./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor2081337226 <...> forked to background, child pid 4644 no interfaces have a carrier [ 22.249775][ T4645] 8021q: adding VLAN 0 to HW filter on device bond0 [ 22.259125][ T4645] eql: remember to turn off Van-Jacobson compression on your slave devices Starting sshd: OK syzkaller Warning: Permanently added '10.128.1.103' (ECDSA) to the list of known hosts. execve("./syz-executor2081337226", ["./syz-executor2081337226"], 0x7ffe6fd2d900 /* 10 vars */) = 0 brk(NULL) = 0x555556c1b000 brk(0x555556c1bc40) = 0x555556c1bc40 arch_prctl(ARCH_SET_FS, 0x555556c1b300) = 0 uname({sysname="Linux", nodename="syzkaller", ...}) = 0 readlink("/proc/self/exe", "/root/syz-executor2081337226", 4096) = 28 brk(0x555556c3cc40) = 0x555556c3cc40 brk(0x555556c3d000) = 0x555556c3d000 mprotect(0x7f3c67a0d000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE) = 3 socket(AF_NETLINK, SOCK_RAW, NETLINK_GENERIC) = 4 sendto(4, [{nlmsg_len=36, nlmsg_type=0x10 /* NLMSG_??? */, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}, "\x03\x00\x00\x00\x0d\x00\x02\x00\x6e\x6c\x38\x30\x32\x31\x35\x34\x00\x00\x00\x00"], 36, 0, {sa_family=AF_NETLINK, nl_pid=0, nl_groups=00000000}, 12) = 36 recvfrom(4, [{nlmsg_len=704, nlmsg_type=nlctrl, nlmsg_flags=0, nlmsg_seq=0, nlmsg_pid=5066}, "\x01\x02\x00\x00\x0d\x00\x02\x00\x6e\x6c\x38\x30\x32\x31\x35\x34\x00\x00\x00\x00\x06\x00\x01\x00\x1c\x00\x00\x00\x08\x00\x03\x00\x01\x00\x00\x00\x08\x00\x04\x00\x00\x00\x00\x00\x08\x00\x05\x00\x26\x00\x00\x00\x48\x02\x06\x00\x14\x00\x01\x00\x08\x00\x01\x00\x01\x00\x00\x00\x08\x00\x02\x00\x0e\x00\x00\x00\x14\x00\x02\x00\x08\x00\x01\x00\x05\x00\x00\x00\x08\x00\x02\x00\x0e\x00\x00\x00\x14\x00\x03\x00"...], 4096, 0, NULL, NULL) = 704 recvfrom(4, [{nlmsg_len=36, nlmsg_type=NLMSG_ERROR, nlmsg_flags=NLM_F_CAPPED, nlmsg_seq=0, nlmsg_pid=5066}, {error=0, msg={nlmsg_len=36, nlmsg_type=nlctrl, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}}], 4096, 0, NULL, NULL) = 36 access("/proc/net", R_OK) = 0 access("/proc/net/unix", R_OK) = 0 socket(AF_UNIX, SOCK_DGRAM|SOCK_CLOEXEC, 0) = 5 ioctl(5, SIOCGIFINDEX, {ifr_name="wpan0", ifr_ifindex=11}) = 0 close(5) = 0 sendto(4, [{nlmsg_len=36, nlmsg_type=nl802154, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}, "\x0b\x00\x00\x00\x08\x00\x03\x00\x0b\x00\x00\x00\x06\x00\x0a\x00\xa0\xaa\x00\x00"], 36, 0, {sa_family=AF_NETLINK, nl_pid=0, nl_groups=00000000}, 12) = 36 recvfrom(4, [{nlmsg_len=36, nlmsg_type=NLMSG_ERROR, nlmsg_flags=NLM_F_CAPPED, nlmsg_seq=0, nlmsg_pid=5066}, {error=0, msg={nlmsg_len=36, nlmsg_type=nl802154, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}}], 4096, 0, NULL, NULL) = 36 socket(AF_UNIX, SOCK_DGRAM|SOCK_CLOEXEC, 0) = 5 ioctl(5, SIOCGIFINDEX, {ifr_name="wpan0", ifr_ifindex=11}) = 0 close(5) = 0 sendto(3, [{nlmsg_len=44, nlmsg_type=0x10 /* NLMSG_??? */, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}, "\x00\x00\x00\x00\x0b\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00\x0c\x00\x01\x00\x02\x00\xaa\xaa\xaa\xaa\xaa\xaa"], 44, 0, {sa_family=AF_NETLINK, nl_pid=0, nl_groups=00000000}, 12) = 44 recvfrom(3, [{nlmsg_len=36, nlmsg_type=NLMSG_ERROR, nlmsg_flags=NLM_F_CAPPED, nlmsg_seq=0, nlmsg_pid=5066}, {error=0, msg={nlmsg_len=44, nlmsg_type=RTM_NEWLINK, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}}], 