====================================================== WARNING: possible circular locking dependency detected 4.20.0+ #3 Not tainted ------------------------------------------------------ syz-executor5/27883 is trying to acquire lock: 000000005ad57224 (rlock-AF_UNIX){+.+.}, at: skb_queue_tail+0x26/0x150 net/core/skbuff.c:2968 but task is already holding lock: 00000000a92872cd (&(&u->lock)->rlock/1){+.+.}, at: unix_state_double_lock net/unix/af_unix.c:1085 [inline] 00000000a92872cd (&(&u->lock)->rlock/1){+.+.}, at: unix_state_double_lock+0x80/0xb0 net/unix/af_unix.c:1077 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #1 (&(&u->lock)->rlock/1){+.+.}: _raw_spin_lock_nested+0x35/0x50 kernel/locking/spinlock.c:354 sk_diag_dump_icons net/unix/diag.c:82 [inline] sk_diag_fill.isra.0+0xa3e/0x10c0 net/unix/diag.c:144 sk_diag_dump net/unix/diag.c:178 [inline] unix_diag_dump+0x35c/0x550 net/unix/diag.c:206 netlink_dump+0x5f2/0x1070 net/netlink/af_netlink.c:2244 __netlink_dump_start+0x5b4/0x7e0 net/netlink/af_netlink.c:2352 netlink_dump_start include/linux/netlink.h:225 [inline] unix_diag_handler_dump+0x405/0x7f0 net/unix/diag.c:307 __sock_diag_cmd net/core/sock_diag.c:232 [inline] sock_diag_rcv_msg+0x322/0x410 net/core/sock_diag.c:263 netlink_rcv_skb+0x17d/0x410 net/netlink/af_netlink.c:2477 sock_diag_rcv+0x2b/0x40 net/core/sock_diag.c:274 netlink_unicast_kernel net/netlink/af_netlink.c:1310 [inline] netlink_unicast+0x574/0x770 net/netlink/af_netlink.c:1336 netlink_sendmsg+0xa05/0xf90 net/netlink/af_netlink.c:1917 sock_sendmsg_nosec net/socket.c:621 [inline] sock_sendmsg+0xdd/0x130 net/socket.c:631 sock_write_iter+0x379/0x5e0 net/socket.c:900 call_write_iter include/linux/fs.h:1857 [inline] do_iter_readv_writev+0x856/0xae0 fs/read_write.c:680 do_iter_write fs/read_write.c:959 [inline] do_iter_write+0x184/0x600 fs/read_write.c:940 vfs_writev+0x1ee/0x370 fs/read_write.c:1004 do_writev+0x11a/0x300 fs/read_write.c:1039 __do_sys_writev fs/read_write.c:1112 [inline] __se_sys_writev fs/read_write.c:1109 [inline] __x64_sys_writev+0x75/0xb0 fs/read_write.c:1109 do_syscall_64+0x1a3/0x800 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe -> #0 (rlock-AF_UNIX){+.+.}: lock_acquire+0x1db/0x570 kernel/locking/lockdep.c:3841 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline] _raw_spin_lock_irqsave+0x95/0xcd kernel/locking/spinlock.c:152 skb_queue_tail+0x26/0x150 net/core/skbuff.c:2968 unix_dgram_sendmsg+0xebf/0x1610 net/unix/af_unix.c:1804 sock_sendmsg_nosec net/socket.c:621 [inline] sock_sendmsg+0xdd/0x130 net/socket.c:631 ___sys_sendmsg+0x409/0x910 net/socket.c:2116 __sys_sendmmsg+0x246/0x6f0 net/socket.c:2211 __do_sys_sendmmsg net/socket.c:2240 [inline] __se_sys_sendmmsg net/socket.c:2237 [inline] __x64_sys_sendmmsg+0x9d/0x100 net/socket.c:2237 do_syscall_64+0x1a3/0x800 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe other info that might help us debug this: Possible unsafe locking scenario: CPU0 CPU1 ---- ---- lock(&(&u->lock)->rlock/1); lock(rlock-AF_UNIX); lock(&(&u->lock)->rlock/1); lock(rlock-AF_UNIX); *** DEADLOCK *** 1 lock held by syz-executor5/27883: #0: 00000000a92872cd (&(&u->lock)->rlock/1){+.+.}, at: unix_state_double_lock net/unix/af_unix.c:1085 [inline] #0: 00000000a92872cd (&(&u->lock)->rlock/1){+.+.}, at: unix_state_double_lock+0x80/0xb0 net/unix/af_unix.c:1077 stack backtrace: CPU: 1 PID: 27883 Comm: syz-executor5 Not tainted 4.20.0+ #3 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1db/0x2d0 lib/dump_stack.c:113 print_circular_bug.isra.0.cold+0x1cc/0x28f kernel/locking/lockdep.c:1224 check_prev_add kernel/locking/lockdep.c:1866 [inline] check_prevs_add kernel/locking/lockdep.c:1979 [inline] validate_chain kernel/locking/lockdep.c:2350 [inline] __lock_acquire+0x3014/0x4a30 kernel/locking/lockdep.c:3338 lock_acquire+0x1db/0x570 kernel/locking/lockdep.c:3841 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline] _raw_spin_lock_irqsave+0x95/0xcd kernel/locking/spinlock.c:152 skb_queue_tail+0x26/0x150 net/core/skbuff.c:2968 unix_dgram_sendmsg+0xebf/0x1610 net/unix/af_unix.c:1804 sock_sendmsg_nosec net/socket.c:621 [inline] sock_sendmsg+0xdd/0x130 net/socket.c:631 ___sys_sendmsg+0x409/0x910 net/socket.c:2116 __sys_sendmmsg+0x246/0x6f0 net/socket.c:2211 __do_sys_sendmmsg net/socket.c:2240 [inline] __se_sys_sendmmsg net/socket.c:2237 [inline] __x64_sys_sendmmsg+0x9d/0x100 net/socket.c:2237 do_syscall_64+0x1a3/0x800 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457ec9 Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f5ec3398c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000457ec9 RDX: fffffffffffffdc3 RSI: 00000000200bd000 RDI: 0000000000000007 RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5ec33996d4 R13: 00000000004c4dd7 R14: 00000000004d88a0 R15: 00000000ffffffff