Killed process 12132 (syz-executor2) total-vm:72576kB, anon-rss:2192kB, file-rss:35788kB, shmem-rss:0kB device nr0 entered promiscuous mode SELinux: security policydb version 15 (MLS) not backwards compatible syz-executor2 invoked oom-killer: gfp_mask=0x7080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 ===================================================== WARNING: SOFTIRQ-safe -> SOFTIRQ-unsafe lock order detected 5.0.0-rc4 #49 Not tainted ----------------------------------------------------- syz-executor5/17861 [HC0[0]:SC0[0]:HE0:SE1] is trying to acquire: 00000000a0f9379c (&ctx->fault_pending_wqh){+.+.}, at: spin_lock include/linux/spinlock.h:329 [inline] 00000000a0f9379c (&ctx->fault_pending_wqh){+.+.}, at: userfaultfd_ctx_read+0x690/0x2060 fs/userfaultfd.c:1040 and this task is already holding: 00000000fdb97e15 (&ctx->fd_wqh){....}, at: spin_lock_irq include/linux/spinlock.h:354 [inline] 00000000fdb97e15 (&ctx->fd_wqh){....}, at: userfaultfd_ctx_read+0x25e/0x2060 fs/userfaultfd.c:1036 which would create a new lock dependency: (&ctx->fd_wqh){....} -> (&ctx->fault_pending_wqh){+.+.} but this new dependency connects a SOFTIRQ-irq-safe lock: CPU: 1 PID: 17830 Comm: syz-executor2 Not tainted 5.0.0-rc4 #49 (&(&ctx->ctx_lock)->rlock){..-.} ... which became SOFTIRQ-irq-safe at: Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 lock_acquire+0x1db/0x570 kernel/locking/lockdep.c:3841 Call Trace: __raw_spin_lock_irq include/linux/spinlock_api_smp.h:128 [inline] _raw_spin_lock_irq+0x60/0x80 kernel/locking/spinlock.c:160 __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1db/0x2d0 lib/dump_stack.c:113 spin_lock_irq include/linux/spinlock.h:354 [inline] free_ioctx_users+0xa7/0x6e0 fs/aio.c:610 percpu_ref_put_many include/linux/percpu-refcount.h:285 [inline] percpu_ref_put include/linux/percpu-refcount.h:301 [inline] percpu_ref_call_confirm_rcu lib/percpu-refcount.c:123 [inline] percpu_ref_switch_to_atomic_rcu+0x50c/0x6b0 lib/percpu-refcount.c:158 dump_header+0x1e6/0x116c mm/oom_kill.c:451 __rcu_reclaim kernel/rcu/rcu.h:240 [inline] rcu_do_batch kernel/rcu/tree.c:2452 [inline] invoke_rcu_callbacks kernel/rcu/tree.c:2773 [inline] rcu_process_callbacks+0xc4a/0x1680 kernel/rcu/tree.c:2754 __do_softirq+0x30b/0xb11 kernel/softirq.c:292 invoke_softirq kernel/softirq.c:373 [inline] irq_exit+0x180/0x1d0 kernel/softirq.c:413 exiting_irq arch/x86/include/asm/apic.h:536 [inline] smp_apic_timer_interrupt+0x1b7/0x760 arch/x86/kernel/apic/apic.c:1062 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:807 arch_local_irq_enable arch/x86/include/asm/paravirt.h:776 [inline] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:168 [inline] _raw_spin_unlock_irq+0x54/0x90 kernel/locking/spinlock.c:192 finish_lock_switch kernel/sched/core.c:2594 [inline] finish_task_switch+0x1e9/0xac0 kernel/sched/core.c:2694 context_switch kernel/sched/core.c:2847 [inline] __schedule+0x89f/0x1e60 kernel/sched/core.c:3485 schedule+0xfe/0x350 kernel/sched/core.c:3529 freezable_schedule include/linux/freezer.h:172 [inline] do_nanosleep+0x208/0x750 kernel/time/hrtimer.c:1679 hrtimer_nanosleep+0x2e4/0x640 kernel/time/hrtimer.c:1733 __do_sys_nanosleep kernel/time/hrtimer.c:1767 [inline] __se_sys_nanosleep kernel/time/hrtimer.c:1754 [inline] __x64_sys_nanosleep+0x1e0/0x280 kernel/time/hrtimer.c:1754 do_syscall_64+0x1a3/0x800 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe to a SOFTIRQ-irq-unsafe lock: (&ctx->fault_pending_wqh){+.+.} ... which became SOFTIRQ-irq-unsafe at: ... lock_acquire+0x1db/0x570 kernel/locking/lockdep.c:3841 __raw_spin_lock include/linux/spinlock_api_smp.h:142 [inline] _raw_spin_lock+0x2f/0x40 kernel/locking/spinlock.c:144 spin_lock include/linux/spinlock.h:329 [inline] handle_userfault+0x901/0x2510 fs/userfaultfd.c:461 oom_kill_process.cold+0x10/0x9d4 mm/oom_kill.c:966 do_anonymous_page mm/memory.c:2921 [inline] handle_pte_fault mm/memory.c:3785 [inline] __handle_mm_fault+0x4563/0x55a0 mm/memory.c:3911 handle_mm_fault+0x4ec/0xc80 mm/memory.c:3948 do_user_addr_fault arch/x86/mm/fault.c:1475 [inline] __do_page_fault+0x5da/0xd60 arch/x86/mm/fault.c:1541 do_page_fault+0xe6/0x7d8 arch/x86/mm/fault.c:1572 page_fault+0x1e/0x30 arch/x86/entry/entry_64.S:1143 __get_user_4+0x21/0x30 arch/x86/lib/getuser.S:76 sock_common_setsockopt+0x9a/0xe0 net/core/sock.c:2991 __sys_setsockopt+0x1b0/0x3a0 net/socket.c:1902 __do_sys_setsockopt net/socket.c:1913 [inline] __se_sys_setsockopt net/socket.c:1910 [inline] __x64_sys_setsockopt+0xbe/0x150 net/socket.c:1910 do_syscall_64+0x1a3/0x800 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe out_of_memory+0x885/0x1420 mm/oom_kill.c:1133 other info that might help us debug this: Chain exists of: &(&ctx->ctx_lock)->rlock --> &ctx->fd_wqh --> &ctx->fault_pending_wqh Possible interrupt unsafe locking scenario: CPU0 CPU1 ---- ---- lock(&ctx->fault_pending_wqh); mem_cgroup_out_of_memory+0x160/0x210 mm/memcontrol.c:1393 local_irq_disable(); lock(&(&ctx->ctx_lock)->rlock); lock(&ctx->fd_wqh); lock(&(&ctx->ctx_lock)->rlock); mem_cgroup_oom mm/memcontrol.c:1721 [inline] try_charge+0xd44/0x19b0 mm/memcontrol.c:2283 *** DEADLOCK *** 1 lock held by syz-executor5/17861: #0: 00000000fdb97e15 (&ctx->fd_wqh){....}, at: spin_lock_irq include/linux/spinlock.h:354 [inline] #0: 00000000fdb97e15 (&ctx->fd_wqh){....}, at: userfaultfd_ctx_read+0x25e/0x2060 fs/userfaultfd.c:1036 the dependencies between SOFTIRQ-irq-safe lock and the holding lock: -> (&(&ctx->ctx_lock)->rlock){..-.} { IN-SOFTIRQ-W at: lock_acquire+0x1db/0x570 kernel/locking/lockdep.c:3841 __raw_spin_lock_irq include/linux/spinlock_api_smp.h:128 [inline] _raw_spin_lock_irq+0x60/0x80 kernel/locking/spinlock.c:160 spin_lock_irq include/linux/spinlock.h:354 [inline] free_ioctx_users+0xa7/0x6e0 fs/aio.c:610 percpu_ref_put_many include/linux/percpu-refcount.h:285 [inline] percpu_ref_put include/linux/percpu-refcount.h:301 [inline] percpu_ref_call_confirm_rcu lib/percpu-refcount.c:123 [inline] percpu_ref_switch_to_atomic_rcu+0x50c/0x6b0 lib/percpu-refcount.c:158 __rcu_reclaim kernel/rcu/rcu.h:240 [inline] rcu_do_batch kernel/rcu/tree.c:2452 [inline] invoke_rcu_callbacks kernel/rcu/tree.c:2773 [inline] rcu_process_callbacks+0xc4a/0x1680 kernel/rcu/tree.c:2754 memcg_kmem_charge_memcg+0x7c/0x130 mm/memcontrol.c:2591 __do_softirq+0x30b/0xb11 kernel/softirq.c:292 invoke_softirq kernel/softirq.c:373 [inline] irq_exit+0x180/0x1d0 kernel/softirq.c:413 exiting_irq arch/x86/include/asm/apic.h:536 [inline] smp_apic_timer_interrupt+0x1b7/0x760 arch/x86/kernel/apic/apic.c:1062 memcg_kmem_charge+0x13b/0x340 mm/memcontrol.c:2624 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:807 __alloc_pages_nodemask+0x7b8/0xdc0 mm/page_alloc.c:4559 arch_local_irq_enable arch/x86/include/asm/paravirt.h:776 [inline] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:168 [inline] _raw_spin_unlock_irq+0x54/0x90 kernel/locking/spinlock.c:192 finish_lock_switch kernel/sched/core.c:2594 [inline] finish_task_switch+0x1e9/0xac0 kernel/sched/core.c:2694 context_switch kernel/sched/core.c:2847 [inline] __schedule+0x89f/0x1e60 kernel/sched/core.c:3485 schedule+0xfe/0x350 kernel/sched/core.c:3529 freezable_schedule include/linux/freezer.h:172 [inline] do_nanosleep+0x208/0x750 kernel/time/hrtimer.c:1679 __alloc_pages include/linux/gfp.h:473 [inline] __alloc_pages_node include/linux/gfp.h:486 [inline] alloc_pages_node include/linux/gfp.h:500 [inline] alloc_thread_stack_node kernel/fork.c:246 [inline] dup_task_struct kernel/fork.c:849 [inline] copy_process+0x847/0x8860 kernel/fork.c:1753 hrtimer_nanosleep+0x2e4/0x640 kernel/time/hrtimer.c:1733 __do_sys_nanosleep kernel/time/hrtimer.c:1767 [inline] __se_sys_nanosleep kernel/time/hrtimer.c:1754 [inline] __x64_sys_nanosleep+0x1e0/0x280 kernel/time/hrtimer.c:1754 do_syscall_64+0x1a3/0x800 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe INITIAL USE at: lock_acquire+0x1db/0x570 kernel/locking/lockdep.c:3841 __raw_spin_lock_irq include/linux/spinlock_api_smp.h:128 [inline] _raw_spin_lock_irq+0x60/0x80 kernel/locking/spinlock.c:160 spin_lock_irq include/linux/spinlock.h:354 [inline] free_ioctx_users+0xa7/0x6e0 fs/aio.c:610 percpu_ref_put_many include/linux/percpu-refcount.h:285 [inline] percpu_ref_put include/linux/percpu-refcount.h:301 [inline] percpu_ref_call_confirm_rcu lib/percpu-refcount.c:123 [inline] percpu_ref_switch_to_atomic_rcu+0x50c/0x6b0 lib/percpu-refcount.c:158 __rcu_reclaim kernel/rcu/rcu.h:240 [inline] rcu_do_batch kernel/rcu/tree.c:2452 [inline] invoke_rcu_callbacks kernel/rcu/tree.c:2773 [inline] rcu_process_callbacks+0xc4a/0x1680 kernel/rcu/tree.c:2754 __do_softirq+0x30b/0xb11 kernel/softirq.c:292 invoke_softirq kernel/softirq.c:373 [inline] irq_exit+0x180/0x1d0 kernel/softirq.c:413 exiting_irq arch/x86/include/asm/apic.h:536 [inline] smp_apic_timer_interrupt+0x1b7/0x760 arch/x86/kernel/apic/apic.c:1062 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:807 arch_local_irq_enable arch/x86/include/asm/paravirt.h:776 [inline] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:168 [inline] _raw_spin_unlock_irq+0x54/0x90 kernel/locking/spinlock.c:192 finish_lock_switch kernel/sched/core.c:2594 [inline] finish_task_switch+0x1e9/0xac0 kernel/sched/core.c:2694 context_switch kernel/sched/core.c:2847 [inline] __schedule+0x89f/0x1e60 kernel/sched/core.c:3485 schedule+0xfe/0x350 kernel/sched/core.c:3529 freezable_schedule include/linux/freezer.h:172 [inline] do_nanosleep+0x208/0x750 kernel/time/hrtimer.c:1679 hrtimer_nanosleep+0x2e4/0x640 kernel/time/hrtimer.c:1733 __do_sys_nanosleep kernel/time/hrtimer.c:1767 [inline] __se_sys_nanosleep kernel/time/hrtimer.c:1754 [inline] __x64_sys_nanosleep+0x1e0/0x280 kernel/time/hrtimer.c:1754 do_syscall_64+0x1a3/0x800 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe } ... key at: [] __key.51971+0x0/0x40 ... acquired at: __raw_spin_lock include/linux/spinlock_api_smp.h:142 [inline] _raw_spin_lock+0x2f/0x40 kernel/locking/spinlock.c:144 spin_lock include/linux/spinlock.h:329 [inline] aio_poll+0x7b9/0x14e0 fs/aio.c:1772 __io_submit_one fs/aio.c:1875 [inline] io_submit_one+0xc39/0x1050 fs/aio.c:1908 __do_sys_io_submit fs/aio.c:1953 [inline] __se_sys_io_submit fs/aio.c:1923 [inline] __x64_sys_io_submit+0x1c4/0x5d0 fs/aio.c:1923 do_syscall_64+0x1a3/0x800 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe -> (&ctx->fd_wqh){....} { INITIAL USE at: lock_acquire+0x1db/0x570 kernel/locking/lockdep.c:3841 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline] _raw_spin_lock_irqsave+0x95/0xcd kernel/locking/spinlock.c:152 _do_fork+0x1a9/0x1170 kernel/fork.c:2227 __wake_up_common_lock+0x19b/0x390 kernel/sched/wait.c:120 __wake_up+0xe/0x10 kernel/sched/wait.c:145 handle_userfault+0xdfb/0x2510 fs/userfaultfd.c:487 do_anonymous_page mm/memory.c:2921 [inline] handle_pte_fault mm/memory.c:3785 [inline] __handle_mm_fault+0x4563/0x55a0 mm/memory.c:3911 handle_mm_fault+0x4ec/0xc80 mm/memory.c:3948 do_user_addr_fault arch/x86/mm/fault.c:1475 [inline] __do_page_fault+0x5da/0xd60 arch/x86/mm/fault.c:1541 do_page_fault+0xe6/0x7d8 arch/x86/mm/fault.c:1572 page_fault+0x1e/0x30 arch/x86/entry/entry_64.S:1143 __get_user_4+0x21/0x30 arch/x86/lib/getuser.S:76 sock_common_setsockopt+0x9a/0xe0 net/core/sock.c:2991 __sys_setsockopt+0x1b0/0x3a0 net/socket.c:1902 __do_sys_setsockopt net/socket.c:1913 [inline] __se_sys_setsockopt net/socket.c:1910 [inline] __x64_sys_setsockopt+0xbe/0x150 net/socket.c:1910 do_syscall_64+0x1a3/0x800 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe } ... key at: [] __key.44853+0x0/0x40 ... acquired at: __do_sys_clone kernel/fork.c:2334 [inline] __se_sys_clone kernel/fork.c:2328 [inline] __x64_sys_clone+0xbf/0x150 kernel/fork.c:2328 lock_acquire+0x1db/0x570 kernel/locking/lockdep.c:3841 do_syscall_64+0x1a3/0x800 arch/x86/entry/common.c:290 __raw_spin_lock include/linux/spinlock_api_smp.h:142 [inline] _raw_spin_lock+0x2f/0x40 kernel/locking/spinlock.c:144 spin_lock include/linux/spinlock.h:329 [inline] userfaultfd_ctx_read+0x690/0x2060 fs/userfaultfd.c:1040 userfaultfd_read+0x1e0/0x2c0 fs/userfaultfd.c:1198 __vfs_read+0x116/0xb20 fs/read_write.c:416 vfs_read+0x194/0x3e0 fs/read_write.c:452 entry_SYSCALL_64_after_hwframe+0x49/0xbe ksys_read+0x105/0x260 fs/read_write.c:578 RIP: 0033:0x458099 __do_sys_read fs/read_write.c:588 [inline] __se_sys_read fs/read_write.c:586 [inline] __x64_sys_read+0x73/0xb0 fs/read_write.c:586 Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 do_syscall_64+0x1a3/0x800 arch/x86/entry/common.c:290 RSP: 002b:00007fe2862d6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 entry_SYSCALL_64_after_hwframe+0x49/0xbe RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000458099 RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0020002102001fff the dependencies between the lock to be acquired and SOFTIRQ-irq-unsafe lock: RBP: 000000000073bf00 R08: ffffffffffffffff R09: 0000000000000000 -> (&ctx->fault_pending_wqh){+.+.} { R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe2862d76d4 HARDIRQ-ON-W at: R13: 00000000004be480 R14: 00000000004cea40 R15: 00000000ffffffff lock_acquire+0x1db/0x570 kernel/locking/lockdep.c:3841 __raw_spin_lock include/linux/spinlock_api_smp.h:142 [inline] _raw_spin_lock+0x2f/0x40 kernel/locking/spinlock.c:144 kobject: 'loop3' (000000002d2e089c): kobject_uevent_env spin_lock include/linux/spinlock.h:329 [inline] handle_userfault+0x901/0x2510 fs/userfaultfd.c:461 do_anonymous_page mm/memory.c:2921 [inline] handle_pte_fault mm/memory.c:3785 [inline] __handle_mm_fault+0x4563/0x55a0 mm/memory.c:3911 handle_mm_fault+0x4ec/0xc80 mm/memory.c:3948 do_user_addr_fault arch/x86/mm/fault.c:1475 [inline] __do_page_fault+0x5da/0xd60 arch/x86/mm/fault.c:1541 kobject: 'loop3' (000000002d2e089c): fill_kobj_path: path = '/devices/virtual/block/loop3' do_page_fault+0xe6/0x7d8 arch/x86/mm/fault.c:1572 page_fault+0x1e/0x30 arch/x86/entry/entry_64.S:1143 __get_user_4+0x21/0x30 arch/x86/lib/getuser.S:76 sock_common_setsockopt+0x9a/0xe0 net/core/sock.c:2991 __sys_setsockopt+0x1b0/0x3a0 net/socket.c:1902 __do_sys_setsockopt net/socket.c:1913 [inline] __se_sys_setsockopt net/socket.c:1910 [inline] __x64_sys_setsockopt+0xbe/0x150 net/socket.c:1910 do_syscall_64+0x1a3/0x800 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe SOFTIRQ-ON-W at: lock_acquire+0x1db/0x570 kernel/locking/lockdep.c:3841 __raw_spin_lock include/linux/spinlock_api_smp.h:142 [inline] _raw_spin_lock+0x2f/0x40 kernel/locking/spinlock.c:144 spin_lock include/linux/spinlock.h:329 [inline] handle_userfault+0x901/0x2510 fs/userfaultfd.c:461 do_anonymous_page mm/memory.c:2921 [inline] handle_pte_fault mm/memory.c:3785 [inline] __handle_mm_fault+0x4563/0x55a0 mm/memory.c:3911 handle_mm_fault+0x4ec/0xc80 mm/memory.c:3948 do_user_addr_fault arch/x86/mm/fault.c:1475 [inline] __do_page_fault+0x5da/0xd60 arch/x86/mm/fault.c:1541 do_page_fault+0xe6/0x7d8 arch/x86/mm/fault.c:1572 page_fault+0x1e/0x30 arch/x86/entry/entry_64.S:1143 __get_user_4+0x21/0x30 arch/x86/lib/getuser.S:76 sock_common_setsockopt+0x9a/0xe0 net/core/sock.c:2991 __sys_setsockopt+0x1b0/0x3a0 net/socket.c:1902 __do_sys_setsockopt net/socket.c:1913 [inline] __se_sys_setsockopt net/socket.c:1910 [inline] __x64_sys_setsockopt+0xbe/0x150 net/socket.c:1910 do_syscall_64+0x1a3/0x800 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe INITIAL USE at: lock_acquire+0x1db/0x570 kernel/locking/lockdep.c:3841 __raw_spin_lock include/linux/spinlock_api_smp.h:142 [inline] _raw_spin_lock+0x2f/0x40 kernel/locking/spinlock.c:144 spin_lock include/linux/spinlock.h:329 [inline] handle_userfault+0x901/0x2510 fs/userfaultfd.c:461 do_anonymous_page mm/memory.c:2921 [inline] handle_pte_fault mm/memory.c:3785 [inline] __handle_mm_fault+0x4563/0x55a0 mm/memory.c:3911 handle_mm_fault+0x4ec/0xc80 mm/memory.c:3948 do_user_addr_fault arch/x86/mm/fault.c:1475 [inline] __do_page_fault+0x5da/0xd60 