Node 0 DMA free:15908kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB ====================================================== WARNING: possible circular locking dependency detected 4.19.85-syzkaller #0 Not tainted ------------------------------------------------------ syz-executor.2/16024 is trying to acquire lock: 00000000acf7ca06 (&mm->mmap_sem){++++}, at: __might_fault+0xfb/0x1e0 mm/memory.c:4637 but task is already holding lock: 000000006dc05c78 (&rp->fetch_lock){+.+.}, at: mon_bin_read+0x60/0x640 drivers/usb/mon/mon_bin.c:813 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #1 (&rp->fetch_lock){+.+.}: __mutex_lock_common kernel/locking/mutex.c:925 [inline] __mutex_lock+0xf7/0x1300 kernel/locking/mutex.c:1072 mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:1087 mon_bin_vma_fault+0x73/0x2d0 drivers/usb/mon/mon_bin.c:1237 __do_fault+0x111/0x480 mm/memory.c:3269 do_cow_fault mm/memory.c:3710 [inline] do_fault mm/memory.c:3812 [inline] handle_pte_fault mm/memory.c:4041 [inline] __handle_mm_fault+0xf6d/0x3f80 mm/memory.c:4165 handle_mm_fault+0x1b5/0x690 mm/memory.c:4202 faultin_page mm/gup.c:530 [inline] __get_user_pages+0x609/0x17a0 mm/gup.c:730 populate_vma_page_range+0x20d/0x2a0 mm/gup.c:1234 __mm_populate+0x204/0x380 mm/gup.c:1282 mm_populate include/linux/mm.h:2323 [inline] vm_mmap_pgoff+0x213/0x230 mm/util.c:362 ksys_mmap_pgoff+0x4aa/0x630 mm/mmap.c:1586 __do_sys_mmap arch/x86/kernel/sys_x86_64.c:100 [inline] __se_sys_mmap arch/x86/kernel/sys_x86_64.c:91 [inline] __x64_sys_mmap+0xe9/0x1b0 arch/x86/kernel/sys_x86_64.c:91 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe -> #0 (&mm->mmap_sem){++++}: lock_acquire+0x16f/0x3f0 kernel/locking/lockdep.c:3903 __might_fault mm/memory.c:4638 [inline] __might_fault+0x15e/0x1e0 mm/memory.c:4623 _copy_to_user+0x30/0x120 lib/usercopy.c:25 copy_to_user include/linux/uaccess.h:155 [inline] mon_bin_read+0x329/0x640 drivers/usb/mon/mon_bin.c:825 do_loop_readv_writev fs/read_write.c:701 [inline] do_loop_readv_writev fs/read_write.c:688 [inline] do_iter_read+0x490/0x640 fs/read_write.c:925 vfs_readv+0xf0/0x160 fs/read_write.c:987 do_preadv+0x1c4/0x280 fs/read_write.c:1071 __do_sys_preadv fs/read_write.c:1121 [inline] __se_sys_preadv fs/read_write.c:1116 [inline] __x64_sys_preadv+0x9a/0xf0 fs/read_write.c:1116 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe other info that might help us debug this: Possible unsafe locking scenario: CPU0 CPU1 ---- ---- lock(&rp->fetch_lock); lock(&mm->mmap_sem); lock(&rp->fetch_lock); lock(&mm->mmap_sem); *** DEADLOCK *** 1 lock held by syz-executor.2/16024: #0: 000000006dc05c78 (&rp->fetch_lock){+.+.}, at: mon_bin_read+0x60/0x640 drivers/usb/mon/mon_bin.c:813 stack backtrace: CPU: 0 PID: 16024 Comm: syz-executor.2 Not tainted 4.19.85-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x197/0x210 lib/dump_stack.c:118 print_circular_bug.isra.0.cold+0x1cc/0x28f kernel/locking/lockdep.c:1221 check_prev_add kernel/locking/lockdep.c:1861 [inline] check_prevs_add kernel/locking/lockdep.c:1974 [inline] validate_chain kernel/locking/lockdep.c:2415 [inline] __lock_acquire+0x2e19/0x49c0 kernel/locking/lockdep.c:3411 lock_acquire+0x16f/0x3f0 kernel/locking/lockdep.c:3903 __might_fault mm/memory.c:4638 [inline] __might_fault+0x15e/0x1e0 mm/memory.c:4623 _copy_to_user+0x30/0x120 lib/usercopy.c:25 copy_to_user include/linux/uaccess.h:155 [inline] mon_bin_read+0x329/0x640 drivers/usb/mon/mon_bin.c:825 do_loop_readv_writev fs/read_write.c:701 [inline] do_loop_readv_writev fs/read_write.c:688 [inline] do_iter_read+0x490/0x640 fs/read_write.c:925 vfs_readv+0xf0/0x160 fs/read_write.c:987 do_preadv+0x1c4/0x280 fs/read_write.c:1071 __do_sys_preadv fs/read_write.c:1121 [inline] __se_sys_preadv fs/read_write.c:1116 [inline] __x64_sys_preadv+0x9a/0xf0 fs/read_write.c:1116 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x45a639 Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f1c097cec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000045a639 RDX: 0000000000000001 RSI: 0000000020000140 RDI: 0000000000000003 RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1c097cf6d4 R13: 00000000004c7eb1 