====================================================== WARNING: possible circular locking dependency detected 4.19.0-rc8-next-20181019+ #98 Not tainted ------------------------------------------------------ syz-executor2/11792 is trying to acquire lock: 0000000060e82b93 (event_mutex){+.+.}, at: perf_trace_destroy+0x28/0x100 kernel/trace/trace_event_perf.c:236 but task is already holding lock: 0000000083ea1efd (&mm->mmap_sem){++++}, at: __do_sys_mremap mm/mremap.c:549 [inline] 0000000083ea1efd (&mm->mmap_sem){++++}, at: __se_sys_mremap mm/mremap.c:515 [inline] 0000000083ea1efd (&mm->mmap_sem){++++}, at: __x64_sys_mremap+0x3af/0xd70 mm/mremap.c:515 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: kobject: 'loop3' (00000000b1fa6296): kobject_uevent_env -> #3 (&mm->mmap_sem){++++}: down_write_killable+0x8d/0x150 kernel/locking/rwsem.c:84 dup_mmap kernel/fork.c:472 [inline] dup_mm kernel/fork.c:1318 [inline] copy_mm kernel/fork.c:1373 [inline] copy_process+0x3647/0x8770 kernel/fork.c:1917 kobject: 'loop3' (00000000b1fa6296): fill_kobj_path: path = '/devices/virtual/block/loop3' _do_fork+0x1cb/0x11c0 kernel/fork.c:2216 __do_sys_clone kernel/fork.c:2323 [inline] __se_sys_clone kernel/fork.c:2317 [inline] __x64_sys_clone+0xbf/0x150 kernel/fork.c:2317 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 kobject: 'loop0' (0000000030388c08): kobject_uevent_env entry_SYSCALL_64_after_hwframe+0x49/0xbe -> #2 (&dup_mmap_sem){++++}: down_write+0x8a/0x130 kernel/locking/rwsem.c:70 percpu_down_write+0xaf/0x540 kernel/locking/percpu-rwsem.c:145 register_for_each_vma+0xa0/0xee0 kernel/events/uprobes.c:1010 kobject: 'loop0' (0000000030388c08): fill_kobj_path: path = '/devices/virtual/block/loop0' __uprobe_register+0x513/0x880 kernel/events/uprobes.c:1142 uprobe_register_refctr+0x2d/0x40 kernel/events/uprobes.c:1164 probe_event_enable+0x888/0xee0 kernel/trace/trace_uprobe.c:968 kobject: 'loop5' (00000000bf4e3948): kobject_uevent_env trace_uprobe_register+0x4c9/0xcf0 kernel/trace/trace_uprobe.c:1258 perf_trace_event_reg kernel/trace/trace_event_perf.c:124 [inline] perf_trace_event_init+0x50b/0x990 kernel/trace/trace_event_perf.c:199 perf_uprobe_init+0x1f1/0x280 kernel/trace/trace_event_perf.c:329 kobject: 'loop5' (00000000bf4e3948): fill_kobj_path: path = '/devices/virtual/block/loop5' perf_uprobe_event_init+0x106/0x1a0 kernel/events/core.c:8503 perf_try_init_event+0x137/0x2f0 kernel/events/core.c:9770 perf_init_event kernel/events/core.c:9801 [inline] perf_event_alloc.part.94+0x1d54/0x3740 kernel/events/core.c:10074 perf_event_alloc kernel/events/core.c:10430 [inline] __do_sys_perf_event_open+0xada/0x3020 kernel/events/core.c:10531 __se_sys_perf_event_open kernel/events/core.c:10420 [inline] __x64_sys_perf_event_open+0xbe/0x150 kernel/events/core.c:10420 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe -> #1 (&uprobe->register_rwsem){+.+.}: down_write+0x8a/0x130 kernel/locking/rwsem.c:70 __uprobe_register+0x471/0x880 kernel/events/uprobes.c:1138 uprobe_register_refctr+0x2d/0x40 kernel/events/uprobes.c:1164 probe_event_enable+0x888/0xee0 kernel/trace/trace_uprobe.c:968 trace_uprobe_register+0x4c9/0xcf0 kernel/trace/trace_uprobe.c:1258 perf_trace_event_reg kernel/trace/trace_event_perf.c:124 [inline] perf_trace_event_init+0x50b/0x990 kernel/trace/trace_event_perf.c:199 perf_uprobe_init+0x1f1/0x280 kernel/trace/trace_event_perf.c:329 perf_uprobe_event_init+0x106/0x1a0 kernel/events/core.c:8503 perf_try_init_event+0x137/0x2f0 kernel/events/core.c:9770 perf_init_event kernel/events/core.c:9801 [inline] perf_event_alloc.part.94+0x1d54/0x3740 kernel/events/core.c:10074 perf_event_alloc kernel/events/core.c:10430 [inline] __do_sys_perf_event_open+0xada/0x3020 kernel/events/core.c:10531 __se_sys_perf_event_open kernel/events/core.c:10420 [inline] __x64_sys_perf_event_open+0xbe/0x150 kernel/events/core.c:10420 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe -> #0 (event_mutex){+.+.}: lock_acquire+0x1ed/0x520 kernel/locking/lockdep.c:3844 __mutex_lock_common kernel/locking/mutex.c:925 [inline] __mutex_lock+0x166/0x16f0 kernel/locking/mutex.c:1072 mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:1087 perf_trace_destroy+0x28/0x100 kernel/trace/trace_event_perf.c:236 tp_perf_event_destroy+0x15/0x20 kernel/events/core.c:8336 _free_event+0x414/0x1660 kernel/events/core.c:4446 put_event+0x48/0x60 kernel/events/core.c:4532 perf_mmap_close+0x62f/0x1220 kernel/events/core.c:5515 remove_vma+0xb1/0x180 mm/mmap.c:181 remove_vma_list mm/mmap.c:2574 [inline] __do_munmap+0x74c/0xf80 mm/mmap.c:2817 do_munmap+0x30/0x40 mm/mmap.c:2825 mremap_to+0x2e2/0x750 mm/mremap.c:457 __do_sys_mremap mm/mremap.c:553 [inline] __se_sys_mremap mm/mremap.c:515 [inline] __x64_sys_mremap+0xaa3/0xd70 mm/mremap.c:515 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe other info that might help us debug this: Chain exists of: event_mutex --> &dup_mmap_sem --> &mm->mmap_sem Possible unsafe locking scenario: CPU0 CPU1 ---- ---- lock(&mm->mmap_sem); lock(&dup_mmap_sem); lock(&mm->mmap_sem); lock(event_mutex); *** DEADLOCK *** 1 lock held by syz-executor2/11792: #0: 0000000083ea1efd (&mm->mmap_sem){++++}, at: __do_sys_mremap mm/mremap.c:549 [inline] #0: 0000000083ea1efd (&mm->mmap_sem){++++}, at: __se_sys_mremap mm/mremap.c:515 [inline] #0: 0000000083ea1efd (&mm->mmap_sem){++++}, at: __x64_sys_mremap+0x3af/0xd70 mm/mremap.c:515 stack backtrace: CPU: 0 PID: 11792 Comm: syz-executor2 Not tainted 4.19.0-rc8-next-20181019+ #98 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x244/0x39d lib/dump_stack.c:113 print_circular_bug.isra.35.cold.54+0x1bd/0x27d kernel/locking/lockdep.c:1221 check_prev_add kernel/locking/lockdep.c:1863 [inline] check_prevs_add kernel/locking/lockdep.c:1976 [inline] validate_chain kernel/locking/lockdep.c:2347 [inline] __lock_acquire+0x3399/0x4c20 kernel/locking/lockdep.c:3341 lock_acquire+0x1ed/0x520 kernel/locking/lockdep.c:3844 __mutex_lock_common kernel/locking/mutex.c:925 [inline] __mutex_lock+0x166/0x16f0 kernel/locking/mutex.c:1072 mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:1087 perf_trace_destroy+0x28/0x100 kernel/trace/trace_event_perf.c:236 tp_perf_event_destroy+0x15/0x20 kernel/events/core.c:8336 _free_event+0x414/0x1660 kernel/events/core.c:4446 put_event+0x48/0x60 kernel/events/core.c:4532 perf_mmap_close+0x62f/0x1220 kernel/events/core.c:5515 remove_vma+0xb1/0x180 mm/mmap.c:181 remove_vma_list mm/mmap.c:2574 [inline] __do_munmap+0x74c/0xf80 mm/mmap.c:2817 do_munmap+0x30/0x40 mm/mmap.c:2825 mremap_to+0x2e2/0x750 mm/mremap.c:457 __do_sys_mremap mm/mremap.c:553 [inline] __se_sys_mremap mm/mremap.c:515 [inline] __x64_sys_mremap+0xaa3/0xd70 mm/mremap.c:515 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457569 Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f1fda95fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000019 RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000457569 RDX: 0000000000800000 RSI: 0000000000002000 RDI: 000000002079c000 RBP: 000000000072bf00 R08: 00000000207fb000 R09: 0000000000000000 R10: 0000000000000003 R11: 0000000000000246 R12: 00007f1fda9606d4 R13: 00000000004c2976 R14: 00000000004d3e40 R15: 00000000ffffffff kobject: 'loop4' (0000000066bfc1da): kobject_uevent_env kobject: 'loop4' (0000000066bfc1da): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'kvm' (00000000bfb9d9a4): kobject_uevent_env kobject: 'kvm' (00000000bfb9d9a4): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop1' (00000000c5d2c7a9): kobject_uevent_env kobject: 'loop1' (00000000c5d2c7a9): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop2' (0000000043b5c5b4): kobject_uevent_env kobject: 'loop2' (0000000043b5c5b4): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'kvm' (00000000bfb9d9a4): kobject_uevent_env kobject: 'kvm' (00000000bfb9d9a4): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop5' (00000000bf4e3948): kobject_uevent_env kobject: 'kvm' (00000000bfb9d9a4): kobject_uevent_env kobject: 'loop0' (0000000030388c08): kobject_uevent_env kobject: 'loop0' (0000000030388c08): fill_kobj_path: path = '/devices/virtual/block/loop0' EXT4-fs (loop0): Couldn't mount because of unsupported optional features (29) kobject: 'kvm' (00000000bfb9d9a4): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop5' (00000000bf4e3948): fill_kobj_path: path = '/devices/virtual/block/loop5' EXT4-fs (loop0): couldn't mount as ext2 due to feature incompatibilities kobject: 'loop3' (00000000b1fa6296): kobject_uevent_env kobject: 'loop3' (00000000b1fa6296): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'kvm' (00000000bfb9d9a4): kobject_uevent_env kobject: 'kvm' (00000000bfb9d9a4): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop0' (0000000030388c08): kobject_uevent_env kobject: 'loop0' (0000000030388c08): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop0' (0000000030388c08): kobject_uevent_env kobject: 'loop2' (0000000043b5c5b4): kobject_uevent_env kobject: 'loop0' (0000000030388c08): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop2' (0000000043b5c5b4): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'kvm' (00000000bfb9d9a4): kobject_uevent_env kobject: 'loop0' (0000000030388c08): kobject_uevent_env kobject: 'kvm' (00000000bfb9d9a4): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop0' (0000000030388c08): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop5' (00000000bf4e3948): kobject_uevent_env kobject: 'loop5' (00000000bf4e3948): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop2' (0000000043b5c5b4): kobject_uevent_env kobject: 'loop2' (0000000043b5c5b4): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop5' (00000000bf4e3948): kobject_uevent_env kobject: 'loop5' (00000000bf4e3948): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'kvm' (00000000bfb9d9a4): kobject_uevent_env kobject: 'loop4' (0000000066bfc1da): kobject_uevent_env TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. kobject: 'loop4' (0000000066bfc1da): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop5' (00000000bf4e3948): kobject_uevent_env kobject: 'loop5' (00000000bf4e3948): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'kvm' (00000000bfb9d9a4): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop0' (0000000030388c08): kobject_uevent_env kobject: 'loop0' (0000000030388c08): kobject_uevent_env kobject: 'loop0' (0000000030388c08): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop0' (0000000030388c08): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop1' (00000000c5d2c7a9): kobject_uevent_env kobject: 'loop1' (00000000c5d2c7a9): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop5' (00000000bf4e3948): kobject_uevent_env kobject: 'loop5' (00000000bf4e3948): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop0' (0000000030388c08): kobject_uevent_env kobject: 'loop0' (0000000030388c08): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop1' (00000000c5d2c7a9): kobject_uevent_env kobject: 'loop1' (00000000c5d2c7a9): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop0' (0000000030388c08): kobject_uevent_env kobject: 'loop0' (0000000030388c08): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop4' (0000000066bfc1da): kobject_uevent_env kobject: 'loop4' (0000000066bfc1da): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop3' (00000000b1fa6296): kobject_uevent_env kobject: 'loop3' (00000000b1fa6296): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'kvm' (00000000bfb9d9a4): kobject_uevent_env kobject: 'kvm' (00000000bfb9d9a4): fill_kobj_path: path = '/devices/virtual/misc/kvm' TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. kobject: 'kvm' (00000000bfb9d9a4): kobject_uevent_env kobject: 'kvm' (00000000bfb9d9a4): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop5' (00000000bf4e3948): kobject_uevent_env kobject: 'loop5' (00000000bf4e3948): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop4' (0000000066bfc1da): kobject_uevent_env kobject: 'loop4' (0000000066bfc1da): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'kvm' (00000000bfb9d9a4): kobject_uevent_env kobject: 