Starting mcstransd:
[....] Starting file context maintaining daemon: restorecond[?25l[?1c7[1G[[32m ok [39;49m8[?25h[?0c.
[....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[1G[[32m ok [39;49m8[?25h[?0c.
[ 36.544908] kauditd_printk_skb: 9 callbacks suppressed
[ 36.544916] audit: type=1800 audit(1549741070.867:33): pid=7355 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0
[ 36.571741] audit: type=1800 audit(1549741070.867:34): pid=7355 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0
Debian GNU/Linux 7 syzkaller ttyS0
syzkaller login: [ 40.503835] audit: type=1400 audit(1549741074.827:35): avc: denied { map } for pid=7533 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
Warning: Permanently added '10.128.0.247' (ECDSA) to the list of known hosts.
[ 126.721718] audit: type=1400 audit(1549741161.037:36): avc: denied { map } for pid=7546 comm="syz-execprog" path="/root/syz-execprog" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1
2019/02/09 19:39:21 parsed 1 programs
[ 127.460645] audit: type=1400 audit(1549741161.777:37): avc: denied { map } for pid=7546 comm="syz-execprog" path="/sys/kernel/debug/kcov" dev="debugfs" ino=412 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1
2019/02/09 19:39:23 executed programs: 0
[ 129.280533] IPVS: ftp: loaded support on port[0] = 21
[ 129.280704] IPVS: ftp: loaded support on port[0] = 21
[ 129.299387] IPVS: ftp: loaded support on port[0] = 21
[ 129.299689] IPVS: ftp: loaded support on port[0] = 21
[ 129.311742] IPVS: ftp: loaded support on port[0] = 21
[ 129.312759] IPVS: ftp: loaded support on port[0] = 21
[ 129.474934] chnl_net:caif_netlink_parms(): no params data found
[ 129.605903] bridge0: port 1(bridge_slave_0) entered blocking state
[ 129.612534] bridge0: port 1(bridge_slave_0) entered disabled state
[ 129.619941] device bridge_slave_0 entered promiscuous mode
[ 129.629873] bridge0: port 2(bridge_slave_1) entered blocking state
[ 129.636417] bridge0: port 2(bridge_slave_1) entered disabled state
[ 129.643405] device bridge_slave_1 entered promiscuous mode
[ 129.678490] chnl_net:caif_netlink_parms(): no params data found
[ 129.690681] chnl_net:caif_netlink_parms(): no params data found
[ 129.727792] bond0: Enslaving bond_slave_0 as an active interface with an up link
[ 129.739411] bond0: Enslaving bond_slave_1 as an active interface with an up link
[ 129.747191] chnl_net:caif_netlink_parms(): no params data found
[ 129.754890] chnl_net:caif_netlink_parms(): no params data found
[ 129.806794] bridge0: port 1(bridge_slave_0) entered blocking state
[ 129.813503] bridge0: port 1(bridge_slave_0) entered disabled state
[ 129.820443] device bridge_slave_0 entered promiscuous mode
[ 129.847583] team0: Port device team_slave_0 added
[ 129.857571] chnl_net:caif_netlink_parms(): no params data found
[ 129.865358] bridge0: port 2(bridge_slave_1) entered blocking state
[ 129.871841] bridge0: port 2(bridge_slave_1) entered disabled state
[ 129.879399] device bridge_slave_1 entered promiscuous mode
[ 129.898965] team0: Port device team_slave_1 added
[ 129.904128] bridge0: port 1(bridge_slave_0) entered blocking state
[ 129.910487] bridge0: port 1(bridge_slave_0) entered disabled state
[ 129.917592] device bridge_slave_0 entered promiscuous mode
[ 129.926331] bridge0: port 2(bridge_slave_1) entered blocking state
[ 129.932760] bridge0: port 2(bridge_slave_1) entered disabled state
[ 129.939895] device bridge_slave_1 entered promiscuous mode
[ 129.953909] bond0: Enslaving bond_slave_0 as an active interface with an up link
[ 129.965798] bridge0: port 1(bridge_slave_0) entered blocking state
[ 129.972316] bridge0: port 1(bridge_slave_0) entered disabled state
[ 129.979414] device bridge_slave_0 entered promiscuous mode
[ 129.986365] bridge0: port 2(bridge_slave_1) entered blocking state
[ 129.992690] bridge0: port 2(bridge_slave_1) entered disabled state
[ 129.999855] device bridge_slave_1 entered promiscuous mode
[ 130.018897] bridge0: port 1(bridge_slave_0) entered blocking state
[ 130.025344] bridge0: port 1(bridge_slave_0) entered disabled state
[ 130.032197] device bridge_slave_0 entered promiscuous mode
[ 130.039419] bond0: Enslaving bond_slave_1 as an active interface with an up link
[ 130.058814] bond0: Enslaving bond_slave_0 as an active interface with an up link
[ 130.068058] bond0: Enslaving bond_slave_1 as an active interface with an up link
[ 130.076057] bridge0: port 2(bridge_slave_1) entered blocking state
[ 130.082383] bridge0: port 2(bridge_slave_1) entered disabled state
[ 130.089691] device bridge_slave_1 entered promiscuous mode
[ 130.116174] bond0: Enslaving bond_slave_0 as an active interface with an up link
[ 130.127915] bond0: Enslaving bond_slave_1 as an active interface with an up link
