audit: type=1400 audit(1571582904.555:316): avc:  denied  { map } for  pid=18565 comm="syz-executor.2" path="/dev/usbmon0" dev="devtmpfs" ino=15370 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:usbmon_device_t:s0 tclass=chr_file permissive=1
======================================================
WARNING: possible circular locking dependency detected
4.14.150 #0 Not tainted
------------------------------------------------------
syz-executor.2/18566 is trying to acquire lock:
 (&rp->fetch_lock){+.+.}, at: [<ffffffff83f76c6f>] mon_bin_vma_fault+0x6f/0x280 drivers/usb/mon/mon_bin.c:1236

but task is already holding lock:
 (&mm->mmap_sem){++++}, at: [<ffffffff817bec75>] __mm_populate+0x1e5/0x2c0 mm/gup.c:1259

which lock already depends on the new lock.


the existing dependency chain (in reverse order) is:

-> #1 (&mm->mmap_sem){++++}:
       lock_acquire+0x16f/0x430 kernel/locking/lockdep.c:3994
       __might_fault mm/memory.c:4584 [inline]
       __might_fault+0x143/0x1d0 mm/memory.c:4569
       _copy_to_user+0x2c/0xd0 lib/usercopy.c:25
       copy_to_user include/linux/uaccess.h:155 [inline]
       mon_bin_read+0x2fb/0x5e0 drivers/usb/mon/mon_bin.c:825
       do_loop_readv_writev fs/read_write.c:695 [inline]
       do_loop_readv_writev fs/read_write.c:682 [inline]
       do_iter_read+0x3e2/0x5b0 fs/read_write.c:919
       vfs_readv+0xd3/0x130 fs/read_write.c:981
       do_preadv+0x15d/0x200 fs/read_write.c:1065
       SYSC_preadv fs/read_write.c:1115 [inline]
       SyS_preadv+0x31/0x40 fs/read_write.c:1110
       do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292
       entry_SYSCALL_64_after_hwframe+0x42/0xb7

-> #0 (&rp->fetch_lock){+.+.}:
       check_prev_add kernel/locking/lockdep.c:1901 [inline]
       check_prevs_add kernel/locking/lockdep.c:2018 [inline]
       validate_chain kernel/locking/lockdep.c:2460 [inline]
       __lock_acquire+0x2cb3/0x4620 kernel/locking/lockdep.c:3487
       lock_acquire+0x16f/0x430 kernel/locking/lockdep.c:3994
       __mutex_lock_common kernel/locking/mutex.c:756 [inline]
       __mutex_lock+0xe8/0x1470 kernel/locking/mutex.c:893
       mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:908
       mon_bin_vma_fault+0x6f/0x280 drivers/usb/mon/mon_bin.c:1236
       __do_fault+0x104/0x390 mm/memory.c:3223
       do_read_fault mm/memory.c:3633 [inline]
       do_fault mm/memory.c:3759 [inline]
       handle_pte_fault mm/memory.c:3989 [inline]
       __handle_mm_fault+0x2460/0x3470 mm/memory.c:4113
       handle_mm_fault+0x293/0x7c0 mm/memory.c:4150
       faultin_page mm/gup.c:514 [inline]
       __get_user_pages+0x465/0x1220 mm/gup.c:714
       populate_vma_page_range+0x18e/0x230 mm/gup.c:1231
       __mm_populate+0x198/0x2c0 mm/gup.c:1279
       mm_populate include/linux/mm.h:2187 [inline]
       vm_mmap_pgoff+0x1be/0x1d0 mm/util.c:338
       SYSC_mmap_pgoff mm/mmap.c:1551 [inline]
       SyS_mmap_pgoff+0x3ca/0x520 mm/mmap.c:1509
       SYSC_mmap arch/x86/kernel/sys_x86_64.c:100 [inline]
       SyS_mmap+0x16/0x20 arch/x86/kernel/sys_x86_64.c:91
       do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292
       entry_SYSCALL_64_after_hwframe+0x42/0xb7

other info that might help us debug this:

 Possible unsafe locking scenario:

       CPU0                    CPU1
       ----                    ----
  lock(&mm->mmap_sem);
                               lock(&rp->fetch_lock);
                               lock(&mm->mmap_sem);
  lock(&rp->fetch_lock);

 *** DEADLOCK ***

1 lock held by syz-executor.2/18566:
 #0:  (&mm->mmap_sem){++++}, at: [<ffffffff817bec75>] __mm_populate+0x1e5/0x2c0 mm/gup.c:1259

stack backtrace:
CPU: 1 PID: 18566 Comm: syz-executor.2 Not tainted 4.14.150 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:17 [inline]
 dump_stack+0x138/0x197 lib/dump_stack.c:53
 print_circular_bug.isra.0.cold+0x1cc/0x28f kernel/locking/lockdep.c:1258
 check_prev_add kernel/locking/lockdep.c:1901 [inline]
 check_prevs_add kernel/locking/lockdep.c:2018 [inline]
 validate_chain kernel/locking/lockdep.c:2460 [inline]
 __lock_acquire+0x2cb3/0x4620 kernel/locking/lockdep.c:3487
 lock_acquire+0x16f/0x430 kernel/locking/lockdep.c:3994
 __mutex_lock_common kernel/locking/mutex.c:756 [inline]
 __mutex_lock+0xe8/0x1470 kernel/locking/mutex.c:893
 mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:908
 mon_bin_vma_fault+0x6f/0x280 drivers/usb/mon/mon_bin.c:1236
 __do_fault+0x104/0x390 mm/memory.c:3223
 do_read_fault mm/memory.c:3633 [inline]
 do_fault mm/memory.c:3759 [inline]
 handle_pte_fault mm/memory.c:3989 [inline]
 __handle_mm_fault+0x2460/0x3470 mm/memory.c:4113
 handle_mm_fault+0x293/0x7c0 mm/memory.c:4150
 faultin_page mm/gup.c:514 [inline]
 __get_user_pages+0x465/0x1220 mm/gup.c:714
 populate_vma_page_range+0x18e/0x230 mm/gup.c:1231
 __mm_populate+0x198/0x2c0 mm/gup.c:1279
 mm_populate include/linux/mm.h:2187 [inline]
 vm_mmap_pgoff+0x1be/0x1d0 mm/util.c:338
 SYSC_mmap_pgoff mm/mmap.c:1551 [inline]
 SyS_mmap_pgoff+0x3ca/0x520 mm/mmap.c:1509
 SYSC_mmap arch/x86/kernel/sys_x86_64.c:100 [inline]
 SyS_mmap+0x16/0x20 arch/x86/kernel/sys_x86_64.c:91
 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292
 entry_SYSCALL_64_after_hwframe+0x42/0xb7
RIP: 0033:0x459a59
RSP: 002b:00007f731b552c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000009
RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000459a59
RDX: 0000000000000004 RSI: 0000000000004000 RDI: 0000000020ffb000
RBP: 000000000075bf20 R08: 0000000000000003 R09: 0000000000000000
R10: 0000000000002012 R11: 0000000000000246 R12: 00007f731b5536d4
R13: 00000000004c61e1 R14: 00000000004db2e8 R15: 00000000ffffffff
kobject: 'loop5' (ffff8880a4ac8960): kobject_uevent_env
kobject: 'loop5' (ffff8880a4ac8960): fill_kobj_path: path = '/devices/virtual/block/loop5'
kobject: 'loop1' (ffff8880a496ce20): kobject_uevent_env
kobject: 'loop1' (ffff8880a496ce20): fill_kobj_path: path = '/devices/virtual/block/loop1'
kobject: 'loop2' (ffff8880a49c5720): kobject_uevent_env
kobject: 'loop2' (ffff8880a49c5720): fill_kobj_path: path = '/devices/virtual/block/loop2'
kobject: 'kvm' (ffff8880a6ec1390): kobject_uevent_env
kobject: 'kvm' (ffff8880a6ec1390): fill_kobj_path: path = '/devices/virtual/misc/kvm'
kobject: 'loop2' (ffff8880a49c5720): kobject_uevent_env
kobject: 'kvm' (ffff8880a6ec1390): kobject_uevent_env
kobject: 'loop2' (ffff8880a49c5720): fill_kobj_path: path = '/devices/virtual/block/loop2'
kobject: 'kvm' (ffff8880a6ec1390): fill_kobj_path: path = '/devices/virtual/misc/kvm'
kobject: 'rx-0' (ffff88804c5086d0): kobject_cleanup, parent ffff8880a04edf48
kobject: 'rx-0' (ffff88804c5086d0): auto cleanup 'remove' event
kobject: 'kvm' (ffff8880a6ec1390): kobject_uevent_env
kobject: 'kvm' (ffff8880a6ec1390): fill_kobj_path: path = '/devices/virtual/misc/kvm'
kobject: 'rx-0' (ffff88804c5086d0): kobject_uevent_env
kobject: 'kvm' (ffff8880a6ec1390): kobject_uevent_env
kobject: 'rx-0' (ffff88804c5086d0): kobject_uevent_env: uevent_suppress caused the event to drop!
