====================================================== WARNING: possible circular locking dependency detected 4.14.154 #0 Not tainted ------------------------------------------------------ protocol 88fb is buggy, dev hsr_slave_0 syz-executor.4/18798 is trying to acquire lock: (&rp->fetch_lock){+.+.}, at: [] mon_bin_vma_fault+0x6f/0x280 drivers/usb/mon/mon_bin.c:1236 protocol 88fb is buggy, dev hsr_slave_1 but task is already holding lock: (&mm->mmap_sem){++++}, at: [] __mm_populate+0x1e5/0x2c0 mm/gup.c:1259 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #1 (&mm->mmap_sem){++++}: lock_acquire+0x16f/0x430 kernel/locking/lockdep.c:3994 __might_fault mm/memory.c:4584 [inline] __might_fault+0x143/0x1d0 mm/memory.c:4569 _copy_to_user+0x2c/0xd0 lib/usercopy.c:25 copy_to_user include/linux/uaccess.h:155 [inline] mon_bin_get_event+0x10a/0x430 drivers/usb/mon/mon_bin.c:756 mon_bin_ioctl+0x9b4/0xb50 drivers/usb/mon/mon_bin.c:1067 vfs_ioctl fs/ioctl.c:46 [inline] file_ioctl fs/ioctl.c:500 [inline] do_vfs_ioctl+0x7ae/0x1060 fs/ioctl.c:684 SYSC_ioctl fs/ioctl.c:701 [inline] SyS_ioctl+0x8f/0xc0 fs/ioctl.c:692 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 -> #0 (&rp->fetch_lock){+.+.}: check_prev_add kernel/locking/lockdep.c:1901 [inline] check_prevs_add kernel/locking/lockdep.c:2018 [inline] validate_chain kernel/locking/lockdep.c:2460 [inline] __lock_acquire+0x2cb3/0x4620 kernel/locking/lockdep.c:3487 lock_acquire+0x16f/0x430 kernel/locking/lockdep.c:3994 __mutex_lock_common kernel/locking/mutex.c:756 [inline] __mutex_lock+0xe8/0x1470 kernel/locking/mutex.c:893 mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:908 mon_bin_vma_fault+0x6f/0x280 drivers/usb/mon/mon_bin.c:1236 __do_fault+0x104/0x390 mm/memory.c:3223 do_cow_fault mm/memory.c:3662 [inline] do_fault mm/memory.c:3761 [inline] handle_pte_fault mm/memory.c:3989 [inline] __handle_mm_fault+0xde1/0x3470 mm/memory.c:4113 handle_mm_fault+0x293/0x7c0 mm/memory.c:4150 faultin_page mm/gup.c:514 [inline] __get_user_pages+0x465/0x1220 mm/gup.c:714 populate_vma_page_range+0x18e/0x230 mm/gup.c:1231 __mm_populate+0x198/0x2c0 mm/gup.c:1279 protocol 88fb is buggy, dev hsr_slave_0 mm_populate include/linux/mm.h:2182 [inline] vm_mmap_pgoff+0x1be/0x1d0 mm/util.c:338 SYSC_mmap_pgoff mm/mmap.c:1551 [inline] SyS_mmap_pgoff+0x3ca/0x520 mm/mmap.c:1509 protocol 88fb is buggy, dev hsr_slave_1 SYSC_mmap arch/x86/kernel/sys_x86_64.c:100 [inline] SyS_mmap+0x16/0x20 arch/x86/kernel/sys_x86_64.c:91 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 other info that might help us debug this: Possible unsafe locking scenario: CPU0 CPU1 ---- ---- lock(&mm->mmap_sem); lock(&rp->fetch_lock); lock(&mm->mmap_sem); lock(&rp->fetch_lock); *** DEADLOCK *** 1 lock held by syz-executor.4/18798: #0: (&mm->mmap_sem){++++}, at: [] __mm_populate+0x1e5/0x2c0 mm/gup.c:1259 stack backtrace: CPU: 0 PID: 18798 Comm: syz-executor.4 Not tainted 4.14.154 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x142/0x197 lib/dump_stack.c:58 print_circular_bug.isra.0.cold+0x1cc/0x28f kernel/locking/lockdep.c:1258 check_prev_add kernel/locking/lockdep.c:1901 [inline] check_prevs_add kernel/locking/lockdep.c:2018 [inline] validate_chain kernel/locking/lockdep.c:2460 [inline] __lock_acquire+0x2cb3/0x4620 kernel/locking/lockdep.c:3487 lock_acquire+0x16f/0x430 kernel/locking/lockdep.c:3994 __mutex_lock_common kernel/locking/mutex.c:756 [inline] __mutex_lock+0xe8/0x1470 kernel/locking/mutex.c:893 mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:908 mon_bin_vma_fault+0x6f/0x280 drivers/usb/mon/mon_bin.c:1236 __do_fault+0x104/0x390 mm/memory.c:3223 do_cow_fault mm/memory.c:3662 [inline] do_fault mm/memory.c:3761 [inline] handle_pte_fault mm/memory.c:3989 [inline] __handle_mm_fault+0xde1/0x3470 mm/memory.c:4113 handle_mm_fault+0x293/0x7c0 