bridge0: port 2(bridge_slave_1) entered forwarding state IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready ======================================================== WARNING: possible irq lock inversion dependency detected 5.0.0-rc6+ #71 Not tainted -------------------------------------------------------- kworker/1:3/7614 just changed the state of lock: 00000000e5468ae1 (&(&ctx->ctx_lock)->rlock){..-.}, at: spin_lock_irq include/linux/spinlock.h:354 [inline] 00000000e5468ae1 (&(&ctx->ctx_lock)->rlock){..-.}, at: free_ioctx_users+0x2d/0x4a0 fs/aio.c:610 but this lock took another, SOFTIRQ-unsafe lock in the past: (&fiq->waitq){+.+.} and interrupts could create inverse lock ordering between them. other info that might help us debug this: Possible interrupt unsafe locking scenario: CPU0 CPU1 ---- ---- lock(&fiq->waitq); local_irq_disable(); lock(&(&ctx->ctx_lock)->rlock); lock(&fiq->waitq); lock(&(&ctx->ctx_lock)->rlock); *** DEADLOCK *** 6 locks held by kworker/1:3/7614: #0: 0000000001db0431 ((wq_completion)"events"){+.+.}, at: __write_once_size include/linux/compiler.h:220 [inline] #0: 0000000001db0431 ((wq_completion)"events"){+.+.}, at: arch_atomic64_set arch/x86/include/asm/atomic64_64.h:34 [inline] #0: 0000000001db0431 ((wq_completion)"events"){+.+.}, at: atomic64_set include/asm-generic/atomic-instrumented.h:40 [inline] #0: 0000000001db0431 ((wq_completion)"events"){+.+.}, at: atomic_long_set include/asm-generic/atomic-long.h:59 [inline] #0: 0000000001db0431 ((wq_completion)"events"){+.+.}, at: set_work_data kernel/workqueue.c:617 [inline] #0: 0000000001db0431 ((wq_completion)"events"){+.+.}, at: set_work_pool_and_clear_pending kernel/workqueue.c:644 [inline] #0: 0000000001db0431 ((wq_completion)"events"){+.+.}, at: process_one_work+0x87e/0x1790 kernel/workqueue.c:2144 #1: 00000000b3ad289d ((linkwatch_work).work){+.+.}, at: process_one_work+0x8b4/0x1790 kernel/workqueue.c:2148 #2: 000000008ceafcff (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 net/core/rtnetlink.c:77 #3: 0000000054d2b8a2 (console_lock){+.+.}, at: console_trylock_spinning kernel/printk/printk.c:1662 [inline] #3: 0000000054d2b8a2 (console_lock){+.+.}, at: vprintk_emit+0x267/0x6d0 kernel/printk/printk.c:1930 #4: 000000001b76b359 (rcu_callback){....}, at: __rcu_reclaim kernel/rcu/rcu.h:228 [inline] #4: 000000001b76b359 (rcu_callback){....}, at: rcu_do_batch kernel/rcu/tree.c:2452 [inline] #4: 000000001b76b359 (rcu_callback){....}, at: invoke_rcu_callbacks kernel/rcu/tree.c:2773 [inline] #4: 000000001b76b359 (rcu_callback){....}, at: rcu_process_callbacks+0xa0d/0x1390 kernel/rcu/tree.c:2754 #5: 00000000d3eb959f (rcu_read_lock_sched){....}, at: percpu_ref_call_confirm_rcu lib/percpu-refcount.c:119 [inline] #5: 00000000d3eb959f (rcu_read_lock_sched){....}, at: percpu_ref_switch_to_atomic_rcu+0x1b8/0x520 lib/percpu-refcount.c:158 the shortest dependencies between 2nd lock and 1st lock: -> (&fiq->waitq){+.+.} { HARDIRQ-ON-W at: lock_acquire+0x16f/0x3f0 kernel/locking/lockdep.c:3841 __raw_spin_lock include/linux/spinlock_api_smp.h:142 [inline] _raw_spin_lock+0x2f/0x40 kernel/locking/spinlock.c:144 spin_lock include/linux/spinlock.h:329 [inline] flush_bg_queue+0x1f3/0x3c0 fs/fuse/dev.c:413 fuse_request_queue_background+0x2d1/0x580 fs/fuse/dev.c:652 fuse_request_send_background+0x58/0x120 fs/fuse/dev.c:663 cuse_send_init fs/fuse/cuse.c:458 [inline] cuse_channel_open+0x5ba/0x830 fs/fuse/cuse.c:518 misc_open+0x398/0x4c0 drivers/char/misc.c:141 chrdev_open+0x247/0x6b0 fs/char_dev.c:417 do_dentry_open+0x47d/0x1130 fs/open.c:771 vfs_open+0xa0/0xd0 fs/open.c:880 do_last fs/namei.c:3418 [inline] path_openat+0x10d7/0x4690 fs/namei.c:3534 do_filp_open+0x1a1/0x280 fs/namei.c:3564 do_sys_open+0x3fe/0x5d0 fs/open.c:1063 __do_compat_sys_openat fs/open.c:1109 [inline] __se_compat_sys_openat fs/open.c:1107 [inline] __ia32_compat_sys_openat+0x98/0xf0 fs/open.c:1107 do_syscall_32_irqs_on arch/x86/entry/common.c:326 [inline] do_fast_syscall_32+0x281/0xc98 arch/x86/entry/common.c:397 entry_SYSENTER_compat+0x70/0x7f arch/x86/entry/entry_64_compat.S:139 SOFTIRQ-ON-W at: lock_acquire+0x16f/0x3f0 kernel/locking/lockdep.c:3841 __raw_spin_lock include/linux/spinlock_api_smp.h:142 [inline] _raw_spin_lock+0x2f/0x40 kernel/locking/spinlock.c:144 spin_lock include/linux/spinlock.h:329 [inline] flush_bg_queue+0x1f3/0x3c0 fs/fuse/dev.c:413 fuse_request_queue_background+0x2d1/0x580 fs/fuse/dev.c:652 fuse_request_send_background+0x58/0x120 fs/fuse/dev.c:663 cuse_send_init fs/fuse/cuse.c:458 [inline] cuse_channel_open+0x5ba/0x830 fs/fuse/cuse.c:518 misc_open+0x398/0x4c0 drivers/char/misc.c:141 chrdev_open+0x247/0x6b0 fs/char_dev.c:417 do_dentry_open+0x47d/0x1130 fs/open.c:771 vfs_open+0xa0/0xd0 fs/open.c:880 do_last fs/namei.c:3418 [inline] path_openat+0x10d7/0x4690 fs/namei.c:3534 do_filp_open+0x1a1/0x280 fs/namei.c:3564 do_sys_open+0x3fe/0x5d0 fs/open.c:1063 __do_compat_sys_openat fs/open.c:1109 [inline] __se_compat_sys_openat fs/open.c:1107 [inline] __ia32_compat_sys_openat+0x98/0xf0 fs/open.c:1107 do_syscall_32_irqs_on arch/x86/entry/common.c:326 [inline] do_fast_syscall_32+0x281/0xc98 arch/x86/entry/common.c:397 entry_SYSENTER_compat+0x70/0x7f arch/x86/entry/entry_64_compat.S:139 INITIAL USE at: lock_acquire+0x16f/0x3f0 kernel/locking/lockdep.c:3841 __raw_spin_lock include/linux/spinlock_api_smp.h:142 [inline] _raw_spin_lock+0x2f/0x40 kernel/locking/spinlock.c:144 spin_lock include/linux/spinlock.h:329 [inline] flush_bg_queue+0x1f3/0x3c0 fs/fuse/dev.c:413 fuse_request_queue_background+0x2d1/0x580 fs/fuse/dev.c:652 fuse_request_send_background+0x58/0x120 fs/fuse/dev.c:663 cuse_send_init fs/fuse/cuse.c:458 [inline] cuse_channel_open+0x5ba/0x830 fs/fuse/cuse.c:518 misc_open+0x398/0x4c0 drivers/char/misc.c:141 chrdev_open+0x247/0x6b0 fs/char_dev.c:417 do_dentry_open+0x47d/0x1130 fs/open.c:771 vfs_open+0xa0/0xd0 fs/open.c:880 do_last fs/namei.c:3418 [inline] path_openat+0x10d7/0x4690 fs/namei.c:3534 do_filp_open+0x1a1/0x280 fs/namei.c:3564 do_sys_open+0x3fe/0x5d0 fs/open.c:1063 __do_compat_sys_openat fs/open.c:1109 [inline] __se_compat_sys_openat fs/open.c:1107 [inline] __ia32_compat_sys_openat+0x98/0xf0 fs/open.c:1107 do_syscall_32_irqs_on arch/x86/entry/common.c:326 [inline] do_fast_syscall_32+0x281/0xc98 arch/x86/entry/common.c:397 entry_SYSENTER_compat+0x70/0x7f arch/x86/entry/entry_64_compat.S:139 } ... key at: [] __key.43075+0x0/0x40 ... acquired at: __raw_spin_lock include/linux/spinlock_api_smp.h:142 [inline] _raw_spin_lock+0x2f/0x40 kernel/locking/spinlock.c:144 spin_lock include/linux/spinlock.h:329 [inline] aio_poll fs/aio.c:1773 [inline] __io_submit_one fs/aio.c:1876 [inline] io_submit_one+0xedf/0x1cf0 fs/aio.c:1909 __do_compat_sys_io_submit fs/aio.c:1996 [inline] __se_compat_sys_io_submit fs/aio.c:1966 [inline] __ia32_compat_sys_io_submit+0x1be/0x570 fs/aio.c:1966 do_syscall_32_irqs_on arch/x86/entry/common.c:326 [inline] do_fast_syscall_32+0x281/0xc98 arch/x86/entry/common.c:397 entry_SYSENTER_compat+0x70/0x7f arch/x86/entry/entry_64_compat.S:139 -> (&(&ctx->ctx_lock)->rlock){..-.