kobject: 'kvm' (ffff8880a6ec1390): fill_kobj_path: path = '/devices/virtual/misc/kvm'
net_ratelimit: 12 callbacks suppressed
protocol 88fb is buggy, dev hsr_slave_0
protocol 88fb is buggy, dev hsr_slave_1
protocol 88fb is buggy, dev hsr_slave_0
kobject: 'loop2' (ffff8880a49c5720): kobject_uevent_env
protocol 88fb is buggy, dev hsr_slave_1
kobject: 'loop2' (ffff8880a49c5720): fill_kobj_path: path = '/devices/virtual/block/loop2'
kobject: 'rx-0' (ffff88804c5086d0): auto cleanup kobject_del
kobject: 'loop1' (ffff8880a496ce20): kobject_uevent_env
kobject: 'rx-0' (ffff88804c5086d0): calling ktype release
kobject: 'loop1' (ffff8880a496ce20): fill_kobj_path: path = '/devices/virtual/block/loop1'
kobject: 'loop2' (ffff8880a49c5720): kobject_uevent_env
kobject: 'loop2' (ffff8880a49c5720): fill_kobj_path: path = '/devices/virtual/block/loop2'
kobject: 'rx-0': free name
kobject: 'loop1' (ffff8880a496ce20): kobject_uevent_env
kobject: 'loop1' (ffff8880a496ce20): fill_kobj_path: path = '/devices/virtual/block/loop1'
kobject: 'tx-0' (ffff8880927ee318): kobject_cleanup, parent ffff8880a04edf48
kobject: 'loop5' (ffff8880a4ac8960): kobject_uevent_env
kobject: 'loop5' (ffff8880a4ac8960): fill_kobj_path: path = '/devices/virtual/block/loop5'
protocol 88fb is buggy, dev hsr_slave_0
protocol 88fb is buggy, dev hsr_slave_1
kobject: 'tx-0' (ffff8880927ee318): auto cleanup 'remove' event
kobject: 'loop2' (ffff8880a49c5720): kobject_uevent_env
kobject: 'tx-0' (ffff8880927ee318): kobject_uevent_env
kobject: 'loop2' (ffff8880a49c5720): fill_kobj_path: path = '/devices/virtual/block/loop2'
kobject: 'tx-0' (ffff8880927ee318): kobject_uevent_env: uevent_suppress caused the event to drop!
kobject: 'tx-0' (ffff8880927ee318): auto cleanup kobject_del
kobject: 'tx-0' (ffff8880927ee318): calling ktype release
kobject: 'loop2' (ffff8880a49c5720): kobject_uevent_env
kobject: 'tx-0': free name
kobject: 'loop2' (ffff8880a49c5720): fill_kobj_path: path = '/devices/virtual/block/loop2'
kobject: 'queues' (ffff8880a04edf48): kobject_cleanup, parent           (null)
kobject: 'queues' (ffff8880a04edf48): calling ktype release
kobject: 'loop1' (ffff8880a496ce20): kobject_uevent_env
kobject: 'queues' (ffff8880a04edf48): kset_release
kobject: 'loop1' (ffff8880a496ce20): fill_kobj_path: path = '/devices/virtual/block/loop1'
kobject: 'queues': free name
kobject: 'ip6gre0' (ffff88804ec60e70): kobject_uevent_env
kobject: 'loop5' (ffff8880a4ac8960): kobject_uevent_env
kobject: 'ip6gre0' (ffff88804ec60e70): kobject_uevent_env: uevent_suppress caused the event to drop!
kobject: 'loop5' (ffff8880a4ac8960): fill_kobj_path: path = '/devices/virtual/block/loop5'
kobject: 'loop2' (ffff8880a49c5720): kobject_uevent_env
kobject: 'loop2' (ffff8880a49c5720): fill_kobj_path: path = '/devices/virtual/block/loop2'
kobject: 'loop2' (ffff8880a49c5720): kobject_uevent_env
kobject: 'ip6gre0' (ffff88804ec60e70): kobject_cleanup, parent           (null)
kobject: 'ip6gre0' (ffff88804ec60e70): calling ktype release
kobject: 'loop2' (ffff8880a49c5720): fill_kobj_path: path = '/devices/virtual/block/loop2'
kobject: 'ip6gre0': free name
kobject: 'loop1' (ffff8880a496ce20): kobject_uevent_env
protocol 88fb is buggy, dev hsr_slave_0
protocol 88fb is buggy, dev hsr_slave_1
kobject: 'rx-0' (ffff88809d2d20d0): kobject_cleanup, parent ffff88809b953548
kobject: 'rx-0' (ffff88809d2d20d0): auto cleanup 'remove' event
kobject: 'rx-0' (ffff88809d2d20d0): kobject_uevent_env
kobject: 'loop1' (ffff8880a496ce20): fill_kobj_path: path = '/devices/virtual/block/loop1'
kobject: 'rx-0' (ffff88809d2d20d0): kobject_uevent_env: uevent_suppress caused the event to drop!
protocol 88fb is buggy, dev hsr_slave_0
kobject: 'rx-0' (ffff88809d2d20d0): auto cleanup kobject_del
protocol 88fb is buggy, dev hsr_slave_1
kobject: 'rx-0' (ffff88809d2d20d0): calling ktype release
kobject: 'loop1' (ffff8880a496ce20): kobject_uevent_env
kobject: 'loop1' (ffff8880a496ce20): fill_kobj_path: path = '/devices/virtual/block/loop1'
kobject: 'rx-0': free name
kobject: 'tx-0' (ffff888099c25018): kobject_cleanup, parent ffff88809b953548
kobject: 'tx-0' (ffff888099c25018): auto cleanup 'remove' event
kobject: 'tx-0' (ffff888099c25018): kobject_uevent_env
kobject: 'tx-0' (ffff888099c25018): kobject_uevent_env: uevent_suppress caused the event to drop!
kobject: 'tx-0' (ffff888099c25018): auto cleanup kobject_del
kobject: 'tx-0' (ffff888099c25018): calling ktype release
kobject: 'tx-0': free name
kobject: 'queues' (ffff88809b953548): kobject_cleanup, parent           (null)
kobject: 'queues' (ffff88809b953548): calling ktype release
kobject: 'queues' (ffff88809b953548): kset_release
kobject: 'loop5' (ffff8880a4ac8960): kobject_uevent_env
kobject: 'queues': free name
kobject: 'loop5' (ffff8880a4ac8960): fill_kobj_path: path = '/devices/virtual/block/loop5'
kobject: 'ip6tnl0' (ffff88808a2d6bf0): kobject_uevent_env
kobject: 'ip6tnl0' (ffff88808a2d6bf0): kobject_uevent_env: uevent_suppress caused the event to drop!
kobject: 'ip6tnl0' (ffff88808a2d6bf0): kobject_cleanup, parent           (null)
kobject: 'ip6tnl0' (ffff88808a2d6bf0): calling ktype release
kobject: 'ip6tnl0': free name
kobject: 'rx-0' (ffff88808e037850): kobject_cleanup, parent ffff88807833ca48
kobject: 'rx-0' (ffff88808e037850): auto cleanup 'remove' event
kobject: 'rx-0' (ffff88808e037850): kobject_uevent_env
kobject: 'rx-0' (ffff88808e037850): kobject_uevent_env: uevent_suppress caused the event to drop!
kobject: 'rx-0' (ffff88808e037850): auto cleanup kobject_del
kobject: 'rx-0' (ffff88808e037850): calling ktype release
kobject: 'rx-0': free name
kobject: 'tx-0' (ffff888077f64ad8): kobject_cleanup, parent ffff88807833ca48
kobject: 'tx-0' (ffff888077f64ad8): auto cleanup 'remove' event
kobject: 'tx-0' (ffff888077f64ad8): kobject_uevent_env
kobject: 'tx-0' (ffff888077f64ad8): kobject_uevent_env: uevent_suppress caused the event to drop!
kobject: 'tx-0' (ffff888077f64ad8): auto cleanup kobject_del
kobject: 'tx-0' (ffff888077f64ad8): calling ktype release
kobject: 'tx-0': free name
kobject: 'queues' (ffff88807833ca48): kobject_cleanup, parent           (null)
kobject: 'loop4' (ffff8880a4a706e0): kobject_uevent_env
kobject: 'queues' (ffff88807833ca48): calling ktype release
kobject: 'queues' (ffff88807833ca48): kset_release
kobject: 'queues': free name
kobject: 'loop4' (ffff8880a4a706e0): fill_kobj_path: path = '/devices/virtual/block/loop4'
kobject: 'sit0' (ffff8880500969f0): kobject_uevent_env
kobject: 'sit0' (ffff8880500969f0): kobject_uevent_env: uevent_suppress caused the event to drop!
