====================================================== WARNING: possible circular locking dependency detected kobject: 'loop1' (000000007b143b39): kobject_uevent_env 4.19.0-rc5+ #242 Not tainted ------------------------------------------------------ syz-executor3/10890 is trying to acquire lock: 00000000842670b2 ((wq_completion)bond_dev->name kobject: 'loop1' (000000007b143b39): fill_kobj_path: path = '/devices/virtual/block/loop1' ){+.+.}, at: flush_workqueue+0x2db/0x1e10 kernel/workqueue.c:2652 but task is already holding lock: 00000000f965e1e1 (rtnl_mutex){+.+.}, at: rtnl_lock net/core/rtnetlink.c:77 [inline] 00000000f965e1e1 (rtnl_mutex){+.+.}, at: rtnetlink_rcv_msg+0x40e/0xc20 net/core/rtnetlink.c:4727 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #2 (rtnl_mutex){+.+.}: __mutex_lock_common kernel/locking/mutex.c:925 [inline] __mutex_lock+0x166/0x1700 kernel/locking/mutex.c:1072 mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:1087 rtnl_lock+0x17/0x20 net/core/rtnetlink.c:77 bond_netdev_notify drivers/net/bonding/bond_main.c:1303 [inline] bond_netdev_notify_work+0x44/0xd0 drivers/net/bonding/bond_main.c:1313 process_one_work+0xc90/0x1b90 kernel/workqueue.c:2153 worker_thread+0x17f/0x1390 kernel/workqueue.c:2296 kthread+0x35a/0x420 kernel/kthread.c:246 ret_from_fork+0x3a/0x50 arch/x86/entry/entry_64.S:413 -> #1 ((work_completion)(&(&nnw->work)->work)){+.+.}: process_one_work+0xc0a/0x1b90 kernel/workqueue.c:2129 worker_thread+0x17f/0x1390 kernel/workqueue.c:2296 kthread+0x35a/0x420 kernel/kthread.c:246 ret_from_fork+0x3a/0x50 arch/x86/entry/entry_64.S:413 -> #0 ((wq_completion)bond_dev->name){+.+.}: lock_acquire+0x1ed/0x520 kernel/locking/lockdep.c:3900 flush_workqueue+0x30a/0x1e10 kernel/workqueue.c:2655 drain_workqueue+0x2a9/0x640 kernel/workqueue.c:2820 destroy_workqueue+0xc6/0x9c0 kernel/workqueue.c:4155 __alloc_workqueue_key+0xed8/0x1170 kernel/workqueue.c:4138 bond_init+0x265/0x940 drivers/net/bonding/bond_main.c:4727 register_netdevice+0x332/0x10f0 net/core/dev.c:8410 bond_newlink+0x49/0xa0 drivers/net/bonding/bond_netlink.c:453 rtnl_newlink+0xec6/0x1d40 net/core/rtnetlink.c:3118 rtnetlink_rcv_msg+0x46a/0xc20 net/core/rtnetlink.c:4730 netlink_rcv_skb+0x172/0x440 net/netlink/af_netlink.c:2447 rtnetlink_rcv+0x1c/0x20 net/core/rtnetlink.c:4748 netlink_unicast_kernel net/netlink/af_netlink.c:1310 [inline] netlink_unicast+0x5a5/0x760 net/netlink/af_netlink.c:1336 netlink_sendmsg+0xa18/0xfc0 net/netlink/af_netlink.c:1901 sock_sendmsg_nosec net/socket.c:621 [inline] sock_sendmsg+0xd5/0x120 net/socket.c:631 ___sys_sendmsg+0x7fd/0x930 net/socket.c:2116 __sys_sendmsg+0x11d/0x280 net/socket.c:2154 __do_sys_sendmsg net/socket.c:2163 [inline] __se_sys_sendmsg net/socket.c:2161 [inline] __x64_sys_sendmsg+0x78/0xb0 net/socket.c:2161 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe other info that might help us debug this: Chain exists of: (wq_completion)bond_dev->name --> (work_completion)(&(&nnw->work)->work) --> rtnl_mutex Possible unsafe locking scenario: CPU0 CPU1 ---- ---- lock(rtnl_mutex); lock((work_completion)(&(&nnw->work)->work)); lock(rtnl_mutex); lock((wq_completion)bond_dev->name); *** DEADLOCK *** 1 lock held by syz-executor3/10890: #0: 00000000f965e1e1 (rtnl_mutex){+.+.}, at: rtnl_lock net/core/rtnetlink.c:77 [inline] #0: 00000000f965e1e1 (rtnl_mutex){+.+.}, at: rtnetlink_rcv_msg+0x40e/0xc20 net/core/rtnetlink.c:4727 stack backtrace: CPU: 1 PID: 10890 Comm: syz-executor3 Not tainted 4.19.0-rc5+ #242 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1c4/0x2b4 lib/dump_stack.c:113 print_circular_bug.isra.33.cold.54+0x1bd/0x27d kernel/locking/lockdep.c:1221 check_prev_add kernel/locking/lockdep.c:1861 [inline] check_prevs_add kernel/locking/lockdep.c:1974 [inline] validate_chain kernel/locking/lockdep.c:2415 [inline] __lock_acquire+0x33e4/0x4ec0 kernel/locking/lockdep.c:3411 lock_acquire+0x1ed/0x520 kernel/locking/lockdep.c:3900 flush_workqueue+0x30a/0x1e10 kernel/workqueue.c:2655 drain_workqueue+0x2a9/0x640 kernel/workqueue.c:2820 destroy_workqueue+0xc6/0x9c0 kernel/workqueue.c:4155 __alloc_workqueue_key+0xed8/0x1170 kernel/workqueue.c:4138 bond_init+0x265/0x940 drivers/net/bonding/bond_main.c:4727 register_netdevice+0x332/0x10f0 net/core/dev.c:8410 bond_newlink+0x49/0xa0 drivers/net/bonding/bond_netlink.c:453 rtnl_newlink+0xec6/0x1d40 net/core/rtnetlink.c:3118 rtnetlink_rcv_msg+0x46a/0xc20 net/core/rtnetlink.c:4730 netlink_rcv_skb+0x172/0x440 net/netlink/af_netlink.c:2447 rtnetlink_rcv+0x1c/0x20 net/core/rtnetlink.c:4748 netlink_unicast_kernel net/netlink/af_netlink.c:1310 [inline] netlink_unicast+0x5a5/0x760 net/netlink/af_netlink.c:1336 netlink_sendmsg+0xa18/0xfc0 net/netlink/af_netlink.c:1901 sock_sendmsg_nosec net/socket.c:621 [inline] sock_sendmsg+0xd5/0x120 net/socket.c:631 ___sys_sendmsg+0x7fd/0x930 net/socket.c:2116 __sys_sendmsg+0x11d/0x280 net/socket.c:2154 __do_sys_sendmsg net/socket.c:2163 [inline] __se_sys_sendmsg net/socket.c:2161 [inline] __x64_sys_sendmsg+0x78/0xb0 net/socket.c:2161 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457579 Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f9e72434c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457579 RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000004 RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9e724356d4 R13: 00000000004c38b9 R14: 00000000004d5700 R15: 00000000ffffffff kobject: 'loop4' (00000000a054606f): kobject_uevent_env kobject: 'loop4' (00000000a054606f): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'regulatory.0' (00000000da43d61b): kobject_uevent_env kobject: 'regulatory.0' (00000000da43d61b): fill_kobj_path: path = '/devices/platform/regulatory.0' kobject: 'loop3' (00000000f4b9a587): kobject_uevent_env kobject: 'ip6_vti0' (00000000aacd2d61): kobject_cleanup, parent (null) kobject: 'loop3' (00000000f4b9a587): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'ip6_vti0' (00000000aacd2d61): auto cleanup 'remove' event kobject: 'bond_slave_1.0' (00000000ce20fc7e): kobject_add_internal: parent: 'net', set: 'devices' kobject: 'ip6_vti0' (00000000aacd2d61): kobject_uevent_env kobject: 'loop2' (0000000096901b9a): kobject_uevent_env kobject: 'ip6_vti0' (00000000aacd2d61): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'bond_slave_1.0' (00000000ce20fc7e): kobject_uevent_env kobject: 'loop2' (0000000096901b9a): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'ip6_vti0' (00000000aacd2d61): calling ktype release kobject: 'bond_slave_1.0' (00000000ce20fc7e): fill_kobj_path: