[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 59.889042][ T26] audit: type=1800 audit(1558156863.838:25): pid=8817 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 59.933381][ T26] audit: type=1800 audit(1558156863.848:26): pid=8817 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 59.983205][ T26] audit: type=1800 audit(1558156863.848:27): pid=8817 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.231' (ECDSA) to the list of known hosts. 2019/05/18 05:21:14 fuzzer started 2019/05/18 05:21:17 dialing manager at 10.128.0.26:37669 2019/05/18 05:21:17 syscalls: 1006 2019/05/18 05:21:17 code coverage: enabled 2019/05/18 05:21:17 comparison tracing: enabled 2019/05/18 05:21:17 extra coverage: extra coverage is not supported by the kernel 2019/05/18 05:21:17 setuid sandbox: enabled 2019/05/18 05:21:17 namespace sandbox: enabled 2019/05/18 05:21:17 Android sandbox: /sys/fs/selinux/policy does not exist 2019/05/18 05:21:17 fault injection: enabled 2019/05/18 05:21:17 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/05/18 05:21:17 net packet injection: enabled 2019/05/18 05:21:17 net device setup: enabled 05:21:21 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x1002000000004, 0x200000004, 0x400, 0x0, 0x1}, 0x2c) socket$kcm(0x2, 0x2, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000017000)=0xfffff7fffffffffd, 0x4) listen(r0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0xfffffffffffffdcb) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) syzkaller login: [ 77.965479][ T8983] IPVS: ftp: loaded support on port[0] = 21 [ 77.976444][ T8983] NET: Registered protocol family 30 [ 77.982897][ T8983] Failed to register TIPC socket type 05:21:22 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000b80)={&(0x7f0000000a00)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000ac0)=""/170, 0x1a, 0xaa, 0x1}, 0x20) [ 78.205243][ T8985] IPVS: ftp: loaded support on port[0] = 21 [ 78.217076][ T8985] NET: Registered protocol family 30 [ 78.223606][ T8985] Failed to register TIPC socket type 05:21:22 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6}]}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") setsockopt$sock_int(r0, 0x1, 0x1b, &(0x7f0000000000), 0x4) [ 78.773702][ T8987] IPVS: ftp: loaded support on port[0] = 21 [ 78.797446][ T8987] NET: Registered protocol family 30 [ 78.802954][ T8987] Failed to register TIPC socket type 05:21:23 executing program 3: syz_emit_ethernet(0x21a, &(0x7f000070aef1)={@local, @empty=[0x3, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xffffff88, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) [ 79.322115][ T8989] IPVS: ftp: loaded support on port[0] = 21 [ 79.347442][ T8989] NET: Registered protocol family 30 [ 79.373165][ T8989] Failed to register TIPC socket type 05:21:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0xec, &(0x7f0000001ec0)="0adc1f123c123f3188b07034b9039709e325377929c10a511a7aae0bde6d5922436dd28d314096b54fa72ffc0516a149a4b9e03e64dc08e4aa3ce593b59412fddd84809e88224aeaa6044994a008a92c6a4903f18b6ddcef9f215bfe467a236eea6a6baa360a1f21131f0acd73a26ffcebb6fd66a87bdb63d09f8f4bd1e4f45882d4c428650347e27c64e08bf5daa58158eff1e43d856870b55b6510d40020000000000000b51cd9c5f3b354b50a4438025f09bffd39b93a212e936794e9427bf0b1b6f9e800000000000000") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'md5-generic\x00'}, 0x3d) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000400)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001d40)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000002380)='\n$\xe0\xb3\x00kP\x88\x10t\x92\xea(\x9c\x11\xec\x9e\xd8mg\x04:\"\xdd\xb7\x8a\x11\x8aD\x0f\'RW\x8e\x95\xc0\xebU\xca\x1d<\xa0\xf40\x80\x19\xeb\x97\x001\xcfG\xa0\xdb\x1b\xe8&\xc1N\x90\b\xfb\xf9 .