====================================================== WARNING: possible circular locking dependency detected 4.20.0+ #3 Not tainted ------------------------------------------------------ swapper/1/0 is trying to acquire lock: 000000006ee01ec3 (nr_list_lock){+.-.}, at: spin_lock_bh include/linux/spinlock.h:334 [inline] 000000006ee01ec3 (nr_list_lock){+.-.}, at: nr_remove_socket net/netrom/af_netrom.c:96 [inline] 000000006ee01ec3 (nr_list_lock){+.-.}, at: nr_destroy_socket+0x96/0x6e0 net/netrom/af_netrom.c:264 but task is already holding lock: 00000000b89d7fe6 (slock-AF_NETROM){+.-.}, at: spin_lock include/linux/spinlock.h:329 [inline] 00000000b89d7fe6 (slock-AF_NETROM){+.-.}, at: nr_destroy_timer+0x32/0x90 net/netrom/af_netrom.c:247 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #1 (slock-AF_NETROM){+.-.}: __raw_spin_lock include/linux/spinlock_api_smp.h:142 [inline] _raw_spin_lock+0x2f/0x40 kernel/locking/spinlock.c:144 spin_lock include/linux/spinlock.h:329 [inline] nr_find_listener net/netrom/af_netrom.c:156 [inline] nr_rx_frame+0x60c/0x1d50 net/netrom/af_netrom.c:955 nr_loopback_timer+0x7b/0x170 net/netrom/nr_loopback.c:62 call_timer_fn+0x254/0x900 kernel/time/timer.c:1325 expire_timers kernel/time/timer.c:1362 [inline] __run_timers+0x6fc/0xd50 kernel/time/timer.c:1681 run_timer_softirq+0x52/0xb0 kernel/time/timer.c:1694 __do_softirq+0x30b/0xb11 kernel/softirq.c:292 invoke_softirq kernel/softirq.c:373 [inline] irq_exit+0x180/0x1d0 kernel/softirq.c:413 exiting_irq arch/x86/include/asm/apic.h:536 [inline] smp_apic_timer_interrupt+0x1b7/0x760 arch/x86/kernel/apic/apic.c:1062 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:807 -> #0 (nr_list_lock){+.-.}: lock_acquire+0x1db/0x570 kernel/locking/lockdep.c:3841 __raw_spin_lock_bh include/linux/spinlock_api_smp.h:135 [inline] _raw_spin_lock_bh+0x33/0x50 kernel/locking/spinlock.c:168 spin_lock_bh include/linux/spinlock.h:334 [inline] nr_remove_socket net/netrom/af_netrom.c:96 [inline] nr_destroy_socket+0x96/0x6e0 net/netrom/af_netrom.c:264 nr_destroy_timer+0x42/0x90 net/netrom/af_netrom.c:249 call_timer_fn+0x254/0x900 kernel/time/timer.c:1325 expire_timers kernel/time/timer.c:1362 [inline] __run_timers+0x6fc/0xd50 kernel/time/timer.c:1681 run_timer_softirq+0x52/0xb0 kernel/time/timer.c:1694 __do_softirq+0x30b/0xb11 kernel/softirq.c:292 invoke_softirq kernel/softirq.c:373 [inline] irq_exit+0x180/0x1d0 kernel/softirq.c:413 exiting_irq arch/x86/include/asm/apic.h:536 [inline] smp_apic_timer_interrupt+0x1b7/0x760 arch/x86/kernel/apic/apic.c:1062 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:807 native_safe_halt+0x2/0x10 arch/x86/include/asm/irqflags.h:57 arch_cpu_idle+0x10/0x20 arch/x86/kernel/process.c:555 default_idle_call+0x36/0x90 kernel/sched/idle.c:93 cpuidle_idle_call kernel/sched/idle.c:153 [inline] do_idle+0x386/0x5d0 kernel/sched/idle.c:262 cpu_startup_entry+0x1b/0x20 kernel/sched/idle.c:353 start_secondary+0x435/0x620 arch/x86/kernel/smpboot.c:271 secondary_startup_64+0xa4/0xb0 arch/x86/kernel/head_64.S:243 other info that might help us debug this: Possible unsafe locking scenario: CPU0 CPU1 ---- ---- lock(slock-AF_NETROM); lock(nr_list_lock); lock(slock-AF_NETROM); lock(nr_list_lock); *** DEADLOCK *** 2 locks held by swapper/1/0: #0: 00000000b0a4416d ((&sk->sk_timer)#2){+.-.}, at: lockdep_copy_map include/linux/lockdep.h:171 [inline] #0: 00000000b0a4416d ((&sk->sk_timer)#2){+.-.}, at: call_timer_fn+0x1b4/0x900 kernel/time/timer.c:1315 #1: 00000000b89d7fe6 (slock-AF_NETROM){+.-.}, at: spin_lock include/linux/spinlock.h:329 [inline] #1: 00000000b89d7fe6 (slock-AF_NETROM){+.-.}, at: nr_destroy_timer+0x32/0x90 net/netrom/af_netrom.c:247 stack backtrace: CPU: 1 PID: 0 Comm: swapper/1 Not tainted 4.20.0+ #3 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1db/0x2d0 lib/dump_stack.c:113 print_circular_bug.isra.0.cold+0x1cc/0x28f kernel/locking/lockdep.c:1224 check_prev_add kernel/locking/lockdep.c:1866 [inline] check_prevs_add kernel/locking/lockdep.c:1979 [inline] validate_chain kernel/locking/lockdep.c:2350 [inline] __lock_acquire+0x3014/0x4a30 kernel/locking/lockdep.c:3338 lock_acquire+0x1db/0x570 kernel/locking/lockdep.c:3841 __raw_spin_lock_bh include/linux/spinlock_api_smp.h:135 [inline] _raw_spin_lock_bh+0x33/0x50 