kobject: 'loop4' (0000000078e83cc2): kobject_uevent_env kobject: 'loop4' (0000000078e83cc2): fill_kobj_path: path = '/devices/virtual/block/loop4' netlink: 8 bytes leftover after parsing attributes in process `syz-executor1'. kobject: 'loop3' (0000000062801e73): kobject_uevent_env kobject: 'loop3' (0000000062801e73): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop0' (000000009ec3ce10): kobject_uevent_env kobject: 'loop0' (000000009ec3ce10): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop1' (00000000384c9082): kobject_uevent_env netlink: 8 bytes leftover after parsing attributes in process `syz-executor1'. kobject: 'loop1' (00000000384c9082): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop2' (000000001bef32e8): kobject_uevent_env kobject: 'loop2' (000000001bef32e8): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop4' (0000000078e83cc2): kobject_uevent_env kobject: 'loop4' (0000000078e83cc2): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop3' (0000000062801e73): kobject_uevent_env netlink: 8 bytes leftover after parsing attributes in process `syz-executor1'. kobject: 'loop3' (0000000062801e73): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop3' (0000000062801e73): kobject_uevent_env kobject: 'loop3' (0000000062801e73): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop5' (000000000d74e71f): kobject_uevent_env kobject: 'loop5' (000000000d74e71f): fill_kobj_path: path = '/devices/virtual/block/loop5' netlink: 8 bytes leftover after parsing attributes in process `syz-executor1'. kobject: 'loop2' (000000001bef32e8): kobject_uevent_env netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. kobject: 'loop2' (000000001bef32e8): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop4' (0000000078e83cc2): kobject_uevent_env kobject: 'loop4' (0000000078e83cc2): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop0' (000000009ec3ce10): kobject_uevent_env kobject: 'loop0' (000000009ec3ce10): fill_kobj_path: path = '/devices/virtual/block/loop0' netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. kobject: 'loop3' (0000000062801e73): kobject_uevent_env kobject: 'loop3' (0000000062801e73): fill_kobj_path: path = '/devices/virtual/block/loop3' netlink: 8 bytes leftover after parsing attributes in process `syz-executor1'. kobject: 'loop4' (0000000078e83cc2): kobject_uevent_env kobject: 'loop4' (0000000078e83cc2): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop2' (000000001bef32e8): kobject_uevent_env kobject: 'loop2' (000000001bef32e8): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop0' (000000009ec3ce10): kobject_uevent_env netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. kobject: 'loop0' (000000009ec3ce10): fill_kobj_path: path = '/devices/virtual/block/loop0' netlink: 8 bytes leftover after parsing attributes in process `syz-executor1'. kobject: 'loop3' (0000000062801e73): kobject_uevent_env kobject: 'loop3' (0000000062801e73): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop4' (0000000078e83cc2): kobject_uevent_env kobject: 'loop4' (0000000078e83cc2): fill_kobj_path: path = '/devices/virtual/block/loop4' netlink: 8 bytes leftover after parsing attributes in process `syz-executor1'. kobject: 'loop0' (000000009ec3ce10): kobject_uevent_env kobject: 'loop0' (000000009ec3ce10): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop5' (000000000d74e71f): kobject_uevent_env kobject: 'loop5' (000000000d74e71f): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop1' (00000000384c9082): kobject_uevent_env kobject: 'loop1' (00000000384c9082): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop4' (0000000078e83cc2): kobject_uevent_env kobject: 'loop4' (0000000078e83cc2): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop3' (0000000062801e73): kobject_uevent_env kobject: 'loop3' (0000000062801e73): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop0' (000000009ec3ce10): kobject_uevent_env kobject: 'loop0' (000000009ec3ce10): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop5' (000000000d74e71f): kobject_uevent_env kobject: 'loop5' (000000000d74e71f): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop1' (00000000384c9082): kobject_uevent_env kobject: 'loop1' (00000000384c9082): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop3' (0000000062801e73): kobject_uevent_env kobject: 'loop3' (0000000062801e73): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop0' (000000009ec3ce10): kobject_uevent_env kobject: 'loop0' (000000009ec3ce10): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop5' (000000000d74e71f): kobject_uevent_env kobject: 'loop5' (000000000d74e71f): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop3' (0000000062801e73): kobject_uevent_env kobject: 'loop3' (0000000062801e73): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop1' (00000000384c9082): kobject_uevent_env