[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 60.244128][ T26] audit: type=1800 audit(1558160305.133:25): pid=8878 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 60.282207][ T26] audit: type=1800 audit(1558160305.133:26): pid=8878 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 60.332446][ T26] audit: type=1800 audit(1558160305.133:27): pid=8878 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.239' (ECDSA) to the list of known hosts. 2019/05/18 06:18:36 fuzzer started 2019/05/18 06:18:39 dialing manager at 10.128.0.26:37669 2019/05/18 06:18:39 syscalls: 1006 2019/05/18 06:18:39 code coverage: enabled 2019/05/18 06:18:39 comparison tracing: enabled 2019/05/18 06:18:39 extra coverage: extra coverage is not supported by the kernel 2019/05/18 06:18:39 setuid sandbox: enabled 2019/05/18 06:18:39 namespace sandbox: enabled 2019/05/18 06:18:39 Android sandbox: /sys/fs/selinux/policy does not exist 2019/05/18 06:18:39 fault injection: enabled 2019/05/18 06:18:39 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/05/18 06:18:39 net packet injection: enabled 2019/05/18 06:18:39 net device setup: enabled 06:18:44 executing program 0: r0 = socket(0xa, 0x1, 0x0) connect$ax25(r0, &(0x7f0000000180)={{0x3, @bcast, 0x7}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'erspan0\x00', 0x1}, 0x18) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x4, &(0x7f0000000240)=0x2, 0x4) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000280)={0x0, {0x2, 0x0, @broadcast}, {0x2, 0x0, @empty}, {0x2, 0x0, @multicast2}}) syzkaller login: [ 79.632973][ T9042] IPVS: ftp: loaded support on port[0] = 21 [ 79.643605][ T9042] NET: Registered protocol family 30 [ 79.648908][ T9042] Failed to register TIPC socket type 06:18:44 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3c, &(0x7f0000000080), 0x2cb) [ 79.944792][ T9044] IPVS: ftp: loaded support on port[0] = 21 [ 79.964943][ T9044] NET: Registered protocol family 30 [ 79.970253][ T9044] Failed to register TIPC socket type 06:18:44 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000100)=[{0x4000000028, 0x0, 0x0, 0xfffff010}, {0x80000006}]}, 0x10) syz_emit_ethernet(0x1, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaaaaeaaaaa00000000004e5e1473aa4c"], 0x0) [ 80.240547][ T9046] IPVS: ftp: loaded support on port[0] = 21 [ 80.266482][ T9046] NET: Registered protocol family 30 [ 80.271791][ T9046] Failed to register TIPC socket type 06:18:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r1, 0x29, 0x49, &(0x7f0000b67000), &(0x7f0000000000)=0x4) [ 80.781723][ T9048] IPVS: ftp: loaded support on port[0] = 21 [ 80.806432][ T9048] NET: Registered protocol family 30 [ 80.811760][ T9048] Failed to register TIPC socket type 06:18:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xffffffff000fffea, 0xffffffff000fffea}}, 0x0, 0x100002}, 0x76) [ 81.451800][ T9050] IPVS: ftp: loaded support on port[0] = 21 [ 81.486614][ T9050] NET: Registered protocol family 30 [ 81.491947][ T9050] Failed to register TIPC socket type 06:18:46 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000000e40)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000e80)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x2c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000c40)=[{{0x0, 0x3300000000000000, &(0x7f00000009c0), 0x3e8, &(0x7f00000000c0), 0x0, 0x8dffffff00000000}}], 0x40000000000026a, 0x0) [ 82.061845][ T9052] IPVS: ftp: loaded support on port[0] = 21 [ 82.097204][ T9052] NET: Registered protocol family 30 [ 82.122400][ T9052] Failed to register TIPC socket type [ 82.480506][ T9042] chnl_net:caif_netlink_parms(): no params data found [ 82.975855][ T9042] bridge0: port 1(bridge_slave_0) entered blocking state [ 83.113687][ T9042] bridge0: port 1(bridge_slave_0) entered disabled state [ 83.236288][ T9042] device bridge_slave_0 entered promiscuous mode [ 83.373958][ T9042] bridge0: port 2(bridge_slave_1) entered blocking state [ 83.381158][ T9042] bridge0: port 2(bridge_slave_1) entered disabled state [ 83.523311][ T9042] device bridge_slave_1 entered promiscuous mode [ 83.984482][ T9042] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 84.290124][ T9042] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 85.027748][ T9042] team0: Port device team_slave_0 added [ 85.375653][ T9042] team0: Port device team_slave_1 added [ 86.844885][ T9042] device hsr_slave_0 entered promiscuous mode [ 87.322689][ T9042] device hsr_slave_1 entered promiscuous mode [ 89.335468][ T9042] 8021q: adding VLAN 0 to HW filter on device bond0 [ 89.893088][ T9054] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 