} { IN-SOFTIRQ-W at: lock_acquire+0x16f/0x3f0 kernel/locking/lockdep.c:3841 __raw_spin_lock_irq include/linux/spinlock_api_smp.h:128 [inline] _raw_spin_lock_irq+0x60/0x80 kernel/locking/spinlock.c:160 spin_lock_irq include/linux/spinlock.h:354 [inline] free_ioctx_users+0x2d/0x4a0 fs/aio.c:610 percpu_ref_put_many include/linux/percpu-refcount.h:285 [inline] percpu_ref_put include/linux/percpu-refcount.h:301 [inline] percpu_ref_call_confirm_rcu lib/percpu-refcount.c:123 [inline] percpu_ref_switch_to_atomic_rcu+0x3e7/0x520 lib/percpu-refcount.c:158 __rcu_reclaim kernel/rcu/rcu.h:240 [inline] rcu_do_batch kernel/rcu/tree.c:2452 [inline] invoke_rcu_callbacks kernel/rcu/tree.c:2773 [inline] rcu_process_callbacks+0x928/0x1390 kernel/rcu/tree.c:2754 __do_softirq+0x266/0x95a kernel/softirq.c:292 invoke_softirq kernel/softirq.c:373 [inline] irq_exit+0x180/0x1d0 kernel/softirq.c:413 exiting_irq arch/x86/include/asm/apic.h:536 [inline] smp_apic_timer_interrupt+0x14a/0x570 arch/x86/kernel/apic/apic.c:1062 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:807 arch_local_irq_restore arch/x86/include/asm/paravirt.h:766 [inline] console_unlock+0xc0d/0x10a0 kernel/printk/printk.c:2416 vprintk_emit+0x280/0x6d0 kernel/printk/printk.c:1931 vprintk_default+0x28/0x30 kernel/printk/printk.c:1958 vprintk_func+0x7e/0x189 kernel/printk/printk_safe.c:398 printk+0xba/0xed kernel/printk/printk.c:1991 addrconf_notify.cold+0x2c/0x84 net/ipv6/addrconf.c:3534 notifier_call_chain+0xc7/0x240 kernel/notifier.c:93 __raw_notifier_call_chain kernel/notifier.c:394 [inline] raw_notifier_call_chain+0x2e/0x40 kernel/notifier.c:401 call_netdevice_notifiers_info+0x3f/0x90 net/core/dev.c:1739 netdev_state_change net/core/dev.c:1342 [inline] netdev_state_change+0x10d/0x140 net/core/dev.c:1335 linkwatch_do_dev+0xf7/0x170 net/core/link_watch.c:164 __linkwatch_run_queue+0x2cd/0x570 net/core/link_watch.c:202 linkwatch_event+0x4e/0x70 net/core/link_watch.c:237 process_one_work+0x98e/0x1790 kernel/workqueue.c:2173 worker_thread+0x98/0xe40 kernel/workqueue.c:2319 kthread+0x357/0x430 kernel/kthread.c:246 ret_from_fork+0x3a/0x50 arch/x86/entry/entry_64.S:352 INITIAL USE at: lock_acquire+0x16f/0x3f0 kernel/locking/lockdep.c:3841 __raw_spin_lock_irq include/linux/spinlock_api_smp.h:128 [inline] _raw_spin_lock_irq+0x60/0x80 kernel/locking/spinlock.c:160 spin_lock_irq include/linux/spinlock.h:354 [inline] aio_poll fs/aio.c:1772 [inline] __io_submit_one fs/aio.c:1876 [inline] io_submit_one+0xeb6/0x1cf0 fs/aio.c:1909 __do_compat_sys_io_submit fs/aio.c:1996 [inline] __se_compat_sys_io_submit fs/aio.c:1966 [inline] __ia32_compat_sys_io_submit+0x1be/0x570 fs/aio.c:1966 do_syscall_32_irqs_on arch/x86/entry/common.c:326 [inline] do_fast_syscall_32+0x281/0xc98 arch/x86/entry/common.c:397 entry_SYSENTER_compat+0x70/0x7f arch/x86/entry/entry_64_compat.S:139 } ... key at: [] __key.51970+0x0/0x40 ... acquired at: mark_lock_irq kernel/locking/lockdep.c:2690 [inline] mark_lock+0x427/0x1380 kernel/locking/lockdep.c:3062 mark_irqflags kernel/locking/lockdep.c:2940 [inline] __lock_acquire+0x128f/0x4700 kernel/locking/lockdep.c:3295 lock_acquire+0x16f/0x3f0 kernel/locking/lockdep.c:3841 __raw_spin_lock_irq include/linux/spinlock_api_smp.h:128 [inline] _raw_spin_lock_irq+0x60/0x80 kernel/locking/spinlock.c:160 spin_lock_irq include/linux/spinlock.h:354 [inline] free_ioctx_users+0x2d/0x4a0 fs/aio.c:610 percpu_ref_put_many include/linux/percpu-refcount.h:285 [inline] percpu_ref_put include/linux/percpu-refcount.h:301 [inline] percpu_ref_call_confirm_rcu lib/percpu-refcount.c:123 [inline] percpu_ref_switch_to_atomic_rcu+0x3e7/0x520 lib/percpu-refcount.c:158 __rcu_reclaim kernel/rcu/rcu.h:240 [inline] rcu_do_batch kernel/rcu/tree.c:2452 [inline] invoke_rcu_callbacks kernel/rcu/tree.c:2773 [inline] rcu_process_callbacks+0x928/0x1390 kernel/rcu/tree.c:2754 __do_softirq+0x266/0x95a kernel/softirq.c:292 invoke_softirq kernel/softirq.c:373 [inline] irq_exit+0x180/0x1d0 kernel/softirq.c:413 exiting_irq arch/x86/include/asm/apic.h:536 [inline] smp_apic_timer_interrupt+0x14a/0x570 arch/x86/kernel/apic/apic.c:1062 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:807 arch_local_irq_restore arch/x86/include/asm/paravirt.h:766 [inline] console_unlock+0xc0d/0x10a0 kernel/printk/printk.c:2416 vprintk_emit+0x280/0x6d0 kernel/printk/printk.c:1931 vprintk_default+0x28/0x30 kernel/printk/printk.c:1958 vprintk_func+0x7e/0x189 kernel/printk/printk_safe.c:398 printk+0xba/0xed kernel/printk/printk.c:1991 addrconf_notify.cold+0x2c/0x84 net/ipv6/addrconf.c:3534 notifier_call_chain+0xc7/0x240 kernel/notifier.c:93 __raw_notifier_call_chain kernel/notifier.c:394 [inline] raw_notifier_call_chain+0x2e/0x40 kernel/notifier.c:401 call_netdevice_notifiers_info+0x3f/0x90 net/core/dev.c:1739 netdev_state_change net/core/dev.c:1342 [inline] netdev_state_change+0x10d/0x140 net/core/dev.c:1335 linkwatch_do_dev+0xf7/0x170 net/core/link_watch.c:164 __linkwatch_run_queue+0x2cd/0x570 net/core/link_watch.c:202 linkwatch_event+0x4e/0x70 net/core/link_watch.c:237 process_one_work+0x98e/0x1790 kernel/workqueue.c:2173 worker_thread+0x98/0xe40 kernel/workqueue.c:2319 kthread+0x357/0x430 kernel/kthread.c:246 ret_from_fork+0x3a/0x50 arch/x86/entry/entry_64.S:352 stack backtrace: CPU: 1 PID: 7614 Comm: kworker/1:3 Not tainted 5.0.0-rc6+ #71 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: events linkwatch_event Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x172/0x1f0 lib/dump_stack.c:113 print_irq_inversion_bug.part.0+0x2c0/0x2cd kernel/locking/lockdep.c:2556 print_irq_inversion_bug kernel/locking/lockdep.c:2559 [inline] check_usage_forwards.cold+0x20/0x29 kernel/locking/lockdep.c:2581 mark_lock_irq kernel/locking/lockdep.c:2690 [inline] mark_lock+0x427/0x1380 kernel/locking/lockdep.c:3062 mark_irqflags kernel/locking/lockdep.c:2940 [inline] __lock_acquire+0x128f/0x4700 kernel/locking/lockdep.c:3295 lock_acquire+0x16f/0x3f0 kernel/locking/lockdep.c:3841 __raw_spin_lock_irq include/linux/spinlock_api_smp.h:128 [inline] _raw_spin_lock_irq+0x60/0x80 kernel/locking/spinlock.c:160 spin_lock_irq include/linux/spinlock.h:354 [inline] free_ioctx_users+0x2d/0x4a0 fs/aio.c:610 percpu_ref_put_many include/linux/percpu-refcount.h:285 [inline] percpu_ref_put include/linux/percpu-refcount.h:301 [inline] percpu_ref_call_confirm_rcu lib/percpu-refcount.c:123 [inline] percpu_ref_switch_to_atomic_rcu+0x3e7/0x520 lib/percpu-refcount.c:158 __rcu_reclaim kernel/rcu/rcu.h:240 [inline] rcu_do_batch kernel/rcu/tree.c:2452 [inline] invoke_rcu_callbacks kernel/rcu/tree.c:2773 [inline] rcu_process_callbacks+0x928/0x1390 kernel/rcu/tree.c:2754 __do_softirq+0x266/0x95a kernel/softirq.c:292 invoke_softirq kernel/softirq.c:373 [inline] irq_exit+0x180/0x1d0 kernel/softirq.c:413 exiting_irq arch/x86/include/asm/apic.h:536 [inline] smp_apic_timer_interrupt+0x14a/0x570 arch/x86/kernel/apic/apic.c:1062 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:807 RIP: 0010:arch_local_irq_restore arch/x86/include/asm/paravirt.h:766 [inline] RIP: 0010:console_unlock+0xc0d/0x10a0 kernel/printk/printk.c:2416 Code: fc ff df 48 c1 e8 03 80 3c 08 00 0f 85 49 04 00 00 48 83 3d 94 50 38 07 00 0f 84 af 02 00 00 e8 b9 af 15 00 48 8b 7d 98 57 9d <0f> 1f 44 00 00 e9 5f ff ff ff e8 a4 af 15 00 48 8b 7d 08 c7 05 56 RSP: 0018:ffff888064b5f7a8 EFLAGS: 00000293 ORIG_RAX: ffffffffffffff13 RAX: ffff888064b504c0 RBX: 0000000000000200 RCX: dffffc0000000000 RDX: 0000000000000000 RSI: ffffffff815a3167 RDI: 0000000000000293 RBP: ffff888064b5f838 R08: ffff888064b504c0 R09: ffff888064b50dd8 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: ffffffff841a2590 R14: ffffffff88f81e30 R15: 0000000000006601 vprintk_emit+0x280/0x6d0 kernel/printk/printk.c:1931 vprintk_default+0x28/0x30 kernel/printk/printk.c:1958 vprintk_func+0x7e/0x189 kernel/printk/printk_safe.c:398 printk+0xba/0xed kernel/printk/printk.c:1991 addrconf_notify.cold+0x2c/0x84 net/ipv6/addrconf.c:3534 notifier_call_chain+0xc7/0x240 kernel/notifier.c:93 __raw_notifier_call_chain kernel/notifier.c:394 [inline] raw_notifier_call_chain+0x2e/0x40 kernel/notifier.c:401 call_netdevice_notifiers_info+0x3f/0x90 net/core/dev.c:1739 netdev_state_change net/core/dev.c:1342 [inline] netdev_state_change+0x10d/0x140 net/core/dev.c:1335 linkwatch_do_dev+0xf7/0x170 net/core/link_watch.c:164 __linkwatch_run_queue+0x2cd/0x570 net/core/link_watch.c:202 linkwatch_event+0x4e/0x70 net/core/link_watch.c:237 process_one_work+0x98e/0x1790 kernel/workqueue.c:2173 worker_thread+0x98/0xe40 kernel/workqueue.c:2319 kthread+0x357/0x430 kernel/kthread.c:246 ret_from_fork+0x3a/0x50 arch/x86/entry/entry_64.S:352 kobject: 'loop5' (000000001d122b75): kobject_uevent_env IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready kobject: 'loop5' (000000001d122b75): fill_kobj_path: path = '/devices/virtual/block/loop5' IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready kobject: 'loop2' (00000000fd01c20a): kobject_uevent_env IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready kobject: 'loop2' (00000000fd01c20a): fill_kobj_path: path = '/devices/virtual/block/loop2' IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready kobject: 'loop0' (000000008a1a76be): kobject_uevent_env IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready kobject: 'loop0' (000000008a1a76be): fill_kobj_path: path = '/devices/virtual/block/loop0' 8021q: adding VLAN 0 to HW filter on device batadv0 kobject: 'vlan0' (000000006f61864c): kobject_add_internal: parent: 'mesh', set: '' kobject: 'loop4' (00000000d2a695a8): kobject_uevent_env kobject: 'loop4' (00000000d2a695a8): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop4' (00000000d2a695a8): kobject_uevent_env kobject: 'loop4' (00000000d2a695a8): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop0' (000000008a1a76be): kobject_uevent_env kobject: 'loop0' (000000008a1a76be): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop3' (00000000059c58ce): kobject_uevent_env kobject: 'loop3' (00000000059c58ce): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop5' (000000001d122b75): kobject_uevent_env kobject: 'loop5' (000000001d122b75): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop1' (00000000c9963d5f): kobject_uevent_env kobject: 'loop1' (00000000c9963d5f): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop2' (00000000fd01c20a): kobject_uevent_env kobject: 'loop2' (00000000fd01c20a): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop3' (00000000059c58ce): kobject_uevent_env kobject: 'loop3' (00000000059c58ce): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop4' (00000000d2a695a8): kobject_uevent_env kobject: 'loop4' (00000000d2a695a8): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop5' (000000001d122b75): kobject_uevent_env kobject: 'loop5' (000000001d122b75): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop2' (00000000fd01c20a): kobject_uevent_env kobject: 'loop2' (00000000fd01c20a): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop1' (00000000c9963d5f): kobject_uevent_env kobject: 'loop1' (00000000c9963d5f): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop5' (000000001d122b75): kobject_uevent_env kobject: 'loop5' (000000001d122b75): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop4' (00000000d2a695a8): kobject_uevent_env kobject: 'loop4' (00000000d2a695a8): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop2' (00000000fd01c20a): kobject_uevent_env kobject: 'loop2' (00000000fd01c20a): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop1' (00000000c9963d5f): kobject_uevent_env kobject: 'loop1' (00000000c9963d5f): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop0' (000000008a1a76be): kobject_uevent_env kobject: 'loop0' (000000008a1a76be): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop5' (000000001d122b75): kobject_uevent_env kobject: 'loop5' (000000001d122b75): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop4' (00000000d2a695a8): kobject_uevent_env kobject: 'loop4' (00000000d2a695a8): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop2' (00000000fd01c20a): kobject_uevent_env kobject: 'loop2' (00000000fd01c20a): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop1' (00000000c9963d5f): kobject_uevent_env kobject: 'loop1' (00000000c9963d5f): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop0' (000000008a1a76be): kobject_uevent_env kobject: 'loop0' (000000008a1a76be): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop5' (000000001d122b75): kobject_uevent_env kobject: 'loop5' (000000001d122b75): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop4' (00000000d2a695a8): kobject_uevent_env kobject: 'loop4' (00000000d2a695a8): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop0' (000000008a1a76be): kobject_uevent_env kobject: 'loop0' (000000008a1a76be): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop2' (00000000fd01c20a): kobject_uevent_env kobject: 'loop2' (00000000fd01c20a): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop5' (000000001d122b75): kobject_uevent_env kobject: 'loop5' (000000001d122b75): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop1' (00000000c9963d5f): kobject_uevent_env kobject: 'loop1' (00000000c9963d5f): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop0' (000000008a1a76be): kobject_uevent_env kobject: 'loop0' (000000008a1a76be): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop4' (00000000d2a695a8): kobject_uevent_env kobject: 'loop4' (00000000d2a695a8): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop2' (00000000fd01c20a): kobject_uevent_env kobject: 'loop2' (00000000fd01c20a): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop5' (000000001d122b75): kobject_uevent_env kobject: 'loop5' (000000001d122b75): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop1' (00000000c9963d5f): kobject_uevent_env kobject: 'loop1' (00000000c9963d5f): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop0' (000000008a1a76be): kobject_uevent_env kobject: 'loop0' (000000008a1a76be): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop4' (00000000d2a695a8): kobject_uevent_env kobject: 'loop4' (00000000d2a695a8): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop2' (00000000fd01c20a): kobject_uevent_env kobject: 'loop2' (00000000fd01c20a): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop1' (00000000c9963d5f): kobject_uevent_env kobject: 'loop1' (00000000c9963d5f): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop4' (00000000d2a695a8): kobject_uevent_env kobject: 'loop4' (00000000d2a695a8): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop1' (00000000c9963d5f): kobject_uevent_env kobject: 'loop1' (00000000c9963d5f): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop2' (00000000fd01c20a): kobject_uevent_env kobject: 'loop2' (00000000fd01c20a): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop3' (00000000059c58ce): kobject_uevent_env kobject: 'loop3' (00000000059c58ce): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop0' (000000008a1a76be): kobject_uevent_env kobject: 'loop0' (000000008a1a76be): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop3' (00000000059c58ce): kobject_uevent_env kobject: 'loop3' (00000000059c58ce): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop1' (00000000c9963d5f): kobject_uevent_env kobject: 'loop1' (00000000c9963d5f): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop2' (00000000fd01c20a): kobject_uevent_env kobject: 'loop2' (00000000fd01c20a): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop4' (00000000d2a695a8): kobject_uevent_env kobject: 'loop4' (00000000d2a695a8): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop0' (000000008a1a76be): kobject_uevent_env kobject: 'loop0' (000000008a1a76be): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop3' (00000000059c58ce): kobject_uevent_env kobject: 'loop3' (00000000059c58ce): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop2' (00000000fd01c20a): kobject_uevent_env kobject: 'loop2' (00000000fd01c20a): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop1' (00000000c9963d5f): kobject_uevent_env kobject: 'loop1' (00000000c9963d5f): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop4' (00000000d2a695a8): kobject_uevent_env kobject: 'loop4' (00000000d2a695a8): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop3' (00000000059c58ce): kobject_uevent_env kobject: 'loop3' (00000000059c58ce): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop2' (00000000fd01c20a): kobject_uevent_env kobject: 'loop2' (00000000fd01c20a): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop0' (000000008a1a76be): kobject_uevent_env kobject: 