\x80=\xdb\xdd|=#\xf541\xe8z\xde\xab\x84F\xae\xed\xfed\x10\xb30%Vwh6\x9c@&S\x010k\x8b>|\xb2\xc3H\xd5=s\x99iJ-\xb7\xb3t\xfc\xef\x8d\x00a\xd7\xf28\x05\xb3\xfb\xe6S\x83krh[\xfeF\x92\xee\xaaD\xf0\x1c\x826\xf60\xeb9\x88\x0f\xc8\x80\xdb\x15f\xfb`\x8a\xb6\xdf\xa0\x99\xc1Y\xa2s\xf5\xf8\x8c\x1ap\xcd\x18\x0e .\xc8\xf8U\xd0:H\f\xc9\xdeX\x8e\x87\xddp@ \xcc\'\xe2\x9c\x15\xd8&\xfa?}\x13\xde\xd4TqZ[\xa6>a~\x8cO\xa2\xfe\"\xe11+pED\xbe\xa6\x83bz\xfd\xf5\xb4\x19\xd0\xcc\x92\xef\x92\xea\x15Y\xeb\xfc\vxz\xff\xe4r!\x93_M\xd3\xf7@\xa0\xcd\xc0]\x1c\xfd\xcb\x98u\'uW\xe4\xd9\xc1\x8b\xf6\x89\xd0\x19=\x1a\xfcC\x93\xe7\x1d\xfd\xde\x91\x93Bb\x94<\x929\xa5>\b\xd4\x03\xfa|&p\xee\xd8\x8aX\r\xb9\xed\xef\x81\xa7\r\xa9Ze\x9e\xa5', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f00000002c0)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x95a, @dev={0xfe, 0x80, [], 0x29}, 0x8001}, @in={0x2, 0x4e22, @broadcast}, @in={0x2, 0x4e23, @multicast1}, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e20, @broadcast}, @in6={0xa, 0x4e23, 0x3, @ipv4={[], [], @rand_addr=0x3}, 0xd8d8}, @in6={0xa, 0x4e23, 0x0, @empty, 0x7}, @in={0x2, 0x4e22, @empty}], 0xb4) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3ab85f04000000d2eb", 0x10) r4 = openat$cgroup_ro(r3, &(0x7f0000002100)='memory.swap.current\x00', 0x0, 0x0) bind$inet6(r4, &(0x7f00000001c0)={0xa, 0x4e20, 0x7, @empty, 0x9fd}, 0x1c) getpeername$netrom(r2, &(0x7f0000001e00)={{0x3, @rose}, [@null, @remote, @netrom, @netrom, @null, @netrom, @null, @default]}, &(0x7f00000020c0)=0x48) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000001d80)={0x0, 0x2, 0x7fff, 0x1}) r5 = accept(r1, 0x0, 0x0) sendto$packet(r3, &(0x7f0000002240)="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", 0x133, 0x8000, 0x0, 0x0) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000001fc0)="460a4adaae28ec22e3c9bbb781d22364c6bcb5aa778b5995e47127b971e063449c528ea9e41f18a43dcc0e1da3c1fa38da9b4717c5d0a3c7be2cbd851612f35aaa6c2fea7aeac5d7e0aa01e6b01457564dcf5afddc152ac4d1388df86effc28b8e8c3432cf5c19b4a5514c02a713c8f90da2be27befd15e158e5a5f6699ca899e0eadb3cf258e105e13fda077006a458de2b3be81593c18110ddb630d6e4f51fd5b52af18577031c817f32d16fa98c4f1a6e09e4efdfd04a87b36d9c0679d9a7f241d520ee339bff515874921193e2ae7f81e2013976e237b0f8f6f48386d4420893bf6b", 0xe4) recvmsg$kcm(r5, &(0x7f0000001d00)={&(0x7f0000000080)=@can, 0x80, &(0x7f0000001b40)=[{&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/145, 0x91}, {&(0x7f0000001540)=""/231, 0xe7}, {&(0x7f0000001640)=""/154, 0x9a}, {&(0x7f0000001700)=""/218, 0xda}, {&(0x7f0000001800)=""/141, 0x8d}, {&(0x7f00000018c0)=""/163, 0xa3}, {&(0x7f0000001980)=""/230, 0xe6}, {&(0x7f0000001a80)=""/142, 0x8e}, {&(0x7f0000000100)=""/23, 0x17}], 0xa, &(0x7f0000001c00)=""/205, 0xcd}, 0x61) r6 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r6, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r5, 0x84, 0x21, &(0x7f0000000380), &(0x7f00000003c0)=0x4) listen(r6, 0xff) listen(r6, 0x9) r7 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r7, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000440)) setsockopt$inet_sctp6_SCTP_EVENTS(r6, 0x84, 0xb, &(0x7f0000000200)={0xe12, 0x8, 0x1ff, 0x4, 0x8, 0x8001, 0x9a, 0x200, 0x80, 0x100000001}, 0xb) r8 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GCALLUSERDATA(r8, 0x89e4, &(0x7f0000000040)={0x57, "29c9c3931ad95faf9cfc73a6433943dd06b88dd3c2e30a4ebd080a42d919e7d4ed30ccdd3edec3f4e7d1f12031367050bf4e8f062b92329d9cbab73413904410f2ca57845d811ae7d295256b82401bf9569681247d8812ffb8a29e7377216ed199e3c41d155ef4aa140996602e382b080c53a053e81cf98da00abd954171544b"}) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000240)='dummy0\x00', 0x10) write(r7, &(0x7f0000000100), 0x34000) [ 80.013089][ T8991] IPVS: ftp: loaded support on port[0] = 21 [ 80.047394][ T8991] NET: Registered protocol family 30 [ 80.052758][ T8991] Failed to register TIPC socket type [ 80.445348][ T8983] chnl_net:caif_netlink_parms(): no params data found [ 80.847503][ T8983] bridge0: port 1(bridge_slave_0) entered blocking state [ 80.933325][ T8983] bridge0: port 1(bridge_slave_0) entered disabled state [ 81.013297][ T8983] device bridge_slave_0 entered promiscuous mode [ 81.134456][ T8983] bridge0: port 2(bridge_slave_1) entered blocking state [ 81.264991][ T8983] bridge0: port 2(bridge_slave_1) entered disabled state [ 81.379997][ T8983] device bridge_slave_1 entered promiscuous mode [ 81.885471][ T8983] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 82.274605][ T8983] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 82.926075][ T8983] team0: Port device team_slave_0 added [ 83.276308][ T8983] team0: Port device team_slave_1 added [ 84.420346][ T8983] device hsr_slave_0 entered promiscuous mode [ 84.706948][ T8983] device hsr_slave_1 entered promiscuous mode [ 87.157349][ T8983] 8021q: adding VLAN 0 to HW filter on device bond0 [ 87.746140][ T3374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 87.844833][ T3374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 88.082123][ T8983] 8021q: adding VLAN 0 to HW filter on device team0 [ 88.415036][ T3374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 88.484755][ T3374] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 88.673866][ T3374] bridge0: port 1(bridge_slave_0) entered blocking state [ 88.681200][ T3374] bridge0: port 1(bridge_slave_0) entered forwarding state [ 89.016353][ T9059] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 89.064899][ T9059] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 89.233851][ T9059] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 89.273709][ T9059] bridge0: port 2(bridge_slave_1) entered blocking state [ 89.281184][ T9059] bridge0: port 2(bridge_slave_1) entered forwarding state [ 89.545754][ T9059] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 89.754365][ T9351] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 89.910160][ T3374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 89.936413][ T3374] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 90.195067][ T9351] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 90.213465][ T9351] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 90.433989][ T9351] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 90.619618][ T3374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 90.666197][ T3374] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 05:21:34 executing program 5: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000000300)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000000640)="2400000002031f001cfffd946fa2830020200a000900010063e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) [ 91.144471][ T8983] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 91.946711][ T8983] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 92.430309][ T9351] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 92.523886][ T9351] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 93.297745][ T8983] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 94.800987][ T9447] IPVS: ftp: loaded support on port[0] = 21 [ 95.614660][ T9447] NET: Registered protocol family 30 [ 95.622347][ T9447] Failed to register TIPC socket type [ 97.610389][ T9461] IPVS: ftp: loaded support on port[0] = 21 [ 97.611924][ T9463] IPVS: ftp: loaded support on port[0] = 21 05:21:41 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x1002000000004, 0x200000004, 0x400, 0x0, 0x1}, 0x2c) socket$kcm(0x2, 