'loop5' (00000000bf4e3948): kobject_uevent_env kobject: 'kvm' (00000000bfb9d9a4): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop5' (00000000bf4e3948): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop2' (0000000043b5c5b4): kobject_uevent_env kobject: 'kvm' (00000000bfb9d9a4): kobject_uevent_env kobject: 'loop2' (0000000043b5c5b4): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop1' (00000000c5d2c7a9): kobject_uevent_env kobject: 'loop1' (00000000c5d2c7a9): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop3' (00000000b1fa6296): kobject_uevent_env kobject: 'loop3' (00000000b1fa6296): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'kvm' (00000000bfb9d9a4): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop4' (0000000066bfc1da): kobject_uevent_env kobject: 'loop4' (0000000066bfc1da): fill_kobj_path: path = '/devices/virtual/block/loop4' TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. overlayfs: unrecognized mount option "woòò'û[ý¦ébuS" or missing value kobject: 'loop5' (00000000bf4e3948): kobject_uevent_env kobject: 'loop5' (00000000bf4e3948): fill_kobj_path: path = '/devices/virtual/block/loop5' audit: type=1804 audit(1540545108.988:128): pid=11937 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir366239411/syzkaller.EMYDH9/139/bus" dev="sda1" ino=16982 res=1 netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. kobject: 'loop0' (0000000030388c08): kobject_uevent_env audit: type=1804 audit(1540545109.048:129): pid=11948 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir366239411/syzkaller.EMYDH9/139/bus" dev="sda1" ino=16982 res=1 kobject: 'loop0' (0000000030388c08): fill_kobj_path: path = '/devices/virtual/block/loop0' netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. kobject: 'loop2' (0000000043b5c5b4): kobject_uevent_env kobject: 'loop2' (0000000043b5c5b4): fill_kobj_path: path = '/devices/virtual/block/loop2' TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. kobject: 'loop5' (00000000bf4e3948): kobject_uevent_env audit: type=1804 audit(1540545109.288:130): pid=11951 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir366239411/syzkaller.EMYDH9/139/bus" dev="sda1" ino=16982 res=1 overlayfs: unrecognized mount option "woòò'û[ý¦ébuS" or missing value kobject: 'ppp1986356271' (00000000ad66a171): kobject_add_internal: parent: 'net', set: 'devices' kobject: 'loop5' (00000000bf4e3948): fill_kobj_path: path = '/devices/virtual/block/loop5' audit: type=1804 audit(1540545109.348:131): pid=11937 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir366239411/syzkaller.EMYDH9/139/bus" dev="sda1" ino=16982 res=1 kobject: 'ppp1986356271' (00000000ad66a171): kobject_uevent_env kobject: 'ppp1986356271' (00000000ad66a171): fill_kobj_path: path = '/devices/virtual/net/ppp1986356271' kobject: 'loop5' (00000000bf4e3948): kobject_uevent_env kobject: 'loop5' (00000000bf4e3948): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'queues' (00000000f84a86f2): kobject_add_internal: parent: 'ppp1986356271', set: '' audit: type=1804 audit(1540545109.358:132): pid=11937 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir366239411/syzkaller.EMYDH9/139/bus" dev="sda1" ino=16982 res=1 kobject: 'loop4' (0000000066bfc1da): kobject_uevent_env overlayfs: unrecognized mount option "woòò'û[ý¦ébuS" or missing value kobject: 'queues' (00000000f84a86f2): kobject_uevent_env kobject: 'loop4' (0000000066bfc1da): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop1' (00000000c5d2c7a9): kobject_uevent_env audit: type=1804 audit(1540545109.568:133): pid=11986 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir366239411/syzkaller.EMYDH9/140/bus" dev="sda1" ino=16982 res=1 kobject: 'queues' (00000000f84a86f2): kobject_uevent_env: filter function caused the event to drop! kobject: 'loop1' (00000000c5d2c7a9): fill_kobj_path: path = '/devices/virtual/block/loop1' TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. kobject: 'loop3' (00000000b1fa6296): kobject_uevent_env kobject: 'loop3' (00000000b1fa6296): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'rx-0' (00000000ecbba206): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'loop2' (0000000043b5c5b4): kobject_uevent_env kobject: 'loop2' (0000000043b5c5b4): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop5' (00000000bf4e3948): kobject_uevent_env audit: type=1804 audit(1540545109.708:134): pid=11977 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir366239411/syzkaller.EMYDH9/140/bus" dev="sda1" ino=16982 res=1 kobject: 'rx-0' (00000000ecbba206): kobject_uevent_env kobject: 'rx-0' (00000000ecbba206): fill_kobj_path: path = '/devices/virtual/net/ppp1986356271/queues/rx-0' kobject: 'tx-0' (0000000095172cc3): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'loop5' (00000000bf4e3948): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'tx-0' (0000000095172cc3): kobject_uevent_env kobject: 'tx-0' (0000000095172cc3): fill_kobj_path: path = '/devices/virtual/net/ppp1986356271/queues/tx-0' syz-executor0 (11960) used obsolete PPPIOCDETACH ioctl TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. kobject: 'loop5' (00000000bf4e3948): kobject_uevent_env kobject: 'loop5' (00000000bf4e3948): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'rx-0' (00000000ecbba206): kobject_cleanup, parent 00000000f84a86f2 kobject: 'rx-0' (00000000ecbba206): auto cleanup 'remove' event kobject: 'rx-0' (00000000ecbba206): kobject_uevent_env kobject: 'rx-0' (00000000ecbba206): fill_kobj_path: path = '/devices/virtual/net/ppp1986356271/queues/rx-0' kobject: 'rx-0' (00000000ecbba206): auto cleanup kobject_del kobject: 'rx-0' (00000000ecbba206): calling ktype release kobject: 'rx-0': free name kobject: 'tx-0' (0000000095172cc3): kobject_cleanup, parent 00000000f84a86f2 kobject: 'tx-0' (0000000095172cc3): auto cleanup 'remove' event kobject: 'tx-0' (0000000095172cc3): kobject_uevent_env kobject: 'tx-0' (0000000095172cc3): fill_kobj_path: path = '/devices/virtual/net/ppp1986356271/queues/tx-0' kobject: 'loop2' (0000000043b5c5b4): kobject_uevent_env kobject: 