[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 59.097014][ T24] audit: type=1800 audit(1558152532.674:25): pid=8704 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 59.148175][ T24] audit: type=1800 audit(1558152532.674:26): pid=8704 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 59.182595][ T24] audit: type=1800 audit(1558152532.684:27): pid=8704 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.21' (ECDSA) to the list of known hosts. 2019/05/18 04:09:04 fuzzer started 2019/05/18 04:09:07 dialing manager at 10.128.0.26:37669 2019/05/18 04:09:07 syscalls: 1006 2019/05/18 04:09:07 code coverage: enabled 2019/05/18 04:09:07 comparison tracing: enabled 2019/05/18 04:09:07 extra coverage: extra coverage is not supported by the kernel 2019/05/18 04:09:07 setuid sandbox: enabled 2019/05/18 04:09:07 namespace sandbox: enabled 2019/05/18 04:09:07 Android sandbox: /sys/fs/selinux/policy does not exist 2019/05/18 04:09:07 fault injection: enabled 2019/05/18 04:09:07 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/05/18 04:09:07 net packet injection: enabled 2019/05/18 04:09:07 net device setup: enabled 04:09:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@nat={'nat\x00\x00\x00\x00\x00\a\x00', 0x19, 0x1, 0x1b8, [0x20000080, 0x0, 0x0, 0x200000b0, 0x20000208], 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="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"]}, 0x230) syzkaller login: [ 77.473682][ T8869] IPVS: ftp: loaded support on port[0] = 21 [ 77.485737][ T8869] NET: Registered protocol family 30 [ 77.491068][ T8869] Failed to register TIPC socket type 04:09:11 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) getsockopt$inet_mreqn(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)) write(r1, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969086162293ce8bab8508b489a95c3c13406434d48", 0x94) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000500)=@assoc_value, &(0x7f0000000540)=0x8) sendfile(r1, r1, &(0x7f0000002580), 0x7fffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={r0, 0x10, &(0x7f0000000640)={&(0x7f0000000580)=""/155, 0x9b, 0xffffffffffffffff}}, 0x10) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000100)=ANY=[@ANYBLOB="000003000000000000002e0fd47685b6282f64ead69bd4faffc71310e0d86575d112d9cdc6fa01f55852086443a6d01631"], 0x1) sendfile(r1, r1, &(0x7f0000000240), 0x8000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x2002) [ 77.743709][ T8871] IPVS: ftp: loaded support on port[0] = 21 [ 77.753797][ T8871] NET: Registered protocol family 30 [ 77.759210][ T8871] Failed to register TIPC socket type 04:09:11 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x7, 0x0, "b60110a74706edd7db86023058a70eba75a39952af8867fecf10e977fc68128194f12e155cb09c730647d05a80bad555a8c93b0d74e646cf055643eeff28e8d3db4764ef9b69fb290d3431f218f22c2d"}, 0xd8) sendto$inet(r0, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) close(r0) [ 78.252794][ T8873] IPVS: ftp: loaded support on port[0] = 21 [ 78.278300][ T8873] NET: Registered protocol family 30 [ 78.283617][ T8873] Failed to register TIPC socket type 04:09:12 executing program 3: r0 = socket$kcm(0xa, 0x805, 0x0) sendmsg(r0, &(0x7f0000000680)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @remote, 0x3}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000800)="cf", 0x1}], 0x1}, 0x0) sendmsg(r0, &(0x7f00000005c0)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @remote, 0x5}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000200)='g', 0x1}], 0x1}, 0x0) close(r0) [ 78.850282][ T8875] IPVS: ftp: loaded support on port[0] = 21 [ 78.888650][ T8875] NET: Registered protocol family 30 [ 78.893983][ T8875] Failed to register TIPC socket type 04:09:12 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000008a00)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/48, 