block nbd3: Receive control failed (result -107) ====================================================== kobject: 'loop4' (00000000535878fd): kobject_uevent_env WARNING: possible circular locking dependency detected 4.19.91-syzkaller #0 Not tainted ------------------------------------------------------ kobject: 'loop4' (00000000535878fd): fill_kobj_path: path = '/devices/virtual/block/loop4' kworker/u5:1/7974 is trying to acquire lock: 00000000207c6a5e (&nbd->config_lock){+.+.}, at: refcount_dec_and_mutex_lock lib/refcount.c:311 [inline] 00000000207c6a5e (&nbd->config_lock){+.+.}, at: refcount_dec_and_mutex_lock+0x52/0x80 lib/refcount.c:306 but task is already holding lock: 00000000c2f1705c ((work_completion)(&args->work)){+.+.}, at: process_one_work+0x8b4/0x1750 kernel/workqueue.c:2128 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #2 ((work_completion)(&args->work)){+.+.}: process_one_work+0x90f/0x1750 kernel/workqueue.c:2129 kobject: 'loop5' (00000000df016b01): kobject_uevent_env worker_thread+0x98/0xe40 kernel/workqueue.c:2296 kthread+0x354/0x420 kernel/kthread.c:246 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 -> #1 ((wq_completion)"knbd%d-recv"nbd->index){+.+.}: flush_workqueue+0x126/0x14b0 kernel/workqueue.c:2661 drain_workqueue+0x1b4/0x470 kernel/workqueue.c:2826 destroy_workqueue+0x74/0x700 kernel/workqueue.c:4170 nbd_config_put+0x3cf/0x860 drivers/block/nbd.c:1161 kobject: 'loop5' (00000000df016b01): fill_kobj_path: path = '/devices/virtual/block/loop5' nbd_release+0xf6/0x140 drivers/block/nbd.c:1436 __blkdev_put+0x4d1/0x810 fs/block_dev.c:1804 blkdev_put+0x98/0x560 fs/block_dev.c:1866 blkdev_close+0x8b/0xb0 fs/block_dev.c:1873 __fput+0x2dd/0x8b0 fs/file_table.c:278 ____fput+0x16/0x20 fs/file_table.c:309 IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xdf3/0xef0 net/netfilter/ipvs/ip_vs_ctl.c:2451 task_work_run+0x145/0x1c0 kernel/task_work.c:113 tracehook_notify_resume include/linux/tracehook.h:193 [inline] exit_to_usermode_loop+0x273/0x2c0 arch/x86/entry/common.c:167 prepare_exit_to_usermode arch/x86/entry/common.c:198 [inline] syscall_return_slowpath arch/x86/entry/common.c:271 [inline] do_syscall_64+0x53d/0x620 arch/x86/entry/common.c:296 QAT: Device 0 not found entry_SYSCALL_64_after_hwframe+0x49/0xbe -> #0 (&nbd->config_lock){+.+.}: kobject: 'loop0' (000000001759d7b5): kobject_uevent_env lock_acquire+0x16f/0x3f0 kernel/locking/lockdep.c:3903 kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0' __mutex_lock_common kernel/locking/mutex.c:925 [inline] __mutex_lock+0xf7/0x1300 kernel/locking/mutex.c:1072 mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:1087 kobject: 'loop3' (00000000401d6b46): kobject_uevent_env refcount_dec_and_mutex_lock lib/refcount.c:311 [inline] refcount_dec_and_mutex_lock+0x52/0x80 lib/refcount.c:306 nbd_config_put+0x31/0x860 drivers/block/nbd.c:1139 recv_work+0x19b/0x200 drivers/block/nbd.c:745 kobject: 'loop3' (00000000401d6b46): fill_kobj_path: path = '/devices/virtual/block/loop3' process_one_work+0x989/0x1750 kernel/workqueue.c:2153 worker_thread+0x98/0xe40 kernel/workqueue.c:2296 kthread+0x354/0x420 kernel/kthread.c:246 kobject: 'loop4' (00000000535878fd): kobject_uevent_env ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 other info that might help us debug this: Chain exists of: &nbd->config_lock --> (wq_completion)"knbd%d-recv"nbd->index --> (work_completion)(&args->work) Possible unsafe locking scenario: CPU0 CPU1 ---- ---- kobject: 'loop4' (00000000535878fd): fill_kobj_path: path = '/devices/virtual/block/loop4' lock((work_completion)(&args->work)); lock((wq_completion)"knbd%d-recv"nbd->index); lock((work_completion)(&args->work)); lock(&nbd->config_lock); *** DEADLOCK *** 2 locks held by kworker/u5:1/7974: #0: 000000006cfd2f86 ((wq_completion)"knbd%d-recv"nbd->index){+.+.}, at: __write_once_size include/linux/compiler.h:220 [inline] #0: 000000006cfd2f86 ((wq_completion)"knbd%d-recv"nbd->index){+.+.}, at: arch_atomic64_set arch/x86/include/asm/atomic64_64.h:34 [inline] #0: 000000006cfd2f86 ((wq_completion)"knbd%d-recv"nbd->index){+.+.}, at: atomic64_set include/asm-generic/atomic-instrumented.h:40 [inline] #0: 000000006cfd2f86 ((wq_completion)"knbd%d-recv"nbd->index){+.+.}, at: atomic_long_set include/asm-generic/atomic-long.h:59 [inline] #0: 000000006cfd2f86 ((wq_completion)"knbd%d-recv"nbd->index){+.+.}, at: set_work_data kernel/workqueue.c:617 [inline] #0: 000000006cfd2f86 ((wq_completion)"knbd%d-recv"nbd->index){+.+.}, at: set_work_pool_and_clear_pending kernel/workqueue.c:644 [inline] #0: 000000006cfd2f86 ((wq_completion)"knbd%d-recv"nbd->index){+.+.}, at: process_one_work+0x87e/0x1750 kernel/workqueue.c:2124 kobject: 'loop0' (000000001759d7b5): kobject_uevent_env #1: 00000000c2f1705c ((work_completion)(&args->work)){+.+.}, at: process_one_work+0x8b4/0x1750 kernel/workqueue.c:2128 stack backtrace: CPU: 0 PID: 7974 Comm: kworker/u5:1 Not tainted 4.19.91-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: knbd3-recv recv_work kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0' Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x197/0x210 lib/dump_stack.c:118 print_circular_bug.isra.0.cold+0x1cc/0x28f kernel/locking/lockdep.c:1221 check_prev_add kernel/locking/lockdep.c:1861 [inline] check_prevs_add kernel/locking/lockdep.c:1974 [inline] validate_chain kernel/locking/lockdep.c:2415 [inline] __lock_acquire+0x2e19/0x49c0 kernel/locking/lockdep.c:3411 kobject: 'loop3' (00000000401d6b46): kobject_uevent_env kobject: 'loop3' (00000000401d6b46): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop1' (000000007195df1b): kobject_uevent_env kobject: 'loop1' (000000007195df1b): fill_kobj_path: path = '/devices/virtual/block/loop1' lock_acquire+0x16f/0x3f0 kernel/locking/lockdep.c:3903 __mutex_lock_common kernel/locking/mutex.c:925 [inline] __mutex_lock+0xf7/0x1300 kernel/locking/mutex.c:1072 QAT: Device 0 not found kobject: 'loop4' (00000000535878fd): kobject_uevent_env mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:1087 refcount_dec_and_mutex_lock lib/refcount.c:311 [inline] refcount_dec_and_mutex_lock+0x52/0x80 lib/refcount.c:306 nbd_config_put+0x31/0x860 drivers/block/nbd.c:1139 QAT: Device 0 not found recv_work+0x19b/0x200 drivers/block/nbd.c:745 kobject: 'loop4' (00000000535878fd): fill_kobj_path: path = '/devices/virtual/block/loop4' process_one_work+0x989/0x1750 kernel/workqueue.c:2153 worker_thread+0x98/0xe40 kernel/workqueue.c:2296 