kernel/locking/spinlock.c:168 spin_lock_bh include/linux/spinlock.h:334 [inline] nr_remove_socket net/netrom/af_netrom.c:96 [inline] nr_destroy_socket+0x96/0x6e0 net/netrom/af_netrom.c:264 nr_destroy_timer+0x42/0x90 net/netrom/af_netrom.c:249 call_timer_fn+0x254/0x900 kernel/time/timer.c:1325 expire_timers kernel/time/timer.c:1362 [inline] __run_timers+0x6fc/0xd50 kernel/time/timer.c:1681 run_timer_softirq+0x52/0xb0 kernel/time/timer.c:1694 __do_softirq+0x30b/0xb11 kernel/softirq.c:292 invoke_softirq kernel/softirq.c:373 [inline] irq_exit+0x180/0x1d0 kernel/softirq.c:413 exiting_irq arch/x86/include/asm/apic.h:536 [inline] smp_apic_timer_interrupt+0x1b7/0x760 arch/x86/kernel/apic/apic.c:1062 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:807 RIP: 0010:native_safe_halt+0x2/0x10 arch/x86/include/asm/irqflags.h:58 Code: ff ff ff 48 89 c7 48 89 45 d8 e8 c9 1a ce f9 48 8b 45 d8 e9 ce fe ff ff 48 89 df e8 b8 1a ce f9 eb 82 90 90 90 90 90 90 fb f4 0f 1f 00 66 2e 0f 1f 84 00 00 00 00 00 f4 c3 90 90 90 90 90 90 RSP: 0018:ffff8880a9e97cd0 EFLAGS: 00000282 ORIG_RAX: ffffffffffffff13 RAX: 1ffffffff1324a09 RBX: 1ffff110153d2f9d RCX: 0000000000000000 RDX: dffffc0000000000 RSI: 0000000000000001 RDI: ffff8880a9e86bbc RBP: ffff8880a9e97d90 R08: ffff8880a9e86340 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000001 R13: ffff8880a9e97d68 R14: 0000000000000000 R15: ffffffff89925038 arch_cpu_idle+0x10/0x20 arch/x86/kernel/process.c:555 default_idle_call+0x36/0x90 kernel/sched/idle.c:93 cpuidle_idle_call kernel/sched/idle.c:153 [inline] do_idle+0x386/0x5d0 kernel/sched/idle.c:262 cpu_startup_entry+0x1b/0x20 kernel/sched/idle.c:353 start_secondary+0x435/0x620 arch/x86/kernel/smpboot.c:271 secondary_startup_64+0xa4/0xb0 arch/x86/kernel/head_64.S:243 kobject: 'loop0' (0000000006070e37): kobject_uevent_env kobject: 'loop0' (0000000006070e37): fill_kobj_path: path = '/devices/virtual/block/loop0' audit: type=1804 audit(1547296666.393:426): pid=1138 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir996624127/syzkaller.ScQGM9/3071/memory.events" dev="sda1" ino=17271 res=1 TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. kobject: 'loop1' (0000000011a9d3dc): kobject_uevent_env kobject: 'loop1' (0000000011a9d3dc): fill_kobj_path: path = '/devices/virtual/block/loop1' audit: type=1804 audit(1547296666.453:427): pid=1138 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir996624127/syzkaller.ScQGM9/3071/memory.events" dev="sda1" ino=17271 res=1 audit: type=1804 audit(1547296666.473:428): pid=1138 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir996624127/syzkaller.ScQGM9/3071/memory.events" dev="sda1" ino=17271 res=1 audit: type=1804 audit(1547296666.473:429): pid=1148 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir996624127/syzkaller.ScQGM9/3071/memory.events" dev="sda1" ino=17271 res=1 kobject: 'loop1' (0000000011a9d3dc): kobject_uevent_env kobject: 'loop1' (0000000011a9d3dc): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop2' (000000009ec8aa3e): kobject_uevent_env kobject: 'loop2' (000000009ec8aa3e): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop4' (00000000f5c5f547): kobject_uevent_env kobject: 'loop4' (00000000f5c5f547): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop3' (0000000074924ac0): kobject_uevent_env kobject: 'loop3' (0000000074924ac0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop0' (0000000006070e37): kobject_uevent_env kobject: 'loop0' (0000000006070e37): fill_kobj_path: path = '/devices/virtual/block/loop0' audit: type=1804 audit(1547296666.673:430): pid=1160 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir996624127/syzkaller.ScQGM9/3072/memory.events" dev="sda1" ino=17269 res=1 kobject: 'loop1' (0000000011a9d3dc): kobject_uevent_env kobject: 'loop1' (0000000011a9d3dc): fill_kobj_path: path = '/devices/virtual/block/loop1' audit: type=1804 audit(1547296666.713:431): pid=1160 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir996624127/syzkaller.ScQGM9/3072/memory.events" dev="sda1" ino=17269 res=1 kobject: 'loop0' (0000000006070e37): kobject_uevent_env kobject: 'loop0' (0000000006070e37): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop2' (000000009ec8aa3e): kobject_uevent_env kobject: 