0x7510}, {&(0x7f0000000680)=""/120, 0x78}, {&(0x7f0000000300)=""/230, 0xffffff6f}], 0x3}}], 0x1, 0x0, &(0x7f0000008bc0)) [ 79.451131][ T8877] IPVS: ftp: loaded support on port[0] = 21 [ 79.508410][ T8877] NET: Registered protocol family 30 [ 79.513748][ T8877] Failed to register TIPC socket type 04:09:13 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000080)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e20, 0x0, @ipv4={[], [], @loopback}}}, 0x24) r1 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r1, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c}, 0x24) [ 79.987750][ T8869] chnl_net:caif_netlink_parms(): no params data found [ 80.344847][ T8869] bridge0: port 1(bridge_slave_0) entered blocking state [ 80.352509][ T8869] bridge0: port 1(bridge_slave_0) entered disabled state [ 80.415365][ T8869] device bridge_slave_0 entered promiscuous mode [ 80.495060][ T8869] bridge0: port 2(bridge_slave_1) entered blocking state [ 80.502528][ T8869] bridge0: port 2(bridge_slave_1) entered disabled state [ 80.616228][ T8869] device bridge_slave_1 entered promiscuous mode [ 80.732298][ T8953] IPVS: ftp: loaded support on port[0] = 21 [ 80.848703][ T8953] NET: Registered protocol family 30 [ 80.908345][ T8869] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 81.035059][ T8953] Failed to register TIPC socket type [ 81.237114][ T8869] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 82.109902][ T8869] team0: Port device team_slave_0 added [ 82.446823][ T8869] team0: Port device team_slave_1 added [ 83.921574][ T8869] device hsr_slave_0 entered promiscuous mode [ 84.336935][ T8869] device hsr_slave_1 entered promiscuous mode [ 86.897418][ T8869] 8021q: adding VLAN 0 to HW filter on device bond0 [ 87.459933][ T3700] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 87.525805][ T3700] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 87.762517][ T8869] 8021q: adding VLAN 0 to HW filter on device team0 [ 88.095996][ T3700] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 88.165792][ T3700] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 88.314620][ T3700] bridge0: port 1(bridge_slave_0) entered blocking state [ 88.321897][ T3700] bridge0: port 1(bridge_slave_0) entered forwarding state [ 88.671119][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 88.702365][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 88.878049][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 89.028461][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 89.035622][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 89.501349][ T9242] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 89.551337][ T9242] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 89.847752][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 89.920791][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 90.138610][ T9242] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 90.197506][ T9242] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 90.425094][ T9242] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 90.714595][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 90.824393][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 91.008013][ T8869] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 91.518396][ T8869] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 91.742559][ T9087] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 91.803264][ T9087] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 92.515336][ T8869] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 96.992571][ T9345] xt_nfacct: accounting object `syz1' does not exists 04:09:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@nat={'nat\x00\x00\x00\x00\x00\a\x00', 0x19, 0x1, 0x1b8, [0x20000080, 