audit: type=1800 audit(1546723962.588:71): pid=17034 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor0" name="bus" dev="sda1" ino=17041 res=0
audit: type=1804 audit(1546723962.588:72): pid=17034 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir655153572/syzkaller.fWFGPV/140/bus" dev="sda1" ino=17041 res=1
======================================================
WARNING: possible circular locking dependency detected
4.20.0+ #11 Not tainted
------------------------------------------------------
syz-executor0/17034 is trying to acquire lock:
00000000ddf28c4e (fs_reclaim){+.+.}, at: fs_reclaim_acquire.part.0+0x0/0x30 mm/internal.h:79
but task is already holding lock:
00000000db203ae3 (delayed_uprobe_lock){+.+.}, at: update_ref_ctr+0x288/0x5a0 kernel/events/uprobes.c:445
which lock already depends on the new lock.
the existing dependency chain (in reverse order) is:
-> #1 (delayed_uprobe_lock){+.+.}:
__mutex_lock_common kernel/locking/mutex.c:925 [inline]
__mutex_lock+0x12f/0x1670 kernel/locking/mutex.c:1072
mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:1087
uprobe_clear_state+0xad/0x380 kernel/events/uprobes.c:1511
__mmput kernel/fork.c:1042 [inline]
mmput+0x1af/0x640 kernel/fork.c:1067
binder_alloc_free_page+0x597/0x1620 drivers/android/binder_alloc.c:984
__list_lru_walk_one+0x267/0x880 mm/list_lru.c:234
list_lru_walk_one+0xa3/0xe0 mm/list_lru.c:278
list_lru_walk_node+0x43/0x280 mm/list_lru.c:307
list_lru_walk include/linux/list_lru.h:214 [inline]
binder_shrink_scan+0x16d/0x210 drivers/android/binder_alloc.c:1020
do_shrink_slab+0x4e5/0xd30 mm/vmscan.c:561
shrink_slab mm/vmscan.c:710 [inline]
shrink_slab+0x6bb/0x8c0 mm/vmscan.c:690
shrink_node+0x61a/0x17e0 mm/vmscan.c:2757
shrink_zones mm/vmscan.c:2987 [inline]
do_try_to_free_pages+0x3e2/0x1290 mm/vmscan.c:3049
try_to_free_pages+0x4b9/0xb70 mm/vmscan.c:3265
__perform_reclaim mm/page_alloc.c:3920 [inline]
__alloc_pages_direct_reclaim mm/page_alloc.c:3942 [inline]
__alloc_pages_slowpath+0x9e0/0x2cc0 mm/page_alloc.c:4335
__alloc_pages_nodemask+0xa37/0xdc0 mm/page_alloc.c:4549
__alloc_pages include/linux/gfp.h:473 [inline]
__alloc_pages_node include/linux/gfp.h:486 [inline]
khugepaged_alloc_page+0x95/0x190 mm/khugepaged.c:773
collapse_huge_page+0x141/0x2240 mm/khugepaged.c:962
khugepaged_scan_pmd+0x165f/0x1f00 mm/khugepaged.c:1214
khugepaged_scan_mm_slot mm/khugepaged.c:1723 [inline]
khugepaged_do_scan mm/khugepaged.c:1804 [inline]
khugepaged+0xcfe/0x18a0 mm/khugepaged.c:1849
kthread+0x357/0x430 kernel/kthread.c:246
ret_from_fork+0x3a/0x50 arch/x86/entry/entry_64.S:352
-> #0 (fs_reclaim){+.+.}:
lock_acquire+0x1db/0x570 kernel/locking/lockdep.c:3841
__fs_reclaim_acquire mm/page_alloc.c:3877 [inline]
fs_reclaim_acquire.part.0+0x24/0x30 mm/page_alloc.c:3888
fs_reclaim_acquire+0x14/0x20 mm/page_alloc.c:3889
slab_pre_alloc_hook mm/slab.h:418 [inline]
slab_alloc mm/slab.c:3365 [inline]
kmem_cache_alloc_trace+0x2d/0x760 mm/slab.c:3605
kmalloc include/linux/slab.h:545 [inline]
kzalloc include/linux/slab.h:740 [inline]
delayed_uprobe_add kernel/events/uprobes.c:313 [inline]
update_ref_ctr+0x373/0x5a0 kernel/events/uprobes.c:447
uprobe_write_opcode+0xa23/0xcb0 kernel/events/uprobes.c:496
