0000000000000003 protocol 88fb is buggy, dev hsr_slave_0 protocol 88fb is buggy, dev hsr_slave_1 llcp: nfc_llcp_send_ui_frame: Could not allocate PDU (error=-105) device team_slave_1 entered promiscuous mode TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. kobject: 'loop2' (ffff8880a4a600a0): kobject_uevent_env TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. kobject: 'loop2' (ffff8880a4a600a0): fill_kobj_path: path = '/devices/virtual/block/loop2' device team0 left promiscuous mode kobject: 'loop3' (ffff8880a4a9a9a0): kobject_uevent_env device team_slave_0 left promiscuous mode kobject: 'loop3' (ffff8880a4a9a9a0): fill_kobj_path: path = '/devices/virtual/block/loop3' device team_slave_1 left promiscuous mode kobject: 'loop2' (ffff8880a4a600a0): kobject_uevent_env kobject: 'loop2' (ffff8880a4a600a0): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop0' (ffff88809b4d8de0): kobject_uevent_env kobject: 'loop0' (ffff88809b4d8de0): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop5' (ffff8880a4b4c1e0): kobject_uevent_env kobject: 'loop5' (ffff8880a4b4c1e0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop2' (ffff8880a4a600a0): kobject_uevent_env kobject: 'loop2' (ffff8880a4a600a0): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop3' (ffff8880a4a9a9a0): kobject_uevent_env kobject: 'loop3' (ffff8880a4a9a9a0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop2' (ffff8880a4a600a0): kobject_uevent_env kobject: 'loop2' (ffff8880a4a600a0): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop4' (ffff8880a4b172a0): kobject_uevent_env kobject: 'loop4' (ffff8880a4b172a0): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop2' (ffff8880a4a600a0): kobject_uevent_env kobject: 'loop2' (ffff8880a4a600a0): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop4' (ffff8880a4b172a0): kobject_uevent_env