block nbd3: Receive control failed (result -107)
======================================================
kobject: 'loop4' (00000000535878fd): kobject_uevent_env
WARNING: possible circular locking dependency detected
4.19.91-syzkaller #0 Not tainted
------------------------------------------------------
kobject: 'loop4' (00000000535878fd): fill_kobj_path: path = '/devices/virtual/block/loop4'
kworker/u5:1/7974 is trying to acquire lock:
00000000207c6a5e (&nbd->config_lock){+.+.}, at: refcount_dec_and_mutex_lock lib/refcount.c:311 [inline]
00000000207c6a5e (&nbd->config_lock){+.+.}, at: refcount_dec_and_mutex_lock+0x52/0x80 lib/refcount.c:306

but task is already holding lock:
00000000c2f1705c ((work_completion)(&args->work)){+.+.}, at: process_one_work+0x8b4/0x1750 kernel/workqueue.c:2128

which lock already depends on the new lock.


the existing dependency chain (in reverse order) is:

-> #2 ((work_completion)(&args->work)){+.+.}:
       process_one_work+0x90f/0x1750 kernel/workqueue.c:2129
kobject: 'loop5' (00000000df016b01): kobject_uevent_env
       worker_thread+0x98/0xe40 kernel/workqueue.c:2296
       kthread+0x354/0x420 kernel/kthread.c:246
       ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415

-> #1 ((wq_completion)"knbd%d-recv"nbd->index){+.+.}:
       flush_workqueue+0x126/0x14b0 kernel/workqueue.c:2661
       drain_workqueue+0x1b4/0x470 kernel/workqueue.c:2826
       destroy_workqueue+0x74/0x700 kernel/workqueue.c:4170
       nbd_config_put+0x3cf/0x860 drivers/block/nbd.c:1161
kobject: 'loop5' (00000000df016b01): fill_kobj_path: path = '/devices/virtual/block/loop5'
       nbd_release+0xf6/0x140 drivers/block/nbd.c:1436
       __blkdev_put+0x4d1/0x810 fs/block_dev.c:1804
       blkdev_put+0x98/0x560 fs/block_dev.c:1866
       blkdev_close+0x8b/0xb0 fs/block_dev.c:1873
       __fput+0x2dd/0x8b0 fs/file_table.c:278
       ____fput+0x16/0x20 fs/file_table.c:309
IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xdf3/0xef0 net/netfilter/ipvs/ip_vs_ctl.c:2451
       task_work_run+0x145/0x1c0 kernel/task_work.c:113
       tracehook_notify_resume include/linux/tracehook.h:193 [inline]
       exit_to_usermode_loop+0x273/0x2c0 arch/x86/entry/common.c:167
       prepare_exit_to_usermode arch/x86/entry/common.c:198 [inline]
       syscall_return_slowpath arch/x86/entry/common.c:271 [inline]
       do_syscall_64+0x53d/0x620 arch/x86/entry/common.c:296
QAT: Device 0 not found
       entry_SYSCALL_64_after_hwframe+0x49/0xbe

-> #0 (&nbd->config_lock){+.+.}:
kobject: 'loop0' (000000001759d7b5): kobject_uevent_env
       lock_acquire+0x16f/0x3f0 kernel/locking/lockdep.c:3903
kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0'
       __mutex_lock_common kernel/locking/mutex.c:925 [inline]
       __mutex_lock+0xf7/0x1300 kernel/locking/mutex.c:1072
       mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:1087
kobject: 'loop3' (00000000401d6b46): kobject_uevent_env
       refcount_dec_and_mutex_lock lib/refcount.c:311 [inline]
       refcount_dec_and_mutex_lock+0x52/0x80 lib/refcount.c:306
       nbd_config_put+0x31/0x860 drivers/block/nbd.c:1139
       recv_work+0x19b/0x200 drivers/block/nbd.c:745
kobject: 'loop3' (00000000401d6b46): fill_kobj_path: path = '/devices/virtual/block/loop3'
       process_one_work+0x989/0x1750 kernel/workqueue.c:2153
       worker_thread+0x98/0xe40 kernel/workqueue.c:2296
       kthread+0x354/0x420 kernel/kthread.c:246
kobject: 'loop4' (00000000535878fd): kobject_uevent_env
       ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415

other info that might help us debug this:

Chain exists of:
  &nbd->config_lock --> (wq_completion)"knbd%d-recv"nbd->index --> (work_completion)(&args->work)

 Possible unsafe locking scenario:

       CPU0                    CPU1
       ----                    ----
kobject: 'loop4' (00000000535878fd): fill_kobj_path: path = '/devices/virtual/block/loop4'
  lock((work_completion)(&args->work));
                               lock((wq_completion)"knbd%d-recv"nbd->index);
                               lock((work_completion)(&args->work));
  lock(&nbd->config_lock);

 *** DEADLOCK ***

2 locks held by kworker/u5:1/7974:
 #0: 000000006cfd2f86 ((wq_completion)"knbd%d-recv"nbd->index){+.+.}, at: __write_once_size include/linux/compiler.h:220 [inline]
 #0: 000000006cfd2f86 ((wq_completion)"knbd%d-recv"nbd->index){+.+.}, at: arch_atomic64_set arch/x86/include/asm/atomic64_64.h:34 [inline]
 #0: 000000006cfd2f86 ((wq_completion)"knbd%d-recv"nbd->index){+.+.}, at: atomic64_set include/asm-generic/atomic-instrumented.h:40 [inline]
 #0: 000000006cfd2f86 ((wq_completion)"knbd%d-recv"nbd->index){+.+.}, at: atomic_long_set include/asm-generic/atomic-long.h:59 [inline]
 #0: 000000006cfd2f86 ((wq_completion)"knbd%d-recv"nbd->index){+.+.}, at: set_work_data kernel/workqueue.c:617 [inline]
 #0: 000000006cfd2f86 ((wq_completion)"knbd%d-recv"nbd->index){+.+.}, at: set_work_pool_and_clear_pending kernel/workqueue.c:644 [inline]
 #0: 000000006cfd2f86 ((wq_completion)"knbd%d-recv"nbd->index){+.+.}, at: process_one_work+0x87e/0x1750 kernel/workqueue.c:2124
kobject: 'loop0' (000000001759d7b5): kobject_uevent_env
 #1: 00000000c2f1705c ((work_completion)(&args->work)){+.+.}, at: process_one_work+0x8b4/0x1750 kernel/workqueue.c:2128

stack backtrace:
CPU: 0 PID: 7974 Comm: kworker/u5:1 Not tainted 4.19.91-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Workqueue: knbd3-recv recv_work
kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0'
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x197/0x210 lib/dump_stack.c:118
 print_circular_bug.isra.0.cold+0x1cc/0x28f kernel/locking/lockdep.c:1221
 check_prev_add kernel/locking/lockdep.c:1861 [inline]
 check_prevs_add kernel/locking/lockdep.c:1974 [inline]
 validate_chain kernel/locking/lockdep.c:2415 [inline]
 __lock_acquire+0x2e19/0x49c0 kernel/locking/lockdep.c:3411
kobject: 'loop3' (00000000401d6b46): kobject_uevent_env
kobject: 'loop3' (00000000401d6b46): fill_kobj_path: path = '/devices/virtual/block/loop3'
kobject: 'loop1' (000000007195df1b): kobject_uevent_env
kobject: 'loop1' (000000007195df1b): fill_kobj_path: path = '/devices/virtual/block/loop1'
 lock_acquire+0x16f/0x3f0 kernel/locking/lockdep.c:3903
 __mutex_lock_common kernel/locking/mutex.c:925 [inline]
 __mutex_lock+0xf7/0x1300 kernel/locking/mutex.c:1072
QAT: Device 0 not found
kobject: 'loop4' (00000000535878fd): kobject_uevent_env
 mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:1087
 refcount_dec_and_mutex_lock lib/refcount.c:311 [inline]
 refcount_dec_and_mutex_lock+0x52/0x80 lib/refcount.c:306
 nbd_config_put+0x31/0x860 drivers/block/nbd.c:1139
QAT: Device 0 not found
 recv_work+0x19b/0x200 drivers/block/nbd.c:745
kobject: 'loop4' (00000000535878fd): fill_kobj_path: path = '/devices/virtual/block/loop4'
 process_one_work+0x989/0x1750 kernel/workqueue.c:2153
 worker_thread+0x98/0xe40 kernel/workqueue.c:2296
kobject: 'loop5' (00000000df016b01): kobject_uevent_env
 kthread+0x354/0x420 kernel/kthread.c:246
QAT: Device 0 not found
 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415
kobject: 'loop5' (00000000df016b01): fill_kobj_path: path = '/devices/virtual/block/loop5'
kobject: 'nbd3' (00000000234763e6): kobject_uevent_env
kobject: 'nbd3' (00000000234763e6): fill_kobj_path: path = '/devices/virtual/block/nbd3'
block nbd3: shutting down sockets
kobject: 'loop0' (000000001759d7b5): kobject_uevent_env
kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0'
kobject: 'loop3' (00000000401d6b46): kobject_uevent_env
kobject: 'loop3' (00000000401d6b46): fill_kobj_path: path = '/devices/virtual/block/loop3'
kobject: 'loop1' (000000007195df1b): kobject_uevent_env
kobject: 'loop1' (000000007195df1b): fill_kobj_path: path = '/devices/virtual/block/loop1'
kobject: 'loop2' (00000000a8e72e17): kobject_uevent_env
QAT: Device 0 not found
kobject: 'loop2' (00000000a8e72e17): fill_kobj_path: path = '/devices/virtual/block/loop2'
QAT: Device 0 not found
kobject: 'loop4' (00000000535878fd): kobject_uevent_env
kobject: 'loop4' (00000000535878fd): fill_kobj_path: path = '/devices/virtual/block/loop4'
kobject: 'loop0' (000000001759d7b5): kobject_uevent_env
QAT: Device 0 not found
kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0'
QAT: Device 0 not found
kobject: 'loop3' (00000000401d6b46): kobject_uevent_env
kobject: 'loop3' (00000000401d6b46): fill_kobj_path: path = '/devices/virtual/block/loop3'
kobject: 'loop1' (000000007195df1b): kobject_uevent_env
QAT: failed to copy from user cfg_data.