kobject: 'loop5' (00000000df016b01): kobject_uevent_env kthread+0x354/0x420 kernel/kthread.c:246 QAT: Device 0 not found ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 kobject: 'loop5' (00000000df016b01): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'nbd3' (00000000234763e6): kobject_uevent_env kobject: 'nbd3' (00000000234763e6): fill_kobj_path: path = '/devices/virtual/block/nbd3' block nbd3: shutting down sockets kobject: 'loop0' (000000001759d7b5): kobject_uevent_env kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop3' (00000000401d6b46): kobject_uevent_env kobject: 'loop3' (00000000401d6b46): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop1' (000000007195df1b): kobject_uevent_env kobject: 'loop1' (000000007195df1b): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop2' (00000000a8e72e17): kobject_uevent_env QAT: Device 0 not found kobject: 'loop2' (00000000a8e72e17): fill_kobj_path: path = '/devices/virtual/block/loop2' QAT: Device 0 not found kobject: 'loop4' (00000000535878fd): kobject_uevent_env kobject: 'loop4' (00000000535878fd): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop0' (000000001759d7b5): kobject_uevent_env QAT: Device 0 not found kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0' QAT: Device 0 not found kobject: 'loop3' (00000000401d6b46): kobject_uevent_env kobject: 'loop3' (00000000401d6b46): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop1' (000000007195df1b): kobject_uevent_env QAT: failed to copy from user cfg_data. kobject: 'loop1' (000000007195df1b): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop4' (00000000535878fd): kobject_uevent_env kobject: 'loop4' (00000000535878fd): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop5' (00000000df016b01): kobject_uevent_env QAT: failed to copy from user cfg_data. kobject: 'loop5' (00000000df016b01): fill_kobj_path: path = '/devices/virtual/block/loop5' QAT: Device 0 not found kobject: 'loop4' (00000000535878fd): kobject_uevent_env kobject: 'loop4' (00000000535878fd): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop1' (000000007195df1b): kobject_uevent_env kobject: 'loop1' (000000007195df1b): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop0' (000000001759d7b5): kobject_uevent_env kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop4' (00000000535878fd): kobject_uevent_env kobject: 'loop4' (00000000535878fd): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop0' (000000001759d7b5): kobject_uevent_env kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop3' (00000000401d6b46): kobject_uevent_env kobject: 'loop3' (00000000401d6b46): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop5' (00000000df016b01): kobject_uevent_env kobject: 'loop5' (00000000df016b01): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop2' (00000000a8e72e17): kobject_uevent_env QAT: failed to copy from user cfg_data. kobject: 'loop2' (00000000a8e72e17): fill_kobj_path: path = '/devices/virtual/block/loop2' QAT: Device 0 not found kobject: 'loop0' (000000001759d7b5): kobject_uevent_env kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop3' (00000000401d6b46): kobject_uevent_env QAT: Device 0 not found kobject: 'loop3' (00000000401d6b46): fill_kobj_path: path = '/devices/virtual/block/loop3' QAT: failed to copy from user cfg_data. kobject: 'loop4' (00000000535878fd): kobject_uevent_env kobject: 'loop4' (00000000535878fd): fill_kobj_path: path = '/devices/virtual/block/loop4' QAT: failed to copy from user cfg_data. kobject: 'loop1' (000000007195df1b): kobject_uevent_env kobject: 'loop1' (000000007195df1b): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop2' (00000000a8e72e17): kobject_uevent_env kobject: 'loop2' (00000000a8e72e17): fill_kobj_path: path = '/devices/virtual/block/loop2' QAT: Device 0 not found kobject: 'loop1' (000000007195df1b): kobject_uevent_env kobject: 'loop1' (000000007195df1b): fill_kobj_path: path = '/devices/virtual/block/loop1' QAT: failed to copy from user cfg_data. kobject: 'loop5' (00000000df016b01): kobject_uevent_env kobject: 'loop5' (00000000df016b01): fill_kobj_path: path = '/devices/virtual/block/loop5' QAT: Device 0 not found kobject: 'loop0' (000000001759d7b5): kobject_uevent_env kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0' QAT: failed to copy from user cfg_data. QAT: Device 0 not found kobject: 'loop3' (00000000401d6b46): kobject_uevent_env kobject: 'loop3' (00000000401d6b46): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop4' (00000000535878fd): kobject_uevent_env kobject: 'loop4' (00000000535878fd): fill_kobj_path: path = '/devices/virtual/block/loop4' QAT: Device 0 not found kobject: 'loop2' (00000000a8e72e17): kobject_uevent_env kobject: 'loop2' (00000000a8e72e17): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop3' (00000000401d6b46): kobject_uevent_env kobject: 'loop3' (00000000401d6b46): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop4' (00000000535878fd): kobject_uevent_env kobject: 'loop4' (00000000535878fd): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop0' (000000001759d7b5): kobject_uevent_env kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop2' (00000000a8e72e17): kobject_uevent_env kobject: 'loop2' (00000000a8e72e17): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop0' (000000001759d7b5): kobject_uevent_env kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop0' (000000001759d7b5): kobject_uevent_env kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0' FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 kobject: 'loop3' (00000000401d6b46): kobject_uevent_env QAT: failed to copy from user cfg_data. kobject: 'loop3' (00000000401d6b46): fill_kobj_path: path = '/devices/virtual/block/loop3' CPU: 0 PID: 22672 Comm: syz-executor.2 Not tainted 4.19.91-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x197/0x210 lib/dump_stack.c:118 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0x1b lib/fault-inject.c:149 __should_failslab+0x121/0x190 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1557 slab_pre_alloc_hook mm/slab.h:424 [inline] slab_alloc_node mm/slab.c:3304 [inline] kmem_cache_alloc_node+0x26c/0x710 mm/slab.c:3647 alloc_task_struct_node kernel/fork.c:157 [inline] dup_task_struct kernel/fork.c:797 [inline] copy_process.part.0+0x1ce0/0x7a30 kernel/fork.c:1727 copy_process kernel/fork.c:1684 [inline] _do_fork+0x257/0xfd0 kernel/fork.c:2197 QAT: Device 0 not found __do_sys_clone