set_swbp+0x2b/0x40
install_breakpoint kernel/events/uprobes.c:885 [inline]
install_breakpoint.isra.0+0x162/0x860 kernel/events/uprobes.c:867
register_for_each_vma+0xaa2/0xef0 kernel/events/uprobes.c:1041
uprobe_apply+0xeb/0x140 kernel/events/uprobes.c:1192
uprobe_perf_open kernel/trace/trace_uprobe.c:1067 [inline]
trace_uprobe_register+0x9c9/0xcf0 kernel/trace/trace_uprobe.c:1207
perf_trace_event_open kernel/trace/trace_event_perf.c:181 [inline]
perf_trace_event_init kernel/trace/trace_event_perf.c:203 [inline]
perf_trace_event_init+0x1a5/0x990 kernel/trace/trace_event_perf.c:190
perf_uprobe_init+0x1db/0x290 kernel/trace/trace_event_perf.c:329
perf_uprobe_event_init+0x106/0x1a0 kernel/events/core.c:8503
perf_try_init_event+0x137/0x2f0 kernel/events/core.c:9770
perf_init_event kernel/events/core.c:9801 [inline]
perf_event_alloc.part.0+0x20bf/0x3520 kernel/events/core.c:10074
perf_event_alloc kernel/events/core.c:10430 [inline]
__do_sys_perf_event_open+0xbb5/0x2f00 kernel/events/core.c:10531
__se_sys_perf_event_open kernel/events/core.c:10420 [inline]
__x64_sys_perf_event_open+0xbe/0x150 kernel/events/core.c:10420
do_syscall_64+0x1a3/0x800 arch/x86/entry/common.c:290
entry_SYSCALL_64_after_hwframe+0x49/0xbe
other info that might help us debug this:
Possible unsafe locking scenario:
CPU0 CPU1
---- ----
lock(delayed_uprobe_lock);
lock(fs_reclaim);
lock(delayed_uprobe_lock);
lock(fs_reclaim);
*** DEADLOCK ***
7 locks held by syz-executor0/17034:
#0: 00000000264208d4 (&sig->cred_guard_mutex){+.+.}, at: __do_sys_perf_event_open+0x9c3/0x2f00 kernel/events/core.c:10511
#1: 00000000330dd4b9 (&pmus_srcu){....}, at: perf_event_alloc.part.0+0x10c1/0x3520 kernel/events/core.c:10070
#2: 0000000020b523b5 (event_mutex){+.+.}, at: perf_uprobe_init+0x1d0/0x290 kernel/trace/trace_event_perf.c:328
#3: 00000000a1be6cce (&uprobe->register_rwsem){+.+.}, at: uprobe_apply+0x4a/0x140 kernel/events/uprobes.c:1188
#4: 0000000021d0fe9b (&dup_mmap_sem){++++}, at: percpu_down_write+0x9a/0x540 kernel/locking/percpu-rwsem.c:145
#5: 00000000bc992431 (&mm->mmap_sem){++++}, at: register_for_each_vma+0x7d6/0xef0 kernel/events/uprobes.c:1027
#6: 00000000db203ae3 (delayed_uprobe_lock){+.+.}, at: update_ref_ctr+0x288/0x5a0 kernel/events/uprobes.c:445
stack backtrace:
CPU: 0 PID: 17034 Comm: syz-executor0 Not tainted 4.20.0+ #11
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:77 [inline]
dump_stack+0x1db/0x2d0 lib/dump_stack.c:113
print_circular_bug.isra.0.cold+0x1cc/0x28f kernel/locking/lockdep.c:1224
check_prev_add kernel/locking/lockdep.c:1866 [inline]
check_prevs_add kernel/locking/lockdep.c:1979 [inline]
validate_chain kernel/locking/lockdep.c:2350 [inline]
__lock_acquire+0x3014/0x4a30 kernel/locking/lockdep.c:3338
lock_acquire+0x1db/0x570 kernel/locking/lockdep.c:3841
__fs_reclaim_acquire mm/page_alloc.c:3877 [inline]
fs_reclaim_acquire.part.0+0x24/0x30 mm/page_alloc.c:3888
fs_reclaim_acquire+0x14/0x20 mm/page_alloc.c:3889
slab_pre_alloc_hook mm/slab.h:418 [inline]
slab_alloc mm/slab.c:3365 [inline]
kmem_cache_alloc_trace+0x2d/0x760 mm/slab.c:3605
kmalloc include/linux/slab.h:545 [inline]
kzalloc include/linux/slab.h:740 [inline]