kobject: 'loop2' (ffff8880a49c5720): kobject_uevent_env
kobject: 'loop2' (ffff8880a49c5720): fill_kobj_path: path = '/devices/virtual/block/loop2'
kobject: 'sit0' (ffff8880500969f0): kobject_cleanup, parent           (null)
kobject: 'sit0' (ffff8880500969f0): calling ktype release
kobject: 'sit0': free name
kobject: 'loop1' (ffff8880a496ce20): kobject_uevent_env
kobject: 'rx-0' (ffff888086c0fa90): kobject_cleanup, parent ffff8880a0a8b548
kobject: 'loop1' (ffff8880a496ce20): fill_kobj_path: path = '/devices/virtual/block/loop1'
kobject: 'rx-0' (ffff888086c0fa90): auto cleanup 'remove' event
kobject: 'loop1' (ffff8880a496ce20): kobject_uevent_env
kobject: 'rx-0' (ffff888086c0fa90): kobject_uevent_env
kobject: 'loop1' (ffff8880a496ce20): fill_kobj_path: path = '/devices/virtual/block/loop1'
kobject: 'rx-0' (ffff888086c0fa90): kobject_uevent_env: uevent_suppress caused the event to drop!
kobject: 'loop4' (ffff8880a4a706e0): kobject_uevent_env
kobject: 'loop4' (ffff8880a4a706e0): kobject_uevent_env
kobject: 'loop4' (ffff8880a4a706e0): fill_kobj_path: path = '/devices/virtual/block/loop4'
kobject: 'loop4' (ffff8880a4a706e0): fill_kobj_path: path = '/devices/virtual/block/loop4'
kobject: 'rx-0' (ffff888086c0fa90): auto cleanup kobject_del
kobject: 'loop2' (ffff8880a49c5720): kobject_uevent_env
kobject: 'rx-0' (ffff888086c0fa90): calling ktype release
kobject: 'loop2' (ffff8880a49c5720): fill_kobj_path: path = '/devices/virtual/block/loop2'
kobject: 'rx-0': free name
kobject: 'loop4' (ffff8880a4a706e0): kobject_uevent_env
kobject: 'tx-0' (ffff8880a9609cd8): kobject_cleanup, parent ffff8880a0a8b548
kobject: 'loop4' (ffff8880a4a706e0): fill_kobj_path: path = '/devices/virtual/block/loop4'
kobject: 'loop2' (ffff8880a49c5720): kobject_uevent_env
kobject: 'loop2' (ffff8880a49c5720): fill_kobj_path: path = '/devices/virtual/block/loop2'
kobject: 'tx-0' (ffff8880a9609cd8): auto cleanup 'remove' event
kobject: 'tx-0' (ffff8880a9609cd8): kobject_uevent_env
kobject: 'loop4' (ffff8880a4a706e0): kobject_uevent_env
kobject: 'tx-0' (ffff8880a9609cd8): kobject_uevent_env: uevent_suppress caused the event to drop!
kobject: 'tx-0' (ffff8880a9609cd8): auto cleanup kobject_del
kobject: 'tx-0' (ffff8880a9609cd8): calling ktype release
kobject: 'loop4' (ffff8880a4a706e0): fill_kobj_path: path = '/devices/virtual/block/loop4'
kobject: 'loop2' (ffff8880a49c5720): kobject_uevent_env
kobject: 'loop2' (ffff8880a49c5720): fill_kobj_path: path = '/devices/virtual/block/loop2'
kobject: 'loop4' (ffff8880a4a706e0): kobject_uevent_env
kobject: 'tx-0': free name
kobject: 'queues' (ffff8880a0a8b548): kobject_cleanup, parent           (null)
kobject: 'loop4' (ffff8880a4a706e0): fill_kobj_path: path = '/devices/virtual/block/loop4'
kobject: 'loop2' (ffff8880a49c5720): kobject_uevent_env
kobject: 'loop2' (ffff8880a49c5720): fill_kobj_path: path = '/devices/virtual/block/loop2'
kobject: 'queues' (ffff8880a0a8b548): calling ktype release
kobject: 'queues' (ffff8880a0a8b548): kset_release
kobject: 'loop5' (ffff8880a4ac8960): kobject_uevent_env
kobject: 'queues': free name
kobject: 'ip6_vti0' (ffff88809e9cc7f0): kobject_uevent_env
kobject: 'loop5' (ffff8880a4ac8960): fill_kobj_path: path = '/devices/virtual/block/loop5'
kobject: 'ip6_vti0' (ffff88809e9cc7f0): kobject_uevent_env: uevent_suppress caused the event to drop!
kobject: 'ip6_vti0' (ffff88809e9cc7f0): kobject_cleanup, parent           (null)
kobject: 'loop1' (ffff8880a496ce20): kobject_uevent_env
kobject: 'loop1' (ffff8880a496ce20): fill_kobj_path: path = '/devices/virtual/block/loop1'
kobject: 'ip6_vti0' (ffff88809e9cc7f0): calling ktype release
kobject: 'ip6_vti0': free name
kobject: 'rx-0' (ffff88809d2d23d0): kobject_cleanup, parent ffff88807833c748
kobject: 'loop1' (ffff8880a496ce20): kobject_uevent_env
kobject: 'loop1' (ffff8880a496ce20): fill_kobj_path: path = '/devices/virtual/block/loop1'
kobject: 'rx-0' (ffff88809d2d23d0): auto cleanup 'remove' event
kobject: 'loop2' (ffff8880a49c5720): kobject_uevent_env
kobject: 'rx-0' (ffff88809d2d23d0): kobject_uevent_env
kobject: 'loop2' (ffff8880a49c5720): fill_kobj_path: path = '/devices/virtual/block/loop2'
kobject: 'rx-0' (ffff88809d2d23d0): kobject_uevent_env: uevent_suppress caused the event to drop!
kobject: 'rx-0' (ffff88809d2d23d0): auto cleanup kobject_del
kobject: 'loop1' (ffff8880a496ce20): kobject_uevent_env
kobject: 'rx-0' (ffff88809d2d23d0): calling ktype release
kobject: 'loop1' (ffff8880a496ce20): fill_kobj_path: path = '/devices/virtual/block/loop1'
kobject: 'rx-0': free name
kobject: 'tx-0' (ffff8880a02e3298): kobject_cleanup, parent ffff88807833c748
kobject: 'loop2' (ffff8880a49c5720): kobject_uevent_env
kobject: 'tx-0' (ffff8880a02e3298): auto cleanup 'remove' event
kobject: 'loop2' (ffff8880a49c5720): fill_kobj_path: path = '/devices/virtual/block/loop2'
kobject: 'tx-0' (ffff8880a02e3298): kobject_uevent_env
kobject: 'tx-0' (ffff8880a02e3298): kobject_uevent_env: uevent_suppress caused the event to drop!
kobject: 'loop5' (ffff8880a4ac8960): kobject_uevent_env
kobject: 'loop5' (ffff8880a4ac8960): fill_kobj_path: path = '/devices/virtual/block/loop5'
kobject: 'tx-0' (ffff8880a02e3298): auto cleanup kobject_del
kobject: 'tx-0' (ffff8880a02e3298): calling ktype release
kobject: 'tx-0': free name
kobject: 'loop2' (ffff8880a49c5720): kobject_uevent_env
kobject: 'queues' (ffff88807833c748): kobject_cleanup, parent           (null)
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
kobject: 'loop2' (ffff8880a49c5720): fill_kobj_path: path = '/devices/virtual/block/loop2'
CPU: 1 PID: 18736 Comm: syz-executor.1 Not tainted 4.14.150 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:17 [inline]
 dump_stack+0x138/0x197 lib/dump_stack.c:53
 fail_dump lib/fault-inject.c:51 [inline]
 should_fail.cold+0x10f/0x159 lib/fault-inject.c:149
 should_failslab+0xdb/0x130 mm/failslab.c:32
 slab_pre_alloc_hook mm/slab.h:421 [inline]
 slab_alloc mm/slab.c:3376 [inline]
 __do_kmalloc mm/slab.c:3718 [inline]
 __kmalloc+0x2f0/0x7a0 mm/slab.c:3729
 kmalloc include/linux/slab.h:493 [inline]
 kzalloc include/linux/slab.h:661 [inline]
 mon_bin_ioctl+0x672/0xb50 drivers/usb/mon/mon_bin.c:1027
 vfs_ioctl fs/ioctl.c:46 [inline]
 file_ioctl fs/ioctl.c:500 [inline]
 do_vfs_ioctl+0x7ae/0x1060 fs/ioctl.c:684
 SYSC_ioctl fs/ioctl.c:701 [inline]
 SyS_ioctl+0x8f/0xc0 fs/ioctl.c:692
 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292
 entry_SYSCALL_64_after_hwframe+0x42/0xb7
RIP: 0033:0x459a59
RSP: 002b:00007f7c46147c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 00007f7c46147c90 RCX: 0000000000459a59
RDX: 0000000000011540 RSI: 0000000000009204 RDI: 0000000000000003
RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7c461486d4
R13: 00000000004c3317 R14: 00000000004d7040 R15: 0000000000000004
kobject: 'queues' (ffff88807833c748): calling ktype release
kobject: 'queues' (ffff88807833c748): kset_release
kobject: 'queues': free name
kobject: 'ip_vti0' (ffff8880992825b0): kobject_uevent_env
kobject: 'ip_vti0' (ffff8880992825b0): kobject_uevent_env: uevent_suppress caused the event to drop!