kernel/fork.c:2304 [inline] __se_sys_clone kernel/fork.c:2298 [inline] __x64_sys_clone+0xbf/0x150 kernel/fork.c:2298 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x45a919 Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007fb41d7d9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 RAX: ffffffffffffffda RBX: 00007fb41d7d9c90 RCX: 000000000045a919 RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb41d7da6d4 R13: 00000000004c1007 R14: 00000000004d4d48 R15: 0000000000000003 net_ratelimit: 3 callbacks suppressed protocol 88fb is buggy, dev hsr_slave_0 kobject: 'loop5' (00000000df016b01): kobject_uevent_env protocol 88fb is buggy, dev hsr_slave_1 kobject: 'loop5' (00000000df016b01): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop4' (00000000535878fd): kobject_uevent_env kobject: 'loop4' (00000000535878fd): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop1' (000000007195df1b): kobject_uevent_env FAULT_INJECTION: forcing a failure. name fail_page_alloc, interval 1, probability 0, space 0, times 1 CPU: 0 PID: 22705 Comm: syz-executor.2 Not tainted 4.19.91-syzkaller #0 kobject: 'loop1' (000000007195df1b): fill_kobj_path: path = '/devices/virtual/block/loop1' Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x197/0x210 lib/dump_stack.c:118 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0x1b lib/fault-inject.c:149 kobject: 'loop0' (000000001759d7b5): kobject_uevent_env should_fail_alloc_page mm/page_alloc.c:3086 [inline] prepare_alloc_pages mm/page_alloc.c:4344 [inline] __alloc_pages_nodemask+0x1ee/0x750 mm/page_alloc.c:4391 __alloc_pages include/linux/gfp.h:496 [inline] __alloc_pages_node include/linux/gfp.h:509 [inline] kmem_getpages mm/slab.c:1412 [inline] cache_grow_begin+0x91/0x8c0 mm/slab.c:2682 cache_alloc_refill mm/slab.c:3049 [inline] ____cache_alloc mm/slab.c:3132 [inline] ____cache_alloc mm/slab.c:3115 [inline] slab_alloc_node mm/slab.c:3327 [inline] kmem_cache_alloc_node+0x64d/0x710 mm/slab.c:3647 alloc_task_struct_node kernel/fork.c:157 [inline] dup_task_struct kernel/fork.c:797 [inline] copy_process.part.0+0x1ce0/0x7a30 kernel/fork.c:1727 kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop4' (00000000535878fd): kobject_uevent_env kobject: 'loop4' (00000000535878fd): fill_kobj_path: path = '/devices/virtual/block/loop4' copy_process kernel/fork.c:1684 [inline] _do_fork+0x257/0xfd0 kernel/fork.c:2197 kobject: 'loop3' (00000000401d6b46): kobject_uevent_env __do_sys_clone kernel/fork.c:2304 [inline] __se_sys_clone kernel/fork.c:2298 [inline] __x64_sys_clone+0xbf/0x150 kernel/fork.c:2298 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293 kobject: 'loop3' (00000000401d6b46): fill_kobj_path: path = '/devices/virtual/block/loop3' entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x45a919 Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007fb41d7d9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 kobject: 'loop1' (000000007195df1b): kobject_uevent_env RAX: ffffffffffffffda RBX: 00007fb41d7d9c90 RCX: 000000000045a919 RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb41d7da6d4 R13: 00000000004c1007 R14: 00000000004d4d48 R15: 0000000000000003 kobject: 'loop1' (000000007195df1b): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop4' (00000000535878fd): kobject_uevent_env kobject: 'loop4' (00000000535878fd): fill_kobj_path: path = '/devices/virtual/block/loop4' FAULT_INJECTION: forcing a failure. name fail_page_alloc, interval 1, probability 0, space 0, times 0 kobject: 'loop0' (000000001759d7b5): kobject_uevent_env QAT: failed to copy from user cfg_data. kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop3' (00000000401d6b46): kobject_uevent_env kobject: 'loop3' (00000000401d6b46): fill_kobj_path: path = '/devices/virtual/block/loop3' CPU: 0 PID: 22726 Comm: syz-executor.2 Not tainted 4.19.91-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x197/0x210 lib/dump_stack.c:118 QAT: failed to copy from user cfg_data. fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0x1b lib/fault-inject.c:149 should_fail_alloc_page mm/page_alloc.c:3086 [inline] prepare_alloc_pages mm/page_alloc.c:4344 [inline] __alloc_pages_nodemask+0x1ee/0x750 mm/page_alloc.c:4391 kobject: 'loop5' (00000000df016b01): kobject_uevent_env __alloc_pages include/linux/gfp.h:496 [inline] __alloc_pages_node include/linux/gfp.h:509 [inline] alloc_pages_node include/linux/gfp.h:523 [inline] alloc_thread_stack_node kernel/fork.c:237 [inline] dup_task_struct kernel/fork.c:801 [inline] copy_process.part.0+0x3e0/0x7a30 kernel/fork.c:1727 kobject: 'loop5' (00000000df016b01): fill_kobj_path: path = '/devices/virtual/block/loop5' copy_process kernel/fork.c:1684 [inline] _do_fork+0x257/0xfd0 kernel/fork.c:2197 kobject: 'loop0' (000000001759d7b5): kobject_uevent_env __do_sys_clone kernel/fork.c:2304 [inline] __se_sys_clone kernel/fork.c:2298 [inline] __x64_sys_clone+0xbf/0x150 kernel/fork.c:2298 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x45a919 Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0' RSP: 002b:00007fb41d7d9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 RAX: ffffffffffffffda RBX: 00007fb41d7d9c90 RCX: 000000000045a919 RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb41d7da6d4 R13: 00000000004c1007 R14: 00000000004d4d48 R15: 0000000000000003 kobject: 'loop3' (00000000401d6b46): kobject_uevent_env protocol 88fb is buggy, dev hsr_slave_0 protocol 88fb is buggy, dev hsr_slave_1 kobject: 'loop3' (00000000401d6b46): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop3' (00000000401d6b46): kobject_uevent_env kobject: 'loop3' (00000000401d6b46): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop3' (00000000401d6b46): kobject_uevent_env QAT: failed to copy from user cfg_data. kobject: 'loop3' (00000000401d6b46): fill_kobj_path: path = '/devices/virtual/block/loop3' QAT: failed to copy from user cfg_data. kobject: 'loop4' (00000000535878fd): kobject_uevent_env kobject: 'loop4' (00000000535878fd): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop3' (00000000401d6b46): kobject_uevent_env kobject: 'loop3' (00000000401d6b46): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop0' (000000001759d7b5): kobject_uevent_env kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0' FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 QAT: failed to copy from user cfg_data. kobject: 'loop2' (00000000a8e72e17): kobject_uevent_env CPU: 0 PID: 22763 Comm: syz-executor.2 Not tainted 