arch/x86/mm/fault.c:1541 do_page_fault+0xe6/0x7d8 arch/x86/mm/fault.c:1572 page_fault+0x1e/0x30 arch/x86/entry/entry_64.S:1143 __get_user_4+0x21/0x30 arch/x86/lib/getuser.S:76 sock_common_setsockopt+0x9a/0xe0 net/core/sock.c:2991 __sys_setsockopt+0x1b0/0x3a0 net/socket.c:1902 __do_sys_setsockopt net/socket.c:1913 [inline] __se_sys_setsockopt net/socket.c:1910 [inline] __x64_sys_setsockopt+0xbe/0x150 net/socket.c:1910 do_syscall_64+0x1a3/0x800 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe } ... key at: [] __key.44850+0x0/0x40 ... acquired at: lock_acquire+0x1db/0x570 kernel/locking/lockdep.c:3841 __raw_spin_lock include/linux/spinlock_api_smp.h:142 [inline] _raw_spin_lock+0x2f/0x40 kernel/locking/spinlock.c:144 spin_lock include/linux/spinlock.h:329 [inline] userfaultfd_ctx_read+0x690/0x2060 fs/userfaultfd.c:1040 userfaultfd_read+0x1e0/0x2c0 fs/userfaultfd.c:1198 __vfs_read+0x116/0xb20 fs/read_write.c:416 vfs_read+0x194/0x3e0 fs/read_write.c:452 ksys_read+0x105/0x260 fs/read_write.c:578 __do_sys_read fs/read_write.c:588 [inline] __se_sys_read fs/read_write.c:586 [inline] __x64_sys_read+0x73/0xb0 fs/read_write.c:586 do_syscall_64+0x1a3/0x800 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe stack backtrace: CPU: 0 PID: 17861 Comm: syz-executor5 Not tainted 5.0.0-rc4 #49 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1db/0x2d0 lib/dump_stack.c:113 print_bad_irq_dependency kernel/locking/lockdep.c:1573 [inline] check_usage.cold+0x5e2/0x917 kernel/locking/lockdep.c:1605 check_irq_usage kernel/locking/lockdep.c:1661 [inline] check_prev_add_irq kernel/locking/lockdep_states.h:8 [inline] check_prev_add kernel/locking/lockdep.c:1871 [inline] check_prevs_add kernel/locking/lockdep.c:1979 [inline] validate_chain kernel/locking/lockdep.c:2350 [inline] __lock_acquire+0x2169/0x4a30 kernel/locking/lockdep.c:3338 lock_acquire+0x1db/0x570 kernel/locking/lockdep.c:3841 __raw_spin_lock include/linux/spinlock_api_smp.h:142 [inline] _raw_spin_lock+0x2f/0x40 kernel/locking/spinlock.c:144 spin_lock include/linux/spinlock.h:329 [inline] userfaultfd_ctx_read+0x690/0x2060 fs/userfaultfd.c:1040 userfaultfd_read+0x1e0/0x2c0 fs/userfaultfd.c:1198 __vfs_read+0x116/0xb20 fs/read_write.c:416 vfs_read+0x194/0x3e0 fs/read_write.c:452 ksys_read+0x105/0x260 fs/read_write.c:578 __do_sys_read fs/read_write.c:588 [inline] __se_sys_read fs/read_write.c:586 [inline] __x64_sys_read+0x73/0xb0 fs/read_write.c:586 do_syscall_64+0x1a3/0x800 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x458099 Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007ff2359e2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458099 RDX: 0000000000000064 RSI: 0000000020000140 RDI: 0000000000000003 RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2359e36d4 R13: 00000000004c3b97 R14: 00000000004d8520 R15: 00000000ffffffff kobject: 'rx-0' (00000000b1bb98b1): kobject_cleanup, parent 00000000237c4873 IPVS: ftp: loaded support on port[0] = 21 kobject: 'loop4' (000000001338c9b4): kobject_uevent_env memory: usage 304896kB, limit 307200kB, failcnt 1234 kobject: 'rx-0' (00000000b1bb98b1): auto cleanup 'remove' event memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 kobject: 'loop4' (000000001338c9b4): fill_kobj_path: path = '/devices/virtual/block/loop4' kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 kobject: 'rx-0' (00000000b1bb98b1): kobject_uevent_env Memory cgroup stats for /syz2: cache:0KB rss:249052KB rss_huge:225280KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:249096KB inactive_file:0KB active_file:0KB unevictable:0KB kobject: 'rx-0' (00000000b1bb98b1): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' kobject: 'loop4' (000000001338c9b4): kobject_uevent_env kobject: 'loop4' (000000001338c9b4): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'rx-0' (00000000b1bb98b1): auto cleanup kobject_del oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor2,pid=12179,uid=0 kobject: 'rx-0' (00000000b1bb98b1): calling ktype release Memory cgroup out of memory: Kill process 12179 (syz-executor2) score 1113 or sacrifice child Killed process 12179 (syz-executor2) total-vm:72576kB, anon-rss:2192kB, file-rss:35788kB, shmem-rss:0kB kobject: 'rx-0': free name kobject: 'tx-0' (00000000769bc7d9): kobject_cleanup, parent 00000000237c4873 kobject: 'tx-0' (00000000769bc7d9): auto cleanup 'remove' event IPVS: ftp: loaded support on port[0] = 21 kobject: 'tx-0' (00000000769bc7d9): kobject_uevent_env kobject: 'loop2' (00000000aba18d7e): kobject_uevent_env kobject: 'loop2' (00000000aba18d7e): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'tx-0' (00000000769bc7d9): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' kobject: 'tx-0' (00000000769bc7d9): auto cleanup kobject_del kobject: 'tx-0' (00000000769bc7d9): calling ktype release kobject: 'tx-0': free name kobject: 'queues' (00000000237c4873): kobject_cleanup, parent (null) kobject: 'queues' (00000000237c4873): calling ktype release kobject: 'queues' (00000000237c4873): kset_release kobject: 'queues': free name kobject: 'nr0' (0000000052d88df4): kobject_uevent_env kobject: 'nr0' (0000000052d88df4): fill_kobj_path: path = '/devices/virtual/net/nr0' SELinux: security policydb version 15 (MLS) not backwards compatible sel_write_load: 2 callbacks suppressed SELinux: failed to load policy SELinux: security policydb version 15 (MLS) not backwards compatible kobject: 'loop4' (000000001338c9b4): kobject_uevent_env SELinux: failed to load policy kobject: 'loop4' (000000001338c9b4): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop2' (00000000aba18d7e): kobject_uevent_env kobject: 'loop2' (00000000aba18d7e): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'nr0' (0000000052d88df4): kobject_cleanup, parent (null) kobject: 'loop4' (000000001338c9b4): kobject_uevent_env kobject: 'nr0' (0000000052d88df4): calling ktype release kobject: 'nr0': free name SELinux: security policydb version 15 (MLS) not backwards compatible SELinux: failed to load policy SELinux: security policydb version 15 (MLS) not backwards compatible SELinux: failed to load policy kobject: 'loop4' (000000001338c9b4): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop3' (000000002d2e089c): kobject_uevent_env kobject: 'loop3' (000000002d2e089c): fill_kobj_path: path = '/devices/virtual/block/loop3' SELinux: security policydb version 15 (MLS) not backwards compatible kobject: 'nr0' (00000000219238f5): kobject_add_internal: parent: 'net', set: 'devices' kobject: 'loop1' (0000000018805d49): kobject_uevent_env kobject: 'nr0' (00000000219238f5): kobject_uevent_env kobject: 'nr0' (00000000219238f5): fill_kobj_path: path = '/devices/virtual/net/nr0' kobject: 'loop1' (0000000018805d49): fill_kobj_path: path = '/devices/virtual/block/loop1' syz-executor2 invoked oom-killer: gfp_mask=0x6040c0(GFP_KERNEL|__GFP_COMP), order=1, oom_score_adj=1000 SELinux: failed to load policy kobject: 'loop2' (00000000aba18d7e): kobject_uevent_env kobject: 'loop2' (00000000aba18d7e): fill_kobj_path: path = '/devices/virtual/block/loop2' CPU: 0 PID: 17904 Comm: syz-executor2 Not tainted 5.0.0-rc4 #49 kobject: 'loop3' (000000002d2e089c): kobject_uevent_env Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1db/0x2d0 lib/dump_stack.c:113 kobject: 'loop3' (000000002d2e089c): fill_kobj_path: path = '/devices/virtual/block/loop3' dump_header+0x1e6/0x116c mm/oom_kill.c:451 kobject: 'queues' (00000000b064fea6): kobject_add_internal: parent: 'nr0', set: '' kobject: 'queues' (00000000b064fea6): kobject_uevent_env kobject: 'queues' (00000000b064fea6): kobject_uevent_env: filter function caused the event to drop! kobject: 'rx-0' (00000000de002ece): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'rx-0' (00000000de002ece): kobject_uevent_env oom_kill_process.cold+0x10/0x9d4 mm/oom_kill.c:966 kobject: 'rx-0' (00000000de002ece): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' kobject: 