[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 61.426577][ T26] audit: type=1800 audit(1558154035.196:25): pid=8852 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 61.463935][ T26] audit: type=1800 audit(1558154035.196:26): pid=8852 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 61.515032][ T26] audit: type=1800 audit(1558154035.196:27): pid=8852 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.1.35' (ECDSA) to the list of known hosts. 2019/05/18 04:34:06 fuzzer started 2019/05/18 04:34:09 dialing manager at 10.128.0.26:37669 2019/05/18 04:34:09 syscalls: 1006 2019/05/18 04:34:09 code coverage: enabled 2019/05/18 04:34:09 comparison tracing: enabled 2019/05/18 04:34:09 extra coverage: extra coverage is not supported by the kernel 2019/05/18 04:34:09 setuid sandbox: enabled 2019/05/18 04:34:09 namespace sandbox: enabled 2019/05/18 04:34:09 Android sandbox: /sys/fs/selinux/policy does not exist 2019/05/18 04:34:09 fault injection: enabled 2019/05/18 04:34:09 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/05/18 04:34:09 net packet injection: enabled 2019/05/18 04:34:09 net device setup: enabled 04:34:13 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, 0x0, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r2, 0x0) connect$unix(r0, &(0x7f0000000040)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x1b, 0x0, 0x0) r3 = accept(r2, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000780), 0x1a6, 0x0, 0x0, 0x0) recvmsg(r3, &(0x7f0000001880)={0x0, 0xfffffdcf, 0x0}, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000240)=""/206, 0xce}, {&(0x7f0000000440)=""/216, 0xd8}], 0x2}, 0x0) syzkaller login: [ 79.806207][ T9017] IPVS: ftp: loaded support on port[0] = 21 [ 79.817063][ T9017] NET: Registered protocol family 30 [ 79.822378][ T9017] Failed to register TIPC socket type 04:34:13 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="0d50427bf1c212a5c70cce9439739884581540e61e79d6c8f60b94d496ef09744f080059b1509a84888404d27f44042c1f5ac88176643569553ea2d6cdd0adac76b2292894b00f92dc10ab9f11675559f212ccdbc426174174144496323f7457768eb18e777b1f394b8841df75dc6dc706cb79047fd053382f359c5a751773d2a0442c6669bae13c0bb900ac01fa0b0f4f0d6feba0a44ea1e1ba04529178eea63d7e6d25741f1961dfc84d97a41f926976428a46ac7ec580c972c64bddf9a2e8f52869892771e231543510ccb66be92d80a2"], 0xd2) 04:34:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000000)=0x2, 0x4) getsockopt$packet_buf(r1, 0x107, 0x6, &(0x7f0000651000)=""/240, &(0x7f0000ca5ffc)=0xf0) [ 80.130097][ T9019] IPVS: ftp: loaded support on port[0] = 21 [ 80.148278][ T9019] NET: Registered protocol family 30 [ 80.153620][ T9019] Failed to register TIPC socket type [ 80.375273][ T9021] IPVS: ftp: loaded support on port[0] = 21 [ 80.385437][ T9021] NET: Registered protocol family 30 [ 80.390736][ T9021] Failed to register TIPC socket type 04:34:14 executing program 3: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000600)="9cabbf0400cb8e40419b80008100501d4305", 0x12}], 0x1}, 0x0) [ 80.929474][ T9023] IPVS: ftp: loaded support on port[0] = 21 [ 80.968102][ T9023] NET: Registered protocol family 30 [ 80.973433][ T9023] Failed to register TIPC socket type 04:34:15 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x28, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}, [@typed={0x14, 0x11, @ipv6=@ipv4={[], [], @empty}}]}, 0x28}}, 0x0) [ 81.560947][ T9025] IPVS: ftp: loaded support on port[0] = 21 [ 81.598073][ T9025] NET: Registered protocol family 30 [ 81.603394][ T9025] Failed to register TIPC socket type 04:34:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x200000a, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x803, 0x1) getsockopt(r1, 0x0, 0x6, &(0x7f0000001180)=""/166, &(0x7f0000000040)=0x3) [ 82.269245][ T9027] IPVS: ftp: loaded support on port[0] = 21 [ 82.279378][ T9027] NET: Registered protocol family 30 [ 82.294047][ T9027] Failed to register TIPC socket type [ 