[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 57.044362][ T27] audit: type=1800 audit(1558158953.037:25): pid=8726 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 57.098836][ T27] audit: type=1800 audit(1558158953.037:26): pid=8726 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 57.128241][ T27] audit: type=1800 audit(1558158953.037:27): pid=8726 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.4' (ECDSA) to the list of known hosts. 2019/05/18 05:56:02 fuzzer started 2019/05/18 05:56:05 dialing manager at 10.128.0.26:37669 2019/05/18 05:56:05 syscalls: 1006 2019/05/18 05:56:05 code coverage: enabled 2019/05/18 05:56:05 comparison tracing: enabled 2019/05/18 05:56:05 extra coverage: extra coverage is not supported by the kernel 2019/05/18 05:56:05 setuid sandbox: enabled 2019/05/18 05:56:05 namespace sandbox: enabled 2019/05/18 05:56:05 Android sandbox: /sys/fs/selinux/policy does not exist 2019/05/18 05:56:05 fault injection: enabled 2019/05/18 05:56:05 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/05/18 05:56:05 net packet injection: enabled 2019/05/18 05:56:05 net device setup: enabled 05:56:09 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x51) poll(&(0x7f0000000080)=[{r0}], 0x1, 0x0) syzkaller login: [ 73.924831][ T8891] IPVS: ftp: loaded support on port[0] = 21 [ 73.935520][ T8891] NET: Registered protocol family 30 [ 73.941252][ T8891] Failed to register TIPC socket type 05:56:10 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x15, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="b99193ad5ffabc1fb9303c573674", 0x0}, 0x28) [ 74.180392][ T8893] IPVS: ftp: loaded support on port[0] = 21 [ 74.191815][ T8893] NET: Registered protocol family 30 [ 74.197151][ T8893] Failed to register TIPC socket type 05:56:10 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) r2 = socket$kcm(0x29, 0x4000002, 0x0) epoll_create1(0x0) write(r1, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969086162293ce8bab8508b489a95c3c13406434d48635c159385b740ca576f0d24210376fe02f72c51d947c066f43deffde579ddb806eec71ac710404185f9", 0xbe) preadv(r0, &(0x7f00000007c0)=[{0x0}, {0x0}], 0x2, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, 0x0, &(0x7f00000009c0)=0x130) sendfile(r1, r1, &(0x7f0000000080), 0x7ffffffb) ioctl$FICLONE(r1, 0x40049409, 0xffffffffffffffff) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000b00)=0x8) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f00000005c0)=""/246, &(0x7f0000000300)=0xf6) sendmsg$tipc(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000800)}, {0x0}], 0x2}, 0x800) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000540), &(0x7f0000000a00)=0x14) sendfile(r1, r1, &(0x7f0000000240), 0x8000) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$SIOCAX25CTLCON(r0, 0x89e8, &(0x7f00000000c0)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x9, 0x6, 0x1, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @default, @bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast, @default]}) [ 74.588549][ T8895] IPVS: ftp: loaded support on port[0] = 21 [ 74.612902][ T8895] NET: Registered protocol family 30 [ 74.618209][ T8895] Failed to register TIPC socket type 05:56:10 executing program 3: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f00000001c0)={@local, @empty=[0x1000000, 0x4888], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @local={0xac, 0x13, 0xffffffffffffffff}, @multicast1}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 75.076534][ T8897] IPVS: ftp: loaded support on port[0] = 21 [ 75.112787][ T8897] NET: Registered protocol family 30 [ 75.118095][ T8897] Failed to register TIPC socket type 05:56:11 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xf, 0x4, 0x4, 0xc2ea, 0x0, 0xffffffffffffffff, 0x0, [0x11]}, 0x3c) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) connect$llc(r0, &(0x7f0000000040)={0x1a, 