======================================================
WARNING: possible circular locking dependency detected
4.20.0+ #3 Not tainted
------------------------------------------------------
swapper/1/0 is trying to acquire lock:
000000006ee01ec3 (nr_list_lock){+.-.}, at: spin_lock_bh include/linux/spinlock.h:334 [inline]
000000006ee01ec3 (nr_list_lock){+.-.}, at: nr_remove_socket net/netrom/af_netrom.c:96 [inline]
000000006ee01ec3 (nr_list_lock){+.-.}, at: nr_destroy_socket+0x96/0x6e0 net/netrom/af_netrom.c:264
but task is already holding lock:
00000000b89d7fe6 (slock-AF_NETROM){+.-.}, at: spin_lock include/linux/spinlock.h:329 [inline]
00000000b89d7fe6 (slock-AF_NETROM){+.-.}, at: nr_destroy_timer+0x32/0x90 net/netrom/af_netrom.c:247
which lock already depends on the new lock.
the existing dependency chain (in reverse order) is:
-> #1 (slock-AF_NETROM){+.-.}:
__raw_spin_lock include/linux/spinlock_api_smp.h:142 [inline]
_raw_spin_lock+0x2f/0x40 kernel/locking/spinlock.c:144
spin_lock include/linux/spinlock.h:329 [inline]
nr_find_listener net/netrom/af_netrom.c:156 [inline]
nr_rx_frame+0x60c/0x1d50 net/netrom/af_netrom.c:955
nr_loopback_timer+0x7b/0x170 net/netrom/nr_loopback.c:62
call_timer_fn+0x254/0x900 kernel/time/timer.c:1325
expire_timers kernel/time/timer.c:1362 [inline]
__run_timers+0x6fc/0xd50 kernel/time/timer.c:1681
run_timer_softirq+0x52/0xb0 kernel/time/timer.c:1694
__do_softirq+0x30b/0xb11 kernel/softirq.c:292
invoke_softirq kernel/softirq.c:373 [inline]
irq_exit+0x180/0x1d0 kernel/softirq.c:413
exiting_irq arch/x86/include/asm/apic.h:536 [inline]
smp_apic_timer_interrupt+0x1b7/0x760 arch/x86/kernel/apic/apic.c:1062
apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:807
-> #0 (nr_list_lock){+.-.}:
lock_acquire+0x1db/0x570 kernel/locking/lockdep.c:3841
__raw_spin_lock_bh include/linux/spinlock_api_smp.h:135 [inline]
_raw_spin_lock_bh+0x33/0x50 kernel/locking/spinlock.c:168
spin_lock_bh include/linux/spinlock.h:334 [inline]
nr_remove_socket net/netrom/af_netrom.c:96 [inline]
nr_destroy_socket+0x96/0x6e0 net/netrom/af_netrom.c:264
nr_destroy_timer+0x42/0x90 net/netrom/af_netrom.c:249
call_timer_fn+0x254/0x900 kernel/time/timer.c:1325
expire_timers kernel/time/timer.c:1362 [inline]
__run_timers+0x6fc/0xd50 kernel/time/timer.c:1681
run_timer_softirq+0x52/0xb0 kernel/time/timer.c:1694
__do_softirq+0x30b/0xb11 kernel/softirq.c:292
invoke_softirq kernel/softirq.c:373 [inline]
irq_exit+0x180/0x1d0 kernel/softirq.c:413
exiting_irq arch/x86/include/asm/apic.h:536 [inline]
smp_apic_timer_interrupt+0x1b7/0x760 arch/x86/kernel/apic/apic.c:1062
apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:807
native_safe_halt+0x2/0x10 arch/x86/include/asm/irqflags.h:57
arch_cpu_idle+0x10/0x20 arch/x86/kernel/process.c:555
default_idle_call+0x36/0x90 kernel/sched/idle.c:93
cpuidle_idle_call kernel/sched/idle.c:153 [inline]
do_idle+0x386/0x5d0 kernel/sched/idle.c:262
cpu_startup_entry+0x1b/0x20 kernel/sched/idle.c:353
start_secondary+0x435/0x620 arch/x86/kernel/smpboot.c:271
secondary_startup_64+0xa4/0xb0 arch/x86/kernel/head_64.S:243
other info that might help us debug this:
Possible unsafe locking scenario:
CPU0 CPU1
---- ----
lock(slock-AF_NETROM);
lock(nr_list_lock);
lock(slock-AF_NETROM);
