audit: type=1400 audit(1571582904.555:316): avc: denied { map } for pid=18565 comm="syz-executor.2" path="/dev/usbmon0" dev="devtmpfs" ino=15370 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:usbmon_device_t:s0 tclass=chr_file permissive=1 ====================================================== WARNING: possible circular locking dependency detected 4.14.150 #0 Not tainted ------------------------------------------------------ syz-executor.2/18566 is trying to acquire lock: (&rp->fetch_lock){+.+.}, at: [] mon_bin_vma_fault+0x6f/0x280 drivers/usb/mon/mon_bin.c:1236 but task is already holding lock: (&mm->mmap_sem){++++}, at: [] __mm_populate+0x1e5/0x2c0 mm/gup.c:1259 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #1 (&mm->mmap_sem){++++}: lock_acquire+0x16f/0x430 kernel/locking/lockdep.c:3994 __might_fault mm/memory.c:4584 [inline] __might_fault+0x143/0x1d0 mm/memory.c:4569 _copy_to_user+0x2c/0xd0 lib/usercopy.c:25 copy_to_user include/linux/uaccess.h:155 [inline] mon_bin_read+0x2fb/0x5e0 drivers/usb/mon/mon_bin.c:825 do_loop_readv_writev fs/read_write.c:695 [inline] do_loop_readv_writev fs/read_write.c:682 [inline] do_iter_read+0x3e2/0x5b0 fs/read_write.c:919 vfs_readv+0xd3/0x130 fs/read_write.c:981 do_preadv+0x15d/0x200 fs/read_write.c:1065 SYSC_preadv fs/read_write.c:1115 [inline] SyS_preadv+0x31/0x40 fs/read_write.c:1110 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 -> #0 (&rp->fetch_lock){+.+.}: check_prev_add kernel/locking/lockdep.c:1901 [inline] check_prevs_add kernel/locking/lockdep.c:2018 [inline] validate_chain kernel/locking/lockdep.c:2460 [inline] __lock_acquire+0x2cb3/0x4620 kernel/locking/lockdep.c:3487 lock_acquire+0x16f/0x430 kernel/locking/lockdep.c:3994 __mutex_lock_common kernel/locking/mutex.c:756 [inline] __mutex_lock+0xe8/0x1470 kernel/locking/mutex.c:893 mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:908 mon_bin_vma_fault+0x6f/0x280 drivers/usb/mon/mon_bin.c:1236 __do_fault+0x104/0x390 mm/memory.c:3223 do_read_fault mm/memory.c:3633 [inline] do_fault mm/memory.c:3759 [inline] handle_pte_fault mm/memory.c:3989 [inline] __handle_mm_fault+0x2460/0x3470 mm/memory.c:4113 handle_mm_fault+0x293/0x7c0 mm/memory.c:4150 faultin_page mm/gup.c:514 [inline] __get_user_pages+0x465/0x1220 mm/gup.c:714 populate_vma_page_range+0x18e/0x230 mm/gup.c:1231 __mm_populate+0x198/0x2c0 mm/gup.c:1279 mm_populate include/linux/mm.h:2187 [inline] vm_mmap_pgoff+0x1be/0x1d0 mm/util.c:338 SYSC_mmap_pgoff mm/mmap.c:1551 [inline] SyS_mmap_pgoff+0x3ca/0x520 mm/mmap.c:1509 SYSC_mmap arch/x86/kernel/sys_x86_64.c:100 [inline] SyS_mmap+0x16/0x20 arch/x86/kernel/sys_x86_64.c:91 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 other info that might help us debug this: Possible unsafe locking scenario: CPU0 CPU1 ---- ---- lock(&mm->mmap_sem); lock(&rp->fetch_lock); lock(&mm->mmap_sem); lock(&rp->fetch_lock); *** DEADLOCK *** 1 lock held by syz-executor.2/18566: #0: (&mm->mmap_sem){++++}, at: [] __mm_populate+0x1e5/0x2c0 mm/gup.c:1259 stack backtrace: CPU: 1 PID: 18566 Comm: syz-executor.2 Not tainted 4.14.150 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x138/0x197 lib/dump_stack.c:53 print_circular_bug.isra.0.cold+0x1cc/0x28f kernel/locking/lockdep.c:1258 check_prev_add kernel/locking/lockdep.c:1901 [inline] check_prevs_add kernel/locking/lockdep.c:2018 [inline] validate_chain kernel/locking/lockdep.c:2460 [inline] __lock_acquire+0x2cb3/0x4620 kernel/locking/lockdep.c:3487 lock_acquire+0x16f/0x430 kernel/locking/lockdep.c:3994 __mutex_lock_common kernel/locking/mutex.c:756 [inline] __mutex_lock+0xe8/0x1470 kernel/locking/mutex.c:893 mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:908 mon_bin_vma_fault+0x6f/0x280 drivers/usb/mon/mon_bin.c:1236 __do_fault+0x104/0x390 mm/memory.c:3223 do_read_fault mm/memory.c:3633 [inline] do_fault mm/memory.c:3759 [inline] handle_pte_fault mm/memory.c:3989 [inline] __handle_mm_fault+0x2460/0x3470 mm/memory.c:4113 handle_mm_fault+0x293/0x7c0 mm/memory.c:4150 faultin_page mm/gup.c:514 [inline] __get_user_pages+0x465/0x1220 mm/gup.c:714 populate_vma_page_range+0x18e/0x230 mm/gup.c:1231 __mm_populate+0x198/0x2c0 mm/gup.c:1279 mm_populate include/linux/mm.h:2187 [inline] vm_mmap_pgoff+0x1be/0x1d0 mm/util.c:338 SYSC_mmap_pgoff mm/mmap.c:1551 [inline] SyS_mmap_pgoff+0x3ca/0x520 mm/mmap.c:1509 SYSC_mmap arch/x86/kernel/sys_x86_64.c:100 [inline] SyS_mmap+0x16/0x20 arch/x86/kernel/sys_x86_64.c:91 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x459a59 RSP: 002b:00007f731b552c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000459a59 RDX: 0000000000000004 RSI: 0000000000004000 RDI: 0000000020ffb000 RBP: 000000000075bf20 R08: 0000000000000003 R09: 0000000000000000 R10: 0000000000002012 R11: 0000000000000246 R12: 00007f731b5536d4 R13: 00000000004c61e1 R14: 00000000004db2e8 R15: 00000000ffffffff kobject: 'loop5' (ffff8880a4ac8960): kobject_uevent_env kobject: 'loop5' (ffff8880a4ac8960): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop1' (ffff8880a496ce20): kobject_uevent_env kobject: 'loop1' (ffff8880a496ce20): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop2' (ffff8880a49c5720): kobject_uevent_env kobject: 'loop2' (ffff8880a49c5720): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'kvm' (ffff8880a6ec1390): kobject_uevent_env kobject: 'kvm' (ffff8880a6ec1390): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop2' (ffff8880a49c5720): kobject_uevent_env kobject: 'kvm' (ffff8880a6ec1390): kobject_uevent_env kobject: 'loop2' (ffff8880a49c5720): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'kvm' (ffff8880a6ec1390): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'rx-0' (ffff88804c5086d0): kobject_cleanup, parent ffff8880a04edf48 kobject: 'rx-0' (ffff88804c5086d0): auto cleanup 'remove' event kobject: 'kvm' (ffff8880a6ec1390): kobject_uevent_env kobject: 'kvm' (ffff8880a6ec1390): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'rx-0' (ffff88804c5086d0): kobject_uevent_env kobject: 'kvm' (ffff8880a6ec1390): kobject_uevent_env kobject: 'rx-0' (ffff88804c5086d0): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'kvm' (ffff8880a6ec1390): fill_kobj_path: path = '/devices/virtual/misc/kvm' net_ratelimit: 12 callbacks suppressed protocol 88fb is buggy, dev hsr_slave_0 protocol 88fb is buggy, dev hsr_slave_1 protocol 88fb is buggy, dev hsr_slave_0 kobject: 'loop2' (ffff8880a49c5720): kobject_uevent_env protocol 88fb is buggy, dev hsr_slave_1 kobject: 