[ 130.147944] team0: Port device team_slave_0 added
[ 130.153070] bridge0: port 1(bridge_slave_0) entered blocking state
[ 130.160559] bridge0: port 1(bridge_slave_0) entered disabled state
[ 130.167701] device bridge_slave_0 entered promiscuous mode
[ 130.225313] device hsr_slave_0 entered promiscuous mode
[ 130.283947] device hsr_slave_1 entered promiscuous mode
[ 130.336719] bond0: Enslaving bond_slave_0 as an active interface with an up link
[ 130.347976] team0: Port device team_slave_1 added
[ 130.353322] bridge0: port 2(bridge_slave_1) entered blocking state
[ 130.359675] bridge0: port 2(bridge_slave_1) entered disabled state
[ 130.366892] device bridge_slave_1 entered promiscuous mode
[ 130.374390] team0: Port device team_slave_0 added
[ 130.380452] team0: Port device team_slave_0 added
[ 130.386313] bond0: Enslaving bond_slave_1 as an active interface with an up link
[ 130.406717] team0: Port device team_slave_1 added
[ 130.465152] device hsr_slave_0 entered promiscuous mode
[ 130.513524] device hsr_slave_1 entered promiscuous mode
[ 130.555158] team0: Port device team_slave_1 added
[ 130.571251] team0: Port device team_slave_0 added
[ 130.579320] bond0: Enslaving bond_slave_0 as an active interface with an up link
[ 130.634877] device hsr_slave_0 entered promiscuous mode
[ 130.673491] device hsr_slave_1 entered promiscuous mode
[ 130.754984] device hsr_slave_0 entered promiscuous mode
[ 130.773588] device hsr_slave_1 entered promiscuous mode
[ 130.814451] team0: Port device team_slave_1 added
[ 130.827315] bond0: Enslaving bond_slave_1 as an active interface with an up link
[ 130.864463] team0: Port device team_slave_0 added
[ 130.870828] team0: Port device team_slave_1 added
[ 130.945862] device hsr_slave_0 entered promiscuous mode
[ 131.003353] device hsr_slave_1 entered promiscuous mode
[ 131.176378] device hsr_slave_0 entered promiscuous mode
[ 131.216247] device hsr_slave_1 entered promiscuous mode
[ 131.295040] 8021q: adding VLAN 0 to HW filter on device bond0
[ 131.315833] 8021q: adding VLAN 0 to HW filter on device bond0
[ 131.348791] 8021q: adding VLAN 0 to HW filter on device bond0
[ 131.372005] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[ 131.379631] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 131.389767] 8021q: adding VLAN 0 to HW filter on device bond0
[ 131.398848] 8021q: adding VLAN 0 to HW filter on device team0
[ 131.419983] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[ 131.427051] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 131.434456] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[ 131.442137] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 131.450109] bridge0: port 1(bridge_slave_0) entered blocking state
[ 131.456572] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 131.466541] 8021q: adding VLAN 0 to HW filter on device team0
[ 131.474577] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[ 131.481579] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[ 131.488566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 131.515730] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[ 131.524094] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 131.531941] bridge0: port 2(bridge_slave_1) entered blocking state
[ 131.538307] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 131.545784] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[ 131.553868] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[ 131.561604] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 131.569420] bridge0: port 1(bridge_slave_0) entered blocking state
[ 131.575791] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 131.582667] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[ 131.590991] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 131.598763] bridge0: port 2(bridge_slave_1) entered blocking state
[ 131.605158] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 131.611910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[ 131.619997] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[ 131.628211] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[ 131.638757] 8021q: adding VLAN 0 to HW filter on device bond0
[ 131.657936] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[ 131.666205] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[ 131.674197] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[ 131.681687] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[ 131.688794] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 131.697056] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[ 131.703975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[ 131.710749] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 131.720108] 8021q: adding VLAN 0 to HW filter on device team0