mm/memory.c:4150 faultin_page mm/gup.c:514 [inline] __get_user_pages+0x465/0x1220 mm/gup.c:714 populate_vma_page_range+0x18e/0x230 mm/gup.c:1231 __mm_populate+0x198/0x2c0 mm/gup.c:1279 mm_populate include/linux/mm.h:2182 [inline] vm_mmap_pgoff+0x1be/0x1d0 mm/util.c:338 SYSC_mmap_pgoff mm/mmap.c:1551 [inline] SyS_mmap_pgoff+0x3ca/0x520 mm/mmap.c:1509 SYSC_mmap arch/x86/kernel/sys_x86_64.c:100 [inline] SyS_mmap+0x16/0x20 arch/x86/kernel/sys_x86_64.c:91 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x45a639 RSP: 002b:00007f761b619c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 000000000045a639 RDX: 0000000000000006 RSI: 0000000000004000 RDI: 0000000020ffb000 RBP: 000000000075bf20 R08: 0000000000000003 R09: 0000000000000000 R10: 0000000000008012 R11: 0000000000000246 R12: 00007f761b61a6d4 R13: 00000000004c705c R14: 00000000004dc7f8 R15: 00000000ffffffff protocol 88fb is buggy, dev hsr_slave_0 protocol 88fb is buggy, dev hsr_slave_0 protocol 88fb is buggy, dev hsr_slave_1 protocol 88fb is buggy, dev hsr_slave_1 kobject: 'loop0' (ffff88809d202460): kobject_uevent_env kobject: 'loop0' (ffff88809d202460): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop2' (ffff8880a49d72a0): kobject_uevent_env kobject: 'loop2' (ffff8880a49d72a0): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'kvm' (ffff8880a71f4110): kobject_uevent_env kobject: 'kvm' (ffff8880a71f4110): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'kvm' (ffff8880a71f4110): kobject_uevent_env kobject: 'kvm' (ffff8880a71f4110): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'kvm' (ffff8880a71f4110): kobject_uevent_env kobject: 'loop5' (ffff8880a4ab82e0): kobject_uevent_env kobject: 'kvm' (ffff8880a71f4110): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'kvm' (ffff8880a71f4110): kobject_uevent_env kobject: 'loop5' (ffff8880a4ab82e0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'kvm' (ffff8880a71f4110): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop2' (ffff8880a49d72a0): kobject_uevent_env kobject: 'loop2' (ffff8880a49d72a0): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop5' (ffff8880a4ab82e0): kobject_uevent_env kobject: 'loop5' (ffff8880a4ab82e0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop4' (ffff8880a4a5a260): kobject_uevent_env kobject: 'loop4' (ffff8880a4a5a260): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop5' (ffff8880a4ab82e0): kobject_uevent_env kobject: 'loop5' (ffff8880a4ab82e0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'kvm' (ffff8880a71f4110): kobject_uevent_env kobject: 'kvm' (ffff8880a71f4110): fill_kobj_path: path = '/devices/virtual/misc/kvm' Unknown ioctl 1074025684 kobject: 'loop5' (ffff8880a4ab82e0): kobject_uevent_env kobject: 'loop5' (ffff8880a4ab82e0): fill_kobj_path: path = '/devices/virtual/block/loop5' kauditd_printk_skb: 4 callbacks suppressed audit: type=1800 audit(1574272349.170:3837): pid=18864 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="file0" dev="sda1" ino=17291 res=0 kobject: '9p-28' (ffff888057902950): kobject_add_internal: parent: 'bdi', set: 'devices' kobject: '9p-28' (ffff888057902950): kobject_uevent_env audit: type=1804 audit(1574272349.170:3838): pid=18864 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir258605995/syzkaller.uW9ooq/255/file0/file0" dev="sda1" ino=17291 res=1 kobject: 'kvm' (ffff8880a71f4110): kobject_uevent_env kobject: 'kvm' (ffff8880a71f4110): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: '9p-28' (ffff888057902950): fill_kobj_path: path = '/devices/virtual/bdi/9p-28' audit: type=1804 audit(1574272349.220:3839): pid=18865 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir258605995/syzkaller.uW9ooq/255/file0/file0" dev="sda1" ino=17291 res=1 Unknown ioctl 1074025684 kobject: 'kvm' (ffff8880a71f4110): kobject_uevent_env