kobject: 'loop1' (000000007195df1b): fill_kobj_path: path = '/devices/virtual/block/loop1'
kobject: 'loop4' (00000000535878fd): kobject_uevent_env
kobject: 'loop4' (00000000535878fd): fill_kobj_path: path = '/devices/virtual/block/loop4'
kobject: 'loop5' (00000000df016b01): kobject_uevent_env
QAT: failed to copy from user cfg_data.
kobject: 'loop5' (00000000df016b01): fill_kobj_path: path = '/devices/virtual/block/loop5'
QAT: Device 0 not found
kobject: 'loop4' (00000000535878fd): kobject_uevent_env
kobject: 'loop4' (00000000535878fd): fill_kobj_path: path = '/devices/virtual/block/loop4'
kobject: 'loop1' (000000007195df1b): kobject_uevent_env
kobject: 'loop1' (000000007195df1b): fill_kobj_path: path = '/devices/virtual/block/loop1'
kobject: 'loop0' (000000001759d7b5): kobject_uevent_env
kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0'
kobject: 'loop4' (00000000535878fd): kobject_uevent_env
kobject: 'loop4' (00000000535878fd): fill_kobj_path: path = '/devices/virtual/block/loop4'
kobject: 'loop0' (000000001759d7b5): kobject_uevent_env
kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0'
kobject: 'loop3' (00000000401d6b46): kobject_uevent_env
kobject: 'loop3' (00000000401d6b46): fill_kobj_path: path = '/devices/virtual/block/loop3'
kobject: 'loop5' (00000000df016b01): kobject_uevent_env
kobject: 'loop5' (00000000df016b01): fill_kobj_path: path = '/devices/virtual/block/loop5'
kobject: 'loop2' (00000000a8e72e17): kobject_uevent_env
QAT: failed to copy from user cfg_data.
kobject: 'loop2' (00000000a8e72e17): fill_kobj_path: path = '/devices/virtual/block/loop2'
QAT: Device 0 not found
kobject: 'loop0' (000000001759d7b5): kobject_uevent_env
kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0'
kobject: 'loop3' (00000000401d6b46): kobject_uevent_env
QAT: Device 0 not found
kobject: 'loop3' (00000000401d6b46): fill_kobj_path: path = '/devices/virtual/block/loop3'
QAT: failed to copy from user cfg_data.
kobject: 'loop4' (00000000535878fd): kobject_uevent_env
kobject: 'loop4' (00000000535878fd): fill_kobj_path: path = '/devices/virtual/block/loop4'
QAT: failed to copy from user cfg_data.
kobject: 'loop1' (000000007195df1b): kobject_uevent_env
kobject: 'loop1' (000000007195df1b): fill_kobj_path: path = '/devices/virtual/block/loop1'
kobject: 'loop2' (00000000a8e72e17): kobject_uevent_env
kobject: 'loop2' (00000000a8e72e17): fill_kobj_path: path = '/devices/virtual/block/loop2'
QAT: Device 0 not found
kobject: 'loop1' (000000007195df1b): kobject_uevent_env
kobject: 'loop1' (000000007195df1b): fill_kobj_path: path = '/devices/virtual/block/loop1'
QAT: failed to copy from user cfg_data.
kobject: 'loop5' (00000000df016b01): kobject_uevent_env
kobject: 'loop5' (00000000df016b01): fill_kobj_path: path = '/devices/virtual/block/loop5'
QAT: Device 0 not found
kobject: 'loop0' (000000001759d7b5): kobject_uevent_env
kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0'
QAT: failed to copy from user cfg_data.
QAT: Device 0 not found
kobject: 'loop3' (00000000401d6b46): kobject_uevent_env
kobject: 'loop3' (00000000401d6b46): fill_kobj_path: path = '/devices/virtual/block/loop3'
kobject: 'loop4' (00000000535878fd): kobject_uevent_env
kobject: 'loop4' (00000000535878fd): fill_kobj_path: path = '/devices/virtual/block/loop4'
QAT: Device 0 not found
kobject: 'loop2' (00000000a8e72e17): kobject_uevent_env
kobject: 'loop2' (00000000a8e72e17): fill_kobj_path: path = '/devices/virtual/block/loop2'
kobject: 'loop3' (00000000401d6b46): kobject_uevent_env
kobject: 'loop3' (00000000401d6b46): fill_kobj_path: path = '/devices/virtual/block/loop3'
kobject: 'loop4' (00000000535878fd): kobject_uevent_env
kobject: 'loop4' (00000000535878fd): fill_kobj_path: path = '/devices/virtual/block/loop4'
kobject: 'loop0' (000000001759d7b5): kobject_uevent_env
kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0'
kobject: 'loop2' (00000000a8e72e17): kobject_uevent_env
kobject: 'loop2' (00000000a8e72e17): fill_kobj_path: path = '/devices/virtual/block/loop2'
kobject: 'loop0' (000000001759d7b5): kobject_uevent_env
kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0'
kobject: 'loop0' (000000001759d7b5): kobject_uevent_env
kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0'
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
kobject: 'loop3' (00000000401d6b46): kobject_uevent_env
QAT: failed to copy from user cfg_data.