'tx-0' (0000000095172cc3): auto cleanup kobject_del kobject: 'loop2' (0000000043b5c5b4): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'tx-0' (0000000095172cc3): calling ktype release kobject: 'tx-0': free name kobject: 'queues' (00000000f84a86f2): kobject_cleanup, parent (null) kobject: 'queues' (00000000f84a86f2): calling ktype release kobject: 'loop4' (0000000066bfc1da): kobject_uevent_env kobject: 'loop4' (0000000066bfc1da): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'queues' (00000000f84a86f2): kset_release kobject: 'queues': free name kobject: 'loop3' (00000000b1fa6296): kobject_uevent_env kobject: 'ppp1986356271' (00000000ad66a171): kobject_uevent_env kobject: 'loop3' (00000000b1fa6296): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'ppp1986356271' (00000000ad66a171): fill_kobj_path: path = '/devices/virtual/net/ppp1986356271' kobject: 'loop1' (00000000c5d2c7a9): kobject_uevent_env kobject: 'loop1' (00000000c5d2c7a9): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'ppp1986356271' (00000000779f6ea0): kobject_add_internal: parent: 'net', set: 'devices' kobject: 'ppp1986356271' (00000000779f6ea0): kobject_uevent_env kobject: 'ppp1986356271' (00000000779f6ea0): fill_kobj_path: path = '/devices/virtual/net/ppp1986356271' kobject: 'queues' (00000000d93308f8): kobject_add_internal: parent: 'ppp1986356271', set: '' kobject: 'queues' (00000000d93308f8): kobject_uevent_env kobject: 'queues' (00000000d93308f8): kobject_uevent_env: filter function caused the event to drop! kobject: 'rx-0' (000000006c2f20ec): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'rx-0' (000000006c2f20ec): kobject_uevent_env kobject: 'rx-0' (000000006c2f20ec): fill_kobj_path: path = '/devices/virtual/net/ppp1986356271/queues/rx-0' kobject: 'tx-0' (00000000b1853859): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'tx-0' (00000000b1853859): kobject_uevent_env kobject: 'tx-0' (00000000b1853859): fill_kobj_path: path = '/devices/virtual/net/ppp1986356271/queues/tx-0' kobject: 'ppp1986356271' (00000000ad66a171): kobject_cleanup, parent (null) kobject: 'ppp1986356271' (00000000ad66a171): calling ktype release kobject: 'ppp1986356271': free name kobject: 'rx-0' (000000006c2f20ec): kobject_cleanup, parent 00000000d93308f8 kobject: 'rx-0' (000000006c2f20ec): auto cleanup 'remove' event kobject: 'rx-0' (000000006c2f20ec): kobject_uevent_env kobject: 'rx-0' (000000006c2f20ec): fill_kobj_path: path = '/devices/virtual/net/ppp1986356271/queues/rx-0' kobject: 'rx-0' (000000006c2f20ec): auto cleanup kobject_del kobject: 'rx-0' (000000006c2f20ec): calling ktype release kobject: 'rx-0': free name kobject: 'tx-0' (00000000b1853859): kobject_cleanup, parent 00000000d93308f8 kobject: 'tx-0' (00000000b1853859): auto cleanup 'remove' event kobject: 'tx-0' (00000000b1853859): kobject_uevent_env kobject: 'tx-0' (00000000b1853859): fill_kobj_path: path = '/devices/virtual/net/ppp1986356271/queues/tx-0' kobject: 'tx-0' (00000000b1853859): auto cleanup kobject_del kobject: 'tx-0' (00000000b1853859): calling ktype release kobject: 'tx-0': free name kobject: 'queues' (00000000d93308f8): kobject_cleanup, parent (null) kobject: 'queues' (00000000d93308f8): calling ktype release kobject: 'queues' (00000000d93308f8): kset_release kobject: 'queues': free name kobject: 'ppp1986356271' (00000000779f6ea0): kobject_uevent_env kobject: 'ppp1986356271' (00000000779f6ea0): fill_kobj_path: path = '/devices/virtual/net/ppp1986356271' kobject: 'ppp1986356271' (00000000779f6ea0): kobject_cleanup, parent (null) kobject: 'ppp1986356271' (00000000779f6ea0): calling ktype release kobject: 'ppp1986356271': free name kobject: 'loop0' (0000000030388c08): kobject_uevent_env kobject: 'loop0' (0000000030388c08): fill_kobj_path: path = '/devices/virtual/block/loop0' TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. kobject: 'loop3' (00000000b1fa6296): kobject_uevent_env overlayfs: unrecognized mount option "woòò'û[ý¦ébuS" or missing value kobject: 'loop3' (00000000b1fa6296): fill_kobj_path: path = '/devices/virtual/block/loop3' audit: type=1804 audit(1540545110.678:135): pid=12022 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir565027452/syzkaller.kOba63/160/bus" dev="sda1" ino=16966 res=1 kobject: 'ppp1986356271' (0000000008f3d38b): kobject_add_internal: parent: 'net', set: 'devices' overlayfs: unrecognized mount option "woòò'û[ý¦ébuS" or missing value kobject: 'loop5' (00000000bf4e3948): kobject_uevent_env kobject: 'loop5' (00000000bf4e3948): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'ppp1986356271' (0000000008f3d38b): kobject_uevent_env kobject: 'ppp1986356271' (0000000008f3d38b): fill_kobj_path: path = '/devices/virtual/net/ppp1986356271' audit: type=1804 audit(1540545110.758:136): pid=12021 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir366239411/syzkaller.EMYDH9/141/bus" dev="sda1" ino=16985 res=1 kobject: 'queues' (00000000b6d568e9): kobject_add_internal: parent: 'ppp1986356271', set: '' kobject: 'queues' (00000000b6d568e9): kobject_uevent_env kobject: 'loop2' (0000000043b5c5b4): kobject_uevent_env kobject: 'queues' (00000000b6d568e9): kobject_uevent_env: filter function caused the event to drop! kobject: 'rx-0' (00000000f6ee2516): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'rx-0' (00000000f6ee2516): kobject_uevent_env kobject: 'rx-0' (00000000f6ee2516): fill_kobj_path: path = '/devices/virtual/net/ppp1986356271/queues/rx-0' kobject: 'loop2' (0000000043b5c5b4): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'tx-0' (00000000aa0dc09d): kobject_add_internal: parent: 'queues', set: 'queues' TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. audit: type=1804 audit(1540545110.788:137): pid=12031 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir565027452/syzkaller.kOba63/160/bus" dev="sda1" ino=16966 res=1 kobject: 'tx-0' (00000000aa0dc09d): kobject_uevent_env kobject: 'tx-0' (00000000aa0dc09d): fill_kobj_path: path = '/devices/virtual/net/ppp1986356271/queues/tx-0' kobject: 'loop5' (00000000bf4e3948): kobject_uevent_env