kobject: 'loop1' (00000000384c9082): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop0' (000000009ec3ce10): kobject_uevent_env kobject: 'loop0' (000000009ec3ce10): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop2' (000000001bef32e8): kobject_uevent_env kobject: 'loop2' (000000001bef32e8): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop5' (000000000d74e71f): kobject_uevent_env kobject: 'loop5' (000000000d74e71f): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop3' (0000000062801e73): kobject_uevent_env kobject: 'loop3' (0000000062801e73): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop2' (000000001bef32e8): kobject_uevent_env kobject: 'loop2' (000000001bef32e8): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop1' (00000000384c9082): kobject_uevent_env kobject: 'loop1' (00000000384c9082): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop0' (000000009ec3ce10): kobject_uevent_env kobject: 'loop0' (000000009ec3ce10): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop5' (000000000d74e71f): kobject_uevent_env kobject: 'loop5' (000000000d74e71f): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop1' (00000000384c9082): kobject_uevent_env kobject: 'loop1' (00000000384c9082): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop2' (000000001bef32e8): kobject_uevent_env kobject: 'loop2' (000000001bef32e8): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop3' (0000000062801e73): kobject_uevent_env kobject: 'loop3' (0000000062801e73): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop0' (000000009ec3ce10): kobject_uevent_env kobject: 'loop0' (000000009ec3ce10): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop1' (00000000384c9082): kobject_uevent_env kobject: 'loop1' (00000000384c9082): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop2' (000000001bef32e8): kobject_uevent_env kobject: 'loop2' (000000001bef32e8): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop5' (000000000d74e71f): kobject_uevent_env kobject: 'loop5' (000000000d74e71f): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop3' (0000000062801e73): kobject_uevent_env kobject: 'loop3' (0000000062801e73): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop1' (00000000384c9082): kobject_uevent_env kobject: 'loop1' (00000000384c9082): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop5' (000000000d74e71f): kobject_uevent_env kobject: 'loop5' (000000000d74e71f): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop0' (000000009ec3ce10): kobject_uevent_env kobject: 'loop0' (000000009ec3ce10): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop2' (000000001bef32e8): kobject_uevent_env kobject: 'loop2' (000000001bef32e8): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop1' (00000000384c9082): kobject_uevent_env kobject: 'loop1' (00000000384c9082): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop3' (0000000062801e73): kobject_uevent_env kobject: 'loop3' (0000000062801e73): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop0' (000000009ec3ce10): kobject_uevent_env kobject: 'loop0' (000000009ec3ce10): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop2' (000000001bef32e8): kobject_uevent_env kobject: 'loop2' (000000001bef32e8): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop5' (000000000d74e71f): kobject_uevent_env kobject: 'loop5' (000000000d74e71f): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop1' (00000000384c9082): kobject_uevent_env kobject: 'loop1' (00000000384c9082): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop2' (000000001bef32e8): kobject_uevent_env kobject: 'loop2' (000000001bef32e8): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop5' (000000000d74e71f): kobject_uevent_env kobject: 'loop5' (000000000d74e71f): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop1' (00000000384c9082): kobject_uevent_env kobject: 'loop1' (00000000384c9082): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop0' (000000009ec3ce10): kobject_uevent_env kobject: 'loop0' (000000009ec3ce10): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop4' (0000000078e83cc2): kobject_uevent_env kobject: 'loop4' (0000000078e83cc2): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop2' (000000001bef32e8): kobject_uevent_env kobject: 'loop2' (000000001bef32e8): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop5' (000000000d74e71f): kobject_uevent_env kobject: 'loop5' (000000000d74e71f): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop1' (00000000384c9082): kobject_uevent_env kobject: 'loop1' (00000000384c9082): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop4' (0000000078e83cc2): kobject_uevent_env kobject: 'loop4' (0000000078e83cc2): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop0' (000000009ec3ce10): kobject_uevent_env