kobject: 'loop3' (00000000401d6b46): fill_kobj_path: path = '/devices/virtual/block/loop3'
CPU: 0 PID: 22672 Comm: syz-executor.2 Not tainted 4.19.91-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x197/0x210 lib/dump_stack.c:118
 fail_dump lib/fault-inject.c:51 [inline]
 should_fail.cold+0xa/0x1b lib/fault-inject.c:149
 __should_failslab+0x121/0x190 mm/failslab.c:32
 should_failslab+0x9/0x14 mm/slab_common.c:1557
 slab_pre_alloc_hook mm/slab.h:424 [inline]
 slab_alloc_node mm/slab.c:3304 [inline]
 kmem_cache_alloc_node+0x26c/0x710 mm/slab.c:3647
 alloc_task_struct_node kernel/fork.c:157 [inline]
 dup_task_struct kernel/fork.c:797 [inline]
 copy_process.part.0+0x1ce0/0x7a30 kernel/fork.c:1727
 copy_process kernel/fork.c:1684 [inline]
 _do_fork+0x257/0xfd0 kernel/fork.c:2197
QAT: Device 0 not found
 __do_sys_clone kernel/fork.c:2304 [inline]
 __se_sys_clone kernel/fork.c:2298 [inline]
 __x64_sys_clone+0xbf/0x150 kernel/fork.c:2298
 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x45a919
Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
RSP: 002b:00007fb41d7d9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
RAX: ffffffffffffffda RBX: 00007fb41d7d9c90 RCX: 000000000045a919
RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000
RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb41d7da6d4
R13: 00000000004c1007 R14: 00000000004d4d48 R15: 0000000000000003
net_ratelimit: 3 callbacks suppressed
protocol 88fb is buggy, dev hsr_slave_0
kobject: 'loop5' (00000000df016b01): kobject_uevent_env
protocol 88fb is buggy, dev hsr_slave_1
kobject: 'loop5' (00000000df016b01): fill_kobj_path: path = '/devices/virtual/block/loop5'
kobject: 'loop4' (00000000535878fd): kobject_uevent_env
kobject: 'loop4' (00000000535878fd): fill_kobj_path: path = '/devices/virtual/block/loop4'
kobject: 'loop1' (000000007195df1b): kobject_uevent_env
FAULT_INJECTION: forcing a failure.
name fail_page_alloc, interval 1, probability 0, space 0, times 1
CPU: 0 PID: 22705 Comm: syz-executor.2 Not tainted 4.19.91-syzkaller #0
kobject: 'loop1' (000000007195df1b): fill_kobj_path: path = '/devices/virtual/block/loop1'
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x197/0x210 lib/dump_stack.c:118
 fail_dump lib/fault-inject.c:51 [inline]
 should_fail.cold+0xa/0x1b lib/fault-inject.c:149
kobject: 'loop0' (000000001759d7b5): kobject_uevent_env
 should_fail_alloc_page mm/page_alloc.c:3086 [inline]
 prepare_alloc_pages mm/page_alloc.c:4344 [inline]
 __alloc_pages_nodemask+0x1ee/0x750 mm/page_alloc.c:4391
 __alloc_pages include/linux/gfp.h:496 [inline]
 __alloc_pages_node include/linux/gfp.h:509 [inline]
 kmem_getpages mm/slab.c:1412 [inline]
 cache_grow_begin+0x91/0x8c0 mm/slab.c:2682
 cache_alloc_refill mm/slab.c:3049 [inline]
 ____cache_alloc mm/slab.c:3132 [inline]
 ____cache_alloc mm/slab.c:3115 [inline]
 slab_alloc_node mm/slab.c:3327 [inline]
 kmem_cache_alloc_node+0x64d/0x710 mm/slab.c:3647
 alloc_task_struct_node kernel/fork.c:157 [inline]
 dup_task_struct kernel/fork.c:797 [inline]
 copy_process.part.0+0x1ce0/0x7a30 kernel/fork.c:1727
kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0'
kobject: 'loop4' (00000000535878fd): kobject_uevent_env
kobject: 'loop4' (00000000535878fd): fill_kobj_path: path = '/devices/virtual/block/loop4'
 copy_process kernel/fork.c:1684 [inline]
 _do_fork+0x257/0xfd0 kernel/fork.c:2197
kobject: 'loop3' (00000000401d6b46): kobject_uevent_env
 __do_sys_clone kernel/fork.c:2304 [inline]
 __se_sys_clone kernel/fork.c:2298 [inline]
 __x64_sys_clone+0xbf/0x150 kernel/fork.c:2298
 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293
kobject: 'loop3' (00000000401d6b46): fill_kobj_path: path = '/devices/virtual/block/loop3'
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x45a919
Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
RSP: 002b:00007fb41d7d9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
kobject: 'loop1' (000000007195df1b): kobject_uevent_env
RAX: ffffffffffffffda RBX: 00007fb41d7d9c90 RCX: 000000000045a919
RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000
RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb41d7da6d4
R13: 00000000004c1007 R14: 00000000004d4d48 R15: 0000000000000003
kobject: 'loop1' (000000007195df1b): fill_kobj_path: path = '/devices/virtual/block/loop1'
kobject: 'loop4' (00000000535878fd): kobject_uevent_env
kobject: 'loop4' (00000000535878fd): fill_kobj_path: path = '/devices/virtual/block/loop4'
FAULT_INJECTION: forcing a failure.
name fail_page_alloc, interval 1, probability 0, space 0, times 0
kobject: 'loop0' (000000001759d7b5): kobject_uevent_env
QAT: failed to copy from user cfg_data.
kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0'
kobject: 'loop3' (00000000401d6b46): kobject_uevent_env
kobject: 'loop3' (00000000401d6b46): fill_kobj_path: path = '/devices/virtual/block/loop3'
CPU: 0 PID: 22726 Comm: syz-executor.2 Not tainted 4.19.91-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x197/0x210 lib/dump_stack.c:118
QAT: failed to copy from user cfg_data.
 fail_dump lib/fault-inject.c:51 [inline]
 should_fail.cold+0xa/0x1b lib/fault-inject.c:149
 should_fail_alloc_page mm/page_alloc.c:3086 [inline]
 prepare_alloc_pages mm/page_alloc.c:4344 [inline]
 __alloc_pages_nodemask+0x1ee/0x750 mm/page_alloc.c:4391
kobject: 'loop5' (00000000df016b01): kobject_uevent_env
 __alloc_pages include/linux/gfp.h:496 [inline]
 __alloc_pages_node include/linux/gfp.h:509 [inline]
 alloc_pages_node include/linux/gfp.h:523 [inline]
 alloc_thread_stack_node kernel/fork.c:237 [inline]
 dup_task_struct kernel/fork.c:801 [inline]
 copy_process.part.0+0x3e0/0x7a30 kernel/fork.c:1727
kobject: 'loop5' (00000000df016b01): fill_kobj_path: path = '/devices/virtual/block/loop5'
 copy_process kernel/fork.c:1684 [inline]
 _do_fork+0x257/0xfd0 kernel/fork.c:2197
kobject: 'loop0' (000000001759d7b5): kobject_uevent_env
 __do_sys_clone kernel/fork.c:2304 [inline]
 __se_sys_clone kernel/fork.c:2298 [inline]
 __x64_sys_clone+0xbf/0x150 kernel/fork.c:2298
 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x45a919
Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0'
RSP: 002b:00007fb41d7d9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
RAX: ffffffffffffffda RBX: 00007fb41d7d9c90 RCX: 000000000045a919
RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000
RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb41d7da6d4
R13: 00000000004c1007 R14: 00000000004d4d48 R15: 0000000000000003
kobject: 'loop3' (00000000401d6b46): kobject_uevent_env
protocol 88fb is buggy, dev hsr_slave_0
protocol 88fb is buggy, dev hsr_slave_1
kobject: 'loop3' (00000000401d6b46): fill_kobj_path: path = '/devices/virtual/block/loop3'
kobject: 'loop3' (00000000401d6b46): kobject_uevent_env
kobject: 'loop3' (00000000401d6b46): fill_kobj_path: path = '/devices/virtual/block/loop3'
kobject: 'loop3' (00000000401d6b46): kobject_uevent_env
QAT: failed to copy from user cfg_data.
kobject: 'loop3' (00000000401d6b46): fill_kobj_path: path = '/devices/virtual/block/loop3'
QAT: failed to copy from user cfg_data.
kobject: 'loop4' (00000000535878fd): kobject_uevent_env
kobject: 'loop4' (00000000535878fd): fill_kobj_path: path = '/devices/virtual/block/loop4'
kobject: 'loop3' (00000000401d6b46): kobject_uevent_env
kobject: 'loop3' (00000000401d6b46): fill_kobj_path: path = '/devices/virtual/block/loop3'
kobject: 'loop0' (000000001759d7b5): kobject_uevent_env
kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0'
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
QAT: failed to copy from user cfg_data.
kobject: 'loop2' (00000000a8e72e17): kobject_uevent_env
CPU: 0 PID: 22763 Comm: syz-executor.2 Not tainted 4.19.91-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x197/0x210 lib/dump_stack.c:118
 fail_dump lib/fault-inject.c:51 [inline]
 should_fail.cold+0xa/0x1b lib/fault-inject.c:149
QAT: failed to copy from user cfg_data.