kobject: 'ip_vti0' (ffff8880992825b0): kobject_cleanup, parent           (null)
kobject: 'ip_vti0' (ffff8880992825b0): calling ktype release
kobject: 'loop4' (ffff8880a4a706e0): kobject_uevent_env
kobject: 'ip_vti0': free name
kobject: 'batman_adv' (ffff888099fb8e00): kobject_uevent_env
kobject: 'loop4' (ffff8880a4a706e0): fill_kobj_path: path = '/devices/virtual/block/loop4'
kobject: 'batman_adv' (ffff888099fb8e00): kobject_uevent_env: filter function caused the event to drop!
kobject: 'loop1' (ffff8880a496ce20): kobject_uevent_env
kobject: 'loop1' (ffff8880a496ce20): fill_kobj_path: path = '/devices/virtual/block/loop1'
kobject: 'batman_adv' (ffff888099fb8e00): kobject_cleanup, parent           (null)
kobject: 'loop5' (ffff8880a4ac8960): kobject_uevent_env
FAULT_INJECTION: forcing a failure.
name fail_page_alloc, interval 1, probability 0, space 0, times 1
kobject: 'batman_adv' (ffff888099fb8e00): calling ktype release
kobject: 'loop5' (ffff8880a4ac8960): fill_kobj_path: path = '/devices/virtual/block/loop5'
kobject: (ffff888099fb8e00): dynamic_kobj_release
CPU: 1 PID: 18744 Comm: syz-executor.1 Not tainted 4.14.150 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:17 [inline]
 dump_stack+0x138/0x197 lib/dump_stack.c:53
 fail_dump lib/fault-inject.c:51 [inline]
 should_fail.cold+0x10f/0x159 lib/fault-inject.c:149
 should_fail_alloc_page mm/page_alloc.c:2891 [inline]
 prepare_alloc_pages mm/page_alloc.c:4124 [inline]
 __alloc_pages_nodemask+0x1d6/0x7a0 mm/page_alloc.c:4172
 alloc_pages_current+0xec/0x1e0 mm/mempolicy.c:2113
 alloc_pages include/linux/gfp.h:497 [inline]
 __get_free_pages+0xf/0x40 mm/page_alloc.c:4226
 get_zeroed_page+0x11/0x20 mm/page_alloc.c:4235
 mon_alloc_buff+0xa9/0x160 drivers/usb/mon/mon_bin.c:1320
 mon_bin_ioctl+0x691/0xb50 drivers/usb/mon/mon_bin.c:1033
 vfs_ioctl fs/ioctl.c:46 [inline]
 file_ioctl fs/ioctl.c:500 [inline]
 do_vfs_ioctl+0x7ae/0x1060 fs/ioctl.c:684
 SYSC_ioctl fs/ioctl.c:701 [inline]
 SyS_ioctl+0x8f/0xc0 fs/ioctl.c:692
 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292
 entry_SYSCALL_64_after_hwframe+0x42/0xb7
RIP: 0033:0x459a59
RSP: 002b:00007f7c46147c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 00007f7c46147c90 RCX: 0000000000459a59
RDX: 0000000000011540 RSI: 0000000000009204 RDI: 0000000000000003
RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7c461486d4
R13: 00000000004c3317 R14: 00000000004d7040 R15: 0000000000000004
kobject: 'loop2' (ffff8880a49c5720): kobject_uevent_env
kobject: 'loop4' (ffff8880a4a706e0): kobject_uevent_env
kobject: 'loop4' (ffff8880a4a706e0): fill_kobj_path: path = '/devices/virtual/block/loop4'
kobject: 'loop2' (ffff8880a49c5720): fill_kobj_path: path = '/devices/virtual/block/loop2'
kobject: 'batman_adv': free name
kobject: 'rx-0' (ffff88808c3fd910): kobject_cleanup, parent ffff888092cc7948
kobject: 'rx-0' (ffff88808c3fd910): auto cleanup 'remove' event
kobject: 'rx-0' (ffff88808c3fd910): kobject_uevent_env
kobject: 'rx-0' (ffff88808c3fd910): kobject_uevent_env: uevent_suppress caused the event to drop!
kobject: 'rx-0' (ffff88808c3fd910): auto cleanup kobject_del
kobject: 'rx-0' (ffff88808c3fd910): calling ktype release
kobject: 'rx-0': free name
kobject: 'tx-0' (ffff8880a51a2018): kobject_cleanup, parent ffff888092cc7948
kobject: 'tx-0' (ffff8880a51a2018): auto cleanup 'remove' event
kobject: 'tx-0' (ffff8880a51a2018): kobject_uevent_env
kobject: 'tx-0' (ffff8880a51a2018): kobject_uevent_env: uevent_suppress caused the event to drop!
kobject: 'loop2' (ffff8880a49c5720): kobject_uevent_env
kobject: 'tx-0' (ffff8880a51a2018): auto cleanup kobject_del
kobject: 'loop2' (ffff8880a49c5720): fill_kobj_path: path = '/devices/virtual/block/loop2'
kobject: 'tx-0' (ffff8880a51a2018): calling ktype release
kobject: 'tx-0': free name
kobject: 'queues' (ffff888092cc7948): kobject_cleanup, parent           (null)
kobject: 'loop2' (ffff8880a49c5720): kobject_uevent_env
kobject: 'queues' (ffff888092cc7948): calling ktype release
kobject: 'loop2' (ffff8880a49c5720): fill_kobj_path: path = '/devices/virtual/block/loop2'
kobject: 'queues' (ffff888092cc7948): kset_release
kobject: 'queues': free name
kobject: 'loop1' (ffff8880a496ce20): kobject_uevent_env
kobject: 'erspan0' (ffff8880988c12b0): kobject_uevent_env
FAULT_INJECTION: forcing a failure.
name fail_page_alloc, interval 1, probability 0, space 0, times 0
kobject: 'erspan0' (ffff8880988c12b0): kobject_uevent_env: uevent_suppress caused the event to drop!
kobject: 'loop1' (ffff8880a496ce20): fill_kobj_path: path = '/devices/virtual/block/loop1'
CPU: 0 PID: 18770 Comm: syz-executor.1 Not tainted 4.14.150 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:17 [inline]
 dump_stack+0x138/0x197 lib/dump_stack.c:53
 fail_dump lib/fault-inject.c:51 [inline]
 should_fail.cold+0x10f/0x159 lib/fault-inject.c:149
 should_fail_alloc_page mm/page_alloc.c:2891 [inline]
 prepare_alloc_pages mm/page_alloc.c:4124 [inline]
 __alloc_pages_nodemask+0x1d6/0x7a0 mm/page_alloc.c:4172
 alloc_pages_current+0xec/0x1e0 mm/mempolicy.c:2113
 alloc_pages include/linux/gfp.h:497 [inline]
 __get_free_pages+0xf/0x40 mm/page_alloc.c:4226
 get_zeroed_page+0x11/0x20 mm/page_alloc.c:4235
 mon_alloc_buff+0xa9/0x160 drivers/usb/mon/mon_bin.c:1320
 mon_bin_ioctl+0x691/0xb50 drivers/usb/mon/mon_bin.c:1033
 vfs_ioctl fs/ioctl.c:46 [inline]
 file_ioctl fs/ioctl.c:500 [inline]
 do_vfs_ioctl+0x7ae/0x1060 fs/ioctl.c:684
 SYSC_ioctl fs/ioctl.c:701 [inline]
 SyS_ioctl+0x8f/0xc0 fs/ioctl.c:692
 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292
 entry_SYSCALL_64_after_hwframe+0x42/0xb7
RIP: 0033:0x459a59
RSP: 002b:00007f7c46147c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 00007f7c46147c90 RCX: 0000000000459a59
RDX: 0000000000011540 RSI: 0000000000009204 RDI: 0000000000000003
RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7c461486d4
R13: 00000000004c3317 R14: 00000000004d7040 R15: 0000000000000004
kobject: 'loop5' (ffff8880a4ac8960): kobject_uevent_env
kobject: 'erspan0' (ffff8880988c12b0): kobject_cleanup, parent           (null)
kobject: 'loop5' (ffff8880a4ac8960): fill_kobj_path: path = '/devices/virtual/block/loop5'
kobject: 'erspan0' (ffff8880988c12b0): calling ktype release
kobject: 'loop2' (ffff8880a49c5720): kobject_uevent_env
kobject: 'loop2' (ffff8880a49c5720): fill_kobj_path: path = '/devices/virtual/block/loop2'
kobject: 'erspan0': free name
kobject: 'batman_adv' (ffff88809df56b80): kobject_uevent_env
kobject: 'batman_adv' (ffff88809df56b80): kobject_uevent_env: filter function caused the event to drop!
kobject: 'loop1' (ffff8880a496ce20): kobject_uevent_env
kobject: 'loop1' (ffff8880a496ce20): fill_kobj_path: path = '/devices/virtual/block/loop1'
kobject: 'batman_adv' (ffff88809df56b80): kobject_cleanup, parent           (null)
kobject: 'batman_adv' (ffff88809df56b80): calling ktype release
kobject: (ffff88809df56b80): dynamic_kobj_release
kobject: 'batman_adv': free name
kobject: 'rx-0' (ffff88809685e550): kobject_cleanup, parent ffff88808aba9d48
kobject: 'rx-0' (ffff88809685e550): auto cleanup 'remove' event
kobject: 'loop4' (ffff8880a4a706e0): kobject_uevent_env
kobject: 'loop4' (ffff8880a4a706e0): fill_kobj_path: path = '/devices/virtual/block/loop4'
kobject: 'rx-0' (ffff88809685e550): kobject_uevent_env
kobject: 'loop5' (ffff8880a4ac8960): kobject_uevent_env
kobject: 'rx-0' (ffff88809685e550): kobject_uevent_env: uevent_suppress caused the event to drop!
