Warning: Permanently added '10.128.1.47' (ECDSA) to the list of known hosts. 2019/05/31 18:27:17 fuzzer started syzkaller login: [ 47.988917] kauditd_printk_skb: 2 callbacks suppressed [ 47.988932] audit: type=1400 audit(1559327237.502:36): avc: denied { map } for pid=7635 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/05/31 18:27:20 dialing manager at 10.128.0.105:46137 2019/05/31 18:27:20 syscalls: 2457 2019/05/31 18:27:20 code coverage: enabled 2019/05/31 18:27:20 comparison tracing: enabled 2019/05/31 18:27:20 extra coverage: extra coverage is not supported by the kernel 2019/05/31 18:27:20 setuid sandbox: enabled 2019/05/31 18:27:20 namespace sandbox: enabled 2019/05/31 18:27:20 Android sandbox: /sys/fs/selinux/policy does not exist 2019/05/31 18:27:20 fault injection: enabled 2019/05/31 18:27:20 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/05/31 18:27:20 net packet injection: enabled 2019/05/31 18:27:20 net device setup: enabled 18:27:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket(0x1e, 0x5, 0x0) r2 = socket(0x1e, 0x2, 0x0) bind(r2, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) connect$tipc(r1, &(0x7f0000000000)=@name, 0x10) close(r2) [ 53.541024] audit: type=1400 audit(1559327243.062:37): avc: denied { map } for pid=7652 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=14945 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 53.626723] IPVS: ftp: loaded support on port[0] = 21 [ 53.636364] NET: Registered protocol family 30 [ 53.641258] Failed to register TIPC socket type 18:27:23 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) close(r0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$FUSE_INTERRUPT(r1, &(0x7f0000000000)={0x10}, 0x10) write$cgroup_type(r1, &(0x7f0000000100)='threaded\x00', 0x116) recvmsg$kcm(r0, &(0x7f0000000380)={0x0, 0xfffffffffffffd43, &(0x7f0000000340)=[{&(0x7f0000000400)=""/215, 0xd7}], 0x7}, 0x0) [ 53.927126] IPVS: ftp: loaded support on port[0] = 21 [ 53.944283] NET: Registered protocol family 30 [ 53.948937] Failed to register TIPC socket type 18:27:23 executing program 2: syz_emit_ethernet(0x32, &(0x7f0000000080)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x21, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, "10d1f6", 0x0, "071ccd"}}}}}}, 0x0) [ 54.312701] IPVS: ftp: loaded support on port[0] = 21 [ 54.332283] NET: Registered protocol family 30 [ 54.336982] Failed to register TIPC socket type 18:27:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020000003101000000000000000000002b010000484a000002d9f133c0616c072a20139b9ac715e5c07c0227c829273502eb42cd8030f39022e15b9479d77bfc098beef32dc3fabf1cc4ad639e0db270328b9270a90532b371c01c50d9abf9ded461f8319a48bd42008752f1e5b2ccbbc331f3ca01fb8628e59e96f717025bfdf19d6e84829c0f852e5e3cc1c45e7e052f5d943f5bfeeb22320a261fd07f86bc9832852060aa92d7b2005807b4fbd8cfd77942e14ae4e8a990bb4ce7f466aabd0400e133a9462f854753bbd9ffffffffffffff341549d967739166cacab0413f99ad32fc90166a40566a10776fa7a750701c40ce05bbca9f6c29f0064e4f6ab21a71abcae34042257956be0b061ecbd7c8961fb29584694b909da1296e22388eb80a02cfad60896f173d872e9d9ddd72619beb32f92f0c990c747c21f699b21172812466818058a5e0ce8b050ae4339c14800ff81f7047d2082fc3716b4331f35dbc430c674f4f84d8a9a9bcb796896062cd09b7d96a2d8ccbfe766c8bdc0060e7e136117641adc49f35b74464668b4f45e6c4055b5fa4d0575bbbca4f748e15160ddc27f2c2ad2669d641a075802157f623d1f69a701e97c33a23c9da49ef9e672e7cf911f2b0df219747151345e79cf3fc89b9561d6bdec4d366de393d8820b297241c7f8ebf0d6c6e150051f52281a6247a23a7a250594808530a4300a9f8a2a4b4e816952294e339c2a04a7f8caf999295c9ae9387d84dc69804ab8645b709ae40ae86f2714aea27b5be8db0c63134ac6e24ab6b228def10f1c2c7a5c902c0a3798c3f55183ad8f11125bff60055d467078f8a56a5b8ac37ec3f8d229737c36ddfc5aa7534cb91c88359eca5bd1b55575dd89005117097734371d29c5705628a9532df0e6c18cf997ea65f1cfee2bc7b5a0d8c724a38b292637b3f24824ffca885d2b7cb913062c705c1fc03e54e3267e78720d1970f1f9b708a5db880a9aae70984c35534508a8d3b1f50032e8b345f467e540ee44d4da519e325987345d9b4c1e8375c4dc873032e65c95c6f9346d267a4a33b27f1928ccfc09229a822d9aed875fb7679ca9c2a5238f3ec90644589981a93d30fb52defe208d0cfc7df6b"], 