'tx-0' (000000000e058f13): kobject_add_internal: parent: 'queues', set: 'queues' out_of_memory+0x885/0x1420 mm/oom_kill.c:1133 kobject: 'tx-0' (000000000e058f13): kobject_uevent_env mem_cgroup_out_of_memory+0x160/0x210 mm/memcontrol.c:1393 kobject: 'tx-0' (000000000e058f13): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' kobject: 'loop3' (000000002d2e089c): kobject_uevent_env mem_cgroup_oom mm/memcontrol.c:1721 [inline] try_charge+0x12a9/0x19b0 mm/memcontrol.c:2283 kobject: 'loop3' (000000002d2e089c): fill_kobj_path: path = '/devices/virtual/block/loop3' device nr0 entered promiscuous mode memcg_kmem_charge_memcg+0x7c/0x130 mm/memcontrol.c:2591 memcg_charge_slab mm/slab.h:283 [inline] kmem_getpages mm/slab.c:1404 [inline] cache_grow_begin+0x25f/0x8c0 mm/slab.c:2666 fallback_alloc+0x1fd/0x2d0 mm/slab.c:3208 ____cache_alloc_node+0x1be/0x1e0 mm/slab.c:3276 slab_alloc_node mm/slab.c:3316 [inline] kmem_cache_alloc_node+0xe3/0x710 mm/slab.c:3631 alloc_task_struct_node kernel/fork.c:158 [inline] dup_task_struct kernel/fork.c:845 [inline] copy_process+0x405b/0x8860 kernel/fork.c:1753 XFS (loop4): Invalid superblock magic number kobject: 'loop4' (000000001338c9b4): kobject_uevent_env kobject: 'loop4' (000000001338c9b4): fill_kobj_path: path = '/devices/virtual/block/loop4' _do_fork+0x1a9/0x1170 kernel/fork.c:2227 __do_sys_clone kernel/fork.c:2334 [inline] __se_sys_clone kernel/fork.c:2328 [inline] __x64_sys_clone+0xbf/0x150 kernel/fork.c:2328 do_syscall_64+0x1a3/0x800 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x458099 Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007fe2862d6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000458099 RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0020002102001fff RBP: 000000000073bf00 R08: ffffffffffffffff R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe2862d76d4 R13: 00000000004be480 R14: 00000000004cea40 R15: 00000000ffffffff memory: usage 307200kB, limit 307200kB, failcnt 1271 memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 Memory cgroup stats for /syz2: cache:0KB rss:251104KB rss_huge:227328KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:251236KB inactive_file:0KB active_file:0KB unevictable:0KB oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor2,pid=12201,uid=0 kobject: 'loop4' (000000001338c9b4): kobject_uevent_env Memory cgroup out of memory: Kill process 12201 (syz-executor2) score 1113 or sacrifice child Killed process 12201 (syz-executor2) total-vm:72576kB, anon-rss:2192kB, file-rss:35788kB, shmem-rss:0kB kobject: 'loop4' (000000001338c9b4): fill_kobj_path: path = '/devices/virtual/block/loop4' syz-executor2 invoked oom-killer: gfp_mask=0x6040c0(GFP_KERNEL|__GFP_COMP), order=1, oom_score_adj=1000 CPU: 0 PID: 17896 Comm: syz-executor2 Not tainted 5.0.0-rc4 #49 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1db/0x2d0 lib/dump_stack.c:113 dump_header+0x1e6/0x116c mm/oom_kill.c:451 oom_kill_process.cold+0x10/0x9d4 mm/oom_kill.c:966 out_of_memory+0x885/0x1420 mm/oom_kill.c:1133 mem_cgroup_out_of_memory+0x160/0x210 mm/memcontrol.c:1393 mem_cgroup_oom mm/memcontrol.c:1721 [inline] try_charge+0xd44/0x19b0 mm/memcontrol.c:2283 memcg_kmem_charge_memcg+0x7c/0x130 mm/memcontrol.c:2591 memcg_charge_slab mm/slab.h:283 [inline] kmem_getpages mm/slab.c:1404 [inline] cache_grow_begin+0x25f/0x8c0 mm/slab.c:2666 fallback_alloc+0x1fd/0x2d0 mm/slab.c:3208 ____cache_alloc_node+0x1be/0x1e0 mm/slab.c:3276 slab_alloc_node mm/slab.c:3316 [inline] kmem_cache_alloc_node+0xe3/0x710 mm/slab.c:3631 alloc_task_struct_node kernel/fork.c:158 [inline] dup_task_struct kernel/fork.c:845 [inline] copy_process+0x405b/0x8860 kernel/fork.c:1753 _do_fork+0x1a9/0x1170 kernel/fork.c:2227 __do_sys_clone kernel/fork.c:2334 [inline] __se_sys_clone kernel/fork.c:2328 [inline] __x64_sys_clone+0xbf/0x150 kernel/fork.c:2328 do_syscall_64+0x1a3/0x800 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x45aa69 Code: ff 48 85 f6 0f 84 97 8d fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c 6e 8d fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 RSP: 002b:00007fff32860c38 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 RAX: ffffffffffffffda RBX: 00007fe2862b6700 RCX: 000000000045aa69 RDX: 00007fe2862b69d0 RSI: 00007fe2862b5db0 RDI: 00000000003d0f00 RBP: 00007fff32860e40 R08: 00007fe2862b6700 R09: 00007fe2862b6700 R10: 00007fe2862b69d0 R11: 0000000000000202 R12: 0000000000000000 R13: 00007fff32860cef R14: 00007fe2862b69c0 R15: 0000000000000001 memory: usage 304956kB, limit 307200kB, failcnt 1271 memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 kobject: 'rx-0' (00000000de002ece): kobject_cleanup, parent 00000000b064fea6 Memory cgroup stats for /syz2: cache:0KB rss:249036KB rss_huge:225280KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:249080KB inactive_file:0KB active_file:0KB unevictable:0KB oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor2,pid=12221,uid=0 kobject: 'rx-0' (00000000de002ece): auto cleanup 'remove' event Memory cgroup out of memory: Kill process 12221 (syz-executor2) score 1113 or sacrifice child Killed process 12221 (syz-executor2) total-vm:72576kB, anon-rss:2192kB, file-rss:35788kB, shmem-rss:0kB kobject: 'rx-0' (00000000de002ece): kobject_uevent_env SELinux: security policydb version 15 (MLS) not backwards compatible kobject: 'rx-0' (00000000de002ece): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' SELinux: failed to load policy kobject: 'rx-0' (00000000de002ece): auto cleanup kobject_del kobject: 'rx-0' (00000000de002ece): calling ktype release kobject: 'rx-0': free name kobject: 'tx-0' (000000000e058f13): kobject_cleanup, parent 00000000b064fea6 kobject: 'tx-0' (000000000e058f13): auto cleanup 'remove' event kobject: 'loop2' (00000000aba18d7e): kobject_uevent_env kobject: 'loop2' (00000000aba18d7e): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'tx-0' (000000000e058f13): kobject_uevent_env kobject: 'tx-0' (000000000e058f13): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' kobject: 'tx-0' (000000000e058f13): auto cleanup kobject_del kobject: 'tx-0' (000000000e058f13): calling ktype release kobject: 'tx-0': free name kobject: 'queues' (00000000b064fea6): kobject_cleanup, parent (null) kobject: 'queues' (00000000b064fea6): calling ktype release kobject: 'queues' (00000000b064fea6): kset_release kobject: 'queues': free name kobject: 'nr0' (00000000219238f5): kobject_uevent_env kobject: 'nr0' (00000000219238f5): fill_kobj_path: path = '/devices/virtual/net/nr0' kobject: 'nr0' (00000000219238f5): kobject_cleanup, parent (null) kobject: 'nr0' (00000000219238f5): calling ktype release kobject: 'loop4' (000000001338c9b4): kobject_uevent_env kobject: 'nr0': free name kobject: 'loop4' (000000001338c9b4): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop1' (0000000018805d49): kobject_uevent_env kobject: 'loop1' (0000000018805d49): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop5' (00000000c8cbdb4d): kobject_uevent_env kobject: 'loop4' (000000001338c9b4): kobject_uevent_env kobject: 'nr0' (00000000b02de220): kobject_add_internal: parent: 'net', set: 'devices' kobject: 'loop5' (00000000c8cbdb4d): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop4' (000000001338c9b4): fill_kobj_path: path = '/devices/virtual/block/loop4' SELinux: security policydb version 15 (MLS) not backwards compatible kobject: 'loop3' (000000002d2e089c): kobject_uevent_env kobject: 'nr0' (00000000b02de220): kobject_uevent_env SELinux: failed to load policy kobject: 'loop3' (000000002d2e089c): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'nr0' (00000000b02de220): fill_kobj_path: path = '/devices/virtual/net/nr0' SELinux: security policydb version 15 (MLS) not backwards compatible IPVS: ftp: loaded support on port[0] = 21 SELinux: failed to load policy kobject: 'queues' (0000000081da2bb4): kobject_add_internal: parent: 'nr0', set: '' kobject: 'queues' (0000000081da2bb4): kobject_uevent_env