path = '/devices/virtual/net/bond_slave_1.0' kobject: 'ip6_vti0': free name kobject: 'loop0' (00000000c4f37bbb): kobject_uevent_env kobject: 'loop0' (00000000c4f37bbb): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop1' (000000007b143b39): kobject_uevent_env kobject: 'loop1' (000000007b143b39): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'queues' (0000000066cb8e26): kobject_add_internal: parent: 'bond_slave_1.0', set: '' kobject: 'loop5' (0000000068bb0760): kobject_uevent_env kobject: 'loop5' (0000000068bb0760): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'queues' (0000000066cb8e26): kobject_uevent_env kobject: 'loop2' (0000000096901b9a): kobject_uevent_env kobject: 'queues' (0000000066cb8e26): kobject_uevent_env: filter function caused the event to drop! kobject: 'loop2' (0000000096901b9a): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'rx-0' (00000000cf04e40a): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'loop1' (000000007b143b39): kobject_uevent_env kobject: 'rx-0' (00000000cf04e40a): kobject_uevent_env kobject: 'loop1' (000000007b143b39): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'rx-0' (00000000cf04e40a): fill_kobj_path: path = '/devices/virtual/net/bond_slave_1.0/queues/rx-0' kobject: 'loop5' (0000000068bb0760): kobject_uevent_env kobject: 'loop5' (0000000068bb0760): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'tx-0' (000000004630c518): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'tx-0' (000000004630c518): kobject_uevent_env kobject: 'tx-0' (000000004630c518): fill_kobj_path: path = '/devices/virtual/net/bond_slave_1.0/queues/tx-0' kobject: 'loop4' (00000000a054606f): kobject_uevent_env IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready kobject: 'loop4' (00000000a054606f): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop5' (0000000068bb0760): kobject_uevent_env kobject: 'loop5' (0000000068bb0760): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop4' (00000000a054606f): kobject_uevent_env kobject: 'loop4' (00000000a054606f): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop4' (00000000a054606f): kobject_uevent_env kobject: 'loop4' (00000000a054606f): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop5' (0000000068bb0760): kobject_uevent_env kobject: 'loop5' (0000000068bb0760): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'rx-0' (00000000882e6975): kobject_cleanup, parent 00000000d165aef7 kobject: 'rx-0' (00000000882e6975): auto cleanup 'remove' event kobject: 'rx-0' (00000000882e6975): kobject_uevent_env kobject: 'rx-0' (00000000882e6975): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'rx-0' (00000000882e6975): auto cleanup kobject_del kobject: 'rx-0' (00000000882e6975): calling ktype release kobject: 'rx-0': free name kobject: 'tx-0' (00000000f676c02e): kobject_cleanup, parent 00000000d165aef7 kobject: 'tx-0' (00000000f676c02e): auto cleanup 'remove' event kobject: 'tx-0' (00000000f676c02e): kobject_uevent_env kobject: 'tx-0' (00000000f676c02e): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'tx-0' (00000000f676c02e): auto cleanup kobject_del kobject: 'tx-0' (00000000f676c02e): calling ktype release kobject: 'tx-0': free name kobject: 'queues' (00000000d165aef7): kobject_cleanup, parent (null) kobject: 'queues' (00000000d165aef7): calling ktype release kobject: 'queues' (00000000d165aef7): kset_release kobject: 'queues': free name kobject: 'ip_vti0' (000000009b1d31d9): kobject_uevent_env kobject: 'ip_vti0' (000000009b1d31d9): kobject_uevent_env: uevent_suppress caused the event to drop! IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready kobject: 'loop3' (00000000f4b9a587): kobject_uevent_env kobject: 'loop3' (00000000f4b9a587): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop4' (00000000a054606f): kobject_uevent_env kobject: 'loop4' (00000000a054606f): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'ip_vti0' (000000009b1d31d9): kobject_cleanup, parent (null) kobject: 'ip_vti0' (000000009b1d31d9): auto cleanup 'remove' event kobject: 'ip_vti0' (000000009b1d31d9): kobject_uevent_env kobject: 'loop0' (00000000c4f37bbb): kobject_uevent_env kobject: 'loop0' (00000000c4f37bbb): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop1' (000000007b143b39): kobject_uevent_env kobject: 'ip_vti0' (000000009b1d31d9): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'loop1' (000000007b143b39): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'ip_vti0' (000000009b1d31d9): calling ktype release kobject: 'loop2' (0000000096901b9a): kobject_uevent_env kobject: 'ip_vti0': free name kobject: 'rx-0' (000000000baf6ace): kobject_cleanup, parent 000000002aed810a kobject: 'loop2' (0000000096901b9a): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'rx-0' (000000000baf6ace): auto cleanup 'remove' event kobject: 'loop3' (00000000f4b9a587): kobject_uevent_env kobject: 'rx-0' (000000000baf6ace): kobject_uevent_env kobject: 'loop3' (00000000f4b9a587): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'rx-0' (000000000baf6ace): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'loop4' (00000000a054606f): kobject_uevent_env kobject: 'rx-0' (000000000baf6ace): auto cleanup kobject_del kobject: 'rx-0' (000000000baf6ace): calling ktype release kobject: 'loop4' (00000000a054606f): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'rx-0': free name kobject: 'tx-0' (000000004045d8c6): kobject_cleanup, parent 000000002aed810a kobject: 'tx-0' (000000004045d8c6): auto cleanup 'remove' event kobject: 'tx-0' (000000004045d8c6): kobject_uevent_env kobject: 'loop1' (000000007b143b39): kobject_uevent_env kobject: 'tx-0' (000000004045d8c6): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'loop1' (000000007b143b39): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'tx-0' (000000004045d8c6): auto cleanup kobject_del kobject: 'loop2' (0000000096901b9a): kobject_uevent_env kobject: 'tx-0' (000000004045d8c6): calling ktype release kobject: 'loop2' (0000000096901b9a): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'tx-0': free name kobject: 'queues' (000000002aed810a): kobject_cleanup, parent (null) kobject: 'loop3' (00000000f4b9a587): kobject_uevent_env kobject: 'loop3' (00000000f4b9a587): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop4' (00000000a054606f): kobject_uevent_env kobject: 'queues' (000000002aed810a): calling ktype release kobject: 'loop4' (00000000a054606f): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'queues' (000000002aed810a): kset_release