[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 25.248733] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 28.445755] random: sshd: uninitialized urandom read (32 bytes read) [ 28.728903] sshd (5546) used greatest stack depth: 16584 bytes left [ 28.752242] random: sshd: uninitialized urandom read (32 bytes read) [ 29.533188] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.10.8' (ECDSA) to the list of known hosts. [ 35.122821] random: sshd: uninitialized urandom read (32 bytes read) 2018/09/12 06:33:53 fuzzer started [ 36.542757] random: cc1: uninitialized urandom read (8 bytes read) 2018/09/12 06:33:55 dialing manager at 10.128.0.26:42863 2018/09/12 06:33:55 syscalls: 1 2018/09/12 06:33:55 code coverage: enabled 2018/09/12 06:33:55 comparison tracing: enabled 2018/09/12 06:33:55 setuid sandbox: enabled 2018/09/12 06:33:55 namespace sandbox: enabled 2018/09/12 06:33:55 fault injection: enabled 2018/09/12 06:33:55 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/09/12 06:33:55 net packed injection: enabled 2018/09/12 06:33:55 net device setup: enabled [ 39.114162] random: crng init done 06:37:06 executing program 0: io_cancel(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000040)}, &(0x7f0000000100)) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) chroot(&(0x7f0000000280)='./file0\x00') socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='sed\x00', 0xffffffffffffff9c}, 0x10) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") rmdir(&(0x7f0000000340)='./file0\x00') socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) write(0xffffffffffffffff, &(0x7f0000000040), 0x0) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000140)) 06:37:06 executing program 1: clock_gettime(0x3, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)) lstat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) getresuid(&(0x7f00000005c0), &(0x7f0000000640), &(0x7f0000000680)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000740)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000780)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000880)=0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000a80)=0xe8) stat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b80), &(0x7f00000000c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c00)={{{@in=@local, @in6=@remote}}, {{}, 0x0, @in6}}, &(0x7f0000000d00)=0xe8) stat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) getpid() geteuid() getresgid(&(0x7f0000001000), &(0x7f0000001040), &(0x7f0000001080)) getpgrp(0xffffffffffffffff) geteuid() getegid() gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) fstat(0xffffffffffffffff, &(0x7f0000001180)) openat$urandom(0xffffffffffffff9c, &(0x7f0000001400)='/dev/urandom\x00', 0x0, 0x0) getpid() lstat(&(0x7f0000002e80)='./file0\x00', &(0x7f0000002ec0)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f40), &(0x7f0000002f80)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003200)={{{@in, @in6=@ipv4={[], [], @local}}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000001b80)=0xe8) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003100)) geteuid() stat(&(0x7f0000003140)='./file0\x00', &(0x7f0000003180)) getpgid(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003a80)={{{@in6, @in6}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f0000003b80)=0xe8) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003bc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003c00)={{{@in=@local, @in6=@ipv4={[], [], @broadcast}}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000003d00)=0xe8) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003d40)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000003e40)=0xe8) getresgid(&(0x7f0000003e80), &(0x7f0000003ec0), &(0x7f0000003f00)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003f40)) getresuid(&(0x7f0000003f80), &(0x7f0000003fc0), &(0x7f0000004000)) getgroups(0x0, &(0x7f0000004040)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000004280)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000042c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f00000043c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004400)) gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004480)={{{@in6=@ipv4={[], [], @multicast1}, @in=@remote}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000004580)=0xe8) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000045c0), &(0x7f0000004600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004640), &(0x7f0000004680)=0xc) stat(&(0x7f00000046c0)='./file0\x00', &(0x7f0000004700)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004780)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000047c0)={{{@in=@multicast1, @in6}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f00000048c0)=0xe8) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000049c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004a00), &(0x7f0000004a40)=0xc) 06:37:06 executing program 5: timer_create(0x0, &(0x7f0000000180)={0x0, 0x28}, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/autofs\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000800), 0x4) syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0xc) sched_getattr(0x0, &(0x7f00000001c0), 0x30, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 06:37:06 executing program 2: sched_setaffinity(0x0, 0x3bd, &(0x7f00000004c0)) r0 = perf_event_open(&(0x7f0000001580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000000, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f00000001c0)={0x0, 0xffff}) mmap(&(0x7f00000f2000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000003ac0)='dns_resolver\x00', &(0x7f0000003b00)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000003b40)="03ba50c831ccc41567ebd8f76a0bd30f3399ea125a0b8188be04a3c1dbaec6596020", 0x22, 0x0) add_key(&(0x7f0000000200)='ceph\x00', &(0x7f0000000240), 0x0, 0x0, 0xfffffffffffffffa) request_key(&(0x7f0000000280)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000300)='user\x00', 0xfffffffffffffffe) r1 = getpid() perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0xfffffffffffffff9, 0x0, 0x0, 0x80000000, 0x0, 0x3, 0xd800c, 0x3, 0x0, 0x2, 0x0, 0x7, 0xffffffffffff0000, 0x7fff, 0x0, 0x7, 0x0, 0xf3ec, 0x0, 0x0, 0x81, 0x7, 0x5, 0x0, 0x2, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x3, 0xd74, 0x0, 0x0, 0x9, 0x0, 0x800, 0x1, @perf_bp={&(0x7f00000000c0), 0x1}, 0x0, 0x9, 0x0, 0x0, 0xffff, 0x1, 0xfff}, 0x0, 0x2, r0, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) perf_event_open(&(0x7f000001d000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(r1, &(0x7f0000002880)=[{&(0x7f0000000340)=""/160, 0xa0}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/250, 0xfa}, {&(0x7f0000001500)=""/123, 0x7b}, {&(0x7f0000002700)=""/175, 0xaf}, {&(0x7f00000027c0)=""/189, 0xbd}], 0x6, &(0x7f0000000180)=[{&(0x7f0000002900)=""/4096, 0x1000}, {&(0x7f0000003900)=""/220, 0xdc}, {&(0x7f0000003a00)=""/172, 0xac}], 0x3, 0x0) connect$inet6(r2, &(0x7f0000000000), 0x1c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000100)={@loopback, 0x2, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) write(r2, &(0x7f0000000140)="3b8736d38c7c2c51ec576085f398d646c87890cd11925c3f5cc284f1bdc9c34063485a3980fbd65f510000000000ffff", 0x30) 06:37:06 executing program 3: mlock(&(0x7f0000ffc000/0x2000)=nil, 0x2000) eventfd2(0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)) waitid(0x0, 0x0, 0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0xfffffffffffffff9) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000200)) seccomp(0x0, 0x0, &(0x7f00000007c0)={0x0, &(0x7f0000000740)}) listxattr(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)=""/14, 0xe) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000800), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_procfs(0x0, &(0x7f0000000180)='mountstats\x00') setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f00000002c0), 0x4) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) eventfd2(0x0, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) eventfd2(0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) request_key(&(0x7f0000000280)='big_key\x00', &(0x7f0000000300), &(0x7f0000000340)='nodevlo/cgroup:\x00', 0x0) add_key$user(&(0x7f0000000380)='user\x00', &(0x7f00000003c0), &(0x7f0000000400), 0x0, 0x0) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 06:37:06 executing