4.19.91-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x197/0x210 lib/dump_stack.c:118 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0x1b lib/fault-inject.c:149 QAT: failed to copy from user cfg_data. __should_failslab+0x121/0x190 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1557 slab_pre_alloc_hook mm/slab.h:424 [inline] slab_alloc mm/slab.c:3383 [inline] kmem_cache_alloc+0x2ae/0x700 mm/slab.c:3557 prepare_creds+0x3e/0x410 kernel/cred.c:255 copy_creds+0x7b/0x610 kernel/cred.c:348 copy_process.part.0+0xb54/0x7a30 kernel/fork.c:1760 copy_process kernel/fork.c:1684 [inline] _do_fork+0x257/0xfd0 kernel/fork.c:2197 kobject: 'loop2' (00000000a8e72e17): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop5' (00000000df016b01): kobject_uevent_env kobject: 'loop5' (00000000df016b01): fill_kobj_path: path = '/devices/virtual/block/loop5' __do_sys_clone kernel/fork.c:2304 [inline] __se_sys_clone kernel/fork.c:2298 [inline] __x64_sys_clone+0xbf/0x150 kernel/fork.c:2298 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe kobject: 'loop2' (00000000a8e72e17): kobject_uevent_env RIP: 0033:0x45a919 Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007fb41d7d9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 kobject: 'loop2' (00000000a8e72e17): fill_kobj_path: path = '/devices/virtual/block/loop2' RAX: ffffffffffffffda RBX: 00007fb41d7d9c90 RCX: 000000000045a919 RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb41d7da6d4 kobject: 'loop0' (000000001759d7b5): kobject_uevent_env R13: 00000000004c1007 R14: 00000000004d4d48 R15: 0000000000000003 QAT: failed to copy from user cfg_data. kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0' QAT: failed to copy from user cfg_data. kobject: 'loop3' (00000000401d6b46): kobject_uevent_env kobject: 'loop3' (00000000401d6b46): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop4' (00000000535878fd): kobject_uevent_env kobject: 'loop4' (00000000535878fd): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop5' (00000000df016b01): kobject_uevent_env kobject: 'loop5' (00000000df016b01): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop0' (000000001759d7b5): kobject_uevent_env kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop3' (00000000401d6b46): kobject_uevent_env kobject: 'loop3' (00000000401d6b46): fill_kobj_path: path = '/devices/virtual/block/loop3' QAT: failed to copy from user cfg_data. kobject: 'loop0' (000000001759d7b5): kobject_uevent_env kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0' FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 kobject: 'loop4' (00000000535878fd): kobject_uevent_env kobject: 'loop4' (00000000535878fd): fill_kobj_path: path = '/devices/virtual/block/loop4' QAT: failed to copy from user cfg_data. kobject: 'loop1' (000000007195df1b): kobject_uevent_env CPU: 0 PID: 22793 Comm: syz-executor.2 Not tainted 4.19.91-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x197/0x210 lib/dump_stack.c:118 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0x1b lib/fault-inject.c:149 __should_failslab+0x121/0x190 mm/failslab.c:32 kobject: 'loop1' (000000007195df1b): fill_kobj_path: path = '/devices/virtual/block/loop1' should_failslab+0x9/0x14 mm/slab_common.c:1557 slab_pre_alloc_hook mm/slab.h:424 [inline] slab_alloc mm/slab.c:3383 [inline] __do_kmalloc mm/slab.c:3725 [inline] __kmalloc_track_caller+0x2de/0x750 mm/slab.c:3742 kobject: 'loop3' (00000000401d6b46): kobject_uevent_env kmemdup+0x27/0x60 mm/util.c:118 kmemdup include/linux/string.h:421 [inline] selinux_cred_prepare+0x49/0xb0 security/selinux/hooks.c:3979 kobject: 'loop3' (00000000401d6b46): fill_kobj_path: path = '/devices/virtual/block/loop3' security_prepare_creds+0x77/0xc0 security/security.c:1018 prepare_creds+0x332/0x410 kernel/cred.c:282 copy_creds+0x7b/0x610 kernel/cred.c:348 kobject: 'loop0' (000000001759d7b5): kobject_uevent_env copy_process.part.0+0xb54/0x7a30 kernel/fork.c:1760 kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop4' (00000000535878fd): kobject_uevent_env kobject: 'loop4' (00000000535878fd): fill_kobj_path: path = '/devices/virtual/block/loop4' copy_process kernel/fork.c:1684 [inline] _do_fork+0x257/0xfd0 kernel/fork.c:2197 kobject: 'loop1' (000000007195df1b): kobject_uevent_env kobject: 'loop1' (000000007195df1b): fill_kobj_path: path = '/devices/virtual/block/loop1' __do_sys_clone kernel/fork.c:2304 [inline] __se_sys_clone kernel/fork.c:2298 [inline] __x64_sys_clone+0xbf/0x150 kernel/fork.c:2298 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe kobject: 'loop2' (00000000a8e72e17): kobject_uevent_env RIP: 0033:0x45a919 Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007fb41d7d9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 RAX: ffffffffffffffda RBX: 00007fb41d7d9c90 RCX: 000000000045a919 RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 kobject: 'loop2' (00000000a8e72e17): fill_kobj_path: path = '/devices/virtual/block/loop2' R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb41d7da6d4 R13: 00000000004c1007 R14: 00000000004d4d48 R15: 0000000000000003 protocol 88fb is buggy, dev hsr_slave_0 protocol 88fb is buggy, dev hsr_slave_1 protocol 88fb is buggy, dev hsr_slave_0 protocol 88fb is buggy, dev hsr_slave_1 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 QAT: failed to copy from user cfg_data. CPU: 0 PID: 22803 Comm: syz-executor.2 Not tainted 4.19.91-syzkaller #0 kobject: 'loop0' (000000001759d7b5): kobject_uevent_env Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x197/0x210 lib/dump_stack.c:118 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0x1b lib/fault-inject.c:149 kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0' __should_failslab+0x121/0x190 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1557 slab_pre_alloc_hook mm/slab.h:424 [inline] slab_alloc mm/slab.c:3383 [inline] kmem_cache_alloc+0x2ae/0x700 mm/slab.c:3557 kobject: 'loop1' (000000007195df1b): kobject_uevent_env kobject: 'loop1' (000000007195df1b): fill_kobj_path: path = '/devices/virtual/block/loop1' kmem_cache_zalloc include/linux/slab.h:699 [inline] __delayacct_tsk_init+0x20/0x80 kernel/delayacct.c:45 delayacct_tsk_init include/linux/delayacct.h:105 [inline] copy_process.part.0+0x350b/0x7a30 kernel/fork.c:1773 kobject: 'loop3' (00000000401d6b46): kobject_uevent_env kobject: 'loop3' (00000000401d6b46): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop4' (00000000535878fd): kobject_uevent_env kobject: 