lock(nr_list_lock);
*** DEADLOCK ***
2 locks held by swapper/1/0:
#0: 00000000b0a4416d ((&sk->sk_timer)#2){+.-.}, at: lockdep_copy_map include/linux/lockdep.h:171 [inline]
#0: 00000000b0a4416d ((&sk->sk_timer)#2){+.-.}, at: call_timer_fn+0x1b4/0x900 kernel/time/timer.c:1315
#1: 00000000b89d7fe6 (slock-AF_NETROM){+.-.}, at: spin_lock include/linux/spinlock.h:329 [inline]
#1: 00000000b89d7fe6 (slock-AF_NETROM){+.-.}, at: nr_destroy_timer+0x32/0x90 net/netrom/af_netrom.c:247
stack backtrace:
CPU: 1 PID: 0 Comm: swapper/1 Not tainted 4.20.0+ #3
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:77 [inline]
dump_stack+0x1db/0x2d0 lib/dump_stack.c:113
print_circular_bug.isra.0.cold+0x1cc/0x28f kernel/locking/lockdep.c:1224
check_prev_add kernel/locking/lockdep.c:1866 [inline]
check_prevs_add kernel/locking/lockdep.c:1979 [inline]
validate_chain kernel/locking/lockdep.c:2350 [inline]
__lock_acquire+0x3014/0x4a30 kernel/locking/lockdep.c:3338
lock_acquire+0x1db/0x570 kernel/locking/lockdep.c:3841
__raw_spin_lock_bh include/linux/spinlock_api_smp.h:135 [inline]
_raw_spin_lock_bh+0x33/0x50 kernel/locking/spinlock.c:168
spin_lock_bh include/linux/spinlock.h:334 [inline]
nr_remove_socket net/netrom/af_netrom.c:96 [inline]
nr_destroy_socket+0x96/0x6e0 net/netrom/af_netrom.c:264
nr_destroy_timer+0x42/0x90 net/netrom/af_netrom.c:249
call_timer_fn+0x254/0x900 kernel/time/timer.c:1325
expire_timers kernel/time/timer.c:1362 [inline]
__run_timers+0x6fc/0xd50 kernel/time/timer.c:1681
run_timer_softirq+0x52/0xb0 kernel/time/timer.c:1694
__do_softirq+0x30b/0xb11 kernel/softirq.c:292
invoke_softirq kernel/softirq.c:373 [inline]
irq_exit+0x180/0x1d0 kernel/softirq.c:413
exiting_irq arch/x86/include/asm/apic.h:536 [inline]
smp_apic_timer_interrupt+0x1b7/0x760 arch/x86/kernel/apic/apic.c:1062
apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:807
RIP: 0010:native_safe_halt+0x2/0x10 arch/x86/include/asm/irqflags.h:58
Code: ff ff ff 48 89 c7 48 89 45 d8 e8 c9 1a ce f9 48 8b 45 d8 e9 ce fe ff ff 48 89 df e8 b8 1a ce f9 eb 82 90 90 90 90 90 90 fb f4 0f 1f 00 66 2e 0f 1f 84 00 00 00 00 00 f4 c3 90 90 90 90 90 90
RSP: 0018:ffff8880a9e97cd0 EFLAGS: 00000282 ORIG_RAX: ffffffffffffff13
RAX: 1ffffffff1324a09 RBX: 1ffff110153d2f9d RCX: 0000000000000000
RDX: dffffc0000000000 RSI: 0000000000000001 RDI: ffff8880a9e86bbc
RBP: ffff8880a9e97d90 R08: ffff8880a9e86340 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000001
R13: ffff8880a9e97d68 R14: 0000000000000000 R15: ffffffff89925038
arch_cpu_idle+0x10/0x20 arch/x86/kernel/process.c:555
default_idle_call+0x36/0x90 kernel/sched/idle.c:93
cpuidle_idle_call kernel/sched/idle.c:153 [inline]
do_idle+0x386/0x5d0 kernel/sched/idle.c:262
cpu_startup_entry+0x1b/0x20 kernel/sched/idle.c:353
start_secondary+0x435/0x620 arch/x86/kernel/smpboot.c:271
secondary_startup_64+0xa4/0xb0 arch/x86/kernel/head_64.S:243
kobject: 'loop0' (0000000006070e37): kobject_uevent_env
kobject: 'loop0' (0000000006070e37): fill_kobj_path: path = '/devices/virtual/block/loop0'
audit: type=1804 audit(1547296666.393:426): pid=1138 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir996624127/syzkaller.ScQGM9/3071/memory.events" dev="sda1" ino=17271 res=1
TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters.