[ 131.728055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[ 131.736430] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[ 131.746956] 8021q: adding VLAN 0 to HW filter on device team0
[ 131.766748] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[ 131.774388] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[ 131.781975] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[ 131.789789] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[ 131.797569] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 131.805433] bridge0: port 1(bridge_slave_0) entered blocking state
[ 131.811747] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 131.818578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[ 131.826415] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 131.834108] bridge0: port 1(bridge_slave_0) entered blocking state
[ 131.840438] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 131.847279] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[ 131.855073] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 131.862593] bridge0: port 2(bridge_slave_1) entered blocking state
[ 131.868951] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 131.875796] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[ 131.883607] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 131.891062] bridge0: port 2(bridge_slave_1) entered blocking state
[ 131.897407] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 131.905182] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[ 131.912302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[ 131.919648] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[ 131.927533] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[ 131.937226] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[ 131.946796] 8021q: adding VLAN 0 to HW filter on device team0
[ 131.961113] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[ 131.969445] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 131.977545] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[ 131.985286] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 132.003868] 8021q: adding VLAN 0 to HW filter on device bond0
[ 132.010150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[ 132.018125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[ 132.026384] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[ 132.034430] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[ 132.041914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[ 132.049597] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[ 132.063102] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[ 132.073026] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[ 132.085124] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[ 132.101068] 8021q: adding VLAN 0 to HW filter on device team0
[ 132.108232] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[ 132.118702] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[ 132.126789] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 132.134584] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[ 132.142315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[ 132.150284] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 132.157891] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[ 132.166264] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[ 132.174296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[ 132.181732] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 132.189205] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[ 132.196475] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 132.203413] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[ 132.210867] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 132.218703] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[ 132.225707] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[ 132.248130] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[ 132.260405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[ 132.268335] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 132.276426] bridge0: port 1(bridge_slave_0) entered blocking state
[ 132.282767] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 132.289636] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[ 132.297374] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 132.305425] bridge0: port 2(bridge_slave_1) entered blocking state