kobject: 'rx-0' (00000000f6ee2516): kobject_cleanup, parent 00000000b6d568e9 kobject: 'loop5' (00000000bf4e3948): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'rx-0' (00000000f6ee2516): auto cleanup 'remove' event kobject: 'loop2' (0000000043b5c5b4): kobject_uevent_env audit: type=1804 audit(1540545110.798:138): pid=12034 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir366239411/syzkaller.EMYDH9/141/bus" dev="sda1" ino=16985 res=1 kobject: 'loop2' (0000000043b5c5b4): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'rx-0' (00000000f6ee2516): kobject_uevent_env kobject: 'rx-0' (00000000f6ee2516): fill_kobj_path: path = '/devices/virtual/net/ppp1986356271/queues/rx-0' kobject: 'loop1' (00000000c5d2c7a9): kobject_uevent_env kobject: 'loop1' (00000000c5d2c7a9): fill_kobj_path: path = '/devices/virtual/block/loop1' TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. kobject: 'loop4' (0000000066bfc1da): kobject_uevent_env kobject: 'rx-0' (00000000f6ee2516): auto cleanup kobject_del kobject: 'rx-0' (00000000f6ee2516): calling ktype release kobject: 'loop4' (0000000066bfc1da): fill_kobj_path: path = '/devices/virtual/block/loop4' overlayfs: unrecognized mount option "woòò'û[ý¦ébuS" or missing value kobject: 'rx-0': free name kobject: 'tx-0' (00000000aa0dc09d): kobject_cleanup, parent 00000000b6d568e9 overlayfs: unrecognized mount option "woòò'û[ý¦ébuS" or missing value kobject: 'loop3' (00000000b1fa6296): kobject_uevent_env kobject: 'loop3' (00000000b1fa6296): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'tx-0' (00000000aa0dc09d): auto cleanup 'remove' event audit: type=1804 audit(1540545111.388:139): pid=12054 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir565027452/syzkaller.kOba63/161/bus" dev="sda1" ino=16988 res=1 kobject: 'loop2' (0000000043b5c5b4): kobject_uevent_env kobject: 'tx-0' (00000000aa0dc09d): kobject_uevent_env kobject: 'loop2' (0000000043b5c5b4): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'tx-0' (00000000aa0dc09d): fill_kobj_path: path = '/devices/virtual/net/ppp1986356271/queues/tx-0' audit: type=1804 audit(1540545111.388:140): pid=12058 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir366239411/syzkaller.EMYDH9/142/bus" dev="sda1" ino=16982 res=1 audit: type=1804 audit(1540545111.428:141): pid=12053 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir366239411/syzkaller.EMYDH9/142/bus" dev="sda1" ino=16982 res=1 kobject: 'tx-0' (00000000aa0dc09d): auto cleanup kobject_del audit: type=1804 audit(1540545111.438:142): pid=12060 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir565027452/syzkaller.kOba63/161/bus" dev="sda1" ino=16988 res=1 kobject: 'tx-0' (00000000aa0dc09d): calling ktype release kobject: 'tx-0': free name kobject: 'queues' (00000000b6d568e9): kobject_cleanup, parent (null) kobject: 'queues' (00000000b6d568e9): calling ktype release kobject: 'queues' (00000000b6d568e9): kset_release kobject: 'queues': free name kobject: 'ppp1986356271' (0000000008f3d38b): kobject_uevent_env kobject: 'loop1' (00000000c5d2c7a9): kobject_uevent_env kobject: 'ppp1986356271' (0000000008f3d38b): fill_kobj_path: path = '/devices/virtual/net/ppp1986356271' kobject: 'loop1' (00000000c5d2c7a9): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'ppp1986356271' (0000000008f3d38b): kobject_cleanup, parent (null) kobject: 'ppp1986356271' (0000000008f3d38b): calling ktype release kobject: 'loop5' (00000000bf4e3948): kobject_uevent_env kobject: 'ppp1986356271': free name kobject: 'loop5' (00000000bf4e3948): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop4' (0000000066bfc1da): kobject_uevent_env kobject: 'loop4' (0000000066bfc1da): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop0' (0000000030388c08): kobject_uevent_env overlayfs: unrecognized mount option "woòò'û[ý¦ébuS" or missing value overlayfs: unrecognized mount option "woòò'û[ý¦ébuS" or missing value kobject: 'loop0' (0000000030388c08): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop5' (00000000bf4e3948): kobject_uevent_env audit: type=1804 audit(1540545111.848:143): pid=12079 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir366239411/syzkaller.EMYDH9/143/bus" dev="sda1" ino=16985 res=1 TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. kobject: 'loop5' (00000000bf4e3948): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop2' (0000000043b5c5b4): kobject_uevent_env audit: type=1804 audit(1540545111.888:144): pid=12082 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir565027452/syzkaller.kOba63/162/bus" dev="sda1" ino=16966 res=1 kobject: 'ppp1986356271' (0000000089ef10c5): kobject_add_internal: parent: 'net', set: 'devices' kobject: 'loop2' (0000000043b5c5b4): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'ppp1986356271' (0000000089ef10c5): kobject_uevent_env kobject: 'ppp1986356271' (0000000089ef10c5): fill_kobj_path: path = '/devices/virtual/net/ppp1986356271' kobject: 'loop3' (00000000b1fa6296): kobject_uevent_env kobject: 'loop3' (00000000b1fa6296): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'queues' (0000000026a6cade): kobject_add_internal: parent: 'ppp1986356271', set: '' kobject: 'loop2' (0000000043b5c5b4): kobject_uevent_env kobject: 'loop2' (0000000043b5c5b4): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop0' (0000000030388c08): kobject_uevent_env kobject: 'queues' (0000000026a6cade): kobject_uevent_env kobject: 'loop0' (0000000030388c08): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'queues' (0000000026a6cade): kobject_uevent_env: filter function caused the event to drop! kobject: 'rx-0' (00000000f9eb7b79): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'rx-0' (00000000f9eb7b79): kobject_uevent_env kobject: 'rx-0' (00000000f9eb7b79): fill_kobj_path: path = '/devices/virtual/net/ppp1986356271/queues/rx-0' kobject: 'tx-0' (00000000f9bb2943): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'tx-0' (00000000f9bb2943): kobject_uevent_env kobject: 'loop2' (0000000043b5c5b4): kobject_uevent_env kobject: 'tx-0' (00000000f9bb2943): fill_kobj_path: path = '/devices/virtual/net/ppp1986356271/queues/tx-0' kobject: 'loop2' (0000000043b5c5b4): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop0' (0000000030388c08): kobject_uevent_env kobject: 'loop0' (0000000030388c08): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'rx-0' (00000000f9eb7b79): kobject_cleanup, parent 0000000026a6cade kobject: 'loop2' (0000000043b5c5b4): kobject_uevent_env kobject: 'rx-0' (00000000f9eb7b79): auto cleanup 'remove' event kobject: 'loop2' (0000000043b5c5b4): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'rx-0' (00000000f9eb7b79): kobject_uevent_env kobject: 'rx-0' (00000000f9eb7b79): fill_kobj_path: path = '/devices/virtual/net/ppp1986356271/queues/rx-0' kobject: 'loop1' (00000000c5d2c7a9): kobject_uevent_env kobject: 'loop1' (00000000c5d2c7a9): fill_kobj_path: path = '/devices/virtual/block/loop1' overlayfs: unrecognized mount option "woòò'û[ý¦ébuS" or missing value kobject: 'rx-0' (00000000f9eb7b79): auto cleanup kobject_del kobject: 'loop4' (0000000066bfc1da): kobject_uevent_env kobject: 'rx-0' (00000000f9eb7b79): calling ktype release overlayfs: unrecognized mount option "woòò'û[ý¦ébuS" or missing value kobject: 'loop4' (0000000066bfc1da): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'rx-0': free name kobject: 'tx-0' (00000000f9bb2943): kobject_cleanup, parent 0000000026a6cade kobject: 'loop3' (00000000b1fa6296): kobject_uevent_env kobject: 'tx-0' (00000000f9bb2943): auto cleanup 'remove' event kobject: 'loop3' (00000000b1fa6296): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'tx-0' (00000000f9bb2943): kobject_uevent_env kobject: 'loop0' (0000000030388c08): kobject_uevent_env kobject: 'tx-0' (00000000f9bb2943): fill_kobj_path: path = '/devices/virtual/net/ppp1986356271/queues/tx-0' kobject: 'loop0' (0000000030388c08): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'tx-0' (00000000f9bb2943): auto cleanup kobject_del kobject: 'tx-0' (00000000f9bb2943): calling ktype release kobject: 'tx-0': free name kobject: 'queues' (0000000026a6cade): kobject_cleanup, parent (null) kobject: 'loop2' (0000000043b5c5b4): kobject_uevent_env kobject: 'queues' (0000000026a6cade): calling ktype release kobject: 'queues' (0000000026a6cade): kset_release kobject: 'loop2' (0000000043b5c5b4): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'queues': free name kobject: 'ppp1986356271' (0000000089ef10c5): kobject_uevent_env kobject: 'ppp1986356271' (0000000089ef10c5): fill_kobj_path: path = '/devices/virtual/net/ppp1986356271' kobject: 'loop1' (00000000c5d2c7a9): kobject_uevent_env kobject: 'loop1' (00000000c5d2c7a9): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'ppp1986356271' (0000000089ef10c5): kobject_cleanup, parent (null) kobject: 'ppp1986356271' (0000000089ef10c5): calling ktype release kobject: 'ppp1986356271': free name kobject: 'loop5' (00000000bf4e3948): kobject_uevent_env kobject: 'loop5' (00000000bf4e3948): fill_kobj_path: path = '/devices/virtual/block/loop5' net_ratelimit: 7 callbacks suppressed TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. overlayfs: unrecognized mount option "woòò'û[ý¦ébuS" or missing value kobject: 'loop4' (0000000066bfc1da): kobject_uevent_env kobject: 'loop4' (0000000066bfc1da): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'ppp1986356271' (00000000432c210b): kobject_add_internal: parent: 'net', set: 'devices' kobject: 'ppp1986356271' (00000000432c210b): kobject_uevent_env overlayfs: unrecognized mount option "woòò'û[ý¦ébuS" or missing value kobject: 'ppp1986356271' (00000000432c210b): fill_kobj_path: path = '/devices/virtual/net/ppp1986356271' kobject: 'queues' (00000000acadb201): kobject_add_internal: parent: 'ppp1986356271', set: '' kobject: 'loop2' (0000000043b5c5b4): kobject_uevent_env kobject: 'queues' (00000000acadb201): kobject_uevent_env TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. kobject: 'queues' (00000000acadb201): kobject_uevent_env: filter function caused the event to drop! kobject: 'rx-0' (0000000030d12fc2): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'rx-0' (0000000030d12fc2): kobject_uevent_env TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. kobject: 'loop2' (0000000043b5c5b4): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'rx-0' (0000000030d12fc2): fill_kobj_path: path = '/devices/virtual/net/ppp1986356271/queues/rx-0' kobject: 'tx-0' (00000000bcb46bca): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'loop0' (0000000030388c08): kobject_uevent_env kobject: 'tx-0' (00000000bcb46bca): kobject_uevent_env TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. kobject: 'tx-0' (00000000bcb46bca): fill_kobj_path: path = '/devices/virtual/net/ppp1986356271/queues/tx-0' TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. kobject: 'loop0' (0000000030388c08): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'rx-0' (0000000030d12fc2): kobject_cleanup, parent 00000000acadb201 kobject: 'loop3' (00000000b1fa6296): kobject_uevent_env kobject: 'loop3' (00000000b1fa6296): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'rx-0' (0000000030d12fc2): auto cleanup 'remove' event kobject: 'loop0' (0000000030388c08): kobject_uevent_env kobject: 'loop0' (0000000030388c08): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'rx-0' (0000000030d12fc2): kobject_uevent_env kobject: 'loop0' (0000000030388c08): kobject_uevent_env kobject: 'rx-0' (0000000030d12fc2): fill_kobj_path: path = '/devices/virtual/net/ppp1986356271/queues/rx-0' kobject: 'loop0' (0000000030388c08): fill_kobj_path: path = '/devices/virtual/block/loop0' TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. kobject: 'loop2' (0000000043b5c5b4): kobject_uevent_env kobject: 'loop2' (0000000043b5c5b4): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop1' (00000000c5d2c7a9): kobject_uevent_env kobject: 'rx-0' (0000000030d12fc2): auto cleanup kobject_del kobject: 'loop1' (00000000c5d2c7a9): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'rx-0' (0000000030d12fc2): calling ktype release kobject: 'rx-0': free