delayed_uprobe_add kernel/events/uprobes.c:313 [inline]
update_ref_ctr+0x373/0x5a0 kernel/events/uprobes.c:447
uprobe_write_opcode+0xa23/0xcb0 kernel/events/uprobes.c:496
set_swbp+0x2b/0x40
install_breakpoint kernel/events/uprobes.c:885 [inline]
install_breakpoint.isra.0+0x162/0x860 kernel/events/uprobes.c:867
register_for_each_vma+0xaa2/0xef0 kernel/events/uprobes.c:1041
uprobe_apply+0xeb/0x140 kernel/events/uprobes.c:1192
uprobe_perf_open kernel/trace/trace_uprobe.c:1067 [inline]
trace_uprobe_register+0x9c9/0xcf0 kernel/trace/trace_uprobe.c:1207
perf_trace_event_open kernel/trace/trace_event_perf.c:181 [inline]
perf_trace_event_init kernel/trace/trace_event_perf.c:203 [inline]
perf_trace_event_init+0x1a5/0x990 kernel/trace/trace_event_perf.c:190
perf_uprobe_init+0x1db/0x290 kernel/trace/trace_event_perf.c:329
perf_uprobe_event_init+0x106/0x1a0 kernel/events/core.c:8503
perf_try_init_event+0x137/0x2f0 kernel/events/core.c:9770
perf_init_event kernel/events/core.c:9801 [inline]
perf_event_alloc.part.0+0x20bf/0x3520 kernel/events/core.c:10074
perf_event_alloc kernel/events/core.c:10430 [inline]
__do_sys_perf_event_open+0xbb5/0x2f00 kernel/events/core.c:10531
__se_sys_perf_event_open kernel/events/core.c:10420 [inline]
__x64_sys_perf_event_open+0xbe/0x150 kernel/events/core.c:10420
do_syscall_64+0x1a3/0x800 arch/x86/entry/common.c:290
entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x457ec9
Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00
RSP: 002b:00007fa71dbc3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012a
RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000457ec9
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180
RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000
R10: ffffffffffffffff R11: 0000000000000246 R12: 00007fa71dbc46d4
R13: 00000000004c43bf R14: 00000000004d7708 R15: 00000000ffffffff
kobject: 'loop5' (000000007dc0e32f): kobject_uevent_env
kobject: 'loop5' (000000007dc0e32f): fill_kobj_path: path = '/devices/virtual/block/loop5'
kobject: 'loop1' (0000000032e8128e): kobject_uevent_env
kobject: 'loop1' (0000000032e8128e): fill_kobj_path: path = '/devices/virtual/block/loop1'
kobject: 'loop2' (000000009ca7b820): kobject_uevent_env
kobject: 'loop2' (000000009ca7b820): fill_kobj_path: path = '/devices/virtual/block/loop2'
audit: type=1804 audit(1546723963.668:73): pid=17040 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir655153572/syzkaller.fWFGPV/140/bus" dev="sda1" ino=17041 res=1
kobject: 'loop4' (00000000e6213de2): kobject_uevent_env
kobject: 'loop4' (00000000e6213de2): fill_kobj_path: path = '/devices/virtual/block/loop4'
kobject: 'loop3' (0000000073fb5ab2): kobject_uevent_env
audit: type=1804 audit(1546723963.668:74): pid=17040 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir655153572/syzkaller.fWFGPV/140/bus" dev="sda1" ino=17041 res=1
kobject: 'loop3' (0000000073fb5ab2): fill_kobj_path: path = '/devices/virtual/block/loop3'
block nbd0: Receive control failed (result -22)
kobject: 'loop5' (000000007dc0e32f): kobject_uevent_env
kobject: 'loop5' (000000007dc0e32f): fill_kobj_path: path = '/devices/virtual/block/loop5'
kobject: 'nbd0' (000000005e8ae9fb): kobject_uevent_env