'loop0' (000000008a1a76be): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop3' (00000000059c58ce): kobject_uevent_env kobject: 'loop3' (00000000059c58ce): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop1' (00000000c9963d5f): kobject_uevent_env kobject: 'loop1' (00000000c9963d5f): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop2' (00000000fd01c20a): kobject_uevent_env kobject: 'loop2' (00000000fd01c20a): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop1' (00000000c9963d5f): kobject_uevent_env kobject: 'loop1' (00000000c9963d5f): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop4' (00000000d2a695a8): kobject_uevent_env kobject: 'loop4' (00000000d2a695a8): fill_kobj_path: path = '/devices/virtual/block/loop4' FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 1 kobject: 'loop3' (00000000059c58ce): kobject_uevent_env kobject: 'loop3' (00000000059c58ce): fill_kobj_path: path = '/devices/virtual/block/loop3' CPU: 0 PID: 8159 Comm: syz-executor.4 Not tainted 5.0.0-rc6+ #71 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x172/0x1f0 lib/dump_stack.c:113 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0x1b lib/fault-inject.c:149 kobject: 'loop2' (00000000fd01c20a): kobject_uevent_env kobject: 'loop2' (00000000fd01c20a): fill_kobj_path: path = '/devices/virtual/block/loop2' __should_failslab+0x121/0x190 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1603 slab_pre_alloc_hook mm/slab.h:423 [inline] slab_alloc mm/slab.c:3367 [inline] __do_kmalloc mm/slab.c:3709 [inline] __kmalloc+0x2dc/0x740 mm/slab.c:3720 kobject: 'loop0' (000000008a1a76be): kobject_uevent_env kmalloc_array include/linux/slab.h:668 [inline] compat_rw_copy_check_uvector+0x339/0x3f0 fs/read_write.c:849 compat_import_iovec+0xbf/0x1fc lib/iov_iter.c:1647 compat_writev+0xca/0x3a0 fs/read_write.c:1267 do_compat_pwritev64+0x190/0x1c0 fs/read_write.c:1319 __do_compat_sys_pwritev fs/read_write.c:1339 [inline] __se_compat_sys_pwritev fs/read_write.c:1333 [inline] __ia32_compat_sys_pwritev+0xc7/0x140 fs/read_write.c:1333 kobject: 'loop0' (000000008a1a76be): fill_kobj_path: path = '/devices/virtual/block/loop0' do_syscall_32_irqs_on arch/x86/entry/common.c:326 [inline] do_fast_syscall_32+0x281/0xc98 arch/x86/entry/common.c:397 entry_SYSENTER_compat+0x70/0x7f arch/x86/entry/entry_64_compat.S:139 RIP: 0023:0xf7f79869 kobject: 'loop1' (00000000c9963d5f): kobject_uevent_env Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 kobject: 'loop1' (00000000c9963d5f): fill_kobj_path: path = '/devices/virtual/block/loop1' RSP: 002b:00000000f5d750cc EFLAGS: 00000296 ORIG_RAX: 000000000000014e RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000200002c0 RDX: 000000000000005e RSI: 0000000000000000 RDI: 0000000000000000 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 kobject: 'loop3' (00000000059c58ce): kobject_uevent_env kobject: 'loop3' (00000000059c58ce): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop4' (00000000d2a695a8): kobject_uevent_env kobject: 'loop4' (00000000d2a695a8): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop2' (00000000fd01c20a): kobject_uevent_env hrtimer: interrupt took 23648 ns kobject: 'loop2' (00000000fd01c20a): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop0' (000000008a1a76be): kobject_uevent_env kobject: 'loop0' (000000008a1a76be): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop1' (00000000c9963d5f): kobject_uevent_env FAULT_INJECTION: forcing a failure. name fail_page_alloc, interval 1, probability 0, space 0, times 1 kobject: 'loop1' (00000000c9963d5f): fill_kobj_path: path = '/devices/virtual/block/loop1' CPU: 1 PID: 8201 Comm: syz-executor.4 Not tainted 5.0.0-rc6+ #71 kobject: 'loop4' (00000000d2a695a8): kobject_uevent_env Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x172/0x1f0 lib/dump_stack.c:113 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0x1b lib/fault-inject.c:149 kobject: 'loop4' (00000000d2a695a8): fill_kobj_path: path = '/devices/virtual/block/loop4' __should_fail_alloc_page mm/page_alloc.c:3152 [inline] should_fail_alloc_page+0x50/0x60 mm/page_alloc.c:3199 prepare_alloc_pages mm/page_alloc.c:4476 [inline] __alloc_pages_nodemask+0x1a1/0x710 mm/page_alloc.c:4523 kobject: 'loop2' (00000000fd01c20a): kobject_uevent_env kobject: 'loop2' (00000000fd01c20a): fill_kobj_path: path = '/devices/virtual/block/loop2' alloc_pages_vma+0xdd/0x540 mm/mempolicy.c:2070 shmem_alloc_page+0xc0/0x180 mm/shmem.c:1456 kobject: 'loop3' (00000000059c58ce): kobject_uevent_env kobject: 'loop3' (00000000059c58ce): fill_kobj_path: path = '/devices/virtual/block/loop3' shmem_alloc_and_acct_page+0x165/0x970 mm/shmem.c:1481 shmem_getpage_gfp+0x449/0x3520 mm/shmem.c:1758 kobject: 'loop2' (00000000fd01c20a): kobject_uevent_env shmem_getpage mm/shmem.c:134 [inline] shmem_write_begin+0x105/0x1e0 mm/shmem.c:2385 kobject: 'loop2' (00000000fd01c20a): fill_kobj_path: path = '/devices/virtual/block/loop2' generic_perform_write+0x231/0x530 mm/filemap.c:3208 kobject: 'loop0' (000000008a1a76be): kobject_uevent_env __generic_file_write_iter+0x25e/0x630 mm/filemap.c:3333 generic_file_write_iter+0x360/0x610 mm/filemap.c:3361 kobject: 'loop0' (000000008a1a76be): fill_kobj_path: path = '/devices/virtual/block/loop0' call_write_iter include/linux/fs.h:1863 [inline] do_iter_readv_writev+0x5e0/0x8e0 fs/read_write.c:680 kobject: 'loop4' (00000000d2a695a8): kobject_uevent_env do_iter_write fs/read_write.c:956 [inline] do_iter_write+0x184/0x610 fs/read_write.c:937 kobject: 'loop4' (00000000d2a695a8): fill_kobj_path: path = '/devices/virtual/block/loop4' compat_writev+0x1f6/0x3a0 fs/read_write.c:1270 kobject: 'loop1' (00000000c9963d5f): kobject_uevent_env do_compat_pwritev64+0x190/0x1c0 fs/read_write.c:1319 kobject: 'loop1' (00000000c9963d5f): fill_kobj_path: path = '/devices/virtual/block/loop1' __do_compat_sys_pwritev fs/read_write.c:1339 [inline] __se_compat_sys_pwritev fs/read_write.c:1333 [inline] __ia32_compat_sys_pwritev+0xc7/0x140 fs/read_write.c:1333 do_syscall_32_irqs_on arch/x86/entry/common.c:326 [inline] do_fast_syscall_32+0x281/0xc98 arch/x86/entry/common.c:397 kobject: 'loop3' (00000000059c58ce): kobject_uevent_env entry_SYSENTER_compat+0x70/0x7f arch/x86/entry/entry_64_compat.S:139 RIP: 0023:0xf7f79869 Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 RSP: 002b:00000000f5d750cc EFLAGS: 00000296 ORIG_RAX: 000000000000014e kobject: 'loop3' (00000000059c58ce): fill_kobj_path: path = '/devices/virtual/block/loop3' RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000200002c0 RDX: 000000000000005e RSI: 0000000000000000 RDI: 0000000000000000 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 FAULT_INJECTION: forcing a failure. name fail_page_alloc, interval 1, probability 0, space 0, times 0 kobject: 'loop1' (00000000c9963d5f): kobject_uevent_env CPU: 1 PID: 8213 Comm: syz-executor.4 Not tainted 5.0.0-rc6+ #71 kobject: 'loop1' (00000000c9963d5f): fill_kobj_path: path = '/devices/virtual/block/loop1' Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x172/0x1f0 lib/dump_stack.c:113 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0x1b lib/fault-inject.c:149 kobject: 'loop2' (00000000fd01c20a): kobject_uevent_env __should_fail_alloc_page mm/page_alloc.c:3152 [inline] should_fail_alloc_page+0x50/0x60 mm/page_alloc.c:3199 kobject: 'loop2' (00000000fd01c20a): fill_kobj_path: path = '/devices/virtual/block/loop2' prepare_alloc_pages mm/page_alloc.c:4476 [inline] __alloc_pages_nodemask+0x1a1/0x710 mm/page_alloc.c:4523 kobject: 'loop0' (000000008a1a76be): kobject_uevent_env kobject: 'loop0' (000000008a1a76be): fill_kobj_path: path = '/devices/virtual/block/loop0' alloc_pages_vma+0xdd/0x540 mm/mempolicy.c:2070 shmem_alloc_page+0xc0/0x180 mm/shmem.c:1456 kobject: 'loop3' (00000000059c58ce): kobject_uevent_env kobject: 'loop3' (00000000059c58ce): fill_kobj_path: path = '/devices/virtual/block/loop3' shmem_alloc_and_acct_page+0x165/0x970 