89.991104][ T9054] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 90.175344][ T9042] 8021q: adding VLAN 0 to HW filter on device team0 [ 90.484045][ T9054] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 90.572871][ T9054] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 90.611622][ T9054] bridge0: port 1(bridge_slave_0) entered blocking state [ 90.618907][ T9054] bridge0: port 1(bridge_slave_0) entered forwarding state [ 91.056769][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 91.097889][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 91.282913][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 91.291422][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 91.298542][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 91.672493][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 91.877880][ T9054] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 91.923561][ T9054] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 92.124606][ T9054] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 92.304612][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 92.353185][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 92.473828][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 92.677042][ T9254] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 92.714267][ T9254] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 92.903442][ T9254] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 93.103688][ T9254] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 93.261231][ T9042] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 93.765813][ T9042] 8021q: adding VLAN 0 to HW filter on device batadv0 06:19:02 executing program 0: r0 = socket(0xa, 0x1, 0x0) connect$ax25(r0, &(0x7f0000000180)={{0x3, @bcast, 0x7}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'erspan0\x00', 0x1}, 0x18) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x4, &(0x7f0000000240)=0x2, 0x4) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000280)={0x0, {0x2, 0x0, @broadcast}, {0x2, 0x0, @empty}, {0x2, 0x0, @multicast2}}) 06:19:02 executing program 0: r0 = socket(0xa, 0x1, 0x0) connect$ax25(r0, &(0x7f0000000180)={{0x3, @bcast, 0x7}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'erspan0\x00', 0x1}, 0x18) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x4, &(0x7f0000000240)=0x2, 0x4) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000280)={0x0, {0x2, 0x0, @broadcast}, {0x2, 0x0, @empty}, {0x2, 0x0, @multicast2}}) 06:19:05 executing program 0: r0 = socket(0xa, 0x1, 0x0) connect$ax25(r0, &(0x7f0000000180)={{0x3, @bcast, 0x7}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'erspan0\x00', 0x1}, 0x18) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x4, &(0x7f0000000240)=0x2, 0x4) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000280)={0x0, {0x2, 0x0, @broadcast}, {0x2, 0x0, @empty}, {0x2, 0x0, @multicast2}}) 06:19:06 executing program 0: r0 = socket(0xa, 0x1, 0x0) connect$ax25(r0, &(0x7f0000000180)={{0x3, @bcast, 0x7}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'erspan0\x00', 0x1}, 0x18) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x4, &(0x7f0000000240)=0x2, 0x4) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000280)={0x0, {0x2, 0x0, @broadcast}, {0x2, 0x0, @empty}, {0x2, 0x0, @multicast2}}) [ 101.877761][ T9520] IPVS: ftp: loaded support on port[0] = 21 [ 102.406361][ T9521] IPVS: ftp: loaded support on port[0] = 21 [ 102.477843][ T9520] NET: Registered protocol family 30 [ 102.658832][ T9522] IPVS: ftp: loaded support on port[0] = 21 [ 102.797055][ T9521] list_add double add: new=ffffffff89544ab0, prev=ffffffff89334ac0, next=ffffffff89544ab0. [ 102.913730][ T9520] Failed to register TIPC socket type [ 103.392466][ T9521] ------------[ cut here ]------------ [ 103.397974][ T9521] kernel BUG at lib/list_debug.c:29! [ 103.822193][ T9521] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 103.828322][ T9521] CPU: 1 PID: 9521 Comm: syz-executor.1 Not tainted 5.1.0+ #18 [ 103.835864][ T9521] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 103.845934][ T9521] RIP: 0010:__list_add_valid.cold+0x26/0x3c [ 103.851827][ T9521] Code: 56 ff ff ff 4c 89 e1 48 c7 c7 20 4c a3 87 e8 00 60 25 fe 0f 0b 48 89 f2 4c 89 e1 4c 89 ee 48 c7 c7 60 4d a3 87 e8 e9 5f 25 fe <0f> 0b 48 89 f1 48 c7 c7 e0 4c a3 87 4c 89 e6 e8 d5 5f 25 fe 0f 0b [ 103.871448][ T9521] RSP: 0018:ffff888079727b88 EFLAGS: 00010282 [ 103.877517][ T9521] RAX: 0000000000000058 RBX: ffffffff89544920 RCX: 0000000000000000 [ 103.885491][ T9521] RDX: 0000000000000000 RSI: ffffffff815afbe6 RDI: ffffed100f2e4f63 [ 