kobject: 'loop0' (000000009ec3ce10): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop2' (000000001bef32e8): kobject_uevent_env kobject: 'loop2' (000000001bef32e8): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop4' (0000000078e83cc2): kobject_uevent_env kobject: 'loop4' (0000000078e83cc2): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop1' (00000000384c9082): kobject_uevent_env kobject: 'loop1' (00000000384c9082): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop5' (000000000d74e71f): kobject_uevent_env kobject: 'loop5' (000000000d74e71f): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop0' (000000009ec3ce10): kobject_uevent_env kobject: 'loop0' (000000009ec3ce10): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop2' (000000001bef32e8): kobject_uevent_env kobject: 'loop2' (000000001bef32e8): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop4' (0000000078e83cc2): kobject_uevent_env kobject: 'loop4' (0000000078e83cc2): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop1' (00000000384c9082): kobject_uevent_env kobject: 'loop1' (00000000384c9082): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop2' (000000001bef32e8): kobject_uevent_env kobject: 'loop2' (000000001bef32e8): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop5' (000000000d74e71f): kobject_uevent_env kobject: 'loop5' (000000000d74e71f): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop0' (000000009ec3ce10): kobject_uevent_env kobject: 'loop0' (000000009ec3ce10): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop5' (000000000d74e71f): kobject_uevent_env kobject: 'loop5' (000000000d74e71f): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop4' (0000000078e83cc2): kobject_uevent_env kobject: 'loop4' (0000000078e83cc2): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop1' (00000000384c9082): kobject_uevent_env kobject: 'loop1' (00000000384c9082): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop2' (000000001bef32e8): kobject_uevent_env kobject: 'loop2' (000000001bef32e8): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop0' (000000009ec3ce10): kobject_uevent_env kobject: 'loop0' (000000009ec3ce10): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop4' (0000000078e83cc2): kobject_uevent_env kobject: 'loop4' (0000000078e83cc2): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop5' (000000000d74e71f): kobject_uevent_env kobject: 'loop5' (000000000d74e71f): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop2' (000000001bef32e8): kobject_uevent_env kobject: 'loop2' (000000001bef32e8): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop4' (0000000078e83cc2): kobject_uevent_env kobject: 'loop4' (0000000078e83cc2): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop1' (00000000384c9082): kobject_uevent_env kobject: 'loop1' (00000000384c9082): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop5' (000000000d74e71f): kobject_uevent_env kobject: 'loop5' (000000000d74e71f): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop0' (000000009ec3ce10): kobject_uevent_env kobject: 'loop0' (000000009ec3ce10): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop4' (0000000078e83cc2): kobject_uevent_env kobject: 'loop4' (0000000078e83cc2): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop1' (00000000384c9082): kobject_uevent_env kobject: 'loop1' (00000000384c9082): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop2' (000000001bef32e8): kobject_uevent_env kobject: 'loop2' (000000001bef32e8): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop0' (000000009ec3ce10): kobject_uevent_env kobject: 'loop0' (000000009ec3ce10): fill_kobj_path: path = '/devices/virtual/block/loop0' __nla_parse: 10 callbacks suppressed netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. kobject: 'loop5' (000000000d74e71f): kobject_uevent_env kobject: 'loop5' (000000000d74e71f): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop4' (0000000078e83cc2): kobject_uevent_env kobject: 'loop4' (0000000078e83cc2): fill_kobj_path: path = '/devices/virtual/block/loop4' netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. kobject: 'loop2' (000000001bef32e8): kobject_uevent_env FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 kobject: 'loop2' (000000001bef32e8): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop5' (000000000d74e71f): kobject_uevent_env CPU: 1 PID: 28524 Comm: syz-executor4 Not tainted 4.20.0+ #3 netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1db/0x2d0 lib/dump_stack.c:113 kobject: 'loop5' (000000000d74e71f): fill_kobj_path: path = '/devices/virtual/block/loop5' fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0x15 lib/fault-inject.c:149 kobject: 'loop0' (000000009ec3ce10): kobject_uevent_env kobject: 