'loop2' (ffff8880a49c5720): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'rx-0' (ffff88804c5086d0): auto cleanup kobject_del kobject: 'loop1' (ffff8880a496ce20): kobject_uevent_env kobject: 'rx-0' (ffff88804c5086d0): calling ktype release kobject: 'loop1' (ffff8880a496ce20): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop2' (ffff8880a49c5720): kobject_uevent_env kobject: 'loop2' (ffff8880a49c5720): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'rx-0': free name kobject: 'loop1' (ffff8880a496ce20): kobject_uevent_env kobject: 'loop1' (ffff8880a496ce20): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'tx-0' (ffff8880927ee318): kobject_cleanup, parent ffff8880a04edf48 kobject: 'loop5' (ffff8880a4ac8960): kobject_uevent_env kobject: 'loop5' (ffff8880a4ac8960): fill_kobj_path: path = '/devices/virtual/block/loop5' protocol 88fb is buggy, dev hsr_slave_0 protocol 88fb is buggy, dev hsr_slave_1 kobject: 'tx-0' (ffff8880927ee318): auto cleanup 'remove' event kobject: 'loop2' (ffff8880a49c5720): kobject_uevent_env kobject: 'tx-0' (ffff8880927ee318): kobject_uevent_env kobject: 'loop2' (ffff8880a49c5720): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'tx-0' (ffff8880927ee318): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'tx-0' (ffff8880927ee318): auto cleanup kobject_del kobject: 'tx-0' (ffff8880927ee318): calling ktype release kobject: 'loop2' (ffff8880a49c5720): kobject_uevent_env kobject: 'tx-0': free name kobject: 'loop2' (ffff8880a49c5720): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'queues' (ffff8880a04edf48): kobject_cleanup, parent (null) kobject: 'queues' (ffff8880a04edf48): calling ktype release kobject: 'loop1' (ffff8880a496ce20): kobject_uevent_env kobject: 'queues' (ffff8880a04edf48): kset_release kobject: 'loop1' (ffff8880a496ce20): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'queues': free name kobject: 'ip6gre0' (ffff88804ec60e70): kobject_uevent_env kobject: 'loop5' (ffff8880a4ac8960): kobject_uevent_env kobject: 'ip6gre0' (ffff88804ec60e70): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'loop5' (ffff8880a4ac8960): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop2' (ffff8880a49c5720): kobject_uevent_env kobject: 'loop2' (ffff8880a49c5720): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop2' (ffff8880a49c5720): kobject_uevent_env kobject: 'ip6gre0' (ffff88804ec60e70): kobject_cleanup, parent (null) kobject: 'ip6gre0' (ffff88804ec60e70): calling ktype release kobject: 'loop2' (ffff8880a49c5720): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'ip6gre0': free name kobject: 'loop1' (ffff8880a496ce20): kobject_uevent_env protocol 88fb is buggy, dev hsr_slave_0 protocol 88fb is buggy, dev hsr_slave_1 kobject: 'rx-0' (ffff88809d2d20d0): kobject_cleanup, parent ffff88809b953548 kobject: 'rx-0' (ffff88809d2d20d0): auto cleanup 'remove' event kobject: 'rx-0' (ffff88809d2d20d0): kobject_uevent_env kobject: 'loop1' (ffff8880a496ce20): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'rx-0' (ffff88809d2d20d0): kobject_uevent_env: uevent_suppress caused the event to drop! protocol 88fb is buggy, dev hsr_slave_0 kobject: 'rx-0' (ffff88809d2d20d0): auto cleanup kobject_del protocol 88fb is buggy, dev hsr_slave_1 kobject: 'rx-0' (ffff88809d2d20d0): calling ktype release kobject: 'loop1' (ffff8880a496ce20): kobject_uevent_env kobject: 'loop1' (ffff8880a496ce20): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'rx-0': free name kobject: 'tx-0' (ffff888099c25018): kobject_cleanup, parent ffff88809b953548 kobject: 'tx-0' (ffff888099c25018): auto cleanup 'remove' event kobject: 'tx-0' (ffff888099c25018): kobject_uevent_env kobject: 'tx-0' (ffff888099c25018): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'tx-0' (ffff888099c25018): auto cleanup kobject_del kobject: 'tx-0' (ffff888099c25018): calling ktype release kobject: 'tx-0': free name kobject: 'queues' (ffff88809b953548): kobject_cleanup, parent (null) kobject: 'queues' (ffff88809b953548): calling ktype release kobject: 'queues' (ffff88809b953548): kset_release kobject: 'loop5' (ffff8880a4ac8960): kobject_uevent_env kobject: 'queues': free name kobject: 'loop5' (ffff8880a4ac8960): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'ip6tnl0' (ffff88808a2d6bf0): kobject_uevent_env kobject: 'ip6tnl0' (ffff88808a2d6bf0): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'ip6tnl0' (ffff88808a2d6bf0): kobject_cleanup, parent (null) kobject: 'ip6tnl0' (ffff88808a2d6bf0): calling ktype release kobject: 'ip6tnl0': free name kobject: 'rx-0' (ffff88808e037850): kobject_cleanup, parent ffff88807833ca48 kobject: 'rx-0' (ffff88808e037850): auto cleanup 'remove' event kobject: 'rx-0' (ffff88808e037850): kobject_uevent_env kobject: 'rx-0' (ffff88808e037850): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'rx-0' (ffff88808e037850): auto cleanup kobject_del kobject: 'rx-0' (ffff88808e037850): calling ktype release kobject: 'rx-0': free name kobject: 'tx-0' (ffff888077f64ad8): kobject_cleanup, parent ffff88807833ca48 kobject: 'tx-0' (ffff888077f64ad8): auto cleanup 'remove' event kobject: 'tx-0' (ffff888077f64ad8): kobject_uevent_env kobject: 'tx-0' (ffff888077f64ad8): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'tx-0' (ffff888077f64ad8): auto cleanup kobject_del kobject: 'tx-0' (ffff888077f64ad8): calling ktype release kobject: 'tx-0': free name kobject: 'queues' (ffff88807833ca48): kobject_cleanup, parent (null) kobject: 'loop4' (ffff8880a4a706e0): kobject_uevent_env kobject: 'queues' (ffff88807833ca48): calling ktype release kobject: 'queues' (ffff88807833ca48): kset_release kobject: 'queues': free name kobject: 'loop4' (ffff8880a4a706e0): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'sit0' (ffff8880500969f0): kobject_uevent_env kobject: 'sit0' (ffff8880500969f0): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'loop2' (ffff8880a49c5720): kobject_uevent_env kobject: 'loop2' (ffff8880a49c5720): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'sit0' (ffff8880500969f0): kobject_cleanup, parent (null) kobject: 'sit0' (ffff8880500969f0): calling ktype release kobject: 'sit0': free name kobject: 'loop1' (ffff8880a496ce20): kobject_uevent_env kobject: 'rx-0' (ffff888086c0fa90): kobject_cleanup, parent ffff8880a0a8b548 kobject: 'loop1' (ffff8880a496ce20): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'rx-0' (ffff888086c0fa90): auto cleanup 'remove' event kobject: 'loop1' (ffff8880a496ce20): kobject_uevent_env