0x0, 0x0, 0x200000b0, 0x20000208], 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="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"]}, 0x230) [ 99.188241][ T9349] IPVS: ftp: loaded support on port[0] = 21 [ 99.229127][ T9351] xt_nfacct: accounting object `syz1' does not exists [ 99.648400][ T9349] NET: Registered protocol family 30 [ 99.653737][ T9349] Failed to register TIPC socket type [ 99.670360][ T9354] IPVS: ftp: loaded support on port[0] = 21 04:09:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@nat={'nat\x00\x00\x00\x00\x00\a\x00', 0x19, 0x1, 0x1b8, [0x20000080, 0x0, 0x0, 0x200000b0, 0x20000208], 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="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"]}, 0x230) [ 100.228178][ T9354] list_add double add: new=ffffffff89544ab0, prev=ffffffff89334ac0, next=ffffffff89544ab0. [ 100.915650][ T9354] ------------[ cut here ]------------ [ 100.921167][ T9354] kernel BUG at lib/list_debug.c:29! [ 101.132767][ T9367] xt_nfacct: accounting object `syz1' does not exists [ 101.269679][ T9354] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 101.276743][ T9354] CPU: 1 PID: 9354 Comm: syz-executor.2 Not tainted 5.1.0+ #18 [ 101.284302][ T9354] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 101.294386][ T9354] RIP: 0010:__list_add_valid.cold+0x26/0x3c [ 101.300281][ T9354] Code: 56 ff ff ff 4c 89 e1 48 c7 c7 20 4c a3 87 e8 00 60 25 fe 0f 0b 48 89 f2 4c 89 e1 4c 89 ee 48 c7 c7 60 4d a3 87 e8 e9 5f 25 fe <0f> 0b 48 89 f1 48 c7 c7 e0 4c a3 87 4c 89 e6 e8 d5 5f 25 fe 0f 0b [ 101.319887][ T9354] RSP: 0018:ffff888079c2fb88 EFLAGS: 00010282 [ 101.325951][ T9354] RAX: 0000000000000058 RBX: ffffffff89544920 RCX: 0000000000000000 [ 101.333919][ T9354] RDX: 0000000000000000 RSI: ffffffff815afbe6 RDI: ffffed100f385f63 [ 101.341884][ T9354] RBP: ffff888079c2fba0 R08: 0000000000000058 R09: ffffed1015d26011 [ 101.349858][ T9354] R10: ffffed1015d26010 R11: ffff8880ae930087 R12: ffffffff89544ab0 [ 101.357826][ T9354] R13: ffffffff89544ab0 R14: ffffffff89544ab0 R15: ffffffff89544a50 [ 101.365803][ T9354] FS: 0000000000e54940(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 101.374727][ T9354] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 101.381765][ T9354] CR2: 0000000020000000 CR3: 000000007a7e6000 CR4: 00000000001406e0 [ 101.389735][ T9354] Call Trace: [ 101.393036][ T9354] ? mutex_lock_nested+0x16/0x20 [ 101.397988][ T9354] proto_register+0x459/0x8e0 [ 101.402667][ T9354] ? lockdep_init_map+0x1be/0x6d0 [ 101.407697][ T9354] tipc_socket_init+0x1c/0x70 [ 101.412374][ T9354] tipc_init_net+0x32a/0x5b0 [ 101.416964][ T9354] ? tipc_exit_net+0x40/0x40 [ 101.421560][ T9354] ops_init+0xb6/0x410 [ 101.425633][ T9354] setup_net+0x2d3/0x740 [ 101.429872][ T9354] ? copy_net_ns+0x1c0/0x340 [ 101.434472][ T9354] ? ops_init+0x410/0x410 [ 101.438808][ T9354] ? kasan_check_write+0x14/0x20 [ 101.443744][ T9354] ? down_read_killable+0x51/0x220 [ 101.448858][ T9354] copy_net_ns+0x1df/0x340 [ 101.453295][ T9354] create_new_namespaces+0x400/0x7b0 [ 101.458584][ T9354] unshare_nsproxy_namespaces+0xc2/0x200 [ 101.464219][ T9354] ksys_unshare+0x440/0x980 [ 101.468725][ T9354] ? trace_hardirqs_on+0x67/0x230 [ 101.473753][ T9354] ? walk_process_tree+0x2d0/0x2d0 [ 101.478955][ T9354] ? blkcg_exit_queue+0x30/0x30 [ 101.483815][ T9354] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 101.489275][ T9354] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 101.495342][ T9354] ? do_syscall_64+0x26/0x680 [ 101.500058][ T9354] ? lockdep_hardirqs_on+0x418/0x5d0 [ 101.505370][ T9354] __x64_sys_unshare+0x31/0x40 [ 101.510138][ T9354] do_syscall_64+0x103/0x680 [ 101.514738][ T9354] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 101.520640][ T9354] RIP: 0033:0x45b897 [ 101.524543][ T9354] Code: 