kobject: 'loop1' (0000000011a9d3dc): kobject_uevent_env
kobject: 'loop1' (0000000011a9d3dc): fill_kobj_path: path = '/devices/virtual/block/loop1'
audit: type=1804 audit(1547296666.453:427): pid=1138 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir996624127/syzkaller.ScQGM9/3071/memory.events" dev="sda1" ino=17271 res=1
audit: type=1804 audit(1547296666.473:428): pid=1138 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir996624127/syzkaller.ScQGM9/3071/memory.events" dev="sda1" ino=17271 res=1
audit: type=1804 audit(1547296666.473:429): pid=1148 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir996624127/syzkaller.ScQGM9/3071/memory.events" dev="sda1" ino=17271 res=1
kobject: 'loop1' (0000000011a9d3dc): kobject_uevent_env
kobject: 'loop1' (0000000011a9d3dc): fill_kobj_path: path = '/devices/virtual/block/loop1'
kobject: 'loop2' (000000009ec8aa3e): kobject_uevent_env
kobject: 'loop2' (000000009ec8aa3e): fill_kobj_path: path = '/devices/virtual/block/loop2'
kobject: 'loop4' (00000000f5c5f547): kobject_uevent_env
kobject: 'loop4' (00000000f5c5f547): fill_kobj_path: path = '/devices/virtual/block/loop4'
kobject: 'loop3' (0000000074924ac0): kobject_uevent_env
kobject: 'loop3' (0000000074924ac0): fill_kobj_path: path = '/devices/virtual/block/loop3'
kobject: 'loop0' (0000000006070e37): kobject_uevent_env
kobject: 'loop0' (0000000006070e37): fill_kobj_path: path = '/devices/virtual/block/loop0'
audit: type=1804 audit(1547296666.673:430): pid=1160 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir996624127/syzkaller.ScQGM9/3072/memory.events" dev="sda1" ino=17269 res=1
kobject: 'loop1' (0000000011a9d3dc): kobject_uevent_env
kobject: 'loop1' (0000000011a9d3dc): fill_kobj_path: path = '/devices/virtual/block/loop1'
audit: type=1804 audit(1547296666.713:431): pid=1160 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir996624127/syzkaller.ScQGM9/3072/memory.events" dev="sda1" ino=17269 res=1
kobject: 'loop0' (0000000006070e37): kobject_uevent_env
kobject: 'loop0' (0000000006070e37): fill_kobj_path: path = '/devices/virtual/block/loop0'
kobject: 'loop2' (000000009ec8aa3e): kobject_uevent_env
kobject: 'loop2' (000000009ec8aa3e): fill_kobj_path: path = '/devices/virtual/block/loop2'
kobject: 'loop3' (0000000074924ac0): kobject_uevent_env
kobject: 'loop3' (0000000074924ac0): fill_kobj_path: path = '/devices/virtual/block/loop3'
kobject: 'loop1' (0000000011a9d3dc): kobject_uevent_env
kobject: 'loop1' (0000000011a9d3dc): fill_kobj_path: path = '/devices/virtual/block/loop1'
kobject: 'loop5' (00000000ab8b2d14): kobject_uevent_env
TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters.
kobject: 'loop5' (00000000ab8b2d14): fill_kobj_path: path = '/devices/virtual/block/loop5'
audit: type=1804 audit(1547296667.323:432): pid=1191 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir996624127/syzkaller.ScQGM9/3073/memory.events" dev="sda1" ino=17288 res=1
kobject: 'loop4' (00000000f5c5f547): kobject_uevent_env
audit: type=1804 audit(1547296667.323:433): pid=1191 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir996624127/syzkaller.ScQGM9/3073/memory.events" dev="sda1" ino=17288 res=1
kobject: 'loop4' (00000000f5c5f547): fill_kobj_path: path = '/devices/virtual/block/loop4'
kobject: 'loop2' (000000009ec8aa3e): kobject_uevent_env
kobject: 'loop2' (000000009ec8aa3e): fill_kobj_path: path = '/devices/virtual/block/loop2'
audit: type=1804 audit(1547296667.483:434): pid=1211 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir996624127/syzkaller.ScQGM9/3074/memory.events" dev="sda1" ino=17288 res=1
kobject: 'loop0' (0000000006070e37): kobject_uevent_env
kobject: 'loop0' (0000000006070e37): fill_kobj_path: path = '/devices/virtual/block/loop0'
TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters.
kobject: 'loop1' (0000000011a9d3dc): kobject_uevent_env
kobject: 'loop1' (0000000011a9d3dc): fill_kobj_path: path = '/devices/virtual/block/loop1'
kobject: 'loop3' (0000000074924ac0): kobject_uevent_env
audit: type=1804 audit(1547296667.483:435): pid=1211 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir996624127/syzkaller.ScQGM9/3074/memory.events" dev="sda1" ino=17288 res=1
kobject: 'loop3' (0000000074924ac0): fill_kobj_path: path = '/devices/virtual/block/loop3'
kobject: 'loop1' (0000000011a9d3dc): kobject_uevent_env
kobject: 'loop1' (0000000011a9d3dc): fill_kobj_path: path = '/devices/virtual/block/loop1'
kobject: 'loop0' (0000000006070e37): kobject_uevent_env
kobject: 'loop0' (0000000006070e37): fill_kobj_path: path = '/devices/virtual/block/loop0'
kobject: 'loop1' (0000000011a9d3dc): kobject_uevent_env
kobject: 'loop1' (0000000011a9d3dc): fill_kobj_path: path = '/devices/virtual/block/loop1'
kobject: 'loop3' (0000000074924ac0): kobject_uevent_env
kobject: 'loop3' (0000000074924ac0): fill_kobj_path: path = '/devices/virtual/block/loop3'
kobject: 'loop4' (00000000f5c5f547): kobject_uevent_env
kobject: 'loop4' (00000000f5c5f547): fill_kobj_path: path = '/devices/virtual/block/loop4'
kobject: 'loop5' (00000000ab8b2d14): kobject_uevent_env
kobject: 'loop5' (00000000ab8b2d14): fill_kobj_path: path = '/devices/virtual/block/loop5'
TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters.
