[ 41.916024] audit: type=1800 audit(1559624112.574:29): pid=7758 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2447 res=0 [ 41.953127] audit: type=1800 audit(1559624112.574:30): pid=7758 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.23' (ECDSA) to the list of known hosts. 2019/06/04 04:55:20 fuzzer started syzkaller login: [ 50.281514] kauditd_printk_skb: 5 callbacks suppressed [ 50.281532] audit: type=1400 audit(1559624120.934:36): avc: denied { map } for pid=7939 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/06/04 04:55:23 dialing manager at 10.128.0.105:38735 2019/06/04 04:55:23 syscalls: 2460 2019/06/04 04:55:23 code coverage: enabled 2019/06/04 04:55:23 comparison tracing: enabled 2019/06/04 04:55:23 extra coverage: extra coverage is not supported by the kernel 2019/06/04 04:55:23 setuid sandbox: enabled 2019/06/04 04:55:23 namespace sandbox: enabled 2019/06/04 04:55:23 Android sandbox: /sys/fs/selinux/policy does not exist 2019/06/04 04:55:23 fault injection: enabled 2019/06/04 04:55:23 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/06/04 04:55:23 net packet injection: enabled 2019/06/04 04:55:23 net device setup: enabled 04:55:26 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000480)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000f00)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) [ 55.989420] audit: type=1400 audit(1559624126.644:37): avc: denied { map } for pid=7958 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=68 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 56.114050] IPVS: ftp: loaded support on port[0] = 21 [ 56.124859] NET: Registered protocol family 30 [ 56.129493] Failed to register TIPC socket type 04:55:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") unshare(0x44010000) [ 56.377548] IPVS: ftp: loaded support on port[0] = 21 [ 56.407739] NET: Registered protocol family 30 [ 56.412370] Failed to register TIPC socket type 04:55:27 executing program 2: ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6) creat(&(0x7f0000000200)='./file0\x00', 0x13e) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="18c18377381651f43423f45497"], 0x1}}, 0x0) sendto$inet(r0, 0x0, 0x0, 0x40, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x142800) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0xfffffffffffffffe) [ 56.730680] IPVS: ftp: loaded support on port[0] = 21 [ 56.747498] NET: Registered protocol family 30 [ 56.752087] Failed to register TIPC socket type 04:55:27 executing program 3: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_DECODER_CMD(r0, 0xc0145608, &(0x7f0000000100)={0xe7, 0x2, @start={0x4}}) [ 57.299788] IPVS: ftp: loaded support on port[0] = 21 [ 57.317578] NET: Registered protocol family 30 [ 57.322175] Failed to register TIPC socket type 04:55:28 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x1ff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x1) [ 57.856915] IPVS: ftp: loaded support on port[0] = 21 [ 57.899059] NET: Registered protocol family 30 [ 57.933069] Failed to register TIPC socket type 04:55:28 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000140)) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)={0x0, 0x0, @pic={0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e2}}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 58.568842] IPVS: ftp: loaded support on port[0] = 21 [ 58.597705] NET: Registered protocol family 30 [ 58.602325] Failed to register TIPC socket type [ 59.087887] chnl_net:caif_netlink_parms(): no params data found [ 59.515623] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.539988] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.651612] device bridge_slave_0 entered promiscuous mode [ 59.792397] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.904115] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.042568] device bridge_slave_1 entered promiscuous mode [ 60.596367] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 60.878238] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 61.545444] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 61.714231] team0: Port device team_slave_0 added [ 61.946418] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 62.120698] team0: Port device team_slave_1 added [ 62.374163] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 62.706006] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 63.626366] device hsr_slave_0 entered promiscuous mode [ 63.943561] device hsr_slave_1 entered promiscuous mode [ 64.130475] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 