program 4: syslog(0x0, &(0x7f0000000380)=""/147, 0x93) socket$unix(0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000680)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000000580)=""/214}, 0x18) timer_delete(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002c80)) getresuid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f00000002c0)) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000080)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000280)={'team0\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") [ 228.353010] IPVS: ftp: loaded support on port[0] = 21 [ 228.353017] IPVS: ftp: loaded support on port[0] = 21 [ 228.368105] IPVS: ftp: loaded support on port[0] = 21 [ 228.372759] IPVS: ftp: loaded support on port[0] = 21 [ 228.404856] kasan: CONFIG_KASAN_INLINE enabled [ 228.409580] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 228.410743] kobject: 'gre0' (0000000050221316): kobject_uevent_env [ 228.417189] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 228.417207] CPU: 1 PID: 5585 Comm: syz-executor5 Not tainted 4.19.0-rc3-next-20180912+ #72 [ 228.424174] kobject: 'gre0' (0000000050221316): fill_kobj_path: path = '/devices/virtual/net/gre0' [ 228.429760] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 228.442189] kobject: 'queues' (0000000032182526): kobject_add_internal: parent: 'gre0', set: '' [ 228.447260] RIP: 0010:mqueue_get_tree+0xba/0x2e0 [ 228.447275] Code: 4c 8d b3 98 00 00 00 4d 85 ed 0f 84 d1 00 00 00 e8 6b 44 3f fe 49 8d 7d 08 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 e3 01 00 00 48 b8 00 00 00 00 00 fc ff df 4d 8b [ 228.447290] RSP: 0018:ffff880172b5f928 EFLAGS: 00010a02 [ 228.457245] kobject: 'queues' (0000000032182526): kobject_uevent_env [ 228.466015] RAX: dffffc0000000000 RBX: ffff8801c9d29700 RCX: ffffffff8160aca1 [ 228.466023] RDX: 18885efeba8a85ce RSI: ffffffff833deb15 RDI: c442f7f5d4542e72 [ 228.466031] RBP: ffff880172b5f948 R08: fffffbfff13555fd R09: fffffbfff13555fc [ 228.466038] R10: fffffbfff13555fc R11: ffffffff89aaafe3 R12: ffff8801d7506580 [ 228.466046] R13: c442f7f5d4542e6a R14: ffff8801c9d29798 R15: ffff8801c9d29798 [ 228.466057] FS: 0000000001ed9940(0000) GS:ffff8801dad00000(0000) knlGS:0000000000000000 [ 228.466072] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 228.472466] kobject: 'queues' (0000000032182526): kobject_uevent_env: filter function caused the event to drop! [ 228.489725] CR2: 0000000000482e00 CR3: 0000000172a75000 CR4: 00000000001406e0 [ 228.489735] Call Trace: [ 228.489759] vfs_get_tree+0x1cb/0x5c0 [ 228.489776] mq_create_mount+0xe3/0x190 [ 228.489792] mq_init_ns+0x15a/0x210 [ 228.489803] copy_ipcs+0x3d2/0x580 [ 228.489820] ? ipcns_get+0xe0/0xe0 [ 228.495713] kobject: 'rx-0' (00000000f5d61722): kobject_add_internal: parent: 'queues', set: 'queues' [ 228.501676] ? do_mount+0x1db0/0x1db0 [ 228.509491] kobject: 'rx-0' (00000000f5d61722): kobject_uevent_env [ 228.516751] ? kmem_cache_alloc+0x33a/0x730 [ 228.516779] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 228.516806] ? perf_event_namespaces+0x136/0x400 [ 228.524622] kobject: 'rx-0' (00000000f5d61722): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/rx-0' [ 228.531348] create_new_namespaces+0x376/0x900 [ 228.539099] kobject: 'tx-0' (000000008d31626b): kobject_add_internal: parent: 'queues', set: 'queues' [ 228.546836] ? sys_ni_syscall+0x20/0x20 [ 228.546855] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 228.546875] ? ns_capable_common+0x13f/0x170 [ 228.553454] kobject: 'tx-0' (000000008d31626b): kobject_uevent_env [ 228.562975] unshare_nsproxy_namespaces+0xc3/0x1f0 [ 228.562993] ksys_unshare+0x79c/0x10b0 [ 228.563011] ? walk_process_tree+0x440/0x440 [ 228.571513] kobject: 'tx-0' (000000008d31626b): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/tx-0' [ 228.572867] ? lock_downgrade+0x900/0x900 [ 228.577648] kobject: 'lo' (00000000d1713b72): kobject_add_internal: parent: 'net', set: 'devices' [ 228.580611] ? kasan_check_read+0x11/0x20 [ 228.585459] kobject: 'lo' (00000000d1713b72): kobject_uevent_env [ 228.587751] ? do_raw_spin_unlock+0xa7/0x2f0 [ 228.591333] kobject: 'lo' (00000000d1713b72): fill_kobj_path: path = '/devices/virtual/net/lo' [ 