[ 132.311863] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 132.318726] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[ 132.326460] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[ 132.334901] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[ 132.342533] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[ 132.352923] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 132.373257] audit: type=1400 audit(1549741166.687:38): avc: denied { associate } for pid=7571 comm="syz-executor.3" name="syz3" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1
[ 132.410110] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[ 132.429089] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[ 132.455768] audit: type=1400 audit(1549741166.777:39): avc: denied { name_bind } for pid=7587 comm="syz-executor.3" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1
[ 132.481105] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[ 132.488944] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[ 132.497408] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[ 132.505916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[ 132.516140] audit: type=1400 audit(1549741166.777:40): avc: denied { node_bind } for pid=7587 comm="syz-executor.3" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:node_t:s0 tclass=dccp_socket permissive=1
[ 132.539570] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 132.548049] bridge0: port 1(bridge_slave_0) entered blocking state
[ 132.554449] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 132.562722] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[ 132.570549] audit: type=1400 audit(1549741166.777:41): avc: denied { name_connect } for pid=7587 comm="syz-executor.3" dest=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1
[ 132.581636] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 132.601415] bridge0: port 2(bridge_slave_1) entered blocking state
[ 132.607835] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 132.617346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[ 132.630859] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[ 132.642595] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[ 132.652416] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 132.665751] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[ 132.687022] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 132.700177] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[ 132.710270] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[ 132.720137] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[ 132.736804] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 132.755538] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[ 132.765366] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[ 132.773620] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[ 132.781169] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 132.789240] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[ 132.797164] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[ 132.804861] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[ 132.812424] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[ 132.820202] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[ 132.827637] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 132.835547] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[ 132.842951] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 132.851615] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[ 132.858788] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[ 132.866423] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 132.889874] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[ 132.902358] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 132.927623] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[ 132.962364] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 133.002766] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 133.048588] 8021q: adding VLAN 0 to HW filter on device batadv0
2019/02/09 19:39:28 executed programs: 68
2019/02/09 19:39:33 executed programs: 343
2019/02/09 19:39:38 executed programs: 632
2019/02/09 19:39:43 executed programs: 921
2019/02/09 19:39:48 executed programs: 1205
2019/02/09 19:39:53 executed programs: 1449
2019/02/09 19:39:58 executed programs: 1687
2019/02/09 19:40:03 executed programs: 1923
2019/02/09 19:40:08 executed programs: 2154
2019/02/09 19:40:13 executed programs: 2393
2019/02/09 19:40:18 executed programs: 2638
2019/02/09 19:40:23 executed programs: 2889
2019/02/09 19:40:28 executed programs: 3120
2019/02/09 19:40:33 executed programs: 3356
2019/02/09 19:40:38 executed programs: 3582
2019/02/09 19:40:43 executed programs: 3813
2019/02/09 19:40:48 executed programs: 4073
2019/02/09 19:40:53 executed programs: 4335
2019/02/09 19:40:58 executed programs: 4562
2019/02/09 19:41:03 executed programs: 4781
2019/02/09 19:41:08 executed programs: 4999