 __should_failslab+0x121/0x190 mm/failslab.c:32
 should_failslab+0x9/0x14 mm/slab_common.c:1557
 slab_pre_alloc_hook mm/slab.h:424 [inline]
 slab_alloc mm/slab.c:3383 [inline]
 kmem_cache_alloc+0x2ae/0x700 mm/slab.c:3557
 prepare_creds+0x3e/0x410 kernel/cred.c:255
 copy_creds+0x7b/0x610 kernel/cred.c:348
 copy_process.part.0+0xb54/0x7a30 kernel/fork.c:1760
 copy_process kernel/fork.c:1684 [inline]
 _do_fork+0x257/0xfd0 kernel/fork.c:2197
kobject: 'loop2' (00000000a8e72e17): fill_kobj_path: path = '/devices/virtual/block/loop2'
kobject: 'loop5' (00000000df016b01): kobject_uevent_env
kobject: 'loop5' (00000000df016b01): fill_kobj_path: path = '/devices/virtual/block/loop5'
 __do_sys_clone kernel/fork.c:2304 [inline]
 __se_sys_clone kernel/fork.c:2298 [inline]
 __x64_sys_clone+0xbf/0x150 kernel/fork.c:2298
 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
kobject: 'loop2' (00000000a8e72e17): kobject_uevent_env
RIP: 0033:0x45a919
Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
RSP: 002b:00007fb41d7d9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
kobject: 'loop2' (00000000a8e72e17): fill_kobj_path: path = '/devices/virtual/block/loop2'
RAX: ffffffffffffffda RBX: 00007fb41d7d9c90 RCX: 000000000045a919
RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000
RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb41d7da6d4
kobject: 'loop0' (000000001759d7b5): kobject_uevent_env
R13: 00000000004c1007 R14: 00000000004d4d48 R15: 0000000000000003
QAT: failed to copy from user cfg_data.
kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0'
QAT: failed to copy from user cfg_data.
kobject: 'loop3' (00000000401d6b46): kobject_uevent_env
kobject: 'loop3' (00000000401d6b46): fill_kobj_path: path = '/devices/virtual/block/loop3'
kobject: 'loop4' (00000000535878fd): kobject_uevent_env
kobject: 'loop4' (00000000535878fd): fill_kobj_path: path = '/devices/virtual/block/loop4'
kobject: 'loop5' (00000000df016b01): kobject_uevent_env
kobject: 'loop5' (00000000df016b01): fill_kobj_path: path = '/devices/virtual/block/loop5'
kobject: 'loop0' (000000001759d7b5): kobject_uevent_env
kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0'
kobject: 'loop3' (00000000401d6b46): kobject_uevent_env
kobject: 'loop3' (00000000401d6b46): fill_kobj_path: path = '/devices/virtual/block/loop3'
QAT: failed to copy from user cfg_data.
kobject: 'loop0' (000000001759d7b5): kobject_uevent_env
kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0'
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
kobject: 'loop4' (00000000535878fd): kobject_uevent_env
kobject: 'loop4' (00000000535878fd): fill_kobj_path: path = '/devices/virtual/block/loop4'
QAT: failed to copy from user cfg_data.
kobject: 'loop1' (000000007195df1b): kobject_uevent_env
CPU: 0 PID: 22793 Comm: syz-executor.2 Not tainted 4.19.91-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x197/0x210 lib/dump_stack.c:118
 fail_dump lib/fault-inject.c:51 [inline]
 should_fail.cold+0xa/0x1b lib/fault-inject.c:149
 __should_failslab+0x121/0x190 mm/failslab.c:32
kobject: 'loop1' (000000007195df1b): fill_kobj_path: path = '/devices/virtual/block/loop1'
 should_failslab+0x9/0x14 mm/slab_common.c:1557
 slab_pre_alloc_hook mm/slab.h:424 [inline]
 slab_alloc mm/slab.c:3383 [inline]
 __do_kmalloc mm/slab.c:3725 [inline]
 __kmalloc_track_caller+0x2de/0x750 mm/slab.c:3742
kobject: 'loop3' (00000000401d6b46): kobject_uevent_env
 kmemdup+0x27/0x60 mm/util.c:118
 kmemdup include/linux/string.h:421 [inline]
 selinux_cred_prepare+0x49/0xb0 security/selinux/hooks.c:3979
kobject: 'loop3' (00000000401d6b46): fill_kobj_path: path = '/devices/virtual/block/loop3'
 security_prepare_creds+0x77/0xc0 security/security.c:1018
 prepare_creds+0x332/0x410 kernel/cred.c:282
 copy_creds+0x7b/0x610 kernel/cred.c:348
kobject: 'loop0' (000000001759d7b5): kobject_uevent_env
 copy_process.part.0+0xb54/0x7a30 kernel/fork.c:1760
kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0'
kobject: 'loop4' (00000000535878fd): kobject_uevent_env
kobject: 'loop4' (00000000535878fd): fill_kobj_path: path = '/devices/virtual/block/loop4'
 copy_process kernel/fork.c:1684 [inline]
 _do_fork+0x257/0xfd0 kernel/fork.c:2197
kobject: 'loop1' (000000007195df1b): kobject_uevent_env
kobject: 'loop1' (000000007195df1b): fill_kobj_path: path = '/devices/virtual/block/loop1'
 __do_sys_clone kernel/fork.c:2304 [inline]
 __se_sys_clone kernel/fork.c:2298 [inline]
 __x64_sys_clone+0xbf/0x150 kernel/fork.c:2298
 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
kobject: 'loop2' (00000000a8e72e17): kobject_uevent_env
RIP: 0033:0x45a919
Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
RSP: 002b:00007fb41d7d9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
RAX: ffffffffffffffda RBX: 00007fb41d7d9c90 RCX: 000000000045a919
RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000
RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000
kobject: 'loop2' (00000000a8e72e17): fill_kobj_path: path = '/devices/virtual/block/loop2'
R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb41d7da6d4
R13: 00000000004c1007 R14: 00000000004d4d48 R15: 0000000000000003
protocol 88fb is buggy, dev hsr_slave_0
protocol 88fb is buggy, dev hsr_slave_1
protocol 88fb is buggy, dev hsr_slave_0
protocol 88fb is buggy, dev hsr_slave_1
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
QAT: failed to copy from user cfg_data.
