[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 54.574318][ T26] audit: type=1800 audit(1558145251.166:25): pid=8273 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 54.607938][ T26] audit: type=1800 audit(1558145251.166:26): pid=8273 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 54.643326][ T26] audit: type=1800 audit(1558145251.166:27): pid=8273 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.236' (ECDSA) to the list of known hosts. 2019/05/18 02:07:39 fuzzer started 2019/05/18 02:07:42 dialing manager at 10.128.0.26:37669 2019/05/18 02:07:42 syscalls: 1006 2019/05/18 02:07:42 code coverage: enabled 2019/05/18 02:07:42 comparison tracing: enabled 2019/05/18 02:07:42 extra coverage: extra coverage is not supported by the kernel 2019/05/18 02:07:42 setuid sandbox: enabled 2019/05/18 02:07:42 namespace sandbox: enabled 2019/05/18 02:07:42 Android sandbox: /sys/fs/selinux/policy does not exist 2019/05/18 02:07:42 fault injection: enabled 2019/05/18 02:07:42 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/05/18 02:07:42 net packet injection: enabled 2019/05/18 02:07:42 net device setup: enabled 02:07:44 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r1, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x4e24}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000040)=[{r1, 0x2, 0x3000300}], 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_sctp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ppoll(&(0x7f0000000080), 0x0, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140), 0x8) getpid() sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000ab80)={0x0, 0x0, 0x0}, 0x0) ppoll(0x0, 0x0, &(0x7f0000000340), &(0x7f0000000380), 0x8) r2 = accept(0xffffffffffffffff, 0x0, 0x0) accept4$rose(0xffffffffffffffff, &(0x7f00000004c0)=@short={0xb, @dev, @remote, 0x1, @bcast}, &(0x7f0000000500)=0x1c, 0x0) bind$nfc_llcp(r2, 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, 0x0, 0x0) getpid() ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) syzkaller login: [ 68.401836][ T8441] IPVS: ftp: loaded support on port[0] = 21 [ 68.411993][ T8441] NET: Registered protocol family 30 [ 68.417341][ T8441] Failed to register TIPC socket type 02:07:45 executing program 1: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000001c0)={0x0, 0x0, 0x5}) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000200)=""/162, &(0x7f00000002c0)=0xa2) ioctl$SIOCGETLINKNAME(r0, 0x89e0, &(0x7f0000000140)={0x0, 0x3}) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000500)=@add_del={0x2, &(0x7f00000004c0)='rose0\x00'}) splice(0xffffffffffffffff, &(0x7f0000000000), 0xffffffffffffffff, &(0x7f0000000040), 0x1000, 0x2) getsockopt$XDP_MMAP_OFFSETS(r0, 0x11b, 0x1, &(0x7f0000000400), &(0x7f0000000480)=0x60) r1 = socket(0x1e, 0x4, 0x0) connect$ax25(r1, &(0x7f0000000380)={{0x3, @remote, 0x2}, [@default, @bcast, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000300)) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f00000000c0)=@req={0x3fc}, 0x10) sendmmsg(r1, &(0x7f0000000a40), 0x3fffffffffffdbc, 0x8000a0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000340)={0xae, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e22, 0x3, 'ovf\x00', 0xc, 0x6, 0x7f}, 0x2c) ioctl$sock_ifreq(r0, 0x8921, 0x0) ioctl$int_in(r1, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, &(0x7f0000000100), 0x8) 02:07:45 executing program 2: r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r0, 0x1) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000001c0)={0x0, @in6, 0x0, 0x10001, 0x0, 0x0, 0x46}, 0x98) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000004c0)={0x0, @in, 0x0, 0x0, 0x0, 0x0, 0x34}, 0x98) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000340)={0x0, @in, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x98) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000000)={0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x98) [ 68.705619][ T8443] IPVS: ftp: loaded support on port[0] = 21 [ 68.731058][ T8443] NET: Registered protocol family 30 [ 