kobject: 'loop0' (00000000c4f37bbb): kobject_uevent_env kobject: 'loop0' (00000000c4f37bbb): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'queues': free name kobject: 'erspan0' (000000006b5de6bc): kobject_uevent_env kobject: 'loop5' (0000000068bb0760): kobject_uevent_env kobject: 'erspan0' (000000006b5de6bc): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'loop5' (0000000068bb0760): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop5' (0000000068bb0760): kobject_uevent_env kobject: 'loop5' (0000000068bb0760): fill_kobj_path: path = '/devices/virtual/block/loop5' dccp_invalid_packet: invalid packet type IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready dccp_invalid_packet: invalid packet type IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready kobject: 'loop2' (0000000096901b9a): kobject_uevent_env kobject: 'loop2' (0000000096901b9a): fill_kobj_path: path = '/devices/virtual/block/loop2' dccp_invalid_packet: invalid packet type kobject: 'loop3' (00000000f4b9a587): kobject_uevent_env kobject: 'loop3' (00000000f4b9a587): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop5' (0000000068bb0760): kobject_uevent_env kobject: 'loop5' (0000000068bb0760): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop2' (0000000096901b9a): kobject_uevent_env kobject: 'loop2' (0000000096901b9a): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop3' (00000000f4b9a587): kobject_uevent_env kobject: 'loop3' (00000000f4b9a587): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop5' (0000000068bb0760): kobject_uevent_env kobject: 'loop5' (0000000068bb0760): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop2' (0000000096901b9a): kobject_uevent_env kobject: 'loop2' (0000000096901b9a): fill_kobj_path: path = '/devices/virtual/block/loop2' IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready bridge0: port 2(bridge_slave_1) entered blocking state bridge0: port 2(bridge_slave_1) entered forwarding state kobject: 'erspan0' (000000006b5de6bc): kobject_cleanup, parent (null) kobject: 'erspan0' (000000006b5de6bc): auto cleanup 'remove' event IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready kobject: 'erspan0' (000000006b5de6bc): kobject_uevent_env kobject: 'loop0' (00000000c4f37bbb): kobject_uevent_env kobject: 'erspan0' (000000006b5de6bc): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'loop0' (00000000c4f37bbb): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'erspan0' (000000006b5de6bc): calling ktype release kobject: 'erspan0': free name kobject: 'rx-0' (000000007d3b48ad): kobject_cleanup, parent 00000000d12b480d kobject: 'loop1' (000000007b143b39): kobject_uevent_env kobject: 'rx-0' (000000007d3b48ad): auto cleanup 'remove' event kobject: 'rx-0' (000000007d3b48ad): kobject_uevent_env kobject: 'loop1' (000000007b143b39): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'rx-0' (000000007d3b48ad): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'loop4' (00000000a054606f): kobject_uevent_env kobject: 'loop4' (00000000a054606f): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'rx-0' (000000007d3b48ad): auto cleanup kobject_del kobject: 'loop5' (0000000068bb0760): kobject_uevent_env kobject: 'rx-0' (000000007d3b48ad): calling ktype release kobject: 'loop5' (0000000068bb0760): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop4' (00000000a054606f): kobject_uevent_env kobject: 'rx-0': free name kobject: 'tx-0' (000000005578c7bb): kobject_cleanup, parent 00000000d12b480d kobject: 'tx-0' (000000005578c7bb): auto cleanup 'remove' event kobject: 'tx-0' (000000005578c7bb): kobject_uevent_env kobject: 'loop4' (00000000a054606f): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'tx-0' (000000005578c7bb): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'loop3' (00000000f4b9a587): kobject_uevent_env kobject: 'tx-0' (000000005578c7bb): auto cleanup kobject_del kobject: 'loop3' (00000000f4b9a587): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'tx-0' (000000005578c7bb): calling ktype release kobject: 'loop2' (0000000096901b9a): kobject_uevent_env kobject: 'tx-0': free name kobject: 'queues' (00000000d12b480d): kobject_cleanup, parent (null) kobject: 'loop2' (0000000096901b9a): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'queues' (00000000d12b480d): calling ktype release kobject: 'loop5' (0000000068bb0760): kobject_uevent_env kobject: 'queues' (00000000d12b480d): kset_release kobject: 'loop5' (0000000068bb0760): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'queues': free name kobject: 'gretap0' (000000007de95e0b): kobject_uevent_env kobject: 'loop0' (00000000c4f37bbb): kobject_uevent_env kobject: 'gretap0' (000000007de95e0b): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'loop0' (00000000c4f37bbb): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'veth2' (00000000054c369e): kobject_add_internal: parent: 'net', set: 'devices' kobject: 'loop1' (000000007b143b39): kobject_uevent_env kobject: 'loop1' (000000007b143b39): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'veth2' (00000000054c369e): kobject_uevent_env kobject: 'loop5' (0000000068bb0760): kobject_uevent_env kobject: 'veth2' (00000000054c369e): fill_kobj_path: path = '/devices/virtual/net/veth2' kobject: 'loop5' (0000000068bb0760): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'queues' (000000009a4d0caa): kobject_add_internal: parent: 'veth2', set: '' kobject: 'loop1' (000000007b143b39): kobject_uevent_env kobject: 'loop1' (000000007b143b39): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'queues' (000000009a4d0caa): kobject_uevent_env kobject: 'loop3' (00000000f4b9a587): kobject_uevent_env kobject: 'loop3' (00000000f4b9a587): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'queues' (000000009a4d0caa): kobject_uevent_env: filter function caused the event to drop! kobject: 'loop5' (0000000068bb0760): kobject_uevent_env kobject: 'rx-0' (000000003fe1babe): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'loop5' (0000000068bb0760): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'rx-0' (000000003fe1babe): kobject_uevent_env kobject: 'loop0' (00000000c4f37bbb): kobject_uevent_env kobject: 'rx-0' (000000003fe1babe): fill_kobj_path: path = '/devices/virtual/net/veth2/queues/rx-0' kobject: 'loop0' (00000000c4f37bbb): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'tx-0' (000000003c78cc42): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'loop3' (00000000f4b9a587): kobject_uevent_env kobject: 'tx-0' (000000003c78cc42): kobject_uevent_env