CPU: 0 PID: 22803 Comm: syz-executor.2 Not tainted 4.19.91-syzkaller #0
kobject: 'loop0' (000000001759d7b5): kobject_uevent_env
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x197/0x210 lib/dump_stack.c:118
 fail_dump lib/fault-inject.c:51 [inline]
 should_fail.cold+0xa/0x1b lib/fault-inject.c:149
kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0'
 __should_failslab+0x121/0x190 mm/failslab.c:32
 should_failslab+0x9/0x14 mm/slab_common.c:1557
 slab_pre_alloc_hook mm/slab.h:424 [inline]
 slab_alloc mm/slab.c:3383 [inline]
 kmem_cache_alloc+0x2ae/0x700 mm/slab.c:3557
kobject: 'loop1' (000000007195df1b): kobject_uevent_env
kobject: 'loop1' (000000007195df1b): fill_kobj_path: path = '/devices/virtual/block/loop1'
 kmem_cache_zalloc include/linux/slab.h:699 [inline]
 __delayacct_tsk_init+0x20/0x80 kernel/delayacct.c:45
 delayacct_tsk_init include/linux/delayacct.h:105 [inline]
 copy_process.part.0+0x350b/0x7a30 kernel/fork.c:1773
kobject: 'loop3' (00000000401d6b46): kobject_uevent_env
kobject: 'loop3' (00000000401d6b46): fill_kobj_path: path = '/devices/virtual/block/loop3'
kobject: 'loop4' (00000000535878fd): kobject_uevent_env
kobject: 'loop4' (00000000535878fd): fill_kobj_path: path = '/devices/virtual/block/loop4'
 copy_process kernel/fork.c:1684 [inline]
 _do_fork+0x257/0xfd0 kernel/fork.c:2197
kobject: 'loop0' (000000001759d7b5): kobject_uevent_env
kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0'
 __do_sys_clone kernel/fork.c:2304 [inline]
 __se_sys_clone kernel/fork.c:2298 [inline]
 __x64_sys_clone+0xbf/0x150 kernel/fork.c:2298
 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
kobject: 'loop3' (00000000401d6b46): kobject_uevent_env
RIP: 0033:0x45a919
Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
RSP: 002b:00007fb41d7d9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
RAX: ffffffffffffffda RBX: 00007fb41d7d9c90 RCX: 000000000045a919
RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000
kobject: 'loop3' (00000000401d6b46): fill_kobj_path: path = '/devices/virtual/block/loop3'
RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb41d7da6d4
R13: 00000000004c1007 R14: 00000000004d4d48 R15: 0000000000000003
protocol 88fb is buggy, dev hsr_slave_0
protocol 88fb is buggy, dev hsr_slave_0
kobject: 'loop1' (000000007195df1b): kobject_uevent_env
kobject: 'loop1' (000000007195df1b): fill_kobj_path: path = '/devices/virtual/block/loop1'
kobject: 'loop4' (00000000535878fd): kobject_uevent_env
kobject: 'loop4' (00000000535878fd): fill_kobj_path: path = '/devices/virtual/block/loop4'
kobject: 'loop0' (000000001759d7b5): kobject_uevent_env
kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0'
kobject: 'loop2' (00000000a8e72e17): kobject_uevent_env
kobject: 'loop2' (00000000a8e72e17): fill_kobj_path: path = '/devices/virtual/block/loop2'
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
kobject: 'loop4' (00000000535878fd): kobject_uevent_env
kobject: 'loop4' (00000000535878fd): fill_kobj_path: path = '/devices/virtual/block/loop4'
CPU: 0 PID: 22817 Comm: syz-executor.2 Not tainted 4.19.91-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x197/0x210 lib/dump_stack.c:118
kobject: 'loop1' (000000007195df1b): kobject_uevent_env
 fail_dump lib/fault-inject.c:51 [inline]
 should_fail.cold+0xa/0x1b lib/fault-inject.c:149
 __should_failslab+0x121/0x190 mm/failslab.c:32
 should_failslab+0x9/0x14 mm/slab_common.c:1557
 slab_pre_alloc_hook mm/slab.h:424 [inline]
 slab_alloc mm/slab.c:3383 [inline]
 kmem_cache_alloc+0x2ae/0x700 mm/slab.c:3557
kobject: 'loop1' (000000007195df1b): fill_kobj_path: path = '/devices/virtual/block/loop1'
 dup_fd+0x85/0xb30 fs/file.c:280
 copy_files kernel/fork.c:1384 [inline]
 copy_process.part.0+0x1e6a/0x7a30 kernel/fork.c:1875
kobject: 'loop3' (00000000401d6b46): kobject_uevent_env
kobject: 'loop3' (00000000401d6b46): fill_kobj_path: path = '/devices/virtual/block/loop3'
kobject: 'loop4' (00000000535878fd): kobject_uevent_env
 copy_process kernel/fork.c:1684 [inline]
 _do_fork+0x257/0xfd0 kernel/fork.c:2197
kobject: 'loop4' (00000000535878fd): fill_kobj_path: path = '/devices/virtual/block/loop4'
kobject: 'loop2' (00000000a8e72e17): kobject_uevent_env
 __do_sys_clone kernel/fork.c:2304 [inline]
 __se_sys_clone kernel/fork.c:2298 [inline]
 __x64_sys_clone+0xbf/0x150 kernel/fork.c:2298
kobject: 'loop2' (00000000a8e72e17): fill_kobj_path: path = '/devices/virtual/block/loop2'
 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x45a919
Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
kobject: 'loop4' (00000000535878fd): kobject_uevent_env
RSP: 002b:00007fb41d7d9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
RAX: ffffffffffffffda RBX: 00007fb41d7d9c90 RCX: 000000000045a919
RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000
RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb41d7da6d4
R13: 00000000004c1007 R14: 00000000004d4d48 R15: 0000000000000003
kobject: 'loop4' (00000000535878fd): fill_kobj_path: path = '/devices/virtual/block/loop4'
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
kobject: 'loop3' (00000000401d6b46): kobject_uevent_env
kobject: 'loop3' (00000000401d6b46): fill_kobj_path: path = '/devices/virtual/block/loop3'
CPU: 0 PID: 22843 Comm: syz-executor.2 Not tainted 4.19.91-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x197/0x210 lib/dump_stack.c:118
 fail_dump lib/fault-inject.c:51 [inline]
 should_fail.cold+0xa/0x1b lib/fault-inject.c:149
 __should_failslab+0x121/0x190 mm/failslab.c:32
 should_failslab+0x9/0x14 mm/slab_common.c:1557
 slab_pre_alloc_hook mm/slab.h:424 [inline]
 slab_alloc mm/slab.c:3383 [inline]
 kmem_cache_alloc_trace+0x2cc/0x760 mm/slab.c:3623
kobject: 'loop4' (00000000535878fd): kobject_uevent_env
 kmalloc include/linux/slab.h:515 [inline]
 alloc_fdtable+0x86/0x290 fs/file.c:111
 dup_fd+0x743/0xb30 fs/file.c:310
 copy_files kernel/fork.c:1384 [inline]
 copy_process.part.0+0x1e6a/0x7a30 kernel/fork.c:1875
kobject: 'loop4' (00000000535878fd): fill_kobj_path: path = '/devices/virtual/block/loop4'
 copy_process kernel/fork.c:1684 [inline]
 _do_fork+0x257/0xfd0 kernel/fork.c:2197
 __do_sys_clone kernel/fork.c:2304 [inline]
 __se_sys_clone kernel/fork.c:2298 [inline]
 __x64_sys_clone+0xbf/0x150 kernel/fork.c:2298
 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x45a919
kobject: 'loop1' (000000007195df1b): kobject_uevent_env
Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
RSP: 002b:00007fb41d7d9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
RAX: ffffffffffffffda RBX: 00007fb41d7d9c90 RCX: 000000000045a919
RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000
kobject: 'loop1' (000000007195df1b): fill_kobj_path: path = '/devices/virtual/block/loop1'
RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb41d7da6d4
R13: 00000000004c1007 R14: 00000000004d4d48 R15: 0000000000000003
kobject: 'loop2' (00000000a8e72e17): kobject_uevent_env
kobject: 'loop2' (00000000a8e72e17): fill_kobj_path: path = '/devices/virtual/block/loop2'
kobject: 'loop5' (00000000df016b01): kobject_uevent_env
kobject: 'loop5' (00000000df016b01): fill_kobj_path: path = '/devices/virtual/block/loop5'