mm/shmem.c:1481 kobject: 'loop1' (00000000c9963d5f): kobject_uevent_env shmem_getpage_gfp+0x449/0x3520 mm/shmem.c:1758 kobject: 'loop1' (00000000c9963d5f): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop4' (00000000d2a695a8): kobject_uevent_env shmem_getpage mm/shmem.c:134 [inline] shmem_write_begin+0x105/0x1e0 mm/shmem.c:2385 kobject: 'loop4' (00000000d2a695a8): fill_kobj_path: path = '/devices/virtual/block/loop4' generic_perform_write+0x231/0x530 mm/filemap.c:3208 kobject: 'loop0' (000000008a1a76be): kobject_uevent_env __generic_file_write_iter+0x25e/0x630 mm/filemap.c:3333 kobject: 'loop0' (000000008a1a76be): fill_kobj_path: path = '/devices/virtual/block/loop0' generic_file_write_iter+0x360/0x610 mm/filemap.c:3361 kobject: 'loop1' (00000000c9963d5f): kobject_uevent_env kobject: 'loop1' (00000000c9963d5f): fill_kobj_path: path = '/devices/virtual/block/loop1' call_write_iter include/linux/fs.h:1863 [inline] do_iter_readv_writev+0x5e0/0x8e0 fs/read_write.c:680 kobject: 'loop2' (00000000fd01c20a): kobject_uevent_env kobject: 'loop2' (00000000fd01c20a): fill_kobj_path: path = '/devices/virtual/block/loop2' do_iter_write fs/read_write.c:956 [inline] do_iter_write+0x184/0x610 fs/read_write.c:937 kobject: 'loop3' (00000000059c58ce): kobject_uevent_env compat_writev+0x1f6/0x3a0 fs/read_write.c:1270 kobject: 'loop3' (00000000059c58ce): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop0' (000000008a1a76be): kobject_uevent_env do_compat_pwritev64+0x190/0x1c0 fs/read_write.c:1319 kobject: 'loop0' (000000008a1a76be): fill_kobj_path: path = '/devices/virtual/block/loop0' __do_compat_sys_pwritev fs/read_write.c:1339 [inline] __se_compat_sys_pwritev fs/read_write.c:1333 [inline] __ia32_compat_sys_pwritev+0xc7/0x140 fs/read_write.c:1333 do_syscall_32_irqs_on arch/x86/entry/common.c:326 [inline] do_fast_syscall_32+0x281/0xc98 arch/x86/entry/common.c:397 kobject: 'loop4' (00000000d2a695a8): kobject_uevent_env entry_SYSENTER_compat+0x70/0x7f arch/x86/entry/entry_64_compat.S:139 RIP: 0023:0xf7f79869 kobject: 'loop4' (00000000d2a695a8): fill_kobj_path: path = '/devices/virtual/block/loop4' Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 RSP: 002b:00000000f5d750cc EFLAGS: 00000296 ORIG_RAX: 000000000000014e kobject: 'loop1' (00000000c9963d5f): kobject_uevent_env RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000200002c0 RDX: 000000000000005e RSI: 0000000000000000 RDI: 0000000000000000 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 kobject: 'loop1' (00000000c9963d5f): fill_kobj_path: path = '/devices/virtual/block/loop1' FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 kobject: 'loop2' (00000000fd01c20a): kobject_uevent_env CPU: 1 PID: 8218 Comm: syz-executor.1 Not tainted 5.0.0-rc6+ #71 kobject: 'loop2' (00000000fd01c20a): fill_kobj_path: path = '/devices/virtual/block/loop2' Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x172/0x1f0 lib/dump_stack.c:113 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0x1b lib/fault-inject.c:149 kobject: 'loop1' (00000000c9963d5f): kobject_uevent_env kobject: 'loop1' (00000000c9963d5f): fill_kobj_path: path = '/devices/virtual/block/loop1' __should_failslab+0x121/0x190 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1603 kobject: 'loop0' (000000008a1a76be): kobject_uevent_env slab_pre_alloc_hook mm/slab.h:423 [inline] slab_alloc mm/slab.c:3367 [inline] __do_kmalloc mm/slab.c:3709 [inline] __kmalloc_track_caller+0x2d8/0x740 mm/slab.c:3726 kobject: 'loop0' (000000008a1a76be): fill_kobj_path: path = '/devices/virtual/block/loop0' memdup_user+0x26/0xb0 mm/util.c:153 strndup_user+0x77/0xd0 mm/util.c:210 __do_sys_request_key security/keys/keyctl.c:175 [inline] __se_sys_request_key security/keys/keyctl.c:157 [inline] __ia32_sys_request_key+0x13b/0x430 security/keys/keyctl.c:157 kobject: 'loop3' (00000000059c58ce): kobject_uevent_env kobject: 'loop3' (00000000059c58ce): fill_kobj_path: path = '/devices/virtual/block/loop3' do_syscall_32_irqs_on arch/x86/entry/common.c:326 [inline] do_fast_syscall_32+0x281/0xc98 arch/x86/entry/common.c:397 entry_SYSENTER_compat+0x70/0x7f arch/x86/entry/entry_64_compat.S:139 RIP: 0023:0xf7f0b869 kobject: 'loop4' (00000000d2a695a8): kobject_uevent_env Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 RSP: 002b:00000000f5d070cc EFLAGS: 00000296 ORIG_RAX: 000000000000011f RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000020000180 RDX: 0000000000000000 RSI: 00000000fffffffe RDI: 0000000000000000 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 kobject: 'loop4' (00000000d2a695a8): fill_kobj_path: path = '/devices/virtual/block/loop4' R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 kobject: 'loop0' (000000008a1a76be): kobject_uevent_env FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 kobject: 'loop0' (000000008a1a76be): fill_kobj_path: path = '/devices/virtual/block/loop0' CPU: 1 PID: 8242 Comm: syz-executor.4 Not tainted 5.0.0-rc6+ #71 kobject: 'loop3' (00000000059c58ce): kobject_uevent_env Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 kobject: 'loop3' (00000000059c58ce): fill_kobj_path: path = '/devices/virtual/block/loop3' Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x172/0x1f0 lib/dump_stack.c:113 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0x1b lib/fault-inject.c:149 kobject: 'loop2' (00000000fd01c20a): kobject_uevent_env kobject: 'loop2' (00000000fd01c20a): fill_kobj_path: path = '/devices/virtual/block/loop2' __should_failslab+0x121/0x190 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1603 kobject: 'loop4' (00000000d2a695a8): kobject_uevent_env slab_pre_alloc_hook mm/slab.h:423 [inline] slab_alloc mm/slab.c:3367 [inline] kmem_cache_alloc+0x47/0x710 mm/slab.c:3541 xas_alloc+0x2df/0x3d0 lib/xarray.c:356 kobject: 'loop4' (00000000d2a695a8): fill_kobj_path: path = '/devices/virtual/block/loop4' xas_expand lib/xarray.c:562 [inline] xas_create+0x5b0/0xec0 lib/xarray.c:631 xas_create_range+0x198/0x5d0 lib/xarray.c:695 kobject: 'loop1' (00000000c9963d5f): kobject_uevent_env shmem_add_to_page_cache+0x6f3/0x1200 mm/shmem.c:608 kobject: 'loop1' (00000000c9963d5f): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop3' (00000000059c58ce): kobject_uevent_env shmem_getpage_gfp+0x6d7/0x3520 mm/shmem.c:1794 kobject: 'loop3' (00000000059c58ce): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop0' (000000008a1a76be): kobject_uevent_env kobject: 'loop0' (000000008a1a76be): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop2' (00000000fd01c20a): kobject_uevent_env kobject: 'loop2' (00000000fd01c20a): fill_kobj_path: path = '/devices/virtual/block/loop2' shmem_getpage mm/shmem.c:134 [inline] shmem_write_begin+0x105/0x1e0 mm/shmem.c:2385 generic_perform_write+0x231/0x530 mm/filemap.c:3208 kobject: 'loop4' (00000000d2a695a8): kobject_uevent_env __generic_file_write_iter+0x25e/0x630 mm/filemap.c:3333 kobject: 'loop4' (00000000d2a695a8): fill_kobj_path: path = '/devices/virtual/block/loop4' generic_file_write_iter+0x360/0x610 mm/filemap.c:3361 kobject: 'loop0' (000000008a1a76be): kobject_uevent_env call_write_iter include/linux/fs.h:1863 [inline] do_iter_readv_writev+0x5e0/0x8e0 fs/read_write.c:680 kobject: 'loop0' (000000008a1a76be): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop5' (000000001d122b75): kobject_uevent_env do_iter_write fs/read_write.c:956 [inline] do_iter_write+0x184/0x610 fs/read_write.c:937 kobject: 'loop5' (000000001d122b75): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop3' (00000000059c58ce): kobject_uevent_env compat_writev+0x1f6/0x3a0 fs/read_write.c:1270 kobject: 'loop3' (00000000059c58ce): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop2' (00000000fd01c20a): kobject_uevent_env do_compat_pwritev64+0x190/0x1c0 fs/read_write.c:1319 kobject: 'loop2' (00000000fd01c20a): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop4' (00000000d2a695a8): kobject_uevent_env __do_compat_sys_pwritev fs/read_write.c:1339 [inline] __se_compat_sys_pwritev fs/read_write.c:1333 [inline] __ia32_compat_sys_pwritev+0xc7/0x140 fs/read_write.c:1333 do_syscall_32_irqs_on arch/x86/entry/common.c:326 [inline] do_fast_syscall_32+0x281/0xc98 arch/x86/entry/common.c:397 entry_SYSENTER_compat+0x70/0x7f arch/x86/entry/entry_64_compat.S:139 kobject: 'loop4' (00000000d2a695a8): fill_kobj_path: path = '/devices/virtual/block/loop4' RIP: 0023:0xf7f79869 kobject: 'loop0' (000000008a1a76be): kobject_uevent_env Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 RSP: 002b:00000000f5d750cc EFLAGS: 00000296 ORIG_RAX: 000000000000014e RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000200002c0 RDX: 000000000000005e RSI: 0000000000000000 RDI: 0000000000000000 kobject: 'loop0' (000000008a1a76be): fill_kobj_path: path = '/devices/virtual/block/loop0' RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 kobject: 'loop5' (000000001d122b75): kobject_uevent_env R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 kobject: 'loop5' (000000001d122b75): fill_kobj_path: path = '/devices/virtual/block/loop5' R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 kobject: 'loop3' (00000000059c58ce): kobject_uevent_env CPU: 1 PID: 8241 Comm: syz-executor.1 Not tainted 5.0.0-rc6+ #71 kobject: 'loop3' (00000000059c58ce): fill_kobj_path: path = '/devices/virtual/block/loop3' Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x172/0x1f0 lib/dump_stack.c:113 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0x1b lib/fault-inject.c:149 kobject: 'loop5' (000000001d122b75): kobject_uevent_env kobject: 'loop5' (000000001d122b75): fill_kobj_path: path = '/devices/virtual/block/loop5' __should_failslab+0x121/0x190 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1603 kobject: 'loop2' (00000000fd01c20a): kobject_uevent_env slab_pre_alloc_hook mm/slab.h:423 [inline] slab_alloc mm/slab.c:3367 [inline] kmem_cache_alloc+0x2be/0x710 mm/slab.c:3541 kobject: 'loop2' (00000000fd01c20a): fill_kobj_path: path = '/devices/virtual/block/loop2' prepare_creds+0x3e/0x3c0 kernel/cred.c:254 install_process_keyring security/keys/process_keys.c:212 [inline] lookup_user_key+0x60a/0x1140 security/keys/process_keys.c:573 kobject: 'loop4' (00000000d2a695a8): kobject_uevent_env kobject: 'loop4' (00000000d2a695a8): fill_kobj_path: path = '/devices/virtual/block/loop4' __do_sys_request_key security/keys/keyctl.c:196 [inline] __se_sys_request_key security/keys/keyctl.c:157 [inline] __ia32_sys_request_key+0x1f0/0x430 security/keys/keyctl.c:157 kobject: 'loop0' (000000008a1a76be): kobject_uevent_env kobject: 'loop0' (000000008a1a76be): fill_kobj_path: path = '/devices/virtual/block/loop0' do_syscall_32_irqs_on arch/x86/entry/common.c:326 [inline] do_fast_syscall_32+0x281/0xc98 arch/x86/entry/common.c:397 kobject: 'loop3' (00000000059c58ce): kobject_uevent_env entry_SYSENTER_compat+0x70/0x7f arch/x86/entry/entry_64_compat.S:139 RIP: 0023:0xf7f0b869 Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 kobject: 'loop3' (00000000059c58ce): fill_kobj_path: path = '/devices/virtual/block/loop3' RSP: 002b:00000000f5d070cc EFLAGS: 00000296 ORIG_RAX: 000000000000011f RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000020000180 RDX: 0000000000000000 RSI: 00000000fffffffe RDI: 0000000000000000 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 kobject: 'loop2' (00000000fd01c20a): kobject_uevent_env R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 FAULT_INJECTION: forcing a failure. name fail_page_alloc, interval 1, probability 0, space 0, times 0 kobject: 'loop2' (00000000fd01c20a): fill_kobj_path: path = '/devices/virtual/block/loop2' CPU: 1 PID: 8263 Comm: syz-executor.4 Not tainted 5.0.0-rc6+ #71 kobject: 'loop5' (000000001d122b75): kobject_uevent_env Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 kobject: 'loop5' (000000001d122b75): fill_kobj_path: path = '/devices/virtual/block/loop5' Call Trace: kobject: 'loop4' (00000000d2a695a8): kobject_uevent_env __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x172/0x1f0 lib/dump_stack.c:113 kobject: 'loop4' (00000000d2a695a8): fill_kobj_path: path = '/devices/virtual/block/loop4' fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0x1b lib/fault-inject.c:149 kobject: 'loop3' (00000000059c58ce): kobject_uevent_env __should_fail_alloc_page mm/page_alloc.c:3152 [inline] should_fail_alloc_page+0x50/0x60 mm/page_alloc.c:3199 kobject: 'loop3' (00000000059c58ce): fill_kobj_path: path = '/devices/virtual/block/loop3' prepare_alloc_pages mm/page_alloc.c:4476 [inline] __alloc_pages_nodemask+0x1a1/0x710 mm/page_alloc.c:4523 kobject: 'loop0' (000000008a1a76be): kobject_uevent_env kobject: 'loop0' (000000008a1a76be): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop5' (000000001d122b75): kobject_uevent_env kobject: 'loop5' (000000001d122b75): fill_kobj_path: path = '/devices/virtual/block/loop5' alloc_pages_vma+0xdd/0x540 mm/mempolicy.c:2070 shmem_alloc_page+0xc0/0x180 mm/shmem.c:1456 kobject: 'loop2' (00000000fd01c20a): kobject_uevent_env kobject: 'loop2' (00000000fd01c20a): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop3' (00000000059c58ce): kobject_uevent_env kobject: 'loop3' (00000000059c58ce): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop4' (00000000d2a695a8): kobject_uevent_env kobject: 'loop4' (00000000d2a695a8): fill_kobj_path: path = '/devices/virtual/block/loop4' shmem_alloc_and_acct_page+0x165/0x970 mm/shmem.c:1481 kobject: 'loop2' (00000000fd01c20a): kobject_uevent_env shmem_getpage_gfp+0x449/0x3520 mm/shmem.c:1758 kobject: 'loop2' (00000000fd01c20a): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop3' (00000000059c58ce): kobject_uevent_env kobject: 'loop3' (00000000059c58ce): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop5' (000000001d122b75): kobject_uevent_env shmem_getpage mm/shmem.c:134 [inline] shmem_write_begin+0x105/0x1e0 mm/shmem.c:2385 generic_perform_write+0x231/0x530 mm/filemap.c:3208 kobject: 'loop5' (000000001d122b75): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop0' (000000008a1a76be): kobject_uevent_env kobject: 'loop0' (000000008a1a76be): fill_kobj_path: path = '/devices/virtual/block/loop0' __generic_file_write_iter+0x25e/0x630 mm/filemap.c:3333 generic_file_write_iter+0x360/0x610 mm/filemap.c:3361 kobject: 'loop2' (00000000fd01c20a): kobject_uevent_env kobject: 'loop2' (00000000fd01c20a): fill_kobj_path: path = '/devices/virtual/block/loop2' call_write_iter include/linux/fs.h:1863 [inline] do_iter_readv_writev+0x5e0/0x8e0 fs/read_write.c:680 kobject: 'loop4' (00000000d2a695a8): kobject_uevent_env kobject: 'loop4' (00000000d2a695a8): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop5' (000000001d122b75): kobject_uevent_env kobject: 'loop5' (000000001d122b75): fill_kobj_path: path = '/devices/virtual/block/loop5' do_iter_write fs/read_write.c:956 [inline] do_iter_write+0x184/0x610 fs/read_write.c:937 kobject: 'loop3' (00000000059c58ce): kobject_uevent_env kobject: 'loop3' (00000000059c58ce): fill_kobj_path: path = '/devices/virtual/block/loop3' compat_writev+0x1f6/0x3a0 fs/read_write.c:1270 kobject: 'loop2' (00000000fd01c20a): kobject_uevent_env kobject: 'loop2' (00000000fd01c20a): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop0' (000000008a1a76be): kobject_uevent_env do_compat_pwritev64+0x190/0x1c0 fs/read_write.c:1319 kobject: 'loop0' (000000008a1a76be): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop3' (00000000059c58ce): kobject_uevent_env __do_compat_sys_pwritev fs/read_write.c:1339 [inline] __se_compat_sys_pwritev fs/read_write.c:1333 [inline] __ia32_compat_sys_pwritev+0xc7/0x140 fs/read_write.c:1333 do_syscall_32_irqs_on arch/x86/entry/common.c:326 [inline] do_fast_syscall_32+0x281/0xc98 arch/x86/entry/common.c:397 kobject: 'loop3' (00000000059c58ce): fill_kobj_path: path = '/devices/virtual/block/loop3' entry_SYSENTER_compat+0x70/0x7f