kobject: 'queues' (0000000081da2bb4): kobject_uevent_env: filter function caused the event to drop! kobject: 'loop2' (00000000aba18d7e): kobject_uevent_env kobject: 'rx-0' (0000000061ed9fe2): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'loop2' (00000000aba18d7e): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'rx-0' (0000000061ed9fe2): kobject_uevent_env SELinux: security policydb version 15 (MLS) not backwards compatible kobject: 'rx-0' (0000000061ed9fe2): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' XFS (loop4): Invalid superblock magic number SELinux: failed to load policy kobject: 'tx-0' (00000000673ec7da): kobject_add_internal: parent: 'queues', set: 'queues' SELinux: security policydb version 15 (MLS) not backwards compatible kobject: 'tx-0' (00000000673ec7da): kobject_uevent_env kobject: 'tx-0' (00000000673ec7da): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' SELinux: failed to load policy device nr0 entered promiscuous mode kobject: 'lo' (0000000074eaa890): kobject_add_internal: parent: 'net', set: 'devices' kobject: 'loop4' (000000001338c9b4): kobject_uevent_env kobject: 'loop4' (000000001338c9b4): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'lo' (0000000074eaa890): kobject_uevent_env kobject: 'lo' (0000000074eaa890): fill_kobj_path: path = '/devices/virtual/net/lo' kobject: 'loop4' (000000001338c9b4): kobject_uevent_env SELinux: security policydb version 15 (MLS) not backwards compatible kobject: 'loop4' (000000001338c9b4): kobject_uevent_env kobject: 'loop4' (000000001338c9b4): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'queues' (00000000d0ca3bde): kobject_add_internal: parent: 'lo', set: '' SELinux: security policydb version 15 (MLS) not backwards compatible kobject: 'loop4' (000000001338c9b4): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop2' (00000000aba18d7e): kobject_uevent_env kobject: 'queues' (00000000d0ca3bde): kobject_uevent_env kobject: 'queues' (00000000d0ca3bde): kobject_uevent_env: filter function caused the event to drop! kobject: 'loop2' (00000000aba18d7e): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'rx-0' (000000006452ca7e): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'loop4' (000000001338c9b4): kobject_uevent_env kobject: 'rx-0' (000000006452ca7e): kobject_uevent_env kobject: 'loop4' (000000001338c9b4): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'rx-0' (000000006452ca7e): fill_kobj_path: path = '/devices/virtual/net/lo/queues/rx-0' kobject: 'tx-0' (000000008fe59b37): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'loop2' (00000000aba18d7e): kobject_uevent_env kobject: 'loop2' (00000000aba18d7e): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'tx-0' (000000008fe59b37): kobject_uevent_env kobject: 'tx-0' (000000008fe59b37): fill_kobj_path: path = '/devices/virtual/net/lo/queues/tx-0' SELinux: security policydb version 15 (MLS) not backwards compatible kobject: 'tunl0' (00000000ec76c6be): kobject_add_internal: parent: 'net', set: 'devices' kobject: 'loop3' (000000002d2e089c): kobject_uevent_env kobject: 'tunl0' (00000000ec76c6be): kobject_uevent_env kobject: 'loop3' (000000002d2e089c): fill_kobj_path: path = '/devices/virtual/block/loop3' SELinux: security policydb version 15 (MLS) not backwards compatible kobject: 'tunl0' (00000000ec76c6be): fill_kobj_path: path = '/devices/virtual/net/tunl0' kobject: 'queues' (000000000ef4a22e): kobject_add_internal: parent: 'tunl0', set: '' kobject: 'loop4' (000000001338c9b4): kobject_uevent_env kobject: 'loop4' (000000001338c9b4): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'queues' (000000000ef4a22e): kobject_uevent_env kobject: 'queues' (000000000ef4a22e): kobject_uevent_env: filter function caused the event to drop! kobject: 'loop2' (00000000aba18d7e): kobject_uevent_env kobject: 'rx-0' (00000000a34eb4ac): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'loop2' (00000000aba18d7e): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'rx-0' (00000000a34eb4ac): kobject_uevent_env kobject: 'loop4' (000000001338c9b4): kobject_uevent_env kobject: 'rx-0' (00000000a34eb4ac): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/rx-0' kobject: 'loop4' (000000001338c9b4): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'tx-0' (000000006cfb5cf7): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'tx-0' (000000006cfb5cf7): kobject_uevent_env kobject: 'tx-0' (000000006cfb5cf7): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/tx-0' kobject: 'gre0' (0000000052c62647): kobject_add_internal: parent: 'net', set: 'devices' kobject: 'gre0' (0000000052c62647): kobject_uevent_env kobject: 'gre0' (0000000052c62647): fill_kobj_path: path = '/devices/virtual/net/gre0' kobject: 'queues' (0000000034b1644f): kobject_add_internal: parent: 'gre0', set: '' kobject: 'queues' (0000000034b1644f): kobject_uevent_env kobject: 'queues' (0000000034b1644f): kobject_uevent_env: filter function caused the event to drop! kobject: 'rx-0' (0000000057768a87): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'rx-0' (0000000057768a87): kobject_uevent_env kobject: 'rx-0' (0000000057768a87): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/rx-0' kobject: 'tx-0' (000000004b0a547c): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'tx-0' (000000004b0a547c): kobject_uevent_env kobject: 'tx-0' (000000004b0a547c): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/tx-0' kobject: 'rx-0' (0000000061ed9fe2): kobject_cleanup, parent 0000000081da2bb4 kobject: 'rx-0' (0000000061ed9fe2): auto cleanup 'remove' event kobject: 'rx-0' (0000000061ed9fe2): kobject_uevent_env kobject: 'rx-0' (0000000061ed9fe2): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' kobject: 'rx-0' (0000000061ed9fe2): auto cleanup kobject_del kobject: 'rx-0' (0000000061ed9fe2): calling ktype release kobject: 'rx-0': free name kobject: 'tx-0' (00000000673ec7da): kobject_cleanup, parent 0000000081da2bb4 kobject: 'tx-0' (00000000673ec7da): auto cleanup 'remove' event kobject: 'tx-0' (00000000673ec7da): kobject_uevent_env kobject: 'tx-0' (00000000673ec7da): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' kobject: 'tx-0' (00000000673ec7da): auto cleanup kobject_del kobject: 'tx-0' (00000000673ec7da): calling ktype release kobject: 'tx-0': free name kobject: 'queues' (0000000081da2bb4): kobject_cleanup, parent (null) kobject: 'queues' (0000000081da2bb4): calling ktype release kobject: 'queues' (0000000081da2bb4): kset_release kobject: 'queues': free name kobject: 'nr0' (00000000b02de220): kobject_uevent_env kobject: 'nr0' (00000000b02de220): fill_kobj_path: path = '/devices/virtual/net/nr0' kobject: 'nr0' (00000000bb190bd5): kobject_add_internal: parent: 'net', set: 'devices' kobject: 'nr0' (00000000bb190bd5): kobject_uevent_env kobject: 'nr0' (00000000bb190bd5): fill_kobj_path: path = '/devices/virtual/net/nr0' kobject: 'queues' (000000001b01ecf5): kobject_add_internal: parent: 'nr0', set: '' kobject: 'queues' (000000001b01ecf5): kobject_uevent_env kobject: 'queues' (000000001b01ecf5): kobject_uevent_env: filter function caused the event to drop! kobject: 'rx-0' (00000000f5cbafe5): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'rx-0' (00000000f5cbafe5): kobject_uevent_env kobject: 'rx-0' (00000000f5cbafe5): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' kobject: 'tx-0' (000000000ff72f60): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'tx-0' (000000000ff72f60): kobject_uevent_env kobject: 'tx-0' (000000000ff72f60): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' kobject: 'gretap0' (000000009ea6c188): kobject_add_internal: parent: 'net', set: 'devices' kobject: 'gretap0' (000000009ea6c188): kobject_uevent_env kobject: 'gretap0' (000000009ea6c188): fill_kobj_path: path = '/devices/virtual/net/gretap0' kobject: 'queues' (00000000506c36a2): kobject_add_internal: parent: 'gretap0', set: '' kobject: 'queues' (00000000506c36a2): kobject_uevent_env kobject: 