kobject: 'kvm' (ffff8880a71f4110): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop0' (ffff88809d202460): kobject_uevent_env kobject: '9p-29' (ffff8880435e6dd0): kobject_add_internal: parent: 'bdi', set: 'devices' kobject: 'kvm' (ffff8880a71f4110): kobject_uevent_env kobject: 'loop0' (ffff88809d202460): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'kvm' (ffff8880a71f4110): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: '9p-29' (ffff8880435e6dd0): kobject_uevent_env kobject: 'loop5' (ffff8880a4ab82e0): kobject_uevent_env kobject: '9p-29' (ffff8880435e6dd0): fill_kobj_path: path = '/devices/virtual/bdi/9p-29' kobject: 'loop5' (ffff8880a4ab82e0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: '9p-29' (ffff8880435e6dd0): kobject_uevent_env kobject: '9p-29' (ffff8880435e6dd0): fill_kobj_path: path = '/devices/virtual/bdi/9p-29' kobject: '9p-29' (ffff8880435e6dd0): kobject_cleanup, parent (null) netlink: 188 bytes leftover after parsing attributes in process `syz-executor.0'. kobject: 'loop2' (ffff8880a49d72a0): kobject_uevent_env kobject: '9p-29' (ffff8880435e6dd0): calling ktype release netlink: 44 bytes leftover after parsing attributes in process `syz-executor.0'. kobject: '9p-29': free name kobject: 'loop2' (ffff8880a49d72a0): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop5' (ffff8880a4ab82e0): kobject_uevent_env kobject: 'loop5' (ffff8880a4ab82e0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'kvm' (ffff8880a71f4110): kobject_uevent_env kobject: 'kvm' (ffff8880a71f4110): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop5' (ffff8880a4ab82e0): kobject_uevent_env kobject: 'loop5' (ffff8880a4ab82e0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'kvm' (ffff8880a71f4110): kobject_uevent_env kobject: 'kvm' (ffff8880a71f4110): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop4' (ffff8880a4a5a260): kobject_uevent_env kobject: 'loop4' (ffff8880a4a5a260): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop5' (ffff8880a4ab82e0): kobject_uevent_env kobject: 'loop5' (ffff8880a4ab82e0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop5' (ffff8880a4ab82e0): kobject_uevent_env kobject: 'loop5' (ffff8880a4ab82e0): fill_kobj_path: path = '/devices/virtual/block/loop5' audit: type=1800 audit(1574272350.100:3840): pid=18912 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="file0" dev="sda1" ino=16723 res=0 audit: type=1804 audit(1574272350.110:3841): pid=18912 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir258605995/syzkaller.uW9ooq/256/file0/file0" dev="sda1" ino=16723 res=1 audit: type=1804 audit(1574272350.180:3842): pid=18913 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir258605995/syzkaller.uW9ooq/256/file0/file0" dev="sda1" ino=16723 res=1 kobject: 'kvm' (ffff8880a71f4110): kobject_uevent_env kobject: 'kvm' (ffff8880a71f4110): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'kvm' (ffff8880a71f4110): kobject_uevent_env kobject: 'kvm' (ffff8880a71f4110): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop2' (ffff8880a49d72a0): kobject_uevent_env kobject: 'loop2' (ffff8880a49d72a0): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop0' (ffff88809d202460): kobject_uevent_env kobject: 'loop0' (ffff88809d202460): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop4' (ffff8880a4a5a260): kobject_uevent_env kobject: 'loop4' (ffff8880a4a5a260): fill_kobj_path: path = '/devices/virtual/block/loop4' net_ratelimit: 16 callbacks suppressed protocol 88fb is buggy, dev hsr_slave_0 protocol 88fb is buggy, dev hsr_slave_1 kobject: 'loop2' (ffff8880a49d72a0): kobject_uevent_env kobject: '9p-28' (ffff888057902950): kobject_uevent_env kobject: 'loop2' (ffff8880a49d72a0): fill_kobj_path: path = '/devices/virtual/block/loop2' protocol 88fb is buggy, dev hsr_slave_0 