'loop4' (00000000535878fd): fill_kobj_path: path = '/devices/virtual/block/loop4' copy_process kernel/fork.c:1684 [inline] _do_fork+0x257/0xfd0 kernel/fork.c:2197 kobject: 'loop0' (000000001759d7b5): kobject_uevent_env kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0' __do_sys_clone kernel/fork.c:2304 [inline] __se_sys_clone kernel/fork.c:2298 [inline] __x64_sys_clone+0xbf/0x150 kernel/fork.c:2298 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe kobject: 'loop3' (00000000401d6b46): kobject_uevent_env RIP: 0033:0x45a919 Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007fb41d7d9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 RAX: ffffffffffffffda RBX: 00007fb41d7d9c90 RCX: 000000000045a919 RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 kobject: 'loop3' (00000000401d6b46): fill_kobj_path: path = '/devices/virtual/block/loop3' RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb41d7da6d4 R13: 00000000004c1007 R14: 00000000004d4d48 R15: 0000000000000003 protocol 88fb is buggy, dev hsr_slave_0 protocol 88fb is buggy, dev hsr_slave_0 kobject: 'loop1' (000000007195df1b): kobject_uevent_env kobject: 'loop1' (000000007195df1b): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop4' (00000000535878fd): kobject_uevent_env kobject: 'loop4' (00000000535878fd): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop0' (000000001759d7b5): kobject_uevent_env kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop2' (00000000a8e72e17): kobject_uevent_env kobject: 'loop2' (00000000a8e72e17): fill_kobj_path: path = '/devices/virtual/block/loop2' FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 kobject: 'loop4' (00000000535878fd): kobject_uevent_env kobject: 'loop4' (00000000535878fd): fill_kobj_path: path = '/devices/virtual/block/loop4' CPU: 0 PID: 22817 Comm: syz-executor.2 Not tainted 4.19.91-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x197/0x210 lib/dump_stack.c:118 kobject: 'loop1' (000000007195df1b): kobject_uevent_env fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0x1b lib/fault-inject.c:149 __should_failslab+0x121/0x190 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1557 slab_pre_alloc_hook mm/slab.h:424 [inline] slab_alloc mm/slab.c:3383 [inline] kmem_cache_alloc+0x2ae/0x700 mm/slab.c:3557 kobject: 'loop1' (000000007195df1b): fill_kobj_path: path = '/devices/virtual/block/loop1' dup_fd+0x85/0xb30 fs/file.c:280 copy_files kernel/fork.c:1384 [inline] copy_process.part.0+0x1e6a/0x7a30 kernel/fork.c:1875 kobject: 'loop3' (00000000401d6b46): kobject_uevent_env kobject: 'loop3' (00000000401d6b46): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop4' (00000000535878fd): kobject_uevent_env copy_process kernel/fork.c:1684 [inline] _do_fork+0x257/0xfd0 kernel/fork.c:2197 kobject: 'loop4' (00000000535878fd): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop2' (00000000a8e72e17): kobject_uevent_env __do_sys_clone kernel/fork.c:2304 [inline] __se_sys_clone kernel/fork.c:2298 [inline] __x64_sys_clone+0xbf/0x150 kernel/fork.c:2298 kobject: 'loop2' (00000000a8e72e17): fill_kobj_path: path = '/devices/virtual/block/loop2' do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x45a919 Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 kobject: 'loop4' (00000000535878fd): kobject_uevent_env RSP: 002b:00007fb41d7d9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 RAX: ffffffffffffffda RBX: 00007fb41d7d9c90 RCX: 000000000045a919 RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb41d7da6d4 R13: 00000000004c1007 R14: 00000000004d4d48 R15: 0000000000000003 kobject: 'loop4' (00000000535878fd): fill_kobj_path: path = '/devices/virtual/block/loop4' FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 kobject: 'loop3' (00000000401d6b46): kobject_uevent_env kobject: 'loop3' (00000000401d6b46): fill_kobj_path: path = '/devices/virtual/block/loop3' CPU: 0 PID: 22843 Comm: syz-executor.2 Not tainted 4.19.91-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x197/0x210 lib/dump_stack.c:118 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0x1b lib/fault-inject.c:149 __should_failslab+0x121/0x190 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1557 slab_pre_alloc_hook mm/slab.h:424 [inline] slab_alloc mm/slab.c:3383 [inline] kmem_cache_alloc_trace+0x2cc/0x760 mm/slab.c:3623 kobject: 'loop4' (00000000535878fd): kobject_uevent_env kmalloc include/linux/slab.h:515 [inline] alloc_fdtable+0x86/0x290 fs/file.c:111 dup_fd+0x743/0xb30 fs/file.c:310 copy_files kernel/fork.c:1384 [inline] copy_process.part.0+0x1e6a/0x7a30 kernel/fork.c:1875 kobject: 'loop4' (00000000535878fd): fill_kobj_path: path = '/devices/virtual/block/loop4' copy_process kernel/fork.c:1684 [inline] _do_fork+0x257/0xfd0 kernel/fork.c:2197 __do_sys_clone kernel/fork.c:2304 [inline] __se_sys_clone kernel/fork.c:2298 [inline] __x64_sys_clone+0xbf/0x150 kernel/fork.c:2298 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x45a919 kobject: 'loop1' (000000007195df1b): kobject_uevent_env Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007fb41d7d9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 RAX: ffffffffffffffda RBX: 00007fb41d7d9c90 RCX: 000000000045a919 RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 kobject: 'loop1' (000000007195df1b): fill_kobj_path: path = '/devices/virtual/block/loop1' RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb41d7da6d4 R13: 00000000004c1007 R14: 00000000004d4d48 R15: 0000000000000003 kobject: 'loop2' (00000000a8e72e17): kobject_uevent_env kobject: 'loop2' (00000000a8e72e17): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop5' (00000000df016b01): kobject_uevent_env kobject: 'loop5' (00000000df016b01): fill_kobj_path: path = '/devices/virtual/block/loop5' FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 kobject: 'loop4' (00000000535878fd): kobject_uevent_env CPU: 0 PID: 22861 Comm: syz-executor.2 Not tainted 4.19.91-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x197/0x210 lib/dump_stack.c:118 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0x1b lib/fault-inject.c:149 __should_failslab+0x121/0x190 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1557 slab_pre_alloc_hook mm/slab.h:424 [inline] slab_alloc_node mm/slab.c:3304 [inline] kmem_cache_alloc_node_trace+0x274/0x720 mm/slab.c:3666 __do_kmalloc_node mm/slab.c:3688 [inline] __kmalloc_node+0x3d/0x80 mm/slab.c:3696 kmalloc_node include/linux/slab.h:557 [inline] kvmalloc_node+0x68/0x100 mm/util.c:423 