kobject: 'rx-0' (ffff888086c0fa90): kobject_uevent_env kobject: 'loop1' (ffff8880a496ce20): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'rx-0' (ffff888086c0fa90): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'loop4' (ffff8880a4a706e0): kobject_uevent_env kobject: 'loop4' (ffff8880a4a706e0): kobject_uevent_env kobject: 'loop4' (ffff8880a4a706e0): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop4' (ffff8880a4a706e0): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'rx-0' (ffff888086c0fa90): auto cleanup kobject_del kobject: 'loop2' (ffff8880a49c5720): kobject_uevent_env kobject: 'rx-0' (ffff888086c0fa90): calling ktype release kobject: 'loop2' (ffff8880a49c5720): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'rx-0': free name kobject: 'loop4' (ffff8880a4a706e0): kobject_uevent_env kobject: 'tx-0' (ffff8880a9609cd8): kobject_cleanup, parent ffff8880a0a8b548 kobject: 'loop4' (ffff8880a4a706e0): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop2' (ffff8880a49c5720): kobject_uevent_env kobject: 'loop2' (ffff8880a49c5720): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'tx-0' (ffff8880a9609cd8): auto cleanup 'remove' event kobject: 'tx-0' (ffff8880a9609cd8): kobject_uevent_env kobject: 'loop4' (ffff8880a4a706e0): kobject_uevent_env kobject: 'tx-0' (ffff8880a9609cd8): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'tx-0' (ffff8880a9609cd8): auto cleanup kobject_del kobject: 'tx-0' (ffff8880a9609cd8): calling ktype release kobject: 'loop4' (ffff8880a4a706e0): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop2' (ffff8880a49c5720): kobject_uevent_env kobject: 'loop2' (ffff8880a49c5720): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop4' (ffff8880a4a706e0): kobject_uevent_env kobject: 'tx-0': free name kobject: 'queues' (ffff8880a0a8b548): kobject_cleanup, parent (null) kobject: 'loop4' (ffff8880a4a706e0): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop2' (ffff8880a49c5720): kobject_uevent_env kobject: 'loop2' (ffff8880a49c5720): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'queues' (ffff8880a0a8b548): calling ktype release kobject: 'queues' (ffff8880a0a8b548): kset_release kobject: 'loop5' (ffff8880a4ac8960): kobject_uevent_env kobject: 'queues': free name kobject: 'ip6_vti0' (ffff88809e9cc7f0): kobject_uevent_env kobject: 'loop5' (ffff8880a4ac8960): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'ip6_vti0' (ffff88809e9cc7f0): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'ip6_vti0' (ffff88809e9cc7f0): kobject_cleanup, parent (null) kobject: 'loop1' (ffff8880a496ce20): kobject_uevent_env kobject: 'loop1' (ffff8880a496ce20): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'ip6_vti0' (ffff88809e9cc7f0): calling ktype release kobject: 'ip6_vti0': free name kobject: 'rx-0' (ffff88809d2d23d0): kobject_cleanup, parent ffff88807833c748 kobject: 'loop1' (ffff8880a496ce20): kobject_uevent_env kobject: 'loop1' (ffff8880a496ce20): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'rx-0' (ffff88809d2d23d0): auto cleanup 'remove' event kobject: 'loop2' (ffff8880a49c5720): kobject_uevent_env kobject: 'rx-0' (ffff88809d2d23d0): kobject_uevent_env kobject: 'loop2' (ffff8880a49c5720): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'rx-0' (ffff88809d2d23d0): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'rx-0' (ffff88809d2d23d0): auto cleanup kobject_del kobject: 'loop1' (ffff8880a496ce20): kobject_uevent_env kobject: 'rx-0' (ffff88809d2d23d0): calling ktype release kobject: 'loop1' (ffff8880a496ce20): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'rx-0': free name kobject: 'tx-0' (ffff8880a02e3298): kobject_cleanup, parent ffff88807833c748 kobject: 'loop2' (ffff8880a49c5720): kobject_uevent_env kobject: 'tx-0' (ffff8880a02e3298): auto cleanup 'remove' event kobject: 'loop2' (ffff8880a49c5720): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'tx-0' (ffff8880a02e3298): kobject_uevent_env kobject: 'tx-0' (ffff8880a02e3298): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'loop5' (ffff8880a4ac8960): kobject_uevent_env kobject: 'loop5' (ffff8880a4ac8960): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'tx-0' (ffff8880a02e3298): auto cleanup kobject_del kobject: 'tx-0' (ffff8880a02e3298): calling ktype release kobject: 'tx-0': free name kobject: 'loop2' (ffff8880a49c5720): kobject_uevent_env kobject: 'queues' (ffff88807833c748): kobject_cleanup, parent (null) FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 kobject: 'loop2' (ffff8880a49c5720): fill_kobj_path: path = '/devices/virtual/block/loop2' CPU: 1 PID: 18736 Comm: syz-executor.1 Not tainted 4.14.150 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x138/0x197 lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10f/0x159 lib/fault-inject.c:149 should_failslab+0xdb/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] __do_kmalloc mm/slab.c:3718 [inline] __kmalloc+0x2f0/0x7a0 mm/slab.c:3729 kmalloc include/linux/slab.h:493 [inline] kzalloc include/linux/slab.h:661 [inline] mon_bin_ioctl+0x672/0xb50 drivers/usb/mon/mon_bin.c:1027 vfs_ioctl fs/ioctl.c:46 [inline] file_ioctl fs/ioctl.c:500 [inline] do_vfs_ioctl+0x7ae/0x1060 fs/ioctl.c:684 SYSC_ioctl fs/ioctl.c:701 [inline] SyS_ioctl+0x8f/0xc0 fs/ioctl.c:692 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x459a59 RSP: 002b:00007f7c46147c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007f7c46147c90 RCX: 0000000000459a59 RDX: 0000000000011540 RSI: 0000000000009204 RDI: 0000000000000003 RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7c461486d4 R13: 00000000004c3317 R14: 00000000004d7040 R15: 0000000000000004 kobject: 'queues' (ffff88807833c748): calling ktype release kobject: 'queues' (ffff88807833c748): kset_release kobject: 'queues': free name kobject: 'ip_vti0' (ffff8880992825b0): kobject_uevent_env kobject: 'ip_vti0' (ffff8880992825b0): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'ip_vti0' (ffff8880992825b0): kobject_cleanup, parent (null) kobject: 'ip_vti0' (ffff8880992825b0): calling ktype release kobject: 'loop4' (ffff8880a4a706e0): kobject_uevent_env kobject: 'ip_vti0': free name kobject: 'batman_adv' (ffff888099fb8e00): kobject_uevent_env kobject: 'loop4' (ffff8880a4a706e0): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'batman_adv' (ffff888099fb8e00): kobject_uevent_env: filter function caused the event to drop! kobject: 'loop1' (ffff8880a496ce20): kobject_uevent_env kobject: 