'loop2' (000000009ec8aa3e): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop3' (0000000074924ac0): kobject_uevent_env kobject: 'loop3' (0000000074924ac0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop1' (0000000011a9d3dc): kobject_uevent_env kobject: 'loop1' (0000000011a9d3dc): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop5' (00000000ab8b2d14): kobject_uevent_env TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. kobject: 'loop5' (00000000ab8b2d14): fill_kobj_path: path = '/devices/virtual/block/loop5' audit: type=1804 audit(1547296667.323:432): pid=1191 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir996624127/syzkaller.ScQGM9/3073/memory.events" dev="sda1" ino=17288 res=1 kobject: 'loop4' (00000000f5c5f547): kobject_uevent_env audit: type=1804 audit(1547296667.323:433): pid=1191 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir996624127/syzkaller.ScQGM9/3073/memory.events" dev="sda1" ino=17288 res=1 kobject: 'loop4' (00000000f5c5f547): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop2' (000000009ec8aa3e): kobject_uevent_env kobject: 'loop2' (000000009ec8aa3e): fill_kobj_path: path = '/devices/virtual/block/loop2' audit: type=1804 audit(1547296667.483:434): pid=1211 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir996624127/syzkaller.ScQGM9/3074/memory.events" dev="sda1" ino=17288 res=1 kobject: 'loop0' (0000000006070e37): kobject_uevent_env kobject: 'loop0' (0000000006070e37): fill_kobj_path: path = '/devices/virtual/block/loop0' TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. kobject: 'loop1' (0000000011a9d3dc): kobject_uevent_env kobject: 'loop1' (0000000011a9d3dc): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop3' (0000000074924ac0): kobject_uevent_env audit: type=1804 audit(1547296667.483:435): pid=1211 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir996624127/syzkaller.ScQGM9/3074/memory.events" dev="sda1" ino=17288 res=1 kobject: 'loop3' (0000000074924ac0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop1' (0000000011a9d3dc): kobject_uevent_env kobject: 'loop1' (0000000011a9d3dc): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop0' (0000000006070e37): kobject_uevent_env kobject: 'loop0' (0000000006070e37): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop1' (0000000011a9d3dc): kobject_uevent_env kobject: 'loop1' (0000000011a9d3dc): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop3' (0000000074924ac0): kobject_uevent_env kobject: 'loop3' (0000000074924ac0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop4' (00000000f5c5f547): kobject_uevent_env kobject: 'loop4' (00000000f5c5f547): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop5' (00000000ab8b2d14): kobject_uevent_env kobject: 'loop5' (00000000ab8b2d14): fill_kobj_path: path = '/devices/virtual/block/loop5' TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. audit: type=1804 audit(1547296668.163:436): pid=1235 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir996624127/syzkaller.ScQGM9/3075/memory.events" dev="sda1" ino=17301 res=1 kobject: 'loop4' (00000000f5c5f547): kobject_uevent_env kobject: 'loop4' (00000000f5c5f547): fill_kobj_path: path = '/devices/virtual/block/loop4' audit: type=1804 audit(1547296668.163:437): pid=1235 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir996624127/syzkaller.ScQGM9/3075/memory.events" dev="sda1" ino=17301 res=1 kobject: 'loop2' (000000009ec8aa3e): kobject_uevent_env kobject: 'loop2' (000000009ec8aa3e): fill_kobj_path: path = '/devices/virtual/block/loop2' audit: type=1804 audit(1547296668.293:438): pid=1248 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir996624127/syzkaller.ScQGM9/3076/memory.events" dev="sda1" ino=17290 res=1 kobject: 'loop1' (0000000011a9d3dc): kobject_uevent_env kobject: 'loop1' (0000000011a9d3dc): fill_kobj_path: path = '/devices/virtual/block/loop1' audit: type=1804 audit(1547296668.303:439): pid=1248 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir996624127/syzkaller.ScQGM9/3076/memory.events" dev="sda1" ino=17290 res=1 kobject: 'loop0' (0000000006070e37): kobject_uevent_env kobject: 'regulatory.0' (00000000b568e2f5): kobject_uevent_env kobject: 'loop0' (0000000006070e37): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'regulatory.0' (00000000b568e2f5): fill_kobj_path: path = '/devices/platform/regulatory.0' kobject: 'loop4' (00000000f5c5f547): kobject_uevent_env audit: type=1804 audit(1547296668.403:440): pid=1255 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir996624127/syzkaller.ScQGM9/3077/memory.events" dev="sda1" ino=17289 res=1 kobject: 'loop4' (00000000f5c5f547): fill_kobj_path: path = '/devices/virtual/block/loop4' audit: type=1804 audit(1547296668.403:441): pid=1255 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir996624127/syzkaller.ScQGM9/3077/memory.events" dev="sda1" ino=17289 res=1 kobject: 'loop3' (0000000074924ac0): kobject_uevent_env kobject: 'loop3' (0000000074924ac0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop0' (0000000006070e37): kobject_uevent_env kobject: 'loop0' (0000000006070e37): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop1' (0000000011a9d3dc): kobject_uevent_env kobject: 'loop1' (0000000011a9d3dc): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop4' (00000000f5c5f547): kobject_uevent_env kobject: 'loop4' (00000000f5c5f547): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop5' (00000000ab8b2d14): kobject_uevent_env kobject: 'loop5' (00000000ab8b2d14): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop0' (0000000006070e37): kobject_uevent_env kobject: 'loop0' (0000000006070e37): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop1' (0000000011a9d3dc): kobject_uevent_env kobject: 'loop1' (0000000011a9d3dc): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop4' (00000000f5c5f547): kobject_uevent_env kobject: 'loop4' (00000000f5c5f547): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop3' (0000000074924ac0): kobject_uevent_env kobject: 'loop3' (0000000074924ac0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop2' (000000009ec8aa3e): kobject_uevent_env kobject: 'loop2' (000000009ec8aa3e): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop0' (0000000006070e37): kobject_uevent_env kobject: 'loop0' (0000000006070e37): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop4' (00000000f5c5f547): kobject_uevent_env kobject: 'loop4' (00000000f5c5f547): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop2' (000000009ec8aa3e): kobject_uevent_env kobject: 'loop2' (000000009ec8aa3e): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop1' (0000000011a9d3dc): kobject_uevent_env kobject: 'loop1' (0000000011a9d3dc): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop3' (0000000074924ac0): kobject_uevent_env kobject: 'loop3' (0000000074924ac0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop5' (00000000ab8b2d14): kobject_uevent_env kobject: 'loop5' (00000000ab8b2d14): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop4' (00000000f5c5f547): kobject_uevent_env kobject: 'loop4' (00000000f5c5f547): fill_kobj_path: path = '/devices/virtual/block/loop4' TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. kobject: 'loop0' (0000000006070e37): kobject_uevent_env kobject: 'loop0' (0000000006070e37): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop2' (000000009ec8aa3e): kobject_uevent_env kobject: 'loop2' (000000009ec8aa3e): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop1' (0000000011a9d3dc): kobject_uevent_env kobject: 'loop1' (0000000011a9d3dc): fill_kobj_path: path = '/devices/virtual/block/loop1' TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. kobject: 'loop3' (0000000074924ac0): kobject_uevent_env kobject: 'loop3' (0000000074924ac0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop4' (00000000f5c5f547): kobject_uevent_env kobject: 'loop4' (00000000f5c5f547): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop1' (0000000011a9d3dc): kobject_uevent_env kobject: 'loop1' (0000000011a9d3dc): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop2' (000000009ec8aa3e): kobject_uevent_env kobject: 'loop2' (000000009ec8aa3e): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop4' (00000000f5c5f547): kobject_uevent_env kobject: 'loop4' (00000000f5c5f547): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop3' (0000000074924ac0): kobject_uevent_env kobject: 'loop3' (0000000074924ac0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop5' (00000000ab8b2d14): kobject_uevent_env kobject: 'loop5' (00000000ab8b2d14): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop4' (00000000f5c5f547): kobject_uevent_env TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. kobject: 'loop4' (00000000f5c5f547): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop1' (0000000011a9d3dc): kobject_uevent_env kobject: 'loop1' (0000000011a9d3dc): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop2' (000000009ec8aa3e): kobject_uevent_env kobject: 'loop2' (000000009ec8aa3e): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop0' (0000000006070e37): kobject_uevent_env kobject: 'loop0' (0000000006070e37): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop3' (0000000074924ac0): kobject_uevent_env kobject: 'loop3' (0000000074924ac0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop2' (000000009ec8aa3e): kobject_uevent_env kobject: 'loop2' (000000009ec8aa3e): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop4' (00000000f5c5f547): kobject_uevent_env kobject: 'loop4' (00000000f5c5f547): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop0' (0000000006070e37): kobject_uevent_env kobject: 'loop0' (0000000006070e37): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop5' (00000000ab8b2d14): kobject_uevent_env kobject: 'loop5' (00000000ab8b2d14): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop0' (0000000006070e37): kobject_uevent_env TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. kobject: 'loop0' (0000000006070e37): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'regulatory.0' (00000000b568e2f5): kobject_uevent_env kobject: 'regulatory.0' (00000000b568e2f5): fill_kobj_path: path = '/devices/platform/regulatory.0' kobject: 'loop2' (000000009ec8aa3e): kobject_uevent_env kobject: 'loop2' (000000009ec8aa3e): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop4' (00000000f5c5f547): kobject_uevent_env kobject: 'loop4' (00000000f5c5f547): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop1' (0000000011a9d3dc): kobject_uevent_env TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. kobject: 'loop1' (0000000011a9d3dc): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop0' (0000000006070e37): kobject_uevent_env kobject: 'loop0' (0000000006070e37): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop3' (0000000074924ac0): kobject_uevent_env kobject: 'loop3' (0000000074924ac0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop5' (00000000ab8b2d14): kobject_uevent_env kobject: 'loop5' (00000000ab8b2d14): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop2' (000000009ec8aa3e): kobject_uevent_env kobject: 'loop2' (000000009ec8aa3e): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop4' (00000000f5c5f547): kobject_uevent_env kobject: 'loop4' (00000000f5c5f547): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop0' (0000000006070e37): kobject_uevent_env kobject: 'loop0' (0000000006070e37): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop5' (00000000ab8b2d14): kobject_uevent_env kobject: 'loop5' (00000000ab8b2d14): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop1' (0000000011a9d3dc): kobject_uevent_env kobject: 'loop1' (0000000011a9d3dc): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop1' (0000000011a9d3dc): kobject_uevent_env kobject: 'loop1' (0000000011a9d3dc): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop5' (00000000ab8b2d14): kobject_uevent_env kobject: 'loop5' (00000000ab8b2d14): fill_kobj_path: path = '/devices/virtual/block/loop5' kauditd_printk_skb: 36 callbacks suppressed audit: type=1804 audit(1547296672.333:478): pid=1474 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir996624127/syzkaller.ScQGM9/3090/memory.events" dev="sda1" ino=17326 res=1 kobject: 'loop0' (0000000006070e37): kobject_uevent_env audit: type=1804 audit(1547296672.373:479): pid=1474 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir996624127/syzkaller.ScQGM9/3090/memory.events" dev="sda1" ino=17326 res=1 kobject: 'loop0' (0000000006070e37): fill_kobj_path: path = '/devices/virtual/block/loop0' TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. kobject: 'loop4' (00000000f5c5f547): kobject_uevent_env kobject: 'loop4' (00000000f5c5f547): fill_kobj_path: path = '/devices/virtual/block/loop4' audit: type=1804 audit(1547296672.433:480): pid=1479 