228.600682] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 228.600700] ? kasan_check_write+0x14/0x20 [ 228.600712] ? do_raw_read_unlock+0x3f/0x60 [ 228.600731] ? do_syscall_64+0x9a/0x820 [ 228.605105] kobject: 'queues' (00000000982efbe7): kobject_add_internal: parent: 'lo', set: '' [ 228.610836] ? do_syscall_64+0x9a/0x820 [ 228.615461] kobject: 'queues' (00000000982efbe7): kobject_uevent_env [ 228.620672] ? lockdep_hardirqs_on+0x421/0x5c0 [ 228.625719] kobject: 'queues' (00000000982efbe7): kobject_uevent_env: filter function caused the event to drop! [ 228.635574] ? trace_hardirqs_on+0xbd/0x310 [ 228.635591] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 228.635611] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 228.641101] kobject: 'rx-0' (00000000aba11904): kobject_add_internal: parent: 'queues', set: 'queues' [ 228.649547] ? __ia32_sys_prlimit64+0x8c0/0x8c0 [ 228.649565] __x64_sys_unshare+0x31/0x40 [ 228.649579] do_syscall_64+0x1b9/0x820 [ 228.649600] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 228.654816] kobject: 'rx-0' (00000000aba11904): kobject_uevent_env [ 228.659123] ? syscall_return_slowpath+0x5e0/0x5e0 [ 228.663546] kobject: 'rx-0' (00000000aba11904): fill_kobj_path: path = '/devices/virtual/net/lo/queues/rx-0' [ 228.669824] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 228.669840] ? trace_hardirqs_on_caller+0x310/0x310 [ 228.669853] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 228.669867] ? prepare_exit_to_usermode+0x291/0x3b0 [ 228.669887] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 228.675470] kobject: 'tx-0' (00000000f847e051): kobject_add_internal: parent: 'queues', set: 'queues' [ 228.678720] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 228.683333] kobject: 'tx-0' (00000000f847e051): kobject_uevent_env [ 228.693254] RIP: 0033:0x459d87 [ 228.693288] Code: 00 00 00 b8 63 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 3d 8a fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 10 01 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 1d 8a fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 228.693294] RSP: 002b:00007ffe92333f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 228.693306] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459d87 [ 228.693313] RDX: 0000000000000000 RSI: 00007ffe92333f30 RDI: 0000000008000000 [ 228.693321] RBP: 0000000000930b28 R08: 0000000000000000 R09: 0000000000000018 [ 228.693334] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000010 [ 228.698185] kobject: 'tx-0' (00000000f847e051): fill_kobj_path: path = '/devices/virtual/net/lo/queues/tx-0' [ 228.706476] R13: 0000000000412cc0 R14: 0000000000000000 R15: 0000000000000000 [ 228.706490] Modules linked in: [ 228.706551] ---[ end trace 65d5af2fa32e603f ]--- [ 228.713059] kobject: 'gretap0' (000000000a676ed2): kobject_add_internal: parent: 'net', set: 'devices' [ 228.716852] RIP: 0010:mqueue_get_tree+0xba/0x2e0 [ 228.716867] Code: 4c 8d b3 98 00 00 00 4d 85 ed 0f 84 d1 00 00 00 e8 6b 44 3f fe 49 8d 7d 08 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 e3 01 00 00 48 b8 00 00 00 00 00 fc ff df 4d 8b [ 228.716875] RSP: 0018:ffff880172b5f928 EFLAGS: 00010a02 [ 228.716885] RAX: dffffc0000000000 RBX: ffff8801c9d29700 RCX: ffffffff8160aca1 [ 228.716893] RDX: 18885efeba8a85ce RSI: ffffffff833deb15 RDI: c442f7f5d4542e72 [ 228.716900] RBP: ffff880172b5f948 R08: fffffbfff13555fd R09: fffffbfff13555fc [ 228.716907] R10: fffffbfff13555fc R11: ffffffff89aaafe3 R12: ffff8801d7506580 [ 228.716916] R13: c442f7f5d4542e6a R14: ffff8801c9d29798 R15: ffff8801c9d29798 [ 228.716931] FS: 0000000001ed9940(0000) GS:ffff8801dad00000(0000) knlGS:0000000000000000 [ 228.724808] kobject: 'gretap0' (000000000a676ed2): kobject_uevent_env [ 228.730105] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 228.740023] IPVS: ftp: loaded support on port[0] = 21 [ 228.743202] CR2: 0000000000482e00 CR3: 0000000172a75000 CR4: 00000000001406e0 [ 228.747551] kobject: 'gretap0' (000000000a676ed2): fill_kobj_path: path = '/devices/virtual/net/gretap0' [ 228.756423] Kernel panic - not syncing: Fatal exception [ 228.761372] Kernel Offset: disabled [ 229.101561] Rebooting in 86400 seconds..