'loop0' (000000009ec3ce10): fill_kobj_path: path = '/devices/virtual/block/loop0' __should_failslab+0x121/0x190 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1578 slab_pre_alloc_hook mm/slab.h:423 [inline] slab_alloc_node mm/slab.c:3299 [inline] kmem_cache_alloc_node+0x26f/0x710 mm/slab.c:3642 kobject: 'loop1' (00000000384c9082): kobject_uevent_env kobject: 'loop1' (00000000384c9082): fill_kobj_path: path = '/devices/virtual/block/loop1' __alloc_skb+0xf4/0x730 net/core/skbuff.c:196 kobject: 'loop2' (000000001bef32e8): kobject_uevent_env alloc_skb include/linux/skbuff.h:1011 [inline] netlink_alloc_large_skb net/netlink/af_netlink.c:1182 [inline] netlink_sendmsg+0xb11/0xf90 net/netlink/af_netlink.c:1892 kobject: 'loop2' (000000001bef32e8): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop4' (0000000078e83cc2): kobject_uevent_env sock_sendmsg_nosec net/socket.c:621 [inline] sock_sendmsg+0xdd/0x130 net/socket.c:631 sock_write_iter+0x379/0x5e0 net/socket.c:900 kobject: 'loop4' (0000000078e83cc2): fill_kobj_path: path = '/devices/virtual/block/loop4' call_write_iter include/linux/fs.h:1857 [inline] do_iter_readv_writev+0x856/0xae0 fs/read_write.c:680 kobject: 'loop5' (000000000d74e71f): kobject_uevent_env do_iter_write fs/read_write.c:959 [inline] do_iter_write+0x184/0x600 fs/read_write.c:940 kobject: 'loop5' (000000000d74e71f): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop0' (000000009ec3ce10): kobject_uevent_env vfs_writev+0x1ee/0x370 fs/read_write.c:1004 kobject: 'loop0' (000000009ec3ce10): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop4' (0000000078e83cc2): kobject_uevent_env do_writev+0x11a/0x300 fs/read_write.c:1039 kobject: 'loop4' (0000000078e83cc2): fill_kobj_path: path = '/devices/virtual/block/loop4' __do_sys_writev fs/read_write.c:1112 [inline] __se_sys_writev fs/read_write.c:1109 [inline] __x64_sys_writev+0x75/0xb0 fs/read_write.c:1109 do_syscall_64+0x1a3/0x800 arch/x86/entry/common.c:290 kobject: 'loop2' (000000001bef32e8): kobject_uevent_env entry_SYSCALL_64_after_hwframe+0x49/0xbe kobject: 'loop2' (000000001bef32e8): fill_kobj_path: path = '/devices/virtual/block/loop2' RIP: 0033:0x457ec9 Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f8af24c7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 RAX: ffffffffffffffda RBX: 00007f8af24c7c90 RCX: 0000000000457ec9 RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000003 kobject: 'loop1' (00000000384c9082): kobject_uevent_env RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8af24c86d4 R13: 00000000004c493c R14: 00000000004dcd58 R15: 0000000000000004 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 netlink: 64 bytes leftover after parsing attributes in process `syz-executor3'. CPU: 1 PID: 28541 Comm: syz-executor4 Not tainted 4.20.0+ #3 kobject: 'loop1' (00000000384c9082): fill_kobj_path: path = '/devices/virtual/block/loop1' Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1db/0x2d0 lib/dump_stack.c:113 kobject: 'loop5' (000000000d74e71f): kobject_uevent_env kobject: 'loop5' (000000000d74e71f): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop0' (000000009ec3ce10): kobject_uevent_env fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0x15 lib/fault-inject.c:149 kobject: 'loop0' (000000009ec3ce10): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop4' (0000000078e83cc2): kobject_uevent_env __should_failslab+0x121/0x190 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1578 slab_pre_alloc_hook mm/slab.h:423 [inline] slab_alloc_node mm/slab.c:3299 [inline] kmem_cache_alloc_node_trace+0x277/0x720 mm/slab.c:3661 kobject: 'loop4' (0000000078e83cc2): fill_kobj_path: path = '/devices/virtual/block/loop4' __do_kmalloc_node mm/slab.c:3683 [inline] __kmalloc_node_track_caller+0x3d/0x80 mm/slab.c:3698 kobject: 'loop2' (000000001bef32e8): kobject_uevent_env __kmalloc_reserve.isra.0+0x40/0xe0 net/core/skbuff.c:140 __alloc_skb+0x12d/0x730 net/core/skbuff.c:208 kobject: 'loop2' (000000001bef32e8): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop1' (00000000384c9082): kobject_uevent_env kobject: 'loop1' (00000000384c9082): fill_kobj_path: path = '/devices/virtual/block/loop1' alloc_skb include/linux/skbuff.h:1011 [inline] netlink_alloc_large_skb net/netlink/af_netlink.c:1182 [inline] netlink_sendmsg+0xb11/0xf90 net/netlink/af_netlink.c:1892 kobject: 'loop5' (000000000d74e71f): kobject_uevent_env kobject: 'loop5' (000000000d74e71f): fill_kobj_path: path = '/devices/virtual/block/loop5' sock_sendmsg_nosec net/socket.c:621 [inline] sock_sendmsg+0xdd/0x130 net/socket.c:631 kobject: 'loop4' (0000000078e83cc2): kobject_uevent_env sock_write_iter+0x379/0x5e0 net/socket.c:900 kobject: 'loop4' (0000000078e83cc2): fill_kobj_path: path = '/devices/virtual/block/loop4' call_write_iter include/linux/fs.h:1857 [inline] do_iter_readv_writev+0x856/0xae0 