0x2, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000017000)=0xfffff7fffffffffd, 0x4) listen(r0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0xfffffffffffffdcb) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 98.076942][ T9463] NET: Registered protocol family 30 [ 98.082283][ T9463] Failed to register TIPC socket type [ 98.168178][ T9461] list_add double add: new=ffffffff89544ab0, prev=ffffffff89334ac0, next=ffffffff89544ab0. [ 98.675848][ T9461] ------------[ cut here ]------------ [ 98.681445][ T9461] kernel BUG at lib/list_debug.c:29! [ 99.183305][ T9461] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 99.189435][ T9461] CPU: 1 PID: 9461 Comm: syz-executor.2 Not tainted 5.1.0+ #18 [ 99.197070][ T9461] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 99.207151][ T9461] RIP: 0010:__list_add_valid.cold+0x26/0x3c [ 99.213048][ T9461] Code: 56 ff ff ff 4c 89 e1 48 c7 c7 20 4c a3 87 e8 00 60 25 fe 0f 0b 48 89 f2 4c 89 e1 4c 89 ee 48 c7 c7 60 4d a3 87 e8 e9 5f 25 fe <0f> 0b 48 89 f1 48 c7 c7 e0 4c a3 87 4c 89 e6 e8 d5 5f 25 fe 0f 0b [ 99.232666][ T9461] RSP: 0018:ffff888067b67b88 EFLAGS: 00010282 [ 99.238752][ T9461] RAX: 0000000000000058 RBX: ffffffff89544920 RCX: 0000000000000000 [ 99.246727][ T9461] RDX: 0000000000000000 RSI: ffffffff815afbe6 RDI: ffffed100cf6cf63 [ 99.254707][ T9461] RBP: ffff888067b67ba0 R08: 0000000000000058 R09: ffffed1015d26011 [ 99.262683][ T9461] R10: ffffed1015d26010 R11: ffff8880ae930087 R12: ffffffff89544ab0 [ 99.270658][ T9461] R13: ffffffff89544ab0 R14: ffffffff89544ab0 R15: ffffffff89544a50 [ 99.278732][ T9461] FS: 0000000002735940(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 99.287696][ T9461] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 99.294291][ T9461] CR2: ffffffffff600400 CR3: 0000000067b4f000 CR4: 00000000001406e0 [ 99.302300][ T9461] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 99.310288][ T9461] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 99.318262][ T9461] Call Trace: [ 99.321565][ T9461] ? mutex_lock_nested+0x16/0x20 [ 99.326536][ T9461] proto_register+0x459/0x8e0 [ 99.331223][ T9461] ? lockdep_init_map+0x1be/0x6d0 [ 99.336250][ T9461] tipc_socket_init+0x1c/0x70 [ 99.340933][ T9461] tipc_init_net+0x32a/0x5b0 [ 99.345538][ T9461] ? tipc_exit_net+0x40/0x40 [ 99.350141][ T9461] ops_init+0xb6/0x410 [ 99.354218][ T9461] setup_net+0x2d3/0x740 [ 99.358464][ T9461] ? copy_net_ns+0x1c0/0x340 [ 99.363077][ T9461] ? ops_init+0x410/0x410 [ 99.367420][ T9461] ? kasan_check_write+0x14/0x20 [ 99.372362][ T9461] ? down_read_killable+0x51/0x220 [ 99.377580][ T9461] copy_net_ns+0x1df/0x340 [ 99.382005][ T9461] create_new_namespaces+0x400/0x7b0 [ 99.387308][ T9461] unshare_nsproxy_namespaces+0xc2/0x200 [ 99.392958][ T9461] ksys_unshare+0x440/0x980 [ 99.397478][ T9461] ? trace_hardirqs_on+0x67/0x230 [ 99.402515][ T9461] ? walk_process_tree+0x2d0/0x2d0 [ 99.407649][ T9461] ? blkcg_exit_queue+0x30/0x30 [ 99.412549][ T9461] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 99.418027][ T9461] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 99.424117][ T9461] ? do_syscall_64+0x26/0x680 [ 99.428803][ T9461] ? lockdep_hardirqs_on+0x418/0x5d0 [ 99.434112][ T9461] __x64_sys_unshare+0x31/0x40 [ 99.438971][ T9461] do_syscall_64+0x103/0x680 [ 99.443576][ T9461] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 99.449569][ T9461] RIP: 0033:0x45b897 [ 99.453486][ T9461] Code: 00 00 00 b8 63 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 10 01 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 99.473106][ T9461] RSP: 002b:00007ffce3eb6cc8 EFLAGS: 00000206 ORIG_RAX: 0000000000000110 05:21:43 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x1002000000004, 0x200000004, 