2019/02/09 19:41:13 executed programs: 5213
2019/02/09 19:41:18 executed programs: 5439
2019/02/09 19:41:23 executed programs: 5664
2019/02/09 19:41:28 executed programs: 5886
2019/02/09 19:41:33 executed programs: 6124
2019/02/09 19:41:38 executed programs: 6370
2019/02/09 19:41:43 executed programs: 6583
2019/02/09 19:41:48 executed programs: 6799
2019/02/09 19:41:53 executed programs: 7033
2019/02/09 19:41:58 executed programs: 7262
2019/02/09 19:42:03 executed programs: 7494
2019/02/09 19:42:08 executed programs: 7706
2019/02/09 19:42:14 executed programs: 7910
2019/02/09 19:42:19 executed programs: 8141
2019/02/09 19:42:24 executed programs: 8389
2019/02/09 19:42:29 executed programs: 8614
2019/02/09 19:42:34 executed programs: 8812
2019/02/09 19:42:39 executed programs: 9013
2019/02/09 19:42:44 executed programs: 9205
2019/02/09 19:42:49 executed programs: 9416
[ 336.193574] ==================================================================
[ 336.201265] BUG: KASAN: use-after-free in ccid_hc_tx_delete+0xde/0x100
[ 336.201280] Read of size 8 at addr ffff888095501780 by task udevd/7632
[ 336.201282]
[ 336.201294] CPU: 0 PID: 7632 Comm: udevd Not tainted 5.0.0-rc5+ #64
[ 336.201300] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 336.201303] Call Trace:
[ 336.201307]
[ 336.201337] dump_stack+0x172/0x1f0
[ 336.240558] ? ccid_hc_tx_delete+0xde/0x100
[ 336.245025] print_address_description.cold+0x7c/0x20d
[ 336.250308] ? ccid_hc_tx_delete+0xde/0x100
[ 336.254635] ? ccid_hc_tx_delete+0xde/0x100
[ 336.258963] kasan_report.cold+0x1b/0x40
[ 336.263031] ? ccid_hc_tx_delete+0xde/0x100
[ 336.267379] __asan_report_load8_noabort+0x14/0x20
[ 336.272309] ccid_hc_tx_delete+0xde/0x100
[ 336.276523] dccp_sk_destruct+0x3f/0x90
[ 336.280496] ? dccp_init_sock+0x3f0/0x3f0
[ 336.284768] __sk_destruct+0x55/0x6d0
[ 336.288575] ? sock_no_getname+0x10/0x10
[ 336.292718] rcu_process_callbacks+0x928/0x1390
[ 336.297416] ? rcu_check_gp_start_stall+0x240/0x240
[ 336.302473] ? __lock_is_held+0xb6/0x140
[ 336.306547] ? rcu_lockdep_current_cpu_online+0xe3/0x130
[ 336.312405] __do_softirq+0x266/0x95a
[ 336.316250] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[ 336.321775] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[ 336.321820] irq_exit+0x180/0x1d0
[ 336.330769] smp_apic_timer_interrupt+0x14a/0x570
[ 336.335624] apic_timer_interrupt+0xf/0x20
[ 336.339941]
[ 336.342213] RIP: 0010:save_stack_address+0x2c/0x60
[ 336.347145] Code: d2 48 89 e5 41 54 49 89 f4 53 48 89 fb 75 2f 8b 43 10 85 c0 7f 1b 8b 03 3b 43 04 73 38 48 8b 53 08 8d 48 01 89 0b 4c 89 24 c2 <31> c0 5b 41 5c 5d c3 83 e8 01 89 43 10 5b 31 c0 41 5c 5d c3 48 89
[ 336.366050] RSP: 0018:ffff888080437758 EFLAGS: 00000283 ORIG_RAX: ffffffffffffff13
[ 336.373768] RAX: 0000000000000002 RBX: ffff888080437818 RCX: 0000000000000003
[ 336.381049] RDX: ffff888080437830 RSI: ffffffff81a6bf2f RDI: ffff888080437818
[ 336.388321] RBP: ffff888080437768 R08: 0000000000000001 R09: ffff8880804377c8
[ 336.395608] R10: ffff8880804377a0 R11: ffff8880804377b0 R12: ffffffff81a6bf2f
[ 336.402880] R13: 0000000000000000 R14: ffff888081572280 R15: ffff88812c3f0dc0
[ 336.410170] ? kasan_slab_alloc+0xf/0x20
[ 336.414242] ? kasan_slab_alloc+0xf/0x20
[ 336.418384] ? unwind_get_return_address+0x61/0xa0
[ 336.423324] __save_stack_trace+0x6d/0xf0
[ 336.427626] ? kasan_slab_alloc+0xf/0x20
[ 336.431694] save_stack_trace+0x1a/0x20
[ 336.435676] save_stack+0x45/0xd0
[ 336.439136] ? save_stack+0x45/0xd0
[ 336.442766] ? __kasan_kmalloc.constprop.0+0xcf/0xe0
[ 336.447869] ? kasan_slab_alloc+0xf/0x20
[ 336.451942] ? mark_held_locks+0x100/0x100
[ 336.456191] ? mark_held_locks+0x100/0x100
[ 336.460429] ? mark_held_locks+0x100/0x100
[ 336.464840] ? get_mem_cgroup_from_mm+0x10b/0x2b0
[ 336.469687] ? find_held_lock+0x35/0x130
[ 336.473758] ? get_mem_cgroup_from_mm+0x10b/0x2b0
[ 336.478614] ? __lock_is_held+0xb6/0x140
[ 336.482680] ? mark_held_locks+0xb1/0x100
[ 336.486821] ? kasan_unpoison_shadow+0x35/0x50
[ 336.486837] __kasan_kmalloc.constprop.0+0xcf/0xe0
[ 336.486853] kasan_slab_alloc+0xf/0x20
[ 336.486865] kmem_cache_alloc_node_trace+0x13c/0x720
[ 336.486879] ? __save_stack_trace+0x8a/0xf0
[ 336.509666] __kmalloc_node+0x3d/0x70
[ 336.513659] kvmalloc_node+0x68/0x100
[ 336.517625] seq_read+0x832/0x1130
[ 336.521220] ? __x64_sys_open+0x7e/0xc0
[ 336.525236] ? do_syscall_64+0x103/0x610
[ 336.529400] ? debug_check_no_obj_freed+0x200/0x464
[ 336.534465] kernfs_fop_read+0xed/0x560
[ 336.538444] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[ 336.544030] ? fsnotify+0x395/0xbd0
[ 336.547657] __vfs_read+0x116/0x8c0
[ 336.551280] ? kernfs_vma_page_mkwrite+0x230/0x230
[ 336.556215] ? vfs_copy_file_range+0xbb0/0xbb0
[ 336.560888] ? avc_policy_seqno+0xd/0x70
