list_add double add: new=ffff8880600dc120, prev=ffffffff88024080, next=ffff8880600dc120. ------------[ cut here ]------------ kobject: 'loop0' (ffff8880a49b00e0): fill_kobj_path: path = '/devices/virtual/block/loop0' kernel BUG at lib/list_debug.c:29! invalid opcode: 0000 [#1] PREEMPT SMP KASAN Modules linked in: CPU: 1 PID: 6843 Comm: syz-executor.1 Not tainted 4.14.150 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 task: ffff888061018040 task.stack: ffff888061020000 RIP: 0010:__list_add_valid.cold+0x26/0x3c lib/list_debug.c:29 RSP: 0018:ffff888061027bf0 EFLAGS: 00010082 RAX: 0000000000000058 RBX: ffff8880600dc0c0 RCX: 0000000000000000 RDX: 0000000000000000 RSI: ffffffff866d10e0 RDI: ffffed100c204f74 RBP: ffff888061027c08 R08: 0000000000000058 R09: 0000000000000002 R10: 0000000000000000 R11: ffff888061018040 R12: ffff8880600dc120 R13: ffff8880600dc120 R14: ffff8880600dc120 R15: ffff88805d088080 FS: 0000000001b3e940(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000710158 CR3: 00000000617b5000 CR4: 00000000001406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: __list_add include/linux/list.h:60 [inline] list_add include/linux/list.h:79 [inline] __put_net+0x3f/0x100 net/core/net_namespace.c:530 put_net include/net/net_namespace.h:219 [inline] __sk_destruct+0x462/0x580 net/core/sock.c:1580 sk_destruct+0xa4/0xd0 net/core/sock.c:1596 __sk_free+0x54/0x230 net/core/sock.c:1604 sk_free+0x35/0x40 net/core/sock.c:1615 sock_put include/net/sock.h:1653 [inline] tcp_close+0xa20/0xfb0 net/ipv4/tcp.c:2304 inet_release+0xec/0x1c0 net/ipv4/af_inet.c:425 __sock_release+0xce/0x2b0 net/socket.c:602 sock_close+0x1b/0x30 net/socket.c:1139 __fput+0x275/0x7a0 fs/file_table.c:210 ____fput+0x16/0x20 fs/file_table.c:244 task_work_run+0x114/0x190 kernel/task_work.c:113 tracehook_notify_resume include/linux/tracehook.h:191 [inline] exit_to_usermode_loop+0x1da/0x220 arch/x86/entry/common.c:164 prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline] syscall_return_slowpath arch/x86/entry/common.c:270 [inline] do_syscall_64+0x4bc/0x640 arch/x86/entry/common.c:297 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x413ab0 RSP: 002b:00007fff50a3b7a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 RAX: 0000000000000000 RBX: 00007fff50a3b8b0 RCX: 0000000000413ab0 RDX: 00000000000000e0 RSI: 00007fff50a3bc90 RDI: 0000000000000003 RBP: 0000000000000003 R08: 0000000000006000 R09: 0000000000004000 R10: 00007fff50a3b8b0 R11: 0000000000000246 R12: 0000000000000000 R13: 00007fff50a3bf30 R14: 000000000002b21f R15: 00007fff50a3bf40 Code: e9 56 ff ff ff 4c 89 e1 48 c7 c7 20 33 9d 86 e8 bf c2 72 fe 0f 0b 48 89 f2 4c 89 e1 4c 89 ee 48 c7 c7 60 34 9d 86 e8 a8 c2 72 fe <0f> 0b 48 89 f1 48 c7 c7 e0 33 9d 86 4c 89 e6 e8 94 c2 72 fe 0f RIP: __list_add_valid.cold+0x26/0x3c lib/list_debug.c:29 RSP: ffff888061027bf0 ---[ end trace 8e80338264cea1c5 ]---