4096, 0, NULL, NULL) = 36 sendto(3, [{nlmsg_len=68, nlmsg_type=RTM_NEWLINK, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK|NLM_F_EXCL|NLM_F_CREATE, nlmsg_seq=0, nlmsg_pid=0}, {ifi_family=AF_UNSPEC, ifi_type=ARPHRD_NETROM, ifi_index=0, ifi_flags=0, ifi_change=0}, [[{nla_len=11, nla_type=IFLA_IFNAME}, "lowpan0"...], [{nla_len=16, nla_type=IFLA_LINKINFO}, [{nla_len=10, nla_type=IFLA_INFO_KIND}, "lowpan"...]], [{nla_len=8, nla_type=IFLA_LINK}, 11]]], 68, 0, {sa_family=AF_NETLINK, nl_pid=0, nl_groups=00000000}, 12) = 68 recvfrom(3, [{nlmsg_len=36, nlmsg_type=NLMSG_ERROR, nlmsg_flags=NLM_F_CAPPED, nlmsg_seq=0, nlmsg_pid=5066}, {error=0, msg={nlmsg_len=68, nlmsg_type=RTM_NEWLINK, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK|NLM_F_EXCL|NLM_F_CREATE, nlmsg_seq=0, nlmsg_pid=0}}], 4096, 0, NULL, NULL) = 36 socket(AF_UNIX, SOCK_DGRAM|SOCK_CLOEXEC, 0) = 5 ioctl(5, SIOCGIFINDEX, {ifr_name="wpan1", ifr_ifindex=12}) = 0 close(5) = 0 sendto(4, [{nlmsg_len=36, nlmsg_type=nl802154, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}, "\x0b\x00\x00\x00\x08\x00\x03\x00\x0c\x00\x00\x00\x06\x00\x0a\x00\xa1\xaa\x00\x00"], 36, 0, {sa_family=AF_NETLINK, nl_pid=0, nl_groups=00000000}, 12) = 36 recvfrom(4, [{nlmsg_len=36, nlmsg_type=NLMSG_ERROR, nlmsg_flags=NLM_F_CAPPED, nlmsg_seq=0, nlmsg_pid=5066}, {error=0, msg={nlmsg_len=36, nlmsg_type=nl802154, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}}], 4096, 0, NULL, NULL) = 36 socket(AF_UNIX, SOCK_DGRAM|SOCK_CLOEXEC, 0) = 5 ioctl(5, SIOCGIFINDEX, {ifr_name="wpan1", ifr_ifindex=12}) = 0 close(5) = 0 sendto(3, [{nlmsg_len=44, nlmsg_type=RTM_NEWLINK, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}, {ifi_family=AF_UNSPEC, ifi_type=ARPHRD_NETROM, ifi_index=if_nametoindex("wpan1"), ifi_flags=IFF_UP, ifi_change=0x1}, [{nla_len=12, nla_type=IFLA_ADDRESS}, 02:01:aa:aa:aa:aa:aa]], 44, 0, {sa_family=AF_NETLINK, nl_pid=0, nl_groups=00000000}, 12) = 44 recvfrom(3, [{nlmsg_len=36, nlmsg_type=NLMSG_ERROR, nlmsg_flags=NLM_F_CAPPED, nlmsg_seq=0, nlmsg_pid=5066}, {error=0, msg={nlmsg_len=44, nlmsg_type=RTM_NEWLINK, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}}], 4096, 0, NULL, NULL) = 36 close(3) = 0 close(4) = 0 memfd_create("syzkaller", 0) = 3 mmap(NULL, 138412032, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f3c5f551000 write(3, "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., 524288) = 524288 munmap(0x7f3c5f551000, 524288) = 0 openat(AT_FDCWD, "/dev/loop0", O_RDWR) = 4 ioctl(4, LOOP_SET_FD, 3) = 0 close(3) = 0 mkdir("./file0", 0777) = 0 syzkaller login: [ 42.929466][ T5066] loop0: detected capacity change from 0 to 1024 [ 42.938619][ T5066] ======================================================= [ 42.938619][ T5066] WARNING: The mand mount option has been deprecated and [ 42.938619][ T5066] and is ignored by this kernel. Remove the mand [ 42.938619][ T5066] option from the mount to silence this warning. [ 42.938619][ T5066] ======================================================= mount("/dev/loop0", "./file0", "udf", MS_NOSUID|MS_SYNCHRONOUS|MS_MANDLOCK|MS_REC|MS_STRICTATIME|MS_LAZYTIME, "noadinicb,utf8,noadinicb,volume=18446744073709551614,iocharset=iso8859-14,") = 0 openat(AT_FDCWD, "./file0", O_RDONLY|O_DIRECTORY) = 3 chdir("./file0") = 