fs/read_write.c:680 kobject: 'loop0' (000000009ec3ce10): kobject_uevent_env do_iter_write fs/read_write.c:959 [inline] do_iter_write+0x184/0x600 fs/read_write.c:940 kobject: 'loop0' (000000009ec3ce10): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop5' (000000000d74e71f): kobject_uevent_env vfs_writev+0x1ee/0x370 fs/read_write.c:1004 kobject: 'loop5' (000000000d74e71f): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop1' (00000000384c9082): kobject_uevent_env do_writev+0x11a/0x300 fs/read_write.c:1039 kobject: 'loop1' (00000000384c9082): fill_kobj_path: path = '/devices/virtual/block/loop1' __do_sys_writev fs/read_write.c:1112 [inline] __se_sys_writev fs/read_write.c:1109 [inline] __x64_sys_writev+0x75/0xb0 fs/read_write.c:1109 kobject: 'loop4' (0000000078e83cc2): kobject_uevent_env do_syscall_64+0x1a3/0x800 arch/x86/entry/common.c:290 kobject: 'loop4' (0000000078e83cc2): fill_kobj_path: path = '/devices/virtual/block/loop4' entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457ec9 Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 kobject: 'loop2' (000000001bef32e8): kobject_uevent_env RSP: 002b:00007f8af24c7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 RAX: ffffffffffffffda RBX: 00007f8af24c7c90 RCX: 0000000000457ec9 RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000003 RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8af24c86d4 kobject: 'loop2' (000000001bef32e8): fill_kobj_path: path = '/devices/virtual/block/loop2' R13: 00000000004c493c R14: 00000000004dcd58 R15: 0000000000000004 kobject: 'loop0' (000000009ec3ce10): kobject_uevent_env netlink: 64 bytes leftover after parsing attributes in process `syz-executor4'. kobject: 'loop0' (000000009ec3ce10): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop5' (000000000d74e71f): kobject_uevent_env kobject: 'loop5' (000000000d74e71f): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop0' (000000009ec3ce10): kobject_uevent_env kobject: 'loop0' (000000009ec3ce10): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop4' (0000000078e83cc2): kobject_uevent_env kobject: 'loop4' (0000000078e83cc2): fill_kobj_path: path = '/devices/virtual/block/loop4' FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 kobject: 'loop2' (000000001bef32e8): kobject_uevent_env CPU: 0 PID: 28578 Comm: syz-executor4 Not tainted 4.20.0+ #3 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1db/0x2d0 lib/dump_stack.c:113 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0x15 lib/fault-inject.c:149 __should_failslab+0x121/0x190 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1578 slab_pre_alloc_hook mm/slab.h:423 [inline] slab_alloc_node mm/slab.c:3299 [inline] kmem_cache_alloc_node+0x26f/0x710 mm/slab.c:3642 kobject: 'loop2' (000000001bef32e8): fill_kobj_path: path = '/devices/virtual/block/loop2' __alloc_skb+0xf4/0x730 net/core/skbuff.c:196 alloc_skb include/linux/skbuff.h:1011 [inline] nlmsg_new include/net/netlink.h:654 [inline] netlink_ack+0x25c/0xba0 net/netlink/af_netlink.c:2411 kobject: 'loop1' (00000000384c9082): kobject_uevent_env netlink_rcv_skb+0x348/0x410 net/netlink/af_netlink.c:2483 kobject: 'loop1' (00000000384c9082): fill_kobj_path: path = '/devices/virtual/block/loop1' rtnetlink_rcv+0x1d/0x30 net/core/rtnetlink.c:5143 netlink_unicast_kernel net/netlink/af_netlink.c:1310 [inline] netlink_unicast+0x574/0x770 net/netlink/af_netlink.c:1336 netlink_sendmsg+0xa05/0xf90 net/netlink/af_netlink.c:1917 kobject: 'loop5' (000000000d74e71f): kobject_uevent_env kobject: 'loop5' (000000000d74e71f): fill_kobj_path: path = '/devices/virtual/block/loop5' sock_sendmsg_nosec net/socket.c:621 [inline] sock_sendmsg+0xdd/0x130 net/socket.c:631 sock_write_iter+0x379/0x5e0 net/socket.c:900 call_write_iter include/linux/fs.h:1857 [inline] do_iter_readv_writev+0x856/0xae0 fs/read_write.c:680 kobject: 'loop0' (000000009ec3ce10): kobject_uevent_env do_iter_write fs/read_write.c:959 [inline] do_iter_write+0x184/0x600 fs/read_write.c:940 vfs_writev+0x1ee/0x370 fs/read_write.c:1004 kobject: 'loop0' (000000009ec3ce10): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop4' (0000000078e83cc2): kobject_uevent_env do_writev+0x11a/0x300 fs/read_write.c:1039 kobject: 'loop4' (0000000078e83cc2): fill_kobj_path: path = '/devices/virtual/block/loop4' __do_sys_writev fs/read_write.c:1112 [inline] __se_sys_writev fs/read_write.c:1109 [inline] __x64_sys_writev+0x75/0xb0 fs/read_write.c:1109 do_syscall_64+0x1a3/0x800 arch/x86/entry/common.c:290 kobject: 'loop2' (000000001bef32e8): kobject_uevent_env entry_SYSCALL_64_after_hwframe+0x49/0xbe kobject: 'loop2' (000000001bef32e8): fill_kobj_path: path = '/devices/virtual/block/loop2' RIP: 0033:0x457ec9 Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f8af24c7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 