0x30a, 0x49c, 0x9, 0x6, 0x6, @dev={[], 0x1e}}, 0x10) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4000000000004e24, 0x0, @loopback, 0xfffffffffffffff7}, 0x1c) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f00000004c0)) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000c, 0x2011, r0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46cf058001030000000000000002003f0008000000f3000000380000009102000003000000f8c3fdf50300010001000101000000001a0000002200000f07000000358e00a6555238def2010000000000000000000000000000000000000000000000000000000000000000000000000000e9882093000000190000002bc18e24f2abad7ed7b634880000000000000000000000edffffff0000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000100500000000000aa000000000000000000001309f04b7a98111c77b6e5b56589a1e8604dfbb3e2fdf6ebbdcaa5ac43011bb9685d9b39f7b0718816585d779cb3fcc7694830e815142b47b0eb95fae677fd1dfc0c30a5e9ee3b82f2aefdc72e3a9912b66ab38b7686d1e65a2069360cbd4b45f98683eb67d72d9af0ff6e18f86b321307cd3e00a2ad9db46d7a9f6e4a00f420b8b5421c7afb3f47348ed07f31cc50cdafda30e437c5a15b57975fa9"], 0x1f1) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000d80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000f80), &(0x7f0000000fc0)=0xc) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) [ 75.786361][ T8899] IPVS: ftp: loaded support on port[0] = 21 [ 75.824025][ T8899] NET: Registered protocol family 30 [ 75.849007][ T8899] Failed to register TIPC socket type 05:56:12 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_sco(r0, &(0x7f0000000040), 0x8) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000000)={0x0, 0x1edf9425, 0x0, 0x40}, 0xc) listen(r0, 0x0) [ 76.537774][ T8901] IPVS: ftp: loaded support on port[0] = 21 [ 76.573557][ T8901] NET: Registered protocol family 30 [ 76.580581][ T8901] Failed to register TIPC socket type [ 76.855738][ T8891] chnl_net:caif_netlink_parms(): no params data found [ 77.300568][ T8891] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.308199][ T8891] bridge0: port 1(bridge_slave_0) entered disabled state [ 77.391002][ T8891] device bridge_slave_0 entered promiscuous mode [ 77.479857][ T8891] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.487019][ T8891] bridge0: port 2(bridge_slave_1) entered disabled state [ 77.560791][ T8891] device bridge_slave_1 entered promiscuous mode [ 77.960141][ T8891] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 78.159083][ T8891] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 79.015363][ T8891] team0: Port device team_slave_0 added [ 79.460625][ T8891] team0: Port device team_slave_1 added [ 80.656885][ T8891] device hsr_slave_0 entered promiscuous mode [ 81.157856][ T8891] device hsr_slave_1 entered promiscuous mode [ 83.811968][ T8891] 8021q: adding VLAN 0 to HW filter on device bond0 [ 84.391651][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 84.480324][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 84.601669][ T8891] 8021q: adding VLAN 0 to HW filter on device team0 [ 85.031771][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 85.079437][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 85.087946][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 85.095208][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 85.633034][ T9103] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 85.670365][ T9103] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 85.815810][ T9103] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 85.950272][ T9103] bridge0: port 2(bridge_slave_1) entered blocking state [ 85.957380][ T9103] bridge0: port 2(bridge_slave_1) entered forwarding state [ 86.249685][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 86.401773][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 86.688885][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 86.698173][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 