R14: 00000000004dddd0 R15: 00000000ffffffff lowmem_reserve[]: 0 2555 2557 2557 Node 0 DMA32 free:706852kB min:36248kB low:45308kB high:54368kB active_anon:858752kB inactive_anon:30084kB active_file:70044kB inactive_file:131172kB unevictable:6144kB writepending:836kB present:3129332kB managed:2619976kB mlocked:6144kB kernel_stack:9184kB pagetables:9652kB bounce:0kB free_pcp:1556kB local_pcp:1288kB free_cma:0kB kobject: 'loop4' (00000000010f8b28): kobject_uevent_env kobject: 'loop4' (00000000010f8b28): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop2' (0000000008e83658): kobject_uevent_env lowmem_reserve[]: 0 0 2 2 kobject: 'loop2' (0000000008e83658): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop5' (00000000a666e54e): kobject_uevent_env Node 0 kobject: 'loop5' (00000000a666e54e): fill_kobj_path: path = '/devices/virtual/block/loop5' Normal free:12kB min:32kB low:40kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:2428kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB lowmem_reserve[]: 0 0 0 0 kobject: 'loop4' (00000000010f8b28): kobject_uevent_env Node 1 Normal free:3783564kB min:53608kB low:67008kB high:80408kB active_anon:0kB inactive_anon:0kB active_file:148kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870180kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB kobject: 'loop4' (00000000010f8b28): fill_kobj_path: path = '/devices/virtual/block/loop4' lowmem_reserve[]: 0 0 0 0 Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB Node 0 DMA32: 860*4kB (UME) 213*8kB (UME) 178*16kB (UME) 251*32kB (UME) 47*64kB (UME) 149*128kB (UME) 58*256kB (UME) 8*512kB (UM) 2*1024kB (UM) 7*2048kB (UME) 157*4096kB (UM) = 716504kB Node 0 Normal: 1*4kB (U) 1*8kB (U) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 12kB Node 1 Normal: 69*4kB (UME) 237*8kB (UE) 267*16kB (UME) 67*32kB (UE) 14*64kB (UM) 9*128kB (UE) 6*256kB (UM) 6*512kB (UME) 2*1024kB (M) 1*2048kB (E) 919*4096kB (M) = 3783564kB Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB 49790 total pagecache pages 0 pages in swap cache Swap cache stats: add 0, delete 0, find 0/0 Free swap = 0kB Total swap = 0kB 1965979 pages RAM 0 pages HighMem/MovableOnly 338856 pages reserved 0 pages cma reserved kobject: 'loop3' (00000000d6700e3f): kobject_uevent_env kauditd_printk_skb: 22 callbacks suppressed audit: type=1804 audit(1574415867.836:471): pid=16058 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir598651719/syzkaller.Z3S3FK/209/bus" dev="sda1" ino=17157 res=1 kobject: 'loop3' (00000000d6700e3f): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop2' (0000000008e83658): kobject_uevent_env kobject: 'loop2' (0000000008e83658): fill_kobj_path: path = '/devices/virtual/block/loop2' audit: type=1804 audit(1574415867.876:473): pid=16061 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir632202200/syzkaller.VnHusi/71/bus" dev="sda1" ino=17169 res=1 syz-executor.3: vmalloc: allocation failure: 0 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) kobject: 'loop4' (00000000010f8b28): kobject_uevent_env kobject: 'loop4' (00000000010f8b28): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop5' (00000000a666e54e): kobject_uevent_env syz-executor.3 cpuset=syz3 mems_allowed=0-1 kobject: 'loop5' (00000000a666e54e): fill_kobj_path: path = '/devices/virtual/block/loop5' audit: type=1804 audit(1574415867.876:472): pid=16058 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir598651719/syzkaller.Z3S3FK/209/bus" dev="sda1" ino=17157 res=1 CPU: 1 PID: 16064 Comm: syz-executor.3 Not tainted 4.19.85-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x197/0x210 lib/dump_stack.c:118 warn_alloc.cold+0x7b/0x173 mm/page_alloc.c:3455 __vmalloc_node_range mm/vmalloc.c:1772 [inline] __vmalloc_node_range+0x486/0x790 mm/vmalloc.c:1732 __vmalloc_node mm/vmalloc.c:1801 [inline] __vmalloc_node_flags mm/vmalloc.c:1815 [inline] vmalloc+0x6b/0x90 mm/vmalloc.c:1837 sel_write_load+0x1de/0x470 security/selinux/selinuxfs.c:557 __vfs_write+0x114/0x810 fs/read_write.c:485 vfs_write+0x20c/0x560 fs/read_write.c:549 ksys_write+0x14f/0x2d0 fs/read_write.c:599 __do_sys_write fs/read_write.c:611 [inline] __se_sys_write