RAX: ffffffffffffffda RBX: 00007f8af24c7c90 RCX: 0000000000457ec9 RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000003 kobject: 'loop1' (00000000384c9082): kobject_uevent_env RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 kobject: 'loop1' (00000000384c9082): fill_kobj_path: path = '/devices/virtual/block/loop1' R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8af24c86d4 R13: 00000000004c493c R14: 00000000004dcd58 R15: 0000000000000004 kobject: 'loop5' (000000000d74e71f): kobject_uevent_env netlink: 64 bytes leftover after parsing attributes in process `syz-executor4'. kobject: 'loop5' (000000000d74e71f): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop0' (000000009ec3ce10): kobject_uevent_env kobject: 'loop0' (000000009ec3ce10): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop4' (0000000078e83cc2): kobject_uevent_env FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 kobject: 'loop4' (0000000078e83cc2): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop2' (000000001bef32e8): kobject_uevent_env kobject: 'loop2' (000000001bef32e8): fill_kobj_path: path = '/devices/virtual/block/loop2' CPU: 1 PID: 28611 Comm: syz-executor4 Not tainted 4.20.0+ #3 kobject: 'loop0' (000000009ec3ce10): kobject_uevent_env Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1db/0x2d0 lib/dump_stack.c:113 kobject: 'loop0' (000000009ec3ce10): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop5' (000000000d74e71f): kobject_uevent_env fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0x15 lib/fault-inject.c:149 kobject: 'loop5' (000000000d74e71f): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop4' (0000000078e83cc2): kobject_uevent_env __should_failslab+0x121/0x190 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1578 slab_pre_alloc_hook mm/slab.h:423 [inline] slab_alloc_node mm/slab.c:3299 [inline] kmem_cache_alloc_node_trace+0x277/0x720 mm/slab.c:3661 kobject: 'loop4' (0000000078e83cc2): fill_kobj_path: path = '/devices/virtual/block/loop4' __do_kmalloc_node mm/slab.c:3683 [inline] __kmalloc_node_track_caller+0x3d/0x80 mm/slab.c:3698 __kmalloc_reserve.isra.0+0x40/0xe0 net/core/skbuff.c:140 kobject: 'loop1' (00000000384c9082): kobject_uevent_env __alloc_skb+0x12d/0x730 net/core/skbuff.c:208 kobject: 'loop1' (00000000384c9082): fill_kobj_path: path = '/devices/virtual/block/loop1' alloc_skb include/linux/skbuff.h:1011 [inline] nlmsg_new include/net/netlink.h:654 [inline] netlink_ack+0x25c/0xba0 net/netlink/af_netlink.c:2411 netlink_rcv_skb+0x348/0x410 net/netlink/af_netlink.c:2483 kobject: 'loop2' (000000001bef32e8): kobject_uevent_env rtnetlink_rcv+0x1d/0x30 net/core/rtnetlink.c:5143 netlink_unicast_kernel net/netlink/af_netlink.c:1310 [inline] netlink_unicast+0x574/0x770 net/netlink/af_netlink.c:1336 kobject: 'loop2' (000000001bef32e8): fill_kobj_path: path = '/devices/virtual/block/loop2' netlink_sendmsg+0xa05/0xf90 net/netlink/af_netlink.c:1917 kobject: 'loop1' (00000000384c9082): kobject_uevent_env kobject: 'loop1' (00000000384c9082): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop4' (0000000078e83cc2): kobject_uevent_env sock_sendmsg_nosec net/socket.c:621 [inline] sock_sendmsg+0xdd/0x130 net/socket.c:631 sock_write_iter+0x379/0x5e0 net/socket.c:900 kobject: 'loop4' (0000000078e83cc2): fill_kobj_path: path = '/devices/virtual/block/loop4' call_write_iter include/linux/fs.h:1857 [inline] do_iter_readv_writev+0x856/0xae0 fs/read_write.c:680 kobject: 'loop5' (000000000d74e71f): kobject_uevent_env do_iter_write fs/read_write.c:959 [inline] do_iter_write+0x184/0x600 fs/read_write.c:940 kobject: 'loop5' (000000000d74e71f): fill_kobj_path: path = '/devices/virtual/block/loop5' vfs_writev+0x1ee/0x370 fs/read_write.c:1004 kobject: 'loop0' (000000009ec3ce10): kobject_uevent_env kobject: 'loop0' (000000009ec3ce10): fill_kobj_path: path = '/devices/virtual/block/loop0' do_writev+0x11a/0x300 fs/read_write.c:1039 kobject: 'loop4' (0000000078e83cc2): kobject_uevent_env __do_sys_writev fs/read_write.c:1112 [inline] __se_sys_writev fs/read_write.c:1109 [inline] __x64_sys_writev+0x75/0xb0 fs/read_write.c:1109 do_syscall_64+0x1a3/0x800 arch/x86/entry/common.c:290 kobject: 'loop4' (0000000078e83cc2): fill_kobj_path: path = '/devices/virtual/block/loop4' entry_SYSCALL_64_after_hwframe+0x49/0xbe kobject: 'loop2' (000000001bef32e8): kobject_uevent_env RIP: 0033:0x457ec9 Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f8af24c7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 RAX: ffffffffffffffda RBX: 00007f8af24c7c90 RCX: 0000000000457ec9 RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000003 kobject: 'loop2' (000000001bef32e8): fill_kobj_path: path = '/devices/virtual/block/loop2' RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8af24c86d4 R13: 00000000004c493c R14: 