0x400, 0x0, 0x1}, 0x2c) socket$kcm(0x2, 0x2, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000017000)=0xfffff7fffffffffd, 0x4) listen(r0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0xfffffffffffffdcb) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 99.481520][ T9461] RAX: ffffffffffffffda RBX: 000000000073c988 RCX: 000000000045b897 [ 99.489514][ T9461] RDX: 0000000000000000 RSI: 00007ffce3eb6c70 RDI: 0000000040000000 [ 99.497505][ T9461] RBP: 00000000000000f8 R08: 0000000000000000 R09: 0000000000000005 [ 99.505496][ T9461] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000414ab0 [ 99.513579][ T9461] R13: 0000000000414b40 R14: 0000000000000000 R15: 0000000000000000 [ 99.521573][ T9461] Modules linked in: [ 99.535718][ T3879] kobject: 'loop0' (000000002427e0c2): kobject_uevent_env [ 99.542906][ T3879] kobject: 'loop0' (000000002427e0c2): fill_kobj_path: path = '/devices/virtual/block/loop0' 05:21:44 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x1002000000004, 0x200000004, 0x400, 0x0, 0x1}, 0x2c) socket$kcm(0x2, 0x2, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000017000)=0xfffff7fffffffffd, 0x4) listen(r0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0xfffffffffffffdcb) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 05:21:46 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x1002000000004, 0x200000004, 0x400, 0x0, 0x1}, 0x2c) socket$kcm(0x2, 0x2, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000017000)=0xfffff7fffffffffd, 0x4) listen(r0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0xfffffffffffffdcb) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 102.539263][ T3879] kobject: 'loop0' (000000002427e0c2): kobject_uevent_env [ 102.653237][ T3879] kobject: 'loop0' (000000002427e0c2): fill_kobj_path: path = '/devices/virtual/block/loop0' 05:21:47 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x1002000000004, 0x200000004, 0x400, 0x0, 0x1}, 0x2c) socket$kcm(0x2, 0x2, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000017000)=0xfffff7fffffffffd, 0x4) listen(r0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0xfffffffffffffdcb) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 103.745842][ T3879] kobject: 'loop0' (000000002427e0c2): kobject_uevent_env [ 104.026544][ T3879] kobject: 'loop0' (000000002427e0c2): fill_kobj_path: path = '/devices/virtual/block/loop0' 05:21:49 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x1002000000004, 0x200000004, 0x400, 0x0, 0x1}, 0x2c) socket$kcm(0x2, 0x2, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000017000)=0xfffff7fffffffffd, 0x4) listen(r0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0xfffffffffffffdcb) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 105.179539][ T3879] kobject: 'loop0' (000000002427e0c2): kobject_uevent_env [ 105.283180][ T3879] kobject: 'loop0' (000000002427e0c2): fill_kobj_path: path = '/devices/virtual/block/loop0' 05:21:50 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x1002000000004, 0x200000004, 0x400, 0x0, 0x1}, 0x2c) socket$kcm(0x2, 0x2, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000017000)=0xfffff7fffffffffd, 0x4) listen(r0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0xfffffffffffffdcb) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 106.162296][ T3879] kobject: 'loop0' (000000002427e0c2): kobject_uevent_env [ 106.283543][ T3879] kobject: 'loop0' (000000002427e0c2): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 106.705859][ T9524] IPVS: ftp: loaded support on port[0] = 21 [ 107.196097][ T3879] kobject: 'loop0' (000000002427e0c2): kobject_uevent_env [ 107.255137][ T3879] kobject: 'loop0' (000000002427e0c2): fill_kobj_path: path = '/devices/virtual/block/loop0'