audit: type=1804 audit(1547296668.163:436): pid=1235 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir996624127/syzkaller.ScQGM9/3075/memory.events" dev="sda1" ino=17301 res=1
kobject: 'loop4' (00000000f5c5f547): kobject_uevent_env
kobject: 'loop4' (00000000f5c5f547): fill_kobj_path: path = '/devices/virtual/block/loop4'
audit: type=1804 audit(1547296668.163:437): pid=1235 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir996624127/syzkaller.ScQGM9/3075/memory.events" dev="sda1" ino=17301 res=1
kobject: 'loop2' (000000009ec8aa3e): kobject_uevent_env
kobject: 'loop2' (000000009ec8aa3e): fill_kobj_path: path = '/devices/virtual/block/loop2'
audit: type=1804 audit(1547296668.293:438): pid=1248 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir996624127/syzkaller.ScQGM9/3076/memory.events" dev="sda1" ino=17290 res=1
kobject: 'loop1' (0000000011a9d3dc): kobject_uevent_env
kobject: 'loop1' (0000000011a9d3dc): fill_kobj_path: path = '/devices/virtual/block/loop1'
audit: type=1804 audit(1547296668.303:439): pid=1248 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir996624127/syzkaller.ScQGM9/3076/memory.events" dev="sda1" ino=17290 res=1
kobject: 'loop0' (0000000006070e37): kobject_uevent_env
kobject: 'regulatory.0' (00000000b568e2f5): kobject_uevent_env
kobject: 'loop0' (0000000006070e37): fill_kobj_path: path = '/devices/virtual/block/loop0'
kobject: 'regulatory.0' (00000000b568e2f5): fill_kobj_path: path = '/devices/platform/regulatory.0'
kobject: 'loop4' (00000000f5c5f547): kobject_uevent_env
audit: type=1804 audit(1547296668.403:440): pid=1255 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir996624127/syzkaller.ScQGM9/3077/memory.events" dev="sda1" ino=17289 res=1
kobject: 'loop4' (00000000f5c5f547): fill_kobj_path: path = '/devices/virtual/block/loop4'
audit: type=1804 audit(1547296668.403:441): pid=1255 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir996624127/syzkaller.ScQGM9/3077/memory.events" dev="sda1" ino=17289 res=1
kobject: 'loop3' (0000000074924ac0): kobject_uevent_env
kobject: 'loop3' (0000000074924ac0): fill_kobj_path: path = '/devices/virtual/block/loop3'
kobject: 'loop0' (0000000006070e37): kobject_uevent_env
kobject: 'loop0' (0000000006070e37): fill_kobj_path: path = '/devices/virtual/block/loop0'
kobject: 'loop1' (0000000011a9d3dc): kobject_uevent_env
kobject: 'loop1' (0000000011a9d3dc): fill_kobj_path: path = '/devices/virtual/block/loop1'
kobject: 'loop4' (00000000f5c5f547): kobject_uevent_env
kobject: 'loop4' (00000000f5c5f547): fill_kobj_path: path = '/devices/virtual/block/loop4'
kobject: 'loop5' (00000000ab8b2d14): kobject_uevent_env
kobject: 'loop5' (00000000ab8b2d14): fill_kobj_path: path = '/devices/virtual/block/loop5'
kobject: 'loop0' (0000000006070e37): kobject_uevent_env
kobject: 'loop0' (0000000006070e37): fill_kobj_path: path = '/devices/virtual/block/loop0'
kobject: 'loop1' (0000000011a9d3dc): kobject_uevent_env
kobject: 'loop1' (0000000011a9d3dc): fill_kobj_path: path = '/devices/virtual/block/loop1'
kobject: 'loop4' (00000000f5c5f547): kobject_uevent_env
kobject: 'loop4' (00000000f5c5f547): fill_kobj_path: path = '/devices/virtual/block/loop4'
kobject: 'loop3' (0000000074924ac0): kobject_uevent_env
kobject: 'loop3' (0000000074924ac0): fill_kobj_path: path = '/devices/virtual/block/loop3'
kobject: 'loop2' (000000009ec8aa3e): kobject_uevent_env
kobject: 'loop2' (000000009ec8aa3e): fill_kobj_path: path = '/devices/virtual/block/loop2'
kobject: 'loop0' (0000000006070e37): kobject_uevent_env
kobject: 'loop0' (0000000006070e37): fill_kobj_path: path = '/devices/virtual/block/loop0'
kobject: 'loop4' (00000000f5c5f547): kobject_uevent_env
kobject: 'loop4' (00000000f5c5f547): fill_kobj_path: path = '/devices/virtual/block/loop4'
kobject: 'loop2' (000000009ec8aa3e): kobject_uevent_env
kobject: 'loop2' (000000009ec8aa3e): fill_kobj_path: path = '/devices/virtual/block/loop2'
kobject: 'loop1' (0000000011a9d3dc): kobject_uevent_env
kobject: 'loop1' (0000000011a9d3dc): fill_kobj_path: path = '/devices/virtual/block/loop1'
kobject: 'loop3' (0000000074924ac0): kobject_uevent_env
kobject: 'loop3' (0000000074924ac0): fill_kobj_path: path = '/devices/virtual/block/loop3'
kobject: 'loop5' (00000000ab8b2d14): kobject_uevent_env
kobject: 'loop5' (00000000ab8b2d14): fill_kobj_path: path = '/devices/virtual/block/loop5'
kobject: 'loop4' (00000000f5c5f547): kobject_uevent_env
kobject: 'loop4' (00000000f5c5f547): fill_kobj_path: path = '/devices/virtual/block/loop4'
TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters.