kobject: 'loop4' (00000000e6213de2): kobject_uevent_env
kobject: 'loop4' (00000000e6213de2): fill_kobj_path: path = '/devices/virtual/block/loop4'
kobject: 'loop1' (0000000032e8128e): kobject_uevent_env
kobject: 'nbd0' (000000005e8ae9fb): fill_kobj_path: path = '/devices/virtual/block/nbd0'
kobject: 'loop1' (0000000032e8128e): fill_kobj_path: path = '/devices/virtual/block/loop1'
kobject: 'loop3' (0000000073fb5ab2): kobject_uevent_env
kobject: 'loop3' (0000000073fb5ab2): fill_kobj_path: path = '/devices/virtual/block/loop3'
kobject: 'loop4' (00000000e6213de2): kobject_uevent_env
kobject: 'loop4' (00000000e6213de2): fill_kobj_path: path = '/devices/virtual/block/loop4'
kobject: 'loop0' (0000000064e6e564): kobject_uevent_env
audit: type=1804 audit(1546723964.148:76): pid=17091 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir655153572/syzkaller.fWFGPV/141/bus" dev="sda1" ino=17249 res=1
kobject: 'loop0' (0000000064e6e564): fill_kobj_path: path = '/devices/virtual/block/loop0'
audit: type=1800 audit(1546723964.138:75): pid=17089 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor0" name="bus" dev="sda1" ino=17249 res=0
kobject: 'loop1' (0000000032e8128e): kobject_uevent_env
kobject: 'loop1' (0000000032e8128e): fill_kobj_path: path = '/devices/virtual/block/loop1'
kobject: 'loop5' (000000007dc0e32f): kobject_uevent_env
kobject: 'loop5' (000000007dc0e32f): fill_kobj_path: path = '/devices/virtual/block/loop5'
kobject: 'loop4' (00000000e6213de2): kobject_uevent_env
kobject: 'loop4' (00000000e6213de2): fill_kobj_path: path = '/devices/virtual/block/loop4'
kobject: 'loop3' (0000000073fb5ab2): kobject_uevent_env
kobject: 'loop3' (0000000073fb5ab2): fill_kobj_path: path = '/devices/virtual/block/loop3'
kobject: 'loop0' (0000000064e6e564): kobject_uevent_env
kobject: 'loop0' (0000000064e6e564): fill_kobj_path: path = '/devices/virtual/block/loop0'
kobject: 'loop1' (0000000032e8128e): kobject_uevent_env
kobject: 'loop1' (0000000032e8128e): fill_kobj_path: path = '/devices/virtual/block/loop1'
block nbd0: shutting down sockets
kobject: 'loop2' (000000009ca7b820): kobject_uevent_env
audit: type=1800 audit(1546723964.678:77): pid=17112 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor0" name="bus" dev="sda1" ino=17169 res=0
kobject: 'loop2' (000000009ca7b820): fill_kobj_path: path = '/devices/virtual/block/loop2'
audit: type=1804 audit(1546723964.748:78): pid=17112 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir655153572/syzkaller.fWFGPV/142/bus" dev="sda1" ino=17169 res=1
kobject: 'loop4' (00000000e6213de2): kobject_uevent_env
kobject: 'loop4' (00000000e6213de2): fill_kobj_path: path = '/devices/virtual/block/loop4'
kobject: 'loop5' (000000007dc0e32f): kobject_uevent_env
kobject: 'loop5' (000000007dc0e32f): fill_kobj_path: path = '/devices/virtual/block/loop5'
kobject: 'loop3' (0000000073fb5ab2): kobject_uevent_env
kobject: 'loop3' (0000000073fb5ab2): fill_kobj_path: path = '/devices/virtual/block/loop3'
kobject: 'loop5' (000000007dc0e32f): kobject_uevent_env
audit: type=1800 audit(1546723964.998:79): pid=17132 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor1" name="bus" dev="sda1" ino=17036 res=0