kobject: 'loop3' (00000000f4b9a587): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'tx-0' (000000003c78cc42): fill_kobj_path: path = '/devices/virtual/net/veth2/queues/tx-0' kobject: 'loop4' (00000000a054606f): kobject_uevent_env kobject: 'veth3' (0000000017452987): kobject_add_internal: parent: 'net', set: 'devices' kobject: 'loop4' (00000000a054606f): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'veth3' (0000000017452987): kobject_uevent_env kobject: 'loop0' (00000000c4f37bbb): kobject_uevent_env kobject: 'veth3' (0000000017452987): fill_kobj_path: path = '/devices/virtual/net/veth3' kobject: 'loop0' (00000000c4f37bbb): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'queues' (00000000c9c9f823): kobject_add_internal: parent: 'veth3', set: '' kobject: 'loop3' (00000000f4b9a587): kobject_uevent_env kobject: 'queues' (00000000c9c9f823): kobject_uevent_env kobject: 'loop3' (00000000f4b9a587): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'queues' (00000000c9c9f823): kobject_uevent_env: filter function caused the event to drop! kobject: 'rx-0' (00000000604c1f2d): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'rx-0' (00000000604c1f2d): kobject_uevent_env kobject: 'rx-0' (00000000604c1f2d): fill_kobj_path: path = '/devices/virtual/net/veth3/queues/rx-0' kobject: 'tx-0' (0000000051eb1246): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'tx-0' (0000000051eb1246): kobject_uevent_env kobject: 'tx-0' (0000000051eb1246): fill_kobj_path: path = '/devices/virtual/net/veth3/queues/tx-0' kobject: 'gretap0' (000000007de95e0b): kobject_cleanup, parent (null) kobject: 'gretap0' (000000007de95e0b): auto cleanup 'remove' event kobject: 'gretap0' (000000007de95e0b): kobject_uevent_env kobject: 'regulatory.0' (00000000da43d61b): kobject_uevent_env kobject: 'regulatory.0' (00000000da43d61b): fill_kobj_path: path = '/devices/platform/regulatory.0' kobject: 'loop2' (0000000096901b9a): kobject_uevent_env FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 1 kobject: 'gretap0' (000000007de95e0b): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'veth4' (00000000cceb9e98): kobject_add_internal: parent: 'net', set: 'devices' kobject: 'loop2' (0000000096901b9a): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'gretap0' (000000007de95e0b): calling ktype release kobject: 'veth4' (00000000cceb9e98): kobject_uevent_env CPU: 0 PID: 11130 Comm: syz-executor5 Not tainted 4.19.0-rc5+ #242 kobject: 'gretap0': free name Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1c4/0x2b4 lib/dump_stack.c:113 kobject: 'veth4' (00000000cceb9e98): fill_kobj_path: path = '/devices/virtual/net/veth4' fail_dump lib/fault-inject.c:51 [inline] should_fail.cold.4+0xa/0x17 lib/fault-inject.c:149 kobject: 'queues' (000000003f2066df): kobject_add_internal: parent: 'veth4', set: '' kobject: 'queues' (000000003f2066df): kobject_uevent_env kobject: 'queues' (000000003f2066df): kobject_uevent_env: filter function caused the event to drop! __should_failslab+0x124/0x180 mm/failslab.c:32 kobject: 'rx-0' (00000000e09e062c): kobject_add_internal: parent: 'queues', set: 'queues' should_failslab+0x9/0x14 mm/slab_common.c:1557 slab_pre_alloc_hook mm/slab.h:423 [inline] slab_alloc_node mm/slab.c:3299 [inline] kmem_cache_alloc_node+0x26e/0x730 mm/slab.c:3642 __alloc_skb+0x119/0x770 net/core/skbuff.c:193 kobject: 'rx-0' (00000000e09e062c): kobject_uevent_env kobject: 'rx-0' (00000000e09e062c): fill_kobj_path: path = '/devices/virtual/net/veth4/queues/rx-0' alloc_skb include/linux/skbuff.h:997 [inline] sock_wmalloc+0x16d/0x1f0 net/core/sock.c:1934 kobject: 'tx-0' (0000000047f13360): kobject_add_internal: parent: 'queues', set: 'queues' pppoe_sendmsg+0x359/0x8f0 drivers/net/ppp/pppoe.c:870 kobject: 'tx-0' (0000000047f13360): kobject_uevent_env kobject: 'tx-0' (0000000047f13360): fill_kobj_path: path = '/devices/virtual/net/veth4/queues/tx-0' sock_sendmsg_nosec net/socket.c:621 [inline] sock_sendmsg+0xd5/0x120 net/socket.c:631 ___sys_sendmsg+0x51d/0x930 net/socket.c:2116 kobject: 'veth5' (000000005e5caa98): kobject_add_internal: parent: 'net', set: 'devices' kobject: 'veth5' (000000005e5caa98): kobject_uevent_env kobject: 'veth5' (000000005e5caa98): fill_kobj_path: path = '/devices/virtual/net/veth5' kobject: 'queues' (00000000e35cdded): kobject_add_internal: parent: 'veth5', set: '' kobject: 'queues' (00000000e35cdded): kobject_uevent_env __sys_sendmmsg+0x246/0x6d0 net/socket.c:2211 kobject: 'queues' (00000000e35cdded): kobject_uevent_env: filter function caused the event to drop! kobject: 'rx-0' (0000000051e62ba5): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'rx-0' (0000000051e62ba5): kobject_uevent_env kobject: 'rx-0' (0000000051e62ba5): fill_kobj_path: path = '/devices/virtual/net/veth5/queues/rx-0' __do_sys_sendmmsg net/socket.c:2240 [inline] __se_sys_sendmmsg net/socket.c:2237 [inline] __x64_sys_sendmmsg+0x9d/0x100 net/socket.c:2237 kobject: 'tx-0' (000000003657f5f6): kobject_add_internal: parent: 'queues', set: 'queues' do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 kobject: 'tx-0' (000000003657f5f6): kobject_uevent_env kobject: 'tx-0' (000000003657f5f6): fill_kobj_path: path = '/devices/virtual/net/veth5/queues/tx-0' entry_SYSCALL_64_after_hwframe+0x49/0xbe kobject: 'loop3' (00000000f4b9a587): kobject_uevent_env RIP: 0033:0x457579 Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007fb6365ecc78 EFLAGS: 00000246 kobject: 'loop3' (00000000f4b9a587): fill_kobj_path: path = '/devices/virtual/block/loop3' ORIG_RAX: 0000000000000133 RAX: ffffffffffffffda RBX: 00007fb6365ecc90 RCX: 0000000000457579 RDX: 040000000000014d RSI: 0000000020005b40 RDI: 0000000000000003 RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb6365ed6d4 kobject: 'loop4' (00000000a054606f): kobject_uevent_env R13: 00000000004c34ed R14: 00000000004d52b0 R15: 0000000000000004 kernel msg: ebtables bug: please report to author: Nentries wrong raw_sendmsg: syz-executor4 forgot to set AF_INET. Fix it! kobject: 'loop4' (00000000a054606f): fill_kobj_path: path = '/devices/virtual/block/loop4' kernel msg: ebtables bug: please report to author: Nentries wrong kobject: 'rx-0' (00000000ba2377c9): kobject_cleanup, parent 00000000d74fc420 kobject: 'rx-0' (00000000ba2377c9): auto cleanup 'remove' event kobject: 'rx-0' (00000000ba2377c9): kobject_uevent_env kobject: 'rx-0' (00000000ba2377c9): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'loop0' (00000000c4f37bbb): kobject_uevent_env kobject: 