'queues' (00000000506c36a2): kobject_uevent_env: filter function caused the event to drop! kobject: 'rx-0' (00000000f0e96b5a): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'rx-0' (00000000f0e96b5a): kobject_uevent_env kobject: 'rx-0' (00000000f0e96b5a): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/rx-0' kobject: 'tx-0' (0000000009354623): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'tx-0' (0000000009354623): kobject_uevent_env kobject: 'tx-0' (0000000009354623): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/tx-0' kobject: 'batman_adv' (000000009af1188d): kobject_add_internal: parent: 'gretap0', set: '' kobject: 'nr0' (00000000b02de220): kobject_cleanup, parent (null) kobject: 'erspan0' (000000003ff08b5d): kobject_add_internal: parent: 'net', set: 'devices' kobject: 'nr0' (00000000b02de220): calling ktype release kobject: 'nr0': free name kobject: 'erspan0' (000000003ff08b5d): kobject_uevent_env kobject: 'erspan0' (000000003ff08b5d): fill_kobj_path: path = '/devices/virtual/net/erspan0' kobject: 'queues' (00000000bf102a2e): kobject_add_internal: parent: 'erspan0', set: '' kobject: 'queues' (00000000bf102a2e): kobject_uevent_env kobject: 'queues' (00000000bf102a2e): kobject_uevent_env: filter function caused the event to drop! kobject: 'rx-0' (000000001189dd61): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'rx-0' (000000001189dd61): kobject_uevent_env kobject: 'rx-0' (000000001189dd61): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/rx-0' kobject: 'tx-0' (00000000fa4783d2): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'tx-0' (00000000fa4783d2): kobject_uevent_env kobject: 'tx-0' (00000000fa4783d2): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/tx-0' kobject: 'batman_adv' (00000000a35de42b): kobject_add_internal: parent: 'erspan0', set: '' kobject: 'rx-0' (00000000f5cbafe5): kobject_cleanup, parent 000000001b01ecf5 kobject: 'rx-0' (00000000f5cbafe5): auto cleanup 'remove' event kobject: 'rx-0' (00000000f5cbafe5): kobject_uevent_env kobject: 'rx-0' (00000000f5cbafe5): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' kobject: 'rx-0' (00000000f5cbafe5): auto cleanup kobject_del kobject: 'rx-0' (00000000f5cbafe5): calling ktype release kobject: 'rx-0': free name kobject: 'tx-0' (000000000ff72f60): kobject_cleanup, parent 000000001b01ecf5 kobject: 'tx-0' (000000000ff72f60): auto cleanup 'remove' event kobject: 'tx-0' (000000000ff72f60): kobject_uevent_env kobject: 'tx-0' (000000000ff72f60): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' kobject: 'tx-0' (000000000ff72f60): auto cleanup kobject_del kobject: 'tx-0' (000000000ff72f60): calling ktype release kobject: 'tx-0': free name kobject: 'queues' (000000001b01ecf5): kobject_cleanup, parent (null) kobject: 'queues' (000000001b01ecf5): calling ktype release kobject: 'queues' (000000001b01ecf5): kset_release kobject: 'queues': free name kobject: 'nr0' (00000000bb190bd5): kobject_uevent_env kobject: 'nr0' (00000000bb190bd5): fill_kobj_path: path = '/devices/virtual/net/nr0' kobject: 'ip_vti0' (0000000026e6428a): kobject_add_internal: parent: 'net', set: 'devices' kobject: 'ip_vti0' (0000000026e6428a): kobject_uevent_env kobject: 'ip_vti0' (0000000026e6428a): fill_kobj_path: path = '/devices/virtual/net/ip_vti0' kobject: 'queues' (0000000030c98352): kobject_add_internal: parent: 'ip_vti0', set: '' kobject: 'queues' (0000000030c98352): kobject_uevent_env kobject: 'queues' (0000000030c98352): kobject_uevent_env: filter function caused the event to drop! kobject: 'rx-0' (000000008e427258): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'rx-0' (000000008e427258): kobject_uevent_env kobject: 'rx-0' (000000008e427258): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/rx-0' kobject: 'tx-0' (000000004d82a04f): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'tx-0' (000000004d82a04f): kobject_uevent_env kobject: 'tx-0' (000000004d82a04f): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/tx-0' kobject: 'nr0' (00000000bb190bd5): kobject_cleanup, parent (null) kobject: 'ip6_vti0' (0000000083c04073): kobject_add_internal: parent: 'net', set: 'devices' kobject: 'nr0' (00000000bb190bd5): calling ktype release kobject: 'nr0': free name kobject: 'ip6_vti0' (0000000083c04073): kobject_uevent_env kobject: 'ip6_vti0' (0000000083c04073): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0' kobject: 'queues' (00000000316f9c9e): kobject_add_internal: parent: 'ip6_vti0', set: '' kobject: 'loop1' (0000000018805d49): kobject_uevent_env kobject: 'queues' (00000000316f9c9e): kobject_uevent_env kobject: 'loop1' (0000000018805d49): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'queues' (00000000316f9c9e): kobject_uevent_env: filter function caused the event to drop! kobject: 'rx-0' (00000000a5e3c7d9): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'rx-0' (00000000a5e3c7d9): kobject_uevent_env kobject: 'rx-0' (00000000a5e3c7d9): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0/queues/rx-0' kobject: 'tx-0' (00000000f970bd0b): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'tx-0' (00000000f970bd0b): kobject_uevent_env kobject: 'tx-0' (00000000f970bd0b): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0/queues/tx-0' kobject: 'sit0' (00000000adf8060d): kobject_add_internal: parent: 'net', set: 'devices' kobject: 'sit0' (00000000adf8060d): kobject_uevent_env kobject: 'sit0' (00000000adf8060d): fill_kobj_path: path = '/devices/virtual/net/sit0' kobject: 'queues' (0000000039b6be81): kobject_add_internal: parent: 'sit0', set: '' kobject: 'queues' (0000000039b6be81): kobject_uevent_env kobject: 'queues' (0000000039b6be81): kobject_uevent_env: filter function caused the event to drop! kobject: 'rx-0' (00000000a2f1b707): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'rx-0' (00000000a2f1b707): kobject_uevent_env kobject: 'rx-0' (00000000a2f1b707): fill_kobj_path: path = '/devices/virtual/net/sit0/queues/rx-0' kobject: 'tx-0' (00000000ec7f0241): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'tx-0' (00000000ec7f0241): kobject_uevent_env kobject: 'tx-0' (00000000ec7f0241): fill_kobj_path: path = '/devices/virtual/net/sit0/queues/tx-0' kobject: 'ip6tnl0' (0000000082a93eda): kobject_add_internal: parent: 'net', set: 'devices' kobject: 'ip6tnl0' (0000000082a93eda): kobject_uevent_env kobject: 'ip6tnl0' (0000000082a93eda): fill_kobj_path: path = '/devices/virtual/net/ip6tnl0' kobject: 'queues' (000000009867a231): kobject_add_internal: parent: 'ip6tnl0', set: '' kobject: 'queues' (000000009867a231): kobject_uevent_env kobject: 'queues' (000000009867a231): kobject_uevent_env: filter function caused the event to drop! kobject: 'rx-0' (0000000031c75358): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'rx-0' (0000000031c75358): kobject_uevent_env kobject: 'rx-0' (0000000031c75358): fill_kobj_path: path = '/devices/virtual/net/ip6tnl0/queues/rx-0' kobject: 'tx-0' (00000000de59693e): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'tx-0' (00000000de59693e): kobject_uevent_env kobject: 'tx-0' (00000000de59693e): fill_kobj_path: path = '/devices/virtual/net/ip6tnl0/queues/tx-0' kobject: 'ip6gre0' (00000000cf8769b1): kobject_add_internal: parent: 'net', set: 'devices' kobject: 'ip6gre0' (00000000cf8769b1): kobject_uevent_env kobject: 'ip6gre0' (00000000cf8769b1): fill_kobj_path: path = '/devices/virtual/net/ip6gre0' kobject: 'queues' (00000000ba76866f): kobject_add_internal: parent: 'ip6gre0', set: '' kobject: 'queues' (00000000ba76866f): kobject_uevent_env kobject: 'queues' (00000000ba76866f): kobject_uevent_env: filter function caused the event to drop! kobject: 'rx-0' (0000000088220a3f): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'rx-0' (0000000088220a3f): kobject_uevent_env kobject: 'rx-0' (0000000088220a3f): fill_kobj_path: path = '/devices/virtual/net/ip6gre0/queues/rx-0' kobject: 'tx-0' (000000009f4a6753): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'tx-0' (000000009f4a6753): kobject_uevent_env