fs/read_write.c:608 [inline] __x64_sys_write+0x73/0xb0 fs/read_write.c:608 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x45a639 Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007fe2dc25ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a639 RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe2dc25f6d4 R13: 00000000004cb07b R14: 00000000004e35c0 R15: 00000000ffffffff Mem-Info: active_anon:214810 inactive_anon:7521 isolated_anon:0 active_file:17548 inactive_file:33493 isolated_file:0 unevictable:1536 dirty:209 writeback:1 unstable:0 slab_reclaimable:15457 slab_unreclaimable:111512 mapped:59430 shmem:265 pagetables:2413 bounce:0 free:1126027 free_pcp:314 free_cma:0 audit: type=1804 audit(1574415868.406:474): pid=16147 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir632202200/syzkaller.VnHusi/72/bus" dev="sda1" ino=17166 res=1 Node 0 active_anon:859844kB inactive_anon:30084kB active_file:70044kB inactive_file:130972kB unevictable:6144kB isolated(anon):0kB isolated(file):0kB mapped:237820kB dirty:832kB writeback:4kB shmem:1060kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 186368kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no Node 1 active_anon:0kB inactive_anon:0kB active_file:148kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no Node 0 DMA free:15908kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB kobject: 'loop5' (00000000a666e54e): kobject_uevent_env audit: type=1804 audit(1574415868.606:475): pid=16181 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir598651719/syzkaller.Z3S3FK/210/bus" dev="sda1" ino=17378 res=1 kobject: 'loop5' (00000000a666e54e): fill_kobj_path: path = '/devices/virtual/block/loop5' lowmem_reserve[]: 0 2555 2557 2557 audit: type=1804 audit(1574415868.646:476): pid=16181 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir598651719/syzkaller.Z3S3FK/210/bus" dev="sda1" ino=17378 res=1 Node 0 DMA32 free:705224kB min:36248kB low:45308kB high:54368kB active_anon:859876kB inactive_anon:30084kB active_file:70044kB inactive_file:131272kB unevictable:6144kB writepending:836kB present:3129332kB managed:2619976kB mlocked:6144kB kernel_stack:9056kB pagetables:9652kB bounce:0kB free_pcp:1548kB local_pcp:248kB free_cma:0kB kobject: 'loop4' (00000000010f8b28): kobject_uevent_env lowmem_reserve[]: 0 0 2 2 Node 0 Normal free:12kB min:32kB low:40kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:2428kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB net_ratelimit: 22 callbacks suppressed protocol 88fb is buggy, dev hsr_slave_0 protocol 88fb is buggy, dev hsr_slave_1 audit: type=1804 audit(1574415868.796:477): pid=16187 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir632202200/syzkaller.VnHusi/73/bus" dev="sda1" ino=17010 res=1 kobject: 'loop4' (00000000010f8b28): fill_kobj_path: path = '/devices/virtual/block/loop4' lowmem_reserve[]: 0 0 0 0 Node 1 Normal free:3783564kB min:53608kB low:67008kB high:80408kB active_anon:0kB inactive_anon:0kB active_file:148kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870180kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB lowmem_reserve[]: 0 0 0 0 Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB Node 0 DMA32: 251*4kB (UE) 295*8kB (UE) 75*16kB (UME) 186*32kB (UE) 21*64kB (UE) 124*128kB (UME) 58*256kB (UME) 8*512kB (UM) 2*1024kB (UM) 4*2048kB (UME) 158*4096kB (UM) = 704084kB Node 0 Normal: 1*4kB (U) 1*8kB (U) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 12kB Node 1 Normal: 69*4kB (UME) 237*8kB (UE) 267*16kB (UME) 67*32kB (UE) 14*64kB (UM) 9*128kB (UE) 6*256kB (UM) 6*512kB (UME) 2*1024kB (M) 1*2048kB (E) 919*4096kB (M) = 3783564kB Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB kobject: 'loop4' (00000000010f8b28): kobject_uevent_env kobject: 'loop4' (00000000010f8b28): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop5' (00000000a666e54e): kobject_uevent_env kobject: 'loop5' (00000000a666e54e): fill_kobj_path: path = '/devices/virtual/block/loop5' Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB audit: type=1804 audit(1574415869.106:478): pid=16194 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir632202200/syzkaller.VnHusi/74/bus" dev="sda1" ino=17383 