'loop0' (00000000c4f37bbb): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'rx-0' (00000000ba2377c9): auto cleanup kobject_del kobject: 'rx-0' (00000000ba2377c9): calling ktype release kobject: 'rx-0': free name kobject: 'loop1' (000000007b143b39): kobject_uevent_env kobject: 'tx-0' (00000000d6fdb502): kobject_cleanup, parent 00000000d74fc420 kobject: 'tx-0' (00000000d6fdb502): auto cleanup 'remove' event kobject: 'loop1' (000000007b143b39): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'tx-0' (00000000d6fdb502): kobject_uevent_env kobject: 'tx-0' (00000000d6fdb502): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'loop0' (00000000c4f37bbb): kobject_uevent_env kobject: 'tx-0' (00000000d6fdb502): auto cleanup kobject_del kobject: 'tx-0' (00000000d6fdb502): calling ktype release kernel msg: ebtables bug: please report to author: Nentries wrong kobject: 'tx-0': free name kobject: 'loop0' (00000000c4f37bbb): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'queues' (00000000d74fc420): kobject_cleanup, parent (null) kobject: 'loop5' (0000000068bb0760): kobject_uevent_env kobject: 'loop5' (0000000068bb0760): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'queues' (00000000d74fc420): calling ktype release kobject: 'loop0' (00000000c4f37bbb): kobject_uevent_env kobject: 'queues' (00000000d74fc420): kset_release kobject: 'queues': free name kobject: 'loop0' (00000000c4f37bbb): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'gre0' (00000000ac6d874f): kobject_uevent_env kobject: 'gre0' (00000000ac6d874f): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'loop2' (0000000096901b9a): kobject_uevent_env FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 kobject: 'loop2' (0000000096901b9a): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'gre0' (00000000ac6d874f): kobject_cleanup, parent (null) kobject: 'loop3' (00000000f4b9a587): kobject_uevent_env kobject: 'gre0' (00000000ac6d874f): auto cleanup 'remove' event kobject: 'loop3' (00000000f4b9a587): fill_kobj_path: path = '/devices/virtual/block/loop3' CPU: 0 PID: 11198 Comm: syz-executor5 Not tainted 4.19.0-rc5+ #242 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1c4/0x2b4 lib/dump_stack.c:113 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold.4+0xa/0x17 lib/fault-inject.c:149 kobject: 'loop1' (000000007b143b39): kobject_uevent_env kobject: 'loop1' (000000007b143b39): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop3' (00000000f4b9a587): kobject_uevent_env kobject: 'loop3' (00000000f4b9a587): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop4' (00000000a054606f): kobject_uevent_env __should_failslab+0x124/0x180 mm/failslab.c:32 kobject: 'loop4' (00000000a054606f): fill_kobj_path: path = '/devices/virtual/block/loop4' should_failslab+0x9/0x14 mm/slab_common.c:1557 slab_pre_alloc_hook mm/slab.h:423 [inline] slab_alloc_node mm/slab.c:3299 [inline] kmem_cache_alloc_node_trace+0x270/0x740 mm/slab.c:3661 kobject: 'loop4' (00000000a054606f): kobject_uevent_env __do_kmalloc_node mm/slab.c:3681 [inline] __kmalloc_node_track_caller+0x33/0x70 mm/slab.c:3696 __kmalloc_reserve.isra.39+0x41/0xe0 net/core/skbuff.c:137 kobject: 'loop4' (00000000a054606f): fill_kobj_path: path = '/devices/virtual/block/loop4' __alloc_skb+0x155/0x770 net/core/skbuff.c:205 kobject: 'loop3' (00000000f4b9a587): kobject_uevent_env alloc_skb include/linux/skbuff.h:997 [inline] sock_wmalloc+0x16d/0x1f0 net/core/sock.c:1934 kobject: 'loop3' (00000000f4b9a587): fill_kobj_path: path = '/devices/virtual/block/loop3' pppoe_sendmsg+0x359/0x8f0 drivers/net/ppp/pppoe.c:870 kobject: 'loop1' (000000007b143b39): kobject_uevent_env kobject: 'loop1' (000000007b143b39): fill_kobj_path: path = '/devices/virtual/block/loop1' sock_sendmsg_nosec net/socket.c:621 [inline] sock_sendmsg+0xd5/0x120 net/socket.c:631 ___sys_sendmsg+0x51d/0x930 net/socket.c:2116 kobject: 'loop4' (00000000a054606f): kobject_uevent_env kobject: 'loop4' (00000000a054606f): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop3' (00000000f4b9a587): kobject_uevent_env kobject: 'loop3' (00000000f4b9a587): fill_kobj_path: path = '/devices/virtual/block/loop3' __sys_sendmmsg+0x246/0x6d0 net/socket.c:2211 kobject: 'loop2' (0000000096901b9a): kobject_uevent_env kobject: 'loop2' (0000000096901b9a): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop3' (00000000f4b9a587): kobject_uevent_env kobject: 'loop3' (00000000f4b9a587): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'gre0' (00000000ac6d874f): kobject_uevent_env __do_sys_sendmmsg net/socket.c:2240 [inline] __se_sys_sendmmsg net/socket.c:2237 [inline] __x64_sys_sendmmsg+0x9d/0x100 net/socket.c:2237 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 kobject: 'gre0' (00000000ac6d874f): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'gre0' (00000000ac6d874f): calling ktype release entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457579 Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 kernel msg: ebtables bug: please report to author: Nentries wrong RSP: 002b:00007fb6365ecc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 RAX: ffffffffffffffda RBX: 00007fb6365ecc90 RCX: 0000000000457579 RDX: 040000000000014d RSI: 0000000020005b40 RDI: 0000000000000003 RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb6365ed6d4 R13: 00000000004c34ed R14: 00000000004d52b0 R15: 0000000000000004 kobject: 'gre0': free name kobject: 'loop0' (00000000c4f37bbb): kobject_uevent_env FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 kobject: 'loop0' (00000000c4f37bbb): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'rx-0' (00000000e8681aeb): kobject_cleanup, parent 00000000c564d25c kobject: 'loop5' (0000000068bb0760): kobject_uevent_env kobject: 'rx-0' (00000000e8681aeb): auto cleanup 'remove' event kobject: 'loop5' (0000000068bb0760): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop3' (00000000f4b9a587): kobject_uevent_env kobject: 'loop3' (00000000f4b9a587): fill_kobj_path: path = '/devices/virtual/block/loop3' CPU: 0 PID: 11230 Comm: syz-executor5 Not tainted 4.19.0-rc5+ #242 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1c4/0x2b4 lib/dump_stack.c:113 kobject: 'rx-0' (00000000e8681aeb): kobject_uevent_env fail_dump lib/fault-inject.c:51 [inline] should_fail.cold.4+0xa/0x17 lib/fault-inject.c:149 kobject: 'rx-0' (00000000e8681aeb): kobject_uevent_env: uevent_suppress caused the event to drop! __should_failslab+0x124/0x180 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1557 slab_pre_alloc_hook mm/slab.h:423 [inline] slab_alloc_node