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
kobject: 'loop4' (00000000535878fd): kobject_uevent_env
CPU: 0 PID: 22861 Comm: syz-executor.2 Not tainted 4.19.91-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x197/0x210 lib/dump_stack.c:118
 fail_dump lib/fault-inject.c:51 [inline]
 should_fail.cold+0xa/0x1b lib/fault-inject.c:149
 __should_failslab+0x121/0x190 mm/failslab.c:32
 should_failslab+0x9/0x14 mm/slab_common.c:1557
 slab_pre_alloc_hook mm/slab.h:424 [inline]
 slab_alloc_node mm/slab.c:3304 [inline]
 kmem_cache_alloc_node_trace+0x274/0x720 mm/slab.c:3666
 __do_kmalloc_node mm/slab.c:3688 [inline]
 __kmalloc_node+0x3d/0x80 mm/slab.c:3696
 kmalloc_node include/linux/slab.h:557 [inline]
 kvmalloc_node+0x68/0x100 mm/util.c:423
 kvmalloc include/linux/mm.h:577 [inline]
 kvmalloc_array include/linux/mm.h:595 [inline]
 alloc_fdtable+0xd6/0x290 fs/file.c:115
 dup_fd+0x743/0xb30 fs/file.c:310
 copy_files kernel/fork.c:1384 [inline]
 copy_process.part.0+0x1e6a/0x7a30 kernel/fork.c:1875
 copy_process kernel/fork.c:1684 [inline]
 _do_fork+0x257/0xfd0 kernel/fork.c:2197
 __do_sys_clone kernel/fork.c:2304 [inline]
 __se_sys_clone kernel/fork.c:2298 [inline]
 __x64_sys_clone+0xbf/0x150 kernel/fork.c:2298
 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x45a919
Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
RSP: 002b:00007fb41d7d9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
RAX: ffffffffffffffda RBX: 00007fb41d7d9c90 RCX: 000000000045a919
RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000
RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb41d7da6d4
R13: 00000000004c1007 R14: 00000000004d4d48 R15: 0000000000000003
CPU: 1 PID: 22866 Comm: syz-executor.1 Not tainted 4.19.91-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
kobject: 'loop4' (00000000535878fd): fill_kobj_path: path = '/devices/virtual/block/loop4'
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x197/0x210 lib/dump_stack.c:118
kobject: 'loop0' (000000001759d7b5): kobject_uevent_env
 fail_dump lib/fault-inject.c:51 [inline]
 should_fail.cold+0xa/0x1b lib/fault-inject.c:149
kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0'
kobject: 'loop4' (00000000535878fd): kobject_uevent_env
 __should_failslab+0x121/0x190 mm/failslab.c:32
 should_failslab+0x9/0x14 mm/slab_common.c:1557
 slab_pre_alloc_hook mm/slab.h:424 [inline]
 slab_alloc mm/slab.c:3383 [inline]
 kmem_cache_alloc_trace+0x2cc/0x760 mm/slab.c:3623
kobject: 'loop4' (00000000535878fd): fill_kobj_path: path = '/devices/virtual/block/loop4'
 kmalloc include/linux/slab.h:515 [inline]
 kzalloc include/linux/slab.h:709 [inline]
 adf_ctl_alloc_resources+0x49/0x110 drivers/crypto/qat/qat_common/adf_ctl_drv.c:134
 adf_ctl_ioctl_dev_stop drivers/crypto/qat/qat_common/adf_ctl_drv.c:308 [inline]
 adf_ctl_ioctl+0xf7/0x1091 drivers/crypto/qat/qat_common/adf_ctl_drv.c:438
kobject: 'loop1' (000000007195df1b): kobject_uevent_env
kobject: 'loop1' (000000007195df1b): fill_kobj_path: path = '/devices/virtual/block/loop1'
 vfs_ioctl fs/ioctl.c:46 [inline]
 file_ioctl fs/ioctl.c:501 [inline]
 do_vfs_ioctl+0xd5f/0x1380 fs/ioctl.c:688
kobject: 'loop5' (00000000df016b01): kobject_uevent_env
kobject: 'loop5' (00000000df016b01): fill_kobj_path: path = '/devices/virtual/block/loop5'
 ksys_ioctl+0xab/0xd0 fs/ioctl.c:705
kobject: 'loop2' (00000000a8e72e17): kobject_uevent_env
 __do_sys_ioctl fs/ioctl.c:712 [inline]
 __se_sys_ioctl fs/ioctl.c:710 [inline]
 __x64_sys_ioctl+0x73/0xb0 fs/ioctl.c:710
 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x45a919
Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
RSP: 002b:00007f068e625c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
kobject: 'loop2' (00000000a8e72e17): fill_kobj_path: path = '/devices/virtual/block/loop2'
RAX: ffffffffffffffda RBX: 00007f068e625c90 RCX: 000000000045a919
RDX: 0000000020000000 RSI: 0000000040096101 RDI: 0000000000000003
RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
kobject: 'loop0' (000000001759d7b5): kobject_uevent_env
R10: 0000000000000000 R11: 0000000000000246 R12: 00007f068e6266d4
R13: 00000000004c5e16 R14: 00000000004dc2a8 R15: 0000000000000004
kobject: 'rx-0' (000000005eb6ee5c): kobject_cleanup, parent 00000000d3294aee
kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0'
kobject: 'rx-0' (000000005eb6ee5c): auto cleanup 'remove' event
kobject: 'loop4' (00000000535878fd): kobject_uevent_env
kobject: 'rx-0' (000000005eb6ee5c): kobject_uevent_env
kobject: 'loop4' (00000000535878fd): fill_kobj_path: path = '/devices/virtual/block/loop4'
kobject: 'rx-0' (000000005eb6ee5c): kobject_uevent_env: uevent_suppress caused the event to drop!
kobject: 'loop4' (00000000535878fd): kobject_uevent_env
kobject: 'rx-0' (000000005eb6ee5c): auto cleanup kobject_del
kobject: 'loop4' (00000000535878fd): fill_kobj_path: path = '/devices/virtual/block/loop4'
kobject: 'rx-0' (000000005eb6ee5c): calling ktype release
kobject: 'loop0' (000000001759d7b5): kobject_uevent_env
kobject: 'rx-0': free name
kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0'
kobject: 'tx-0' (0000000047cea346): kobject_cleanup, parent 00000000d3294aee
kobject: 'loop4' (00000000535878fd): kobject_uevent_env
kobject: 'tx-0' (0000000047cea346): auto cleanup 'remove' event
kobject: 'loop4' (00000000535878fd): fill_kobj_path: path = '/devices/virtual/block/loop4'
kobject: 'tx-0' (0000000047cea346): kobject_uevent_env
kobject: 'tx-0' (0000000047cea346): kobject_uevent_env: uevent_suppress caused the event to drop!
kobject: 'tx-0' (0000000047cea346): auto cleanup kobject_del
kobject: 'tx-0' (0000000047cea346): calling ktype release
kobject: 'loop0' (000000001759d7b5): kobject_uevent_env
kobject: 'tx-0': free name
kobject: 'queues' (00000000d3294aee): kobject_cleanup, parent           (null)
kobject: 'queues' (00000000d3294aee): calling ktype release
kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0'
kobject: 'queues' (00000000d3294aee): kset_release
QAT: Device 0 not found
kobject: 'queues': free name
kobject: 'loop4' (00000000535878fd): kobject_uevent_env
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
kobject: 'ip6gre0' (0000000062f5a933): kobject_uevent_env
kobject: 'loop4' (00000000535878fd): fill_kobj_path: path = '/devices/virtual/block/loop4'
CPU: 0 PID: 22896 Comm: syz-executor.2 Not tainted 4.19.91-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x197/0x210 lib/dump_stack.c:118
kobject: 'ip6gre0' (0000000062f5a933): kobject_uevent_env: uevent_suppress caused the event to drop!
 fail_dump lib/fault-inject.c:51 [inline]
 should_fail.cold+0xa/0x1b lib/fault-inject.c:149
 __should_failslab+0x121/0x190 mm/failslab.c:32
 should_failslab+0x9/0x14 mm/slab_common.c:1557
 slab_pre_alloc_hook mm/slab.h:424 [inline]
 slab_alloc mm/slab.c:3383 [inline]
 kmem_cache_alloc+0x2ae/0x700 mm/slab.c:3557
QAT: Device 0 not found
 copy_fs_struct+0x43/0x2d0 fs/fs_struct.c:113
 copy_fs kernel/fork.c:1361 [inline]
 copy_process.part.0+0x377d/0x7a30 kernel/fork.c:1878
kobject: 'batman_adv' (00000000f97e5cea): kobject_uevent_env
kobject: 'batman_adv' (00000000f97e5cea): kobject_uevent_env: filter function caused the event to drop!