res=1 Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB 50554 total pagecache pages kobject: 'loop5' (00000000a666e54e): kobject_uevent_env 0 pages in swap cache kobject: 'loop5' (00000000a666e54e): fill_kobj_path: path = '/devices/virtual/block/loop5' Swap cache stats: add 0, delete 0, find 0/0 Free swap = 0kB Total swap = 0kB 1965979 pages RAM 0 pages HighMem/MovableOnly 338856 pages reserved 0 pages cma reserved protocol 88fb is buggy, dev hsr_slave_0 protocol 88fb is buggy, dev hsr_slave_1 kobject: 'loop2' (0000000008e83658): kobject_uevent_env kobject: 'loop2' (0000000008e83658): fill_kobj_path: path = '/devices/virtual/block/loop2' protocol 88fb is buggy, dev hsr_slave_0 protocol 88fb is buggy, dev hsr_slave_1 SELinux: failed to load policy kobject: 'loop3' (00000000d6700e3f): kobject_uevent_env kobject: 'loop3' (00000000d6700e3f): fill_kobj_path: path = '/devices/virtual/block/loop3' protocol 88fb is buggy, dev hsr_slave_0 protocol 88fb is buggy, dev hsr_slave_1 audit: type=1804 audit(1574415869.486:479): pid=16207 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir598651719/syzkaller.Z3S3FK/211/bus" dev="sda1" ino=17361 res=1 kobject: 'loop2' (0000000008e83658): kobject_uevent_env kobject: 'loop2' (0000000008e83658): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop4' (00000000010f8b28): kobject_uevent_env audit: type=1804 audit(1574415869.546:480): pid=16202 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir598651719/syzkaller.Z3S3FK/211/bus" dev="sda1" ino=17361 res=1 kobject: 'loop4' (00000000010f8b28): fill_kobj_path: path = '/devices/virtual/block/loop4' SELinux: failed to load policy kobject: 'loop3' (00000000d6700e3f): kobject_uevent_env kobject: 'loop3' (00000000d6700e3f): fill_kobj_path: path = '/devices/virtual/block/loop3' SELinux: failed to load policy kobject: 'loop5' (00000000a666e54e): kobject_uevent_env protocol 88fb is buggy, dev hsr_slave_0 protocol 88fb is buggy, dev hsr_slave_1 kobject: 'loop5' (00000000a666e54e): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop2' (0000000008e83658): kobject_uevent_env kobject: 'loop2' (0000000008e83658): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop4' (00000000010f8b28): kobject_uevent_env kobject: 'loop4' (00000000010f8b28): fill_kobj_path: path = '/devices/virtual/block/loop4' SELinux: failed to load policy kobject: 'loop3' (00000000d6700e3f): kobject_uevent_env kobject: 'loop3' (00000000d6700e3f): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop4' (00000000010f8b28): kobject_uevent_env kobject: 'loop4' (00000000010f8b28): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop2' (0000000008e83658): kobject_uevent_env kobject: 'loop2' (0000000008e83658): fill_kobj_path: path = '/devices/virtual/block/loop2' SELinux: failed to load policy kobject: 'loop3' (00000000d6700e3f): kobject_uevent_env kobject: 'loop3' (00000000d6700e3f): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop4' (00000000010f8b28): kobject_uevent_env kobject: 'loop4' (00000000010f8b28): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop5' (00000000a666e54e): kobject_uevent_env kobject: 'loop5' (00000000a666e54e): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop4' (00000000010f8b28): kobject_uevent_env kobject: 'loop4' (00000000010f8b28): fill_kobj_path: path = '/devices/virtual/block/loop4' SELinux: failed to load policy kobject: 'loop2' (0000000008e83658): kobject_uevent_env kobject: 'loop2' (0000000008e83658): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop3' (00000000d6700e3f): kobject_uevent_env kobject: 'loop3' (00000000d6700e3f): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop5' (00000000a666e54e): kobject_uevent_env kobject: 'loop5' (00000000a666e54e): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop4' (00000000010f8b28): kobject_uevent_env kobject: 'loop4' (00000000010f8b28): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop2' (0000000008e83658): kobject_uevent_env kobject: 'loop2' (0000000008e83658): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop3' (00000000d6700e3f): kobject_uevent_env SELinux: failed to load