103.893467][ T9521] RBP: ffff888079727ba0 R08: 0000000000000058 R09: ffffed1015d26011 [ 103.901437][ T9521] R10: ffffed1015d26010 R11: ffff8880ae930087 R12: ffffffff89544ab0 [ 103.909411][ T9521] R13: ffffffff89544ab0 R14: ffffffff89544ab0 R15: ffffffff89544a50 [ 103.917387][ T9521] FS: 0000000000cc6940(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 103.926325][ T9521] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 103.932908][ T9521] CR2: 0000001b30d23000 CR3: 00000000794d5000 CR4: 00000000001406e0 [ 103.941278][ T9521] Call Trace: [ 103.944575][ T9521] ? mutex_lock_nested+0x16/0x20 [ 103.949518][ T9521] proto_register+0x459/0x8e0 [ 103.954195][ T9521] ? lockdep_init_map+0x1be/0x6d0 [ 103.959228][ T9521] tipc_socket_init+0x1c/0x70 [ 103.963911][ T9521] tipc_init_net+0x32a/0x5b0 [ 103.968497][ T9521] ? tipc_exit_net+0x40/0x40 [ 103.973090][ T9521] ops_init+0xb6/0x410 [ 103.977161][ T9521] setup_net+0x2d3/0x740 [ 103.981409][ T9521] ? copy_net_ns+0x1c0/0x340 [ 103.986000][ T9521] ? ops_init+0x410/0x410 [ 103.990334][ T9521] ? kasan_check_write+0x14/0x20 [ 103.995273][ T9521] ? down_read_killable+0x51/0x220 [ 104.000390][ T9521] copy_net_ns+0x1df/0x340 [ 104.004808][ T9521] create_new_namespaces+0x400/0x7b0 [ 104.010116][ T9521] unshare_nsproxy_namespaces+0xc2/0x200 [ 104.015757][ T9521] ksys_unshare+0x440/0x980 [ 104.020265][ T9521] ? trace_hardirqs_on+0x67/0x230 [ 104.025298][ T9521] ? walk_process_tree+0x2d0/0x2d0 [ 104.030418][ T9521] ? blkcg_exit_queue+0x30/0x30 [ 104.035301][ T9521] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 104.040767][ T9521] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 104.046839][ T9521] ? do_syscall_64+0x26/0x680 [ 104.051527][ T9521] ? lockdep_hardirqs_on+0x418/0x5d0 [ 104.056821][ T9521] __x64_sys_unshare+0x31/0x40 [ 104.061596][ T9521] do_syscall_64+0x103/0x680 [ 104.066196][ T9521] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 104.072091][ T9521] RIP: 0033:0x45b897 [ 104.075992][ T9521] Code: 00 00 00 b8 63 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 10 01 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 104.095599][ T9521] RSP: 002b:00007fff67396a58 EFLAGS: 00000206 ORIG_RAX: 0000000000000110 [ 104.104050][ T9521] RAX: ffffffffffffffda RBX: 000000000073c988 RCX: 000000000045b897 [ 104.112052][ T9521] RDX: 0000000000000000 RSI: 00007fff67396a00 RDI: 0000000040000000 06:19:09 executing program 0: r0 = socket(0xa, 0x1, 0x0) connect$ax25(r0, &(0x7f0000000180)={{0x3, @bcast, 0x7}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'erspan0\x00', 0x1}, 0x18) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x4, &(0x7f0000000240)=0x2, 0x4) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000280)={0x0, {0x2, 0x0, @broadcast}, {0x2, 0x0, @empty}, {0x2, 0x0, @multicast2}}) [ 104.120024][ T9521] RBP: 00000000000000f8 R08: 0000000000000000 R09: 0000000000000005 [ 104.127993][ T9521] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000414ab0 [ 104.135966][ T9521] R13: 0000000000414b40 R14: 0000000000000000 R15: 0000000000000000 [ 104.143943][ T9521] Modules linked in: [ 104.182308][ T3877] kobject: 'loop0' (00000000a9c4ab19): kobject_uevent_env [ 104.189509][ T3877] kobject: 'loop0' (00000000a9c4ab19): fill_kobj_path: path = '/devices/virtual/block/loop0' 06:19:10 executing program 0: r0 = socket(0xa, 0x1, 0x0) connect$ax25(r0, &(0x7f0000000180)={{0x3, @bcast, 0x7}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'erspan0\x00', 0x1}, 0x18) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x4, &(0x7f0000000240)=0x2, 0x4) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000280)={0x0, {0x2, 0x0, @broadcast}, {0x2, 0x0, @empty}, {0x2, 0x0, @multicast2}}) [ 105.807202][ T9549] IPVS: ftp: loaded support on port[0] = 21 06:19:11 executing program 0: r0 = socket(0xa, 0x1, 0x0) connect$ax25(r0, &(0x7f0000000180)={{0x3, @bcast, 0x7}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'erspan0\x00', 0x1}, 0x18) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x4, &(0x7f0000000240)=0x2, 0x4) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000280)={0x0, {0x2, 0x0, @broadcast}, {0x2, 0x0, @empty}, {0x2, 0x0, @multicast2}}) [ 106.258602][ T3877] kobject: 'loop0' (00000000a9c4ab19): kobject_uevent_env [ 106.342158][ T3877] kobject: 'loop0' (00000000a9c4ab19): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 107.120010][ T3877] kobject: 'loop0' (00000000a9c4ab19): kobject_uevent_env [ 107.212234][ T3877] kobject: 'loop0' (00000000a9c4ab19): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 111.417723][ T9595] IPVS: ftp: loaded support on port[0] = 21