'loop1' (ffff8880a496ce20): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'batman_adv' (ffff888099fb8e00): kobject_cleanup, parent (null) kobject: 'loop5' (ffff8880a4ac8960): kobject_uevent_env FAULT_INJECTION: forcing a failure. name fail_page_alloc, interval 1, probability 0, space 0, times 1 kobject: 'batman_adv' (ffff888099fb8e00): calling ktype release kobject: 'loop5' (ffff8880a4ac8960): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: (ffff888099fb8e00): dynamic_kobj_release CPU: 1 PID: 18744 Comm: syz-executor.1 Not tainted 4.14.150 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x138/0x197 lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10f/0x159 lib/fault-inject.c:149 should_fail_alloc_page mm/page_alloc.c:2891 [inline] prepare_alloc_pages mm/page_alloc.c:4124 [inline] __alloc_pages_nodemask+0x1d6/0x7a0 mm/page_alloc.c:4172 alloc_pages_current+0xec/0x1e0 mm/mempolicy.c:2113 alloc_pages include/linux/gfp.h:497 [inline] __get_free_pages+0xf/0x40 mm/page_alloc.c:4226 get_zeroed_page+0x11/0x20 mm/page_alloc.c:4235 mon_alloc_buff+0xa9/0x160 drivers/usb/mon/mon_bin.c:1320 mon_bin_ioctl+0x691/0xb50 drivers/usb/mon/mon_bin.c:1033 vfs_ioctl fs/ioctl.c:46 [inline] file_ioctl fs/ioctl.c:500 [inline] do_vfs_ioctl+0x7ae/0x1060 fs/ioctl.c:684 SYSC_ioctl fs/ioctl.c:701 [inline] SyS_ioctl+0x8f/0xc0 fs/ioctl.c:692 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x459a59 RSP: 002b:00007f7c46147c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007f7c46147c90 RCX: 0000000000459a59 RDX: 0000000000011540 RSI: 0000000000009204 RDI: 0000000000000003 RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7c461486d4 R13: 00000000004c3317 R14: 00000000004d7040 R15: 0000000000000004 kobject: 'loop2' (ffff8880a49c5720): kobject_uevent_env kobject: 'loop4' (ffff8880a4a706e0): kobject_uevent_env kobject: 'loop4' (ffff8880a4a706e0): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop2' (ffff8880a49c5720): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'batman_adv': free name kobject: 'rx-0' (ffff88808c3fd910): kobject_cleanup, parent ffff888092cc7948 kobject: 'rx-0' (ffff88808c3fd910): auto cleanup 'remove' event kobject: 'rx-0' (ffff88808c3fd910): kobject_uevent_env kobject: 'rx-0' (ffff88808c3fd910): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'rx-0' (ffff88808c3fd910): auto cleanup kobject_del kobject: 'rx-0' (ffff88808c3fd910): calling ktype release kobject: 'rx-0': free name kobject: 'tx-0' (ffff8880a51a2018): kobject_cleanup, parent ffff888092cc7948 kobject: 'tx-0' (ffff8880a51a2018): auto cleanup 'remove' event kobject: 'tx-0' (ffff8880a51a2018): kobject_uevent_env kobject: 'tx-0' (ffff8880a51a2018): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'loop2' (ffff8880a49c5720): kobject_uevent_env kobject: 'tx-0' (ffff8880a51a2018): auto cleanup kobject_del kobject: 'loop2' (ffff8880a49c5720): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'tx-0' (ffff8880a51a2018): calling ktype release kobject: 'tx-0': free name kobject: 'queues' (ffff888092cc7948): kobject_cleanup, parent (null) kobject: 'loop2' (ffff8880a49c5720): kobject_uevent_env kobject: 'queues' (ffff888092cc7948): calling ktype release kobject: 'loop2' (ffff8880a49c5720): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'queues' (ffff888092cc7948): kset_release kobject: 'queues': free name kobject: 'loop1' (ffff8880a496ce20): kobject_uevent_env kobject: 'erspan0' (ffff8880988c12b0): kobject_uevent_env FAULT_INJECTION: forcing a failure. name fail_page_alloc, interval 1, probability 0, space 0, times 0 kobject: 'erspan0' (ffff8880988c12b0): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'loop1' (ffff8880a496ce20): fill_kobj_path: path = '/devices/virtual/block/loop1' CPU: 0 PID: 18770 Comm: syz-executor.1 Not tainted 4.14.150 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x138/0x197 lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10f/0x159 lib/fault-inject.c:149 should_fail_alloc_page mm/page_alloc.c:2891 [inline] prepare_alloc_pages mm/page_alloc.c:4124 [inline] __alloc_pages_nodemask+0x1d6/0x7a0 mm/page_alloc.c:4172 alloc_pages_current+0xec/0x1e0 mm/mempolicy.c:2113 alloc_pages include/linux/gfp.h:497 [inline] __get_free_pages+0xf/0x40 mm/page_alloc.c:4226 get_zeroed_page+0x11/0x20 mm/page_alloc.c:4235 mon_alloc_buff+0xa9/0x160 drivers/usb/mon/mon_bin.c:1320 mon_bin_ioctl+0x691/0xb50 drivers/usb/mon/mon_bin.c:1033 vfs_ioctl fs/ioctl.c:46 [inline] file_ioctl fs/ioctl.c:500 [inline] do_vfs_ioctl+0x7ae/0x1060 fs/ioctl.c:684 SYSC_ioctl fs/ioctl.c:701 [inline] SyS_ioctl+0x8f/0xc0 fs/ioctl.c:692 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x459a59 RSP: 002b:00007f7c46147c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007f7c46147c90 RCX: 0000000000459a59 RDX: 0000000000011540 RSI: 0000000000009204 RDI: 0000000000000003 RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7c461486d4 R13: 00000000004c3317 R14: 00000000004d7040 R15: 0000000000000004 kobject: 'loop5' (ffff8880a4ac8960): kobject_uevent_env kobject: 'erspan0' (ffff8880988c12b0): kobject_cleanup, parent (null) kobject: 'loop5' (ffff8880a4ac8960): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'erspan0' (ffff8880988c12b0): calling ktype release kobject: 'loop2' (ffff8880a49c5720): kobject_uevent_env kobject: 'loop2' (ffff8880a49c5720): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'erspan0': free name kobject: 'batman_adv' (ffff88809df56b80): kobject_uevent_env kobject: 'batman_adv' (ffff88809df56b80): kobject_uevent_env: filter function caused the event to drop! kobject: 'loop1' (ffff8880a496ce20): kobject_uevent_env kobject: 'loop1' (ffff8880a496ce20): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'batman_adv' (ffff88809df56b80): kobject_cleanup, parent (null) kobject: 'batman_adv' (ffff88809df56b80): calling ktype release kobject: (ffff88809df56b80): dynamic_kobj_release kobject: 'batman_adv': free name kobject: 'rx-0' (ffff88809685e550): kobject_cleanup, parent ffff88808aba9d48 kobject: 'rx-0' (ffff88809685e550): auto cleanup 'remove' event kobject: 'loop4' (ffff8880a4a706e0): kobject_uevent_env kobject: 'loop4' (ffff8880a4a706e0): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'rx-0' (ffff88809685e550): kobject_uevent_env kobject: 'loop5' (ffff8880a4ac8960): kobject_uevent_env kobject: 'rx-0' (ffff88809685e550): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'loop4' (ffff8880a4a706e0): kobject_uevent_env kobject: 