policy kobject: 'loop3' (00000000d6700e3f): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop4' (00000000010f8b28): kobject_uevent_env kobject: 'loop4' (00000000010f8b28): fill_kobj_path: path = '/devices/virtual/block/loop4' SELinux: failed to load policy kobject: 'loop3' (00000000d6700e3f): kobject_uevent_env kobject: 'loop3' (00000000d6700e3f): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop5' (00000000a666e54e): kobject_uevent_env kobject: 'loop5' (00000000a666e54e): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop4' (00000000010f8b28): kobject_uevent_env kobject: 'loop4' (00000000010f8b28): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop2' (0000000008e83658): kobject_uevent_env SELinux: failed to load policy kobject: 'loop2' (0000000008e83658): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop3' (00000000d6700e3f): kobject_uevent_env kobject: 'loop3' (00000000d6700e3f): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop2' (0000000008e83658): kobject_uevent_env SELinux: failed to load policy kobject: 'loop2' (0000000008e83658): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop2' (0000000008e83658): kobject_uevent_env kobject: 'loop2' (0000000008e83658): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop2' (0000000008e83658): kobject_uevent_env kobject: 'loop2' (0000000008e83658): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop3' (00000000d6700e3f): kobject_uevent_env kobject: 'loop3' (00000000d6700e3f): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop2' (0000000008e83658): kobject_uevent_env kobject: 'loop2' (0000000008e83658): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop2' (0000000008e83658): kobject_uevent_env kobject: 'loop2' (0000000008e83658): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop3' (00000000d6700e3f): kobject_uevent_env kobject: 'loop3' (00000000d6700e3f): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop2' (0000000008e83658): kobject_uevent_env kobject: 'loop2' (0000000008e83658): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop3' (00000000d6700e3f): kobject_uevent_env kobject: 'loop3' (00000000d6700e3f): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop4' (00000000010f8b28): kobject_uevent_env kobject: 'loop4' (00000000010f8b28): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop5' (00000000a666e54e): kobject_uevent_env kobject: 'loop5' (00000000a666e54e): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop2' (0000000008e83658): kobject_uevent_env kobject: 'loop2' (0000000008e83658): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop4' (00000000010f8b28): kobject_uevent_env kobject: 'loop4' (00000000010f8b28): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop2' (0000000008e83658): kobject_uevent_env kobject: 'loop2' (0000000008e83658): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop3' (00000000d6700e3f): kobject_uevent_env kobject: 'loop3' (00000000d6700e3f): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop2' (0000000008e83658): kobject_uevent_env kobject: 'loop2' (0000000008e83658): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop5' (00000000a666e54e): kobject_uevent_env kobject: 'loop5' (00000000a666e54e): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop3' (00000000d6700e3f): kobject_uevent_env kobject: 'loop3' (00000000d6700e3f): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop4' (00000000010f8b28): kobject_uevent_env kobject: 'loop4' (00000000010f8b28): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop3' (00000000d6700e3f): kobject_uevent_env kobject: 'loop3' (00000000d6700e3f): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop2' (0000000008e83658): kobject_uevent_env kobject: 'loop2' (0000000008e83658): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop5' (00000000a666e54e): kobject_uevent_env kobject: 'loop5' (00000000a666e54e): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop3' (00000000d6700e3f): kobject_uevent_env kauditd_printk_skb: 34 callbacks suppressed audit: type=1804 audit(1574415873.116:515): pid=16622 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir632202200/syzkaller.VnHusi/84/bus" dev="sda1" ino=17411 