68.736372][ T8443] Failed to register TIPC socket type [ 68.972087][ T8445] IPVS: ftp: loaded support on port[0] = 21 [ 68.991888][ T8445] NET: Registered protocol family 30 [ 69.007198][ T8445] Failed to register TIPC socket type 02:07:45 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_all\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000240)={0x20, 0x0, 0xecf}) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x40000000000}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000380), 0x10076) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000001300)={0x0, r0}) [ 69.522253][ T8447] IPVS: ftp: loaded support on port[0] = 21 [ 69.551115][ T8447] NET: Registered protocol family 30 [ 69.556422][ T8447] Failed to register TIPC socket type 02:07:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r1, 0x84, 0xe, &(0x7f00000000c0)=""/4096, &(0x7f00000010c0)=0x1000) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f0c3c123f319bd070") write(r1, &(0x7f0000000040)='$', 0x1) [ 70.028210][ T8449] IPVS: ftp: loaded support on port[0] = 21 [ 70.063770][ T8449] NET: Registered protocol family 30 [ 70.087172][ T8449] Failed to register TIPC socket type 02:07:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000200)="290000002000190f00003fffffffda060200000000e80001dd0000140d001400ea1100000005400000", 0x29}], 0x1) [ 70.775987][ T8452] IPVS: ftp: loaded support on port[0] = 21 [ 70.850557][ T8452] NET: Registered protocol family 30 [ 70.855895][ T8452] Failed to register TIPC socket type [ 70.949858][ T8441] chnl_net:caif_netlink_parms(): no params data found [ 71.339091][ T8441] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.346760][ T8441] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.438529][ T8441] device bridge_slave_0 entered promiscuous mode [ 71.549055][ T8441] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.556214][ T8441] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.717220][ T8441] device bridge_slave_1 entered promiscuous mode [ 72.161414][ T8441] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 72.574262][ T8441] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 73.189486][ T8441] team0: Port device team_slave_0 added [ 73.510425][ T8441] team0: Port device team_slave_1 added [ 74.745750][ T8441] device hsr_slave_0 entered promiscuous mode [ 75.271311][ T8441] device hsr_slave_1 entered promiscuous mode [ 77.369379][ T8441] 8021q: adding VLAN 0 to HW filter on device bond0 [ 77.830707][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 77.856591][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 78.050900][ T8441] 8021q: adding VLAN 0 to HW filter on device team0 [ 78.339839][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 78.415970][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 78.588089][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.595440][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 78.938972][ T3681] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 78.947013][ T3681] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 79.137876][ T3681] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 79.297949][ T3681] bridge0: port 2(bridge_slave_1) entered blocking state [ 79.305044][ T3681] bridge0: port 2(bridge_slave_1) entered forwarding state [ 79.537463][ T3681] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 79.802777][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 79.871390][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 79.991587][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 80.228945][ T3681] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 80.237790][ T3681] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 80.288076][ T3681] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 80.572019][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 80.610724][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 80.730144][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 80.868914][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 81.002530][ T8441] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 81.424230][ T8441] 8021q: adding VLAN 0 to HW filter on device batadv0 02:08:01 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r1, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x4e24}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000040)=[{r1, 0x2, 0x3000300}], 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_sctp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ppoll(&(0x7f0000000080), 0x0, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140), 0x8) getpid() sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000ab80)={0x0, 0x0, 0x0}, 0x0) ppoll(0x0, 0x0, &(0x7f0000000340), &(0x7f0000000380), 0x8) r2 = accept(0xffffffffffffffff, 0x0, 0x0) accept4$rose(0xffffffffffffffff, &(0x7f00000004c0)=@short={0xb, @dev, @remote, 0x1, @bcast}, &(0x7f0000000500)=0x1c, 0x0) bind$nfc_llcp(r2, 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, 0x0, 0x0) getpid() ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) 02:08:04 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r1, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x4e24}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000040)=[{r1, 0x2, 0x3000300}], 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_sctp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ppoll(&(0x7f0000000080), 0x0, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140), 0x8) getpid() sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000ab80)={0x0, 0x0, 0x0}, 0x0) ppoll(0x0, 0x0, &(0x7f0000000340), &(0x7f0000000380), 0x8) r2 = accept(0xffffffffffffffff, 0x0, 0x0) accept4$rose(0xffffffffffffffff, &(0x7f00000004c0)=@short={0xb, @dev, @remote, 0x1, @bcast}, &(0x7f0000000500)=0x1c, 0x0) bind$nfc_llcp(r2, 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, 0x0, 0x0) getpid() ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) [ 89.045552][ T8948] IPVS: ftp: loaded support on port[0] = 21 [ 89.214020][ T8949] IPVS: ftp: loaded support on port[0] = 21 [ 89.591195][ T8948] NET: Registered protocol family 30 [ 89.596527][ T8948] Failed to register TIPC socket type [ 89.730408][ T8950] IPVS: ftp: loaded support on port[0] = 21 [ 89.868598][ T8949] list_add double add: new=ffffffff89544ab0, prev=ffffffff89334ac0, next=ffffffff89544ab0. [ 90.163253][ T8951] IPVS: ftp: loaded support on port[0] = 21 [ 90.317413][ T8949] ------------[ cut here ]------------ [ 90.322912][ T8949] kernel BUG at lib/list_debug.c:29! 02:08:07 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r1, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x4e24}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000040)=[{r1, 0x2, 0x3000300}], 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_sctp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ppoll(&(0x7f0000000080), 0x0, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140), 0x8) getpid() sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000ab80)={0x0, 0x0, 0x0}, 0x0) ppoll(0x0, 0x0, &(0x7f0000000340), &(0x7f0000000380), 0x8) r2 = accept(0xffffffffffffffff, 0x0, 0x0) accept4$rose(0xffffffffffffffff, &(0x7f00000004c0)=@short={0xb, @dev, @remote, 0x1, @bcast}, &(0x7f0000000500)=0x1c, 0x0) bind$nfc_llcp(r2, 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, 0x0, 0x0) getpid() ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) [ 90.847171][ T8949] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 90.853291][ T8949] CPU: 1 PID: 8949 Comm: syz-executor.1 Not tainted 5.1.0+ #18 [ 90.860925][ T8949] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 90.870991][ T8949] RIP: 0010:__list_add_valid.cold+0x26/0x3c [ 90.876873][ T8949] Code: 56 ff ff ff 4c 89 e1 48 c7 c7 20 4c a3 87 e8 00 60 25 fe 0f 0b 48 89 f2 4c 89 e1 4c 89 ee 48 c7 c7 60 4d a3 87 e8 e9 5f 25 fe <0f> 0b 48 89 f1 48 c7 c7 e0 4c a3 87 4c 89 e6 e8 d5 5f 25 fe 0f 0b [ 90.896468][ T8949] RSP: 0018:ffff888070127b88 EFLAGS: 00010282 [ 90.902527][ T8949] RAX: 0000000000000058 RBX: ffffffff89544920 RCX: 0000000000000000 [ 90.910493][ T8949] RDX: 0000000000000000 