64.324501] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 64.628714] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 65.226317] 8021q: adding VLAN 0 to HW filter on device bond0 [ 65.416693] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 65.610512] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 65.700994] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 65.722492] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 65.850110] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 65.938094] 8021q: adding VLAN 0 to HW filter on device team0 [ 66.132328] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 66.242395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 66.273555] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 66.364395] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.371036] bridge0: port 1(bridge_slave_0) entered forwarding state [ 66.541105] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 66.611538] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 66.633721] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 66.724640] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 66.773376] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.779806] bridge0: port 2(bridge_slave_1) entered forwarding state [ 66.914060] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 66.942593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 67.103433] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 67.110379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 67.230483] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 67.310664] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 67.334921] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 67.445454] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 67.516626] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 67.534978] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 67.625903] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 67.708277] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 67.774008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 67.781885] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 67.912407] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 67.974427] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 67.982318] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 68.098371] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 68.182095] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 68.277322] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 68.414565] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 68.585694] audit: type=1400 audit(1559624139.244:38): avc: denied { associate } for pid=7959 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 04:55:41 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000480)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000f00)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) 04:55:41 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000480)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000f00)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) 04:55:42 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000480)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000f00)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) 04:55:43 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000480)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000f00)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) [ 72.988330] IPVS: ftp: loaded support on port[0] = 21 04:55:43 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000480)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000f00)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) [ 73.037908] IPVS: ftp: loaded support on port[0] = 21 [ 73.040135] NET: Registered protocol family 30 [ 73.065733] IPVS: ftp: loaded support on port[0] = 21 [ 73.068364] list_add double add: new=ffffffff892e7630, prev=ffffffff890f3140, next=ffffffff892e7630. [ 73.071447] Failed to register TIPC socket type [ 73.088610] IPVS: ftp: loaded support on port[0] = 21 [ 73.126657] ------------[ cut here ]------------ [ 73.131462] kernel BUG at lib/list_debug.c:29! [ 73.137420] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 73.142826] CPU: 1 PID: 8609 Comm: syz-executor.4 Not tainted 4.19.47 #19 [ 73.149759] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 73.149796] kobject: 'loop0' (000000001e86054a): kobject_uevent_env [ 73.159143] RIP: 0010:__list_add_valid.cold+0x26/0x3c 