kobject: 'tx-0' (000000009f4a6753): fill_kobj_path: path = '/devices/virtual/net/ip6gre0/queues/tx-0' SELinux: security policydb version 15 (MLS) not backwards compatible kobject: 'nr0' (00000000add00bd1): kobject_add_internal: parent: 'net', set: 'devices' sel_write_load: 4 callbacks suppressed kobject: 'loop5' (00000000c8cbdb4d): kobject_uevent_env SELinux: failed to load policy SELinux: security policydb version 15 (MLS) not backwards compatible kobject: 'loop5' (00000000c8cbdb4d): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'nr0' (00000000add00bd1): kobject_uevent_env SELinux: failed to load policy kobject: 'loop4' (000000001338c9b4): kobject_uevent_env kobject: 'nr0' (00000000add00bd1): fill_kobj_path: path = '/devices/virtual/net/nr0' kobject: 'loop4' (000000001338c9b4): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'queues' (00000000f7e2c48d): kobject_add_internal: parent: 'nr0', set: '' kobject: 'loop2' (00000000aba18d7e): kobject_uevent_env kobject: 'loop2' (00000000aba18d7e): fill_kobj_path: path = '/devices/virtual/block/loop2' SELinux: security policydb version 15 (MLS) not backwards compatible kobject: 'queues' (00000000f7e2c48d): kobject_uevent_env IPVS: ftp: loaded support on port[0] = 21 kobject: 'queues' (00000000f7e2c48d): kobject_uevent_env: filter function caused the event to drop! SELinux: failed to load policy kobject: 'rx-0' (0000000010b094e9): kobject_add_internal: parent: 'queues', set: 'queues' SELinux: security policydb version 15 (MLS) not backwards compatible kobject: 'rx-0' (0000000010b094e9): kobject_uevent_env kobject: 'rx-0' (0000000010b094e9): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' SELinux: failed to load policy kobject: 'tx-0' (00000000195b9d6d): kobject_add_internal: parent: 'queues', set: 'queues' XFS (loop4): Invalid superblock magic number kobject: 'tx-0' (00000000195b9d6d): kobject_uevent_env kobject: 'tx-0' (00000000195b9d6d): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' kobject: 'rx-0' (0000000088220a3f): kobject_cleanup, parent 00000000ba76866f kobject: 'loop4' (000000001338c9b4): kobject_uevent_env kobject: 'loop4' (000000001338c9b4): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'rx-0' (0000000088220a3f): auto cleanup 'remove' event kobject: 'rx-0' (0000000088220a3f): kobject_uevent_env kobject: 'rx-0' (0000000088220a3f): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'rx-0' (0000000088220a3f): auto cleanup kobject_del kobject: 'loop4' (000000001338c9b4): kobject_uevent_env kobject: 'rx-0' (0000000088220a3f): calling ktype release kobject: 'loop4' (000000001338c9b4): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop4' (000000001338c9b4): kobject_uevent_env kobject: 'loop2' (00000000aba18d7e): kobject_uevent_env kobject: 'rx-0': free name SELinux: security policydb version 15 (MLS) not backwards compatible kobject: 'tx-0' (000000009f4a6753): kobject_cleanup, parent 00000000ba76866f kobject: 'loop2' (00000000aba18d7e): fill_kobj_path: path = '/devices/virtual/block/loop2' SELinux: failed to load policy kobject: 'loop4' (000000001338c9b4): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'tx-0' (000000009f4a6753): auto cleanup 'remove' event SELinux: security policydb version 15 (MLS) not backwards compatible SELinux: failed to load policy kobject: 'tx-0' (000000009f4a6753): kobject_uevent_env kobject: 'loop4' (000000001338c9b4): kobject_uevent_env kobject: 'tx-0' (000000009f4a6753): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'loop4' (000000001338c9b4): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'tx-0' (000000009f4a6753): auto cleanup kobject_del kobject: 'loop2' (00000000aba18d7e): kobject_uevent_env kobject: 'loop2' (00000000aba18d7e): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'tx-0' (000000009f4a6753): calling ktype release kobject: 'tx-0': free name kobject: 'queues' (00000000ba76866f): kobject_cleanup, parent (null) SELinux: security policydb version 15 (MLS) not backwards compatible SELinux: failed to load policy kobject: 'queues' (00000000ba76866f): calling ktype release SELinux: security policydb version 15 (MLS) not backwards compatible kobject: 'queues' (00000000ba76866f): kset_release SELinux: failed to load policy kobject: 'queues': free name kobject: 'ip6gre0' (00000000cf8769b1): kobject_uevent_env kobject: 'ip6gre0' (00000000cf8769b1): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'loop2' (00000000aba18d7e): kobject_uevent_env kobject: 'loop2' (00000000aba18d7e): fill_kobj_path: path = '/devices/virtual/block/loop2' device nr0 entered promiscuous mode kobject: 'lo' (000000008fbab8be): kobject_add_internal: parent: 'net', set: 'devices' SELinux: security policydb version 15 (MLS) not backwards compatible kobject: 'lo' (000000008fbab8be): kobject_uevent_env SELinux: failed to load policy SELinux: security policydb version 15 (MLS) not backwards compatible kobject: 'lo' (000000008fbab8be): fill_kobj_path: path = '/devices/virtual/net/lo' SELinux: failed to load policy kobject: 'queues' (00000000fc817f92): kobject_add_internal: parent: 'lo', set: '' kobject: 'loop2' (00000000aba18d7e): kobject_uevent_env kobject: 'queues' (00000000fc817f92): kobject_uevent_env kobject: 'loop2' (00000000aba18d7e): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'queues' (00000000fc817f92): kobject_uevent_env: filter function caused the event to drop! kobject: 'rx-0' (00000000ea890678): kobject_add_internal: parent: 'queues', set: 'queues' SELinux: security policydb version 15 (MLS) not backwards compatible SELinux: security policydb version 15 (MLS) not backwards compatible kobject: 'rx-0' (00000000ea890678): kobject_uevent_env kobject: 'loop2' (00000000aba18d7e): kobject_uevent_env kobject: 'rx-0' (00000000ea890678): fill_kobj_path: path = '/devices/virtual/net/lo/queues/rx-0' kobject: 'loop2' (00000000aba18d7e): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'tx-0' (00000000b21ede55): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'tx-0' (00000000b21ede55): kobject_uevent_env kobject: 'tx-0' (00000000b21ede55): fill_kobj_path: path = '/devices/virtual/net/lo/queues/tx-0' kobject: 'loop3' (000000002d2e089c): kobject_uevent_env kobject: 'tunl0' (0000000062c3025c): kobject_add_internal: parent: 'net', set: 'devices' kobject: 'loop3' (000000002d2e089c): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'tunl0' (0000000062c3025c): kobject_uevent_env kobject: 'tunl0' (0000000062c3025c): fill_kobj_path: path = '/devices/virtual/net/tunl0' kobject: 'queues' (0000000078e701ca): kobject_add_internal: parent: 'tunl0', set: '' kobject: 'queues' (0000000078e701ca): kobject_uevent_env kobject: 'loop4' (000000001338c9b4): kobject_uevent_env kobject: 'queues' (0000000078e701ca): kobject_uevent_env: filter function caused the event to drop! kobject: 'loop4' (000000001338c9b4): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'rx-0' (000000004241e037): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'rx-0' (000000004241e037): kobject_uevent_env kobject: 'loop4' (000000001338c9b4): kobject_uevent_env kobject: 'rx-0' (000000004241e037): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/rx-0' kobject: 'loop4' (000000001338c9b4): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'tx-0' (00000000548fd1dc): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'tx-0' (00000000548fd1dc): kobject_uevent_env kobject: 'tx-0' (00000000548fd1dc): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/tx-0' kobject: 'ip6gre0' (00000000cf8769b1): kobject_cleanup, parent (null) kobject: 'ip6gre0' (00000000cf8769b1): auto cleanup 'remove' event kobject: 'ip6gre0' (00000000cf8769b1): kobject_uevent_env kobject: 'ip6gre0' (00000000cf8769b1): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'ip6gre0' (00000000cf8769b1): calling ktype release kobject: 'ip6gre0': free name kobject: 