RSI: ffffffff815afbe6 RDI: ffffed100e024f63 [ 90.918454][ T8949] RBP: ffff888070127ba0 R08: 0000000000000058 R09: ffffed1015d26011 [ 90.926421][ T8949] R10: ffffed1015d26010 R11: ffff8880ae930087 R12: ffffffff89544ab0 [ 90.934472][ T8949] R13: ffffffff89544ab0 R14: ffffffff89544ab0 R15: ffffffff89544a50 [ 90.942443][ T8949] FS: 00000000014f3940(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 90.951359][ T8949] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 90.957933][ T8949] CR2: 00007ffeae9d8578 CR3: 00000000707d9000 CR4: 00000000001406e0 [ 90.965900][ T8949] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 90.973864][ T8949] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 90.981824][ T8949] Call Trace: [ 90.985117][ T8949] ? mutex_lock_nested+0x16/0x20 [ 90.990064][ T8949] proto_register+0x459/0x8e0 [ 90.994750][ T8949] ? lockdep_init_map+0x1be/0x6d0 [ 90.999771][ T8949] tipc_socket_init+0x1c/0x70 [ 91.004444][ T8949] tipc_init_net+0x32a/0x5b0 [ 91.009029][ T8949] ? tipc_exit_net+0x40/0x40 [ 91.013622][ T8949] ops_init+0xb6/0x410 [ 91.017696][ T8949] setup_net+0x2d3/0x740 [ 91.021937][ T8949] ? copy_net_ns+0x1c0/0x340 [ 91.026520][ T8949] ? ops_init+0x410/0x410 [ 91.030848][ T8949] ? kasan_check_write+0x14/0x20 [ 91.035785][ T8949] ? down_read_killable+0x51/0x220 [ 91.040893][ T8949] copy_net_ns+0x1df/0x340 [ 91.045307][ T8949] create_new_namespaces+0x400/0x7b0 [ 91.050592][ T8949] unshare_nsproxy_namespaces+0xc2/0x200 [ 91.056227][ T8949] ksys_unshare+0x440/0x980 [ 91.060729][ T8949] ? trace_hardirqs_on+0x67/0x230 [ 91.065748][ T8949] ? walk_process_tree+0x2d0/0x2d0 [ 91.070860][ T8949] ? blkcg_exit_queue+0x30/0x30 [ 91.075709][ T8949] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 91.081170][ T8949] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 91.087234][ T8949] ? do_syscall_64+0x26/0x680 [ 91.091911][ T8949] ? lockdep_hardirqs_on+0x418/0x5d0 [ 91.097197][ T8949] __x64_sys_unshare+0x31/0x40 [ 91.101956][ T8949] do_syscall_64+0x103/0x680 [ 91.106543][ T8949] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 91.112429][ T8949] RIP: 0033:0x45b897 [ 91.116316][ T8949] Code: 00 00 00 b8 63 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 10 01 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 91.135910][ T8949] RSP: 002b:00007ffd8477e868 EFLAGS: 00000206 ORIG_RAX: 0000000000000110 [ 91.144310][ T8949] RAX: ffffffffffffffda RBX: 000000000073c988 RCX: 000000000045b897 [ 91.152272][ T8949] RDX: 0000000000000000 RSI: 00007ffd8477e810 RDI: 0000000040000000 [ 91.160236][ T8949] RBP: 00000000000000f8 R08: 0000000000000000 R09: 0000000000000005 [ 91.168199][ T8949] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000414ab0 [ 91.176164][ T8949] R13: 0000000000414b40 R14: 0000000000000000 R15: 0000000000000000 [ 91.184132][ T8949] Modules linked in: 02:08:08 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r1, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x4e24}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000040)=[{r1, 0x2, 0x3000300}], 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_sctp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ppoll(&(0x7f0000000080), 0x0, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140), 0x8) getpid() sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000ab80)={0x0, 0x0, 0x0}, 0x0) ppoll(0x0, 0x0, &(0x7f0000000340), &(0x7f0000000380), 0x8) r2 = accept(0xffffffffffffffff, 0x0, 0x0) accept4$rose(0xffffffffffffffff, &(0x7f00000004c0)=@short={0xb, @dev, @remote, 0x1, @bcast}, &(0x7f0000000500)=0x1c, 0x0) bind$nfc_llcp(r2, 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, 0x0, 0x0) getpid() ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) [ 92.353160][ T3879] kobject: 'loop0' (000000003bcab0a9): kobject_uevent_env [ 92.607477][ T3879] kobject: 'loop0' (000000003bcab0a9): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 94.172205][ T9001] IPVS: ftp: loaded support on port[0] = 21 02:08:11 