'loop4' (ffff8880a4a706e0): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop5' (ffff8880a4ac8960): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'rx-0' (ffff88809685e550): auto cleanup kobject_del kobject: 'rx-0' (ffff88809685e550): calling ktype release kobject: 'rx-0': free name kobject: 'tx-0' (ffff88808a95f018): kobject_cleanup, parent ffff88808aba9d48 kobject: 'tx-0' (ffff88808a95f018): auto cleanup 'remove' event kobject: 'loop2' (ffff8880a49c5720): kobject_uevent_env kobject: 'loop2' (ffff8880a49c5720): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'tx-0' (ffff88808a95f018): kobject_uevent_env FAULT_INJECTION: forcing a failure. name fail_page_alloc, interval 1, probability 0, space 0, times 0 kobject: 'tx-0' (ffff88808a95f018): kobject_uevent_env: uevent_suppress caused the event to drop! CPU: 0 PID: 18789 Comm: syz-executor.1 Not tainted 4.14.150 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x138/0x197 lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10f/0x159 lib/fault-inject.c:149 should_fail_alloc_page mm/page_alloc.c:2891 [inline] prepare_alloc_pages mm/page_alloc.c:4124 [inline] __alloc_pages_nodemask+0x1d6/0x7a0 mm/page_alloc.c:4172 alloc_pages_current+0xec/0x1e0 mm/mempolicy.c:2113 alloc_pages include/linux/gfp.h:497 [inline] __get_free_pages+0xf/0x40 mm/page_alloc.c:4226 get_zeroed_page+0x11/0x20 mm/page_alloc.c:4235 mon_alloc_buff+0xa9/0x160 drivers/usb/mon/mon_bin.c:1320 mon_bin_ioctl+0x691/0xb50 drivers/usb/mon/mon_bin.c:1033 vfs_ioctl fs/ioctl.c:46 [inline] file_ioctl fs/ioctl.c:500 [inline] do_vfs_ioctl+0x7ae/0x1060 fs/ioctl.c:684 SYSC_ioctl fs/ioctl.c:701 [inline] SyS_ioctl+0x8f/0xc0 fs/ioctl.c:692 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x459a59 RSP: 002b:00007f7c46147c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007f7c46147c90 RCX: 0000000000459a59 RDX: 0000000000011540 RSI: 0000000000009204 RDI: 0000000000000003 RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7c461486d4 R13: 00000000004c3317 R14: 00000000004d7040 R15: 0000000000000004 kobject: 'tx-0' (ffff88808a95f018): auto cleanup kobject_del kobject: 'tx-0' (ffff88808a95f018): calling ktype release kobject: 'loop2' (ffff8880a49c5720): kobject_uevent_env kobject: 'loop2' (ffff8880a49c5720): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'tx-0': free name kobject: 'queues' (ffff88808aba9d48): kobject_cleanup, parent (null) kobject: 'queues' (ffff88808aba9d48): calling ktype release kobject: 'queues' (ffff88808aba9d48): kset_release kobject: 'queues': free name kobject: 'gretap0' (ffff88804f25f070): kobject_uevent_env kobject: 'gretap0' (ffff88804f25f070): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'loop4' (ffff8880a4a706e0): kobject_uevent_env kobject: 'loop4' (ffff8880a4a706e0): fill_kobj_path: path = '/devices/virtual/block/loop4' UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found kobject: 'loop1' (ffff8880a496ce20): kobject_uevent_env kobject: 'loop1' (ffff8880a496ce20): fill_kobj_path: path = '/devices/virtual/block/loop1' UDF-fs: Scanning with blocksize 512 failed kobject: 'gretap0' (ffff88804f25f070): kobject_cleanup, parent (null) FAULT_INJECTION: forcing a failure. name fail_page_alloc, interval 1, probability 0, space 0, times 0 kobject: 'gretap0' (ffff88804f25f070): calling ktype release kobject: 'loop2' (ffff8880a49c5720): kobject_uevent_env kobject: 'loop2' (ffff8880a49c5720): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'gretap0': free name UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found UDF-fs: Scanning with blocksize 1024 failed CPU: 0 PID: 18804 Comm: syz-executor.1 Not tainted 4.14.150 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x138/0x197 lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10f/0x159 lib/fault-inject.c:149 should_fail_alloc_page mm/page_alloc.c:2891 [inline] prepare_alloc_pages mm/page_alloc.c:4124 [inline] __alloc_pages_nodemask+0x1d6/0x7a0 mm/page_alloc.c:4172 alloc_pages_current+0xec/0x1e0 mm/mempolicy.c:2113 alloc_pages include/linux/gfp.h:497 [inline] __get_free_pages+0xf/0x40 mm/page_alloc.c:4226 get_zeroed_page+0x11/0x20 mm/page_alloc.c:4235 mon_alloc_buff+0xa9/0x160 drivers/usb/mon/mon_bin.c:1320 mon_bin_ioctl+0x691/0xb50 drivers/usb/mon/mon_bin.c:1033 vfs_ioctl fs/ioctl.c:46 [inline] file_ioctl fs/ioctl.c:500 [inline] do_vfs_ioctl+0x7ae/0x1060 fs/ioctl.c:684 SYSC_ioctl fs/ioctl.c:701 [inline] SyS_ioctl+0x8f/0xc0 fs/ioctl.c:692 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x459a59 RSP: 002b:00007f7c46147c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007f7c46147c90 RCX: 0000000000459a59 RDX: 0000000000011540 RSI: 0000000000009204 RDI: 0000000000000003 RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7c461486d4 R13: 00000000004c3317 R14: 00000000004d7040 R15: 0000000000000004 kobject: 'rx-0' (ffff888092631190): kobject_cleanup, parent ffff88808aba9f48 UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found kobject: 'rx-0' (ffff888092631190): auto cleanup 'remove' event UDF-fs: Scanning with blocksize 2048 failed UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found UDF-fs: Scanning with blocksize 4096 failed FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 kobject: 'rx-0' (ffff888092631190): kobject_uevent_env CPU: 0 PID: 18808 Comm: syz-executor.2 Not tainted 4.14.150 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x138/0x197 lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10f/0x159 lib/fault-inject.c:149 should_failslab+0xdb/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc+0x2d7/0x780 mm/slab.c:3550 kobject: 'rx-0' (ffff888092631190): kobject_uevent_env: uevent_suppress caused the event to drop! __split_vma+0xc9/0x6d0 mm/mmap.c:2585 do_munmap+0x257/0xd60 mm/mmap.c:2699 mmap_region+0x16f/0x1030 mm/mmap.c:1664 do_mmap+0x5b8/0xcd0 mm/mmap.c:1501 do_mmap_pgoff include/linux/mm.h:2178 [inline] vm_mmap_pgoff+0x17a/0x1d0 mm/util.c:333 kobject: 'rx-0' (ffff888092631190): auto cleanup kobject_del SYSC_mmap_pgoff mm/mmap.c:1551 [inline] SyS_mmap_pgoff+0xa3/0x520 mm/mmap.c:1509 SYSC_mmap arch/x86/kernel/sys_x86_64.c:100 [inline] SyS_mmap+0x16/0x20 arch/x86/kernel/sys_x86_64.c:91 kobject: 'rx-0' (ffff888092631190): calling ktype release do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x459a59 RSP: 002b:00007f731b552c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 kobject: 'rx-0': free name RAX: ffffffffffffffda RBX: 00007f731b552c90 RCX: 0000000000459a59 RDX: 0000000000000000 