res=1 kobject: 'loop3' (00000000d6700e3f): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop4' (00000000010f8b28): kobject_uevent_env kobject: 'loop4' (00000000010f8b28): fill_kobj_path: path = '/devices/virtual/block/loop4' audit: type=1804 audit(1574415873.156:516): pid=16630 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir598651719/syzkaller.Z3S3FK/220/bus" dev="sda1" ino=17168 res=1 kobject: 'loop2' (0000000008e83658): kobject_uevent_env kobject: 'loop2' (0000000008e83658): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop3' (00000000d6700e3f): kobject_uevent_env audit: type=1804 audit(1574415873.176:517): pid=16622 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir632202200/syzkaller.VnHusi/84/bus" dev="sda1" ino=17411 res=1 kobject: 'loop3' (00000000d6700e3f): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop2' (0000000008e83658): kobject_uevent_env kobject: 'loop2' (0000000008e83658): fill_kobj_path: path = '/devices/virtual/block/loop2' audit: type=1804 audit(1574415873.196:518): pid=16630 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir598651719/syzkaller.Z3S3FK/220/bus" dev="sda1" ino=17168 res=1 kobject: 'loop4' (00000000010f8b28): kobject_uevent_env kobject: 'loop4' (00000000010f8b28): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop5' (00000000a666e54e): kobject_uevent_env audit: type=1804 audit(1574415873.566:519): pid=16649 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir632202200/syzkaller.VnHusi/85/bus" dev="sda1" ino=17384 res=1 kobject: 'loop5' (00000000a666e54e): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop3' (00000000d6700e3f): kobject_uevent_env audit: type=1804 audit(1574415873.636:520): pid=16649 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir632202200/syzkaller.VnHusi/85/bus" dev="sda1" ino=17384 res=1 kobject: 'loop3' (00000000d6700e3f): fill_kobj_path: path = '/devices/virtual/block/loop3' audit: type=1804 audit(1574415873.646:521): pid=16657 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir598651719/syzkaller.Z3S3FK/221/bus" dev="sda1" ino=17409 res=1 kobject: 'loop2' (0000000008e83658): kobject_uevent_env kobject: 'loop2' (0000000008e83658): fill_kobj_path: path = '/devices/virtual/block/loop2' audit: type=1804 audit(1574415873.756:522): pid=16656 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir598651719/syzkaller.Z3S3FK/221/bus" dev="sda1" ino=17409 res=1 kobject: 'loop4' (00000000010f8b28): kobject_uevent_env kobject: 'loop4' (00000000010f8b28): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop2' (0000000008e83658): kobject_uevent_env kobject: 'loop2' (0000000008e83658): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop2' (0000000008e83658): kobject_uevent_env net_ratelimit: 26 callbacks suppressed protocol 88fb is buggy, dev hsr_slave_0 protocol 88fb is buggy, dev hsr_slave_1 audit: type=1804 audit(1574415874.016:523): pid=16679 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir598651719/syzkaller.Z3S3FK/222/bus" dev="sda1" ino=17157 res=1 kobject: 'loop2' (0000000008e83658): fill_kobj_path: path = '/devices/virtual/block/loop2' protocol 88fb is buggy, dev hsr_slave_0 protocol 88fb is buggy, dev hsr_slave_1 kobject: 'loop2' (0000000008e83658): kobject_uevent_env kobject: 'loop2' (0000000008e83658): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop5' (00000000a666e54e): kobject_uevent_env audit: type=1804 audit(1574415874.046:524): pid=16673 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir598651719/syzkaller.Z3S3FK/222/bus" dev="sda1" ino=17157 res=1 kobject: 'loop5' (00000000a666e54e): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop4' (00000000010f8b28): kobject_uevent_env kobject: 'loop4' (00000000010f8b28): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop3' (00000000d6700e3f): kobject_uevent_env kobject: 'loop3' (00000000d6700e3f): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop2' (0000000008e83658): kobject_uevent_env kobject: 'loop2' (0000000008e83658): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop3' (00000000d6700e3f): kobject_uevent_env kobject: 