kvmalloc include/linux/mm.h:577 [inline] kvmalloc_array include/linux/mm.h:595 [inline] alloc_fdtable+0xd6/0x290 fs/file.c:115 dup_fd+0x743/0xb30 fs/file.c:310 copy_files kernel/fork.c:1384 [inline] copy_process.part.0+0x1e6a/0x7a30 kernel/fork.c:1875 copy_process kernel/fork.c:1684 [inline] _do_fork+0x257/0xfd0 kernel/fork.c:2197 __do_sys_clone kernel/fork.c:2304 [inline] __se_sys_clone kernel/fork.c:2298 [inline] __x64_sys_clone+0xbf/0x150 kernel/fork.c:2298 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x45a919 Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007fb41d7d9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 RAX: ffffffffffffffda RBX: 00007fb41d7d9c90 RCX: 000000000045a919 RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb41d7da6d4 R13: 00000000004c1007 R14: 00000000004d4d48 R15: 0000000000000003 CPU: 1 PID: 22866 Comm: syz-executor.1 Not tainted 4.19.91-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 kobject: 'loop4' (00000000535878fd): fill_kobj_path: path = '/devices/virtual/block/loop4' Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x197/0x210 lib/dump_stack.c:118 kobject: 'loop0' (000000001759d7b5): kobject_uevent_env fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0x1b lib/fault-inject.c:149 kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop4' (00000000535878fd): kobject_uevent_env __should_failslab+0x121/0x190 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1557 slab_pre_alloc_hook mm/slab.h:424 [inline] slab_alloc mm/slab.c:3383 [inline] kmem_cache_alloc_trace+0x2cc/0x760 mm/slab.c:3623 kobject: 'loop4' (00000000535878fd): fill_kobj_path: path = '/devices/virtual/block/loop4' kmalloc include/linux/slab.h:515 [inline] kzalloc include/linux/slab.h:709 [inline] adf_ctl_alloc_resources+0x49/0x110 drivers/crypto/qat/qat_common/adf_ctl_drv.c:134 adf_ctl_ioctl_dev_stop drivers/crypto/qat/qat_common/adf_ctl_drv.c:308 [inline] adf_ctl_ioctl+0xf7/0x1091 drivers/crypto/qat/qat_common/adf_ctl_drv.c:438 kobject: 'loop1' (000000007195df1b): kobject_uevent_env kobject: 'loop1' (000000007195df1b): fill_kobj_path: path = '/devices/virtual/block/loop1' vfs_ioctl fs/ioctl.c:46 [inline] file_ioctl fs/ioctl.c:501 [inline] do_vfs_ioctl+0xd5f/0x1380 fs/ioctl.c:688 kobject: 'loop5' (00000000df016b01): kobject_uevent_env kobject: 'loop5' (00000000df016b01): fill_kobj_path: path = '/devices/virtual/block/loop5' ksys_ioctl+0xab/0xd0 fs/ioctl.c:705 kobject: 'loop2' (00000000a8e72e17): kobject_uevent_env __do_sys_ioctl fs/ioctl.c:712 [inline] __se_sys_ioctl fs/ioctl.c:710 [inline] __x64_sys_ioctl+0x73/0xb0 fs/ioctl.c:710 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x45a919 Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f068e625c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 kobject: 'loop2' (00000000a8e72e17): fill_kobj_path: path = '/devices/virtual/block/loop2' RAX: ffffffffffffffda RBX: 00007f068e625c90 RCX: 000000000045a919 RDX: 0000000020000000 RSI: 0000000040096101 RDI: 0000000000000003 RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 kobject: 'loop0' (000000001759d7b5): kobject_uevent_env R10: 0000000000000000 R11: 0000000000000246 R12: 00007f068e6266d4 R13: 00000000004c5e16 R14: 00000000004dc2a8 R15: 0000000000000004 kobject: 'rx-0' (000000005eb6ee5c): kobject_cleanup, parent 00000000d3294aee kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'rx-0' (000000005eb6ee5c): auto cleanup 'remove' event kobject: 'loop4' (00000000535878fd): kobject_uevent_env kobject: 'rx-0' (000000005eb6ee5c): kobject_uevent_env kobject: 'loop4' (00000000535878fd): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'rx-0' (000000005eb6ee5c): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'loop4' (00000000535878fd): kobject_uevent_env kobject: 'rx-0' (000000005eb6ee5c): auto cleanup kobject_del kobject: 'loop4' (00000000535878fd): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'rx-0' (000000005eb6ee5c): calling ktype release kobject: 'loop0' (000000001759d7b5): kobject_uevent_env kobject: 'rx-0': free name kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'tx-0' (0000000047cea346): kobject_cleanup, parent 00000000d3294aee kobject: 'loop4' (00000000535878fd): kobject_uevent_env kobject: 'tx-0' (0000000047cea346): auto cleanup 'remove' event kobject: 'loop4' (00000000535878fd): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'tx-0' (0000000047cea346): kobject_uevent_env kobject: 'tx-0' (0000000047cea346): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'tx-0' (0000000047cea346): auto cleanup kobject_del kobject: 'tx-0' (0000000047cea346): calling ktype release kobject: 'loop0' (000000001759d7b5): kobject_uevent_env kobject: 'tx-0': free name kobject: 'queues' (00000000d3294aee): kobject_cleanup, parent (null) kobject: 'queues' (00000000d3294aee): calling ktype release kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'queues' (00000000d3294aee): kset_release QAT: Device 0 not found kobject: 'queues': free name kobject: 'loop4' (00000000535878fd): kobject_uevent_env FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 kobject: 'ip6gre0' (0000000062f5a933): kobject_uevent_env kobject: 'loop4' (00000000535878fd): fill_kobj_path: path = '/devices/virtual/block/loop4' CPU: 0 PID: 22896 Comm: syz-executor.2 Not tainted 4.19.91-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x197/0x210 lib/dump_stack.c:118 kobject: 'ip6gre0' (0000000062f5a933): kobject_uevent_env: uevent_suppress caused the event to drop! fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0x1b lib/fault-inject.c:149 __should_failslab+0x121/0x190 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1557 slab_pre_alloc_hook mm/slab.h:424 [inline] slab_alloc mm/slab.c:3383 [inline] kmem_cache_alloc+0x2ae/0x700 mm/slab.c:3557 QAT: Device 0 not found copy_fs_struct+0x43/0x2d0 fs/fs_struct.c:113 copy_fs kernel/fork.c:1361 [inline] copy_process.part.0+0x377d/0x7a30 kernel/fork.c:1878 kobject: 'batman_adv' (00000000f97e5cea): kobject_uevent_env kobject: 'batman_adv' (00000000f97e5cea): kobject_uevent_env: filter function caused the event to drop! copy_process kernel/fork.c:1684 [inline] _do_fork+0x257/0xfd0 kernel/fork.c:2197 kobject: 'batman_adv' (00000000f97e5cea): kobject_cleanup, parent (null) __do_sys_clone kernel/fork.c:2304 [inline] __se_sys_clone kernel/fork.c:2298 [inline] __x64_sys_clone+0xbf/0x150 kernel/fork.c:2298 kobject: 'batman_adv' (00000000f97e5cea): calling ktype