 copy_process kernel/fork.c:1684 [inline]
 _do_fork+0x257/0xfd0 kernel/fork.c:2197
kobject: 'batman_adv' (00000000f97e5cea): kobject_cleanup, parent           (null)
 __do_sys_clone kernel/fork.c:2304 [inline]
 __se_sys_clone kernel/fork.c:2298 [inline]
 __x64_sys_clone+0xbf/0x150 kernel/fork.c:2298
kobject: 'batman_adv' (00000000f97e5cea): calling ktype release
 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293
kobject: (00000000f97e5cea): dynamic_kobj_release
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x45a919
kobject: 'batman_adv': free name
Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
RSP: 002b:00007fb41d7d9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
RAX: ffffffffffffffda RBX: 00007fb41d7d9c90 RCX: 000000000045a919
kobject: 'rx-0' (000000004e5930aa): kobject_cleanup, parent 000000003a69c5b7
RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000
RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb41d7da6d4
R13: 00000000004c1007 R14: 00000000004d4d48 R15: 0000000000000003
kobject: 'loop5' (00000000df016b01): kobject_uevent_env
kobject: 'rx-0' (000000004e5930aa): auto cleanup 'remove' event
kobject: 'loop5' (00000000df016b01): fill_kobj_path: path = '/devices/virtual/block/loop5'
kobject: 'rx-0' (000000004e5930aa): kobject_uevent_env
kobject: 'loop2' (00000000a8e72e17): kobject_uevent_env
kobject: 'loop2' (00000000a8e72e17): fill_kobj_path: path = '/devices/virtual/block/loop2'
kobject: 'loop1' (000000007195df1b): kobject_uevent_env
kobject: 'rx-0' (000000004e5930aa): kobject_uevent_env: uevent_suppress caused the event to drop!
kobject: 'loop1' (000000007195df1b): fill_kobj_path: path = '/devices/virtual/block/loop1'
kobject: 'loop0' (000000001759d7b5): kobject_uevent_env
kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0'
kobject: 'loop0' (000000001759d7b5): kobject_uevent_env
kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0'
kobject: 'loop3' (00000000401d6b46): kobject_uevent_env
kobject: 'loop3' (00000000401d6b46): fill_kobj_path: path = '/devices/virtual/block/loop3'
kobject: 'loop0' (000000001759d7b5): kobject_uevent_env
kobject: 'rx-0' (000000004e5930aa): auto cleanup kobject_del
kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0'
kobject: 'loop3' (00000000401d6b46): kobject_uevent_env
kobject: 'loop3' (00000000401d6b46): fill_kobj_path: path = '/devices/virtual/block/loop3'
kobject: 'rx-0' (000000004e5930aa): calling ktype release
kobject: 'rx-0': free name
kobject: 'loop5' (00000000df016b01): kobject_uevent_env
kobject: 'loop5' (00000000df016b01): fill_kobj_path: path = '/devices/virtual/block/loop5'
QAT: Invalid ioctl
kobject: 'loop0' (000000001759d7b5): kobject_uevent_env
kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0'
kobject: 'tx-0' (00000000505a7d26): kobject_cleanup, parent 000000003a69c5b7
kobject: 'loop3' (00000000401d6b46): kobject_uevent_env
kobject: 'loop3' (00000000401d6b46): fill_kobj_path: path = '/devices/virtual/block/loop3'
kobject: 'loop3' (00000000401d6b46): kobject_uevent_env
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
kobject: 'loop3' (00000000401d6b46): fill_kobj_path: path = '/devices/virtual/block/loop3'
kobject: 'tx-0' (00000000505a7d26): auto cleanup 'remove' event
kobject: 'tx-0' (00000000505a7d26): kobject_uevent_env
kobject: 'tx-0' (00000000505a7d26): kobject_uevent_env: uevent_suppress caused the event to drop!
CPU: 0 PID: 22924 Comm: syz-executor.2 Not tainted 4.19.91-syzkaller #0
kobject: 'loop1' (000000007195df1b): kobject_uevent_env
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x197/0x210 lib/dump_stack.c:118
 fail_dump lib/fault-inject.c:51 [inline]
 should_fail.cold+0xa/0x1b lib/fault-inject.c:149
 __should_failslab+0x121/0x190 mm/failslab.c:32
 should_failslab+0x9/0x14 mm/slab_common.c:1557
 slab_pre_alloc_hook mm/slab.h:424 [inline]
 slab_alloc mm/slab.c:3383 [inline]
 kmem_cache_alloc+0x2ae/0x700 mm/slab.c:3557
 copy_sighand kernel/fork.c:1428 [inline]
 copy_process.part.0+0x1fd7/0x7a30 kernel/fork.c:1881
kobject: 'loop1' (000000007195df1b): fill_kobj_path: path = '/devices/virtual/block/loop1'
kobject: 'loop2' (00000000a8e72e17): kobject_uevent_env
 copy_process kernel/fork.c:1684 [inline]
 _do_fork+0x257/0xfd0 kernel/fork.c:2197
kobject: 'loop2' (00000000a8e72e17): fill_kobj_path: path = '/devices/virtual/block/loop2'
kobject: 'loop0' (000000001759d7b5): kobject_uevent_env
 __do_sys_clone kernel/fork.c:2304 [inline]
 __se_sys_clone kernel/fork.c:2298 [inline]
 __x64_sys_clone+0xbf/0x150 kernel/fork.c:2298
kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0'
 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x45a919
kobject: 'loop1' (000000007195df1b): kobject_uevent_env
Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
RSP: 002b:00007fb41d7d9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
RAX: ffffffffffffffda RBX: 00007fb41d7d9c90 RCX: 000000000045a919
RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000
kobject: 'loop1' (000000007195df1b): fill_kobj_path: path = '/devices/virtual/block/loop1'
RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb41d7da6d4
R13: 00000000004c1007 R14: 00000000004d4d48 R15: 0000000000000003
kobject: 'tx-0' (00000000505a7d26): auto cleanup kobject_del
kobject: 'loop3' (00000000401d6b46): kobject_uevent_env
kobject: 'tx-0' (00000000505a7d26): calling ktype release
kobject: 'loop3' (00000000401d6b46): fill_kobj_path: path = '/devices/virtual/block/loop3'
QAT: Invalid ioctl
kobject: 'loop1' (000000007195df1b): kobject_uevent_env
kobject: 'tx-0': free name
kobject: 'loop1' (000000007195df1b): fill_kobj_path: path = '/devices/virtual/block/loop1'
kobject: 'queues' (000000003a69c5b7): kobject_cleanup, parent           (null)
kobject: 'loop0' (000000001759d7b5): kobject_uevent_env
kobject: 'queues' (000000003a69c5b7): calling ktype release
kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0'
kobject: 'queues' (000000003a69c5b7): kset_release
kobject: 'loop5' (00000000df016b01): kobject_uevent_env
kobject: 'queues': free name
kobject: 'loop5' (00000000df016b01): fill_kobj_path: path = '/devices/virtual/block/loop5'
kobject: 'ip6gretap0' (00000000d9571c62): kobject_uevent_env
kobject: 'loop3' (00000000401d6b46): kobject_uevent_env
kobject: 'ip6gretap0' (00000000d9571c62): kobject_uevent_env: uevent_suppress caused the event to drop!