protocol 88fb is buggy, dev hsr_slave_1 kobject: '9p-28' (ffff888057902950): fill_kobj_path: path = '/devices/virtual/bdi/9p-28' kobject: 'loop5' (ffff8880a4ab82e0): kobject_uevent_env kobject: '9p-28' (ffff888057902950): kobject_cleanup, parent (null) kobject: 'loop5' (ffff8880a4ab82e0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: '9p-28' (ffff888057902950): calling ktype release audit: type=1800 audit(1574272352.310:3843): pid=18946 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="file0" dev="sda1" ino=17315 res=0 kobject: 'veth354' (ffff888093ba2870): kobject_add_internal: parent: 'net', set: 'devices' kobject: '9p-28': free name selinux_nlmsg_perm: 24 callbacks suppressed SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=18933 comm=syz-executor.0 audit: type=1804 audit(1574272352.320:3844): pid=18946 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir258605995/syzkaller.uW9ooq/257/file0/file0" dev="sda1" ino=17315 res=1 protocol 88fb is buggy, dev hsr_slave_0 protocol 88fb is buggy, dev hsr_slave_0 protocol 88fb is buggy, dev hsr_slave_1 protocol 88fb is buggy, dev hsr_slave_1 kobject: 'loop2' (ffff8880a49d72a0): kobject_uevent_env kobject: 'loop2' (ffff8880a49d72a0): fill_kobj_path: path = '/devices/virtual/block/loop2' audit: type=1804 audit(1574272352.420:3845): pid=18949 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir258605995/syzkaller.uW9ooq/257/file0/file0" dev="sda1" ino=17315 res=1 kobject: 'veth354' (ffff888093ba2870): kobject_uevent_env kobject: 'veth354' (ffff888093ba2870): fill_kobj_path: path = '/devices/virtual/net/veth354' kobject: 'queues' (ffff8880a0d54648): kobject_add_internal: parent: 'veth354', set: '' kobject: 'kvm' (ffff8880a71f4110): kobject_uevent_env kobject: 'queues' (ffff8880a0d54648): kobject_uevent_env kobject: 'kvm' (ffff8880a71f4110): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'queues' (ffff8880a0d54648): kobject_uevent_env: filter function caused the event to drop! kobject: 'rx-0' (ffff8880814d2cd0): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'rx-0' (ffff8880814d2cd0): kobject_uevent_env kobject: 'rx-0' (ffff8880814d2cd0): fill_kobj_path: path = '/devices/virtual/net/veth354/queues/rx-0' kobject: 'tx-0' (ffff888089c70598): kobject_add_internal: parent: 'queues', set: 'queues' protocol 88fb is buggy, dev hsr_slave_0 protocol 88fb is buggy, dev hsr_slave_1 kobject: 'tx-0' (ffff888089c70598): kobject_uevent_env kobject: 'tx-0' (ffff888089c70598): fill_kobj_path: path = '/devices/virtual/net/veth354/queues/tx-0' kobject: 'batman_adv' (ffff88808eb64880): kobject_add_internal: parent: 'veth354', set: '' kobject: 'veth355' (ffff888057f1a7b0): kobject_add_internal: parent: 'net', set: 'devices' kobject: 'veth355' (ffff888057f1a7b0): kobject_uevent_env kobject: 'veth355' (ffff888057f1a7b0): fill_kobj_path: path = '/devices/virtual/net/veth355' kobject: 'queues' (ffff8880a8e34348): kobject_add_internal: parent: 'veth355', set: '' kobject: 'queues' (ffff8880a8e34348): kobject_uevent_env kobject: 'queues' (ffff8880a8e34348): kobject_uevent_env: filter function caused the event to drop! kobject: 'rx-0' (ffff8880a0532190): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'rx-0' (ffff8880a0532190): kobject_uevent_env kobject: 'rx-0' (ffff8880a0532190): fill_kobj_path: path = '/devices/virtual/net/veth355/queues/rx-0' kobject: 'tx-0' (ffff8880968e4d58): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'tx-0' (ffff8880968e4d58): kobject_uevent_env kobject: 'tx-0' (ffff8880968e4d58): fill_kobj_path: path = '/devices/virtual/net/veth355/queues/tx-0' kobject: 'batman_adv' (ffff88808eae4200): kobject_add_internal: parent: 'veth355', set: '' netlink: 44 bytes leftover after parsing attributes in process `syz-executor.0'. kobject: 'loop5' (ffff8880a4ab82e0): kobject_uevent_env SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=18933 comm=syz-executor.0 kobject: 'loop5' (ffff8880a4ab82e0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop4' (ffff8880a4a5a260): kobject_uevent_env SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=18933 comm=syz-executor.0 kobject: 'loop4' (ffff8880a4a5a260): fill_kobj_path: path = '/devices/virtual/block/loop4' SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=18933 comm=syz-executor.0 kobject: 'kvm' (ffff8880a71f4110): kobject_uevent_env kobject: 'kvm' (ffff8880a71f4110): fill_kobj_path: path = '/devices/virtual/misc/kvm' SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=18933 comm=syz-executor.0 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=18933 comm=syz-executor.0 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=18933 comm=syz-executor.0 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=18933 comm=syz-executor.0 base_sock_release(ffff88805845d640) sk=ffff88808c41b400 kobject: 'loop0' (ffff88809d202460): kobject_uevent_env kobject: 'loop0' (ffff88809d202460): fill_kobj_path: path = '/devices/virtual/block/loop0' audit: type=1800 audit(1574272353.230:3846): pid=18986 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="file0" dev="sda1" ino=17282 res=0 kobject: 'loop5' (ffff8880a4ab82e0): kobject_uevent_env kobject: 'loop5' (ffff8880a4ab82e0): fill_kobj_path: path = '/devices/virtual/block/loop5' base_sock_release(ffff8880421c09c0) sk=ffff88801308e440 kobject: 'loop5' (ffff8880a4ab82e0): kobject_uevent_env kobject: 'loop5' (ffff8880a4ab82e0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'veth356' (ffff88808929c7f0): kobject_add_internal: parent: 'net', set: 'devices' kobject: 'veth356' (ffff88808929c7f0): kobject_uevent_env kobject: 'veth356' (ffff88808929c7f0): fill_kobj_path: path = '/devices/virtual/net/veth356' kobject: 'queues' (ffff88808e409348): kobject_add_internal: parent: 'veth356', set: '' kobject: 'queues' (ffff88808e409348): kobject_uevent_env SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=18992 comm=syz-executor.0 kobject: 'queues' (ffff88808e409348): kobject_uevent_env: filter function caused the event to drop! SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=18992 comm=syz-executor.0 kobject: 'rx-0' (ffff8880a4c12c10): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'rx-0' (ffff8880a4c12c10): kobject_uevent_env kobject: 'rx-0' (ffff8880a4c12c10): fill_kobj_path: path = '/devices/virtual/net/veth356/queues/rx-0' kobject: 'tx-0' (ffff8880986ad358): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'tx-0' (ffff8880986ad358): kobject_uevent_env kobject: 'tx-0' (ffff8880986ad358): fill_kobj_path: path = '/devices/virtual/net/veth356/queues/tx-0' kobject: 'batman_adv' (ffff88804e305180): kobject_add_internal: parent: 'veth356', set: '' kobject: 'veth357' (ffff8880598b4db0): kobject_add_internal: parent: 'net', set: 'devices' kobject: 'veth357' (ffff8880598b4db0): kobject_uevent_env kobject: 'veth357' (ffff8880598b4db0): fill_kobj_path: path = '/devices/virtual/net/veth357' kobject: 'queues' (ffff8880a0bb7c48): kobject_add_internal: parent: 'veth357', set: '' kobject: 'queues' (ffff8880a0bb7c48): kobject_uevent_env kobject: 'queues' (ffff8880a0bb7c48): kobject_uevent_env: filter function caused the event to drop! kobject: 'rx-0' (ffff8880a5cc7a90): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'rx-0' (ffff8880a5cc7a90): kobject_uevent_env kobject: 'rx-0' (ffff8880a5cc7a90): fill_kobj_path: path = '/devices/virtual/net/veth357/queues/rx-0' kobject: 'tx-0' (ffff888037922298): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'tx-0' (ffff888037922298): kobject_uevent_env kobject: 'tx-0' (ffff888037922298): fill_kobj_path: path = '/devices/virtual/net/veth357/queues/tx-0' kobject: 