release do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293 kobject: (00000000f97e5cea): dynamic_kobj_release entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x45a919 kobject: 'batman_adv': free name Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007fb41d7d9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 RAX: ffffffffffffffda RBX: 00007fb41d7d9c90 RCX: 000000000045a919 kobject: 'rx-0' (000000004e5930aa): kobject_cleanup, parent 000000003a69c5b7 RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb41d7da6d4 R13: 00000000004c1007 R14: 00000000004d4d48 R15: 0000000000000003 kobject: 'loop5' (00000000df016b01): kobject_uevent_env kobject: 'rx-0' (000000004e5930aa): auto cleanup 'remove' event kobject: 'loop5' (00000000df016b01): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'rx-0' (000000004e5930aa): kobject_uevent_env kobject: 'loop2' (00000000a8e72e17): kobject_uevent_env kobject: 'loop2' (00000000a8e72e17): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop1' (000000007195df1b): kobject_uevent_env kobject: 'rx-0' (000000004e5930aa): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'loop1' (000000007195df1b): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop0' (000000001759d7b5): kobject_uevent_env kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop0' (000000001759d7b5): kobject_uevent_env kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop3' (00000000401d6b46): kobject_uevent_env kobject: 'loop3' (00000000401d6b46): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop0' (000000001759d7b5): kobject_uevent_env kobject: 'rx-0' (000000004e5930aa): auto cleanup kobject_del kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop3' (00000000401d6b46): kobject_uevent_env kobject: 'loop3' (00000000401d6b46): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'rx-0' (000000004e5930aa): calling ktype release kobject: 'rx-0': free name kobject: 'loop5' (00000000df016b01): kobject_uevent_env kobject: 'loop5' (00000000df016b01): fill_kobj_path: path = '/devices/virtual/block/loop5' QAT: Invalid ioctl kobject: 'loop0' (000000001759d7b5): kobject_uevent_env kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'tx-0' (00000000505a7d26): kobject_cleanup, parent 000000003a69c5b7 kobject: 'loop3' (00000000401d6b46): kobject_uevent_env kobject: 'loop3' (00000000401d6b46): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop3' (00000000401d6b46): kobject_uevent_env FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 kobject: 'loop3' (00000000401d6b46): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'tx-0' (00000000505a7d26): auto cleanup 'remove' event kobject: 'tx-0' (00000000505a7d26): kobject_uevent_env kobject: 'tx-0' (00000000505a7d26): kobject_uevent_env: uevent_suppress caused the event to drop! CPU: 0 PID: 22924 Comm: syz-executor.2 Not tainted 4.19.91-syzkaller #0 kobject: 'loop1' (000000007195df1b): kobject_uevent_env Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x197/0x210 lib/dump_stack.c:118 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0x1b lib/fault-inject.c:149 __should_failslab+0x121/0x190 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1557 slab_pre_alloc_hook mm/slab.h:424 [inline] slab_alloc mm/slab.c:3383 [inline] kmem_cache_alloc+0x2ae/0x700 mm/slab.c:3557 copy_sighand kernel/fork.c:1428 [inline] copy_process.part.0+0x1fd7/0x7a30 kernel/fork.c:1881 kobject: 'loop1' (000000007195df1b): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop2' (00000000a8e72e17): kobject_uevent_env copy_process kernel/fork.c:1684 [inline] _do_fork+0x257/0xfd0 kernel/fork.c:2197 kobject: 'loop2' (00000000a8e72e17): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop0' (000000001759d7b5): kobject_uevent_env __do_sys_clone kernel/fork.c:2304 [inline] __se_sys_clone kernel/fork.c:2298 [inline] __x64_sys_clone+0xbf/0x150 kernel/fork.c:2298 kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0' do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x45a919 kobject: 'loop1' (000000007195df1b): kobject_uevent_env Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007fb41d7d9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 RAX: ffffffffffffffda RBX: 00007fb41d7d9c90 RCX: 000000000045a919 RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 kobject: 'loop1' (000000007195df1b): fill_kobj_path: path = '/devices/virtual/block/loop1' RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb41d7da6d4 R13: 00000000004c1007 R14: 00000000004d4d48 R15: 0000000000000003 kobject: 'tx-0' (00000000505a7d26): auto cleanup kobject_del kobject: 'loop3' (00000000401d6b46): kobject_uevent_env kobject: 'tx-0' (00000000505a7d26): calling ktype release kobject: 'loop3' (00000000401d6b46): fill_kobj_path: path = '/devices/virtual/block/loop3' QAT: Invalid ioctl kobject: 'loop1' (000000007195df1b): kobject_uevent_env kobject: 'tx-0': free name kobject: 'loop1' (000000007195df1b): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'queues' (000000003a69c5b7): kobject_cleanup, parent (null) kobject: 'loop0' (000000001759d7b5): kobject_uevent_env kobject: 'queues' (000000003a69c5b7): calling ktype release kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'queues' (000000003a69c5b7): kset_release kobject: 'loop5' (00000000df016b01): kobject_uevent_env kobject: 'queues': free name kobject: 'loop5' (00000000df016b01): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'ip6gretap0' (00000000d9571c62): kobject_uevent_env kobject: 'loop3' (00000000401d6b46): kobject_uevent_env kobject: 'ip6gretap0' (00000000d9571c62): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'loop3' (00000000401d6b46): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop1' (000000007195df1b): kobject_uevent_env kobject: 'loop1' (000000007195df1b): fill_kobj_path: path = '/devices/virtual/block/loop1' QAT: Invalid ioctl kobject: 'ip6gre0' (0000000062f5a933): kobject_cleanup, parent (null) kobject: 'loop2' (00000000a8e72e17): kobject_uevent_env kobject: 'loop2' (00000000a8e72e17): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'ip6gre0' (0000000062f5a933): calling ktype release kobject: 'ip6gre0': free name FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 kobject: 'loop3' (00000000401d6b46): kobject_uevent_env kobject: 'ip6gretap0' (00000000d9571c62): kobject_cleanup, parent (null) kobject: 'ip6gretap0' (00000000d9571c62): calling ktype release kobject: 'loop3' (00000000401d6b46): fill_kobj_path: path = '/devices/virtual/block/loop3' CPU: 0 PID: 22951 Comm: syz-executor.2 Not tainted 4.19.91-syzkaller #0 kobject: 'ip6gretap0': free name Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x197/0x210 lib/dump_stack.c:118 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0x1b lib/fault-inject.c:149 kobject: 'loop5' (00000000df016b01): kobject_uevent_env kobject: 'loop5' (00000000df016b01): fill_kobj_path: path = '/devices/virtual/block/loop5' __should_failslab+0x121/0x190 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1557 slab_pre_alloc_hook mm/slab.h:424 [inline] slab_alloc mm/slab.c:3383 [inline] kmem_cache_alloc+0x2ae/0x700 mm/slab.c:3557 kobject: 'loop0' (000000001759d7b5): kobject_uevent_env kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0' copy_sighand kernel/fork.c:1428 [inline] copy_process.part.0+0x1fd7/0x7a30 kernel/fork.c:1881 kobject: 'loop4' (00000000535878fd): kobject_uevent_env kobject: 'loop4' (00000000535878fd): fill_kobj_path: path = '/devices/virtual/block/loop4' copy_process kernel/fork.c:1684 [inline] _do_fork+0x257/0xfd0 kernel/fork.c:2197 kobject: 'loop1' (000000007195df1b): kobject_uevent_env kobject: 'loop1' (000000007195df1b): fill_kobj_path: path = '/devices/virtual/block/loop1' __do_sys_clone kernel/fork.c:2304 [inline] __se_sys_clone kernel/fork.c:2298 [inline] __x64_sys_clone+0xbf/0x150 kernel/fork.c:2298 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293 kobject: 'loop3' (00000000401d6b46): kobject_uevent_env entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x45a919 Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007fb41d7d9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 RAX: ffffffffffffffda RBX: 00007fb41d7d9c90 RCX: 000000000045a919 kobject: 'loop3' (00000000401d6b46): fill_kobj_path: path = '/devices/virtual/block/loop3' RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb41d7da6d4 R13: 00000000004c1007 R14: 00000000004d4d48 R15: 0000000000000003 net_ratelimit: 20 callbacks suppressed protocol 88fb is buggy, dev hsr_slave_0 protocol 88fb is buggy, dev hsr_slave_0 protocol 88fb is buggy, dev hsr_slave_1 protocol 88fb is buggy, dev hsr_slave_1 kobject: 'loop0' (000000001759d7b5): kobject_uevent_env kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop3' (00000000401d6b46): kobject_uevent_env kobject: 'loop3' (00000000401d6b46): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop5' (00000000df016b01): kobject_uevent_env kobject: 'loop5' (00000000df016b01): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop1' (000000007195df1b): kobject_uevent_env FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 kobject: 'loop1' (000000007195df1b): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop4' (00000000535878fd): kobject_uevent_env protocol 88fb is buggy, dev hsr_slave_0 kobject: 'loop4' (00000000535878fd): fill_kobj_path: path = '/devices/virtual/block/loop4' protocol 88fb is buggy, dev hsr_slave_1 kobject: 'loop0' (000000001759d7b5): kobject_uevent_env kobject: 'loop0' (000000001759d7b5): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'rx-0' (00000000c5b26661): kobject_cleanup, parent 000000007f572217 CPU: 0 PID: 22962 Comm: syz-executor.2 Not tainted 4.19.91-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x197/0x210 lib/dump_stack.c:118 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0x1b lib/fault-inject.c:149 kobject: 'rx-0' (00000000c5b26661): auto cleanup 'remove' event kobject: 'loop4' (00000000535878fd): kobject_uevent_env __should_failslab+0x121/0x190 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1557 slab_pre_alloc_hook mm/slab.h:424 [inline] slab_alloc mm/slab.c:3383 [inline] kmem_cache_alloc+0x2ae/0x700 mm/slab.c:3557 kmem_cache_zalloc include/linux/slab.h:699 [inline] copy_signal kernel/fork.c:1482 [inline] copy_process.part.0+0x2139/0x7a30 kernel/fork.c:1884 kobject: 'rx-0' (00000000c5b26661): kobject_uevent_env kobject: 'loop4' (00000000535878fd): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'rx-0' (00000000c5b26661): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'loop1' (000000007195df1b): kobject_uevent_env copy_process kernel/fork.c:1684 [inline] _do_fork+0x257/0xfd0 kernel/fork.c:2197 kobject: 'rx-0' (00000000c5b26661): auto cleanup kobject_del kobject: 'rx-0' (00000000c5b26661): calling ktype release __do_sys_clone kernel/fork.c:2304 [inline] __se_sys_clone kernel/fork.c:2298 [inline] __x64_sys_clone+0xbf/0x150 kernel/fork.c:2298 kobject: 'rx-0': free name do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x45a919 Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 kobject: 'loop1' (000000007195df1b): fill_kobj_path: path = '/devices/virtual/block/loop1' RSP: 002b:00007fb41d7d9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 RAX: ffffffffffffffda RBX: 00007fb41d7d9c90 RCX: 000000000045a919 kobject: 'tx-0' (0000000074924b14): kobject_cleanup, parent 000000007f572217 RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb41d7da6d4 kobject: 'loop3' (00000000401d6b46): kobject_uevent_env R13: 00000000004c1007 R14: 00000000004d4d48 R15: 0000000000000003 protocol 88fb is buggy, dev hsr_slave_0 protocol 88fb is buggy, dev hsr_slave_1 kobject: 'tx-0' (0000000074924b14): auto cleanup 'remove' event kobject: 'tx-0' (0000000074924b14): kobject_uevent_env kobject: 'tx-0' (0000000074924b14): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'tx-0' (0000000074924b14): auto cleanup kobject_del kobject: 'tx-0' (0000000074924b14): calling ktype release kobject: 'tx-0': free name kobject: 'queues' (000000007f572217): kobject_cleanup, parent (null) kobject: 'queues' (000000007f572217): calling ktype release kobject: 'loop3' (00000000401d6b46): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'queues' (000000007f572217): kset_release FAULT_INJECTION: forcing a failure. name fail_page_alloc, interval 1, probability 0, space 0, times 0 kobject: 'queues': free name kobject: 'loop1' (000000007195df1b): kobject_uevent_env kobject: 'ip6tnl0' (000000001d32ad44): kobject_uevent_env kobject: 'loop1' (000000007195df1b): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'ip6tnl0' (000000001d32ad44): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'loop2' (00000000a8e72e17): kobject_uevent_env kobject: 'loop2' (00000000a8e72e17): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop0' (000000001759d7b5): kobject_uevent_env CPU: 0 PID: 22988 Comm: syz-executor.2 Not tainted 4.19.91-syzkaller #0