[ 336.564957] ? __sanitizer_cov_trace_cmp4+0x16/0x20
[ 336.570011] ? selinux_file_permission+0x92/0x550
[ 336.574915] ? security_file_permission+0x94/0x320
[ 336.579846] ? rw_verify_area+0x118/0x360
[ 336.583988] vfs_read+0x194/0x3e0
[ 336.584005] ksys_read+0xea/0x1f0
[ 336.584018] ? kernel_write+0x120/0x120
[ 336.584034] ? do_syscall_64+0x26/0x610
[ 336.598836] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[ 336.604203] ? do_syscall_64+0x26/0x610
[ 336.608187] __x64_sys_read+0x73/0xb0
[ 336.611996] do_syscall_64+0x103/0x610
[ 336.615893] entry_SYSCALL_64_after_hwframe+0x49/0xbe
[ 336.621170] RIP: 0033:0x7f14b41d2310
[ 336.624879] Code: 73 01 c3 48 8b 0d 28 4b 2b 00 31 d2 48 29 c2 64 89 11 48 83 c8 ff eb ea 90 90 83 3d e5 a2 2b 00 00 75 10 b8 00 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 6e 8a 01 00 48 89 04 24
[ 336.643780] RSP: 002b:00007ffead315ba8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000
[ 336.643792] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f14b41d2310
[ 336.643800] RDX: 0000000000001000 RSI: 00007ffead316050 RDI: 0000000000000005
[ 336.643808] RBP: 0000000001b50534 R08: 0000000001b50534 R09: 00007f14b4227c20
[ 336.643815] R10: 7269762f73656369 R11: 0000000000000246 R12: 0000000001b4f420
[ 336.643822] R13: 0000000001b4f510 R14: 0000000001aff030 R15: 0000000001b37a00
[ 336.643838]
[ 336.689535] Allocated by task 14321:
[ 336.693250] save_stack+0x45/0xd0
[ 336.696700] __kasan_kmalloc.constprop.0+0xcf/0xe0
[ 336.701635] kasan_slab_alloc+0xf/0x20
[ 336.705524] kmem_cache_alloc+0x12d/0x710
[ 336.709674] ccid_new+0x256/0x3f0
[ 336.713126] dccp_hdlr_ccid+0x27/0x150
[ 336.717019] __dccp_feat_activate+0x17a/0x270
[ 336.721606] dccp_feat_activate_values+0x33a/0x766
[ 336.726544] dccp_rcv_state_process+0x116f/0x1931
[ 336.726556] dccp_v6_do_rcv+0x269/0xbf0
[ 336.726569] __release_sock+0x12e/0x3a0
[ 336.726591] release_sock+0x59/0x1c0
[ 336.726685] __inet_stream_connect+0x59f/0xea0
[ 336.726698] inet_stream_connect+0x58/0xa0
[ 336.743150] __sys_connect+0x266/0x330
[ 336.743162] __x64_sys_connect+0x73/0xb0
[ 336.743177] do_syscall_64+0x103/0x610
[ 336.743190] entry_SYSCALL_64_after_hwframe+0x49/0xbe
[ 336.743194]
[ 336.743200] Freed by task 14321:
[ 336.743212] save_stack+0x45/0xd0
[ 336.743224] __kasan_slab_free+0x102/0x150
[ 336.770681] kasan_slab_free+0xe/0x10
[ 336.770693] kmem_cache_free+0x86/0x260
[ 336.770706] ccid_hc_tx_delete+0xc1/0x100
[ 336.770716] dccp_hdlr_ccid+0x7d/0x150
[ 336.770725] __dccp_feat_activate+0x17a/0x270
[ 336.770738] dccp_feat_activate_values+0x33a/0x766
[ 336.793709] dccp_create_openreq_child+0x40c/0x570
[ 336.811901] dccp_v6_request_recv_sock+0x214/0x1da0
[ 336.816927] dccp_check_req+0x35c/0x6f0
[ 336.820906] dccp_v6_rcv+0x6d7/0x191e
[ 336.824899] ip6_protocol_deliver_rcu+0x303/0x16c0
[ 336.824912] ip6_input_finish+0x84/0x170
[ 336.833888] ip6_input+0xe4/0x3f0
[ 336.837355] ip6_rcv_finish+0x1e7/0x320
[ 336.841351] ipv6_rcv+0x10e/0x420
[ 336.844863] __netif_receive_skb_one_core+0x115/0x1a0
[ 336.844876] __netif_receive_skb+0x2c/0x1c0
[ 336.854473] process_backlog+0x206/0x750
[ 336.858534] net_rx_action+0x4fa/0x1070
[ 336.862511] __do_softirq+0x266/0x95a
[ 336.866321]
[ 336.867952] The buggy address belongs to the object at ffff888095501780
[ 336.867952] which belongs to the cache ccid2_hc_tx_sock of size 1240
[ 336.881223] The buggy address is located 0 bytes inside of
[ 336.881223] 1240-byte region [ffff888095501780, ffff888095501c58)
[ 336.892999] The buggy address belongs to the page:
[ 336.893012] page:ffffea0002554000 count:1 mapcount:0 mapping:ffff888216502080 index:0x0 compound_mapcount: 0
[ 336.893027] flags: 0x1fffc0000010200(slab|head)
[ 336.893045] raw: 01fffc0000010200 ffffea00022ea488 ffffea000228d008 ffff888216502080
[ 336.893060] raw: 0000000000000000 ffff888095500180 0000000100000005 0000000000000000
[ 336.893065] page dumped because: kasan: bad access detected
[ 336.893069]
[ 336.893073] Memory state around the buggy address:
[ 336.893083] ffff888095501680: fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc
[ 336.893092] ffff888095501700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 336.893116] >ffff888095501780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 336.922708] kobject: 'loop4' (000000009290e380): fill_kobj_path: path = '/devices/virtual/block/loop4'
[ 336.928365] ^
[ 336.928377] ffff888095501800: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 336.928387] ffff888095501880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 336.928392] ==================================================================
[ 336.928397] Disabling lock debugging due to kernel taint
[ 336.928430] Kernel panic - not syncing: panic_on_warn set ...