arch/x86/entry/entry_64_compat.S:139 RIP: 0023:0xf7f79869 kobject: 'loop5' (000000001d122b75): kobject_uevent_env Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 RSP: 002b:00000000f5d750cc EFLAGS: 00000296 ORIG_RAX: 000000000000014e kobject: 'loop5' (000000001d122b75): fill_kobj_path: path = '/devices/virtual/block/loop5' RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000200002c0 kobject: 'loop4' (00000000d2a695a8): kobject_uevent_env RDX: 000000000000005e RSI: 0000000000000000 RDI: 0000000000000000 kobject: 'loop4' (00000000d2a695a8): fill_kobj_path: path = '/devices/virtual/block/loop4' RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 kobject: 'loop2' (00000000fd01c20a): kobject_uevent_env R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 kobject: 'loop2' (00000000fd01c20a): fill_kobj_path: path = '/devices/virtual/block/loop2' FAULT_INJECTION: forcing a failure. name fail_page_alloc, interval 1, probability 0, space 0, times 0 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 kobject: 'loop0' (000000008a1a76be): kobject_uevent_env kobject: 'loop0' (000000008a1a76be): fill_kobj_path: path = '/devices/virtual/block/loop0' CPU: 1 PID: 8288 Comm: syz-executor.1 Not tainted 5.0.0-rc6+ #71 kobject: 'loop3' (00000000059c58ce): kobject_uevent_env Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x172/0x1f0 lib/dump_stack.c:113 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0x1b lib/fault-inject.c:149 __should_failslab+0x121/0x190 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1603 kobject: 'loop3' (00000000059c58ce): fill_kobj_path: path = '/devices/virtual/block/loop3' slab_pre_alloc_hook mm/slab.h:423 [inline] slab_alloc mm/slab.c:3367 [inline] kmem_cache_alloc+0x2be/0x710 mm/slab.c:3541 kobject: 'loop5' (000000001d122b75): kobject_uevent_env kmem_cache_zalloc include/linux/slab.h:730 [inline] key_alloc+0x428/0x1100 security/keys/key.c:280 kobject: 'loop5' (000000001d122b75): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop2' (00000000fd01c20a): kobject_uevent_env kobject: 'loop2' (00000000fd01c20a): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop4' (00000000d2a695a8): kobject_uevent_env keyring_alloc+0x4d/0xc0 security/keys/keyring.c:503 install_process_keyring_to_cred.part.0+0x87/0x100 security/keys/process_keys.c:191 kobject: 'loop4' (00000000d2a695a8): fill_kobj_path: path = '/devices/virtual/block/loop4' install_process_keyring_to_cred include/linux/key.h:259 [inline] install_process_keyring security/keys/process_keys.c:216 [inline] lookup_user_key+0xb79/0x1140 security/keys/process_keys.c:573 kobject: 'loop3' (00000000059c58ce): kobject_uevent_env kobject: 'loop3' (00000000059c58ce): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop0' (000000008a1a76be): kobject_uevent_env kobject: 'loop0' (000000008a1a76be): fill_kobj_path: path = '/devices/virtual/block/loop0' __do_sys_request_key security/keys/keyctl.c:196 [inline] __se_sys_request_key security/keys/keyctl.c:157 [inline] __ia32_sys_request_key+0x1f0/0x430 security/keys/keyctl.c:157 kobject: 'loop2' (00000000fd01c20a): kobject_uevent_env kobject: 'loop2' (00000000fd01c20a): fill_kobj_path: path = '/devices/virtual/block/loop2' do_syscall_32_irqs_on arch/x86/entry/common.c:326 [inline] do_fast_syscall_32+0x281/0xc98 arch/x86/entry/common.c:397 entry_SYSENTER_compat+0x70/0x7f arch/x86/entry/entry_64_compat.S:139 kobject: 'loop4' (00000000d2a695a8): kobject_uevent_env RIP: 0023:0xf7f0b869 kobject: 'loop4' (00000000d2a695a8): fill_kobj_path: path = '/devices/virtual/block/loop4' Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 kobject: 'loop5' (000000001d122b75): kobject_uevent_env RSP: 002b:00000000f5d070cc EFLAGS: 00000296 ORIG_RAX: 000000000000011f kobject: 'loop5' (000000001d122b75): fill_kobj_path: path = '/devices/virtual/block/loop5' RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000020000180 kobject: 'loop3' (00000000059c58ce): kobject_uevent_env RDX: 0000000000000000 RSI: 00000000fffffffe RDI: 0000000000000000 kobject: 'loop3' (00000000059c58ce): fill_kobj_path: path = '/devices/virtual/block/loop3' RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 CPU: 1 PID: 8287 Comm: syz-executor.4 Not tainted 5.0.0-rc6+ #71 kobject: 'loop0' (000000008a1a76be): kobject_uevent_env Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 kobject: 'loop0' (000000008a1a76be): fill_kobj_path: path = '/devices/virtual/block/loop0' Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x172/0x1f0 lib/dump_stack.c:113 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0x1b lib/fault-inject.c:149 kobject: 'loop3' (00000000059c58ce): kobject_uevent_env kobject: 'loop3' (00000000059c58ce): fill_kobj_path: path = '/devices/virtual/block/loop3' __should_fail_alloc_page mm/page_alloc.c:3152 [inline] should_fail_alloc_page+0x50/0x60 mm/page_alloc.c:3199 kobject: 'loop5' (000000001d122b75): kobject_uevent_env prepare_alloc_pages mm/page_alloc.c:4476 [inline] __alloc_pages_nodemask+0x1a1/0x710 mm/page_alloc.c:4523 kobject: 'loop5' (000000001d122b75): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop0' (000000008a1a76be): kobject_uevent_env kobject: 'loop0' (000000008a1a76be): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop4' (00000000d2a695a8): kobject_uevent_env alloc_pages_vma+0xdd/0x540 mm/mempolicy.c:2070 shmem_alloc_page+0xc0/0x180 mm/shmem.c:1456 kobject: 'loop4' (00000000d2a695a8): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop2' (00000000fd01c20a): kobject_uevent_env kobject: 'loop2' (00000000fd01c20a): fill_kobj_path: path = '/devices/virtual/block/loop2' shmem_alloc_and_acct_page+0x165/0x970 mm/shmem.c:1481 kobject: 'loop3' (00000000059c58ce): kobject_uevent_env shmem_getpage_gfp+0x449/0x3520 mm/shmem.c:1758 kobject: 'loop3' (00000000059c58ce): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop0' (000000008a1a76be): kobject_uevent_env kobject: 'loop0' (000000008a1a76be): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop5' (000000001d122b75): kobject_uevent_env shmem_getpage mm/shmem.c:134 [inline] shmem_write_begin+0x105/0x1e0 mm/shmem.c:2385 kobject: 'loop5' (000000001d122b75): fill_kobj_path: path = '/devices/virtual/block/loop5' generic_perform_write+0x231/0x530 mm/filemap.c:3208 kobject: 'loop2' (00000000fd01c20a): kobject_uevent_env kobject: 'loop2' (00000000fd01c20a): fill_kobj_path: path = '/devices/virtual/block/loop2' __generic_file_write_iter+0x25e/0x630 mm/filemap.c:3333 kobject: 'loop4' (00000000d2a695a8): kobject_uevent_env kobject: 'loop4' (00000000d2a695a8): fill_kobj_path: path = '/devices/virtual/block/loop4' generic_file_write_iter+0x360/0x610 mm/filemap.c:3361 kobject: 'loop0' (000000008a1a76be): kobject_uevent_env call_write_iter include/linux/fs.h:1863 [inline] do_iter_readv_writev+0x5e0/0x8e0 fs/read_write.c:680 kobject: 'loop0' (000000008a1a76be): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop3' (00000000059c58ce): kobject_uevent_env kobject: 'loop3' (00000000059c58ce): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop4' (00000000d2a695a8): kobject_uevent_env do_iter_write fs/read_write.c:956 [inline] do_iter_write+0x184/0x610 fs/read_write.c:937 kobject: 'loop4' (00000000d2a695a8): fill_kobj_path: path = '/devices/virtual/block/loop4' compat_writev+0x1f6/0x3a0 fs/read_write.c:1270 kobject: 'loop5' (000000001d122b75): kobject_uevent_env kobject: 'loop5' (000000001d122b75): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop0' (000000008a1a76be): kobject_uevent_env do_compat_pwritev64+0x190/0x1c0 fs/read_write.c:1319 kobject: 'loop0' (000000008a1a76be): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop2' (00000000fd01c20a): kobject_uevent_env __do_compat_sys_pwritev fs/read_write.c:1339 [inline] __se_compat_sys_pwritev fs/read_write.c:1333 [inline] __ia32_compat_sys_pwritev+0xc7/0x140 fs/read_write.c:1333 do_syscall_32_irqs_on arch/x86/entry/common.c:326 [inline] do_fast_syscall_32+0x281/0xc98 arch/x86/entry/common.c:397 kobject: 'loop2' (00000000fd01c20a): fill_kobj_path: path = '/devices/virtual/block/loop2' entry_SYSENTER_compat+0x70/0x7f arch/x86/entry/entry_64_compat.S:139 RIP: 0023:0xf7f79869 kobject: 'loop4' (00000000d2a695a8): kobject_uevent_env Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 kobject: 'loop4' (00000000d2a695a8): fill_kobj_path: path = '/devices/virtual/block/loop4' RSP: 002b:00000000f5d750cc EFLAGS: 00000296 ORIG_RAX: 000000000000014e RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000200002c0 RDX: 000000000000005e RSI: 0000000000000000 RDI: 0000000000000000 kobject: 'loop3' (00000000059c58ce): kobject_uevent_env RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 kobject: 'loop3' (00000000059c58ce): fill_kobj_path: path = '/devices/virtual/block/loop3' CPU: 1 PID: 8314 Comm: syz-executor.1 Not tainted 5.0.0-rc6+ #71 kobject: 'loop5' (000000001d122b75): kobject_uevent_env Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x172/0x1f0 lib/dump_stack.c:113 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0x1b lib/fault-inject.c:149 kobject: 'loop5' (000000001d122b75): fill_kobj_path: path = '/devices/virtual/block/loop5' __should_failslab+0x121/0x190 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1603 slab_pre_alloc_hook mm/slab.h:423 [inline] slab_alloc mm/slab.c:3367 [inline] __do_kmalloc mm/slab.c:3709 [inline] __kmalloc_track_caller+0x2d8/0x740 mm/slab.c:3726 kmemdup+0x27/0x60 mm/util.c:111 kmemdup include/linux/string.h:425 [inline] key_alloc+0x481/0x1100 security/keys/key.c:285 kobject: 'loop2' (00000000fd01c20a): kobject_uevent_env kobject: 'loop2' (00000000fd01c20a): fill_kobj_path: path = '/devices/virtual/block/loop2' keyring_alloc+0x4d/0xc0 security/keys/keyring.c:503 kobject: 'loop0' (000000008a1a76be): kobject_uevent_env install_process_keyring_to_cred.part.0+0x87/0x100 security/keys/process_keys.c:191 install_process_keyring_to_cred include/linux/key.h:259 [inline] install_process_keyring security/keys/process_keys.c:216 [inline] lookup_user_key+0xb79/0x1140 security/keys/process_keys.c:573 kobject: 'loop0' (000000008a1a76be): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop5' (000000001d122b75): kobject_uevent_env __do_sys_request_key security/keys/keyctl.c:196 [inline] __se_sys_request_key security/keys/keyctl.c:157 [inline] __ia32_sys_request_key+0x1f0/0x430 security/keys/keyctl.c:157 kobject: 'loop5' (000000001d122b75): fill_kobj_path: path = '/devices/virtual/block/loop5' do_syscall_32_irqs_on arch/x86/entry/common.c:326 [inline] do_fast_syscall_32+0x281/0xc98 arch/x86/entry/common.c:397 entry_SYSENTER_compat+0x70/0x7f arch/x86/entry/entry_64_compat.S:139 kobject: 'loop4' (00000000d2a695a8): kobject_uevent_env RIP: 0023:0xf7f0b869 Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 RSP: 002b:00000000f5d070cc EFLAGS: 00000296 ORIG_RAX: 000000000000011f kobject: 'loop4' (00000000d2a695a8): fill_kobj_path: path = '/devices/virtual/block/loop4' RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000020000180 RDX: 0000000000000000 RSI: 00000000fffffffe RDI: 0000000000000000 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 kobject: 'loop2' (00000000fd01c20a): kobject_uevent_env CPU: 1 PID: 8334 Comm: syz-executor.1 Not tainted 5.0.0-rc6+ #71 kobject: 'loop2' (00000000fd01c20a): fill_kobj_path: path = '/devices/virtual/block/loop2' Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 kobject: 'loop3' (00000000059c58ce): kobject_uevent_env Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x172/0x1f0 lib/dump_stack.c:113 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0x1b lib/fault-inject.c:149 kobject: 'loop3' (00000000059c58ce): fill_kobj_path: path = '/devices/virtual/block/loop3' __should_failslab+0x121/0x190 mm/failslab.c:32 kobject: 'loop5' (000000001d122b75): kobject_uevent_env should_failslab+0x9/0x14 mm/slab_common.c:1603 slab_pre_alloc_hook mm/slab.h:423 [inline] slab_alloc mm/slab.c:3367 [inline] __do_kmalloc mm/slab.c:3709 [inline] __kmalloc_track_caller+0x2d8/0x740 mm/slab.c:3726 kobject: 'loop5' (000000001d122b75): fill_kobj_path: path = '/devices/virtual/block/loop5' kmemdup+0x27/0x60 mm/util.c:111 kmemdup include/linux/string.h:425 [inline] key_alloc+0x481/0x1100 security/keys/key.c:285 kobject: 'loop0' (000000008a1a76be): kobject_uevent_env kobject: 'loop0' (000000008a1a76be): fill_kobj_path: path = '/devices/virtual/block/loop0' keyring_alloc+0x4d/0xc0 security/keys/keyring.c:503 kobject: 'loop2' (00000000fd01c20a): kobject_uevent_env install_process_keyring_to_cred.part.0+0x87/0x100 security/keys/process_keys.c:191 install_process_keyring_to_cred include/linux/key.h:259 [inline] install_process_keyring security/keys/process_keys.c:216 [inline] lookup_user_key+0xb79/0x1140 security/keys/process_keys.c:573 kobject: 'loop2' (00000000fd01c20a): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop5' (000000001d122b75): kobject_uevent_env __do_sys_request_key security/keys/keyctl.c:196 [inline] __se_sys_request_key security/keys/keyctl.c:157 [inline] __ia32_sys_request_key+0x1f0/0x430 security/keys/keyctl.c:157 kobject: 'loop5' (000000001d122b75): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop2' (00000000fd01c20a): kobject_uevent_env do_syscall_32_irqs_on arch/x86/entry/common.c:326 [inline] do_fast_syscall_32+0x281/0xc98 arch/x86/entry/common.c:397 kobject: 'loop2' (00000000fd01c20a): fill_kobj_path: path = '/devices/virtual/block/loop2' entry_SYSENTER_compat+0x70/0x7f arch/x86/entry/entry_64_compat.S:139 RIP: 0023:0xf7f0b869 Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 kobject: 'loop3' (00000000059c58ce): kobject_uevent_env RSP: 002b:00000000f5d070cc EFLAGS: 00000296 ORIG_RAX: 000000000000011f RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000020000180 RDX: 0000000000000000 RSI: 00000000fffffffe RDI: 0000000000000000 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 kobject: 'loop3' (00000000059c58ce): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop5' (000000001d122b75): kobject_uevent_env kobject: 'loop5' (000000001d122b75): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop2' (00000000fd01c20a): kobject_uevent_env kobject: 'loop2' (00000000fd01c20a): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop0' (000000008a1a76be): kobject_uevent_env kobject: 'loop0' (000000008a1a76be): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop4' (00000000d2a695a8): kobject_uevent_env kobject: 'loop4' (00000000d2a695a8): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop5' (000000001d122b75): kobject_uevent_env kobject: 'loop5' (000000001d122b75): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop2' (00000000fd01c20a): kobject_uevent_env kobject: 'loop2' (00000000fd01c20a): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop5' (000000001d122b75): kobject_uevent_env kobject: 'loop5' (000000001d122b75): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop4' (00000000d2a695a8): kobject_uevent_env kobject: 'loop4' (00000000d2a695a8): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop5' (000000001d122b75): kobject_uevent_env kobject: 'loop5' (000000001d122b75): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop2' (00000000fd01c20a): kobject_uevent_env kobject: 'loop2' (00000000fd01c20a): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop0' (000000008a1a76be): kobject_uevent_env kobject: 'loop0' (000000008a1a76be): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop2' (00000000fd01c20a): kobject_uevent_env kobject: 'loop2' (00000000fd01c20a): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop5' (000000001d122b75): kobject_uevent_env kobject: 'loop5' (000000001d122b75): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop2' (00000000fd01c20a): kobject_uevent_env kobject: 'loop2' (00000000fd01c20a): fill_kobj_path: path = '/devices/virtual/block/loop2'