kobject: 'loop4' (ffff8880a4a706e0): kobject_uevent_env
kobject: 'loop4' (ffff8880a4a706e0): fill_kobj_path: path = '/devices/virtual/block/loop4'
kobject: 'loop5' (ffff8880a4ac8960): fill_kobj_path: path = '/devices/virtual/block/loop5'
kobject: 'rx-0' (ffff88809685e550): auto cleanup kobject_del
kobject: 'rx-0' (ffff88809685e550): calling ktype release
kobject: 'rx-0': free name
kobject: 'tx-0' (ffff88808a95f018): kobject_cleanup, parent ffff88808aba9d48
kobject: 'tx-0' (ffff88808a95f018): auto cleanup 'remove' event
kobject: 'loop2' (ffff8880a49c5720): kobject_uevent_env
kobject: 'loop2' (ffff8880a49c5720): fill_kobj_path: path = '/devices/virtual/block/loop2'
kobject: 'tx-0' (ffff88808a95f018): kobject_uevent_env
FAULT_INJECTION: forcing a failure.
name fail_page_alloc, interval 1, probability 0, space 0, times 0
kobject: 'tx-0' (ffff88808a95f018): kobject_uevent_env: uevent_suppress caused the event to drop!
CPU: 0 PID: 18789 Comm: syz-executor.1 Not tainted 4.14.150 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:17 [inline]
 dump_stack+0x138/0x197 lib/dump_stack.c:53
 fail_dump lib/fault-inject.c:51 [inline]
 should_fail.cold+0x10f/0x159 lib/fault-inject.c:149
 should_fail_alloc_page mm/page_alloc.c:2891 [inline]
 prepare_alloc_pages mm/page_alloc.c:4124 [inline]
 __alloc_pages_nodemask+0x1d6/0x7a0 mm/page_alloc.c:4172
 alloc_pages_current+0xec/0x1e0 mm/mempolicy.c:2113
 alloc_pages include/linux/gfp.h:497 [inline]
 __get_free_pages+0xf/0x40 mm/page_alloc.c:4226
 get_zeroed_page+0x11/0x20 mm/page_alloc.c:4235
 mon_alloc_buff+0xa9/0x160 drivers/usb/mon/mon_bin.c:1320
 mon_bin_ioctl+0x691/0xb50 drivers/usb/mon/mon_bin.c:1033
 vfs_ioctl fs/ioctl.c:46 [inline]
 file_ioctl fs/ioctl.c:500 [inline]
 do_vfs_ioctl+0x7ae/0x1060 fs/ioctl.c:684
 SYSC_ioctl fs/ioctl.c:701 [inline]
 SyS_ioctl+0x8f/0xc0 fs/ioctl.c:692
 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292
 entry_SYSCALL_64_after_hwframe+0x42/0xb7
RIP: 0033:0x459a59
RSP: 002b:00007f7c46147c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 00007f7c46147c90 RCX: 0000000000459a59
RDX: 0000000000011540 RSI: 0000000000009204 RDI: 0000000000000003
RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7c461486d4
R13: 00000000004c3317 R14: 00000000004d7040 R15: 0000000000000004
kobject: 'tx-0' (ffff88808a95f018): auto cleanup kobject_del
kobject: 'tx-0' (ffff88808a95f018): calling ktype release
kobject: 'loop2' (ffff8880a49c5720): kobject_uevent_env
kobject: 'loop2' (ffff8880a49c5720): fill_kobj_path: path = '/devices/virtual/block/loop2'
kobject: 'tx-0': free name
kobject: 'queues' (ffff88808aba9d48): kobject_cleanup, parent           (null)
kobject: 'queues' (ffff88808aba9d48): calling ktype release
kobject: 'queues' (ffff88808aba9d48): kset_release
kobject: 'queues': free name
kobject: 'gretap0' (ffff88804f25f070): kobject_uevent_env
kobject: 'gretap0' (ffff88804f25f070): kobject_uevent_env: uevent_suppress caused the event to drop!
kobject: 'loop4' (ffff8880a4a706e0): kobject_uevent_env
kobject: 'loop4' (ffff8880a4a706e0): fill_kobj_path: path = '/devices/virtual/block/loop4'
UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found
kobject: 'loop1' (ffff8880a496ce20): kobject_uevent_env
kobject: 'loop1' (ffff8880a496ce20): fill_kobj_path: path = '/devices/virtual/block/loop1'
UDF-fs: Scanning with blocksize 512 failed
kobject: 'gretap0' (ffff88804f25f070): kobject_cleanup, parent           (null)
FAULT_INJECTION: forcing a failure.
name fail_page_alloc, interval 1, probability 0, space 0, times 0
kobject: 'gretap0' (ffff88804f25f070): calling ktype release
kobject: 'loop2' (ffff8880a49c5720): kobject_uevent_env
kobject: 'loop2' (ffff8880a49c5720): fill_kobj_path: path = '/devices/virtual/block/loop2'
kobject: 'gretap0': free name
UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found
UDF-fs: Scanning with blocksize 1024 failed
CPU: 0 PID: 18804 Comm: syz-executor.1 Not tainted 4.14.150 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:17 [inline]
 dump_stack+0x138/0x197 lib/dump_stack.c:53
 fail_dump lib/fault-inject.c:51 [inline]
 should_fail.cold+0x10f/0x159 lib/fault-inject.c:149
 should_fail_alloc_page mm/page_alloc.c:2891 [inline]
 prepare_alloc_pages mm/page_alloc.c:4124 [inline]
 __alloc_pages_nodemask+0x1d6/0x7a0 mm/page_alloc.c:4172
 alloc_pages_current+0xec/0x1e0 mm/mempolicy.c:2113
 alloc_pages include/linux/gfp.h:497 [inline]
 __get_free_pages+0xf/0x40 mm/page_alloc.c:4226
 get_zeroed_page+0x11/0x20 mm/page_alloc.c:4235
 mon_alloc_buff+0xa9/0x160 drivers/usb/mon/mon_bin.c:1320
 mon_bin_ioctl+0x691/0xb50 drivers/usb/mon/mon_bin.c:1033
 vfs_ioctl fs/ioctl.c:46 [inline]
 file_ioctl fs/ioctl.c:500 [inline]
 do_vfs_ioctl+0x7ae/0x1060 fs/ioctl.c:684
 SYSC_ioctl fs/ioctl.c:701 [inline]
 SyS_ioctl+0x8f/0xc0 fs/ioctl.c:692
 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292
 entry_SYSCALL_64_after_hwframe+0x42/0xb7
RIP: 0033:0x459a59
RSP: 002b:00007f7c46147c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 00007f7c46147c90 RCX: 0000000000459a59
RDX: 0000000000011540 RSI: 0000000000009204 RDI: 0000000000000003
RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7c461486d4
R13: 00000000004c3317 R14: 00000000004d7040 R15: 0000000000000004
kobject: 'rx-0' (ffff888092631190): kobject_cleanup, parent ffff88808aba9f48
UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found
kobject: 'rx-0' (ffff888092631190): auto cleanup 'remove' event
UDF-fs: Scanning with blocksize 2048 failed
UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found
UDF-fs: Scanning with blocksize 4096 failed
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
kobject: 'rx-0' (ffff888092631190): kobject_uevent_env
CPU: 0 PID: 18808 Comm: syz-executor.2 Not tainted 4.14.150 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:17 [inline]
 dump_stack+0x138/0x197 lib/dump_stack.c:53
 fail_dump lib/fault-inject.c:51 [inline]
 should_fail.cold+0x10f/0x159 lib/fault-inject.c:149
 should_failslab+0xdb/0x130 mm/failslab.c:32
 slab_pre_alloc_hook mm/slab.h:421 [inline]
 slab_alloc mm/slab.c:3376 [inline]
 kmem_cache_alloc+0x2d7/0x780 mm/slab.c:3550
kobject: 'rx-0' (ffff888092631190): kobject_uevent_env: uevent_suppress caused the event to drop!