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir063899760/syzkaller.1Eifsu/252/memory.events" dev="sda1" ino=17319 res=1 kobject: 'loop3' (0000000074924ac0): kobject_uevent_env audit: type=1804 audit(1547296672.433:481): pid=1479 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir063899760/syzkaller.1Eifsu/252/memory.events" dev="sda1" ino=17319 res=1 kobject: 'loop3' (0000000074924ac0): fill_kobj_path: path = '/devices/virtual/block/loop3' audit: type=1804 audit(1547296672.523:482): pid=1486 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir996624127/syzkaller.ScQGM9/3091/memory.events" dev="sda1" ino=17322 res=1 kobject: 'loop1' (0000000011a9d3dc): kobject_uevent_env audit: type=1804 audit(1547296672.523:483): pid=1486 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir996624127/syzkaller.ScQGM9/3091/memory.events" dev="sda1" ino=17322 res=1 kobject: 'loop1' (0000000011a9d3dc): fill_kobj_path: path = '/devices/virtual/block/loop1' audit: type=1804 audit(1547296672.623:484): pid=1489 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir063899760/syzkaller.1Eifsu/253/memory.events" dev="sda1" ino=16562 res=1 kobject: 'loop5' (00000000ab8b2d14): kobject_uevent_env audit: type=1804 audit(1547296672.663:485): pid=1489 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir063899760/syzkaller.1Eifsu/253/memory.events" dev="sda1" ino=16562 res=1 kobject: 'loop5' (00000000ab8b2d14): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop2' (000000009ec8aa3e): kobject_uevent_env kobject: 'loop2' (000000009ec8aa3e): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop0' (0000000006070e37): kobject_uevent_env kobject: 'loop0' (0000000006070e37): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop1' (0000000011a9d3dc): kobject_uevent_env kobject: 'loop1' (0000000011a9d3dc): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop3' (0000000074924ac0): kobject_uevent_env kobject: 'loop3' (0000000074924ac0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop5' (00000000ab8b2d14): kobject_uevent_env kobject: 'loop5' (00000000ab8b2d14): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop1' (0000000011a9d3dc): kobject_uevent_env kobject: 'loop1' (0000000011a9d3dc): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop0' (0000000006070e37): kobject_uevent_env kobject: 'loop0' (0000000006070e37): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop2' (000000009ec8aa3e): kobject_uevent_env kobject: 'loop2' (000000009ec8aa3e): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop1' (0000000011a9d3dc): kobject_uevent_env kobject: 'loop1' (0000000011a9d3dc): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop0' (0000000006070e37): kobject_uevent_env kobject: 'loop0' (0000000006070e37): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop2' (000000009ec8aa3e): kobject_uevent_env kobject: 'loop2' (000000009ec8aa3e): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop1' (0000000011a9d3dc): kobject_uevent_env kobject: 'loop1' (0000000011a9d3dc): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop1' (0000000011a9d3dc): kobject_uevent_env kobject: 'loop1' (0000000011a9d3dc): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop0' (0000000006070e37): kobject_uevent_env kobject: 'loop0' (0000000006070e37): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop2' (000000009ec8aa3e): kobject_uevent_env kobject: 'loop2' (000000009ec8aa3e): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop4' (00000000f5c5f547): kobject_uevent_env kobject: 'loop4' (00000000f5c5f547): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop3' (0000000074924ac0): kobject_uevent_env kobject: 'loop3' (0000000074924ac0): fill_kobj_path: path = '/devices/virtual/block/loop3' audit: type=1804 audit(1547296673.253:486): pid=1528 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir063899760/syzkaller.1Eifsu/254/memory.events" dev="sda1" ino=17338 res=1 TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. kobject: 'loop2' (000000009ec8aa3e): kobject_uevent_env kobject: 'loop2' (000000009ec8aa3e): fill_kobj_path: path = '/devices/virtual/block/loop2' audit: type=1804 audit(1547296673.293:487): pid=1533 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir996624127/syzkaller.ScQGM9/3092/memory.events" dev="sda1" ino=17017 res=1 kobject: 