'loop3' (00000000d6700e3f): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop5' (00000000a666e54e): kobject_uevent_env kobject: 'loop5' (00000000a666e54e): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop2' (0000000008e83658): kobject_uevent_env kobject: 'loop2' (0000000008e83658): fill_kobj_path: path = '/devices/virtual/block/loop2' protocol 88fb is buggy, dev hsr_slave_0 protocol 88fb is buggy, dev hsr_slave_1 sel_write_load: 15 callbacks suppressed SELinux: failed to load policy kobject: 'loop3' (00000000d6700e3f): kobject_uevent_env kobject: 'loop3' (00000000d6700e3f): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop2' (0000000008e83658): kobject_uevent_env kobject: 'loop2' (0000000008e83658): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop3' (00000000d6700e3f): kobject_uevent_env kobject: 'loop3' (00000000d6700e3f): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop4' (00000000010f8b28): kobject_uevent_env kobject: 'loop4' (00000000010f8b28): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop5' (00000000a666e54e): kobject_uevent_env kobject: 'loop5' (00000000a666e54e): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop3' (00000000d6700e3f): kobject_uevent_env SELinux: failed to load policy kobject: 'loop3' (00000000d6700e3f): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop4' (00000000010f8b28): kobject_uevent_env kobject: 'loop4' (00000000010f8b28): fill_kobj_path: path = '/devices/virtual/block/loop4' protocol 88fb is buggy, dev hsr_slave_0 protocol 88fb is buggy, dev hsr_slave_1 kobject: 'loop3' (00000000d6700e3f): kobject_uevent_env kobject: 'loop3' (00000000d6700e3f): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop5' (00000000a666e54e): kobject_uevent_env SELinux: failed to load policy kobject: 'loop5' (00000000a666e54e): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop4' (00000000010f8b28): kobject_uevent_env kobject: 'loop4' (00000000010f8b28): fill_kobj_path: path = '/devices/virtual/block/loop4' SELinux: failed to load policy kobject: 'loop3' (00000000d6700e3f): kobject_uevent_env kobject: 'loop3' (00000000d6700e3f): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop4' (00000000010f8b28): kobject_uevent_env kobject: 'loop4' (00000000010f8b28): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop3' (00000000d6700e3f): kobject_uevent_env kobject: 'loop3' (00000000d6700e3f): fill_kobj_path: path = '/devices/virtual/block/loop3' SELinux: failed to load policy kobject: 'loop4' (00000000010f8b28): kobject_uevent_env kobject: 'loop4' (00000000010f8b28): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop3' (00000000d6700e3f): kobject_uevent_env kobject: 'loop3' (00000000d6700e3f): fill_kobj_path: path = '/devices/virtual/block/loop3' protocol 88fb is buggy, dev hsr_slave_0 protocol 88fb is buggy, dev hsr_slave_1 kobject: 'loop2' (0000000008e83658): kobject_uevent_env kobject: 'loop2' (0000000008e83658): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop4' (00000000010f8b28): kobject_uevent_env kobject: 'loop4' (00000000010f8b28): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop2' (0000000008e83658): kobject_uevent_env kobject: 'loop2' (0000000008e83658): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop3' (00000000d6700e3f): kobject_uevent_env kobject: 'loop3' (00000000d6700e3f): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop3' (00000000d6700e3f): kobject_uevent_env kobject: 'loop3' (00000000d6700e3f): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop5' (00000000a666e54e): kobject_uevent_env kobject: 'loop5' (00000000a666e54e): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop4' (00000000010f8b28): kobject_uevent_env kobject: 'loop4' (00000000010f8b28): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop4' (00000000010f8b28): kobject_uevent_env kobject: 'loop4' (00000000010f8b28): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop5' (00000000a666e54e): kobject_uevent_env kobject: 'loop5' (00000000a666e54e): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop5' (00000000a666e54e): kobject_uevent_env kobject: 'loop5' (00000000a666e54e): fill_kobj_path: path = '/devices/virtual/block/loop5'