kobject: 'loop5' (000000007dc0e32f): fill_kobj_path: path = '/devices/virtual/block/loop5'
kobject: 'loop1' (0000000032e8128e): kobject_uevent_env
kobject: 'loop1' (0000000032e8128e): fill_kobj_path: path = '/devices/virtual/block/loop1'
kobject: 'loop0' (0000000064e6e564): kobject_uevent_env
audit: type=1804 audit(1546723965.068:80): pid=17132 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir677149384/syzkaller.lTtzhN/313/bus" dev="sda1" ino=17036 res=1
kobject: 'loop0' (0000000064e6e564): fill_kobj_path: path = '/devices/virtual/block/loop0'
kobject: 'loop5' (000000007dc0e32f): kobject_uevent_env
kobject: 'loop5' (000000007dc0e32f): fill_kobj_path: path = '/devices/virtual/block/loop5'
kobject: 'loop3' (0000000073fb5ab2): kobject_uevent_env
kobject: 'loop3' (0000000073fb5ab2): fill_kobj_path: path = '/devices/virtual/block/loop3'
kobject: 'loop2' (000000009ca7b820): kobject_uevent_env
kobject: 'loop2' (000000009ca7b820): fill_kobj_path: path = '/devices/virtual/block/loop2'
kobject: 'loop5' (000000007dc0e32f): kobject_uevent_env
kobject: 'loop5' (000000007dc0e32f): fill_kobj_path: path = '/devices/virtual/block/loop5'
kobject: 'loop3' (0000000073fb5ab2): kobject_uevent_env
kobject: 'loop3' (0000000073fb5ab2): fill_kobj_path: path = '/devices/virtual/block/loop3'
kobject: 'loop0' (0000000064e6e564): kobject_uevent_env
netlink: 'syz-executor0': attribute type 5 has an invalid length.
kobject: 'loop0' (0000000064e6e564): fill_kobj_path: path = '/devices/virtual/block/loop0'
kobject: 'loop4' (00000000e6213de2): kobject_uevent_env
kobject: 'loop4' (00000000e6213de2): fill_kobj_path: path = '/devices/virtual/block/loop4'
kobject: 'loop5' (000000007dc0e32f): kobject_uevent_env
kobject: 'loop5' (000000007dc0e32f): fill_kobj_path: path = '/devices/virtual/block/loop5'
netlink: 'syz-executor0': attribute type 5 has an invalid length.
kobject: 'loop3' (0000000073fb5ab2): kobject_uevent_env
kobject: 'loop3' (0000000073fb5ab2): fill_kobj_path: path = '/devices/virtual/block/loop3'
netlink: 'syz-executor0': attribute type 5 has an invalid length.
kobject: 'loop2' (000000009ca7b820): kobject_uevent_env
kobject: 'loop2' (000000009ca7b820): fill_kobj_path: path = '/devices/virtual/block/loop2'
kobject: 'loop0' (0000000064e6e564): kobject_uevent_env
kobject: 'loop0' (0000000064e6e564): fill_kobj_path: path = '/devices/virtual/block/loop0'
kobject: 'loop4' (00000000e6213de2): kobject_uevent_env
kobject: 'loop4' (00000000e6213de2): fill_kobj_path: path = '/devices/virtual/block/loop4'
netlink: 'syz-executor0': attribute type 5 has an invalid length.
kobject: 'loop0' (0000000064e6e564): kobject_uevent_env
kobject: 'loop0' (0000000064e6e564): fill_kobj_path: path = '/devices/virtual/block/loop0'
netlink: 'syz-executor4': attribute type 5 has an invalid length.
kobject: 'loop1' (0000000032e8128e): kobject_uevent_env
kobject: 'loop1' (0000000032e8128e): fill_kobj_path: path = '/devices/virtual/block/loop1'
kobject: 'loop5' (000000007dc0e32f): kobject_uevent_env
kobject: 'loop5' (000000007dc0e32f): fill_kobj_path: path = '/devices/virtual/block/loop5'
netlink: 'syz-executor4': attribute type 5 has an invalid length.