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r1, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x4e24}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000040)=[{r1, 0x2, 0x3000300}], 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_sctp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ppoll(&(0x7f0000000080), 0x0, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140), 0x8) getpid() sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000ab80)={0x0, 0x0, 0x0}, 0x0) ppoll(0x0, 0x0, &(0x7f0000000340), &(0x7f0000000380), 0x8) r2 = accept(0xffffffffffffffff, 0x0, 0x0) accept4$rose(0xffffffffffffffff, &(0x7f00000004c0)=@short={0xb, @dev, @remote, 0x1, @bcast}, &(0x7f0000000500)=0x1c, 0x0) bind$nfc_llcp(r2, 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, 0x0, 0x0) getpid() ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) [ 95.063957][ T3879] kobject: 'loop0' (000000003bcab0a9): kobject_uevent_env [ 95.327351][ T3879] kobject: 'loop0' (000000003bcab0a9): fill_kobj_path: path = '/devices/virtual/block/loop0' 02:08:13 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r1, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x4e24}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000040)=[{r1, 0x2, 0x3000300}], 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_sctp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ppoll(&(0x7f0000000080), 0x0, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140), 0x8) getpid() sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000ab80)={0x0, 0x0, 0x0}, 0x0) ppoll(0x0, 0x0, &(0x7f0000000340), &(0x7f0000000380), 0x8) r2 = accept(0xffffffffffffffff, 0x0, 0x0) accept4$rose(0xffffffffffffffff, &(0x7f00000004c0)=@short={0xb, @dev, @remote, 0x1, @bcast}, &(0x7f0000000500)=0x1c, 0x0) bind$nfc_llcp(r2, 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, 0x0, 0x0) getpid() ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) [ 96.540005][ T3879] kobject: 'loop0' (000000003bcab0a9): kobject_uevent_env [ 96.597550][ T3879] kobject: 'loop0' (000000003bcab0a9): fill_kobj_path: path = '/devices/virtual/block/loop0' 02:08:15 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r1, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x4e24}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000040)=[{r1, 0x2, 0x3000300}], 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_sctp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ppoll(&(0x7f0000000080), 0x0, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140), 0x8) getpid() sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000ab80)={0x0, 0x0, 0x0}, 0x0) ppoll(0x0, 0x0, &(0x7f0000000340), &(0x7f0000000380), 0x8) r2 = accept(0xffffffffffffffff, 0x0, 0x0) accept4$rose(0xffffffffffffffff, &(0x7f00000004c0)=@short={0xb, @dev, @remote, 0x1, @bcast}, &(0x7f0000000500)=0x1c, 0x0) bind$nfc_llcp(r2, 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, 0x0, 0x0) getpid() ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) [ 98.644773][ T3879] kobject: 'loop0' (000000003bcab0a9): kobject_uevent_env [ 98.677205][ T3879] kobject: 'loop0' (000000003bcab0a9): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 99.497778][ T8949] ---[ end trace 8f6b65200c4607cb ]--- [ 99.567160][ T8949] RIP: 0010:__list_add_valid.cold+0x26/0x3c [ 99.573104][ T8949] Code: 56 ff ff ff 4c 89 e1 48 c7 c7 20 4c a3 87 e8 00 60 25 fe 0f 0b 48 89 f2 4c 89 e1 4c 89 ee 48 c7 c7 60 4d a3 87 e8 e9 5f 25 fe <0f> 0b 48 89 f1 48 c7 c7 e0 4c a3 87 4c 89 e6 e8 d5 5f 25 fe 0f 0b [ 99.733005][ T3879] kobject: 'loop0' (000000003bcab0a9): kobject_uevent_env [ 99.817534][ T3879] kobject: 'loop0' (000000003bcab0a9): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 99.947237][ T8949] RSP: 0018:ffff888070127b88 EFLAGS: 00010282 [ 99.953361][ T8949] RAX: 0000000000000058 RBX: ffffffff89544920 RCX: 0000000000000000 [ 100.108729][ T8949] RDX: 0000000000000000 RSI: ffffffff815afbe6 RDI: ffffed100e024f63 [ 100.116758][ T8949] RBP: ffff888070127ba0 R08: 0000000000000058 R09: ffffed1015d26011 [ 100.250483][ T8949] R10: ffffed1015d26010 R11: ffff8880ae930087 R12: ffffffff89544ab0