00 00 00 b8 63 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 10 01 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 101.544161][ T9354] RSP: 002b:00007fff3b0e6ad8 EFLAGS: 00000202 ORIG_RAX: 0000000000000110 [ 101.552570][ T9354] RAX: ffffffffffffffda RBX: 000000000073c988 RCX: 000000000045b897 [ 101.560550][ T9354] RDX: 0000000000000000 RSI: 00007fff3b0e6a80 RDI: 0000000040000000 [ 101.568517][ T9354] RBP: 00000000000000f8 R08: 0000000000000000 R09: 0000000000000005 [ 101.576498][ T9354] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000414ab0 [ 101.584642][ T9354] R13: 0000000000414b40 R14: 0000000000000000 R15: 0000000000000000 [ 101.592623][ T9354] Modules linked in: 04:09:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@nat={'nat\x00\x00\x00\x00\x00\a\x00', 0x19, 0x1, 0x1b8, [0x20000080, 0x0, 0x0, 0x200000b0, 0x20000208], 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="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"]}, 0x230) [ 102.433840][ T3879] kobject: 'loop0' (00000000ad3feb62): kobject_uevent_env [ 102.484138][ T3879] kobject: 'loop0' (00000000ad3feb62): fill_kobj_path: path = '/devices/virtual/block/loop0' 04:09:37 executing program 0: r0 = socket(0x8000000000010, 0x10000000002, 0x0) sendto(r0, &(0x7f0000000140)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x1c, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x61c}, {&(0x7f00000024c0)=""/4096, 0x10fc}, {&(0x7f0000000400)=""/120, 0x244}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0xc1, &(0x7f0000002400)=""/191, 0xbf}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 103.861814][ T3879] kobject: 'loop0' (00000000ad3feb62): kobject_uevent_env [ 104.134555][ T3879] kobject: 'loop0' (00000000ad3feb62): fill_kobj_path: path = '/devices/virtual/block/loop0' 04:09:39 executing program 0: r0 = socket(0x8000000000010, 0x10000000002, 0x0) sendto(r0, &(0x7f0000000140)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x1c, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x61c}, {&(0x7f00000024c0)=""/4096, 0x10fc}, {&(0x7f0000000400)=""/120, 0x244}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0xc1, &(0x7f0000002400)=""/191, 0xbf}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 105.633900][ T3879] kobject: 'loop0' (00000000ad3feb62): kobject_uevent_env [ 105.754412][ T3879] kobject: 'loop0' (00000000ad3feb62): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 106.188404][ T9386] IPVS: ftp: loaded support on port[0] = 21 04:09:41 executing program 0: r0 = socket(0x8000000000010, 0x10000000002, 0x0) sendto(r0, &(0x7f0000000140)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x1c, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x61c}, {&(0x7f00000024c0)=""/4096, 0x10fc}, {&(0x7f0000000400)=""/120, 0x244}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0xc1, &(0x7f0000002400)=""/191, 0xbf}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 108.012086][ T3879] kobject: 'loop0' (00000000ad3feb62): kobject_uevent_env [ 108.037751][ T3879] kobject: 'loop0' (00000000ad3feb62): fill_kobj_path: path = '/devices/virtual/block/loop0' 04:09:43 executing program 0: r0 = socket(0x8000000000010, 0x10000000002, 0x0) sendto(r0, &(0x7f0000000140)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x1c, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x61c}, {&(0x7f00000024c0)=""/4096, 0x10fc}, {&(0x7f0000000400)=""/120, 0x244}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0xc1, &(0x7f0000002400)=""/191, 0xbf}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 109.626321][ T3879] kobject: 'loop0' (00000000ad3feb62): kobject_uevent_env [ 109.633513][ T3879] kobject: 'loop0' (00000000ad3feb62): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 109.828198][ T9432] IPVS: ftp: loaded support on port[0] = 21