0x321}}, 0x0) syz_execute_func(&(0x7f0000000100)="40ddb80000000091930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a900fbab7bab7baaaa420f383c02c401405c6bfd49d768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100") [ 54.805781] IPVS: ftp: loaded support on port[0] = 21 [ 54.824703] NET: Registered protocol family 30 [ 54.829349] Failed to register TIPC socket type 18:27:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="ac8ac6f99a83f39825"], 0x9}}, 0x0) syz_execute_func(&(0x7f00000002c0)="f2af91930f0124eda133fa20430fbafce842f66188d0c0430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f441e051c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") [ 55.386528] IPVS: ftp: loaded support on port[0] = 21 [ 55.425188] NET: Registered protocol family 30 [ 55.429823] Failed to register TIPC socket type 18:27:25 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) [ 55.912269] chnl_net:caif_netlink_parms(): no params data found [ 56.293968] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.352261] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.451688] device bridge_slave_0 entered promiscuous mode [ 56.588002] IPVS: ftp: loaded support on port[0] = 21 [ 56.595181] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.716659] NET: Registered protocol family 30 [ 56.728907] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.881428] device bridge_slave_1 entered promiscuous mode [ 56.887874] Failed to register TIPC socket type [ 57.373242] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 57.653633] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 58.209731] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 58.385022] team0: Port device team_slave_0 added [ 58.611680] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 58.619324] team0: Port device team_slave_1 added [ 58.811743] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 59.015233] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 59.553308] device hsr_slave_0 entered promiscuous mode [ 59.744591] device hsr_slave_1 entered promiscuous mode [ 59.956839] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 60.143196] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 60.421912] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 61.003564] 8021q: adding VLAN 0 to HW filter on device bond0 [ 61.222049] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 61.434301] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 61.520591] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 61.529532] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 61.644554] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 61.754759] 8021q: adding VLAN 0 to HW filter on device team0 [ 61.902721] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 61.909841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 61.951963] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 62.035671] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.042274] bridge0: port 1(bridge_slave_0) entered forwarding state [ 62.207508] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 62.262054] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 62.269298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 62.341170] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 62.411552] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.418052] bridge0: port 2(bridge_slave_1) entered forwarding state [ 62.533331] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 62.541276] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 62.661625] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 62.668798] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 62.813859] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 62.871514] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 62.880064] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 62.962425] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 63.061125] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 63.068437] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 63.152213] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 