kobject: 'loop0' (0000000006070e37): kobject_uevent_env
kobject: 'loop0' (0000000006070e37): fill_kobj_path: path = '/devices/virtual/block/loop0'
kobject: 'loop2' (000000009ec8aa3e): kobject_uevent_env
kobject: 'loop2' (000000009ec8aa3e): fill_kobj_path: path = '/devices/virtual/block/loop2'
kobject: 'loop1' (0000000011a9d3dc): kobject_uevent_env
kobject: 'loop1' (0000000011a9d3dc): fill_kobj_path: path = '/devices/virtual/block/loop1'
TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters.
kobject: 'loop3' (0000000074924ac0): kobject_uevent_env
kobject: 'loop3' (0000000074924ac0): fill_kobj_path: path = '/devices/virtual/block/loop3'
kobject: 'loop4' (00000000f5c5f547): kobject_uevent_env
kobject: 'loop4' (00000000f5c5f547): fill_kobj_path: path = '/devices/virtual/block/loop4'
kobject: 'loop1' (0000000011a9d3dc): kobject_uevent_env
kobject: 'loop1' (0000000011a9d3dc): fill_kobj_path: path = '/devices/virtual/block/loop1'
kobject: 'loop2' (000000009ec8aa3e): kobject_uevent_env
kobject: 'loop2' (000000009ec8aa3e): fill_kobj_path: path = '/devices/virtual/block/loop2'
kobject: 'loop4' (00000000f5c5f547): kobject_uevent_env
kobject: 'loop4' (00000000f5c5f547): fill_kobj_path: path = '/devices/virtual/block/loop4'
kobject: 'loop3' (0000000074924ac0): kobject_uevent_env
kobject: 'loop3' (0000000074924ac0): fill_kobj_path: path = '/devices/virtual/block/loop3'
kobject: 'loop5' (00000000ab8b2d14): kobject_uevent_env
kobject: 'loop5' (00000000ab8b2d14): fill_kobj_path: path = '/devices/virtual/block/loop5'
kobject: 'loop4' (00000000f5c5f547): kobject_uevent_env
TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters.
kobject: 'loop4' (00000000f5c5f547): fill_kobj_path: path = '/devices/virtual/block/loop4'
kobject: 'loop1' (0000000011a9d3dc): kobject_uevent_env
kobject: 'loop1' (0000000011a9d3dc): fill_kobj_path: path = '/devices/virtual/block/loop1'
kobject: 'loop2' (000000009ec8aa3e): kobject_uevent_env
kobject: 'loop2' (000000009ec8aa3e): fill_kobj_path: path = '/devices/virtual/block/loop2'
kobject: 'loop0' (0000000006070e37): kobject_uevent_env
kobject: 'loop0' (0000000006070e37): fill_kobj_path: path = '/devices/virtual/block/loop0'
kobject: 'loop3' (0000000074924ac0): kobject_uevent_env
kobject: 'loop3' (0000000074924ac0): fill_kobj_path: path = '/devices/virtual/block/loop3'
kobject: 'loop2' (000000009ec8aa3e): kobject_uevent_env
kobject: 'loop2' (000000009ec8aa3e): fill_kobj_path: path = '/devices/virtual/block/loop2'
kobject: 'loop4' (00000000f5c5f547): kobject_uevent_env
kobject: 'loop4' (00000000f5c5f547): fill_kobj_path: path = '/devices/virtual/block/loop4'
kobject: 'loop0' (0000000006070e37): kobject_uevent_env
kobject: 'loop0' (0000000006070e37): fill_kobj_path: path = '/devices/virtual/block/loop0'
kobject: 'loop5' (00000000ab8b2d14): kobject_uevent_env
kobject: 'loop5' (00000000ab8b2d14): fill_kobj_path: path = '/devices/virtual/block/loop5'
kobject: 'loop0' (0000000006070e37): kobject_uevent_env
TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters.