'loop4' (00000000f5c5f547): kobject_uevent_env kobject: 'loop4' (00000000f5c5f547): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop1' (0000000011a9d3dc): kobject_uevent_env kobject: 'loop1' (0000000011a9d3dc): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop3' (0000000074924ac0): kobject_uevent_env kobject: 'loop3' (0000000074924ac0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop0' (0000000006070e37): kobject_uevent_env kobject: 'loop0' (0000000006070e37): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop1' (0000000011a9d3dc): kobject_uevent_env kobject: 'loop1' (0000000011a9d3dc): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop0' (0000000006070e37): kobject_uevent_env kobject: 'loop0' (0000000006070e37): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop2' (000000009ec8aa3e): kobject_uevent_env kobject: 'loop2' (000000009ec8aa3e): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop3' (0000000074924ac0): kobject_uevent_env kobject: 'loop3' (0000000074924ac0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop0' (0000000006070e37): kobject_uevent_env kobject: 'loop0' (0000000006070e37): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop2' (000000009ec8aa3e): kobject_uevent_env kobject: 'loop2' (000000009ec8aa3e): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop4' (00000000f5c5f547): kobject_uevent_env kobject: 'loop4' (00000000f5c5f547): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop5' (00000000ab8b2d14): kobject_uevent_env kobject: 'loop5' (00000000ab8b2d14): fill_kobj_path: path = '/devices/virtual/block/loop5' TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. kobject: 'loop0' (0000000006070e37): kobject_uevent_env kobject: 'loop0' (0000000006070e37): fill_kobj_path: path = '/devices/virtual/block/loop0' TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. kobject: 'loop1' (0000000011a9d3dc): kobject_uevent_env kobject: 'loop1' (0000000011a9d3dc): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop4' (00000000f5c5f547): kobject_uevent_env kobject: 'loop4' (00000000f5c5f547): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop3' (0000000074924ac0): kobject_uevent_env kobject: 'loop3' (0000000074924ac0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop2' (000000009ec8aa3e): kobject_uevent_env kobject: 'loop2' (000000009ec8aa3e): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop4' (00000000f5c5f547): kobject_uevent_env kobject: 'loop4' (00000000f5c5f547): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop0' (0000000006070e37): kobject_uevent_env kobject: 'loop0' (0000000006070e37): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop3' (0000000074924ac0): kobject_uevent_env kobject: 'loop3' (0000000074924ac0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop2' (000000009ec8aa3e): kobject_uevent_env kobject: 'loop2' (000000009ec8aa3e): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop5' (00000000ab8b2d14): kobject_uevent_env kobject: 'loop5' (00000000ab8b2d14): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'regulatory.0' (00000000b568e2f5): kobject_uevent_env kobject: 'regulatory.0' (00000000b568e2f5): fill_kobj_path: path = '/devices/platform/regulatory.0' kobject: 'loop1' (0000000011a9d3dc): kobject_uevent_env kobject: 'loop1' (0000000011a9d3dc): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop0' (0000000006070e37): kobject_uevent_env kobject: 'loop0' (0000000006070e37): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop4' (00000000f5c5f547): kobject_uevent_env kobject: 'loop4' (00000000f5c5f547): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop3' (0000000074924ac0): kobject_uevent_env kobject: 'loop3' (0000000074924ac0): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop2' (000000009ec8aa3e): kobject_uevent_env kobject: 'loop2' (000000009ec8aa3e): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop1' (0000000011a9d3dc): kobject_uevent_env kobject: 'loop1' (0000000011a9d3dc): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop5' (00000000ab8b2d14): kobject_uevent_env kobject: 'loop5' (00000000ab8b2d14): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop0' (0000000006070e37): kobject_uevent_env kobject: 'loop0' (0000000006070e37): fill_kobj_path: path = '/devices/virtual/block/loop0'