63.227009] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 63.281635] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 63.289469] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 63.386351] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 63.481515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 63.491586] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 63.621804] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 63.627900] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 63.801399] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 63.968943] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 64.125292] audit: type=1400 audit(1559327253.642:38): avc: denied { associate } for pid=7653 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 18:27:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket(0x1e, 0x5, 0x0) r2 = socket(0x1e, 0x2, 0x0) bind(r2, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) connect$tipc(r1, &(0x7f0000000000)=@name, 0x10) close(r2) 18:27:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket(0x1e, 0x5, 0x0) r2 = socket(0x1e, 0x2, 0x0) bind(r2, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) connect$tipc(r1, &(0x7f0000000000)=@name, 0x10) close(r2) 18:27:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket(0x1e, 0x5, 0x0) r2 = socket(0x1e, 0x2, 0x0) bind(r2, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) connect$tipc(r1, &(0x7f0000000000)=@name, 0x10) close(r2) [ 68.483442] IPVS: ftp: loaded support on port[0] = 21 [ 68.511853] NET: Registered protocol family 30 [ 68.516505] Failed to register TIPC socket type [ 68.534010] IPVS: ftp: loaded support on port[0] = 21 [ 68.538413] IPVS: ftp: loaded support on port[0] = 21 [ 68.540449] cache_from_obj: Wrong slab cache. TIPC but object is from kmalloc-2048 [ 68.544659] cache_from_obj: Wrong slab cache. TIPC but object is from kmalloc-2048 [ 68.552413] WARNING: CPU: 0 PID: 8315 at mm/slab.h:380 kmem_cache_free.cold+0x1c/0x23 [ 68.567936] Kernel panic - not syncing: panic_on_warn set ... [ 68.567936] [ 68.575333] CPU: 0 PID: 8315 Comm: syz-executor.3 Not tainted 4.19.47 #19 [ 68.582258] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 68.591610] Call Trace: [ 68.594180] [ 68.596329] dump_stack+0x172/0x1f0 [ 68.599960] panic+0x263/0x507 [ 68.603143] ? __warn_printk+0xf3/0xf3 [ 68.607046] ? kmem_cache_free.cold+0x1c/0x23 [ 68.611536] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 68.617065] ? __warn.cold+0x5/0x4a [ 68.620680] ? __warn+0xe8/0x1d0 [ 68.624047] ? kmem_cache_free.cold+0x1c/0x23 [ 68.628545] __warn.cold+0x20/0x4a [ 68.632078] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 68.637608] ? kmem_cache_free.cold+0x1c/0x23 [ 68.642094] report_bug+0x263/0x2b0 [ 68.645714] do_error_trap+0x204/0x360 [ 68.649593] ? math_error+0x340/0x340 [ 68.653384] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 68.658913] ? wake_up_klogd+0x99/0xd0 [ 68.662792] ? error_entry+0x76/0xd0 [ 68.666759] ? trace_hardirqs_off_caller+0x65/0x220 [ 68.671771] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 68.676605] do_invalid_op+0x1b/0x20 [ 68.680305] invalid_op+0x14/0x20 [ 68.683747] RIP: 0010:kmem_cache_free.cold+0x1c/0x23 [ 68.688848] Code: e8 95 ab 47 05 44 8b 6d c4 e9 74 a5 ff ff 48 8b 48 58 48 c7 c6 c0 44 54 87 48 c7 c7 78 66 38 88 49 8b 54 24 58 e8 44 3d b4 ff <0f> 0b e9 89 df ff ff 49 8b 4f 58 48 c7 c6 c0 44 54 87 48 c7 c7 78 [ 68.709306] RSP: 0018:ffff8880ae807cf8 EFLAGS: 00010286 [ 68.714676] RAX: 0000000000000046 RBX: ffff8880a9bd3200 RCX: 0000000000000000 [ 68.721935] RDX: 0000000000000000 RSI: ffffffff81559f66 RDI: ffffed1015d00f91 [ 68.729206] RBP: ffff8880ae807d18 R08: 0000000000000046 R09: ffffed1015d04fe9 [ 68.736462] R10: ffffed1015d04fe8 R11: ffff8880ae827f47 R12: ffff88809eb236c0 [ 68.743723] R13: 0000000000000000 R14: ffff88809eb236c0 R15: ffff8880a9bd3510 [ 68.751007] ? vprintk_func+0x86/0x189 [ 68.754895] ? kmem_cache_free.cold+0x1c/0x23 [ 68.759382] __sk_destruct+0x4b4/0x6d0 [ 68.764131] ? tipc_wait_for_connect.isra.0+0x4c0/0x4c0 [ 