kobject: 'loop4' (00000000e6213de2): kobject_uevent_env
kobject: 'loop4' (00000000e6213de2): fill_kobj_path: path = '/devices/virtual/block/loop4'
kobject: 'loop5' (000000007dc0e32f): kobject_uevent_env
kobject: 'loop3' (0000000073fb5ab2): kobject_uevent_env
kobject: 'loop5' (000000007dc0e32f): fill_kobj_path: path = '/devices/virtual/block/loop5'
kobject: 'loop3' (0000000073fb5ab2): fill_kobj_path: path = '/devices/virtual/block/loop3'
kobject: 'loop5' (000000007dc0e32f): kobject_uevent_env
kobject: 'loop5' (000000007dc0e32f): fill_kobj_path: path = '/devices/virtual/block/loop5'
netlink: 'syz-executor4': attribute type 5 has an invalid length.
kobject: 'loop3' (0000000073fb5ab2): kobject_uevent_env
kobject: 'loop3' (0000000073fb5ab2): fill_kobj_path: path = '/devices/virtual/block/loop3'
kobject: 'loop2' (000000009ca7b820): kobject_uevent_env
kobject: 'loop2' (000000009ca7b820): fill_kobj_path: path = '/devices/virtual/block/loop2'
kobject: 'loop1' (0000000032e8128e): kobject_uevent_env
kobject: 'loop1' (0000000032e8128e): fill_kobj_path: path = '/devices/virtual/block/loop1'
kobject: 'loop3' (0000000073fb5ab2): kobject_uevent_env
kobject: 'loop3' (0000000073fb5ab2): fill_kobj_path: path = '/devices/virtual/block/loop3'
kobject: 'loop5' (000000007dc0e32f): kobject_uevent_env
kobject: 'loop5' (000000007dc0e32f): fill_kobj_path: path = '/devices/virtual/block/loop5'
kobject: 'loop4' (00000000e6213de2): kobject_uevent_env
kobject: 'loop4' (00000000e6213de2): fill_kobj_path: path = '/devices/virtual/block/loop4'
kobject: 'loop3' (0000000073fb5ab2): kobject_uevent_env
kobject: 'loop3' (0000000073fb5ab2): fill_kobj_path: path = '/devices/virtual/block/loop3'
kobject: 'loop0' (0000000064e6e564): kobject_uevent_env
kobject: 'loop0' (0000000064e6e564): fill_kobj_path: path = '/devices/virtual/block/loop0'
kobject: 'loop4' (00000000e6213de2): kobject_uevent_env
kobject: 'loop4' (00000000e6213de2): fill_kobj_path: path = '/devices/virtual/block/loop4'
kobject: 'loop3' (0000000073fb5ab2): kobject_uevent_env
FAT-fs (loop5): error, invalid access to FAT (entry 0x00000900)
kobject: 'loop3' (0000000073fb5ab2): fill_kobj_path: path = '/devices/virtual/block/loop3'
FAT-fs (loop5): Filesystem has been set read-only
kobject: 'loop1' (0000000032e8128e): kobject_uevent_env
kobject: 'loop1' (0000000032e8128e): fill_kobj_path: path = '/devices/virtual/block/loop1'
FAT-fs (loop5): error, invalid access to FAT (entry 0x00000020)
kobject: 'loop5' (000000007dc0e32f): kobject_uevent_env
kobject: 'loop5' (000000007dc0e32f): fill_kobj_path: path = '/devices/virtual/block/loop5'
kobject: 'loop2' (000000009ca7b820): kobject_uevent_env
kobject: 'loop2' (000000009ca7b820): fill_kobj_path: path = '/devices/virtual/block/loop2'
kobject: 'loop5' (000000007dc0e32f): kobject_uevent_env
kobject: 'loop5' (000000007dc0e32f): fill_kobj_path: path = '/devices/virtual/block/loop5'
kauditd_printk_skb: 22 callbacks suppressed
audit: type=1804 audit(1546723967.708:103): pid=17255 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir416587791/syzkaller.rSQsRC/410/memory.events" dev="sda1" ino=16981 res=1
kobject: 'loop5' (000000007dc0e32f): kobject_uevent_env