kobject: 'loop0' (0000000006070e37): fill_kobj_path: path = '/devices/virtual/block/loop0'
kobject: 'regulatory.0' (00000000b568e2f5): kobject_uevent_env
kobject: 'regulatory.0' (00000000b568e2f5): fill_kobj_path: path = '/devices/platform/regulatory.0'
kobject: 'loop2' (000000009ec8aa3e): kobject_uevent_env
kobject: 'loop2' (000000009ec8aa3e): fill_kobj_path: path = '/devices/virtual/block/loop2'
kobject: 'loop4' (00000000f5c5f547): kobject_uevent_env
kobject: 'loop4' (00000000f5c5f547): fill_kobj_path: path = '/devices/virtual/block/loop4'
kobject: 'loop1' (0000000011a9d3dc): kobject_uevent_env
TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters.
kobject: 'loop1' (0000000011a9d3dc): fill_kobj_path: path = '/devices/virtual/block/loop1'
kobject: 'loop0' (0000000006070e37): kobject_uevent_env
kobject: 'loop0' (0000000006070e37): fill_kobj_path: path = '/devices/virtual/block/loop0'
kobject: 'loop3' (0000000074924ac0): kobject_uevent_env
kobject: 'loop3' (0000000074924ac0): fill_kobj_path: path = '/devices/virtual/block/loop3'
kobject: 'loop5' (00000000ab8b2d14): kobject_uevent_env
kobject: 'loop5' (00000000ab8b2d14): fill_kobj_path: path = '/devices/virtual/block/loop5'
kobject: 'loop2' (000000009ec8aa3e): kobject_uevent_env
kobject: 'loop2' (000000009ec8aa3e): fill_kobj_path: path = '/devices/virtual/block/loop2'
kobject: 'loop4' (00000000f5c5f547): kobject_uevent_env
kobject: 'loop4' (00000000f5c5f547): fill_kobj_path: path = '/devices/virtual/block/loop4'
kobject: 'loop0' (0000000006070e37): kobject_uevent_env
kobject: 'loop0' (0000000006070e37): fill_kobj_path: path = '/devices/virtual/block/loop0'
kobject: 'loop5' (00000000ab8b2d14): kobject_uevent_env
kobject: 'loop5' (00000000ab8b2d14): fill_kobj_path: path = '/devices/virtual/block/loop5'
kobject: 'loop1' (0000000011a9d3dc): kobject_uevent_env
kobject: 'loop1' (0000000011a9d3dc): fill_kobj_path: path = '/devices/virtual/block/loop1'
kobject: 'loop1' (0000000011a9d3dc): kobject_uevent_env
kobject: 'loop1' (0000000011a9d3dc): fill_kobj_path: path = '/devices/virtual/block/loop1'
kobject: 'loop5' (00000000ab8b2d14): kobject_uevent_env
kobject: 'loop5' (00000000ab8b2d14): fill_kobj_path: path = '/devices/virtual/block/loop5'
kauditd_printk_skb: 36 callbacks suppressed
audit: type=1804 audit(1547296672.333:478): pid=1474 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir996624127/syzkaller.ScQGM9/3090/memory.events" dev="sda1" ino=17326 res=1
kobject: 'loop0' (0000000006070e37): kobject_uevent_env
audit: type=1804 audit(1547296672.373:479): pid=1474 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir996624127/syzkaller.ScQGM9/3090/memory.events" dev="sda1" ino=17326 res=1
kobject: 'loop0' (0000000006070e37): fill_kobj_path: path = '/devices/virtual/block/loop0'
TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters.
kobject: 'loop4' (00000000f5c5f547): kobject_uevent_env
kobject: 'loop4' (00000000f5c5f547): fill_kobj_path: path = '/devices/virtual/block/loop4'
audit: type=1804 audit(1547296672.433:480): pid=1479 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir063899760/syzkaller.1Eifsu/252/memory.events" dev="sda1" ino=17319 res=1
kobject: 'loop3' (0000000074924ac0): kobject_uevent_env
audit: type=1804 audit(1547296672.433:481): pid=1479 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir063899760/syzkaller.1Eifsu/252/memory.events" dev="sda1" ino=17319 res=1
kobject: 'loop3' (0000000074924ac0): fill_kobj_path: path = '/devices/virtual/block/loop3'
audit: type=1804 audit(1547296672.523:482): pid=1486 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir996624127/syzkaller.ScQGM9/3091/memory.events" dev="sda1" ino=17322 res=1
kobject: 'loop1' (0000000011a9d3dc): kobject_uevent_env
audit: type=1804 audit(1547296672.523:483): pid=1486 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir996624127/syzkaller.ScQGM9/3091/memory.events" dev="sda1" ino=17322 res=1
kobject: 'loop1' (0000000011a9d3dc): fill_kobj_path: path = '/devices/virtual/block/loop1'
audit: type=1804 audit(1547296672.623:484): pid=1489 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir063899760/syzkaller.1Eifsu/253/memory.events" dev="sda1" ino=16562 res=1
kobject: 'loop5' (00000000ab8b2d14): kobject_uevent_env
audit: type=1804 audit(1547296672.663:485): pid=1489 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir063899760/syzkaller.1Eifsu/253/memory.events" dev="sda1" ino=16562 res=1
kobject: 'loop5' (00000000ab8b2d14): fill_kobj_path: path = '/devices/virtual/block/loop5'
kobject: 'loop2' (000000009ec8aa3e): kobject_uevent_env
kobject: 'loop2' (000000009ec8aa3e): fill_kobj_path: path = '/devices/virtual/block/loop2'
kobject: 'loop0' (0000000006070e37): kobject_uevent_env