mm/slab.c:3299 [inline] kmem_cache_alloc_node+0x26e/0x730 mm/slab.c:3642 __alloc_skb+0x119/0x770 net/core/skbuff.c:193 kobject: 'rx-0' (00000000e8681aeb): auto cleanup kobject_del kobject: 'rx-0' (00000000e8681aeb): calling ktype release alloc_skb include/linux/skbuff.h:997 [inline] sock_wmalloc+0x16d/0x1f0 net/core/sock.c:1934 pppoe_sendmsg+0x359/0x8f0 drivers/net/ppp/pppoe.c:870 kobject: 'rx-0': free name kobject: 'tx-0' (000000005a83d30a): kobject_cleanup, parent 00000000c564d25c sock_sendmsg_nosec net/socket.c:621 [inline] sock_sendmsg+0xd5/0x120 net/socket.c:631 ___sys_sendmsg+0x51d/0x930 net/socket.c:2116 kobject: 'tx-0' (000000005a83d30a): auto cleanup 'remove' event kobject: 'tx-0' (000000005a83d30a): kobject_uevent_env kobject: 'tx-0' (000000005a83d30a): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'tx-0' (000000005a83d30a): auto cleanup kobject_del __sys_sendmmsg+0x246/0x6d0 net/socket.c:2211 kobject: 'tx-0' (000000005a83d30a): calling ktype release kobject: 'tx-0': free name kobject: 'queues' (00000000c564d25c): kobject_cleanup, parent (null) kobject: 'queues' (00000000c564d25c): calling ktype release kobject: 'queues' (00000000c564d25c): kset_release __do_sys_sendmmsg net/socket.c:2240 [inline] __se_sys_sendmmsg net/socket.c:2237 [inline] __x64_sys_sendmmsg+0x9d/0x100 net/socket.c:2237 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 kobject: 'queues': free name kobject: 'tunl0' (00000000bdb09f78): kobject_uevent_env kobject: 'tunl0' (00000000bdb09f78): kobject_uevent_env: uevent_suppress caused the event to drop! entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457579 Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007fb6365ecc78 EFLAGS: 00000246 kobject: 'loop2' (0000000096901b9a): kobject_uevent_env ORIG_RAX: 0000000000000133 RAX: ffffffffffffffda RBX: 00007fb6365ecc90 RCX: 0000000000457579 RDX: 040000000000014d RSI: 0000000020005b40 RDI: 0000000000000003 RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb6365ed6d4 R13: 00000000004c34ed R14: 00000000004d52b0 R15: 0000000000000004 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 kobject: 'loop2' (0000000096901b9a): fill_kobj_path: path = '/devices/virtual/block/loop2' CPU: 1 PID: 11259 Comm: syz-executor5 Not tainted 4.19.0-rc5+ #242 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 IPVS: ftp: loaded support on port[0] = 21 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1c4/0x2b4 lib/dump_stack.c:113 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold.4+0xa/0x17 lib/fault-inject.c:149 kobject: 'lo' (000000008cec8ecc): kobject_add_internal: parent: 'net', set: 'devices' kobject: 'lo' (000000008cec8ecc): kobject_uevent_env kobject: 'lo' (000000008cec8ecc): fill_kobj_path: path = '/devices/virtual/net/lo' __should_failslab+0x124/0x180 mm/failslab.c:32 kobject: 'queues' (00000000aeacd480): kobject_add_internal: parent: 'lo', set: '' should_failslab+0x9/0x14 mm/slab_common.c:1557 slab_pre_alloc_hook mm/slab.h:423 [inline] slab_alloc_node mm/slab.c:3299 [inline] kmem_cache_alloc_node_trace+0x270/0x740 mm/slab.c:3661 kobject: 'queues' (00000000aeacd480): kobject_uevent_env __do_kmalloc_node mm/slab.c:3681 [inline] __kmalloc_node_track_caller+0x33/0x70 mm/slab.c:3696 __kmalloc_reserve.isra.39+0x41/0xe0 net/core/skbuff.c:137 __alloc_skb+0x155/0x770 net/core/skbuff.c:205 kobject: 'queues' (00000000aeacd480): kobject_uevent_env: filter function caused the event to drop! kobject: 'rx-0' (00000000958afdcd): kobject_add_internal: parent: 'queues', set: 'queues' alloc_skb include/linux/skbuff.h:997 [inline] sock_wmalloc+0x16d/0x1f0 net/core/sock.c:1934 pppoe_sendmsg+0x359/0x8f0 drivers/net/ppp/pppoe.c:870 kobject: 'rx-0' (00000000958afdcd): kobject_uevent_env kobject: 'rx-0' (00000000958afdcd): fill_kobj_path: path = '/devices/virtual/net/lo/queues/rx-0' sock_sendmsg_nosec net/socket.c:621 [inline] sock_sendmsg+0xd5/0x120 net/socket.c:631 ___sys_sendmsg+0x51d/0x930 net/socket.c:2116 kobject: 'tx-0' (00000000cf4d1f62): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'tx-0' (00000000cf4d1f62): kobject_uevent_env __sys_sendmmsg+0x246/0x6d0 net/socket.c:2211 kobject: 'tx-0' (00000000cf4d1f62): fill_kobj_path: path = '/devices/virtual/net/lo/queues/tx-0' kobject: 'loop0' (00000000c4f37bbb): kobject_uevent_env kobject: 'tunl0' (000000009e69afad): kobject_add_internal: parent: 'net', set: 'devices' __do_sys_sendmmsg net/socket.c:2240 [inline] __se_sys_sendmmsg net/socket.c:2237 [inline] __x64_sys_sendmmsg+0x9d/0x100 net/socket.c:2237 kobject: 'loop0' (00000000c4f37bbb): fill_kobj_path: path = '/devices/virtual/block/loop0' do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 kobject: 'tunl0' (000000009e69afad): kobject_uevent_env kobject: 'loop0' (00000000c4f37bbb): kobject_uevent_env entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457579 Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007fb6365ecc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 RAX: ffffffffffffffda RBX: 00007fb6365ecc90 RCX: 0000000000457579 RDX: 040000000000014d RSI: 0000000020005b40 RDI: 0000000000000003 RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 kobject: 'loop0' (00000000c4f37bbb): fill_kobj_path: path = '/devices/virtual/block/loop0' R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb6365ed6d4 R13: 00000000004c34ed R14: 00000000004d52b0 R15: 0000000000000004 kobject: 'tunl0' (000000009e69afad): fill_kobj_path: path = '/devices/virtual/net/tunl0' kobject: 'loop1' (000000007b143b39): kobject_uevent_env kobject: 'queues' (00000000fba38250): kobject_add_internal: parent: 'tunl0', set: '' kobject: 'loop1' (000000007b143b39): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'queues' (00000000fba38250): kobject_uevent_env kobject: 'loop5' (0000000068bb0760): kobject_uevent_env FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 kobject: 'queues' (00000000fba38250): kobject_uevent_env: filter function caused the event to drop! CPU: 1 PID: 11281 Comm: syz-executor3 Not tainted 4.19.0-rc5+ #242 kobject: 'rx-0' (000000008c7d5e82): kobject_add_internal: parent: 'queues', set: 'queues' Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1c4/0x2b4 lib/dump_stack.c:113 kobject: 'rx-0' (000000008c7d5e82): kobject_uevent_env fail_dump lib/fault-inject.c:51 [inline] should_fail.cold.4+0xa/0x17 lib/fault-inject.c:149 kobject: 'loop5' (0000000068bb0760): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop3' (00000000f4b9a587): kobject_uevent_env kobject: 