kobject: 'loop5' (000000007dc0e32f): fill_kobj_path: path = '/devices/virtual/block/loop5'
kobject: 'loop0' (0000000064e6e564): kobject_uevent_env
kobject: 'loop0' (0000000064e6e564): fill_kobj_path: path = '/devices/virtual/block/loop0'
kobject: 'loop2' (000000009ca7b820): kobject_uevent_env
kobject: 'loop2' (000000009ca7b820): fill_kobj_path: path = '/devices/virtual/block/loop2'
audit: type=1804 audit(1546723968.208:104): pid=17283 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir655153572/syzkaller.fWFGPV/150/memory.events" dev="sda1" ino=17031 res=1
kobject: 'loop1' (0000000032e8128e): kobject_uevent_env
kobject: 'loop1' (0000000032e8128e): fill_kobj_path: path = '/devices/virtual/block/loop1'
kobject: 'loop1' (0000000032e8128e): kobject_uevent_env
kobject: 'loop1' (0000000032e8128e): fill_kobj_path: path = '/devices/virtual/block/loop1'
kobject: 'loop4' (00000000e6213de2): kobject_uevent_env
kobject: 'loop4' (00000000e6213de2): fill_kobj_path: path = '/devices/virtual/block/loop4'
kobject: 'loop0' (0000000064e6e564): kobject_uevent_env
kobject: 'loop0' (0000000064e6e564): fill_kobj_path: path = '/devices/virtual/block/loop0'
audit: type=1804 audit(1546723968.828:105): pid=17302 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir416587791/syzkaller.rSQsRC/411/memory.events" dev="sda1" ino=16753 res=1
kobject: 'loop2' (000000009ca7b820): kobject_uevent_env
kobject: 'loop2' (000000009ca7b820): fill_kobj_path: path = '/devices/virtual/block/loop2'
audit: type=1804 audit(1546723968.958:106): pid=17307 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir655153572/syzkaller.fWFGPV/151/memory.events" dev="sda1" ino=16676 res=1
kobject: 'loop5' (000000007dc0e32f): kobject_uevent_env
kobject: 'loop5' (000000007dc0e32f): fill_kobj_path: path = '/devices/virtual/block/loop5'
kobject: 'loop5' (000000007dc0e32f): kobject_uevent_env
kobject: 'loop5' (000000007dc0e32f): fill_kobj_path: path = '/devices/virtual/block/loop5'
kobject: 'loop5' (000000007dc0e32f): kobject_uevent_env
kobject: 'loop5' (000000007dc0e32f): fill_kobj_path: path = '/devices/virtual/block/loop5'
kobject: 'loop4' (00000000e6213de2): kobject_uevent_env
kobject: 'loop4' (00000000e6213de2): fill_kobj_path: path = '/devices/virtual/block/loop4'
kobject: 'loop3' (0000000073fb5ab2): kobject_uevent_env
kobject: 'loop3' (0000000073fb5ab2): fill_kobj_path: path = '/devices/virtual/block/loop3'
audit: type=1804 audit(1546723969.588:107): pid=17319 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir416587791/syzkaller.rSQsRC/412/memory.events" dev="sda1" ino=16753 res=1
kobject: 'loop2' (000000009ca7b820): kobject_uevent_env
kobject: 'loop2' (000000009ca7b820): fill_kobj_path: path = '/devices/virtual/block/loop2'
kobject: 'loop1' (0000000032e8128e): kobject_uevent_env
kobject: 'loop1' (0000000032e8128e): fill_kobj_path: path = '/devices/virtual/block/loop1'
kobject: 'loop0' (0000000064e6e564): kobject_uevent_env
kobject: 'loop0' (0000000064e6e564): fill_kobj_path: path = '/devices/virtual/block/loop0'
kobject: 'loop0' (0000000064e6e564): kobject_uevent_env
kobject: 'loop0' (0000000064e6e564): fill_kobj_path: path = '/devices/virtual/block/loop0'
kobject: 'loop2' (000000009ca7b820): kobject_uevent_env