RSI: 0000000000004000 RDI: 0000000020ffc000 RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 R10: 0000000000000031 R11: 0000000000000246 R12: 00007f731b5536d4 R13: 00000000004c6176 R14: 00000000004db240 R15: 0000000000000004 kobject: 'loop1' (ffff8880a496ce20): kobject_uevent_env kobject: 'loop1' (ffff8880a496ce20): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop2' (ffff8880a49c5720): kobject_uevent_env kobject: 'tx-0' (ffff888093f8e358): kobject_cleanup, parent ffff88808aba9f48 kobject: 'loop2' (ffff8880a49c5720): fill_kobj_path: path = '/devices/virtual/block/loop2' FAULT_INJECTION: forcing a failure. name fail_page_alloc, interval 1, probability 0, space 0, times 0 kobject: 'tx-0' (ffff888093f8e358): auto cleanup 'remove' event FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 kobject: 'tx-0' (ffff888093f8e358): kobject_uevent_env kobject: 'tx-0' (ffff888093f8e358): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'tx-0' (ffff888093f8e358): auto cleanup kobject_del kobject: 'tx-0' (ffff888093f8e358): calling ktype release kobject: 'loop4' (ffff8880a4a706e0): kobject_uevent_env CPU: 1 PID: 18814 Comm: syz-executor.1 Not tainted 4.14.150 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x138/0x197 lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10f/0x159 lib/fault-inject.c:149 kobject: 'loop4' (ffff8880a4a706e0): fill_kobj_path: path = '/devices/virtual/block/loop4' should_fail_alloc_page mm/page_alloc.c:2891 [inline] prepare_alloc_pages mm/page_alloc.c:4124 [inline] __alloc_pages_nodemask+0x1d6/0x7a0 mm/page_alloc.c:4172 alloc_pages_current+0xec/0x1e0 mm/mempolicy.c:2113 alloc_pages include/linux/gfp.h:497 [inline] __get_free_pages+0xf/0x40 mm/page_alloc.c:4226 get_zeroed_page+0x11/0x20 mm/page_alloc.c:4235 mon_alloc_buff+0xa9/0x160 drivers/usb/mon/mon_bin.c:1320 mon_bin_ioctl+0x691/0xb50 drivers/usb/mon/mon_bin.c:1033 UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found vfs_ioctl fs/ioctl.c:46 [inline] file_ioctl fs/ioctl.c:500 [inline] do_vfs_ioctl+0x7ae/0x1060 fs/ioctl.c:684 UDF-fs: Scanning with blocksize 512 failed SYSC_ioctl fs/ioctl.c:701 [inline] SyS_ioctl+0x8f/0xc0 fs/ioctl.c:692 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x459a59 RSP: 002b:00007f7c46147c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007f7c46147c90 RCX: 0000000000459a59 RDX: 0000000000011540 RSI: 0000000000009204 RDI: 0000000000000003 RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7c461486d4 R13: 00000000004c3317 R14: 00000000004d7040 R15: 0000000000000004 CPU: 0 PID: 18813 Comm: syz-executor.2 Not tainted 4.14.150 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x138/0x197 lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10f/0x159 lib/fault-inject.c:149 kobject: 'tx-0': free name should_failslab+0xdb/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc+0x2d7/0x780 mm/slab.c:3550 kobject: 'queues' (ffff88808aba9f48): kobject_cleanup, parent (null) kmem_cache_zalloc include/linux/slab.h:651 [inline] mmap_region+0x602/0x1030 mm/mmap.c:1691 do_mmap+0x5b8/0xcd0 mm/mmap.c:1501 do_mmap_pgoff include/linux/mm.h:2178 [inline] vm_mmap_pgoff+0x17a/0x1d0 mm/util.c:333 kobject: 'queues' (ffff88808aba9f48): calling ktype release SYSC_mmap_pgoff mm/mmap.c:1551 [inline] SyS_mmap_pgoff+0xa3/0x520 mm/mmap.c:1509 kobject: 'queues' (ffff88808aba9f48): kset_release SYSC_mmap arch/x86/kernel/sys_x86_64.c:100 [inline] SyS_mmap+0x16/0x20 arch/x86/kernel/sys_x86_64.c:91 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 kobject: 'queues': free name entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x459a59 kobject: 'gre0' (ffff88809f650db0): kobject_uevent_env RSP: 002b:00007f731b552c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 RAX: ffffffffffffffda RBX: 00007f731b552c90 RCX: 0000000000459a59 RDX: 0000000000000000 RSI: 0000000000004000 RDI: 0000000020ffc000 RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 kobject: 'gre0' (ffff88809f650db0): kobject_uevent_env: uevent_suppress caused the event to drop! R10: 0000000000000031 R11: 0000000000000246 R12: 00007f731b5536d4 R13: 00000000004c6176 R14: 00000000004db240 R15: 0000000000000004 UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found UDF-fs: Scanning with blocksize 1024 failed kobject: 'loop1' (ffff8880a496ce20): kobject_uevent_env kobject: 'gre0' (ffff88809f650db0): kobject_cleanup, parent (null) kobject: 'loop1' (ffff8880a496ce20): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'gre0' (ffff88809f650db0): calling ktype release UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found UDF-fs: Scanning with blocksize 2048 failed kobject: 'gre0': free name UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found kobject: 'rx-0' (ffff8880a832ba90): kobject_cleanup, parent ffff888080905348 UDF-fs: Scanning with blocksize 4096 failed kobject: 'rx-0' (ffff8880a832ba90): auto cleanup 'remove' event kobject: 'loop5' (ffff8880a4ac8960): kobject_uevent_env kobject: 'loop5' (ffff8880a4ac8960): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'rx-0' (ffff8880a832ba90): kobject_uevent_env kobject: 'loop4' (ffff8880a4a706e0): kobject_uevent_env kobject: 'loop4' (ffff8880a4a706e0): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'rx-0' (ffff8880a832ba90): kobject_uevent_env: uevent_suppress caused the event to drop! FAULT_INJECTION: forcing a failure. name fail_page_alloc, interval 1, probability 0, space 0, times 0 kobject: 'loop4' (ffff8880a4a706e0): kobject_uevent_env kobject: 'loop2' (ffff8880a49c5720): kobject_uevent_env kobject: 'rx-0' (ffff8880a832ba90): auto cleanup kobject_del kobject: 'loop4' (ffff8880a4a706e0): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop2' (ffff8880a49c5720): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'rx-0' (ffff8880a832ba90): calling ktype release CPU: 0 PID: 18823 Comm: syz-executor.1 Not tainted 4.14.150 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ntfs: (device loop4): parse_options(): Invalid fmask option argument: 00000000000000000000õ*T¹’²000 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x138/0x197 lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10f/0x159 lib/fault-inject.c:149 kobject: 'rx-0': free name should_fail_alloc_page mm/page_alloc.c:2891 [inline] prepare_alloc_pages mm/page_alloc.c:4124 [inline] __alloc_pages_nodemask+0x1d6/0x7a0 mm/page_alloc.c:4172 kobject: 'tx-0' (ffff8880a3d62298): kobject_cleanup, parent ffff888080905348 alloc_pages_current+0xec/0x1e0 