name kobject: 'loop4' (0000000066bfc1da): kobject_uevent_env kobject: 'loop4' (0000000066bfc1da): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'tx-0' (00000000bcb46bca): kobject_cleanup, parent 00000000acadb201 kobject: 'tx-0' (00000000bcb46bca): auto cleanup 'remove' event kobject: 'tx-0' (00000000bcb46bca): kobject_uevent_env kobject: 'tx-0' (00000000bcb46bca): fill_kobj_path: path = '/devices/virtual/net/ppp1986356271/queues/tx-0' kobject: 'tx-0' (00000000bcb46bca): auto cleanup kobject_del kobject: 'loop0' (0000000030388c08): kobject_uevent_env kobject: 'tx-0' (00000000bcb46bca): calling ktype release kobject: 'loop0' (0000000030388c08): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'tx-0': free name kobject: 'loop3' (00000000b1fa6296): kobject_uevent_env kobject: 'queues' (00000000acadb201): kobject_cleanup, parent (null) kobject: 'loop3' (00000000b1fa6296): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'queues' (00000000acadb201): calling ktype release kobject: 'queues' (00000000acadb201): kset_release kobject: 'queues': free name kobject: 'ppp1986356271' (00000000432c210b): kobject_uevent_env kobject: 'ppp1986356271' (00000000432c210b): fill_kobj_path: path = '/devices/virtual/net/ppp1986356271' kobject: 'ppp1986356271' (00000000432c210b): kobject_cleanup, parent (null) kobject: 'ppp1986356271' (00000000432c210b): calling ktype release kobject: 'ppp1986356271': free name kobject: 'loop5' (00000000bf4e3948): kobject_uevent_env kobject: 'loop5' (00000000bf4e3948): fill_kobj_path: path = '/devices/virtual/block/loop5' TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. overlayfs: unrecognized mount option "woòò'û[ý¦ébuS" or missing value overlayfs: unrecognized mount option "woòò'û[ý¦ébuS" or missing value kobject: 'ppp1986356271' (000000005f29eaa9): kobject_add_internal: parent: 'net', set: 'devices' kobject: 'loop2' (0000000043b5c5b4): kobject_uevent_env kobject: 'loop2' (0000000043b5c5b4): fill_kobj_path: path = '/devices/virtual/block/loop2' TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. kobject: 'loop0' (0000000030388c08): kobject_uevent_env kobject: 'ppp1986356271' (000000005f29eaa9): kobject_uevent_env kobject: 'ppp1986356271' (000000005f29eaa9): fill_kobj_path: path = '/devices/virtual/net/ppp1986356271' TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. kobject: 'loop0' (0000000030388c08): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'queues' (000000001ecae57d): kobject_add_internal: parent: 'ppp1986356271', set: '' kobject: 'loop2' (0000000043b5c5b4): kobject_uevent_env kobject: 'loop2' (0000000043b5c5b4): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'queues' (000000001ecae57d): kobject_uevent_env kobject: 'queues' (000000001ecae57d): kobject_uevent_env: filter function caused the event to drop! kobject: 'loop0' (0000000030388c08): kobject_uevent_env kobject: 'loop0' (0000000030388c08): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop4' (0000000066bfc1da): kobject_uevent_env overlayfs: unrecognized mount option "woòò'û[ý¦ébuS" or missing value kobject: 'loop4' (0000000066bfc1da): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'rx-0' (0000000098208c6b): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'rx-0' (0000000098208c6b): kobject_uevent_env kobject: 'rx-0' (0000000098208c6b): fill_kobj_path: path = '/devices/virtual/net/ppp1986356271/queues/rx-0' kobject: 'loop1' (00000000c5d2c7a9): kobject_uevent_env kobject: 'tx-0' (00000000b2681634): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'tx-0' (00000000b2681634): kobject_uevent_env kobject: 'loop1' (00000000c5d2c7a9): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'tx-0' (00000000b2681634): fill_kobj_path: path = '/devices/virtual/net/ppp1986356271/queues/tx-0' kobject: 'loop2' (0000000043b5c5b4): kobject_uevent_env kobject: 'loop2' (0000000043b5c5b4): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop3' (00000000b1fa6296): kobject_uevent_env kobject: 'loop3' (00000000b1fa6296): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'rx-0' (0000000098208c6b): kobject_cleanup, parent 000000001ecae57d kobject: 'rx-0' (0000000098208c6b): auto cleanup 'remove' event kobject: 'rx-0' (0000000098208c6b): kobject_uevent_env kobject: 'rx-0' (0000000098208c6b): fill_kobj_path: path = '/devices/virtual/net/ppp1986356271/queues/rx-0' kobject: 'rx-0' (0000000098208c6b): auto cleanup kobject_del kobject: 'rx-0' (0000000098208c6b): calling ktype release kobject: 'rx-0': free name kobject: 'tx-0' (00000000b2681634): kobject_cleanup, parent 000000001ecae57d kobject: 'tx-0' (00000000b2681634): auto cleanup 'remove' event kobject: 'tx-0' (00000000b2681634): kobject_uevent_env kobject: 'tx-0' (00000000b2681634): fill_kobj_path: path = '/devices/virtual/net/ppp1986356271/queues/tx-0' kobject: 'tx-0' (00000000b2681634): auto cleanup kobject_del kobject: 'tx-0' (00000000b2681634): calling ktype release kobject: 'loop4' (0000000066bfc1da): kobject_uevent_env kobject: 'tx-0': free name kobject: 'loop4' (0000000066bfc1da): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'queues' (000000001ecae57d): kobject_cleanup, parent (null) kobject: 'queues' (000000001ecae57d): calling ktype release kobject: 'queues' (000000001ecae57d): kset_release kobject: 'queues': free name kobject: 'ppp1986356271' (000000005f29eaa9): kobject_uevent_env kobject: 'ppp1986356271' (000000005f29eaa9): fill_kobj_path: path = '/devices/virtual/net/ppp1986356271' kobject: 'ppp1986356271' (000000005f29eaa9): kobject_cleanup, parent (null) kobject: 'ppp1986356271' (000000005f29eaa9): calling ktype release kobject: 'ppp1986356271': free name kobject: 'loop5' (00000000bf4e3948): kobject_uevent_env kobject: 'loop5' (00000000bf4e3948): fill_kobj_path: path = '/devices/virtual/block/loop5' overlayfs: unrecognized mount option "woòò'û[ý¦ébuS" or missing value overlayfs: unrecognized mount option "woòò'û[ý¦ébuS" or missing value kobject: 'loop2' (0000000043b5c5b4): kobject_uevent_env kobject: 