kobject: 'loop2' (000000009ca7b820): fill_kobj_path: path = '/devices/virtual/block/loop2'
kobject: 'loop1' (0000000032e8128e): kobject_uevent_env
kobject: 'loop1' (0000000032e8128e): fill_kobj_path: path = '/devices/virtual/block/loop1'
kobject: 'loop5' (000000007dc0e32f): kobject_uevent_env
kobject: 'loop5' (000000007dc0e32f): fill_kobj_path: path = '/devices/virtual/block/loop5'
kobject: 'loop4' (00000000e6213de2): kobject_uevent_env
kobject: 'loop4' (00000000e6213de2): fill_kobj_path: path = '/devices/virtual/block/loop4'
kobject: 'loop5' (000000007dc0e32f): kobject_uevent_env
kobject: 'loop1' (0000000032e8128e): kobject_uevent_env
kobject: 'loop5' (000000007dc0e32f): fill_kobj_path: path = '/devices/virtual/block/loop5'
kobject: 'loop1' (0000000032e8128e): fill_kobj_path: path = '/devices/virtual/block/loop1'
kobject: 'loop3' (0000000073fb5ab2): kobject_uevent_env
kobject: 'loop3' (0000000073fb5ab2): fill_kobj_path: path = '/devices/virtual/block/loop3'
kobject: 'loop2' (000000009ca7b820): kobject_uevent_env
kobject: 'loop2' (000000009ca7b820): fill_kobj_path: path = '/devices/virtual/block/loop2'
kobject: 'loop5' (000000007dc0e32f): kobject_uevent_env
kobject: 'loop5' (000000007dc0e32f): fill_kobj_path: path = '/devices/virtual/block/loop5'
kobject: 'loop0' (0000000064e6e564): kobject_uevent_env
kobject: 'loop0' (0000000064e6e564): fill_kobj_path: path = '/devices/virtual/block/loop0'
kobject: 'loop5' (000000007dc0e32f): kobject_uevent_env
kobject: 'loop5' (000000007dc0e32f): fill_kobj_path: path = '/devices/virtual/block/loop5'
kobject: 'loop0' (0000000064e6e564): kobject_uevent_env
kobject: 'loop0' (0000000064e6e564): fill_kobj_path: path = '/devices/virtual/block/loop0'
kobject: 'loop5' (000000007dc0e32f): kobject_uevent_env
kobject: 'loop5' (000000007dc0e32f): fill_kobj_path: path = '/devices/virtual/block/loop5'
kobject: 'loop2' (000000009ca7b820): kobject_uevent_env
kobject: 'loop1' (0000000032e8128e): kobject_uevent_env
kobject: 'loop2' (000000009ca7b820): fill_kobj_path: path = '/devices/virtual/block/loop2'
kobject: 'loop1' (0000000032e8128e): fill_kobj_path: path = '/devices/virtual/block/loop1'
kobject: 'loop4' (00000000e6213de2): kobject_uevent_env
kobject: 'loop4' (00000000e6213de2): fill_kobj_path: path = '/devices/virtual/block/loop4'
kobject: 'loop1' (0000000032e8128e): kobject_uevent_env
kobject: 'loop1' (0000000032e8128e): fill_kobj_path: path = '/devices/virtual/block/loop1'
kobject: 'loop3' (0000000073fb5ab2): kobject_uevent_env
kobject: 'loop3' (0000000073fb5ab2): fill_kobj_path: path = '/devices/virtual/block/loop3'
kobject: 'loop2' (000000009ca7b820): kobject_uevent_env
kobject: 'loop2' (000000009ca7b820): fill_kobj_path: path = '/devices/virtual/block/loop2'
kobject: 'loop2' (000000009ca7b820): kobject_uevent_env
kobject: 'loop2' (000000009ca7b820): fill_kobj_path: path = '/devices/virtual/block/loop2'
kobject: 'loop5' (000000007dc0e32f): kobject_uevent_env
kobject: 'loop5' (000000007dc0e32f): fill_kobj_path: path = '/devices/virtual/block/loop5'
kobject: 'loop0' (0000000064e6e564): kobject_uevent_env
kobject: 'loop0' (0000000064e6e564): fill_kobj_path: path = '/devices/virtual/block/loop0'