00000000004dcd58 R15: 0000000000000004 netlink: 64 bytes leftover after parsing attributes in process `syz-executor4'. kobject: 'loop5' (000000000d74e71f): kobject_uevent_env kobject: 'loop5' (000000000d74e71f): fill_kobj_path: path = '/devices/virtual/block/loop5' netlink: 64 bytes leftover after parsing attributes in process `syz-executor4'. kobject: 'loop0' (000000009ec3ce10): kobject_uevent_env kobject: 'loop0' (000000009ec3ce10): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop1' (00000000384c9082): kobject_uevent_env kobject: 'loop1' (00000000384c9082): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop4' (0000000078e83cc2): kobject_uevent_env kobject: 'loop4' (0000000078e83cc2): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop2' (000000001bef32e8): kobject_uevent_env kobject: 'loop2' (000000001bef32e8): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop5' (000000000d74e71f): kobject_uevent_env kobject: 'loop5' (000000000d74e71f): fill_kobj_path: path = '/devices/virtual/block/loop5' netlink: 64 bytes leftover after parsing attributes in process `syz-executor1'. kobject: 'loop1' (00000000384c9082): kobject_uevent_env kobject: 'loop1' (00000000384c9082): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop0' (000000009ec3ce10): kobject_uevent_env kobject: 'loop0' (000000009ec3ce10): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop2' (000000001bef32e8): kobject_uevent_env kobject: 'loop2' (000000001bef32e8): fill_kobj_path: path = '/devices/virtual/block/loop2' netlink: 64 bytes leftover after parsing attributes in process `syz-executor1'. kobject: 'loop5' (000000000d74e71f): kobject_uevent_env kobject: 'loop5' (000000000d74e71f): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop4' (0000000078e83cc2): kobject_uevent_env kobject: 'loop4' (0000000078e83cc2): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop1' (00000000384c9082): kobject_uevent_env kobject: 'loop1' (00000000384c9082): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop0' (000000009ec3ce10): kobject_uevent_env kobject: 'loop0' (000000009ec3ce10): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop5' (000000000d74e71f): kobject_uevent_env kobject: 'loop5' (000000000d74e71f): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop4' (0000000078e83cc2): kobject_uevent_env kobject: 'loop4' (0000000078e83cc2): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop2' (000000001bef32e8): kobject_uevent_env kobject: 'loop2' (000000001bef32e8): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop1' (00000000384c9082): kobject_uevent_env kobject: 'loop1' (00000000384c9082): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop4' (0000000078e83cc2): kobject_uevent_env kobject: 'loop4' (0000000078e83cc2): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop0' (000000009ec3ce10): kobject_uevent_env kobject: 'loop0' (000000009ec3ce10): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop5' (000000000d74e71f): kobject_uevent_env kobject: 'loop5' (000000000d74e71f): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop1' (00000000384c9082): kobject_uevent_env kobject: 'loop1' (00000000384c9082): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop4' (0000000078e83cc2): kobject_uevent_env kobject: 'loop4' (0000000078e83cc2): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop2' (000000001bef32e8): kobject_uevent_env kobject: 'loop2' (000000001bef32e8): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop0' (000000009ec3ce10): kobject_uevent_env kobject: 'loop0' (000000009ec3ce10): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop1' (00000000384c9082): kobject_uevent_env kobject: 'loop1' (00000000384c9082): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop5' (000000000d74e71f): kobject_uevent_env kobject: 'loop5' (000000000d74e71f): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop0' (000000009ec3ce10): kobject_uevent_env kobject: 'loop0' (000000009ec3ce10): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop4' (0000000078e83cc2): kobject_uevent_env kobject: 'loop4' (0000000078e83cc2): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop5' (000000000d74e71f): kobject_uevent_env kobject: 'loop5' (000000000d74e71f): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop1' (00000000384c9082): kobject_uevent_env kobject: 'loop1' (00000000384c9082): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop2' (000000001bef32e8): kobject_uevent_env kobject: 'loop2' (000000001bef32e8): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop0' (000000009ec3ce10): kobject_uevent_env kobject: 'loop0' (000000009ec3ce10): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop1' (00000000384c9082): kobject_uevent_env kobject: 'loop1' (00000000384c9082): fill_kobj_path: path = '/devices/virtual/block/loop1'