mm/mempolicy.c:2113 alloc_pages include/linux/gfp.h:497 [inline] __get_free_pages+0xf/0x40 mm/page_alloc.c:4226 get_zeroed_page+0x11/0x20 mm/page_alloc.c:4235 mon_alloc_buff+0xa9/0x160 drivers/usb/mon/mon_bin.c:1320 kobject: 'tx-0' (ffff8880a3d62298): auto cleanup 'remove' event mon_bin_ioctl+0x691/0xb50 drivers/usb/mon/mon_bin.c:1033 kobject: 'tx-0' (ffff8880a3d62298): kobject_uevent_env vfs_ioctl fs/ioctl.c:46 [inline] file_ioctl fs/ioctl.c:500 [inline] do_vfs_ioctl+0x7ae/0x1060 fs/ioctl.c:684 SYSC_ioctl fs/ioctl.c:701 [inline] SyS_ioctl+0x8f/0xc0 fs/ioctl.c:692 kobject: 'tx-0' (ffff8880a3d62298): kobject_uevent_env: uevent_suppress caused the event to drop! do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x459a59 RSP: 002b:00007f7c46147c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007f7c46147c90 RCX: 0000000000459a59 RDX: 0000000000011540 RSI: 0000000000009204 RDI: 0000000000000003 RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 kobject: 'tx-0' (ffff8880a3d62298): auto cleanup kobject_del R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7c461486d4 R13: 00000000004c3317 R14: 00000000004d7040 R15: 0000000000000004 net_ratelimit: 20 callbacks suppressed protocol 88fb is buggy, dev hsr_slave_0 protocol 88fb is buggy, dev hsr_slave_0 protocol 88fb is buggy, dev hsr_slave_1 protocol 88fb is buggy, dev hsr_slave_1 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 18830 Comm: syz-executor.2 Not tainted 4.14.150 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x138/0x197 lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10f/0x159 lib/fault-inject.c:149 should_failslab+0xdb/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc+0x2d7/0x780 mm/slab.c:3550 kmem_cache_zalloc include/linux/slab.h:651 [inline] mmap_region+0x602/0x1030 mm/mmap.c:1691 do_mmap+0x5b8/0xcd0 mm/mmap.c:1501 do_mmap_pgoff include/linux/mm.h:2178 [inline] vm_mmap_pgoff+0x17a/0x1d0 mm/util.c:333 kobject: 'tx-0' (ffff8880a3d62298): calling ktype release SYSC_mmap_pgoff mm/mmap.c:1551 [inline] SyS_mmap_pgoff+0xa3/0x520 mm/mmap.c:1509 kobject: 'tx-0': free name SYSC_mmap arch/x86/kernel/sys_x86_64.c:100 [inline] SyS_mmap+0x16/0x20 arch/x86/kernel/sys_x86_64.c:91 kobject: 'queues' (ffff888080905348): kobject_cleanup, parent (null) do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x459a59 RSP: 002b:00007f731b552c78 EFLAGS: 00000246 kobject: 'queues' (ffff888080905348): calling ktype release ORIG_RAX: 0000000000000009 RAX: ffffffffffffffda RBX: 00007f731b552c90 RCX: 0000000000459a59 RDX: 0000000000000000 RSI: 0000000000004000 RDI: 0000000020ffc000 RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 R10: 0000000000000031 R11: 0000000000000246 R12: 00007f731b5536d4 R13: 00000000004c6176 R14: 00000000004db240 R15: 0000000000000004 kobject: 'loop4' (ffff8880a4a706e0): kobject_uevent_env kobject: 'loop4' (ffff8880a4a706e0): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'queues' (ffff888080905348): kset_release kobject: 'loop1' (ffff8880a496ce20): kobject_uevent_env kobject: 'loop1' (ffff8880a496ce20): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'queues': free name FAULT_INJECTION: forcing a failure. name fail_page_alloc, interval 1, probability 0, space 0, times 0 protocol 88fb is buggy, dev hsr_slave_0 protocol 88fb is buggy, dev hsr_slave_1 kobject: 'tunl0' (ffff888094ca4c70): kobject_uevent_env kobject: 'loop5' (ffff8880a4ac8960): kobject_uevent_env CPU: 0 PID: 18843 Comm: syz-executor.1 Not tainted 4.14.150 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 kobject: 'tunl0' (ffff888094ca4c70): kobject_uevent_env: uevent_suppress caused the event to drop! Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x138/0x197 lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10f/0x159 lib/fault-inject.c:149 should_fail_alloc_page mm/page_alloc.c:2891 [inline] prepare_alloc_pages mm/page_alloc.c:4124 [inline] __alloc_pages_nodemask+0x1d6/0x7a0 mm/page_alloc.c:4172 alloc_pages_current+0xec/0x1e0 mm/mempolicy.c:2113 alloc_pages include/linux/gfp.h:497 [inline] __get_free_pages+0xf/0x40 mm/page_alloc.c:4226 get_zeroed_page+0x11/0x20 mm/page_alloc.c:4235 mon_alloc_buff+0xa9/0x160 drivers/usb/mon/mon_bin.c:1320 mon_bin_ioctl+0x691/0xb50 drivers/usb/mon/mon_bin.c:1033 vfs_ioctl fs/ioctl.c:46 [inline] file_ioctl fs/ioctl.c:500 [inline] do_vfs_ioctl+0x7ae/0x1060 fs/ioctl.c:684 SYSC_ioctl fs/ioctl.c:701 [inline] SyS_ioctl+0x8f/0xc0 fs/ioctl.c:692 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x459a59 RSP: 002b:00007f7c46147c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007f7c46147c90 RCX: 0000000000459a59 RDX: 0000000000011540 RSI: 0000000000009204 RDI: 0000000000000003 RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7c461486d4 R13: 00000000004c3317 R14: 00000000004d7040 R15: 0000000000000004 kobject: 'vti5' (ffff88809712b0b0): kobject_add_internal: parent: 'net', set: 'devices' protocol 88fb is buggy, dev hsr_slave_0 protocol 88fb is buggy, dev hsr_slave_1 kobject: 'loop5' (ffff8880a4ac8960): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'vti5' (ffff88809712b0b0): kobject_uevent_env kobject: 'loop2' (ffff8880a49c5720): kobject_uevent_env FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 kobject: 'vti5' (ffff88809712b0b0): fill_kobj_path: path = '/devices/virtual/net/vti5' kobject: 'loop2' (ffff8880a49c5720): fill_kobj_path: path = '/devices/virtual/block/loop2' CPU: 0 PID: 18854 Comm: syz-executor.2 Not tainted 4.14.150 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 kobject: 'queues' (ffff88809cc04548): kobject_add_internal: parent: 'vti5', set: '' Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x138/0x197 lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10f/0x159 lib/fault-inject.c:149 should_failslab+0xdb/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc+0x2d7/0x780 mm/slab.c:3550 kobject: 'queues' (ffff88809cc04548): kobject_uevent_env kobject: 'queues' (ffff88809cc04548): kobject_uevent_env: filter function caused the event to drop! shmem_alloc_inode+0x1c/0x50 mm/shmem.c:3882 alloc_inode+0x64/0x180 fs/inode.c:209 new_inode_pseudo+0x19/0xf0 fs/inode.c:891 new_inode+0x1f/0x40 fs/inode.c:920 shmem_get_inode+0x75/0x750 mm/shmem.c:2172 __shmem_file_setup.part.0+0x30e/0x400 mm/shmem.c:4260 kobject: 'rx-0' (ffff8880990309d0): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'rx-0' (ffff8880990309d0): kobject_uevent_env __shmem_file_setup mm/shmem.c:4242 [inline] shmem_zero_setup+0xc5/0x3ba