'rx-0' (000000008c7d5e82): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/rx-0' __should_failslab+0x124/0x180 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1557 kobject: 'loop3' (00000000f4b9a587): fill_kobj_path: path = '/devices/virtual/block/loop3' slab_pre_alloc_hook mm/slab.h:423 [inline] slab_alloc_node mm/slab.c:3299 [inline] kmem_cache_alloc_node+0x26e/0x730 mm/slab.c:3642 __alloc_skb+0x119/0x770 net/core/skbuff.c:193 kobject: 'loop4' (00000000a054606f): kobject_uevent_env kobject: 'loop4' (00000000a054606f): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop1' (000000007b143b39): kobject_uevent_env alloc_skb include/linux/skbuff.h:997 [inline] sock_wmalloc+0x16d/0x1f0 net/core/sock.c:1934 kobject: 'tx-0' (0000000015a0fae8): kobject_add_internal: parent: 'queues', set: 'queues' pppoe_sendmsg+0x359/0x8f0 drivers/net/ppp/pppoe.c:870 kobject: 'loop1' (000000007b143b39): fill_kobj_path: path = '/devices/virtual/block/loop1' sock_sendmsg_nosec net/socket.c:621 [inline] sock_sendmsg+0xd5/0x120 net/socket.c:631 ___sys_sendmsg+0x51d/0x930 net/socket.c:2116 kobject: 'loop4' (00000000a054606f): kobject_uevent_env kobject: 'tx-0' (0000000015a0fae8): kobject_uevent_env kobject: 'tx-0' (0000000015a0fae8): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/tx-0' __sys_sendmmsg+0x246/0x6d0 net/socket.c:2211 kobject: 'gre0' (000000002f42a1f8): kobject_add_internal: parent: 'net', set: 'devices' kobject: 'loop4' (00000000a054606f): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'gre0' (000000002f42a1f8): kobject_uevent_env __do_sys_sendmmsg net/socket.c:2240 [inline] __se_sys_sendmmsg net/socket.c:2237 [inline] __x64_sys_sendmmsg+0x9d/0x100 net/socket.c:2237 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 kobject: 'loop0' (00000000c4f37bbb): kobject_uevent_env kobject: 'gre0' (000000002f42a1f8): fill_kobj_path: path = '/devices/virtual/net/gre0' entry_SYSCALL_64_after_hwframe+0x49/0xbe kobject: 'loop0' (00000000c4f37bbb): fill_kobj_path: path = '/devices/virtual/block/loop0' RIP: 0033:0x457579 Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f9e72434c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 RAX: ffffffffffffffda RBX: 00007f9e72434c90 RCX: 0000000000457579 RDX: 040000000000014d RSI: 0000000020005b40 RDI: 0000000000000003 kobject: 'loop3' (00000000f4b9a587): kobject_uevent_env RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9e724356d4 R13: 00000000004c34ed R14: 00000000004d52b0 R15: 0000000000000004 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 kobject: 'queues' (000000006b754d73): kobject_add_internal: parent: 'gre0', set: '' FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 kobject: 'loop3' (00000000f4b9a587): fill_kobj_path: path = '/devices/virtual/block/loop3' CPU: 1 PID: 11287 Comm: syz-executor5 Not tainted 4.19.0-rc5+ #242 kobject: 'loop5' (0000000068bb0760): kobject_uevent_env Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1c4/0x2b4 lib/dump_stack.c:113 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold.4+0xa/0x17 lib/fault-inject.c:149 kobject: 'loop5' (0000000068bb0760): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop4' (00000000a054606f): kobject_uevent_env kobject: 'loop4' (00000000a054606f): fill_kobj_path: path = '/devices/virtual/block/loop4' __should_failslab+0x124/0x180 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1557 slab_pre_alloc_hook mm/slab.h:423 [inline] slab_alloc_node mm/slab.c:3299 [inline] kmem_cache_alloc_node+0x26e/0x730 mm/slab.c:3642 kobject: 'loop3' (00000000f4b9a587): kobject_uevent_env __alloc_skb+0x119/0x770 net/core/skbuff.c:193 kobject: 'loop3' (00000000f4b9a587): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'queues' (000000006b754d73): kobject_uevent_env alloc_skb include/linux/skbuff.h:997 [inline] sock_wmalloc+0x16d/0x1f0 net/core/sock.c:1934 pppoe_sendmsg+0x359/0x8f0 drivers/net/ppp/pppoe.c:870 kobject: 'loop4' (00000000a054606f): kobject_uevent_env kobject: 'loop4' (00000000a054606f): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'queues' (000000006b754d73): kobject_uevent_env: filter function caused the event to drop! sock_sendmsg_nosec net/socket.c:621 [inline] sock_sendmsg+0xd5/0x120 net/socket.c:631 ___sys_sendmsg+0x51d/0x930 net/socket.c:2116 kobject: 'loop3' (00000000f4b9a587): kobject_uevent_env kobject: 'loop3' (00000000f4b9a587): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop4' (00000000a054606f): kobject_uevent_env kobject: 'rx-0' (0000000011d30b57): kobject_add_internal: parent: 'queues', set: 'queues' __sys_sendmmsg+0x246/0x6d0 net/socket.c:2211 kobject: 'rx-0' (0000000011d30b57): kobject_uevent_env kobject: 'loop4' (00000000a054606f): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'rx-0' (0000000011d30b57): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/rx-0' __do_sys_sendmmsg net/socket.c:2240 [inline] __se_sys_sendmmsg net/socket.c:2237 [inline] __x64_sys_sendmmsg+0x9d/0x100 net/socket.c:2237 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 kobject: 'loop0' (00000000c4f37bbb): kobject_uevent_env kobject: 'loop0' (00000000c4f37bbb): fill_kobj_path: path = '/devices/virtual/block/loop0' entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457579 Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 kobject: 'tx-0' (000000008cbebbbd): kobject_add_internal: parent: 'queues', set: 'queues' RSP: 002b:00007fb6365ecc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 RAX: ffffffffffffffda RBX: 00007fb6365ecc90 RCX: 0000000000457579 RDX: 040000000000014d RSI: 0000000020005b40 RDI: 0000000000000003 RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb6365ed6d4 kobject: 'tx-0' (000000008cbebbbd): kobject_uevent_env R13: 00000000004c34ed R14: 00000000004d52b0 R15: 0000000000000004 CPU: 1 PID: 11293 Comm: syz-executor3 Not tainted 4.19.0-rc5+ #242 kobject: 'tx-0' (000000008cbebbbd): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/tx-0' Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1c4/0x2b4 lib/dump_stack.c:113 kobject: 'tunl0' (00000000bdb09f78): kobject_cleanup, parent (null) fail_dump lib/fault-inject.c:51 [inline] should_fail.cold.4+0xa/0x17 lib/fault-inject.c:149 kobject: 'gretap0' (000000004e07aa63): kobject_add_internal: parent: 'net', set: 'devices' kobject: 'tunl0' (00000000bdb09f78): auto cleanup 'remove' event kobject: 'tunl0' (00000000bdb09f78): kobject_uevent_env kobject: 'tunl0' (00000000bdb09f78): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'gretap0' (000000004e07aa63): kobject_uevent_env __should_failslab+0x124/0x180 