kobject: 'loop0' (0000000006070e37): fill_kobj_path: path = '/devices/virtual/block/loop0'
kobject: 'loop1' (0000000011a9d3dc): kobject_uevent_env
kobject: 'loop1' (0000000011a9d3dc): fill_kobj_path: path = '/devices/virtual/block/loop1'
kobject: 'loop3' (0000000074924ac0): kobject_uevent_env
kobject: 'loop3' (0000000074924ac0): fill_kobj_path: path = '/devices/virtual/block/loop3'
kobject: 'loop5' (00000000ab8b2d14): kobject_uevent_env
kobject: 'loop5' (00000000ab8b2d14): fill_kobj_path: path = '/devices/virtual/block/loop5'
kobject: 'loop1' (0000000011a9d3dc): kobject_uevent_env
kobject: 'loop1' (0000000011a9d3dc): fill_kobj_path: path = '/devices/virtual/block/loop1'
kobject: 'loop0' (0000000006070e37): kobject_uevent_env
kobject: 'loop0' (0000000006070e37): fill_kobj_path: path = '/devices/virtual/block/loop0'
kobject: 'loop2' (000000009ec8aa3e): kobject_uevent_env
kobject: 'loop2' (000000009ec8aa3e): fill_kobj_path: path = '/devices/virtual/block/loop2'
kobject: 'loop1' (0000000011a9d3dc): kobject_uevent_env
kobject: 'loop1' (0000000011a9d3dc): fill_kobj_path: path = '/devices/virtual/block/loop1'
kobject: 'loop0' (0000000006070e37): kobject_uevent_env
kobject: 'loop0' (0000000006070e37): fill_kobj_path: path = '/devices/virtual/block/loop0'
kobject: 'loop2' (000000009ec8aa3e): kobject_uevent_env
kobject: 'loop2' (000000009ec8aa3e): fill_kobj_path: path = '/devices/virtual/block/loop2'
kobject: 'loop1' (0000000011a9d3dc): kobject_uevent_env
kobject: 'loop1' (0000000011a9d3dc): fill_kobj_path: path = '/devices/virtual/block/loop1'
kobject: 'loop1' (0000000011a9d3dc): kobject_uevent_env
kobject: 'loop1' (0000000011a9d3dc): fill_kobj_path: path = '/devices/virtual/block/loop1'
kobject: 'loop0' (0000000006070e37): kobject_uevent_env
kobject: 'loop0' (0000000006070e37): fill_kobj_path: path = '/devices/virtual/block/loop0'
kobject: 'loop2' (000000009ec8aa3e): kobject_uevent_env
kobject: 'loop2' (000000009ec8aa3e): fill_kobj_path: path = '/devices/virtual/block/loop2'
kobject: 'loop4' (00000000f5c5f547): kobject_uevent_env
kobject: 'loop4' (00000000f5c5f547): fill_kobj_path: path = '/devices/virtual/block/loop4'
kobject: 'loop3' (0000000074924ac0): kobject_uevent_env
kobject: 'loop3' (0000000074924ac0): fill_kobj_path: path = '/devices/virtual/block/loop3'
audit: type=1804 audit(1547296673.253:486): pid=1528 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir063899760/syzkaller.1Eifsu/254/memory.events" dev="sda1" ino=17338 res=1
TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters.
kobject: 'loop2' (000000009ec8aa3e): kobject_uevent_env
kobject: 'loop2' (000000009ec8aa3e): fill_kobj_path: path = '/devices/virtual/block/loop2'
audit: type=1804 audit(1547296673.293:487): pid=1533 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir996624127/syzkaller.ScQGM9/3092/memory.events" dev="sda1" ino=17017 res=1
kobject: 'loop4' (00000000f5c5f547): kobject_uevent_env
kobject: 'loop4' (00000000f5c5f547): fill_kobj_path: path = '/devices/virtual/block/loop4'
kobject: 'loop1' (0000000011a9d3dc): kobject_uevent_env
kobject: 'loop1' (0000000011a9d3dc): fill_kobj_path: path = '/devices/virtual/block/loop1'
kobject: 'loop3' (0000000074924ac0): kobject_uevent_env
kobject: 'loop3' (0000000074924ac0): fill_kobj_path: path = '/devices/virtual/block/loop3'
kobject: 'loop0' (0000000006070e37): kobject_uevent_env
kobject: 'loop0' (0000000006070e37): fill_kobj_path: path = '/devices/virtual/block/loop0'
kobject: 'loop1' (0000000011a9d3dc): kobject_uevent_env
kobject: 'loop1' (0000000011a9d3dc): fill_kobj_path: path = '/devices/virtual/block/loop1'
kobject: 'loop0' (0000000006070e37): kobject_uevent_env
kobject: 'loop0' (0000000006070e37): fill_kobj_path: path = '/devices/virtual/block/loop0'
kobject: 'loop2' (000000009ec8aa3e): kobject_uevent_env
kobject: 'loop2' (000000009ec8aa3e): fill_kobj_path: path = '/devices/virtual/block/loop2'
kobject: 'loop3' (0000000074924ac0): kobject_uevent_env
kobject: 'loop3' (0000000074924ac0): fill_kobj_path: path = '/devices/virtual/block/loop3'
kobject: 'loop0' (0000000006070e37): kobject_uevent_env
kobject: 'loop0' (0000000006070e37): fill_kobj_path: path = '/devices/virtual/block/loop0'
kobject: 'loop2' (000000009ec8aa3e): kobject_uevent_env
kobject: 'loop2' (000000009ec8aa3e): fill_kobj_path: path = '/devices/virtual/block/loop2'
kobject: 'loop4' (00000000f5c5f547): kobject_uevent_env
kobject: 'loop4' (00000000f5c5f547): fill_kobj_path: path = '/devices/virtual/block/loop4'
kobject: 'loop5' (00000000ab8b2d14): kobject_uevent_env
kobject: 'loop5' (00000000ab8b2d14): fill_kobj_path: path = '/devices/virtual/block/loop5'
TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters.