'rx-0' (0000000010b094e9): kobject_cleanup, parent 00000000f7e2c48d kobject: 'rx-0' (0000000010b094e9): auto cleanup 'remove' event kobject: 'rx-0' (0000000010b094e9): kobject_uevent_env kobject: 'rx-0' (0000000010b094e9): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' kobject: 'rx-0' (0000000010b094e9): auto cleanup kobject_del kobject: 'rx-0' (0000000010b094e9): calling ktype release kobject: 'rx-0': free name kobject: 'tx-0' (00000000195b9d6d): kobject_cleanup, parent 00000000f7e2c48d kobject: 'tx-0' (00000000195b9d6d): auto cleanup 'remove' event kobject: 'tx-0' (00000000195b9d6d): kobject_uevent_env kobject: 'tx-0' (00000000195b9d6d): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' kobject: 'tx-0' (00000000195b9d6d): auto cleanup kobject_del kobject: 'tx-0' (00000000195b9d6d): calling ktype release kobject: 'tx-0': free name kobject: 'queues' (00000000f7e2c48d): kobject_cleanup, parent (null) kobject: 'queues' (00000000f7e2c48d): calling ktype release kobject: 'queues' (00000000f7e2c48d): kset_release kobject: 'queues': free name kobject: 'nr0' (00000000add00bd1): kobject_uevent_env kobject: 'nr0' (00000000add00bd1): fill_kobj_path: path = '/devices/virtual/net/nr0' kobject: 'gre0' (000000008834e267): kobject_add_internal: parent: 'net', set: 'devices' kobject: 'gre0' (000000008834e267): kobject_uevent_env kobject: 'gre0' (000000008834e267): fill_kobj_path: path = '/devices/virtual/net/gre0' kobject: 'queues' (00000000d333eed4): kobject_add_internal: parent: 'gre0', set: '' kobject: 'queues' (00000000d333eed4): kobject_uevent_env kobject: 'queues' (00000000d333eed4): kobject_uevent_env: filter function caused the event to drop! kobject: 'rx-0' (00000000e8b9cdc5): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'rx-0' (00000000e8b9cdc5): kobject_uevent_env kobject: 'rx-0' (00000000e8b9cdc5): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/rx-0' kobject: 'tx-0' (0000000053d0bd6b): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'tx-0' (0000000053d0bd6b): kobject_uevent_env kobject: 'tx-0' (0000000053d0bd6b): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/tx-0' kobject: 'rx-0' (0000000031c75358): kobject_cleanup, parent 000000009867a231 kobject: 'rx-0' (0000000031c75358): auto cleanup 'remove' event kobject: 'rx-0' (0000000031c75358): kobject_uevent_env kobject: 'rx-0' (0000000031c75358): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'rx-0' (0000000031c75358): auto cleanup kobject_del kobject: 'rx-0' (0000000031c75358): calling ktype release kobject: 'rx-0': free name kobject: 'tx-0' (00000000de59693e): kobject_cleanup, parent 000000009867a231 kobject: 'tx-0' (00000000de59693e): auto cleanup 'remove' event kobject: 'tx-0' (00000000de59693e): kobject_uevent_env kobject: 'tx-0' (00000000de59693e): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'tx-0' (00000000de59693e): auto cleanup kobject_del kobject: 'tx-0' (00000000de59693e): calling ktype release kobject: 'tx-0': free name kobject: 'queues' (000000009867a231): kobject_cleanup, parent (null) kobject: 'queues' (000000009867a231): calling ktype release kobject: 'queues' (000000009867a231): kset_release kobject: 'queues': free name kobject: 'ip6tnl0' (0000000082a93eda): kobject_uevent_env kobject: 'ip6tnl0' (0000000082a93eda): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'nr0' (00000000add00bd1): kobject_cleanup, parent (null) kobject: 'gretap0' (000000000dbf608b): kobject_add_internal: parent: 'net', set: 'devices' kobject: 'nr0' (00000000add00bd1): calling ktype release kobject: 'gretap0' (000000000dbf608b): kobject_uevent_env kobject: 'gretap0' (000000000dbf608b): fill_kobj_path: path = '/devices/virtual/net/gretap0' kobject: 'nr0': free name kobject: 'queues' (000000007f3a22fb): kobject_add_internal: parent: 'gretap0', set: '' kobject: 'queues' (000000007f3a22fb): kobject_uevent_env kobject: 'queues' (000000007f3a22fb): kobject_uevent_env: filter function caused the event to drop! kobject: 'rx-0' (000000003d2405fb): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'rx-0' (000000003d2405fb): kobject_uevent_env kobject: 'rx-0' (000000003d2405fb): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/rx-0' kobject: 'tx-0' (00000000bd5f9c03): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'tx-0' (00000000bd5f9c03): kobject_uevent_env kobject: 'tx-0' (00000000bd5f9c03): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/tx-0' kobject: 'batman_adv' (00000000f608163a): kobject_add_internal: parent: 'gretap0', set: '' kobject: 'ip6tnl0' (0000000082a93eda): kobject_cleanup, parent (null) kobject: 'erspan0' (00000000fbf4f2fb): kobject_add_internal: parent: 'net', set: 'devices' kobject: 'ip6tnl0' (0000000082a93eda): auto cleanup 'remove' event kobject: 'ip6tnl0' (0000000082a93eda): kobject_uevent_env kobject: 'loop1' (0000000018805d49): kobject_uevent_env kobject: 'erspan0' (00000000fbf4f2fb): kobject_uevent_env kobject: 'loop1' (0000000018805d49): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'ip6tnl0' (0000000082a93eda): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'erspan0' (00000000fbf4f2fb): fill_kobj_path: path = '/devices/virtual/net/erspan0' kobject: 'ip6tnl0' (0000000082a93eda): calling ktype release kobject: 'queues' (00000000a4e84448): kobject_add_internal: parent: 'erspan0', set: '' kobject: 'ip6tnl0': free name kobject: 'queues' (00000000a4e84448): kobject_uevent_env kobject: 'queues' (00000000a4e84448): kobject_uevent_env: filter function caused the event to drop! kobject: 'rx-0' (00000000819c7ec2): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'rx-0' (00000000819c7ec2): kobject_uevent_env kobject: 'rx-0' (00000000819c7ec2): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/rx-0' kobject: 'tx-0' (00000000515235cf): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'tx-0' (00000000515235cf): kobject_uevent_env kobject: 'tx-0' (00000000515235cf): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/tx-0' kobject: 'batman_adv' (000000001bfa7b41): kobject_add_internal: parent: 'erspan0', set: '' kobject: 'rx-0' (00000000a2f1b707): kobject_cleanup, parent 0000000039b6be81 kobject: 'rx-0' (00000000a2f1b707): auto cleanup 'remove' event kobject: 'rx-0' (00000000a2f1b707): kobject_uevent_env kobject: 'rx-0' (00000000a2f1b707): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'rx-0' (00000000a2f1b707): auto cleanup kobject_del kobject: 'rx-0' (00000000a2f1b707): calling ktype release kobject: 'rx-0': free name kobject: 'tx-0' (00000000ec7f0241): kobject_cleanup, parent 0000000039b6be81 kobject: 'tx-0' (00000000ec7f0241): auto cleanup 'remove' event kobject: 'tx-0' (00000000ec7f0241): kobject_uevent_env kobject: 'tx-0' (00000000ec7f0241): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'tx-0' (00000000ec7f0241): auto cleanup kobject_del kobject: 'tx-0' (00000000ec7f0241): calling ktype release kobject: 'tx-0': free name kobject: 'queues' (0000000039b6be81): kobject_cleanup, parent (null) kobject: 'queues' (0000000039b6be81): calling ktype release kobject: 'queues' (0000000039b6be81): kset_release kobject: 'queues': free name kobject: 'sit0' (00000000adf8060d): kobject_uevent_env kobject: 'sit0' (00000000adf8060d): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'ip_vti0' (00000000fb434822): kobject_add_internal: parent: 'net', set: 'devices' kobject: 'ip_vti0' (00000000fb434822): kobject_uevent_env kobject: 'ip_vti0' (00000000fb434822): fill_kobj_path: path = '/devices/virtual/net/ip_vti0' kobject: 'queues' (000000001c155459): kobject_add_internal: parent: 'ip_vti0', set: '' kobject: 'queues' (000000001c155459): kobject_uevent_env kobject: 'queues' (000000001c155459): kobject_uevent_env: filter function caused the event to drop! kobject: 'rx-0' (00000000858f2fbd): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'rx-0' (00000000858f2fbd): kobject_uevent_env kobject: 'rx-0' (00000000858f2fbd): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/rx-0'