82.791985][ T9017] chnl_net:caif_netlink_parms(): no params data found [ 83.226779][ T9017] bridge0: port 1(bridge_slave_0) entered blocking state [ 83.314056][ T9017] bridge0: port 1(bridge_slave_0) entered disabled state [ 83.384948][ T9017] device bridge_slave_0 entered promiscuous mode [ 83.494367][ T9017] bridge0: port 2(bridge_slave_1) entered blocking state [ 83.501573][ T9017] bridge0: port 2(bridge_slave_1) entered disabled state [ 83.604923][ T9017] device bridge_slave_1 entered promiscuous mode [ 84.085592][ T9017] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 84.323307][ T9017] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 84.908960][ T9017] team0: Port device team_slave_0 added [ 85.257131][ T9017] team0: Port device team_slave_1 added [ 86.776519][ T9017] device hsr_slave_0 entered promiscuous mode [ 86.935135][ T9017] device hsr_slave_1 entered promiscuous mode [ 89.496177][ T9017] 8021q: adding VLAN 0 to HW filter on device bond0 [ 90.105737][ T9117] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 90.145171][ T9117] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 90.355652][ T9017] 8021q: adding VLAN 0 to HW filter on device team0 [ 90.695774][ T9117] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 90.745411][ T9117] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 90.924115][ T9117] bridge0: port 1(bridge_slave_0) entered blocking state [ 90.931348][ T9117] bridge0: port 1(bridge_slave_0) entered forwarding state [ 91.425798][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 91.464721][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 91.473478][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 91.764461][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 91.771572][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 92.014191][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 92.216954][ T9384] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 92.274945][ T9384] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 92.485144][ T9384] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 92.714829][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 92.722934][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 92.866466][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 93.058022][ T9384] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 93.165607][ T9384] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 93.374397][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 93.385550][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 93.568294][ T9017] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 94.057210][ T9017] 8021q: adding VLAN 0 to HW filter on device batadv0 04:34:34 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, 0x0, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r2, 0x0) connect$unix(r0, &(0x7f0000000040)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x1b, 0x0, 0x0) r3 = accept(r2, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000780), 0x1a6, 0x0, 0x0, 0x0) recvmsg(r3, &(0x7f0000001880)={0x0, 0xfffffdcf, 0x0}, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000240)=""/206, 0xce}, {&(0x7f0000000440)=""/216, 0xd8}], 0x2}, 0x0) 04:34:35 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, 0x0, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r2, 0x0) connect$unix(r0, &(0x7f0000000040)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x1b, 0x0, 0x0) r3 = accept(r2, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000780), 0x1a6, 0x0, 0x0, 0x0) recvmsg(r3, &(0x7f0000001880)={0x0, 0xfffffdcf, 0x0}, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000240)=""/206, 0xce}, {&(0x7f0000000440)=""/216, 0xd8}], 0x2}, 0x0) 04:34:37 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, 0x0, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r2, 0x0) connect$unix(r0, &(0x7f0000000040)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x1b, 