04:55:43 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000480)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000f00)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) [ 73.159157] Code: 56 ff ff ff 4c 89 e1 48 c7 c7 a0 ae 81 87 e8 d0 f3 30 fe 0f 0b 48 89 f2 4c 89 e1 4c 89 ee 48 c7 c7 e0 af 81 87 e8 b9 f3 30 fe <0f> 0b 48 89 f1 48 c7 c7 60 af 81 87 4c 89 e6 e8 a5 f3 30 fe 0f 0b [ 73.159163] RSP: 0018:ffff88808760fb88 EFLAGS: 00010282 [ 73.159174] RAX: 0000000000000058 RBX: ffffffff892e74a0 RCX: 0000000000000000 [ 73.159184] RDX: 0000000000000000 RSI: ffffffff81559f66 RDI: ffffed1010ec1f63 [ 73.159191] RBP: ffff88808760fba0 R08: 0000000000000058 R09: ffffed1015d24fe9 [ 73.159203] R10: ffffed1015d24fe8 R11: ffff8880ae927f47 R12: ffffffff892e7630 [ 73.159210] R13: ffffffff892e7630 R14: ffffffff892e7630 R15: ffffffff892e75d0 [ 73.159221] FS: 0000000000fb9940(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 73.159236] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 73.174053] kobject: 'loop0' (000000001e86054a): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 73.190024] CR2: ffffffffff600400 CR3: 000000007330c000 CR4: 00000000001406e0 [ 73.190033] Call Trace: [ 73.190054] ? mutex_lock_nested+0x16/0x20 [ 73.190072] proto_register+0x459/0x8e0 [ 73.190091] tipc_socket_init+0x1c/0x70 [ 73.190111] tipc_init_net+0x2ed/0x570 [ 73.231322] kobject: 'loop0' (000000001e86054a): kobject_uevent_env [ 73.231799] ? tipc_exit_net+0x40/0x40 [ 73.243530] kobject: 'loop0' (000000001e86054a): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 73.245904] ops_init+0xb3/0x410 [ 73.304177] setup_net+0x2d3/0x740 [ 73.307732] ? lock_acquire+0x16f/0x3f0 [ 73.311686] ? ops_init+0x410/0x410 [ 73.315299] copy_net_ns+0x1df/0x340 [ 73.319012] create_new_namespaces+0x400/0x7b0 [ 73.323593] unshare_nsproxy_namespaces+0xc2/0x200 [ 73.328520] ksys_unshare+0x440/0x980 [ 73.332299] ? walk_process_tree+0x2c0/0x2c0 [ 73.336692] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 73.341440] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 73.346794] ? do_syscall_64+0x26/0x620 [ 73.350747] ? lockdep_hardirqs_on+0x415/0x5d0 [ 73.355311] __x64_sys_unshare+0x31/0x40 [ 73.359364] do_syscall_64+0xfd/0x620 [ 73.363149] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 73.368315] RIP: 0033:0x45bd47 04:55:44 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000480)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000f00)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) [ 73.371503] Code: 00 00 00 b8 63 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 1d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 10 01 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 73.390383] RSP: 002b:00007ffdc23b1978 EFLAGS: 00000202 ORIG_RAX: 0000000000000110 [ 73.398076] RAX: ffffffffffffffda RBX: 000000000075c9a8 RCX: 000000000045bd47 [ 73.405326] RDX: 0000000000000000 RSI: 00007ffdc23b1920 RDI: 0000000040000000 [ 73.412573] RBP: 00000000000000f8 R08: 0000000000000000 R09: 0000000000000005 [ 73.419819] R10: 0000000000000000 R11: 0000000000000202 R12: 000000000075c9a8 [ 73.427068] R13: 00007ffdc23b1be8 R14: 0000000000000000 R15: 0000000000000000 [ 73.434318] Modules linked in: [ 73.438918] ---[ end trace c3f7725a9e85df71 ]--- [ 73.444137] RIP: 0010:__list_add_valid.cold+0x26/0x3c [ 73.450256] Code: 56 ff ff ff 4c 89 e1 48 c7 c7 a0 ae 81 87 e8 d0 f3 30 fe 0f 0b 48 89 f2 4c 89 e1 4c 89 ee 48 c7 c7 e0 af 81 87 e8 b9 f3 30 fe <0f> 0b 48 89 f1 48 c7 c7 60 af 81 87 4c 89 e6 e8 a5 f3 30 fe 0f 0b [ 73.466060] kobject: 'loop0' (000000001e86054a): kobject_uevent_env [ 73.471220] RSP: 0018:ffff88808760fb88 EFLAGS: 00010282 [ 73.475722] kobject: 'loop0' (000000001e86054a): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 73.480990] RAX: 0000000000000058 RBX: ffffffff892e74a0 RCX: 0000000000000000 [ 73.497811] RDX: 0000000000000000 RSI: ffffffff81559f66 RDI: ffffed1010ec1f63 [ 73.505326] RBP: ffff88808760fba0 R08: 0000000000000058 R09: ffffed1015d24fe9 [ 73.512611] R10: ffffed1015d24fe8 R11: ffff8880ae927f47 R12: ffffffff892e7630 [ 73.519901] R13: ffffffff892e7630 R14: ffffffff892e7630 R15: ffffffff892e75d0 [ 73.527220] FS: 0000000000fb9940(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 73.535693] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 73.541567] CR2: 0000000000689928 CR3: 000000007330c000 CR4: 00000000001406f0 [ 73.548899] Kernel panic - not syncing: Fatal exception [ 73.555197] Kernel Offset: disabled [ 73.558830] Rebooting in 86400 seconds..