 __split_vma+0xc9/0x6d0 mm/mmap.c:2585
 do_munmap+0x257/0xd60 mm/mmap.c:2699
 mmap_region+0x16f/0x1030 mm/mmap.c:1664
 do_mmap+0x5b8/0xcd0 mm/mmap.c:1501
 do_mmap_pgoff include/linux/mm.h:2178 [inline]
 vm_mmap_pgoff+0x17a/0x1d0 mm/util.c:333
kobject: 'rx-0' (ffff888092631190): auto cleanup kobject_del
 SYSC_mmap_pgoff mm/mmap.c:1551 [inline]
 SyS_mmap_pgoff+0xa3/0x520 mm/mmap.c:1509
 SYSC_mmap arch/x86/kernel/sys_x86_64.c:100 [inline]
 SyS_mmap+0x16/0x20 arch/x86/kernel/sys_x86_64.c:91
kobject: 'rx-0' (ffff888092631190): calling ktype release
 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292
 entry_SYSCALL_64_after_hwframe+0x42/0xb7
RIP: 0033:0x459a59
RSP: 002b:00007f731b552c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000009
kobject: 'rx-0': free name
RAX: ffffffffffffffda RBX: 00007f731b552c90 RCX: 0000000000459a59
RDX: 0000000000000000 RSI: 0000000000004000 RDI: 0000000020ffc000
RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000
R10: 0000000000000031 R11: 0000000000000246 R12: 00007f731b5536d4
R13: 00000000004c6176 R14: 00000000004db240 R15: 0000000000000004
kobject: 'loop1' (ffff8880a496ce20): kobject_uevent_env
kobject: 'loop1' (ffff8880a496ce20): fill_kobj_path: path = '/devices/virtual/block/loop1'
kobject: 'loop2' (ffff8880a49c5720): kobject_uevent_env
kobject: 'tx-0' (ffff888093f8e358): kobject_cleanup, parent ffff88808aba9f48
kobject: 'loop2' (ffff8880a49c5720): fill_kobj_path: path = '/devices/virtual/block/loop2'
FAULT_INJECTION: forcing a failure.
name fail_page_alloc, interval 1, probability 0, space 0, times 0
kobject: 'tx-0' (ffff888093f8e358): auto cleanup 'remove' event
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
kobject: 'tx-0' (ffff888093f8e358): kobject_uevent_env
kobject: 'tx-0' (ffff888093f8e358): kobject_uevent_env: uevent_suppress caused the event to drop!
kobject: 'tx-0' (ffff888093f8e358): auto cleanup kobject_del
kobject: 'tx-0' (ffff888093f8e358): calling ktype release
kobject: 'loop4' (ffff8880a4a706e0): kobject_uevent_env
CPU: 1 PID: 18814 Comm: syz-executor.1 Not tainted 4.14.150 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:17 [inline]
 dump_stack+0x138/0x197 lib/dump_stack.c:53
 fail_dump lib/fault-inject.c:51 [inline]
 should_fail.cold+0x10f/0x159 lib/fault-inject.c:149
kobject: 'loop4' (ffff8880a4a706e0): fill_kobj_path: path = '/devices/virtual/block/loop4'
 should_fail_alloc_page mm/page_alloc.c:2891 [inline]
 prepare_alloc_pages mm/page_alloc.c:4124 [inline]
 __alloc_pages_nodemask+0x1d6/0x7a0 mm/page_alloc.c:4172
 alloc_pages_current+0xec/0x1e0 mm/mempolicy.c:2113
 alloc_pages include/linux/gfp.h:497 [inline]
 __get_free_pages+0xf/0x40 mm/page_alloc.c:4226
 get_zeroed_page+0x11/0x20 mm/page_alloc.c:4235
 mon_alloc_buff+0xa9/0x160 drivers/usb/mon/mon_bin.c:1320
 mon_bin_ioctl+0x691/0xb50 drivers/usb/mon/mon_bin.c:1033
UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found
 vfs_ioctl fs/ioctl.c:46 [inline]
 file_ioctl fs/ioctl.c:500 [inline]
 do_vfs_ioctl+0x7ae/0x1060 fs/ioctl.c:684
UDF-fs: Scanning with blocksize 512 failed
 SYSC_ioctl fs/ioctl.c:701 [inline]
 SyS_ioctl+0x8f/0xc0 fs/ioctl.c:692
 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292
 entry_SYSCALL_64_after_hwframe+0x42/0xb7
RIP: 0033:0x459a59
RSP: 002b:00007f7c46147c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 00007f7c46147c90 RCX: 0000000000459a59
RDX: 0000000000011540 RSI: 0000000000009204 RDI: 0000000000000003
RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7c461486d4
R13: 00000000004c3317 R14: 00000000004d7040 R15: 0000000000000004
CPU: 0 PID: 18813 Comm: syz-executor.2 Not tainted 4.14.150 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:17 [inline]
 dump_stack+0x138/0x197 lib/dump_stack.c:53
 fail_dump lib/fault-inject.c:51 [inline]
 should_fail.cold+0x10f/0x159 lib/fault-inject.c:149
kobject: 'tx-0': free name
 should_failslab+0xdb/0x130 mm/failslab.c:32
 slab_pre_alloc_hook mm/slab.h:421 [inline]
 slab_alloc mm/slab.c:3376 [inline]
 kmem_cache_alloc+0x2d7/0x780 mm/slab.c:3550
kobject: 'queues' (ffff88808aba9f48): kobject_cleanup, parent           (null)
 kmem_cache_zalloc include/linux/slab.h:651 [inline]
 mmap_region+0x602/0x1030 mm/mmap.c:1691
 do_mmap+0x5b8/0xcd0 mm/mmap.c:1501
 do_mmap_pgoff include/linux/mm.h:2178 [inline]
 vm_mmap_pgoff+0x17a/0x1d0 mm/util.c:333
kobject: 'queues' (ffff88808aba9f48): calling ktype release
 SYSC_mmap_pgoff mm/mmap.c:1551 [inline]
 SyS_mmap_pgoff+0xa3/0x520 mm/mmap.c:1509
kobject: 'queues' (ffff88808aba9f48): kset_release
 SYSC_mmap arch/x86/kernel/sys_x86_64.c:100 [inline]
 SyS_mmap+0x16/0x20 arch/x86/kernel/sys_x86_64.c:91
 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292
kobject: 'queues': free name
 entry_SYSCALL_64_after_hwframe+0x42/0xb7
RIP: 0033:0x459a59
kobject: 'gre0' (ffff88809f650db0): kobject_uevent_env
RSP: 002b:00007f731b552c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000009
RAX: ffffffffffffffda RBX: 00007f731b552c90 RCX: 0000000000459a59
RDX: 0000000000000000 RSI: 0000000000004000 RDI: 0000000020ffc000
RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000
kobject: 'gre0' (ffff88809f650db0): kobject_uevent_env: uevent_suppress caused the event to drop!
R10: 0000000000000031 R11: 0000000000000246 R12: 00007f731b5536d4
R13: 00000000004c6176 R14: 00000000004db240 R15: 0000000000000004
UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found
UDF-fs: Scanning with blocksize 1024 failed
kobject: 'loop1' (ffff8880a496ce20): kobject_uevent_env
kobject: 'gre0' (ffff88809f650db0): kobject_cleanup, parent           (null)
kobject: 'loop1' (ffff8880a496ce20): fill_kobj_path: path = '/devices/virtual/block/loop1'
kobject: 'gre0' (ffff88809f650db0): calling ktype release
UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found
UDF-fs: Scanning with blocksize 2048 failed
kobject: 'gre0': free name
UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found
kobject: 'rx-0' (ffff8880a832ba90): kobject_cleanup, parent ffff888080905348
UDF-fs: Scanning with blocksize 4096 failed
kobject: 'rx-0' (ffff8880a832ba90): auto cleanup 'remove' event
kobject: 'loop5' (ffff8880a4ac8960): kobject_uevent_env
kobject: 'loop5' (ffff8880a4ac8960): fill_kobj_path: path = '/devices/virtual/block/loop5'
kobject: 'rx-0' (ffff8880a832ba90): kobject_uevent_env
kobject: 'loop4' (ffff8880a4a706e0): kobject_uevent_env
kobject: 'loop4' (ffff8880a4a706e0): fill_kobj_path: path = '/devices/virtual/block/loop4'
kobject: 'rx-0' (ffff8880a832ba90): kobject_uevent_env: uevent_suppress caused the event to drop!
FAULT_INJECTION: forcing a failure.
name fail_page_alloc, interval 1, probability 0, space 0, times 0
kobject: 'loop4' (ffff8880a4a706e0): kobject_uevent_env
kobject: 'loop2' (ffff8880a49c5720): kobject_uevent_env
kobject: 'rx-0' (ffff8880a832ba90): auto cleanup kobject_del
kobject: 'loop4' (ffff8880a4a706e0): fill_kobj_path: path = '/devices/virtual/block/loop4'
kobject: 'loop2' (ffff8880a49c5720): fill_kobj_path: path = '/devices/virtual/block/loop2'
kobject: 'rx-0' (ffff8880a832ba90): calling ktype release
CPU: 0 PID: 18823 Comm: syz-executor.1 Not tainted 4.14.150 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
ntfs: (device loop4): parse_options(): Invalid fmask option argument: 00000000000000000000�*T���000
Call Trace:
 __dump_stack lib/dump_stack.c:17 [inline]
 dump_stack+0x138/0x197 lib/dump_stack.c:53
 fail_dump lib/fault-inject.c:51 [inline]
 should_fail.cold+0x10f/0x159 lib/fault-inject.c:149
kobject: 'rx-0': free name
 should_fail_alloc_page mm/page_alloc.c:2891 [inline]
 prepare_alloc_pages mm/page_alloc.c:4124 [inline]
 __alloc_pages_nodemask+0x1d6/0x7a0 mm/page_alloc.c:4172
kobject: 'tx-0' (ffff8880a3d62298): kobject_cleanup, parent ffff888080905348
 alloc_pages_current+0xec/0x1e0 mm/mempolicy.c:2113
 alloc_pages include/linux/gfp.h:497 [inline]
 __get_free_pages+0xf/0x40 mm/page_alloc.c:4226
 get_zeroed_page+0x11/0x20 mm/page_alloc.c:4235
 mon_alloc_buff+0xa9/0x160 drivers/usb/mon/mon_bin.c:1320
kobject: 'tx-0' (ffff8880a3d62298): auto cleanup 'remove' event
 mon_bin_ioctl+0x691/0xb50 drivers/usb/mon/mon_bin.c:1033
kobject: 'tx-0' (ffff8880a3d62298): kobject_uevent_env
 vfs_ioctl fs/ioctl.c:46 [inline]
 file_ioctl fs/ioctl.c:500 [inline]
 do_vfs_ioctl+0x7ae/0x1060 fs/ioctl.c:684
 SYSC_ioctl fs/ioctl.c:701 [inline]
 SyS_ioctl+0x8f/0xc0 fs/ioctl.c:692
kobject: 'tx-0' (ffff8880a3d62298): kobject_uevent_env: uevent_suppress caused the event to drop!