[ 336.928442] CPU: 0 PID: 7632 Comm: udevd Tainted: G B 5.0.0-rc5+ #64
[ 336.928449] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 336.928453] Call Trace:
[ 336.928460]
[ 336.970853] kobject: 'loop4' (000000009290e380): kobject_uevent_env
[ 336.972314] dump_stack+0x172/0x1f0
[ 336.972404] panic+0x2cb/0x65c
[ 336.980224] kobject: 'loop4' (000000009290e380): fill_kobj_path: path = '/devices/virtual/block/loop4'
[ 336.983028] ? __warn_printk+0xf3/0xf3
[ 336.983040] ? retint_kernel+0x2d/0x2d
[ 336.983101] ? trace_hardirqs_on+0x5e/0x230
[ 337.053457] kobject: 'loop0' (00000000d5a331da): kobject_uevent_env
[ 337.053513] ? ccid_hc_tx_delete+0xde/0x100
[ 337.057401] kobject: 'loop0' (00000000d5a331da): fill_kobj_path: path = '/devices/virtual/block/loop0'
[ 337.061276] end_report+0x47/0x4f
[ 337.089347] ? ccid_hc_tx_delete+0xde/0x100
[ 337.093674] kasan_report.cold+0xe/0x40
[ 337.097648] ? ccid_hc_tx_delete+0xde/0x100
[ 337.101981] __asan_report_load8_noabort+0x14/0x20
[ 337.106915] ccid_hc_tx_delete+0xde/0x100
[ 337.108615] kobject: 'loop1' (00000000a763be9b): kobject_uevent_env
[ 337.111064] dccp_sk_destruct+0x3f/0x90
[ 337.111075] ? dccp_init_sock+0x3f0/0x3f0
[ 337.111091] __sk_destruct+0x55/0x6d0
[ 337.129361] ? sock_no_getname+0x10/0x10
[ 337.133430] rcu_process_callbacks+0x928/0x1390
[ 337.138107] ? rcu_check_gp_start_stall+0x240/0x240
[ 337.143128] ? __lock_is_held+0xb6/0x140
[ 337.147317] ? rcu_lockdep_current_cpu_online+0xe3/0x130
[ 337.152768] __do_softirq+0x266/0x95a
[ 337.156607] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[ 337.159729] kobject: 'loop1' (00000000a763be9b): fill_kobj_path: path = '/devices/virtual/block/loop1'
[ 337.162137] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[ 337.162154] irq_exit+0x180/0x1d0
[ 337.162169] smp_apic_timer_interrupt+0x14a/0x570
[ 337.185501] apic_timer_interrupt+0xf/0x20
[ 337.189742]
[ 337.191982] RIP: 0010:save_stack_address+0x2c/0x60
[ 337.196908] Code: d2 48 89 e5 41 54 49 89 f4 53 48 89 fb 75 2f 8b 43 10 85 c0 7f 1b 8b 03 3b 43 04 73 38 48 8b 53 08 8d 48 01 89 0b 4c 89 24 c2 <31> c0 5b 41 5c 5d c3 83 e8 01 89 43 10 5b 31 c0 41 5c 5d c3 48 89
[ 337.212196] kobject: 'loop4' (000000009290e380): kobject_uevent_env
[ 337.215805] RSP: 0018:ffff888080437758 EFLAGS: 00000283 ORIG_RAX: ffffffffffffff13
[ 337.215818] RAX: 0000000000000002 RBX: ffff888080437818 RCX: 0000000000000003
[ 337.215825] RDX: ffff888080437830 RSI: ffffffff81a6bf2f RDI: ffff888080437818
[ 337.215833] RBP: ffff888080437768 R08: 0000000000000001 R09: ffff8880804377c8
[ 337.215840] R10: ffff8880804377a0 R11: ffff8880804377b0 R12: ffffffff81a6bf2f
[ 337.215850] R13: 0000000000000000 R14: ffff888081572280 R15: ffff88812c3f0dc0
[ 337.236438] kobject: 'loop4' (000000009290e380): fill_kobj_path: path = '/devices/virtual/block/loop4'
[ 337.237237] ? kasan_slab_alloc+0xf/0x20
[ 337.269137] kobject: 'loop4' (000000009290e380): kobject_uevent_env
[ 337.275869] ? kasan_slab_alloc+0xf/0x20
[ 337.275885] ? unwind_get_return_address+0x61/0xa0
[ 337.275900] __save_stack_trace+0x6d/0xf0
[ 337.293119] kobject: 'loop4' (000000009290e380): fill_kobj_path: path = '/devices/virtual/block/loop4'
[ 337.295305] ? kasan_slab_alloc+0xf/0x20
[ 337.295320] save_stack_trace+0x1a/0x20
[ 337.302334] kobject: 'loop0' (00000000d5a331da): kobject_uevent_env
[ 337.308892] save_stack+0x45/0xd0
[ 337.308903] ? save_stack+0x45/0xd0
[ 337.308915] ? __kasan_kmalloc.constprop.0+0xcf/0xe0
[ 337.308928] ? kasan_slab_alloc+0xf/0x20
[ 337.313871] kobject: 'loop0' (00000000d5a331da): fill_kobj_path: path = '/devices/virtual/block/loop0'
[ 337.317454] ? mark_held_locks+0x100/0x100
[ 337.317465] ? mark_held_locks+0x100/0x100
[ 337.317478] ? mark_held_locks+0x100/0x100