kobject: 'loop0' (0000000006070e37): kobject_uevent_env
kobject: 'loop0' (0000000006070e37): fill_kobj_path: path = '/devices/virtual/block/loop0'
TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters.
kobject: 'loop1' (0000000011a9d3dc): kobject_uevent_env
kobject: 'loop1' (0000000011a9d3dc): fill_kobj_path: path = '/devices/virtual/block/loop1'
kobject: 'loop4' (00000000f5c5f547): kobject_uevent_env
kobject: 'loop4' (00000000f5c5f547): fill_kobj_path: path = '/devices/virtual/block/loop4'
kobject: 'loop3' (0000000074924ac0): kobject_uevent_env
kobject: 'loop3' (0000000074924ac0): fill_kobj_path: path = '/devices/virtual/block/loop3'
kobject: 'loop2' (000000009ec8aa3e): kobject_uevent_env
kobject: 'loop2' (000000009ec8aa3e): fill_kobj_path: path = '/devices/virtual/block/loop2'
kobject: 'loop4' (00000000f5c5f547): kobject_uevent_env
kobject: 'loop4' (00000000f5c5f547): fill_kobj_path: path = '/devices/virtual/block/loop4'
kobject: 'loop0' (0000000006070e37): kobject_uevent_env
kobject: 'loop0' (0000000006070e37): fill_kobj_path: path = '/devices/virtual/block/loop0'
kobject: 'loop3' (0000000074924ac0): kobject_uevent_env
kobject: 'loop3' (0000000074924ac0): fill_kobj_path: path = '/devices/virtual/block/loop3'
kobject: 'loop2' (000000009ec8aa3e): kobject_uevent_env
kobject: 'loop2' (000000009ec8aa3e): fill_kobj_path: path = '/devices/virtual/block/loop2'
kobject: 'loop5' (00000000ab8b2d14): kobject_uevent_env
kobject: 'loop5' (00000000ab8b2d14): fill_kobj_path: path = '/devices/virtual/block/loop5'
kobject: 'regulatory.0' (00000000b568e2f5): kobject_uevent_env
kobject: 'regulatory.0' (00000000b568e2f5): fill_kobj_path: path = '/devices/platform/regulatory.0'
kobject: 'loop1' (0000000011a9d3dc): kobject_uevent_env
kobject: 'loop1' (0000000011a9d3dc): fill_kobj_path: path = '/devices/virtual/block/loop1'
kobject: 'loop0' (0000000006070e37): kobject_uevent_env
kobject: 'loop0' (0000000006070e37): fill_kobj_path: path = '/devices/virtual/block/loop0'
kobject: 'loop4' (00000000f5c5f547): kobject_uevent_env
kobject: 'loop4' (00000000f5c5f547): fill_kobj_path: path = '/devices/virtual/block/loop4'
kobject: 'loop3' (0000000074924ac0): kobject_uevent_env
kobject: 'loop3' (0000000074924ac0): fill_kobj_path: path = '/devices/virtual/block/loop3'
kobject: 'loop2' (000000009ec8aa3e): kobject_uevent_env
kobject: 'loop2' (000000009ec8aa3e): fill_kobj_path: path = '/devices/virtual/block/loop2'
kobject: 'loop1' (0000000011a9d3dc): kobject_uevent_env
kobject: 'loop1' (0000000011a9d3dc): fill_kobj_path: path = '/devices/virtual/block/loop1'
kobject: 'loop5' (00000000ab8b2d14): kobject_uevent_env
kobject: 'loop5' (00000000ab8b2d14): fill_kobj_path: path = '/devices/virtual/block/loop5'
kobject: 'loop0' (0000000006070e37): kobject_uevent_env
kobject: 'loop0' (0000000006070e37): fill_kobj_path: path = '/devices/virtual/block/loop0'