'loop2' (0000000043b5c5b4): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'ppp1986356271' (00000000e17891c0): kobject_add_internal: parent: 'net', set: 'devices' kobject: 'loop0' (0000000030388c08): kobject_uevent_env kobject: 'ppp1986356271' (00000000e17891c0): kobject_uevent_env kobject: 'loop0' (0000000030388c08): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'ppp1986356271' (00000000e17891c0): fill_kobj_path: path = '/devices/virtual/net/ppp1986356271' kobject: 'queues' (00000000dd96ca4f): kobject_add_internal: parent: 'ppp1986356271', set: '' kobject: 'loop2' (0000000043b5c5b4): kobject_uevent_env kobject: 'loop2' (0000000043b5c5b4): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'queues' (00000000dd96ca4f): kobject_uevent_env kobject: 'queues' (00000000dd96ca4f): kobject_uevent_env: filter function caused the event to drop! kobject: 'loop4' (0000000066bfc1da): kobject_uevent_env overlayfs: unrecognized mount option "woòò'û[ý¦ébuS" or missing value kobject: 'loop4' (0000000066bfc1da): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'rx-0' (000000001ed36a40): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'loop2' (0000000043b5c5b4): kobject_uevent_env kobject: 'rx-0' (000000001ed36a40): kobject_uevent_env kobject: 'loop2' (0000000043b5c5b4): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop0' (0000000030388c08): kobject_uevent_env kobject: 'loop0' (0000000030388c08): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'rx-0' (000000001ed36a40): fill_kobj_path: path = '/devices/virtual/net/ppp1986356271/queues/rx-0' kobject: 'loop1' (00000000c5d2c7a9): kobject_uevent_env kobject: 'loop1' (00000000c5d2c7a9): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'tx-0' (0000000017cb7290): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'loop4' (0000000066bfc1da): kobject_uevent_env kobject: 'loop4' (0000000066bfc1da): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'tx-0' (0000000017cb7290): kobject_uevent_env kobject: 'loop2' (0000000043b5c5b4): kobject_uevent_env kobject: 'tx-0' (0000000017cb7290): fill_kobj_path: path = '/devices/virtual/net/ppp1986356271/queues/tx-0' kobject: 'loop2' (0000000043b5c5b4): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'rx-0' (000000001ed36a40): kobject_cleanup, parent 00000000dd96ca4f kobject: 'rx-0' (000000001ed36a40): auto cleanup 'remove' event kobject: 'rx-0' (000000001ed36a40): kobject_uevent_env kobject: 'rx-0' (000000001ed36a40): fill_kobj_path: path = '/devices/virtual/net/ppp1986356271/queues/rx-0' kobject: 'loop3' (00000000b1fa6296): kobject_uevent_env kobject: 'rx-0' (000000001ed36a40): auto cleanup kobject_del kobject: 'loop3' (00000000b1fa6296): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'rx-0' (000000001ed36a40): calling ktype release kobject: 'rx-0': free name kobject: 'tx-0' (0000000017cb7290): kobject_cleanup, parent 00000000dd96ca4f kobject: 'tx-0' (0000000017cb7290): auto cleanup 'remove' event kobject: 'tx-0' (0000000017cb7290): kobject_uevent_env kobject: 'tx-0' (0000000017cb7290): fill_kobj_path: path = '/devices/virtual/net/ppp1986356271/queues/tx-0' kobject: 'tx-0' (0000000017cb7290): auto cleanup kobject_del kobject: 'tx-0' (0000000017cb7290): calling ktype release kobject: 'tx-0': free name kobject: 'queues' (00000000dd96ca4f): kobject_cleanup, parent (null) kobject: 'queues' (00000000dd96ca4f): calling ktype release kobject: 'queues' (00000000dd96ca4f): kset_release kobject: 'queues': free name kobject: 'ppp1986356271' (00000000e17891c0): kobject_uevent_env kobject: 'ppp1986356271' (00000000e17891c0): fill_kobj_path: path = '/devices/virtual/net/ppp1986356271' kobject: 'ppp1986356271' (00000000e17891c0): kobject_cleanup, parent (null) kobject: 'ppp1986356271' (00000000e17891c0): calling ktype release kobject: 'ppp1986356271': free name kobject: 'loop5' (00000000bf4e3948): kobject_uevent_env kobject: 'loop5' (00000000bf4e3948): fill_kobj_path: path = '/devices/virtual/block/loop5' overlayfs: unrecognized mount option "woòò'û[ý¦ébuS" or missing value overlayfs: unrecognized mount option "woòò'û[ý¦ébuS" or missing value kobject: 'loop2' (0000000043b5c5b4): kobject_uevent_env kobject: 'loop2' (0000000043b5c5b4): fill_kobj_path: path = '/devices/virtual/block/loop2' kauditd_printk_skb: 22 callbacks suppressed audit: type=1804 audit(1540545115.728:167): pid=12267 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir565027452/syzkaller.kOba63/167/bus" dev="sda1" ino=16690 res=1 kobject: 'loop3' (00000000b1fa6296): kobject_uevent_env kobject: 'ppp1986356271' (00000000abecf8af): kobject_add_internal: parent: 'net', set: 'devices' kobject: 'ppp1986356271' (00000000abecf8af): kobject_uevent_env kobject: 'loop3' (00000000b1fa6296): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'ppp1986356271' (00000000abecf8af): fill_kobj_path: path = '/devices/virtual/net/ppp1986356271' audit: type=1804 audit(1540545115.778:168): pid=12271 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir366239411/syzkaller.EMYDH9/150/bus" dev="sda1" ino=16705 res=1 kobject: 'loop0' (0000000030388c08): kobject_uevent_env kobject: 'queues' (000000000019a0f5): kobject_add_internal: parent: 'ppp1986356271', set: '' kobject: 'loop0' (0000000030388c08): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop2' (0000000043b5c5b4): kobject_uevent_env overlayfs: unrecognized mount option "woòò'û[ý¦ébuS" or missing value kobject: 'loop2' (0000000043b5c5b4): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop1' (00000000c5d2c7a9): kobject_uevent_env kobject: 'queues' (000000000019a0f5): kobject_uevent_env kobject: 'loop1' (00000000c5d2c7a9): fill_kobj_path: path = '/devices/virtual/block/loop1' audit: type=1804 audit(1540545115.798:169): pid=12262 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir565027452/syzkaller.kOba63/167/bus" dev="sda1" ino=16690 res=1 kobject: 'loop3' (00000000b1fa6296): kobject_uevent_env kobject: 'queues' (000000000019a0f5): kobject_uevent_env: filter function caused the event to drop! kobject: 'loop3' (00000000b1fa6296): fill_kobj_path: path = '/devices/virtual/block/loop3'