0 ioctl(4, LOOP_CLR_FD) = 0 close(4) = 0 open(".", O_RDONLY) = 4 [ 42.975267][ T5066] UDF-fs: error (device loop0): udf_read_tagged: tag checksum failed, block 96: 0x73 != 0x9b [ 42.985889][ T5066] UDF-fs: error (device loop0): udf_process_sequence: Primary Volume Descriptor not found! [ 42.997610][ T5066] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) [ 43.016337][ T5066] ================================================================== [ 43.024408][ T5066] BUG: KASAN: slab-out-of-bounds in udf_write_aext+0x7e9/0x8f0 [ 43.031961][ T5066] Write of size 4 at addr ffff888021b1eff0 by task syz-executor208/5066 [ 43.040260][ T5066] [ 43.042559][ T5066] CPU: 0 PID: 5066 Comm: syz-executor208 Not tainted 6.2.0-rc8-syzkaller-00134-g38f8ccde04a3 #0 [ 43.052942][ T5066] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/21/2023 [ 43.062978][ T5066] Call Trace: [ 43.066235][ T5066] [ 43.069143][ T5066] dump_stack_lvl+0xd1/0x138 [ 43.073728][ T5066] print_report+0x15e/0x45d [ 43.078215][ T5066] ? __phys_addr+0xc8/0x140 [ 43.082698][ T5066] ? udf_write_aext+0x7e9/0x8f0 [ 43.087538][ T5066] kasan_report+0xbf/0x1f0 [ 43.091940][ T5066] ? udf_write_aext+0x7e9/0x8f0 [ 43.096869][ T5066] udf_write_aext+0x7e9/0x8f0 [ 43.101545][ T5066] udf_add_entry+0xd03/0x2ac0 [ 43.106217][ T5066] ? udf_write_fi+0xf20/0xf20 [ 43.110871][ T5066] ? udf_new_inode+0xc07/0x11f0 [ 43.115793][ T5066] udf_mkdir+0x149/0x650 [ 43.120020][ T5066] ? userns_owner+0x40/0x40 [ 43.124503][ T5066] ? udf_create+0x180/0x180 [ 43.128986][ T5066] ? hook_path_mkdir+0x44d/0x530 [ 43.133920][ T5066] ? d_alloc+0x1c0/0x240 [ 43.138237][ T5066] ? from_kgid+0x8b/0xd0 [ 43.142459][ T5066] ? from_kuid_munged+0x130/0x130 [ 43.147479][ T5066] ? generic_permission+0x28f/0x7a0 [ 43.152655][ T5066] ? bpf_lsm_inode_permission+0x9/0x10 [ 43.158178][ T5066] ? security_inode_permission+0xc9/0xf0 [ 43.163793][ T5066] ? bpf_lsm_inode_mkdir+0x9/0x10 [ 43.168795][ T5066] vfs_mkdir+0x48d/0x740 [ 43.173021][ T5066] do_mkdirat+0x27b/0x2f0 [ 43.177344][ T5066] ? __ia32_sys_mknod+0xb0/0xb0 [ 43.182176][ T5066] ? getname_flags.part.0+0x1dd/0x4f0 [ 43.187529][ T5066] __x64_sys_mkdirat+0x119/0x170 [ 43.192449][ T5066] do_syscall_64+0x39/0xb0 [ 43.196848][ T5066] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 43.202720][ T5066] RIP: 0033:0x7f3c6799e1b9 [ 43.207116][ T5066] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 81 14 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 [ 43.226719][ T5066] RSP: 002b:00007ffea6a02a78 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 43.235110][ T5066] RAX: ffffffffffffffda RBX: 00007f3c67a13720 RCX: 00007f3c6799e1b9 [ 43.243063][ T5066] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000004 [ 43.251017][ T5066] RBP: 0000000000000001 R08: 001c00000000000c R09: 001c00000000000c [ 43.259076][ T5066] R10: 0000000000000a47 R11: 0000000000000246 R12: 0000000000000004 [ 43.267022][ T5066] R13: 0000000000000003 R14: 00007ffea6a02a97 R15: 00007ffea6a02a9a [ 43.274979][ T5066] [ 43.278063][ T5066] [ 43.280362][ T5066] Allocated by task 1: [ 43.284398][ T5066] kasan_save_stack+0x22/0x40 [ 43.289142][ T5066] kasan_set_track+0x25/0x30 [ 43.293709][ T5066] __kasan_kmalloc+0xa5/0xb0 [ 43.298272][ T5066] device_add+0x116c/0x1e90 [ 43.302750][ T5066] device_create_groups_vargs+0x203/0x280 [ 43.308531][ T5066] device_create+0xe3/0x120 [ 43.313006][ T5066] mon_bin_add+0xbb/0x160 [ 43.317487][ T5066] mon_bus_init+0x18e/0x320 [ 43.321970][ T5066] mon_notify+0x330/0x490 [ 43.326285][ T5066] notifier_call_chain+0xb5/0x200 [ 43.331289][ T5066] blocking_notifier_call_chain+0x6b/0xa0 [ 43.337074][ T5066] usb_add_hcd.cold+0x3bb/0x13a1 [ 43.342083][ T5066] vhci_hcd_probe+0x14f/0x3a0 [ 43.346737][ T5066] platform_probe+0x100/0x1f0 [ 43.351392][ T5066] really_probe+0x249/0xb90 [ 43.355872][ T5066] __driver_probe_device+0x1df/0x4d0 [ 43.361134][ T5066] driver_probe_device+0x4c/0x1a0 [ 43.366137][ T5066] __device_attach_driver+0x1d4/0x2e0 [ 43.371489][ T5066] bus_for_each_drv+0x163/0x1e0 [ 43.376313][ T5066] __device_attach+0x1e4/0x530 [ 43.381053][ T5066] bus_probe_device+0x1e8/0x2a0 [ 43.385874][ T5066] device_add+0xbd9/0x1e90 [ 43.390280][ T5066] platform_device_add+0x362/0x820 [ 43.395366][ T5066] vhci_hcd_init+0x345/0x489 [ 43.399931][ T5066] do_one_initcall+0x141/0x790 [ 43.404696][ T5066] kernel_init_freeable+0x6f9/0x782 [ 43.409883][ T5066] kernel_init+0x1e/0x1d0 [ 43.414187][ T5066] ret_from_fork+0x1f/0x30 [ 43.418580][ T5066] [ 43.420878][ T5066] The buggy address belongs to the object at ffff888021b1ec00 [ 43.420878][ T5066] which belongs to the cache kmalloc-512 of size 512 [ 43.434902][ T5066] The buggy address is located 496 bytes to the right of [ 43.434902][ T5066] 512-byte region [ffff888021b1ec00, ffff888021b1ee00) [ 43.448755][ T5066] [ 43.451054][ T5066] The buggy address belongs to the physical page: [ 43.457437][ T5066] page:ffffea000086c700 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x21b1c [ 43.467561][ T5066] head:ffffea000086c700 order:2 compound_mapcount:0 subpages_mapcount:0 compound_pincount:0 [ 43.477598][ T5066] flags: 0xfff00000010200(slab|head|node=0|zone=1|lastcpupid=0x7ff) [ 43.485641][ T5066] raw: 00fff00000010200 ffff888012441c80 dead000000000100 dead000000000122 [ 43.494200][ T5066] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 43.502755][ T5066] page dumped because: kasan: bad access detected [ 43.509138][ T5066] page_owner tracks the page as allocated [ 43.514825][ T5066] page last allocated via order 2, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 1, tgid 1 (swapper/0), ts 6483224547, free_ts 0 [ 43.534505][ T5066] get_page_from_freelist+0x119c/0x2ce0 [ 43.540052][ T5066] __alloc_pages+0x1cb/0x5b0 [ 43.544622][ T5066] alloc_page_interleave+0x1e/0x200 [ 43.549797][ T5066] alloc_pages+0x233/0x270 [ 43.554192][ T5066] allocate_slab+0x25f/0x350 [ 43.558842][ T5066] ___slab_alloc+0xa91/0x1400 [ 43.563491][ T5066] __slab_alloc.constprop.0+0x56/0xa0 [ 43.568924][ T5066] __kmem_cache_alloc_node+0x1a4/0x430 [ 43.574373][ T5066] kmalloc_trace+0x26/0x60 [ 43.578855][ T5066] device_add+0x116c/0x1e90 [ 43.583334][ T5066] usb_hub_create_port_device+0x3b6/0xd70 [ 43.589045][ T5066] hub_probe.cold+0x2534/0x2aa3 [ 43.593878][ T5066] usb_probe_interface+0x30f/0x7f0 [ 43.599061][ T5066] really_probe+0x249/0xb90 [ 43.603541][ T5066] __driver_probe_device+0x1df/0x4d0 [ 43.608801][ T5066] driver_probe_device+0x4c/0x1a0 [ 43.613800][ T5066] page_owner free stack trace missing [ 43.619226][ T5066] [ 43.621533][ T5066] Memory state around the buggy address: [ 