mm/shmem.c:4328 mmap_region+0xd88/0x1030 mm/mmap.c:1739 do_mmap+0x5b8/0xcd0 mm/mmap.c:1501 kobject: 'rx-0' (ffff8880990309d0): fill_kobj_path: path = '/devices/virtual/net/vti5/queues/rx-0' do_mmap_pgoff include/linux/mm.h:2178 [inline] vm_mmap_pgoff+0x17a/0x1d0 mm/util.c:333 kobject: 'tx-0' (ffff888051ec9858): kobject_add_internal: parent: 'queues', set: 'queues' SYSC_mmap_pgoff mm/mmap.c:1551 [inline] SyS_mmap_pgoff+0xa3/0x520 mm/mmap.c:1509 kobject: 'tx-0' (ffff888051ec9858): kobject_uevent_env kobject: 'tx-0' (ffff888051ec9858): fill_kobj_path: path = '/devices/virtual/net/vti5/queues/tx-0' SYSC_mmap arch/x86/kernel/sys_x86_64.c:100 [inline] SyS_mmap+0x16/0x20 arch/x86/kernel/sys_x86_64.c:91 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 kobject: 'tunl0' (ffff888094ca4c70): kobject_cleanup, parent (null) entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x459a59 kobject: 'tunl0' (ffff888094ca4c70): calling ktype release RSP: 002b:00007f731b552c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 RAX: ffffffffffffffda RBX: 00007f731b552c90 RCX: 0000000000459a59 RDX: 0000000000000000 RSI: 0000000000004000 RDI: 0000000020ffc000 RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 R10: 0000000000000031 R11: 0000000000000246 R12: 00007f731b5536d4 R13: 00000000004c6176 R14: 00000000004db240 R15: 0000000000000004 protocol 88fb is buggy, dev hsr_slave_0 protocol 88fb is buggy, dev hsr_slave_1 kobject: 'loop5' (ffff8880a4ac8960): kobject_uevent_env kobject: 'loop5' (ffff8880a4ac8960): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop4' (ffff8880a4a706e0): kobject_uevent_env kobject: 'loop4' (ffff8880a4a706e0): fill_kobj_path: path = '/devices/virtual/block/loop4' devpts: called with bogus options kobject: 'loop5' (ffff8880a4ac8960): kobject_uevent_env kobject: 'loop5' (ffff8880a4ac8960): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'tunl0': free name kobject: 'rx-0' (ffff8880a5f319d0): kobject_cleanup, parent ffff8880a0949648 kobject: 'rx-0' (ffff8880a5f319d0): auto cleanup 'remove' event kobject: 'loop1' (ffff8880a496ce20): kobject_uevent_env kobject: 'loop1' (ffff8880a496ce20): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop5' (ffff8880a4ac8960): kobject_uevent_env kobject: 'loop5' (ffff8880a4ac8960): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'rx-0' (ffff8880a5f319d0): kobject_uevent_env kobject: 'rx-0' (ffff8880a5f319d0): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'rx-0' (ffff8880a5f319d0): auto cleanup kobject_del kobject: 'rx-0' (ffff8880a5f319d0): calling ktype release kobject: 'rx-0': free name kobject: 'loop1' (ffff8880a496ce20): kobject_uevent_env kobject: 'loop1' (ffff8880a496ce20): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'tx-0' (ffff8880a8e4a558): kobject_cleanup, parent ffff8880a0949648 kobject: 'tx-0' (ffff8880a8e4a558): auto cleanup 'remove' event kobject: 'loop2' (ffff8880a49c5720): kobject_uevent_env kobject: 'tx-0' (ffff8880a8e4a558): kobject_uevent_env kobject: 'loop2' (ffff8880a49c5720): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'tx-0' (ffff8880a8e4a558): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'loop1' (ffff8880a496ce20): kobject_uevent_env kobject: 'tx-0' (ffff8880a8e4a558): auto cleanup kobject_del kobject: 'loop1' (ffff8880a496ce20): fill_kobj_path: path = '/devices/virtual/block/loop1' devpts: called with bogus options kobject: 'tx-0' (ffff8880a8e4a558): calling ktype release kobject: 'tx-0': free name kobject: 'queues' (ffff8880a0949648): kobject_cleanup, parent (null) kobject: 'loop5' (ffff8880a4ac8960): kobject_uevent_env kobject: 'queues' (ffff8880a0949648): calling ktype release kobject: 'loop5' (ffff8880a4ac8960): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'queues' (ffff8880a0949648): kset_release kobject: 'loop4' (ffff8880a4a706e0): kobject_uevent_env kobject: 'queues': free name kobject: 'lo' (ffff888094a06670): kobject_uevent_env kobject: 'loop4' (ffff8880a4a706e0): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'lo' (ffff888094a06670): kobject_uevent_env: uevent_suppress caused the event to drop! devpts: called with bogus options kobject: 'lo' (ffff888094a06670): kobject_cleanup, parent (null) kobject: 'loop2' (ffff8880a49c5720): kobject_uevent_env kobject: 'loop2' (ffff8880a49c5720): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'lo' (ffff888094a06670): calling ktype release kobject: 'lo': free name kobject: 'loop5' (ffff8880a4ac8960): kobject_uevent_env kobject: 'loop5' (ffff8880a4ac8960): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop2' (ffff8880a49c5720): kobject_uevent_env kobject: 'loop2' (ffff8880a49c5720): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop4' (ffff8880a4a706e0): kobject_uevent_env kobject: 'brif' (ffff888093eae980): kobject_cleanup, parent ffff888051285930 kobject: 'loop4' (ffff8880a4a706e0): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'brif' (ffff888093eae980): auto cleanup kobject_del devpts: called with bogus options kobject: 'brif' (ffff888093eae980): calling ktype release kobject: (ffff888093eae980): dynamic_kobj_release kobject: 'brif': free name kobject: 'batman_adv' (ffff888093eaed80): kobject_uevent_env kobject: 'batman_adv' (ffff888093eaed80): kobject_uevent_env: filter function caused the event to drop! kobject: 'batman_adv' (ffff888093eaed80): kobject_cleanup, parent (null) kobject: 'batman_adv' (ffff888093eaed80): calling ktype release kobject: (ffff888093eaed80): dynamic_kobj_release kobject: 'batman_adv': free name kobject: 'rx-0' (ffff8880938bfb50): kobject_cleanup, parent ffff8880a0138548 kobject: 'rx-0' (ffff8880938bfb50): auto cleanup 'remove' event kobject: 'rx-0' (ffff8880938bfb50): kobject_uevent_env kobject: 'rx-0' (ffff8880938bfb50): fill_kobj_path: path = '/devices/virtual/net/þ€/queues/rx-0' kobject: 'rx-0' (ffff8880938bfb50): auto cleanup kobject_del kobject: 'rx-0' (ffff8880938bfb50): calling ktype release kobject: 'rx-0': free name kobject: 'tx-0' (ffff888057c48818): kobject_cleanup, parent ffff8880a0138548 kobject: 'tx-0' (ffff888057c48818): auto cleanup 'remove' event kobject: 'tx-0' (ffff888057c48818): kobject_uevent_env kobject: 'tx-0' (ffff888057c48818): fill_kobj_path: path = '/devices/virtual/net/þ€/queues/tx-0' kobject: 'loop5' (ffff8880a4ac8960): kobject_uevent_env kobject: 'loop5' (ffff8880a4ac8960): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'tx-0' (ffff888057c48818): auto cleanup kobject_del