[ 337.324504] kobject: 'loop4' (000000009290e380): kobject_uevent_env
[ 337.327325] ? get_mem_cgroup_from_mm+0x10b/0x2b0
[ 337.327337] ? find_held_lock+0x35/0x130
[ 337.327352] ? get_mem_cgroup_from_mm+0x10b/0x2b0
[ 337.331018] kobject: 'loop4' (000000009290e380): fill_kobj_path: path = '/devices/virtual/block/loop4'
[ 337.336040] ? __lock_is_held+0xb6/0x140
[ 337.336054] ? mark_held_locks+0xb1/0x100
[ 337.336066] ? kasan_unpoison_shadow+0x35/0x50
[ 337.336080] __kasan_kmalloc.constprop.0+0xcf/0xe0
[ 337.340669] kobject: 'loop0' (00000000d5a331da): kobject_uevent_env
[ 337.349539] kasan_slab_alloc+0xf/0x20
[ 337.349551] kmem_cache_alloc_node_trace+0x13c/0x720
[ 337.349563] ? __save_stack_trace+0x8a/0xf0
[ 337.349577] __kmalloc_node+0x3d/0x70
[ 337.354041] kobject: 'loop0' (00000000d5a331da): fill_kobj_path: path = '/devices/virtual/block/loop0'
[ 337.358103] kvmalloc_node+0x68/0x100
[ 337.358116] seq_read+0x832/0x1130
[ 337.358130] ? __x64_sys_open+0x7e/0xc0
[ 337.362747] kobject: 'loop4' (000000009290e380): kobject_uevent_env
[ 337.368737] ? do_syscall_64+0x103/0x610
[ 337.368754] ? debug_check_no_obj_freed+0x200/0x464
[ 337.368768] kernfs_fop_read+0xed/0x560
[ 337.368786] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[ 337.373926] kobject: 'loop4' (000000009290e380): fill_kobj_path: path = '/devices/virtual/block/loop4'
[ 337.377645] ? fsnotify+0x395/0xbd0
[ 337.377659] __vfs_read+0x116/0x8c0
[ 337.377672] ? kernfs_vma_page_mkwrite+0x230/0x230
[ 337.386338] kobject: 'loop0' (00000000d5a331da): kobject_uevent_env
[ 337.391933] ? vfs_copy_file_range+0xbb0/0xbb0
[ 337.391946] ? avc_policy_seqno+0xd/0x70
[ 337.391959] ? __sanitizer_cov_trace_cmp4+0x16/0x20
[ 337.404801] kobject: 'loop0' (00000000d5a331da): fill_kobj_path: path = '/devices/virtual/block/loop0'
[ 337.409606] ? selinux_file_permission+0x92/0x550
[ 337.409621] ? security_file_permission+0x94/0x320
[ 337.409635] ? rw_verify_area+0x118/0x360
[ 337.510893] kobject: 'loop3' (00000000e2ead98a): kobject_uevent_env
[ 337.511224] vfs_read+0x194/0x3e0
[ 337.515690] kobject: 'loop3' (00000000e2ead98a): fill_kobj_path: path = '/devices/virtual/block/loop3'
[ 337.520705] ksys_read+0xea/0x1f0
[ 337.520720] ? kernel_write+0x120/0x120
[ 337.566944] kobject: 'loop5' (00000000f701beee): kobject_uevent_env
[ 337.570674] ? do_syscall_64+0x26/0x610
[ 337.570686] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[ 337.570698] ? do_syscall_64+0x26/0x610
[ 337.587633] kobject: 'loop5' (00000000f701beee): fill_kobj_path: path = '/devices/virtual/block/loop5'
[ 337.590477] __x64_sys_read+0x73/0xb0
[ 337.590491] do_syscall_64+0x103/0x610
[ 337.590507] entry_SYSCALL_64_after_hwframe+0x49/0xbe
[ 337.600600] kobject: 'loop5' (00000000f701beee): kobject_uevent_env
[ 337.603703] RIP: 0033:0x7f14b41d2310
[ 337.603715] Code: 73 01 c3 48 8b 0d 28 4b 2b 00 31 d2 48 29 c2 64 89 11 48 83 c8 ff eb ea 90 90 83 3d e5 a2 2b 00 00 75 10 b8 00 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 6e 8a 01 00 48 89 04 24
[ 337.603721] RSP: 002b:00007ffead315ba8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000
[ 337.603731] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f14b41d2310
[ 337.603740] RDX: 0000000000001000 RSI: 00007ffead316050 RDI: 0000000000000005
[ 337.607902] kobject: 'loop5' (00000000f701beee): fill_kobj_path: path = '/devices/virtual/block/loop5'
[ 337.612776] RBP: 0000000001b50534 R08: 0000000001b50534 R09: 00007f14b4227c20
[ 337.612784] R10: 7269762f73656369 R11: 0000000000000246 R12: 0000000001b4f420
[ 337.612792] R13: 0000000001b4f510 R14: 0000000001aff030 R15: 0000000001b37a00
[ 337.620539] Kernel Offset: disabled
[ 337.700533] Rebooting in 86400 seconds..