68.769483] sk_destruct+0x7b/0x90 [ 68.773026] __sk_free+0xce/0x300 [ 68.776468] sk_free+0x42/0x50 [ 68.779649] tipc_sk_callback+0x48/0x60 [ 68.783618] rcu_process_callbacks+0xba0/0x1a30 [ 68.788279] ? __rcu_read_unlock+0x170/0x170 [ 68.792678] ? __lock_is_held+0xb6/0x140 [ 68.796737] __do_softirq+0x25c/0x921 [ 68.800531] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 68.806060] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 68.811607] irq_exit+0x180/0x1d0 [ 68.815052] smp_apic_timer_interrupt+0x13b/0x550 [ 68.819888] apic_timer_interrupt+0xf/0x20 [ 68.824207] [ 68.826437] RIP: 0010:update_stack_state+0x14e/0x5f0 [ 68.831537] Code: ff a8 00 00 00 49 8d 55 08 8b 85 5c ff ff ff 49 bf 00 00 00 00 00 fc ff df 49 89 d4 48 89 95 48 ff ff ff 49 c1 ec 03 4d 01 fc 6d 49 8d 7d 28 49 8d 4d 20 48 89 f8 48 c1 e8 03 42 80 3c 38 00 [ 68.850519] RSP: 0018:ffff8880761e76e8 EFLAGS: 00000286 ORIG_RAX: ffffffffffffff13 [ 68.858219] RAX: 0000000000000001 RBX: ffff8880761e7dd8 RCX: 1ffff1100ec3cf1a [ 68.865825] RDX: ffff8880761e78a0 RSI: ffff8880761e7dd8 RDI: ffff8880761e78d0 [ 68.873083] RBP: ffff8880761e77b0 R08: 0000000000000001 R09: ffff8880761e78f0 [ 68.880345] R10: ffff8880761e78c0 R11: ffff8880761e78d0 R12: ffffed100ec3cf14 [ 68.887605] R13: ffff8880761e7898 R14: 1ffff1100ec3cee5 R15: dffffc0000000000 [ 68.894888] ? __read_once_size_nocheck.constprop.0+0x10/0x10 [ 68.900770] unwind_next_frame.part.0+0x1a9/0xa20 [ 68.905607] ? unwind_dump+0x100/0x100 [ 68.909485] ? unwind_dump+0x100/0x100 [ 68.913370] unwind_next_frame+0x3b/0x50 [ 68.917428] __save_stack_trace+0x83/0x100 [ 68.921746] ? create_new_namespaces+0x400/0x7b0 [ 68.926496] save_stack_trace+0x1a/0x20 [ 68.930462] save_stack+0x45/0xd0 [ 68.934021] ? save_stack+0x45/0xd0 [ 68.937637] ? kasan_kmalloc+0xce/0xf0 [ 68.941522] ? kasan_slab_alloc+0xf/0x20 [ 68.945570] ? __kmalloc+0x146/0x750 [ 68.949274] ? ops_init+0xff/0x410 [ 68.952887] ? setup_net+0x2d3/0x740 [ 68.956588] ? copy_net_ns+0x1df/0x340 [ 68.960552] ? create_new_namespaces+0x400/0x7b0 [ 68.965313] ? mark_held_locks+0x100/0x100 [ 68.969540] ? kasan_check_write+0x14/0x20 [ 68.973868] ? fs_reclaim_acquire+0x20/0x20 [ 68.978182] ? __lock_is_held+0xb6/0x140 [ 68.982232] ? should_fail+0x14d/0x85c [ 68.986110] ? mark_held_locks+0xb1/0x100 [ 68.990245] ? lock_downgrade+0x810/0x810 [ 68.994385] ? kasan_unpoison_shadow+0x35/0x50 [ 68.998960] kasan_kmalloc+0xce/0xf0 [ 69.002677] kasan_slab_alloc+0xf/0x20 [ 69.006566] __kmalloc+0x146/0x750 [ 69.010110] ? lockdep_init_map+0x9/0x10 [ 69.014161] ? __init_waitqueue_head+0x36/0x90 [ 69.018732] ? ops_init+0xff/0x410 [ 69.022274] ops_init+0xff/0x410 [ 69.025636] setup_net+0x2d3/0x740 [ 69.029166] ? lock_acquire+0x16f/0x3f0 [ 69.033132] ? ops_init+0x410/0x410 [ 69.036754] copy_net_ns+0x1df/0x340 [ 69.040473] create_new_namespaces+0x400/0x7b0 [ 69.045053] unshare_nsproxy_namespaces+0xc2/0x200 [ 69.050000] ksys_unshare+0x440/0x980 [ 69.053815] ? walk_process_tree+0x2c0/0x2c0 [ 69.058308] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 69.063229] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 69.068635] ? do_syscall_64+0x26/0x620 [ 69.072780] ? lockdep_hardirqs_on+0x415/0x5d0 [ 69.077455] __x64_sys_unshare+0x31/0x40 [ 69.082813] do_syscall_64+0xfd/0x620 [ 69.086607] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 69.091785] RIP: 0033:0x45bd47 [ 69.094981] Code: 00 00 00 b8 63 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 1d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 10 01 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 69.113873] RSP: 002b:00007ffca80faf78 EFLAGS: 00000202 ORIG_RAX: 0000000000000110 [ 69.121570] RAX: ffffffffffffffda RBX: 000000000075c9a8 RCX: 000000000045bd47 [ 69.128851] RDX: 0000000000000000 RSI: 00007ffca80faf20 RDI: 0000000040000000 [ 69.136119] RBP: 00000000000000f8 R08: 0000000000000000 R09: 0000000000000005 [ 69.143404] R10: 0000000000000000 R11: 0000000000000202 R12: 000000000075c9a8 [ 69.150661] R13: 00007ffca80fb1e8 R14: 0000000000000000 R15: 0000000000000000 [ 69.159673] Kernel Offset: disabled [ 69.163362] Rebooting in 86400 seconds..