 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292
 entry_SYSCALL_64_after_hwframe+0x42/0xb7
RIP: 0033:0x459a59
RSP: 002b:00007f7c46147c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 00007f7c46147c90 RCX: 0000000000459a59
RDX: 0000000000011540 RSI: 0000000000009204 RDI: 0000000000000003
RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
kobject: 'tx-0' (ffff8880a3d62298): auto cleanup kobject_del
R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7c461486d4
R13: 00000000004c3317 R14: 00000000004d7040 R15: 0000000000000004
net_ratelimit: 20 callbacks suppressed
protocol 88fb is buggy, dev hsr_slave_0
protocol 88fb is buggy, dev hsr_slave_0
protocol 88fb is buggy, dev hsr_slave_1
protocol 88fb is buggy, dev hsr_slave_1
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
CPU: 0 PID: 18830 Comm: syz-executor.2 Not tainted 4.14.150 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:17 [inline]
 dump_stack+0x138/0x197 lib/dump_stack.c:53
 fail_dump lib/fault-inject.c:51 [inline]
 should_fail.cold+0x10f/0x159 lib/fault-inject.c:149
 should_failslab+0xdb/0x130 mm/failslab.c:32
 slab_pre_alloc_hook mm/slab.h:421 [inline]
 slab_alloc mm/slab.c:3376 [inline]
 kmem_cache_alloc+0x2d7/0x780 mm/slab.c:3550
 kmem_cache_zalloc include/linux/slab.h:651 [inline]
 mmap_region+0x602/0x1030 mm/mmap.c:1691
 do_mmap+0x5b8/0xcd0 mm/mmap.c:1501
 do_mmap_pgoff include/linux/mm.h:2178 [inline]
 vm_mmap_pgoff+0x17a/0x1d0 mm/util.c:333
kobject: 'tx-0' (ffff8880a3d62298): calling ktype release
 SYSC_mmap_pgoff mm/mmap.c:1551 [inline]
 SyS_mmap_pgoff+0xa3/0x520 mm/mmap.c:1509
kobject: 'tx-0': free name
 SYSC_mmap arch/x86/kernel/sys_x86_64.c:100 [inline]
 SyS_mmap+0x16/0x20 arch/x86/kernel/sys_x86_64.c:91
kobject: 'queues' (ffff888080905348): kobject_cleanup, parent           (null)
 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292
 entry_SYSCALL_64_after_hwframe+0x42/0xb7
RIP: 0033:0x459a59
RSP: 002b:00007f731b552c78 EFLAGS: 00000246
kobject: 'queues' (ffff888080905348): calling ktype release
 ORIG_RAX: 0000000000000009
RAX: ffffffffffffffda RBX: 00007f731b552c90 RCX: 0000000000459a59
RDX: 0000000000000000 RSI: 0000000000004000 RDI: 0000000020ffc000
RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000
R10: 0000000000000031 R11: 0000000000000246 R12: 00007f731b5536d4
R13: 00000000004c6176 R14: 00000000004db240 R15: 0000000000000004
kobject: 'loop4' (ffff8880a4a706e0): kobject_uevent_env
kobject: 'loop4' (ffff8880a4a706e0): fill_kobj_path: path = '/devices/virtual/block/loop4'
kobject: 'queues' (ffff888080905348): kset_release
kobject: 'loop1' (ffff8880a496ce20): kobject_uevent_env
kobject: 'loop1' (ffff8880a496ce20): fill_kobj_path: path = '/devices/virtual/block/loop1'
kobject: 'queues': free name
FAULT_INJECTION: forcing a failure.
name fail_page_alloc, interval 1, probability 0, space 0, times 0
protocol 88fb is buggy, dev hsr_slave_0
protocol 88fb is buggy, dev hsr_slave_1
kobject: 'tunl0' (ffff888094ca4c70): kobject_uevent_env
kobject: 'loop5' (ffff8880a4ac8960): kobject_uevent_env
CPU: 0 PID: 18843 Comm: syz-executor.1 Not tainted 4.14.150 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
kobject: 'tunl0' (ffff888094ca4c70): kobject_uevent_env: uevent_suppress caused the event to drop!
Call Trace:
 __dump_stack lib/dump_stack.c:17 [inline]
 dump_stack+0x138/0x197 lib/dump_stack.c:53
 fail_dump lib/fault-inject.c:51 [inline]
 should_fail.cold+0x10f/0x159 lib/fault-inject.c:149
 should_fail_alloc_page mm/page_alloc.c:2891 [inline]
 prepare_alloc_pages mm/page_alloc.c:4124 [inline]
 __alloc_pages_nodemask+0x1d6/0x7a0 mm/page_alloc.c:4172
 alloc_pages_current+0xec/0x1e0 mm/mempolicy.c:2113
 alloc_pages include/linux/gfp.h:497 [inline]
 __get_free_pages+0xf/0x40 mm/page_alloc.c:4226
 get_zeroed_page+0x11/0x20 mm/page_alloc.c:4235
 mon_alloc_buff+0xa9/0x160 drivers/usb/mon/mon_bin.c:1320
 mon_bin_ioctl+0x691/0xb50 drivers/usb/mon/mon_bin.c:1033
 vfs_ioctl fs/ioctl.c:46 [inline]
 file_ioctl fs/ioctl.c:500 [inline]
 do_vfs_ioctl+0x7ae/0x1060 fs/ioctl.c:684
 SYSC_ioctl fs/ioctl.c:701 [inline]
 SyS_ioctl+0x8f/0xc0 fs/ioctl.c:692
 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292
 entry_SYSCALL_64_after_hwframe+0x42/0xb7
RIP: 0033:0x459a59
RSP: 002b:00007f7c46147c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 00007f7c46147c90 RCX: 0000000000459a59
RDX: 0000000000011540 RSI: 0000000000009204 RDI: 0000000000000003
RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7c461486d4
R13: 00000000004c3317 R14: 00000000004d7040 R15: 0000000000000004
kobject: 'vti5' (ffff88809712b0b0): kobject_add_internal: parent: 'net', set: 'devices'
protocol 88fb is buggy, dev hsr_slave_0
protocol 88fb is buggy, dev hsr_slave_1
kobject: 'loop5' (ffff8880a4ac8960): fill_kobj_path: path = '/devices/virtual/block/loop5'
kobject: 'vti5' (ffff88809712b0b0): kobject_uevent_env
kobject: 'loop2' (ffff8880a49c5720): kobject_uevent_env
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
kobject: 'vti5' (ffff88809712b0b0): fill_kobj_path: path = '/devices/virtual/net/vti5'
kobject: 'loop2' (ffff8880a49c5720): fill_kobj_path: path = '/devices/virtual/block/loop2'
CPU: 0 PID: 18854 Comm: syz-executor.2 Not tainted 4.14.150 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
kobject: 'queues' (ffff88809cc04548): kobject_add_internal: parent: 'vti5', set: '<NULL>'
Call Trace:
 __dump_stack lib/dump_stack.c:17 [inline]
 dump_stack+0x138/0x197 lib/dump_stack.c:53
 fail_dump lib/fault-inject.c:51 [inline]
 should_fail.cold+0x10f/0x159 lib/fault-inject.c:149
 should_failslab+0xdb/0x130 mm/failslab.c:32
 slab_pre_alloc_hook mm/slab.h:421 [inline]
 slab_alloc mm/slab.c:3376 [inline]
 kmem_cache_alloc+0x2d7/0x780 mm/slab.c:3550
kobject: 'queues' (ffff88809cc04548): kobject_uevent_env
kobject: 'queues' (ffff88809cc04548): kobject_uevent_env: filter function caused the event to drop!