0x0, 0x0) r3 = accept(r2, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000780), 0x1a6, 0x0, 0x0, 0x0) recvmsg(r3, &(0x7f0000001880)={0x0, 0xfffffdcf, 0x0}, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000240)=""/206, 0xce}, {&(0x7f0000000440)=""/216, 0xd8}], 0x2}, 0x0) [ 104.811622][ T9519] IPVS: ftp: loaded support on port[0] = 21 [ 104.987722][ T9518] IPVS: ftp: loaded support on port[0] = 21 [ 105.031895][ T9522] IPVS: ftp: loaded support on port[0] = 21 [ 105.400312][ T9524] IPVS: ftp: loaded support on port[0] = 21 [ 105.407787][ T9522] NET: Registered protocol family 30 [ 105.413088][ T9522] Failed to register TIPC socket type [ 105.417701][ T9519] list_add double add: new=ffffffff89544ab0, prev=ffffffff89334ac0, next=ffffffff89544ab0. 04:34:39 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, 0x0, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r2, 0x0) connect$unix(r0, &(0x7f0000000040)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x1b, 0x0, 0x0) r3 = accept(r2, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000780), 0x1a6, 0x0, 0x0, 0x0) recvmsg(r3, &(0x7f0000001880)={0x0, 0xfffffdcf, 0x0}, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000240)=""/206, 0xce}, {&(0x7f0000000440)=""/216, 0xd8}], 0x2}, 0x0) [ 105.646245][ T9520] IPVS: ftp: loaded support on port[0] = 21 [ 105.865243][ T9519] ------------[ cut here ]------------ [ 105.870761][ T9519] kernel BUG at lib/list_debug.c:29! [ 106.364818][ T9519] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 106.370962][ T9519] CPU: 0 PID: 9519 Comm: syz-executor.2 Not tainted 5.1.0+ #18 [ 106.378501][ T9519] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 106.388573][ T9519] RIP: 0010:__list_add_valid.cold+0x26/0x3c [ 106.394472][ T9519] Code: 56 ff ff ff 4c 89 e1 48 c7 c7 20 4c a3 87 e8 00 60 25 fe 0f 0b 48 89 f2 4c 89 e1 4c 89 ee 48 c7 c7 60 4d a3 87 e8 e9 5f 25 fe <0f> 0b 48 89 f1 48 c7 c7 e0 4c a3 87 4c 89 e6 e8 d5 5f 25 fe 0f 0b [ 106.414082][ T9519] RSP: 0018:ffff888067b37b88 EFLAGS: 00010282 [ 106.420158][ T9519] RAX: 0000000000000058 RBX: ffffffff89544920 RCX: 0000000000000000 [ 106.428138][ T9519] RDX: 0000000000000000 RSI: ffffffff815afbe6 RDI: ffffed100cf66f63 [ 106.436116][ T9519] RBP: ffff888067b37ba0 R08: 0000000000000058 R09: ffffed1015d06011 [ 106.444093][ T9519] R10: ffffed1015d06010 R11: ffff8880ae830087 R12: ffffffff89544ab0 [ 106.452077][ T9519] R13: ffffffff89544ab0 R14: ffffffff89544ab0 R15: ffffffff89544a50 [ 106.460063][ T9519] FS: 000000000219f940(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 106.468994][ T9519] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 106.475579][ T9519] CR2: 00007ff40c7819de CR3: 0000000067b15000 CR4: 00000000001406f0 [ 106.483580][ T9519] Call Trace: [ 106.486890][ T9519] ? mutex_lock_nested+0x16/0x20 [ 106.491838][ T9519] proto_register+0x459/0x8e0 [ 106.496533][ T9519] ? lockdep_init_map+0x1be/0x6d0 [ 106.501566][ T9519] tipc_socket_init+0x1c/0x70 [ 106.506247][ T9519] tipc_init_net+0x32a/0x5b0 [ 106.510847][ T9519] ? tipc_exit_net+0x40/0x40 [ 106.515459][ T9519] ops_init+0xb6/0x410 [ 106.519535][ T9519] setup_net+0x2d3/0x740 [ 106.523780][ T9519] ? copy_net_ns+0x1c0/0x340 [ 106.528373][ T9519] ? ops_init+0x410/0x410 [ 106.532709][ T9519] ? kasan_check_write+0x14/0x20 [ 106.537654][ T9519] ? down_read_killable+0x51/0x220 [ 106.542781][ T9519] copy_net_ns+0x1df/0x340 [ 106.547220][ T9519] create_new_namespaces+0x400/0x7b0 [ 106.552519][ T9519] unshare_nsproxy_namespaces+0xc2/0x200 [ 106.558160][ T9519] ksys_unshare+0x440/0x980 [ 106.562672][ T9519] ? trace_hardirqs_on+0x67/0x230 [ 106.567705][ T9519] ? walk_process_tree+0x2d0/0x2d0 [ 106.572821][ T9519] ? blkcg_exit_queue+0x30/0x30 [ 106.577687][ T9519] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 106.583158][ T9519] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 106.589233][ T9519] ? do_syscall_64+0x26/0x680 [ 106.593926][ T9519] ? lockdep_hardirqs_on+0x418/0x5d0 [ 106.599220][ T9519] __x64_sys_unshare+0x31/0x40 [ 106.603998][ T9519] do_syscall_64+0x103/0x680 [ 106.608604][ T9519] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 106.614505][ T9519] RIP: 0033:0x45b897 [ 106.618410][ T9519] Code: 00 00 00 b8 63 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 10 01 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 106.638019][ T9519] RSP: 002b:00007ffd88f45ba8 EFLAGS: 00000206 ORIG_RAX: 0000000000000110 [ 106.646468][ T9519] RAX: ffffffffffffffda RBX: 000000000073c988 RCX: 000000000045b897 [ 106.654450][ T9519] RDX: 0000000000000000 RSI: 00007ffd88f45b50 RDI: 0000000040000000 [ 106.662432][ T9519] RBP: 00000000000000f8 R08: 0000000000000000 R09: 0000000000000005 [ 106.670587][ T9519] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000414ab0 [ 106.678567][ T9519] R13: 0000000000414b40 R14: 0000000000000000 R15: 0000000000000000 [ 106.686556][ T9519] Modules linked in: 04:34:41 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, 0x0, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r2, 0x0) connect$unix(r0, &(0x7f0000000040)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x1b, 0x0, 0x0) r3 = accept(r2, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000780), 0x1a6, 0x0, 0x0, 0x0) recvmsg(r3, &(0x7f0000001880)={0x0, 0xfffffdcf, 0x0}, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000240)=""/206, 0xce}, {&(0x7f0000000440)=""/216, 0xd8}], 0x2}, 0x0) [ 107.440858][ T3879] kobject: 'loop0' (00000000f0c62c8a): kobject_uevent_env [ 107.703880][ T3879] kobject: 'loop0' (00000000f0c62c8a): fill_kobj_path: path = '/devices/virtual/block/loop0' 04:34:43 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, 0x0, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r2, 0x0) connect$unix(r0, &(0x7f0000000040)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x1b, 0x0, 0x0) r3 = accept(r2, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000780), 0x1a6, 0x0, 0x0, 0x0) recvmsg(r3, &(0x7f0000001880)={0x0, 0xfffffdcf, 0x0}, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000240)=""/206, 0xce}, {&(0x7f0000000440)=""/216, 0xd8}], 0x2}, 0x0) [ 109.534226][ T3879] kobject: 'loop0' (00000000f0c62c8a): kobject_uevent_env [ 109.541438][ T3879] kobject: 'loop0' (00000000f0c62c8a): fill_kobj_path: path = '/devices/virtual/block/loop0' 04:34:45 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, 0x0, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r2, 0x0) connect$unix(r0, &(0x7f0000000040)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x1b, 0x0, 0x0) r3 = accept(r2, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000780), 0x1a6, 0x0, 0x0, 0x0) recvmsg(r3, &(0x7f0000001880)={0x0, 0xfffffdcf, 0x0}, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000240)=""/206, 0xce}, {&(0x7f0000000440)=""/216, 0xd8}], 0x2}, 0x0) [ 111.363662][ T3879] kobject: 'loop0' (00000000f0c62c8a): kobject_uevent_env [ 111.406143][ T3879] kobject: 'loop0' (00000000f0c62c8a): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 112.499910][ T3879] kobject: 'loop0' (00000000f0c62c8a): kobject_uevent_env [ 112.684352][ T3879] kobject: 'loop0' (00000000f0c62c8a): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 115.153857][ T9519] ---[ end trace d6e8d992ae3ed1c6 ]--- [ 115.159400][ T9519] RIP: 0010:__list_add_valid.cold+0x26/0x3c [ 115.304070][ T9519] Code: 56 ff ff ff 4c 89 e1 48 c7 c7 20 4c a3 87 e8 00 60 25 fe 0f 0b 48 89 f2 4c 89 e1 4c 89 ee 48 c7 c7 60 4d a3 87 e8 e9 5f 25 fe <0f> 0b 48 89 f1 48 c7 c7 e0 4c a3 87 4c 89 e6 e8 d5 5f 25 fe 0f 0b [ 115.568244][ T9519] RSP: 0018:ffff888067b37b88 EFLAGS: 00010282 [ 115.653959][ T9519] RAX: 0000000000000058 RBX: ffffffff89544920 RCX: 0000000000000000 [ 115.662028][ T9519] RDX: 0000000000000000 RSI: ffffffff815afbe6 RDI: ffffed100cf66f63 [ 115.843921][ T9519] RBP: ffff888067b37ba0 R08: 0000000000000058 R09: ffffed1015d06011