kobject: 'loop3' (00000000401d6b46): fill_kobj_path: path = '/devices/virtual/block/loop3'
kobject: 'loop1' (000000007195df1b): kobject_uevent_env
kobject: 'loop1' (000000007195df1b): fill_kobj_path: path = '/devices/virtual/block/loop1'
QAT: Invalid ioctl
kobject: 'ip6gre0' (0000000062f5a933): kobject_cleanup, parent           (null)
kobject: 'loop2' (00000000a8e72e17): kobject_uevent_env
kobject: 'loop2' (00000000a8e72e17): fill_kobj_path: path = '/devices/virtual/block/loop2'
kobject: 'ip6gre0' (0000000062f5a933): calling ktype release
kobject: 'ip6gre0': free name
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
kobject: 'loop3' (00000000401d6b46): kobject_uevent_env
kobject: 'ip6gretap0' (00000000d9571c62): kobject_cleanup, parent           (null)
kobject: 'ip6gretap0' (00000000d9571c62): calling ktype release
kobject: 'loop3' (00000000401d6b46): fill_kobj_path: path = '/devices/virtual/block/loop3'
CPU: 0 PID: 22951 Comm: syz-executor.2 Not tainted 4.19.91-syzkaller #0
kobject: 'ip6gretap0': free name
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x197/0x210 lib/dump_stack.c:118
 fail_dump lib/fault-inject.c:51 [inline]
 should_fail.cold+0xa/0x1b lib/fault-inject.c:149
kobject: 'loop5' (00000000df016b01): kobject_uevent_env
kobject: 'loop5' (00000000df016b01): fill_kobj_path: path = '/devices/virtual/block/loop5'
 __should_failslab+0x121/0x190 mm/failslab.c:32
 should_failslab+0x9/0x14 mm/slab_common.c:1557
 slab_pre_alloc_hook mm/slab.h:424 [inline]
 slab_alloc mm/slab.c:3383 [inline]
 kmem_cache_alloc+0x2ae/0x700 mm/slab.c:3557
kobject: 'loop0' (000000001759d7b5): kobject_uevent_env
kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0'
 copy_sighand kernel/fork.c:1428 [inline]
 copy_process.part.0+0x1fd7/0x7a30 kernel/fork.c:1881
kobject: 'loop4' (00000000535878fd): kobject_uevent_env
kobject: 'loop4' (00000000535878fd): fill_kobj_path: path = '/devices/virtual/block/loop4'
 copy_process kernel/fork.c:1684 [inline]
 _do_fork+0x257/0xfd0 kernel/fork.c:2197
kobject: 'loop1' (000000007195df1b): kobject_uevent_env
kobject: 'loop1' (000000007195df1b): fill_kobj_path: path = '/devices/virtual/block/loop1'
 __do_sys_clone kernel/fork.c:2304 [inline]
 __se_sys_clone kernel/fork.c:2298 [inline]
 __x64_sys_clone+0xbf/0x150 kernel/fork.c:2298
 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293
kobject: 'loop3' (00000000401d6b46): kobject_uevent_env
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x45a919
Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
RSP: 002b:00007fb41d7d9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
RAX: ffffffffffffffda RBX: 00007fb41d7d9c90 RCX: 000000000045a919
kobject: 'loop3' (00000000401d6b46): fill_kobj_path: path = '/devices/virtual/block/loop3'
RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000
RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb41d7da6d4
R13: 00000000004c1007 R14: 00000000004d4d48 R15: 0000000000000003
net_ratelimit: 20 callbacks suppressed
protocol 88fb is buggy, dev hsr_slave_0
protocol 88fb is buggy, dev hsr_slave_0
protocol 88fb is buggy, dev hsr_slave_1
protocol 88fb is buggy, dev hsr_slave_1
kobject: 'loop0' (000000001759d7b5): kobject_uevent_env
kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0'
kobject: 'loop3' (00000000401d6b46): kobject_uevent_env
kobject: 'loop3' (00000000401d6b46): fill_kobj_path: path = '/devices/virtual/block/loop3'
kobject: 'loop5' (00000000df016b01): kobject_uevent_env
kobject: 'loop5' (00000000df016b01): fill_kobj_path: path = '/devices/virtual/block/loop5'
kobject: 'loop1' (000000007195df1b): kobject_uevent_env
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
kobject: 'loop1' (000000007195df1b): fill_kobj_path: path = '/devices/virtual/block/loop1'
kobject: 'loop4' (00000000535878fd): kobject_uevent_env
protocol 88fb is buggy, dev hsr_slave_0
kobject: 'loop4' (00000000535878fd): fill_kobj_path: path = '/devices/virtual/block/loop4'
protocol 88fb is buggy, dev hsr_slave_1
kobject: 'loop0' (000000001759d7b5): kobject_uevent_env
kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0'
kobject: 'rx-0' (00000000c5b26661): kobject_cleanup, parent 000000007f572217
CPU: 0 PID: 22962 Comm: syz-executor.2 Not tainted 4.19.91-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x197/0x210 lib/dump_stack.c:118
 fail_dump lib/fault-inject.c:51 [inline]
 should_fail.cold+0xa/0x1b lib/fault-inject.c:149
kobject: 'rx-0' (00000000c5b26661): auto cleanup 'remove' event
kobject: 'loop4' (00000000535878fd): kobject_uevent_env
 __should_failslab+0x121/0x190 mm/failslab.c:32
 should_failslab+0x9/0x14 mm/slab_common.c:1557
 slab_pre_alloc_hook mm/slab.h:424 [inline]
 slab_alloc mm/slab.c:3383 [inline]
 kmem_cache_alloc+0x2ae/0x700 mm/slab.c:3557
 kmem_cache_zalloc include/linux/slab.h:699 [inline]
 copy_signal kernel/fork.c:1482 [inline]
 copy_process.part.0+0x2139/0x7a30 kernel/fork.c:1884
kobject: 'rx-0' (00000000c5b26661): kobject_uevent_env
kobject: 'loop4' (00000000535878fd): fill_kobj_path: path = '/devices/virtual/block/loop4'
kobject: 'rx-0' (00000000c5b26661): kobject_uevent_env: uevent_suppress caused the event to drop!
kobject: 'loop1' (000000007195df1b): kobject_uevent_env
 copy_process kernel/fork.c:1684 [inline]
 _do_fork+0x257/0xfd0 kernel/fork.c:2197
kobject: 'rx-0' (00000000c5b26661): auto cleanup kobject_del
kobject: 'rx-0' (00000000c5b26661): calling ktype release
 __do_sys_clone kernel/fork.c:2304 [inline]
 __se_sys_clone kernel/fork.c:2298 [inline]
 __x64_sys_clone+0xbf/0x150 kernel/fork.c:2298
kobject: 'rx-0': free name
 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x45a919
Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
kobject: 'loop1' (000000007195df1b): fill_kobj_path: path = '/devices/virtual/block/loop1'
RSP: 002b:00007fb41d7d9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
RAX: ffffffffffffffda RBX: 00007fb41d7d9c90 RCX: 000000000045a919
kobject: 'tx-0' (0000000074924b14): kobject_cleanup, parent 000000007f572217
RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000
RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb41d7da6d4
kobject: 'loop3' (00000000401d6b46): kobject_uevent_env
R13: 00000000004c1007 R14: 00000000004d4d48 R15: 0000000000000003
protocol 88fb is buggy, dev hsr_slave_0
protocol 88fb is buggy, dev hsr_slave_1
kobject: 'tx-0' (0000000074924b14): auto cleanup 'remove' event
kobject: 'tx-0' (0000000074924b14): kobject_uevent_env
kobject: 'tx-0' (0000000074924b14): kobject_uevent_env: uevent_suppress caused the event to drop!
kobject: 'tx-0' (0000000074924b14): auto cleanup kobject_del
kobject: 'tx-0' (0000000074924b14): calling ktype release
kobject: 'tx-0': free name
kobject: 'queues' (000000007f572217): kobject_cleanup, parent           (null)
kobject: 'queues' (000000007f572217): calling ktype release
kobject: 'loop3' (00000000401d6b46): fill_kobj_path: path = '/devices/virtual/block/loop3'
kobject: 'queues' (000000007f572217): kset_release
FAULT_INJECTION: forcing a failure.
name fail_page_alloc, interval 1, probability 0, space 0, times 0
kobject: 'queues': free name
kobject: 'loop1' (000000007195df1b): kobject_uevent_env
kobject: 'ip6tnl0' (000000001d32ad44): kobject_uevent_env
kobject: 'loop1' (000000007195df1b): fill_kobj_path: path = '/devices/virtual/block/loop1'
kobject: 'ip6tnl0' (000000001d32ad44): kobject_uevent_env: uevent_suppress caused the event to drop!
kobject: 'loop2' (00000000a8e72e17): kobject_uevent_env
kobject: 'loop2' (00000000a8e72e17): fill_kobj_path: path = '/devices/virtual/block/loop2'
kobject: 'loop0' (000000001759d7b5): kobject_uevent_env
CPU: 0 PID: 22988 Comm: syz-executor.2 Not tainted 4.19.91-syzkaller #0