86.979541][ T9103] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 86.987558][ T9103] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 87.174713][ T9103] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 87.359552][ T9103] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 87.369743][ T9103] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 87.597504][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 87.679637][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 87.811898][ T8891] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 88.400035][ T8891] 8021q: adding VLAN 0 to HW filter on device batadv0 05:56:34 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x51) poll(&(0x7f0000000080)=[{r0}], 0x1, 0x0) [ 98.355104][ T9386] IPVS: ftp: loaded support on port[0] = 21 [ 98.651047][ T9390] IPVS: ftp: loaded support on port[0] = 21 [ 98.899855][ T9387] IPVS: ftp: loaded support on port[0] = 21 [ 98.940361][ T9391] IPVS: ftp: loaded support on port[0] = 21 [ 98.952385][ T9386] NET: Registered protocol family 30 [ 98.957694][ T9386] Failed to register TIPC socket type [ 98.993520][ T9390] list_add double add: new=ffffffff89544ab0, prev=ffffffff89334ac0, next=ffffffff89544ab0. [ 99.373900][ T9390] ------------[ cut here ]------------ [ 99.379405][ T9390] kernel BUG at lib/list_debug.c:29! [ 99.792891][ T9390] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 99.798999][ T9390] CPU: 0 PID: 9390 Comm: syz-executor.3 Not tainted 5.1.0+ #18 [ 99.806532][ T9390] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 99.816600][ T9390] RIP: 0010:__list_add_valid.cold+0x26/0x3c [ 99.822493][ T9390] Code: 56 ff ff ff 4c 89 e1 48 c7 c7 20 4c a3 87 e8 00 60 25 fe 0f 0b 48 89 f2 4c 89 e1 4c 89 ee 48 c7 c7 60 4d a3 87 e8 e9 5f 25 fe <0f> 0b 48 89 f1 48 c7 c7 e0 4c a3 87 4c 89 e6 e8 d5 5f 25 fe 0f 0b [ 99.842103][ T9390] RSP: 0018:ffff8880775e7b88 EFLAGS: 00010282 [ 99.848176][ T9390] RAX: 0000000000000058 RBX: ffffffff89544920 RCX: 0000000000000000 [ 99.856158][ T9390] RDX: 0000000000000000 RSI: ffffffff815afbe6 RDI: ffffed100eebcf63 [ 99.864125][ T9390] RBP: ffff8880775e7ba0 R08: 0000000000000058 R09: ffffed1015d06011 [ 99.872100][ T9390] R10: ffffed1015d06010 R11: ffff8880ae830087 R12: ffffffff89544ab0 [ 99.880071][ T9390] R13: ffffffff89544ab0 R14: ffffffff89544ab0 R15: ffffffff89544a50 [ 99.888049][ T9390] FS: 000000000138c940(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 99.897229][ T9390] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 99.903807][ T9390] CR2: 00007f94c52e04a0 CR3: 000000007f431000 CR4: 00000000001406f0 [ 99.911781][ T9390] Call Trace: [ 99.915079][ T9390] ? mutex_lock_nested+0x16/0x20 [ 99.920017][ T9390] proto_register+0x459/0x8e0 [ 99.924702][ T9390] ? lockdep_init_map+0x1be/0x6d0 [ 99.929729][ T9390] tipc_socket_init+0x1c/0x70 [ 99.934412][ T9390] tipc_init_net+0x32a/0x5b0 [ 99.939002][ T9390] ? tipc_exit_net+0x40/0x40 [ 99.943594][ T9390] ops_init+0xb6/0x410 [ 99.947682][ T9390] setup_net+0x2d3/0x740 [ 99.951917][ T9390] ? copy_net_ns+0x1c0/0x340 [ 99.956508][ T9390] ? ops_init+0x410/0x410 [ 99.960851][ T9390] ? kasan_check_write+0x14/0x20 [ 99.965789][ T9390] ? down_read_killable+0x51/0x220 [ 99.970896][ T9390] copy_net_ns+0x1df/0x340 [ 99.975316][ T9390] create_new_namespaces+0x400/0x7b0 [ 99.980608][ T9390] unshare_nsproxy_namespaces+0xc2/0x200 [ 99.986245][ T9390] ksys_unshare+0x440/0x980 [ 99.990744][ T9390] ? trace_hardirqs_on+0x67/0x230 [ 99.995772][ T9390] ? walk_process_tree+0x2d0/0x2d0 [ 100.000881][ T9390] ? blkcg_exit_queue+0x30/0x30 [ 100.005741][ T9390] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 100.011211][ T9390] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 100.017279][ T9390] ? do_syscall_64+0x26/0x680 [ 100.021953][ T9390] ? lockdep_hardirqs_on+0x418/0x5d0 [ 100.027235][ T9390] __x64_sys_unshare+0x31/0x40 [ 100.031998][ T9390] do_syscall_64+0x103/0x680 [ 100.036590][ T9390] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 100.042490][ T9390] RIP: 0033:0x45b897 [ 100.046386][ T9390] Code: 00 00 00 b8 63 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 10 01 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 100.065999][ T9390] RSP: 002b:00007fff62a0ebf8 EFLAGS: 00000206 ORIG_RAX: 0000000000000110 [ 100.074413][ T9390] RAX: ffffffffffffffda RBX: 000000000073c988 RCX: 000000000045b897 [ 100.082382][ T9390] RDX: 0000000000000000 RSI: 00007fff62a0eba0 RDI: 0000000040000000 [ 100.090361][ T9390] RBP: 00000000000000f8 R08: 0000000000000000 R09: 0000000000000005 [ 100.098337][ T9390] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000414ab0 [ 100.106304][ T9390] R13: 0000000000414b40 R14: 0000000000000000 R15: 0000000000000000 [ 100.114277][ T9390] Modules linked in: 05:56:36 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x51) poll(&(0x7f0000000080)=[{r0}], 0x1, 0x0) [ 100.436493][ T3879] kobject: 'loop0' (00000000ba4a7467): kobject_uevent_env [ 100.489202][ T3879] kobject: 'loop0' (00000000ba4a7467): fill_kobj_path: path = '/devices/virtual/block/loop0' 05:56:37 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x51) poll(&(0x7f0000000080)=[{r0}], 0x1, 0x0) [ 101.364150][ T3879] kobject: 'loop0' (00000000ba4a7467): kobject_uevent_env [ 101.448799][ T3879] kobject: 'loop0' (00000000ba4a7467): fill_kobj_path: path = '/devices/virtual/block/loop0' 05:56:38 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x51) poll(&(0x7f0000000080)=[{r0}], 0x1, 0x0) [ 102.944541][ T3879] kobject: 'loop0' (00000000ba4a7467): kobject_uevent_env [ 103.198782][ T3879] kobject: 'loop0' (00000000ba4a7467): fill_kobj_path: path = '/devices/virtual/block/loop0' 05:56:40 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x51) poll(&(0x7f0000000080)=[{r0}], 0x1, 0x0) [ 104.084554][ T3879] kobject: 'loop0' (00000000ba4a7467): kobject_uevent_env [ 104.129197][ T3879] kobject: 'loop0' (00000000ba4a7467): fill_kobj_path: path = '/devices/virtual/block/loop0' 05:56:40 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x51) poll(&(0x7f0000000080)=[{r0}], 0x1, 0x0) [ 104.677611][ T3879] kobject: 'loop0' (00000000ba4a7467): kobject_uevent_env [ 104.783011][ T9458] IPVS: ftp: loaded support on port[0] = 21 [ 104.908774][ T3879] kobject: 'loop0' (00000000ba4a7467): fill_kobj_path: path = '/devices/virtual/block/loop0' 05:56:41 executing program 0: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x17f) write(r0, &(0x7f000018efdc)="2400000052001f0214f9f407000904000a00071008000700feffffff0800000000000000", 0x24) [ 105.639262][ T3879] kobject: 'loop0' (00000000ba4a7467): kobject_uevent_env [ 105.646452][ T3879] kobject: 'loop0' (00000000ba4a7467): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 106.579075][ T3879] kobject: 'loop0' (00000000ba4a7467): kobject_uevent_env [ 106.586717][ T3879] kobject: 'loop0' (00000000ba4a7467): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 108.429308][ T9390] ---[ end trace d778f5193f3102cf ]--- [ 108.434837][ T9390] RIP: 0010:__list_add_valid.cold+0x26/0x3c [ 108.609077][ T9390] Code: 56 ff ff ff 4c 89 e1 48 c7 c7 20 4c a3 87 e8 00 60 25 fe 0f 0b 48 89 f2 4c 89 e1 4c 89 ee 48 c7 c7 60 4d a3 87 e8 e9 5f 25 fe <0f> 0b 48 89 f1 48 c7 c7 e0 4c a3 87 4c 89 e6 e8 d5 5f 25 fe 0f 0b [ 108.860667][ T9390] RSP: 0018:ffff8880775e7b88 EFLAGS: 00010282 [ 108.866774][ T9390] RAX: 0000000000000058 RBX: ffffffff89544920 RCX: 0000000000000000 [ 109.049524][ T9390] RDX: 0000000000000000 RSI: ffffffff815afbe6 RDI: ffffed100eebcf63 [ 109.057534][ T9390] RBP: ffff8880775e7ba0 R08: 0000000000000058 R09: ffffed1015d06011 [ 109.328766][ T9390] R10: ffffed1015d06010 R11: ffff8880ae830087 R12: ffffffff89544ab0 [ 109.336777][ T9390] R13: ffffffff89544ab0 R14: ffffffff89544ab0 R15: ffffffff89544a50