'batman_adv' (ffff88808fbd9f80): kobject_add_internal: parent: 'veth357', set: '' kobject: 'loop4' (ffff8880a4a5a260): kobject_uevent_env kobject: 'loop4' (ffff8880a4a5a260): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop0' (ffff88809d202460): kobject_uevent_env kobject: 'loop0' (ffff88809d202460): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop2' (ffff8880a49d72a0): kobject_uevent_env kobject: 'loop2' (ffff8880a49d72a0): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop5' (ffff8880a4ab82e0): kobject_uevent_env kobject: 'loop5' (ffff8880a4ab82e0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'veth358' (ffff888086890ab0): kobject_add_internal: parent: 'net', set: 'devices' kobject: 'veth358' (ffff888086890ab0): kobject_uevent_env kobject: 'veth358' (ffff888086890ab0): fill_kobj_path: path = '/devices/virtual/net/veth358' kauditd_printk_skb: 2 callbacks suppressed audit: type=1800 audit(1574272355.830:3849): pid=19040 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="file0" dev="sda1" ino=17337 res=0 kobject: 'queues' (ffff8880a4c41c48): kobject_add_internal: parent: 'veth358', set: '' audit: type=1804 audit(1574272355.830:3850): pid=19040 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir258605995/syzkaller.uW9ooq/259/file0/file0" dev="sda1" ino=17337 res=1 kobject: 'queues' (ffff8880a4c41c48): kobject_uevent_env kobject: 'queues' (ffff8880a4c41c48): kobject_uevent_env: filter function caused the event to drop! kobject: 'rx-0' (ffff888099ae9490): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'rx-0' (ffff888099ae9490): kobject_uevent_env kobject: 'rx-0' (ffff888099ae9490): fill_kobj_path: path = '/devices/virtual/net/veth358/queues/rx-0' audit: type=1804 audit(1574272355.950:3851): pid=19046 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir258605995/syzkaller.uW9ooq/259/file0/file0" dev="sda1" ino=17337 res=1 kobject: 'tx-0' (ffff8880a95d2518): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'tx-0' (ffff8880a95d2518): kobject_uevent_env kobject: 'tx-0' (ffff8880a95d2518): fill_kobj_path: path = '/devices/virtual/net/veth358/queues/tx-0' kobject: 'batman_adv' (ffff88809f82ad00): kobject_add_internal: parent: 'veth358', set: '' kobject: 'veth359' (ffff8880a9574a70): kobject_add_internal: parent: 'net', set: 'devices' kobject: 'veth359' (ffff8880a9574a70): kobject_uevent_env kobject: 'veth359' (ffff8880a9574a70): fill_kobj_path: path = '/devices/virtual/net/veth359' kobject: 'queues' (ffff8880871b0c48): kobject_add_internal: parent: 'veth359', set: '' kobject: 'queues' (ffff8880871b0c48): kobject_uevent_env kobject: 'queues' (ffff8880871b0c48): kobject_uevent_env: filter function caused the event to drop! kobject: 'rx-0' (ffff88808c55c6d0): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'rx-0' (ffff88808c55c6d0): kobject_uevent_env kobject: 'rx-0' (ffff88808c55c6d0): fill_kobj_path: path = '/devices/virtual/net/veth359/queues/rx-0' kobject: 'tx-0' (ffff8880583f8058): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'tx-0' (ffff8880583f8058): kobject_uevent_env kobject: 'tx-0' (ffff8880583f8058): fill_kobj_path: path = '/devices/virtual/net/veth359/queues/tx-0' kobject: 'batman_adv' (ffff88808d2d8e00): kobject_add_internal: parent: 'veth359', set: '' kobject: 'loop5' (ffff8880a4ab82e0): kobject_uevent_env kobject: 'loop5' (ffff8880a4ab82e0): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop4' (ffff8880a4a5a260): kobject_uevent_env kobject: 'loop4' (ffff8880a4a5a260): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop0' (ffff88809d202460): kobject_uevent_env kobject: 'loop0' (ffff88809d202460): fill_kobj_path: path = '/devices/virtual/block/loop0' net_ratelimit: 23 callbacks suppressed protocol 88fb is buggy, dev hsr_slave_0 protocol 88fb is buggy, dev hsr_slave_1