 shmem_alloc_inode+0x1c/0x50 mm/shmem.c:3882
 alloc_inode+0x64/0x180 fs/inode.c:209
 new_inode_pseudo+0x19/0xf0 fs/inode.c:891
 new_inode+0x1f/0x40 fs/inode.c:920
 shmem_get_inode+0x75/0x750 mm/shmem.c:2172
 __shmem_file_setup.part.0+0x30e/0x400 mm/shmem.c:4260
kobject: 'rx-0' (ffff8880990309d0): kobject_add_internal: parent: 'queues', set: 'queues'
kobject: 'rx-0' (ffff8880990309d0): kobject_uevent_env
 __shmem_file_setup mm/shmem.c:4242 [inline]
 shmem_zero_setup+0xc5/0x3ba mm/shmem.c:4328
 mmap_region+0xd88/0x1030 mm/mmap.c:1739
 do_mmap+0x5b8/0xcd0 mm/mmap.c:1501
kobject: 'rx-0' (ffff8880990309d0): fill_kobj_path: path = '/devices/virtual/net/vti5/queues/rx-0'
 do_mmap_pgoff include/linux/mm.h:2178 [inline]
 vm_mmap_pgoff+0x17a/0x1d0 mm/util.c:333
kobject: 'tx-0' (ffff888051ec9858): kobject_add_internal: parent: 'queues', set: 'queues'
 SYSC_mmap_pgoff mm/mmap.c:1551 [inline]
 SyS_mmap_pgoff+0xa3/0x520 mm/mmap.c:1509
kobject: 'tx-0' (ffff888051ec9858): kobject_uevent_env
kobject: 'tx-0' (ffff888051ec9858): fill_kobj_path: path = '/devices/virtual/net/vti5/queues/tx-0'
 SYSC_mmap arch/x86/kernel/sys_x86_64.c:100 [inline]
 SyS_mmap+0x16/0x20 arch/x86/kernel/sys_x86_64.c:91
 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292
kobject: 'tunl0' (ffff888094ca4c70): kobject_cleanup, parent           (null)
 entry_SYSCALL_64_after_hwframe+0x42/0xb7
RIP: 0033:0x459a59
kobject: 'tunl0' (ffff888094ca4c70): calling ktype release
RSP: 002b:00007f731b552c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000009
RAX: ffffffffffffffda RBX: 00007f731b552c90 RCX: 0000000000459a59
RDX: 0000000000000000 RSI: 0000000000004000 RDI: 0000000020ffc000
RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000
R10: 0000000000000031 R11: 0000000000000246 R12: 00007f731b5536d4
R13: 00000000004c6176 R14: 00000000004db240 R15: 0000000000000004
protocol 88fb is buggy, dev hsr_slave_0
protocol 88fb is buggy, dev hsr_slave_1
kobject: 'loop5' (ffff8880a4ac8960): kobject_uevent_env
kobject: 'loop5' (ffff8880a4ac8960): fill_kobj_path: path = '/devices/virtual/block/loop5'
kobject: 'loop4' (ffff8880a4a706e0): kobject_uevent_env
kobject: 'loop4' (ffff8880a4a706e0): fill_kobj_path: path = '/devices/virtual/block/loop4'
devpts: called with bogus options
kobject: 'loop5' (ffff8880a4ac8960): kobject_uevent_env
kobject: 'loop5' (ffff8880a4ac8960): fill_kobj_path: path = '/devices/virtual/block/loop5'
kobject: 'tunl0': free name
kobject: 'rx-0' (ffff8880a5f319d0): kobject_cleanup, parent ffff8880a0949648
kobject: 'rx-0' (ffff8880a5f319d0): auto cleanup 'remove' event
kobject: 'loop1' (ffff8880a496ce20): kobject_uevent_env
kobject: 'loop1' (ffff8880a496ce20): fill_kobj_path: path = '/devices/virtual/block/loop1'
kobject: 'loop5' (ffff8880a4ac8960): kobject_uevent_env
kobject: 'loop5' (ffff8880a4ac8960): fill_kobj_path: path = '/devices/virtual/block/loop5'
kobject: 'rx-0' (ffff8880a5f319d0): kobject_uevent_env
kobject: 'rx-0' (ffff8880a5f319d0): kobject_uevent_env: uevent_suppress caused the event to drop!
kobject: 'rx-0' (ffff8880a5f319d0): auto cleanup kobject_del
kobject: 'rx-0' (ffff8880a5f319d0): calling ktype release
kobject: 'rx-0': free name
kobject: 'loop1' (ffff8880a496ce20): kobject_uevent_env
kobject: 'loop1' (ffff8880a496ce20): fill_kobj_path: path = '/devices/virtual/block/loop1'
kobject: 'tx-0' (ffff8880a8e4a558): kobject_cleanup, parent ffff8880a0949648
kobject: 'tx-0' (ffff8880a8e4a558): auto cleanup 'remove' event
kobject: 'loop2' (ffff8880a49c5720): kobject_uevent_env
kobject: 'tx-0' (ffff8880a8e4a558): kobject_uevent_env
kobject: 'loop2' (ffff8880a49c5720): fill_kobj_path: path = '/devices/virtual/block/loop2'
kobject: 'tx-0' (ffff8880a8e4a558): kobject_uevent_env: uevent_suppress caused the event to drop!
kobject: 'loop1' (ffff8880a496ce20): kobject_uevent_env
kobject: 'tx-0' (ffff8880a8e4a558): auto cleanup kobject_del
kobject: 'loop1' (ffff8880a496ce20): fill_kobj_path: path = '/devices/virtual/block/loop1'
devpts: called with bogus options
kobject: 'tx-0' (ffff8880a8e4a558): calling ktype release
kobject: 'tx-0': free name
kobject: 'queues' (ffff8880a0949648): kobject_cleanup, parent           (null)
kobject: 'loop5' (ffff8880a4ac8960): kobject_uevent_env
kobject: 'queues' (ffff8880a0949648): calling ktype release
kobject: 'loop5' (ffff8880a4ac8960): fill_kobj_path: path = '/devices/virtual/block/loop5'
kobject: 'queues' (ffff8880a0949648): kset_release
kobject: 'loop4' (ffff8880a4a706e0): kobject_uevent_env
kobject: 'queues': free name
kobject: 'lo' (ffff888094a06670): kobject_uevent_env
kobject: 'loop4' (ffff8880a4a706e0): fill_kobj_path: path = '/devices/virtual/block/loop4'
kobject: 'lo' (ffff888094a06670): kobject_uevent_env: uevent_suppress caused the event to drop!
devpts: called with bogus options
kobject: 'lo' (ffff888094a06670): kobject_cleanup, parent           (null)
kobject: 'loop2' (ffff8880a49c5720): kobject_uevent_env
kobject: 'loop2' (ffff8880a49c5720): fill_kobj_path: path = '/devices/virtual/block/loop2'
kobject: 'lo' (ffff888094a06670): calling ktype release
kobject: 'lo': free name
kobject: 'loop5' (ffff8880a4ac8960): kobject_uevent_env
kobject: 'loop5' (ffff8880a4ac8960): fill_kobj_path: path = '/devices/virtual/block/loop5'
kobject: 'loop2' (ffff8880a49c5720): kobject_uevent_env
kobject: 'loop2' (ffff8880a49c5720): fill_kobj_path: path = '/devices/virtual/block/loop2'
kobject: 'loop4' (ffff8880a4a706e0): kobject_uevent_env
kobject: 'brif' (ffff888093eae980): kobject_cleanup, parent ffff888051285930
kobject: 'loop4' (ffff8880a4a706e0): fill_kobj_path: path = '/devices/virtual/block/loop4'
kobject: 'brif' (ffff888093eae980): auto cleanup kobject_del
devpts: called with bogus options
kobject: 'brif' (ffff888093eae980): calling ktype release
kobject: (ffff888093eae980): dynamic_kobj_release
kobject: 'brif': free name
kobject: 'batman_adv' (ffff888093eaed80): kobject_uevent_env
kobject: 'batman_adv' (ffff888093eaed80): kobject_uevent_env: filter function caused the event to drop!
kobject: 'batman_adv' (ffff888093eaed80): kobject_cleanup, parent           (null)
kobject: 'batman_adv' (ffff888093eaed80): calling ktype release
kobject: (ffff888093eaed80): dynamic_kobj_release
kobject: 'batman_adv': free name
kobject: 'rx-0' (ffff8880938bfb50): kobject_cleanup, parent ffff8880a0138548
kobject: 'rx-0' (ffff8880938bfb50): auto cleanup 'remove' event
kobject: 'rx-0' (ffff8880938bfb50): kobject_uevent_env
kobject: 'rx-0' (ffff8880938bfb50): fill_kobj_path: path = '/devices/virtual/net/��/queues/rx-0'
kobject: 'rx-0' (ffff8880938bfb50): auto cleanup kobject_del
kobject: 'rx-0' (ffff8880938bfb50): calling ktype release
kobject: 'rx-0': free name
kobject: 'tx-0' (ffff888057c48818): kobject_cleanup, parent ffff8880a0138548
kobject: 'tx-0' (ffff888057c48818): auto cleanup 'remove' event
kobject: 'tx-0' (ffff888057c48818): kobject_uevent_env
kobject: 'tx-0' (ffff888057c48818): fill_kobj_path: path = '/devices/virtual/net/��/queues/tx-0'
kobject: 'loop5' (ffff8880a4ac8960): kobject_uevent_env
kobject: 'loop5' (ffff8880a4ac8960): fill_kobj_path: path = '/devices/virtual/block/loop5'
kobject: 'tx-0' (ffff888057c48818): auto cleanup kobject_del