43.627223][ T5066] ffff888021b1ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.635254][ T5066] ffff888021b1ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.643374][ T5066] >ffff888021b1ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.651405][ T5066] ^ [ 43.659182][ T5066] ffff888021b1f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 43.667219][ T5066] ffff888021b1f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 43.675258][ T5066] ================================================================== [ 43.687477][ T5066] Kernel panic - not syncing: KASAN: panic_on_warn set ... [ 43.694678][ T5066] CPU: 1 PID: 5066 Comm: syz-executor208 Not tainted 6.2.0-rc8-syzkaller-00134-g38f8ccde04a3 #0 [ 43.705146][ T5066] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/21/2023 [ 43.715176][ T5066] Call Trace: [ 43.718518][ T5066] [ 43.721427][ T5066] dump_stack_lvl+0xd1/0x138 [ 43.726002][ T5066] panic+0x2cc/0x626 [ 43.729875][ T5066] ? panic_print_sys_info.part.0+0x110/0x110 [ 43.735923][ T5066] ? preempt_schedule_thunk+0x1a/0x20 [ 43.741276][ T5066] ? preempt_schedule_common+0x59/0xc0 [ 43.746717][ T5066] check_panic_on_warn.cold+0x19/0x35 [ 43.752065][ T5066] end_report.part.0+0x36/0x73 [ 43.756805][ T5066] ? udf_write_aext+0x7e9/0x8f0 [ 43.761634][ T5066] kasan_report.cold+0xa/0xf [ 43.766200][ T5066] ? udf_write_aext+0x7e9/0x8f0 [ 43.771032][ T5066] udf_write_aext+0x7e9/0x8f0 [ 43.775710][ T5066] udf_add_entry+0xd03/0x2ac0 [ 43.780363][ T5066] ? udf_write_fi+0xf20/0xf20 [ 43.785012][ T5066] ? udf_new_inode+0xc07/0x11f0 [ 43.789931][ T5066] udf_mkdir+0x149/0x650 [ 43.794145][ T5066] ? userns_owner+0x40/0x40 [ 43.798634][ T5066] ? udf_create+0x180/0x180 [ 43.803123][ T5066] ? hook_path_mkdir+0x44d/0x530 [ 43.808054][ T5066] ? d_alloc+0x1c0/0x240 [ 43.812288][ T5066] ? from_kgid+0x8b/0xd0 [ 43.816521][ T5066] ? from_kuid_munged+0x130/0x130 [ 43.821539][ T5066] ? generic_permission+0x28f/0x7a0 [ 43.826827][ T5066] ? bpf_lsm_inode_permission+0x9/0x10 [ 43.832279][ T5066] ? security_inode_permission+0xc9/0xf0 [ 43.837912][ T5066] ? bpf_lsm_inode_mkdir+0x9/0x10 [ 43.842930][ T5066] vfs_mkdir+0x48d/0x740 [ 43.847169][ T5066] do_mkdirat+0x27b/0x2f0 [ 43.851671][ T5066] ? __ia32_sys_mknod+0xb0/0xb0 [ 43.856515][ T5066] ? getname_flags.part.0+0x1dd/0x4f0 [ 43.861881][ T5066] __x64_sys_mkdirat+0x119/0x170 [ 43.866812][ T5066] do_syscall_64+0x39/0xb0 [ 43.871222][ T5066] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 43.877105][ T5066] RIP: 0033:0x7f3c6799e1b9 [ 43.881538][ T5066] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 81 14 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 [ 43.901133][ T5066] RSP: 002b:00007ffea6a02a78 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 43.909533][ T5066] RAX: ffffffffffffffda RBX: 00007f3c67a13720 RCX: 00007f3c6799e1b9 [ 43.917494][ T5066] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000004 [ 43.925552][ T5066] RBP: 0000000000000001 R08: 001c00000000000c R09: 001c00000000000c [ 43.933506][ T5066] R10: 0000000000000a47 R11: 0000000000000246 R12: 0000000000000004 [ 43.941460][ T5066] R13: 0000000000000003 R14: 00007ffea6a02a97 R15: 00007ffea6a02a9a [ 43.949426][ T5066] [ 43.953433][ T5066] Kernel Offset: disabled [ 43.957839][ T5066] Rebooting in 86400 seconds..