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1557 slab_pre_alloc_hook mm/slab.h:423 [inline] slab_alloc_node mm/slab.c:3299 [inline] kmem_cache_alloc_node_trace+0x270/0x740 mm/slab.c:3661 kobject: 'tunl0' (00000000bdb09f78): calling ktype release __do_kmalloc_node mm/slab.c:3681 [inline] __kmalloc_node_track_caller+0x33/0x70 mm/slab.c:3696 kobject: 'tunl0': free name __kmalloc_reserve.isra.39+0x41/0xe0 net/core/skbuff.c:137 kobject: 'gretap0' (000000004e07aa63): fill_kobj_path: path = '/devices/virtual/net/gretap0' __alloc_skb+0x155/0x770 net/core/skbuff.c:205 kobject: 'queues' (00000000ad3d0dac): kobject_add_internal: parent: 'gretap0', set: '' alloc_skb include/linux/skbuff.h:997 [inline] sock_wmalloc+0x16d/0x1f0 net/core/sock.c:1934 pppoe_sendmsg+0x359/0x8f0 drivers/net/ppp/pppoe.c:870 kobject: 'queues' (00000000ad3d0dac): kobject_uevent_env kobject: 'queues' (00000000ad3d0dac): kobject_uevent_env: filter function caused the event to drop! sock_sendmsg_nosec net/socket.c:621 [inline] sock_sendmsg+0xd5/0x120 net/socket.c:631 kobject: 'rx-0' (00000000ac4aa067): kobject_add_internal: parent: 'queues', set: 'queues' ___sys_sendmsg+0x51d/0x930 net/socket.c:2116 kobject: 'rx-0' (00000000ac4aa067): kobject_uevent_env kobject: 'rx-0' (00000000ac4aa067): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/rx-0' kobject: 'tx-0' (00000000d356886a): kobject_add_internal: parent: 'queues', set: 'queues' __sys_sendmmsg+0x246/0x6d0 net/socket.c:2211 kobject: 'tx-0' (00000000d356886a): kobject_uevent_env kobject: 'tx-0' (00000000d356886a): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/tx-0' kobject: 'erspan0' (00000000ab06cce9): kobject_add_internal: parent: 'net', set: 'devices' kobject: 'erspan0' (00000000ab06cce9): kobject_uevent_env __do_sys_sendmmsg net/socket.c:2240 [inline] __se_sys_sendmmsg net/socket.c:2237 [inline] __x64_sys_sendmmsg+0x9d/0x100 net/socket.c:2237 kobject: 'erspan0' (00000000ab06cce9): fill_kobj_path: path = '/devices/virtual/net/erspan0' do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 kobject: 'queues' (00000000274a095b): kobject_add_internal: parent: 'erspan0', set: '' entry_SYSCALL_64_after_hwframe+0x49/0xbe kobject: 'queues' (00000000274a095b): kobject_uevent_env RIP: 0033:0x457579 kobject: 'queues' (00000000274a095b): kobject_uevent_env: filter function caused the event to drop! Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f9e72434c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 kobject: 'rx-0' (00000000224c0ab0): kobject_add_internal: parent: 'queues', set: 'queues' RAX: ffffffffffffffda RBX: 00007f9e72434c90 RCX: 0000000000457579 RDX: 040000000000014d RSI: 0000000020005b40 RDI: 0000000000000003 RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9e724356d4 R13: 00000000004c34ed R14: 00000000004d52b0 R15: 0000000000000004 kobject: 'loop3' (00000000f4b9a587): kobject_uevent_env kobject: 'rx-0' (00000000224c0ab0): kobject_uevent_env kobject: 'loop3' (00000000f4b9a587): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'rx-0' (00000000224c0ab0): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/rx-0' kobject: 'tx-0' (00000000b21e43c5): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'tx-0' (00000000b21e43c5): kobject_uevent_env kobject: 'tx-0' (00000000b21e43c5): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/tx-0' kobject: 'regulatory.0' (00000000da43d61b): kobject_uevent_env kobject: 'regulatory.0' (00000000da43d61b): fill_kobj_path: path = '/devices/platform/regulatory.0' kobject: 'rx-0' (00000000386f8338): kobject_cleanup, parent 0000000025f8cef1 kobject: 'rx-0' (00000000386f8338): auto cleanup 'remove' event kobject: 'rx-0' (00000000386f8338): kobject_uevent_env kobject: 'rx-0' (00000000386f8338): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'rx-0' (00000000386f8338): auto cleanup kobject_del kobject: 'rx-0' (00000000386f8338): calling ktype release kobject: 'rx-0': free name kobject: 'tx-0' (00000000770ffd49): kobject_cleanup, parent 0000000025f8cef1 kobject: 'tx-0' (00000000770ffd49): auto cleanup 'remove' event kobject: 'tx-0' (00000000770ffd49): kobject_uevent_env kobject: 'tx-0' (00000000770ffd49): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'tx-0' (00000000770ffd49): auto cleanup kobject_del kobject: 'tx-0' (00000000770ffd49): calling ktype release kobject: 'tx-0': free name kobject: 'queues' (0000000025f8cef1): kobject_cleanup, parent (null) kobject: 'queues' (0000000025f8cef1): calling ktype release kobject: 'queues' (0000000025f8cef1): kset_release kobject: 'queues': free name kobject: 'lo' (00000000246880f7): kobject_uevent_env kobject: 'lo' (00000000246880f7): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'ip_vti0' (0000000051869825): kobject_add_internal: parent: 'net', set: 'devices' kobject: 'ip_vti0' (0000000051869825): kobject_uevent_env kobject: 'ip_vti0' (0000000051869825): fill_kobj_path: path = '/devices/virtual/net/ip_vti0' kobject: 'queues' (00000000135c8f74): kobject_add_internal: parent: 'ip_vti0', set: '' kobject: 'queues' (00000000135c8f74): kobject_uevent_env kobject: 'queues' (00000000135c8f74): kobject_uevent_env: filter function caused the event to drop! kobject: 'rx-0' (00000000b4fb0cad): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'rx-0' (00000000b4fb0cad): kobject_uevent_env kobject: 'rx-0' (00000000b4fb0cad): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/rx-0' kobject: 'tx-0' (00000000d4c851eb): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'tx-0' (00000000d4c851eb): kobject_uevent_env kobject: 'tx-0' (00000000d4c851eb): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/tx-0' kobject: 'lo' (00000000246880f7): kobject_cleanup, parent (null) kobject: 'ip6_vti0' (0000000026c90576): kobject_add_internal: parent: 'net', set: 'devices' kobject: 'lo' (00000000246880f7): auto cleanup 'remove' event kobject: 'ip6_vti0' (0000000026c90576): kobject_uevent_env kobject: 'lo' (00000000246880f7): kobject_uevent_env kobject: 'ip6_vti0' (0000000026c90576): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0' kobject: 'queues' (000000000e158947): kobject_add_internal: parent: 'ip6_vti0', set: '' kobject: 'lo' (00000000246880f7): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'queues' (000000000e158947): kobject_uevent_env kobject: 'lo' (00000000246880f7): calling ktype release kobject: 'queues' (000000000e158947): kobject_uevent_env: filter function caused the event to drop! kobject: 'rx-0' (0000000064c65e24): kobject_add_internal: parent: 'queues', set: 'queues'